EFOS3.10 - CLI Command Reference
EFOS3.10 - CLI Command Reference
User Guide
Software Release 3.10
Copyright © 2018–2022 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its
subsidiaries. For more information, go to www.broadcom.com. All trademarks, trade names, service marks, and logos
referenced herein belong to their respective companies.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does
not assume any liability arising out of the application or use of this information, nor the application or use of any product or
circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
Table of Contents
Chapter 1: Introduction
This document describes the command-line interface (CLI) commands used to view and configure Ethernet Fabric
Operating System (EFOS) software. You can access the CLI by using a direct connection to the serial port or by using telnet
or SSH over a remote network connection.
This document is for system administrators who configure and operate systems using EFOS software. It provides an
understanding of the configuration options of the EFOS software.
Software engineers who integrate EFOS software into their hardware platform can also benefit from a description of the
configuration options.
This document assumes that the reader has an understanding of the EFOS software base and has read the appropriate
specification for the relevant networking device platform. It also assumes that the reader has a basic knowledge of Ethernet
and networking concepts.
Refer to the release notes for the EFOS application-level code. The release notes detail the platform-specific functionality
of the Switching, Routing, SNMP, Configuration, Management, and other packages. The suite of features the EFOS
packages support is not available on all the platforms to which EFOS software has been ported.
As of the current EFOS release, EFOS is supported only on the BCM56870-based IX8-B ODM platform. Although the
platform has 48 × 25G + 8 × 100G ports, only 16×25G + 2×100G ports are enabled by default. An additional downloadable
software license is needed to enable multiples of 8 × 25G + 2 × 100G port blocks and the BroadView™ feature.
This chapter describes the CLI syntax, conventions, and modes. It contains the following sections:
Some commands, such as show network or clear vlan, do not require parameters. Other commands, such as network
parms, require that you supply a value after the command. You must type the parameter values in a specific order, and
optional parameters follow required parameters. The following example describes the network parms command syntax:
network parms ipaddr netmask [gateway]
network parms is the command name.
ipaddr and netmask are parameters and represent required values that you must enter after you type the command
keywords.
[gateway] is an optional parameter, so you are not required to enter a value in place of the parameter.
The CLI Command Reference lists each command by the command name and provides a brief description of the command.
Each command reference also contains the following information:
Format shows the command keywords and the required and optional parameters.
Mode identifies the command mode you must be in to access the command.
Default shows the default value, if any, of a configurable setting on the device.
The show commands also contain a description of the information that the command shows.
Parameter Description
ipaddr This parameter is a valid IP address. You can enter the IP address in the following formats:
a (32 bits)
a.b (8.24 bits)
a.b.c (8.8.16 bits)
a.b.c.d (8.8.8.8)
In addition to these formats, the CLI accepts decimal, hexadecimal and octal formats through the following
input formats (where n is any valid hexadecimal, octal or decimal number):
0xn (CLI assumes hexadecimal format.)
0n (CLI assumes octal format with leading zeros.)
n (CLI assumes decimal format.)
Interface or Valid slot and port number separated by a forward slash. For example, 0/1 represents slot number 0 and
slot/port port number 1.
Logical Interface Represents a logical slot and port number. This is applicable in the case of a port-channel (LAG). You can
use the logical slot/port to configure the port-channel.
Character strings Use double quotation marks to identify character strings, for example, “System Name with Spaces”. An
empty string (“”) is not valid.
The slot number has two uses. In the case of physical ports, it identifies the card containing the ports. In the case of logical
and CPU ports it also identifies the type of interface or port.
The port identifies the specific physical port or logical interface being managed on a given slot.
NOTE: In the CLI, loopback interfaces do not use the slot/port format. To specify a loopback interface, you use the
loopback ID.
The following are the main functions of the CLI Output Filtering feature.
Pagination Control
– Supports enabling/disabling paginated output for all show CLI commands. When disabled, output is displayed in its
entirety. When enabled, output is displayed page-by-page such that content does not scroll off the terminal screen
until the user presses a key to continue. --More-- or (q)uit is displayed at the end of each page.
– When pagination is enabled, press the return key to advance a single line, press q or Q to stop pagination, or press
any other key to advance a whole page. These keys are not configurable.
NOTE: Although some EFOS show commands already support pagination, the implementation is unique per command
and not generic to all commands.
Output Filtering. “Grep”-like control for modifying the displayed output to only show the user-desired content.
– Filter displayed output to only include lines containing a specified string match.
– Filter displayed output to exclude lines containing a specified string match.
– Filter displayed output to only include lines including and following a specified string match.
– Filter displayed output to only include a specified section of the content (for example, “interface 0/1”) with a
configurable end-of-section delimiter.
– String matching should be case insensitive.
– Pagination, when enabled, also applies to filtered output.
Example: The following shows an example of the extensions made to the CLI show commands for the Output Filtering
feature.
show running-config ?
<cr> Press enter to execute the command.
all Show all the running configuration on the switch.
| Output filter options
show running-config | ?
include {keyword}
exclude {keyword}
section {begin end}
For commands for the feature, see Section 4.3, CLI Output Filtering Commands.
Data Center
Routing (Layer 3)
Multicast
BGP-4
Quality of Service
Not all modules are available for all platforms or software releases.
The command prompt changes in each command mode to help you identify the current mode. The following table describes
the command modes and the prompts visible in that mode.
NOTE: The command modes available on your switch depend on the software modules that are installed. For example, a
switch that does not support BGPv4 does not have the BGPv4 Router Command Mode.
The following table explains how to enter each mode. To exit a mode and return to the previous mode, enter exit. To exit
to Privileged EXEC mode, press Ctrl+Z.
NOTE: Pressing Ctrl+Z from Privileged EXEC mode exits to User EXEC mode. To exit User EXEC mode, enter logout.
Command abbreviation allows you to execute a command when you have entered there are enough letters to uniquely
identify the command. You must enter all of the required keywords and parameters before you enter the command.
Enter a question mark (?) after each word you enter to display available command keywords or parameters.
(Routing) #network ?
If the help output shows a parameter in angle brackets, you must replace the parameter with a value.
(Routing) #network parms ?
If there are no additional command keywords or parameters, or if additional parameters are optional, the following message
appears in the output:
<cr> Press Enter to execute the command
You can also enter a question mark (?) after typing one or more characters of a word to list the available command or
parameters that begin with the letters, as shown in the following example:
(Routing) #show m?
For the initial connection, you must use a direct connection to the console port. You cannot access the system remotely until
the system has an IP address, subnet mask, and default gateway. You can set the network configuration information
manually, or you can configure the system to accept these settings from a BOOTP or DHCP server on your network. For
more information, see Section 3.1, Network Interface Commands.
NOTE: The commands in this section are in one of three functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration command, there
is a show command that displays the configuration setting.
Clear commands clear some or all of the settings to factory defaults.
Format enable
Mode User EXEC
Example: The following is an example of the do command that executes the Privileged EXEC command script list
in Global Config Mode.
(Routing) #configure
Routing(config)#
3.1.3 serviceport ip
This command sets the IP address, the netmask and the gateway of the network management port. You can specify the
none option to clear the IPv4 address and mask and the default gateway (that is, reset each of these values to 0.0.0.0).
Default dhcp
Format serviceport protocol {none | bootp | dhcp}
Mode Privileged EXEC
There is no support for the no form of the command serviceport protocol dhcp client-id. To remove the
client-id option from the DHCP client messages, issue the command serviceport protocol dhcp without the
client-id option. The command serviceport protocol none can be used to disable the DHCP client and client-id
option on the interface.
Example: The following shows an example of the command.
(Routing) # serviceport protocol dhcp client-id
There is no support for the no form of the command network protocol dhcp client-id. To remove the client-id option
from the DHCP client messages, issue the command network protocol dhcp without the client-id option. The
command network protocol none can be used to disable the DHCP client and client-id option on the interface.
Example: The following shows an example of the command.
(Routing) # network protocol dhcp client-id
A locally administered address must have bit 6 On (b'1') and bit 7 Off (b'0').
Default burnedin
Format network mac-type {local | burnedin}
Mode Privileged EXEC
Parameter Description
Interface Status The network interface status; it is always considered to be up.
IP Address The IP address of the interface. The factory default value is 0.0.0.0.
Subnet Mask The IP subnet mask for this interface. The factory default value is 0.0.0.0.
Default Gateway The default gateway for this IP interface. The factory default value is 0.0.0.0.
IPv6 Administrative Mode Whether enabled or disabled.
IPv6 Address/Length The IPv6 address and length.
IPv6 Default Router The IPv6 default router address.
Burned In MAC Address The burned in MAC address used for in-band connectivity.
Locally Administered MAC Address If desired, a locally administered MAC address can be configured for in-band connectivity. To take
effect, 'MAC Address Type' must be set to 'Locally Administered'. Enter the address as twelve
hexadecimal digits (6 bytes) with a colon between each byte. Bit 1 of byte 0 must be set to a 1 and
bit 0 to a 0, that is, byte 0 should have the following mask 'xxxx xx10'. The MAC address used by
this bridge when it must be referred to in a unique fashion. It is recommended that this be the
numerically smallest MAC address of all ports that belong to this bridge. However it is only required
to be unique. When concatenated with dot1dStpPriority a unique Bridge Identifier is formed which
is used in the Spanning Tree Protocol.
MAC Address Type The MAC address which should be used for in-band connectivity. The choices are the burned in or
the Locally Administered address. The factory default is to use the burned in MAC address.
Configured IPv4 Protocol The IPv4 network protocol being used. The options are bootp | dhcp | none.
Configured IPv6 Protocol The IPv6 network protocol being used. The options are dhcp | none.
DHCPv6 Client DUID The DHCPv6 client’s unique client identifier. This row is displayed only when the configured IPv6
protocol is dhcp.
IPv6 Autoconfig Mode Whether IPv6 Stateless address autoconfiguration is enabled or disabled.
DHCP Client Identifier The client identifier is displayed in the output of the command only if DHCP is enabled with the
client-id option on the network port. See the network protocol dhcp command.
Example: The following shows example CLI display output for the network port.
(Switching) #show network
Interface Status............................... Up
IP Address..................................... 10.250.3.1
Subnet Mask.................................... 255.255.255.0
Default Gateway................................ 10.250.3.3
IPv6 Administrative Mode....................... Enabled
IPv6 Prefix is ................................ fe80::210:18ff:fe82:64c/64
IPv6 Prefix is ................................ 2003::1/128
IPv6 Default Router is ........................ fe80::204:76ff:fe73:423a
Burned In MAC Address.......................... 00:10:18:82:06:4C
Locally Administered MAC address............... 00:00:00:00:00:00
MAC Address Type............................... Burned In
Configured IPv4 Protocol ...................... None
Configured IPv6 Protocol ...................... DHCP
DHCPv6 Client DUID ............................ 00:03:00:06:00:10:18:82:06:4C
IPv6 Autoconfig Mode........................... Disabled
Management VLAN ID............................. 1
DHCP Client Identifier......................... 0icos/efos-0010.1882.160B-vl1
Parameter Description
Interface Status The network interface status. It is always considered to be up.
IP Address The IP address of the interface. The factory default value is 0.0.0.0.
Subnet Mask The IP subnet mask for this interface. The factory default value is 0.0.0.0.
Default Gateway The default gateway for this IP interface. The factory default value is 0.0.0.0.
IPv6 Administrative Mode Whether enabled or disabled. Default value is enabled.
IPv6 Address/Length The IPv6 address and length. Default is Link Local format.
IPv6 Default Router TheIPv6 default router address on the service port. The factory default value is an unspecified address.
Configured IPv4 Protocol The IPv4 network protocol being used. The options are bootp | dhcp | none.
Configured IPv6 Protocol The IPv6 network protocol being used. The options are dhcp | none.
DHCPv6 Client DUID The DHCPv6 client’s unique client identifier. This row is displayed only when the configured IPv6
protocol is dhcp.
IPv6 Autoconfig Mode Whether IPv6 Stateless address autoconfiguration is enabled or disabled.
Burned in MAC Address The burned in MAC address used for in-band connectivity.
DHCP Client Identifier The client identifier is displayed in the output of the command only if DHCP is enabled with the
client-id option on the service port. See the serviceport protocol command.
Example: The following shows example CLI display output for the service port.
(Switching) #show serviceport
Interface Status............................... Up
IP Address..................................... 10.230.3.51
Subnet Mask.................................... 255.255.255.0
The ability to ping an IPv6 link-local address over the service/network port.
Using IPv6 Management commands, you can send SNMP traps and queries using the service/network port.
The user can manage a device using the network port (in addition to a Routing Interface or the Service port).
Default enabled
Format serviceport ipv6 enable
Mode Privileged EXEC
Default enabled
Format network ipv6 enable
Mode Privileged EXEC
Parameter Description
address IPv6 prefix in IPv6 global address format.
prefix-length IPv6 prefix length value.
eui64 Formulate IPv6 address in eui64 address format.
autoconfig Configure stateless global address autoconfiguration capability.
dhcp Configure dhcpv6 client protocol.
NOTE: Only a single IPv6 gateway address can be configured for the service port. There may be a combination of IPv6
prefixes and gateways that are explicitly configured and those that are set through auto-address configuration with
a connected IPv6 router on their service port interface.
Parameter Description
gateway-address Gateway address in IPv6 global or link-local address format.
Parameter Description
ipv6-address The IPv6 address of the neighbor or interface.
macaddr The link-layer address.
Parameter Description
ipv6-address The IPv6 address of the neighbor or interface.
macaddr The link-layer address.
Parameter Description
address IPv6 prefix in IPv6 global address format.
prefix-length IPv6 prefix length value.
eui64 Formulate IPv6 address in eui64 format.
autoconfig Configure stateless global address autoconfiguration capability.
dhcp Configure dhcpv6 client protocol.
Use this command with the address option to remove the manually configured IPv6 global address on the network port
interface. Use this command with the autoconfig option to disable the stateless global address auto-configuration on the
network port. Use this command with the dhcp option to disable the DHCPv6 client protocol on the network port.
Parameter Description
gateway-address Gateway address in IPv6 global or link-local address format.
Default none
Format show network ipv6 neighbors
Mode Privileged EXEC
Parameter Description
IPv6 Address The IPv6 address of the neighbor.
MAC Address The MAC Address of the neighbor.
isRtr Shows if the neighbor is a router. If TRUE, the neighbor is a router; FALSE it is not a router.
Neighbor State The state of the neighbor cache entry. Possible values are: Incomplete, Reachable, Stale, Delay, Probe, and
Unknown
Age The time in seconds that has elapsed since an entry was added to the cache.
Last Updated The time in seconds that has elapsed since an entry was added to the cache.
Type The type of neighbor entry. The type is Static if the entry is manually configured and Dynamic if dynamically
resolved.
Default none
Format show serviceport ipv6 neighbors
Mode Privileged EXEC
Parameter Description
IPv6 Address The IPv6 address of the neighbor.
MAC Address The MAC Address of the neighbor.
isRtr Shows if the neighbor is a router. If TRUE, the neighbor is a router; if FALSE, it is not a router.
Neighbor State The state of the neighbor cache entry. The possible values are: Incomplete, Reachable, Stale, Delay, Probe, and
Unknown.
Age The time in seconds that has elapsed since an entry was added to the cache.
Parameter Description
Type The type of neighbor entry. The type is Static if the entry is manually configured and Dynamic if dynamically
resolved.
Neighbor Age
IPv6 Address MAC Address isRtr State (Secs) Type
--------------------------------------- ----------------- ----- --------- ------ --------
FE80::5E26:AFF:FEBD:852C 5c:26:0a:bd:85:2c FALSE Reachable 0 Dynamic
Parameter Description
DHCPv6 Advertisement Packets The number of DHCPv6 Advertisement packets received on the network interface.
Received
DHCPv6 Reply Packets Received The number of DHCPv6 Reply packets received on the network interface.
Received DHCPv6 Advertisement The number of DHCPv6 Advertisement packets discarded on the network interface.
Packets Discarded
Received DHCPv6 Reply Packets The number of DHCPv6 Reply packets discarded on the network interface.
Discarded
DHCPv6 Malformed Packets Received The number of DHCPv6 packets that are received malformed on the network interface.
Total DHCPv6 Packets Received The total number of DHCPv6 packets received on the network interface.
DHCPv6 Solicit Packets Transmitted The number of DHCPv6 Solicit packets transmitted on the network interface.
DHCPv6 Request Packets Transmitted The number of DHCPv6 Request packets transmitted on the network interface.
DHCPv6 Renew Packets Transmitted The number of DHCPv6 Renew packets transmitted on the network interface.
DHCPv6 Rebind Packets Transmitted The number of DHCPv6 Rebind packets transmitted on the network interface.
DHCPv6 Release Packets Transmitted The number of DHCPv6 Release packets transmitted on the network interface.
Total DHCPv6 Packets Transmitted The total number of DHCPv6 packets transmitted on the network interface.
Example: The following shows example CLI display output for the command.
(Switching)#show network ipv6 dhcp statistics
DHCPv6 Client Statistics
-------------------------
Parameter Description
DHCPv6 Advertisement Packets Received The number of DHCPv6 Advertisement packets received on the service port interface.
DHCPv6 Reply Packets Received The number of DHCPv6 Reply packets received on the service port interface.
Received DHCPv6 Advertisement Packets The number of DHCPv6 Advertisement packets discarded on the service port interface.
Discarded
Received DHCPv6 Reply Packets The number of DHCPv6 Reply packets discarded on the service port interface.
Discarded
DHCPv6 Malformed Packets Received The number of DHCPv6 packets that are received malformed on the service port interface.
Total DHCPv6 Packets Received The total number of DHCPv6 packets received on the service port interface.
DHCPv6 Solicit Packets Transmitted The number of DHCPv6 Solicit packets transmitted on the service port interface.
DHCPv6 Request Packets Transmitted The number of DHCPv6 Request packets transmitted on the service port interface.
DHCPv6 Renew Packets Transmitted The number of DHCPv6 Renew packets transmitted on the service port interface.
DHCPv6 Rebind Packets Transmitted The number of DHCPv6 Rebind packets transmitted on the service port interface.
DHCPv6 Release Packets Transmitted The number of DHCPv6 Release packets transmitted on the service port interface.
Total DHCPv6 Packets Transmitted The total number of DHCPv6 packets transmitted on the service port interface.
Example: The following shows example CLI display output for the command.
(Switching)#show serviceport ipv6 dhcp statistics
DHCPv6 Client Statistics
-------------------------
Format ping ipv6 interface {slot/port | loopback loopback-id |network |serviceport |tunnel
tunnel-id} {link-local-address link-local-address | ipv6-address} [size datagram-size]
[outgoing-interface {slot/port | vlan 1-4093 | serviceport | network}]
Modes Privileged EXEC
User EXEC
3.2.16 traceroute
Use the traceroute command to discover the routes that packets actually take when traveling to their destination through
the network on a hop-by-hop basis. Traceroute continues to provide a synchronous response when initiated from the CLI.
The user may specify the source IP address or the virtual router of the traceroute probes. Recall that traceroute works by
sending packets that are expected not to reach their final destination, but instead trigger ICMP error messages back to the
source address from each hop along the forward path to the destination. By specifying the source address, the user can
determine where along the forward path there is no route back to the source address. Note that this is only useful if the route
from source to destination and destination to source is symmetric.) It would be common, for example, to send a traceroute
from an edge router to a target higher in the network using a source address from a host subnet on the edge router. This
would test reachability from within the network back to hosts attached to the edge router. Alternatively, one might send a
traceroute with an address on a loopback interface as a source to test reachability back to the loopback interface address.
In the CLI, the user may specify the source either as an IPv4 address, a virtual router, or as a routing interface. When the
source is specified as a routing interface, the traceroute is sent using the primary IPv4 address on the source interface. With
SNMP, the source must be specified as an address.
EFOS will not accept an incoming packet, such as a traceroute response, that arrives on a routing interface if the packet’s
destination address is on one of the out-of-band management interfaces (service port or network port). Similarly, EFOS will
not accept a packet that arrives on a management interface if the packet’s destination is an address on a routing interface.
Thus, it would be futile to send a traceroute on a management interface using a routing interface address as source, or to
send a traceroute on a routing interface using a management interface as source. When sending a traceroute on a routing
interface, the source must be that routing interface or another routing interface. When sending a traceroute on a
management interface, the source must be on that management interface. For this reason, the user cannot specify the
source as a management interface or management interface address. When sending a traceroute on a management
interface, the user should not specify a source address, but instead let the system select the source address from the
outgoing interface.
Using the options described in the following table, you can specify the initial and maximum time-to-live (TTL) in probe
packets, the maximum number of failures before termination, the number of probes sent for each TTL, and the size of each
probe.
Parameter Description
vrf-name (Optional) The name of the VRF instance from which to initiate traceroute. Only hosts reachable from within
the VRF instance can be tracerouted. If a source parameter is specified with a vrf parameter, it must be a
member of the VRF. The ipv6 parameter cannot be used with the vrf parameter.
ipaddress The ipaddress value should be a valid IP address.
ipv6-address The ipv6-address value should be a valid IPv6 address.
hostname The hostname value should be a valid host name.
ipv6 The optional ipv6 keyword can be used before ipv6-address or hostname. Giving the ipv6 keyword
before the hostname tries it to resolve to an IPv6 address.
initTtl Use initTtl to specify the initial time-to-live (TTL), the maximum number of router hops between the local
and remote system. Range is 0 to 255.
maxTtl Use maxTtle to specify the maximum TTL. Range is 1 to 255.
maxFail Use maxFail to terminate the traceroute after failing to receive a response for this number of consecutive
probes. Range is 0 to 255.
interval Use the optional interval parameter to specify the time between probes, in seconds. If a response is not
received within this interval, then traceroute considers that probe a failure (printing *) and sends the next
probe. If traceroute does receive a response to a probe within this interval, then it sends the next probe
immediately. Range is 1 to 60 seconds.
count Use the optional count parameter to specify the number of probes to send for each TTL value. Range is 1
to 10 probes.
port Use the optional port parameter to specify destination UDP port of the probe. This should be an unused
port on the remote destination system. Range is 1 to 65535.
Parameter Description
size Use the optional size parameter to specify the size, in bytes, of the payload of the Echo Requests sent.
Range is 0 to 65507 bytes.
source Use the optional source parameter to specify the source IP address or interface for the traceroute.
The above command can also be execute with the optional ipv6 parameter as follows:
(Routing) # traceroute ipv6 2001::2 initTtl 1 maxTtl 4 maxFail 0 interval 1 count 3 port 33434 size 43
NOTE: If relay-address is an IPv6 global address, then relay-interface is not required. If relay-address is a
link-local or multicast address, then relay-interface is required. Finally, if you do not specify a value for
relay-address, you must specify a value for relay-interface and the DHCPV6-ALL-AGENTS multicast
address (that is, FF02::1:2) is used to relay DHCPv6 messages to the relay server.
Parameter Description
vrf vrf-name Use this configuration option to specify the VRF name where the DHCP relay can forward the packets to the
destination reachable using another VRF.
destination Use the destination keyword to set the relay server IPv6 address.
relay-address The relay-address parameter is an IPv6 address of a DHCPv6 relay server.
interface Use the interface keyword to set the relay server interface.
relay-interface The relay-interface parameter is an interface (slot/port) to reach a relay server. Multiple relay
addresses can be configured on an interface.
remote-id The optional remote-id is the Relay Agent Information Option “remote ID” suboption to be added to relayed
messages.This can either be the special keyword duid-ifid, which causes the “remote ID” to be derived
from the DHCPv6 server DUID and the relay interface number, or it can be specified as a user-defined string.
3.3.1 configuration
This command gives you access to the Global Config mode. From the Global Config mode, you can configure a variety of
system settings, including user accounts. From the Global Config mode, you can enter other command modes, including
Line Config mode.
Format configuration
Mode Privileged EXEC
3.3.2 line
This command gives you access to the Line Console mode, which allows you to configure various Telnet settings and the
console port, as well as to configure console login/enable authentication.
Parameter Description
console Console terminal line.
telnet Virtual terminal for remote console access (Telnet).
ssh Virtual terminal for secured remote console access (SSH).
Default 9600
Format serial baudrate {1200 | 2400 | 4800 | 9600 | 19200 | 38400 | 57600 | 115200}
Mode Line Config
Default 5
Format serial timeout 0-160
Mode Line Config
Parameter Description
Serial Port Login Timeout The time, in minutes, of inactivity on a serial port connection, after which the switch will close the
(minutes) connection. A value of 0 disables the timeout.
Baud Rate (bps) The default baud rate at which the serial port will try to connect.
Character Size (bits) The number of bits in a character. The number of bits is always 8.
Flow Control Whether Hardware Flow Control is enabled or disabled. Hardware Flow Control is always disabled.
Stop Bits The number of Stop bits per character. The number of Stop bits is always 1.
Parity The parity method used on the Serial Port. The Parity Method is always None.
Default enabled
Format ip telnet server enable
Mode Privileged EXEC
Default 23
Format ip telnet port 1-65535
Mode Privileged EXEC
3.4.3 telnet
This command establishes a new outbound Telnet connection to a remote host. The hostname value must be a valid IP
address or host name. Valid values for port should be a valid decimal integer in the range of 0 to 65535, where the default
value is 23. If [debug] is used, the current Telnet options enabled is displayed. The optional line parameter sets the
outbound Telnet operational mode as line where, by default, the operational mode is character mode. The localecho
option enables local echo.
NOTE: If the Telnet Server Admin Mode is disabled, Telnet sessions cannot be established. Use the ip telnet server
enable command to enable Telnet Server Admin Mode.
Default enabled
Format transport input telnet
Mode Line Config
Default enabled
Format transport output {telnet|ssh}
Mode Line Config
3.4.6 session-limit
This command specifies the maximum number of simultaneous outbound Telnet sessions. A value of 0 indicates that no
outbound Telnet session can be established.
Default 5
Format session-limit 0-5
Mode Line Config
3.4.6.0.1 no session-limit
This command sets the maximum number of simultaneous outbound Telnet sessions to the default value.
Format no session-limit
Mode Line Config
3.4.7 session-timeout
This command sets the Telnet session timeout value. The timeout value unit of time is minutes.
Default 5
Format session-timeout 1-160
Mode Line Config
3.4.7.0.1 no session-timeout
This command sets the Telnet session timeout value to the default. The timeout value unit of time is minutes.
Format no session-timeout
Mode Line Config
NOTE: When you change the timeout value, the new value is applied to all active and inactive sessions immediately. Any
sessions that have been idle longer than the new timeout value are disconnected immediately.
Default 5
Format telnetcon timeout 1-160
Mode Privileged EXEC
NOTE: Changing the timeout value for active sessions does not become effective until the session is accessed again.
Also, any keystroke activates the new timeout duration.
Parameter Description
Outbound Telnet Login The number of minutes an outbound Telnet session is allowed to remain inactive before being logged off.
Timeout
Maximum Number of The number of simultaneous outbound Telnet connections allowed.
Outbound Telnet
Sessions
Allow New Outbound Indicates whether outbound Telnet sessions will be allowed.
Telnet Sessions
Parameter Description
Remote Connection Login This object indicates the number of minutes a remote connection session is allowed to remain inactive
Timeout (minutes) before being logged off. May be specified as a number from 1 to 160. The factory default is 5.
Maximum Number of Remote This object indicates the number of simultaneous remote connection sessions allowed. The factory default
Connection Sessions is 5.
Allow New Telnet Sessions New Telnet sessions will not be allowed when this field is set to no. The factory default value is yes.
Parameter Description
Telnet Server Admin Mode If Telnet Admin mode is enabled or disabled.
Telnet Server Port The configured TCP port number on which the Telnet server listens for requests. (The default is 23.)
3.5.1 ip ssh
Use this command to enable SSH access to the system. (This command is the short form of the ip ssh server enable
command.)
Default disabled
Format ip ssh
Mode Privileged EXEC
3.5.1.0.1 no ip ssh
Use this command to disable SSH access to the system.
Format no ip ssh
Mode Privileged EXEC
Default 22
Format ip ssh port 1-65535
Mode Privileged EXEC
Default disabled
Format ip ssh pubkey-auth
Mode Privileged EXEC
ip ssh server algorithm hostkeyUse this command to specify the host key algorithms used to establish the
SSH connection. This command also defines the order of host key algorithms.
Example: The following example shows how to specify an Message Authentication Code algorithm.
(Routing)#ip ssh server algorithm mac [email protected] hmac-sha2-256 hmac-sha1
Default disabled
Format ip ssh server enable
Mode Privileged EXEC
Default 3
Format ip ssh authentication-retries <0-5>
Mode Privileged EXEC
Default none
Format netconf ssh
Mode Global Config
(Routing)(Config)#netconf ?
ssh Enable NETCONF over SSH 2.
(Routing)(Config)#netconf ssh
(Routing)(Config)#
Default 5
Format sshcon maxsessions 0-5
Mode Privileged EXEC
Changing the timeout value for active sessions does not become effective until the session is re-accessed. Also, any
keystroke activates the new timeout duration.
Default 5
Changing the timeout value for active sessions does not become effective until the session is re-accessed. Also, any
keystroke activates the new timeout duration.
Parameter Description
Administrative Mode This field indicates whether the administrative mode of SSH is enabled or disabled.
SSH Port The SSH port.
Protocol Level The SSH protocol version. This field may have the values of version 1, version 2, or both version
1 and version 2.
SSH Sessions Currently Active The number of SSH sessions currently active.
Max SSH Sessions Allowed The maximum number of SSH sessions allowed.
SSH Timeout The SSH timeout value in minutes.
Keys Present Indicates whether the SSH RSA, DSA, and ECDSA key files are present on the device. The
length of the respective keys and the key encryption status (if the key is encrypted) are displayed
in parenthesis.
Keys Present Indicates whether the SSH RSA, DSA, and ECDSA key files are present on the device. The
length of the respective keys is displayed in parenthesis.
Key Generation in Progress Indicates whether RSA, DSA, or ECDSA key files generation is currently in progress.
SSH Public Key Authentication Mode Indicates whether the password less login for the SSH client is enabled or not.
Public Key Authentication Mode Indicates whether the password less login for the SSH client is enabled or not.
SCP Server Administrative Mode Indicates whether the SCP server is enabled on the switch. To allow file transfers from a host
system to the switch using SCP push operations, the SCP server must be enabled.
Max SSH Authentication Tries Displays the maximum number of authentication retries supported per SSH connection.
Encryption Algorithms Displays the encryption algorithms used for the SSH connection.
MAC Algorithms Displays the Message Authentication Code algorithms used for the SSH connection.
KEX Algorithms Displays the Key Exchange algorithms that are used over the SSH connection.
HostKey Algorithms Displays the host key algorithms that are used over the SSH connection.
Example: The following shows example CLI display output for the command.
(Routing)(Config)#show ip ssh
SSH Configuration
3.5.13 ssh
Use this command to establish an outbound SSH session for the DUT to a remote host.
Parameter Description
-l user_name Specify the user name to log in on the remote machine. If this parameter is not specified,
the user_name currently logged in to the DUT is uses as the user name.
-p port_number Specify the port number used to establish the SSH session. If this parameter is not
specified, port number 22 is used as the port number.
ip-address The IP address of the host to which to establish the SSH connection.
hostname The hostname of the host to which to establish the SSH connection.
Default 5
Format ssh session-limit 0-5
Mode Global Config
Default 0
Format ssh timeout 0-160
Mode Global Config
Parameter Description
Outbound SSH Admin Mode Indicates if outbound SSH sessions can be established.
Outbound SSH Login Timeout (minutes) Indicates the number of minutes an outbound telnet session is allowed to remain
inactive before being logged off.
Maximum Number of Outbound SSH Sessions Indicates the number of simultaneous outbound SSH connections allowed.
Number of Active Outbound SSH Sessions Indicates the number of simultaneous outbound SSH connections active.
NOTE: Starting with EFOS 3.4, the switch uses SHA2-256 to sign the generated certificate instead of SHA1, and the key
length of the certificate generated is changed from 1024 to 2048 bits. This change in key size is only for the newly
generated certificates and does not alter any functionality with the existing or loaded certificates.
Example: The following example shows the fields entered by the user to generate a self-signed certificate.
(Routing)(config)#crypto certificate 1 generate
(Routing)(config-crypto-cert-gen)#?
common-name Specifies the common name.
country Specifies the country name.
do Run Privileged EXEC mode commands.
duration Specifies number of days a self-signed
certification would be valid.
email Specifies the contact email address.
exit To exit from the mode.
key-generate Regenerate SSL RSA key. If unspecified defaults to
1024.
location Specifies the location or city name.
organization-name Specifies the organization name
organization-unit Specifies the organization internal unit
show Display Switch Options and Settings.
state Specifies the state or province name.
(Routing)(config-crypto-cert-gen)#
(Routing)(config-crypto-cert-gen)#key-generate 1024
(Routing)(config-crypto-cert-gen)#exit
(Routing)(config)#
Example: The following example imports a certificate signed by the Certification Authority for HTTPS.
(Routing)(Config)#crypto certificate 1 import
Please paste the input now, add a period (.) on a separate line after the input, and press Enter.
-----BEGIN CERTIFICATE-----
MIIBrDCCARWgAwIBAgIJANi+zML5qmloMA0GCSqGSIb3DQEBCwUAMBgxFjAUBgNV
BAMMDTEwLjEzMC44Ni4yMTcwHhcNNzAwMTAxMDM0MzM3WhcNNzEwMTAxMDM0MzM3
WjAYMRYwFAYDVQQDDA0xMC4xMzAuODYuMjE3MIGfMA0GCSqGSIb3DQEBAQUAA4GN
ADCBiQKBgQCZsOyuz2MlQ8ab+Y9vcRgqJdakeL8z4XLNRRDlAsNcOE6GXwskDrT8
hx0r7MywrO4J6bPfqG2t63ee3KUyPS+B6OdxwmNycRwbUZabxD87MmBwx9OtUULY
AkNCUKXG6I9kxUXry4CNbOmFtVpTHDr+xqWbmpQemRjB3VpUXOueewIDAQABMA0G
CSqGSIb3DQEBCwUAA4GBAHycAeQZv80Vxcw+hWFNsWePkD6VdM8o3ecV9kcCcFuV
SreKkICC6HBuPKVxqcoVoGbBiRSMGcDJ4XD9vEWWHZv1QiIn8Z1jy+OSpEAruIOi
myM3O5c1eG/4baIci1ccIJgWjwxZwAPd6kz+OtXHhWLn/+Y2akg3sev6oXTLTCsv
-----END CERTIFICATE-----
.
(Routing)(Config)#
Before generating a certificate request, you must first generate a self-signed certificate using the crypto certificate generate
command in Global Configuration mode, in order to sign the certificate request. Make sure to reenter the identical values in
the certificate request fields as were entered in the self-signed certificate generated by the crypto certificate generate
command.
(Routing)(config-crypto-cert-req)# exit
(Routing)(config)#
NOTE: The Subject Alternative Name (SAN) is an extension to the X.509 specification that allows users to specify
additional host names for a single SSL certificate. Some browsers will not accept the Common Name field in an
SSL certificate and require the SAN field instead.
EFOS supports adding the SAN field to the certificate request. The following sample SAN formats are supported.
DNS:example.com
DNS:*.example.com
DNS:xyz.com,IP:10.10.20.1
DNS.1:myserver.com, DNS.2:xyz.com, IP:10.10.32.1
Format crypto key encrypt write {rsa | dsa | ecdsa | sslt-cert-key cert-num |
sslt-client-cert-key client-key-num} passphrase passphrase
Mode Global Config
Parameter Description
rsa RSA key pair for SSH.
dsa DSA key pair for SSH.
ecdsa ECDSA key pair for SSH.
cert-num The SSL certificate key.
client-key-num The SSL client certificate key.
passphrase The passphrase must be at least 8 characters long.
Format crypto key decrypt write {rsa | dsa | ecdsa | sslt-cert-key cert-num |
sslt-client-cert-key client-key-num} passphrase passphrase
Mode Global Config
Parameter Description
rsa RSA key pair for SSH.
dsa DSA key pair for SSH.
ecdsa ECDSA key pair for SSH.
cert-num The SSL certificate key.
client-key-num The SSL client certificate key.
passphrase The passphrase must be at least 8 characters long.
Parameter Description
key-len Key length for the RSA key in bits. Valid lengths are 1024, 2048, and 3072.
Parameter Description
key-len Key length for the DSA key in bits. The valid length is 1024.
Parameter Description
key-len Key length for the ECDSA key in bits. Valid lengths are 256, 384, and 521.
(Routing)(config-pubkey-key)#key-String "ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAQEAvwova0rICLGoTJ46ZMRknjAk8pBEz3Y4DijzV7oim+wW7DI5mFUULI3cT111OcjGHeQF03ph
ufEDcK45Cr0nHCD37zDwjN5B2+YFtVq6h4dQGfBFJVnXvJ/PmqDt5iti/jAvRXn4NzHA03byn8/
yHUsrzI6Syd3FZfaBvD+Shxpgx+pZkkLRXHgZlL/s7uxOpu6aWwjhZEZFz5RJX//chT5J3uHn++W9Yt/
3CwEenZeF4oOwEji5DTnPfkTnHxm8s4NSWHpKYOsN8LW23ooEmU0moRU0KJx7/
Zeuw36fI6RvEIFbTmX6a59GRBPpaMh9bHBAGxDA4X9x5AXTrsqS1Q=="
(Routing)(config-pubkey-key)#exit
(Routing)(config)#
When the DH parameters are successfully generated, an informational message is logged to let the user know that the
parameters have been generated and the configured DH parameter is applied.
Default For FIPS mode, the default DH parameter is 2048 bit. For non-FIPS mode, the default DH parameter is 1024 bit.
Format crypto dhparam size [102|2048]
Mode Global Config
Parameter Description
number Specifies the certificate number. Range: 1 to 2 digits.
Example: The following shows example display output for the CLI command.
(Routing)#show crypto certificate mycertificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Issued by: 10.130.86.200
Valid from Jan 1 03:43:37 1970 GMT to Jan 1 03:43:37 1971 GMT
Subject: /CN=10.130.86.200
Fingerprint: 970A9E32A301507C28D1E36805109C77
(Routing)#
Example: The following shows example display output for the CLI command.
(Routing)#show crypto key mypubkey
(Routing)#
Example: The following shows example display output for the CLI command.
(Routing)#show crypto key pubkey-chain ssh
Username Fingerprint
-------------- ---------------------------------------------------------------
test MD5:19:8c:81:e3:cd:5c:2a:8a:91:cb:5e:35:a4:43:93:91
(Routing)#
Example: The following shows example display output for the CLI command.
show crypto dhparam
DH param size ................ 1024
DH Parameter generation status ........ In progress
NOTE: The user exec accounting list should be created using the aaa accounting command.
Parameter Description
http/https The line method for which the list needs to be applied.
default The default list of methods for authorization services.
listname An alphanumeric character string used to name the list of accounting methods.
Default local
Format ip http authentication method1 [method2...]
Mode Global Config
Parameter Description
ldap Uses the list of all LDAP servers for authentication.
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
Parameter Description
tacacs Uses the list of all TACACS+ servers for authentication.
Default local
Format ip https authentication method1 [method2...]
Mode Global Config
Parameter Description
ldap Uses the list of all LDAP servers for authentication.
local Uses the local username database for authentication.
none Uses no authentication.
radius Uses the list of all RADIUS servers for authentication.
tacacs Uses the list of all TACACS+ servers for authentication.
Default 80
Format ip http port 1025-65535
Mode Privileged EXEC
Default 443
Format ip http secure-port portid
Mode Privileged EXEC
Default disabled
Format ip http secure-server
Mode Privileged EXEC
Default 24
Format ip http secure-session hard-timeout 1-168
Mode Privileged EXEC
Default 16
Format ip http secure-session maxsessions 0-16
Mode Privileged EXEC
Default 5
Format ip http secure-session soft-timeout 1-60
Mode Privileged EXEC
Default enabled
Format ip http server
Mode Privileged EXEC
Default 24
Format ip http session hard-timeout 1-168
Mode Privileged EXEC
Default 16
Format ip http session maxsessions 0-16
Mode Privileged EXEC
Default 5
Format ip http session soft-timeout 1-60
Mode Privileged EXEC
Parameter Description
HTTP Mode (Unsecure) The unsecure HTTP server administrative mode.
Java Mode The Java applet administrative mode which applies to both secure and unsecure web
connections.
HTTP Port The configured TCP port on which the HTTP server listens for requests. (The default is 80.)
RESTful API HTTP Port The HTTPS TCP port number on which the OpEN RESTful API server listens for RESTful
requests.
Parameter Description
RESTful API HTTPS Port The HTTPS TCP port number on which the OpEN RESTful API server listens for secure
RESTful requests.
Maximum Allowable HTTP Sessions The number of allowable unsecure HTTP sessions.
HTTP Session Hard Timeout The hard timeout for unsecure HTTP sessions in hours.
HTTP Session Soft Timeout The soft timeout for unsecure HTTP sessions in minutes.
HTTP Mode (Secure) The secure HTTP server administrative mode.
HTTP Operational Mode (Secure) Displays the operational status of HTTPS.
Secure Port The secure HTTP server port number.
Secure Protocol Levels The protocol level may have the values of TLS1.0, TLS1.1, TLS1.2, and TLS1.3.
Maximum Allowable HTTPS Sessions The number of allowable secure HTTP sessions.
HTTPS Session Hard Timeout The hard timeout for secure HTTP sessions in hours.
HTTPS Session Soft Timeout The soft timeout for secure HTTP sessions in minutes.
Certificate Present Indicates whether the secure-server certificate files are present on the device.
User Selected Certificate Displays the user-configured certificate for secure HTTP.
Active Certificate Displays the active certificate configured for secure HTTP.
Expired Certificate Displays the expired certificates if NTP time is synced.
Certificate Generation Status Indicates whether certificate generation is currently in progress.
DH Key Exchange Displays whether the DH Key Exchange is enabled or disabled.
Server Ciphersuite Displays the Ciphersuites to be used over HTTPS connection.
rsa-aes-cbc-sha2
rsa-aes-gcm-sha2
3.8.1 disconnect
Use the disconnect command to close Telnet or SSH sessions. Use all to close all active sessions, or use session-id to
specify the session ID to close. To view the possible values for session-id, use the show loginsession command.
3.8.2 efos-show
Use this command to open a connection and execute the given show command. To start the application, EFOS should be
running. If EFOS is not running, the command retries for 60 seconds for EFOS to be ready to accept the icos/efos-show
connection. After 60 seconds, an error message is displayed.
The icos/efos-show command can execute all the show commands in Privileged EXEC and User EXEC mode. The output
of the show command is displayed and the application terminates. If the command does not start with a show, show is added
automatically before the command internally. The user can terminate the application by pressing ^c at any point of time. The
icos/efos-show command cannot handle auto-fill or tab (to auto-fill) like CLI. User is advised to enter complete command.
However, partial unambiguous commands are executed like complete commands and the result is displayed normally.
Partial ambiguous commands are terminated with error message. The user can use “?” to know the existing show command
options.
3.8.3 linuxsh
Use the linuxsh command to access the Linux shell. Use the exit command to exit the Linux shell and return to the EFOS
CLI. The shell session will timeout after five minutes of inactivity. The inactivity timeout value can be changed using the
command session-timeout in Line Console mode.
Default ip-port:2324
Format linuxsh [ip-port]
Mode Privileged EXEC
Parameter Description
ip-port The IP port number on which the telnet daemon listens for connections. ip-port is an integer from 1 to 65535. The
default value is 2324.
Parameter Description
ID Login session ID.
User Name The name the user entered to log on to the system.
Connection From IP address of the remote client machine or EIA-232 for the serial port connection.
Idle Time Time this session has been idle.
Session Time Total time this session has been connected.
Session Type Shows the type of session, which can be telnet, serial, or SSH.
NOTE: You cannot delete the admin user. There is only one user allowed with read/write privileges. You can configure up
to five read-only users on the system.
The additional methods of authentication are used only if the previous method returns an error, not if there is an
authentication failure. To ensure that the authentication succeeds even if all methods return an error, specify none as the
final method in the command line. For example, if none is specified as an authentication method after radius, no
authentication is used if the RADIUS server is down.
Default defaultList. Used by the console and only contains the method none.
networkList. Used by telnet and SSH and only contains the method local.
Format aaa authentication login {default | list-name} method1 [method2...]
Mode Global Config
Parameter Description
default Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in.
list-name Character string of up to 15 characters used to name the list of authentication methods activated when a user
logs in.
method1... At least one from the following:
[method2...] enable. Uses the enable password for authentication.
ldap. Uses the list of all LDAP servers for authentication.
line. Uses the line password for authentication.
local. Uses the local user name database for authentication.
none. Uses no authentication.
radius. Uses the list of all RADIUS servers for authentication.
tacacs. Uses the list of all TACACS servers for authentication.
A separate default enable list, enableNetList, is used for Telnet and SSH users instead of enableList. This list is applied
by default for Telnet and SSH, and contains enable followed by deny methods. In EFOS, by default, the enable password
is not configured. That means that, by default, Telnet and SSH users will not get access to Privileged EXEC mode. On the
other hand, with default conditions, a console user always enter the Privileged EXEC mode without entering the enable
password.
The default and optional list names created with the aaa authentication enable command are used with the enable
authentication command. Create a list by entering the aaa authentication enable list-name method command
where list-name is any character string used to name this list. The method argument identifies the list of methods that the
authentication algorithm tries in the given sequence.
The user manager returns ERROR (not PASS or FAIL) for enable and line methods if no password is configured, and moves
to the next configured method in the authentication list. The method none reflects that there is no authentication needed.
The user will only be prompted for an enable password if one is required. The following authentication methods do not
require passwords:
1. none
2. deny
3. enable (if no enable password is configured)
4. line (if no line password is configured)
Example: See the following examples:
a. aaa authentication enable default enable none
b. aaa authentication enable default line none
c. aaa authentication enable default enable radius none
d. aaa authentication enable default line tacacs none
Examples a and b do not prompt for a password, however because examples c and d contain the radius and tacacs
methods, the password prompt is displayed.
If the login methods include only enable, and there is no enable password configured, then EFOS does not prompt for a user
name. In such cases, EFOS only prompts for a password. EFOS supports configuring methods after the local method in
authentication and authorization lists. If the user is not present in the local database, then the next configured method is tried.
The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that
the authentication succeeds even if all methods return an error, specify none as the final method in the command line.
NOTE: Requests sent by the switch to a RADIUS server include the user name $enabx$, where x is the requested privilege
level. For enable to be authenticated on Radius servers, add $enabx$ users to them. The login user ID is now sent
to TACACS+ servers for enable authentication.
Default default
Format aaa authentication enable {default | list-name} method1 [method2...]
Mode Global Config
Parameter Description
default Uses the listed authentication methods that follow this argument as the default list of methods, when using higher
privilege levels.
list-name Character string used to name the list of authentication methods activated, when using access higher privilege
levels. Range: 1 to 15 characters.
method1 Specify at least one from the following:
[method2...] deny. Used to deny access.
enable. Uses the enable password for authentication.
ldap. Uses the list of all LDAP servers for authentication.
line. Uses the line password for authentication.
none. Uses no authentication.
radius. Uses the list of all RADIUS servers for authentication.
tacacs. Uses the list of all TACACS+ servers for authentication.
Example: The following example sets authentication when accessing higher privilege levels.
(switch)(config)# aaa authentication enable default enable
NOTE: Local method is not supported for command authorization. Command authorization with RADIUS will work if, and
only if, the applied authentication method is also radius.
3. Commands entered by the user will go through command authorization using TACACS+ or RADIUS server and will be
accepted or denied.
Parameter Description
default The default list of methods for authorization services.
list-name Alphanumeric character string used to name the list of authorization methods.
method TACACS+,RADIUS and none are supported.
Parameter Description
commands This causes command authorization for each command execution attempt.
(Switching) (Config-line)#
(Switching) (Config-line)#exit
(Switching) (Config)#
Parameter Description
default Uses the default list created with the aaa authentication enable command.
list-name Uses the indicated list created with the aaa authentication enable command.
Example: The following example specifies the default authentication method when accessing a higher privilege level
console.
(Routing) (Config)# line console
(Routing) (config-line)# enable authentication default
Use the aaa ias-user username command in Global Config mode to add the specified user to the internal user database.
This command also changes the mode to AAA User Config mode.
Format aaa ias-user username user
Mode Global Config
Default common
Format aaa session-id [common | unique]
Mode Global Config
Parameter Description
common Use the same session-id for all AAA Service types.
unique Use a unique session-id for all AAA Service types.
NOTE:
A maximum of five Accounting Method lists can be created for each exec and commands type.
Only the default Accounting Method list can be created for DOT1X. There is no provision to create more.
The same list-name can be used for both exec and commands accounting type
AAA Accounting for commands with RADIUS as the accounting method is not supported.
Start-stop or None are the only supported record types for DOT1X accounting. Start-stop enables accounting
and None disables accounting.
RADIUS is the only accounting method type supported for DOT1X accounting.
Format aaa accounting {exec | commands | dot1x} {default | list_name} {start-stop | stop-only
|none} method1 [method2…]
Mode Global Config
Parameter Description
exec Provides accounting for a user EXEC terminal sessions.
commands Provides accounting for all user executed commands.
dot1x Provides accounting for DOT1X user commands.
default The default list of methods for accounting services.
list-name Character string used to name the list of accounting methods.
start-stop Sends a start accounting notice at the beginning of a process and a stop accounting notice at the beginning of a
process and a stop accounting notice at the end of a process.
stop-only Sends a stop accounting notice at the end of the requested user process.
none Disables accounting services on this line.
method Use either TACACS or the radius server for accounting purposes.
For the same set of accounting type and list name, the administrator can change the record type, or the methods list, without
having to first delete the previous configuration.
(Routing) #
(Routing) #configure
(Routing) #aaa accounting exec ExecList stop-only tacacs
(Routing) #aaa accounting exec ExecList start-stop tacacs
(Routing) #aaa accounting exec ExecList start-stop tacacs radius
The first aaa command creates a method list for exec sessions with the name ExecList, with record-type as
stop-only and the method as TACACS+. The second command changes the record type to start-stop from
stop-only for the same method list. The third command, for the same list changes the methods list to
{tacacs,radius} from {tacacs}.
Parameter Description
newinfo Indicates that updates should be sent to the RADIUS server whenever there is a new information available, such
as “reauthentication of the client.”
periodic The interval at which interim accounting records are sent, in minutes
Parameter Description
password Password for this level. Range: 8 to 64 characters
encrypted Encrypted password to be entered, copied from another switch configuration.
(Routing) #
(Routing) #configure
(Routing) (Config)#aaa ias-user username client-1
(Routing) (Config-aaa-ias-User)#password client123
(Routing) (Config-aaa-ias-User)#no password
Example: The following is an example of adding a MAB Client to the Internal user database.
(Routing) #
(Routing) #configure
(Routing) (Config)#aaa ias-user username 1f3ccb1157
(Routing) (Config-aaa-ias-User)#password 1f3ccb1157
(Routing) (Config-aaa-ias-User)#exit
(Routing) (Config)#
Parameter Description
password Password for this level. Range: 8 to 64 characters
encrypted Encrypted password to be entered, copied from another switch configuration.
UserName
-------------------
Client-1
Client-2
Example: Following are the IAS configuration commands shown in the output of the show running-config command.
Passwords shown in the command output are always encrypted.
aaa ias-user username client-1
password a45c74fdf50a558a2b5cf05573cd633bac2c6c598d54497ad4c46104918f2c encrypted
exit
3.9.13 accounting
Use this command in Line Configuration mode to apply the accounting method list to a line config (console/telnet/ssh).
Parameter Description
exec Causes accounting for an EXEC session.
commands This causes accounting for each command execution attempt. If a user is enabling accounting for exec mode for
the current line-configuration type, the user will be logged out.
default The default Accounting List
listname Enter a string of not more than 15 characters.
3.9.13.0.1 no accounting
Use this command to remove accounting from a Line Configuration mode.
Example: The following shows example CLI display output for the command.
(Routing) #show accounting
Number of Accounting Notifications sent at beginning of an EXEC session: 0
Errors when sending Accounting Notifications beginning of an EXEC session: 0
Number of Accounting Notifications at end of an EXEC session: 0
Errors when sending Accounting Notifications at end of an EXEC session: 0
Number of Accounting Notifications sent at beginning of a command execution: 0
Errors when sending Accounting Notifications at beginning of a command execution: 0
Number of Accounting Notifications sent at end of a command execution: 0
Errors when sending Accounting Notifications at end of a command execution: 0
Example: The following shows example CLI display output for the command.
(Routing) #show accounting methods
Example: The following shows example CLI display output for the command.
(Routing) #
(Routing) #show accounting update
Example: The following shows example CLI display output for the command.
(Routing) #show authorization methods
Parameter Description
default Uses the default list created with the aaa authentication login command.
list-name Uses the indicated list created with the aaa authentication login command.
Example: The following example specifies the default authentication method for a console.
(Routing) (config)# line console
(Routing) (config-line)# login authentication default
The command username username password does not accept plain text format. Specify the password in encrypted
format. As of EFOS release 3.8, script files or config files that have username commands with a plain text password in the
command line will fail. Specify the password in encrypted format.
The command username <name> password <password> level <level> encrypted [override-
complexity-check] is deprecated in EFOS release 3.9. This command displays the password in running-configuration
in encrypted mode for the default encryption type. If enable password is configured, username <name> password
<password> encryption-type <encryption-type> level <level> encrypted [override-complexity-
check]is displayed in the running-configuration for both default and non-default encryption types.
Parameter Description
name The name of the user. Range: 1 to 64 characters.
password The authentication password for the user. Range 8 to 64 characters. This value can be zero if the
no passwords min-length command has been executed. The special characters allowed in
the password include! # $ % & ' ( ) * + , - / ; < = > @ [ \ ] ^ _ ` { | } ~.
level The user level. Level 0 can be assigned by a level 15 user to another user to suspend that user’s
access. Range 0 to 15. Enter access level 1 for Read Access [non-privileged (switch> prompt)] or
level 15 for Read/Write Access [highest privilege (switch# prompt)]. If not specified where it is
optional, the privilege level is 1.
If Privilege level = 1 (Read-Only), users will not be able to enter Privilege Exec mode.
Example: Command username username password does not accept plain text format.
(Switching)(Config)#username admin password ?
3.10.1.0.1 no username
Use this command to remove a user name.
Parameter Description
name The name of the user. Range: 1 to 32 characters.
password The authentication password for the user. Range 8 to 64 characters.
level The user level. Level 0 can be assigned by a level 15 user to another user to suspend that user’s access. Range
0 to 15.
Parameter Description
User Name The name the user enters to login using the serial port or Telnet.
User Access Mode Shows whether the user is able to change parameters on the switch (Level 15) or is only able to view
them (Level 1). As a factory default, the “admin” user has Level 15 access and the “guest” has Level 1
access.
Parameter Description
User Name The local user account’s user name.
Access Level The user’s access level (1 for non-privilege (switch> prompt) or 15 for highest privilege (switch# prompt)).
Password Aging Number of days, since the password was configured, until the password expires.
Password Expiry Date The current password expiration date in date format.
Lockout Indicates whether the user account is locked out (true or false).
Parameter Description
Password Override Displays the user's Password override complexity check status. By default it is disabled.
Complexity Check
Password Strength Displays the user password's strength (Strong or Weak). This field is displayed only if the Password Strength
feature is enabled.
Encryption Type Displays the encryption type used to store the user password.
Example: The following example displays information about the local user database.
(Routing) #show users accounts
UserName....................................... admin
Privilege...................................... 15
Parameter Description
name Name of the user. Range: 1 to 20 characters.
3.10.8 password
This command allows the currently logged in user to change his or her password without having Level 15 privileges.
Format password cr
Mode User EXEC
The password command does not accept plain text format. Specify the password in encrypted format.
The command password <password> encrypted is deprecated in EFOS release 8.9. This command displays the
password in running-configuration in encrypted mode for the default encryption type. If enable password is configured,
password <password> encryption-type <encryption-type> encrypted is displayed in the running-
configuration for both default and non-default encryption types.
Parameter Description
password Specify the password for this level in encrypted format. Range: 8 to 64 characters.
encryption-type Specify the encryption algorithm type as MD5, AES, SHA256, or SHA512. The default value of encryption-
type is AES.
encrypted The password entered or copied from another switch configuration, and is already encrypted. If specified in
encrypted format, the <password> parameter must meet the following requirements:
128 hexadecimal characters for AES.
34 characters for MD5 salt hash.
63 characters for SHA256 salt hash.
106 characters for SHA512 salt hash.
encryption-type Specify the encryption algorithm type as MD5 or AES. The default value of encryption-type is AES.
Example: The following example configures the plain text password with AES encryption-type.
(Switching)(Config-line)#password encryption-type aes
Example: The following example configures the plain text password with SHA256 encryption-type:
(Switching)(Config-line)#password encryption-type sha256
Enter new password:********
Confirm new password:********
Example: The following example configures the plain text password with SHA512 encryption-type:
(Switching)(Config-line)#password encryption-type sha512
Enter new password:********
Confirm new password:********
Example: The following example configures the encrypted password with AES encryption-type:
Example: The following example configures the encrypted password with MD5 encryption-type:
(Switching)(Config-line)#password
0a51d780be1a0240b8cc7c69fe0479dbf07644e1094b25fb43ebe2fa72f649e42ad9711bf5c33f9a7eb88efd8b9945347b26
4e0c52b3a47db05f886caae9f42b encryption-type aes encrypted
Example: The following example configures the encrypted password with SHA256 encryption-type:
(Switching)(Config-line)#password
Example: The following example configures the encrypted password with SHA512 encryption-type:
(Switching)(Config-line)#password
$6$S6hkMVlgRR6JDnYk$SPs/8l.qiI9XTLcujgcNF.K6R./licpoCBXbptRMSG3KFzKoxUaaOBmdHPpqlQPej/sOgeak/
89zWOa0YPhZj1 encryption-type sha512 encrypted
Format no password
Mode Line Config
Format password
Mode User EXEC
Example: The following example shows the prompt sequence for executing the password command.
(Routing) >password
Enter old password:********
Enter new password:********
Confirm new password:********
The command enable password does not accept plain text format. Specify the password in encrypted format.
The command enable password <password> encrypted is deprecated in EFOS release 8.9. This command displays
the password in running-configuration in encrypted mode for the default encryption type. If enable password is
configured, enable password <password> encryption-type <encryption-type> encrypted is displayed in
the running-configuration for both default and non-default encryption types.
Parameter Description
password Specify the password for this level in encrypted format. Range: 8 to 64 characters.
encryption-type Specify the encryption algorithm type as MD5, AES, SHA256, or SHA512. The default value of encryption-
type is AES.
Parameter Description
encrypted The password entered or copied from another switch configuration was encrypted. If specified in encrypted
format, the <password> parameter must meet the following requirements:
128 hexadecimal characters for AES.
34 characters for MD5 salt hash.
63 characters for SHA256 salt hash.
106 characters for SHA512 salt hash.
Example: The following shows an example of the command to configure the plain text password with AES encryption-
type.
(Switching)#enable password encryption-type aes
Example: The following shows an example of the command to configure the plain text password with SHA512
encryption-type:
(Switching)#enable password encryption-type sha512
Example: The following shows an example of the command to configure the encrypted password with AES encryption-
type:
(Switching)#enable password
0a51d780be1a0240b8cc7c69fe0479dbf07644e1094b25fb43ebe2fa72f649e42ad9711bf5c33f9a7eb88efd8b9945347b26
4e0c52b3a47db05f886caae9f42b encrypted
Example: The following shows an example of the command to configure the encrypted password with MD5 encryption-
type:
Example: The following shows an example of the command to configure the encrypted password with SHA256
encryption-type:
(Switching)#enable password
$5$JYTa2l2z1PHc6kez$0b7ldnNSz5tZ3kYY8LRBLpcW3bhkOGuUeJKP6yAcYQ. encryption-type sha256 encrypted
Example: The following shows an example of the command to configure the encrypted password with SHA512
encryption-type:
(Switching)#enable password
$6$NhDherQkCG1zEc0B$Tt3zA044btrRo2B0HsjhWQJkD34Dyp0mvEmSf0n2K6XKXp0grJLWpcijRA7wXtBFUPvLaHCvThiu7AYw
aeBqV1 encryption-type sha512 encrypted
Default 8
Format passwords min-length 0-64
Mode Global Config
NOTE: Password history is not effective if the password encryption type is MD5, SHA256, or SHA512.
Default 0
Format passwords history 0-10
Default 0
Format passwords lock-out 1-5
Mode Global Config
NOTE: Password strength check is not applicable for passwords configured in encrypted format.
Default disable
Format passwords strength-check
Mode Global Config
Default 0
Format passwords strength maximum consecutive-characters 0-15
Mode Global Config
Default 0
Format passwords strength maximum repeated-characters 0-15
Mode Global Config
Default 5 minutes
Format passwords unlock timer <1-60>
Mode Global Config
Example: The following is an example command to configure the password unlock time.
(Switching)(Config)#passwords unlock timer 2
Default disable
Format passwords unlock timer mode {enable|disable}
Mode Global Config
NOTE: To specify a blank password in the configuration script, you must specify it as a space within quotes, for example,
“ “. For more information about creating configuration scripts, see Section 3.14, Configuration Scripting
Commands.
Default no password
Format users passwd username
Mode Privileged EXEC
Parameter Description
Minimum Password Length Minimum number of characters required when changing passwords.
Password History Number of passwords to store for reuse prevention.
Password Aging Length in days that a password is valid.
Lockout Attempts Number of failed password login attempts before lockout.
Minimum Password Uppercase Minimum number of uppercase characters required when configuring passwords.
Letters
Minimum Password Lowercase Minimum number of lowercase characters required when configuring passwords.
Letters
Minimum Password Numeric Minimum number of numeric characters required when configuring passwords.
Characters
Maximum Password Consecutive Maximum number of consecutive characters required that the password should contain when
Characters configuring passwords.
Maximum Password Repeated Maximum number of repetition of characters that the password should contain when configuring
Characters passwords.
Minimum Password Character Minimum number of character classes (uppercase, lowercase, numeric and special) required when
Classes configuring passwords.
Password Exclude-Keywords The set of keywords to be excluded from the configured password when strength checking is enabled.
Unlock Timer Mode Use the unlock timer mode to keep the user account locked or unlocked after unlock time. The mode
is either enable or disable. The default is disable.
Unlock Time (mins) The time after which a locked user account can be unlocked. The user can configure the unlock time
from 1 to 60 minutes. By default, the unlock time is 5 minutes.
Example: The following shows example CLI display output for the command.
(Routing) #show passwords configuration
Passwords Configuration
-----------------------
Minimum Password Length........................ 8
Password History............................... 0
Password Aging (days).......................... 0
Lockout Attempts............................... 0
Password Strength Check........................ Enable
Minimum Password Uppercase Letters............. 4
Minimum Password Lowercase Letters............. 4
Minimum Password Numeric Characters............ 3
Minimum Password Special Characters............ 3
Maximum Password Consecutive Characters........ 3
Maximum Password Repeated Characters........... 3
Minimum Password Character Classes............. 4
Password Exclude Keywords...................... brcm, brcm1,brcm2
Unlock Timer Mode.............................. Enable
Unlock Time (mins)............................. 5
Parameter Description
Last User Whose Password Is Set Shows the name of the user with the most recently set password.
Password Strength Check Shows whether password strength checking is enabled.
Last Password Set Result Shows whether the attempt to set a password was successful. If the attempt failed, the reason for the
failure is included.
Example: The following shows example CLI display output for the command.
# show passwords result
Last User whose password is set .................. brcm
Password strength check ........................... Enable
Last Password Set Result:
Reason for failure: Could not set user password! Password should contain at least 4 uppercase
letters.
3.11.1 snmp-server
This command sets the name and the physical location of the switch, and the organization responsible for the network. The
parameters name, loc, and con can be up to 255 characters in length.
Default none
Format snmp-server {sysname name | location loc | contact con}
Mode Global Config
NOTE: To clear the snmp-server, enter an empty string in quotes. For example, snmp-server {sysname “ “} clears
the system name.
NOTE:
No SNMP communities exist by default. Prior to EFOS 8.2, two SNMPv2 communities (public and private) were
created by default.
Community names in the SNMP Community Table must be unique. When making multiple entries using the
same community name, the first entry is kept and processed and all duplicate entries are ignored.
Default none
Format snmp-server community community-string [{ro | rw |su }] [ipaddress ip-address [ipmask
ip-mask]] [view view-name]
Mode Global Config
Parameter Description
community-string A name associated with the switch and with a set of SNMP managers that manage it with a specified
privileged level. The length of community-string can be up to 20 case-sensitive characters.
ro | rw | su The access mode of the SNMP community, which can be read-only (ro), read-write (rw), or super user
(su).
ip-address The associated community SNMP packet sending address. It is used along with an optional IP mask
value to denote an individual client or range of IP addresses from which SNMP clients may access the
device using the specified community-string. If unspecified, access from any host is permitted.
ip-mask The optional IP mask. This value is AND'ed with the IP address to determine the range of permitted client
IP addresses.
view-name The name of the view to create or update.
Parameter Description
community-string The community which is created and then associated with the group. The range is 1 to 20 characters.
group-name The name of the group that the community is associated with. The range is 1 to 30 characters.
ipaddress Optionally, the IPv4 address that the community may be accessed from.
NOTE: For other port security commands, see Section 5.27, IGMP Snooping Configuration Commands.
Default disabled
Format snmp-server enable traps violation
Mode Global Config
Interface Config
Default enabled
Format snmp-server enable traps bgp state-changes limited
Mode Global Config
Parameter Description
state-changes limited Enabled standard traps defined in RFC 4273.
This command enables Link Up/Down traps for the entire switch. When enabled, link traps are sent only if the Link Trap flag
setting associated with the port is enabled.
Default enabled
Format snmp-server enable traps linkmode
Mode Global Config
Default enabled
Format snmp-server enable traps multiusers
Mode Global Config
Default enabled
Format snmp-server enable traps stpmode
Mode Global Config
Default The engineID is configured automatically, based on the device MAC address.
Format snmp-server engineID local {engine-id|default}
Mode Global Config
Parameter Description
engine-id A hexadecimal string identifying the engine-id. Engine-id must be an even length in the range of 6 to 32
hexadecimal characters.
default Sets the engine-id to the default string, based on the device MAC address.
CAUTION! Changing the engineID will invalidate all SNMP configurations that exist on the box.
Default The engineID is configured automatically, based on the device MAC address.
Format no snmp-server engineID local
Mode Global Config
Parameter Description
filtername The label for the filter being created. The range is 1 to 30 characters.
oid-tree The OID subtree to include or exclude from the filter. Subtrees may be specified by numerical (1.3.6.2.4) or
keywords (system), and asterisks may be used to specify a subtree family (1.3.*.4).
included The tree is included in the filter.
excluded The tree is excluded from the filter.
Default Generic groups are created for all versions and privileges using the default views.
Format snmp-server group group-name {v1 | v2c | v3 {noauth | auth | priv}} [context
context-name] [read read-view] [write write-view] [notify notify-view]
Mode Global Config
Parameter Description
group-name The group name to be used when configuring communities or users. The range is 1 to 30 characters.
v1 This group can only access using SNMPv1.
v2 This group can only access using SNMPv2c.
v3 This group can only access using SNMPv3.
noauth This group can be accessed only when not using Authentication or Encryption. Applicable only if SNMPv3 is
selected.
auth This group can be accessed only when using Authentication but not Encryption. Applicable only if SNMPv3 is
selected.
priv This group can be accessed only when using both Authentication and Encryption. Applicable only if SNMPv3 is
selected.
context-name The SNMPv3 context used during access. Applicable only if SNMPv3 is selected.
Parameter Description
read-view The view this group will use during GET requests. The range is 1 to 30 characters.
write-view The view this group will use during SET requests. The range is 1 to 30 characters.
notify-view The view this group will use when sending out traps. The range is 1 to 30 characters.
Parameter Description
host-addr The IPv4 or IPv6 address of the host to send the trap or inform to.
community-string Community string sent as part of the notification. The range is 1 to 20 characters.
traps Send SNMP traps to the host. This option is selected by default.
version 1 Sends SNMPv1 traps. This option is not available if informs is selected.
version 2c Sends SNMPv2c traps. This option is not available if informs is selected. This option is selected by default.
informs Send SNMPv2 informs to the host.
seconds The number of seconds to wait for an acknowledgement before resending the Inform. The default is 15 seconds.
The range is 1 to 300 seconds.
retries The number of times to resend an Inform. The default is 3 attempts. The range is 0 to 255 retries.
port The SNMP Trap receiver port. The default is port 162.
filter-name The filter name to associate with this host. Filters can be used to specify which traps are sent to this host. The
range is 1 to 30 characters.
Default 161
Format snmp-server port 1025-65535
Mode Privileged EXEC
Default 50505
Format snmp-server trapsend portid
Mode Global Config
NOTE: MD5 and DES options are not available when the FIPS component is enabled.
Parameter Description
username The user name the SNMPv3 user will connect to the switch as. The range is 1 to 30 characters.
group-name The name of the group the user belongs to. The range is 1 to 30 characters.
engineid-string The engine-id of the remote management station that this user will be connecting from. The range is 5 to 32
characters.
password The password the user will use for the authentication or encryption mechanism. The range is 1 to 32 characters.
md5-key a A pregenerated MD5 authentication key. The length is 32 characters.
Parameter Description
sha-key A pregenerated SHA authentication key. The length is 48 characters.
des-keya A pregenerated DES encryption key. The length is 32 characters if MD5 is selected, 48 characters if SHA is
selected.
priv-aes128-key HMAC-MD5-96 authentication pre-generated key.
priv-aes128 Advanced encryption standard 128 password.
noauth noauth is for SNMP users without authentication and encryption.
a. MD5 and DES options are not available when FIPS component is enabled.
Default Views are created by default to provide access to the default groups.
Format snmp-server viewname oid-tree {included|excluded}
Mode Global Config
Parameter Description
viewname The label for the view being created. The range is 1 to 30 characters.
oid-tree The OID subtree to include or exclude from the view. Subtrees may be specified by numerical (1.3.6.2.4) or
keywords (system), and asterisks may be used to specify a subtree family (1.3.*.4).
included The tree is included in the view.
excluded The tree is excluded from the view.
Default By default, all SNMP traps are sent to host reachable through the default VRF.
Format snmp-server vrf vrf-name
Mode Global Config
Parameter Description
vrf-name The VPN routing and forwarding (VRF) name.
Example: The following example sets the management VRF for SNMP traps to VRF VrfRed.
(Routing)#configure
(Routing)(Config)#snmp-server vrf VrfRed
(Routing)(Config)#
Example: The following example disassociates the management VRF for SNMP traps from VRF VrfRed.
(Routing)#configure
(Routing)(Config)#no snmp-server vrf
(Routing)(Config)#
Parameter Description
host-addr The IPv4 or IPv6 address of the host to which to send the trap or inform.
user-name User used to send a Trap or Inform message. This user must be associated with a group that supports the version
and access method. The range is 1 to 30 characters.
traps Send SNMP traps to the host. This is the default option.
informs Send SNMP informs to the host.
seconds Number of seconds to wait for an acknowledgement before resending the Inform. The default is 15 seconds. The
range is 1 to 300 seconds.
retries Number of times to resend an Inform. The default is 3 attempts. The range is 0 to 255 retries.
auth Enables authentication but not encryption.
noauth No authentication or encryption. This is the default.
Parameter Description
priv Enables authentication and encryption.
port The SNMP Trap receiver port. This value defaults to port 162.
filter-name The filter name to associate with this host. Filters can be used to specify which traps are sent to this host. The
range is 1 to 30 characters.
NOTE: This command is valid only when the Link Up/Down Flag is enabled.
NOTE: This command is valid only when the Link Up/Down Flag is enabled.
NOTE: This command is valid only when the Link Up/Down Flag is enabled.
NOTE: This command is valid only when the Link Up/Down Flag is enabled.
Parameter Description
slot/port Specifies the port to use as the source interface.
loopback-id Specifies the loopback interface to use as the source interface. The range of the loopback ID is 0 to 7.
tunnel-id Specifies the tunnel interface to use as the source interface. The range of the tunnel ID is 0 to 7.
vlan-id Specifies the VLAN to use as the source interface.
Parameter Description
Community Table: Community-String The community string for the entry. This is used by SNMPv1 and SNMPv2 protocols to access
the switch.
Community- The type of access the community has:
Access Read only
Read write
su
Parameter Description
Host Table: Target Address The address of the host that traps will be sent to.
Type The type of message that will be sent, either traps or informs.
Community The community traps will be sent to.
Version The version of SNMP the trap will be sent as.
UDP Port The UDP port the trap or inform will be sent to.
Filter name The filter the traps will be limited by for this host.
TO Sec The number of seconds before informs will time out when sending to this host.
Retries The number of times informs will be sent after timing out.
Example: The following example shows the SNMP status information of all hosts configured. Assume four trap-receiver
hosts are configured and the management VRF for SNMP-traps is configured as VRF red.
(Routing)#
(Routing)#show snmp
Version 3 notifications
Target Address Type Username
Security UDP Filter TO Retries VRF
Level Port name Sec
---------------- ------- ------------------ -------- ------ -------- --- ------- --------
System Contact:
System Location:
Parameter Description
Local SNMP EngineID The current configuration of the displayed SNMP engineID.
Parameter Description
Name The filter name for this entry.
OID Tree The OID tree this entry will include or exclude.
Type Indicates if this entry includes or excludes the OID Tree.
Parameter Description
Name The name of the group.
Security Model Indicates which protocol can access the system using this group.
Security Level Indicates the security level allowed for this group.
Read View The view to which this group provides read access.
Write View The view to which this group provides write access.
Notify View The view to which this group provides trap access.
Example: The following shows example CLI display output for the command.
(Routing)#show snmp-server
Parameter Description
Name The name of the user.
Group Name The group that defines the SNMPv3 access parameters.
Auth Method The authentication algorithm configured for this user.
Privilege Method The encryption algorithm configured for this user.
Remote Engine ID The engineID for the user defined on the client machine.
Parameter Description
Name The view name for this entry.
OID Tree The OID tree that this entry will include or exclude.
Type Indicates if this entry includes or excludes the OID tree.
Parameter Description
Authentication Flag Can be enabled or disabled. The factory default is enabled. Indicates whether authentication failure traps will be
sent.
Link Up/Down Flag Can be enabled or disabled. The factory default is enabled. Indicates whether link status traps will be sent.
Multiple Users Flag Can be enabled or disabled. The factory default is enabled. Indicates whether a trap will be sent when the same
user ID is logged into the switch more than once at the same time (either through Telnet or the serial port).
Spanning Tree Flag Can be enabled or disabled. The factory default is enabled. Indicates whether spanning tree traps are sent.
ACL Traps May be enabled or disabled. The factory default is disabled. Indicates whether ACL traps are sent.
Parameter Description
BGP4 Traps Can be enabled or disabled. The factory default is disabled. Indicates whether BGP4 traps are sent. (This field
appears only on systems with the BGPv4 software package installed.)
OSPFv2 Traps Can be enabled or disabled. The factory default is disabled. Indicates whether OSPF traps are sent. If any of the
OSPF trap flags are not enabled, then the command displays disabled. Otherwise, the command shows all the
enabled OSPF traps’ information.
Example: The following shows example CLI display output for the command.
(Config)# show snmp source-interface
Default none
Format aaa server radius dynamic-author
Mode Global Config
Example:
(Routing) #configure
(Routing) (Config)#aaa server radius dynamic-author
(Routing) (Config- radius-da)#
Default none
Format no aaa server radius dynamic-author
Mode Global Config
Example:
(Routing) #configure
(Routing) (Config)#no aaa server radius dynamic-author
Example:
(Routing) #configure
(Routing) (Config)#authentication command bounce-port ignore
Example:
(Routing) #configure
(Routing) (Config)#no authentication command bounce-port ignore
Example:
(Routing) #configure
(Routing) (Config)#authentication command disable-port ignore
Example:
(Routing) #configure
(Routing) (Config)#no authentication command disable-port ignore
3.12.4 auth-type
Use this command to specify the type of authorization that the device uses for RADIUS clients. The client must match the
configured attributes for authorization.
Default all
Format auth-type { any | all | session-key }
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#auth-type all
3.12.4.0.1 no auth-type
Use this command to reset the specified authorization type that the device must use for RADIUS clients.
Default none
Format no auth-type
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#no auth-type
Default disable
Format authorization network radius
Mode Global Config
Default none
Format clear radius dynamic-author statistics
Mode Privileged EXEC
Example:
(Routing) #clear radius dynamic-author statistics
Statistics cleared.
3.12.7 client
Use this command to configure the IP address, or IPv6 address, or host name of the AAA server client. Use the optional
server-key keyword and string argument to configure the server key at the client level.
Default none
Format client { ip-address |ipv6-address | hostname } [server-key [0|7] key-string]
Example:
(Routing) (Config- radius-da)#client 10.0.0.1 server-key 7 device1
3.12.7.0.1 no client
Use this command to remove the configured Dynamic Authorization client and the key associated with that client in the
device.
Default none
Format no client { ip-address |ipv6-address | hostname }
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#no client 10.0.0.1
Default none
Format debug aaa coa
Mode Dynamic Authorization
Default none
Format debug aaa pod
Mode Dynamic Authorization
Default disable
Format ignore server-key
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#ignore server-key
Default disable
Format no ignore server-key
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#no ignore server-key
Default disable
Format ignore session-key
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#ignore session-key
Default disable
Format no ignore session-key
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#no ignore session-key
Default 3799
Format port port-number
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#port 1700
3.12.12.0.1 no port
Use this command to reset the configured UDP port on which a device listens for RADIUS requests from configured RADIUS
clients.
Default 3799
Format no port
Mode Dynamic Authorization
Example:
(Routing) (Config- radius-da)#no port
Default disabled
Format radius accounting mode
Mode Global Config
31: This command configures the format in which the MAC address is sent to the RADIUS server in attribute 31
(Calling-Station-ID).
32: This command configures the format in which the MAC address is sent to the RADIUS server in attribute 32
(NAS-Identifier).
Default (Attribute 30 and 31 only) MAC address format: legacy lower case
Format radius server attribute {4 [ipaddr] | 95 [ipv6_addr] | {30 | 31 | 32} mac-format {legacy
lower-case | upper-case | ietf lower-case | upper-case | unformatted lower-case |
upper-case }}
Mode Global Config
Parameter Description
4 NAS-IP-Address attribute to be used in RADIUS requests.
ipaddr The IP address of the server.
ipv6_addr The IPv6 address of the server.
ietf Format the MAC address as xx-xx-xx-xx-xx-xx.
legacy Format the MAC address as xx:xx:xx:xx:xx:xx
unformatted Format the MAC address as aaaabbbbcccc.
Parameter Description
format The format value can be 2 to 128 characters or one or more of the following:
%m: MAC address
%i: IP address
%h: Host name
%d: Domain name.
Default 0
Format radius server deadtime minutes
Mode Global Config
Parameter Description
time Number of seconds during which a RADIUS client need not get a valid response from the RADIUS server. The
valid range is 1 to 120 seconds.
tries Number of times that a RADIUS client attempts to get a valid response before the RADIUS server is considered
as unavailable. The valid range is 1 to 100.
Example:
(Switch) (Config)# radius server dead-criteria time 40 tries 6
If you use the auth parameter, the command configures the IPv4/IPv6 address or host name to use to connect to a RADIUS
authentication server. You can configure up to 3 servers per RADIUS client. If the maximum number of configured servers
is reached, the command fails until you remove one of the servers by issuing the no form of the command. If you use the
optional port parameter, the command configures the UDP port number to use when connecting to the configured RADIUS
server. The port number range is 1 to 65535, with 1812 being the default value. If you use the optional deadtime parameter,
the command configures the deadtime to use for the configured RADIUS server. The deadtime value is 0 to 2000 (in
minutes), with 0 being the default.
NOTE: To reconfigure a RADIUS authentication server to use the default UDP port, set the port parameter to 1812.
If you use the acct token, the command configures the IPv4/IPv6 address or host name to use for the RADIUS accounting
server. You can only configure one accounting server. If an accounting server is currently configured, use the no form of the
command to remove it from the configuration. The IPv4/IPv6 address or host name you specify must match that of a
previously configured accounting server. If you use the optional port parameter, the command configures the UDP port to
use when connecting to the RADIUS accounting server. If a port is already configured for the accounting server, the new
port replaces the previously configured port. The port must be a value in the range 0 to 65535, with 1813 being the default.
If you use the optional deadtime parameter, the command configures the deadtime to use for the configured RADIUS server.
The deadtime value is 0 to 2000 (in minutes), with 0 being the default.
NOTE: To reconfigure a RADIUS accounting server to use the default UDP port, set the port parameter to 1813.
Format radius server host {auth | acct} {ipaddr | ipv6addr | dnsname} [name servername] [port
0-65535] [deadtime 0-2000][usage all|authmgr|login]
Mode Global Config
Parameter Description
ipaddr The IP address of the server.
ipv6addr The IPv6 address of the server.
dnsname The DNS name of the server.
0-65535 The port number to use to connect to the specified RADIUS server.
servername The alias name to identify the server.
deadtime The amount of time to skip a RADIUS server that is not responding to authentication requests. The valid deadtime
range is 0 to 2000 minutes
usage Indicates the usage type of the RADIUS server configured. The type can be one of the following values:
login
authmgr
all
Use the usage type to restrict the types of authentication sent to a particular RADIUS server
The login selection restricts authentication requests to switch administrator logins.
The authmgr setting restricts authentication requests to 802.1x and MAB authentications.
The default variable setting is all.
Default none
Format radius server host {auth | acct} link-local link-local-address interface {slot/port |
network | serviceport} [name servername] [port port]
Mode Global Config
Parameter Description
link-local-address The IP address of the server.
interface The interface for the RADIUS client to use for outgoing RADIUS messages.
servername The alias name to identify the server.
port The port number to use to connect to the specified RADIUS server.
(Routing) (Config) #radius server host acct link-local fe80::208:a1ff:fe7e:4519 interface serviceport
name acct_server port 1813
Default none
Format radius server host {auth | acct} link-local link-local-address
Mode Global Config
Parameter Description
ipaddr The IP address of the server.
ipv6addr The IPv6 address of the server.
hostname The host name of the server.
username RADIUS server test user name.
deadtime The amount of time to skip a RADIUS server that is not responding to authentication requests. The valid deadtime
range is 0 to 2000 minutes.
idle-time The number of minutes between test probes, which is in the range of 1 to 35792 minutes.
name Identification name to the server.
port A Layer 4 port number in the range of 1 to 65535 (the default is 1813).
Example:
(Routing)(Config)# radius server acct 10.22.11.33 test username dummy idle-time 2
Format no radius server host {auth | acct} {ipaddr | ipv6addr | hostname} test username
Mode Global Config
Text-based configuration supports RADIUS server’s secrets in encrypted and non-encrypted format. When you save the
configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter
the key along with the encrypted keyword. In the show running-config command’s display, these secret keys are displayed
in encrypted format. You cannot show these keys in plain text format.
Format radius server key [auth | acct | encrypted password] {ipaddr | ipv6addr | hostname}
encrypted password
Mode Global Config
Parameter Description
ipaddr The IP address of the server.
dnsname The DNS name of the server.
password The password in encrypted format.
The supported load balancing method is based on the least number of outstanding requests. In this mode, the RADIUS client
selects a configured RADIUS server that has the least number of pending requests. Before selecting a new server, the
number of pending requests on the current server in use should be more than configured batch size value.
Parameter Description
acct Configure the RADIUS accounting server group.
auth Configure the RADIUS authentication server group.
name The RADIUS server group name.
radius Server using default identification name.
method Load balance based on the lowest number of outstanding requests.
none Do not load balance.
Example:
(Routing) (Config)# radius server load-balance acct name group1 method least-outstanding batch-size 40
(Routing) (Config)# radius server load-balance auth radius method least-outstanding batch-size 30
Format no radius server load-balance {auth | acct} {radius | name servername} method
Mode Global Config
Parameter Description
ip addr The IP address of the server.
ipv6addr The IPv6 address of the server.
dnsname The DNS name of the server.
Parameter Description
ip addr The IP address of the RADIUS Authenticating server.
ipv6addr The IPv6 address of the server.
dnsname The DNS name of the server.
Default 4
Format radius server retransmit retries
Mode Global Config
Parameter Description
retries The maximum number of transmission attempts in the range of 1 to 15.
If a source-interface is not specified, the primary IP address of the originating (outbound) interface is used as the source
address. If the configured interface is down, the RADIUS client falls back to its default behavior.
Parameter Description
slot/port Specifies the port to use as the source interface.
loopback-id Specifies the loopback interface to use as the source interface. The range of the loopback ID is 0 to 7.
vlan-id Specifies the VLAN to use as the source interface.
Default 5
Format radius server timeout seconds
Mode Global Config
Parameter Description
retries Maximum number of transmission attempts in the range of 1 to 30.
3.12.29 server-key
Use this command to configure a global shared secret that is used for all dynamic authorization clients that do not have an
individual shared secret key configured.
Default none
Format server-key [7] key-string
Mode Dynamic Authorization
Parameter Description
0 An unencrypted key is to be entered
7 An encrypted key is to be entered
string The shared secret string. Maximum length is 128 characters for unencrypted key and 256
characters for encrypted key. Overrides the global setting for this client only. Enclose in quotes
to use special characters or embedded blanks.
Example:
(Routing) (Config-radius-da)# server-key encrypted mydevice
3.12.29.0.1 no server-key
Use this command to remove the global shared secret key configuration.
Default none
Format no server-key
Mode Dynamic Authorization
Example:
(Routing) (Config-radius-da)#no server-key
Default disabled
Default none
Format radius vrf <vrf-name>
Mode Global Config
Default none
Format no radius vrf
Mode Global Config
Default none
Format vrf <vrf-name>
Mode Dynamic Authorization
3.12.32.0.1 no vrf
Use this command to remove the VRF name configured for DAS.
Default none
Format no vrf
Mode Dynamic Authorization
Parameter Description
Number of Configured Authentication The number of RADIUS Authentication servers that have been configured.
Servers
Number of Configured Accounting Servers The number of RADIUS Accounting servers that have been configured.
Number of Named Authentication Server The number of configured named RADIUS server groups.
Groups
Number of Named Accounting Server The number of configured named RADIUS server groups.
Groups
Number of Dead RADIUS Authentication The number of RADIUS authentication servers that are considered to be unresponsive
Servers based on the dead-time criteria.
Number of Dead RADIUS Accounting The number of RADIUS accounting servers that are considered to be unresponsive based
Servers on the dead-time criteria.
Number of Retransmits The configured value of the maximum number of times a request packet is retransmitted.
Dead Time The amount of time to skip a RADIUS server that is not responding to authentication
requests.
Dead Criteria Time Number of seconds during which a RADIUS client need not get a valid response from the
RADIUS server.
Dead Criteria Tries Number of times that a RADIUS client attempts to get a valid response before the RADIUS
server is considered as unavailable.
Timeout Duration The configured timeout value, in seconds, for request retransmissions.
RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled
or not.
RADIUS Attribute 4 Mode A global parameter to indicate whether the NAS-IP-Address attribute has been enabled to
use in RADIUS requests.
RADIUS Attribute 4 Value A global parameter that specifies the IP address to be used in the NAS-IP-Address attribute
to be used in RADIUS requests.
RADIUS Attribute 95 Mode A global parameter to indicate whether the NAS-IPv6-Address attribute has been enabled
to use in RADIUS requests.
RADIUS Attribute 95 Value A global parameter that specifies the IPv6 address to be used in the NAS-IPv6-Address
attribute to be used in RADIUS requests.
RADIUS Attribute 30 MAC Format The format in which the MAC address is sent to the RADIUS server in attribute 30.
RADIUS Attribute 31 MAC Format The format in which the MAC address is sent to the RADIUS server in attribute 31 (Calling-
Station-ID).
Parameter Description
RADIUS Attribute 32 MAC Format The format in which the MAC address is sent to the RADIUS server in attribute 32 (NAS-
Identifier).
RADIUS Attribute 32 include in access Indicates whether RADIUS attribute 32 is sent to the RADIUS server in access-request and
request accounting-request messages.
RADIUS Attribute 32 format The format for RADIUS attribute 32, which is one or more of the following:
%m: MAC address
%i: IP address
%h: Host Name
%d: Domain Name.
RADIUS Attribute 44 include in access Indicates whether RADIUS attribute 44 is sent to the RADIUS server in access-request and
request accounting-request messages.
Example: The following shows example CLI display output for the command.
(Switch) #show radius
Parameter Description
Command Variables
ipaddr The IP address of the authenticating server.
ipv6addr The IPv6 address of the server.
Parameter Description
dnsname The DNS name of the authenticating server.
servername The alias name to identify the server.
Command Output Fields
Current The * symbol preceding the server host address specifies that the server is currently active.
Host Address The IP address of the host.
Server Name The name of the authenticating server.
Port The port used for communication with the authenticating server.
Type Specifies whether this server is a primary or secondary type.
Current Host Address (*) An asterisk (*) indicates which configured RADIUS host is the currently active authenticating
server.
Number of Retransmits The configured value of the maximum number of times a request packet is retransmitted.
Dead Time The amount of time to skip a RADIUS server that is not responding to authentication requests.
Timeout Duration The configured timeout value, in seconds, for request retransmissions.
RADIUS Server VSA Authentication Indicates whether the system processes Cisco dynamic ACL vendor-specific attributes sent by
RADIUS Server.
Server State The administrative state of the RADIUS server.
Server Immortal State Indicates whether the server is an immortal RADIUS server, which is a dead server that is marked
as alive after being determined to be dead because it is the last server known to be alive.
Test User The name of the configured RAIDUS server test user.
Idle Time The number of minutes between RADIUS server test probes,
RADIUS Accounting Mode A global parameter to indicate whether the accounting mode for all the servers is enabled.
RADIUS Attribute 4 Mode A global parameter to indicate whether the NAS-IP-Address attribute has been enabled to use in
RADIUS requests.
RADIUS Attribute 4 Value A global parameter that specifies the IP address to be used in NAS-IP-Address attribute used in
RADIUS requests.
RADIUS Attribute 95 Mode A global parameter to indicate whether the NAS-IPv6-Address attribute has been enabled to use
in RADIUS requests.
RADIUS Attribute 95 Value A global parameter that specifies the IPv6 address to be used in the NAS-IPv6-Address attribute
to be used in RADIUS requests.
RADIUS Attribute 30 MAC Format The format in which the MAC address is sent to the RADIUS server in attribute 30.
RADIUS Attribute 31 MAC Format The format in which the MAC address is sent to the RADIUS server in attribute 31
(Calling-Station-ID).
RADIUS Attribute 32 MAC Format The format in which the MAC address is sent to the RADIUS server in attribute 32 (NAS-Identifier).
RADIUS Attribute 32 include in Indicates whether RADIUS attribute 32 is sent to the RADIUS server in access-request and
access request accounting-request messages.
RADIUS Attribute 32 format The format for RADIUS attribute 32, which is one or more of the following:
%m: MAC address
%i: IP address
%h: Host Name
%d: Domain Name.
RADIUS Attribute 44 include in Indicates whether RADIUS attribute 44 is sent to the RADIUS server in access-request and
access request accounting-request messages.
Link local interface If configured, the link local IPv6 address.
Secret Configured Yes or No Boolean value that indicates whether this server is configured with a secret.
Message Authenticator A global parameter to indicate whether the Message Authenticator attribute is enabled or disabled.
CoA Bounce-Host-Port Indicates whether RADIUS server Bounce-Port messages will be processed (Accept) or ignored.
Parameter Description
Number of CoA Requests Received The number of RADIUS Change of Authorization (CoA) requests messages received from a
RADIUS host.
Number of CoA ACK Responses Sent The number of RADIUS CoA acknowledgments the client has sent.
Number of CoA NAK Responses Sent The number of RADIUS CoA non-acknowledgments the client has sent.
Number of CoA Requests Ignored The number of RADIUS CoA requests the client has ignored.
Number of CoA Missing/Unsupported The number of RADIUS CoA requests the client has received that have a missing or unsupported
Attribute R attribute value.
Number of CoA Session Context Not The number of RADIUS CoA requests the client has received in which the session context
Found Request identified in the CoA-Request or not exist on the NAS.
Number of CoA Invalid Attribute Value The number of RADIUS CoA requests the client has received that have an invalid attribute value.
Request
Number of Administratively Prohibited The number of RADIUS CoA requests the client has received that where the NAS is configured to
Request prohibit honoring of CoA-Request or Disconnect- Request packets for the specified session.
Number of Dead servers in Named When the name servername options are used, this field shows the number of RADIUS servers
Server Group in the named server group that are determined to be dead.
Example: The following shows example CLI display output for the command.
(Switch) #show radius servers
Example: The following shows example CLI display output for the command.
(Routing) # show radius server dynamic-author
AdminMode...................................... Enabled
Port........................................... 1700
Auth Type...................................... any
Global Secret Key.............................. lvl7india
Ignore server-key.............................. Disabled
Ignore session-key............................. Disabled
VRF Name....................................... radiusVrf
CoA Bounce-Host-Port........................... Accept
CoA Disable-Host-Port.......................... Accept
Example: The following shows example CLI display output for the command.
(Routing) # show radius server dynamic-author statistics
Parameter Description
servername An alias name to identify the server.
ipaddr The IPv4 address of the server.
ipv6address The IPv6 address of the server.
hostname The DNS resolvable host name of the server.
If you use the name parameter without the servername option, then only the accounting mode and the RADIUS accounting
server details are displayed.
Parameter Description
Server Name The name of the accounting server.
Host Address The IP address or configured name of the host.
Port The port used for communication with the accounting server.
Secret Configured Yes or no Boolean value indicating whether this server is configured with a secret.
Example: The following shows example CLI display output for the command.
(Routing) #show radius accounting name
If you specify the host name, IPv4 or IPv6 address of the accounting server, the following RADIUS accounting server details
are displayed.
Parameter Description
RADIUS Accounting Server IP Address The IPv4 address, IPv6 address, link local address, or configured host name of the
host.
RADIUS Accounting Server Name The name of the accounting server.
RADIUS Accounting Mode The mode of the accounting server.
Link local interface If configured, the interface associated with the link-local IPv6 address.
Port The port used for communication with the accounting server.
Secret Configured Yes or no Boolean value indicating whether this server is configured with a secret.
Server State The administrative state of the server.
Parameter Description
Server Immortal State Indicates whether the server is an immortal RADIUS server, which is a dead server that
is marked as alive after being determined to be dead because it is the last server
known to be alive.
Test User The name of the configured RAIDUS server test user.
Idle Time The number of minutes between RADIUS server test probes.
Number of Dead servers in Named Server Group When the name servername options are used, this field shows the number of
RADIUS servers in the named server group that are determined to be dead.
Example:
(Routing) #show radius accounting acctServer
Parameter Description
Selected Server If an asterisk (*) appears in the first column, the RADIUS accounting server is the primary server for its group.
Host Address The IPv4 address, IPv6 address, link local address, or configured host name of the host.
Server Name The name of the accounting server.
Port The port used for communication with the accounting server.
Example: The following shows example CLI display output for the command.
(Routing) #show radius accounting servers
* Host Address Server Name Port
---- ------------------------ -------------------------------- ---
* 10.25.4.10 group1 1813
* 10.25.4.5 Default-RADIUS-Server 1813
10.25.4.4 group1 1813
Parameter Description
ipaddr The IP address of the server.
ipv6addr The IPv6 address of the server.
dnsname The DNS name of the server.
servername The alias name to identify the server.
RADIUS Accounting Server Name The name of the accounting server.
Server Host Address The IP address of the host.
Round Trip Time The time interval, in hundredths of a second, between the most recent Accounting-
Response and the Accounting-Request that matched it from this RADIUS accounting
server.
Requests The number of RADIUS Accounting-Request packets sent to this server. This number
does not include retransmissions.
Retransmission The number of RADIUS Accounting-Request packets retransmitted to this RADIUS
accounting server.
Responses The number of RADIUS packets received on the accounting port from this server.
Malformed Responses The number of malformed RADIUS Accounting-Response packets received from this
server. Malformed packets include packets with an invalid length. Bad authenticators or
signature attributes or unknown types are not included as malformed accounting
responses.
Bad Authenticators The number of RADIUS Accounting-Response packets containing invalid authenticators
received from this accounting server.
Pending Requests The number of RADIUS Accounting-Request packets sent to this server that have not yet
timed out or received a response.
Timeouts The number of accounting timeouts to this server.
Unknown Types The number of RADIUS packets of unknown types, which were received from this server
on the accounting port.
Packets Dropped The number of RADIUS packets received from this server on the accounting port and
dropped for some other reason.
Example: The following shows example CLI display output for the command.
(Routing) #show radius accounting statistics 192.168.37.200
Example: The following shows example CLI display output for the command.
(Router)#show radius source-interface
Parameter Description
ipaddr The IP address of the server.
ipv6addr The IPv6 address of the server.
dnsname The DNS name of the server.
servername The alias name to identify the server.
RADIUS Server Name The name of the authenticating server.
Server Host Address The IP address of the host.
Access Requests The number of RADIUS Access-Request packets sent to this server. This number does not include
retransmissions.
Access Retransmissions The number of RADIUS Access-Request packets retransmitted to this RADIUS authentication server.
Access Accepts The number of RADIUS Access-Accept packets, including both valid and invalid packets, that were
received from this server.
Access Rejects The number of RADIUS Access-Reject packets, including both valid and invalid packets, that were received
from this server.
Access Challenges The number of RADIUS Access-Challenge packets, including both valid and invalid packets, that were
received from this server.
Malformed Access The number of malformed RADIUS Access-Response packets received from this server. Malformed
Responses packets include packets with an invalid length. Bad authenticators or signature attributes or unknown types
are not included as malformed access responses.
Bad Authenticators The number of RADIUS Access-Response packets containing invalid authenticators or signature attributes
received from this server.
Pending Requests The number of RADIUS Access-Request packets destined for this server that have not yet timed out or
received a response.
Timeouts The number of authentication timeouts to this server.
Unknown Types The number of packets of unknown type that were received from this server on the authentication port.
Packets Dropped The number of RADIUS packets received from this server on the authentication port and dropped for some
other reason.
Example: The following shows example CLI display output for the command.
(Routing) #show radius statistics 192.168.37.200
Access Accepts................................ 0
Access Rejects................................ 0
Access Challenges............................. 0
Malformed Access Responses.................... 0
Bad Authenticators............................ 0
Pending Requests.............................. 0
Timeouts...................................... 0
Unknown Types................................. 0
Packets Dropped............................... 0
Example 1
(Routing) #show radius vrf
(Routing) #
Example 2
(Routing)(Config)# radius vrf radiusVrf
(Routing) #
Text-based configuration supports TACACS server’s secrets in encrypted and non-encrypted format. When you save the
configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter
the key along with the encrypted keyword. In the show running config command’s display, these secret keys are displayed
in encrypted format. You cannot show these keys in plain text format.
Default 5
Format tacacs-server timeout timeout
Mode Global Config
Example: The following example configures all the TACACS server with VRF tacacsVrf
(Routing)(Config)#tacacs-server vrf tacacsVrf
3.13.7 key
Use the key command in TACACS Configuration mode to specify the authentication and encryption key for all TACACS
communications between the device and the TACACS server. This key must match the key used on the TACACS daemon.
The key-string parameter specifies the key name. For an empty string use “ ”. (Range: 0 to 128 characters).
Text-based configuration supports TACACS server’s secrets in encrypted and non-encrypted format. When you save the
configuration, these secret keys are stored in encrypted format only. If you want to enter the key in encrypted format, enter
the key along with the encrypted keyword. In the show running config command’s display, these secret keys are displayed
in encrypted format. You cannot show these keys in plain text format.
Format key [key-string | encrypted key-string]
Mode TACACS Config
3.13.8 keystring
Use the keystring command in TACACS Server Configuration mode to set the TACACS+ server-specific authentication
encryption key used for all TACACS+ communications between the TACACS+ server and the client.
Format keystring
3.13.10 priority
Use the priority command in TACACS Configuration mode to specify the order in which servers are used, where 0 (zero)
is the highest priority. The priority parameter specifies the priority for servers. The highest priority is 0 (zero), and the range
is 0 to 65535.
Default 0
Format priority priority
Mode TACACS Config
If a source-interface is not specified, the primary IP address of the originating (outbound) interface is used as the source
address.
Parameter Description
slot/port Specifies the port to use as the source interface.
loopback-id Specifies the loopback interface to use as the source interface. The range of the loopback ID is 0 to 7.
vlan-id Specifies the VLAN to use as the source interface.
3.13.12 timeout
Use the timeout command in TACACS Configuration mode to specify the timeout value in seconds. If no timeout value is
specified, the global value is used. The timeout parameter has a range of 1 to 30 and is the timeout value in seconds.
Format timeout timeout
Mode TACACS Config
Parameter Description
Host address The IP address or host name of the configured TACACS+ server.
Port The configured TACACS+ server port number.
TimeOut The timeout in seconds for establishing a TCP connection.
Priority The preference order in which TACACS+ servers are contacted. If a server connection fails, the next highest
priority server is contacted.
Example: The following example displays the VRF name that is configured.
(Routing)(Tacacs)#show tacacs
Global Timeout: 5
VRF Name: tacacsVrf
Example: The following shows example CLI display output for the command.
(Routing) #show tacacs source-interface
Use the show running-config command (see the show running-config command) to capture the running configuration into
a script. Use the copy command (see the copy command) to transfer the configuration script to or from the switch.
Use the show {startup-config | backup-config | factory-defaults} command to view the configuration stored in the startup-
config, backup-config, or factory-defaults file (see the show command).
You should use scripts on systems with default configuration; however, you are not prevented from applying scripts on
systems with non-default configurations.
The combined size of all script files on the switch shall not exceed 2048 KB.
You can type single-line annotations at the command prompt to use when you write test or configuration scripts to improve
script readability. The exclamation point (!) character flags the beginning of a comment. The comment flag character can
begin a word anywhere on the command line, and all input following this character is ignored. Any command line that begins
with the “!” character is recognized as a comment line and ignored by the parser.
show serial
NOTE: To specify a blank password for a user in the configuration script, you must specify it as a space within quotes. For
example, to change the password for user jane from a blank password to hello, the script entry is as follows:
users passwd jane
" "
hello
hello
Parameter Description
Configuration Script Name of the script.
Size The remaining available space.
Parameter Description
Output format line number: line contents
Default none
Format copy <tftp://<ipaddr>/<filepath>/<filename>> nvram:clibanner
Parameter Description
line Banner text where ““ (double quotation marks) are a delimiting character. The banner message can be up to 2000
characters.
Example: The following shows example CLI display output for the command.
(Routing) #show clibanner
--------------------------
TEST
--------------------------
3.15.5 hostname
This command sets the system host name. It also changes the prompt. The length of name may be up to 64 alphanumeric,
case-sensitive characters.
3.16.1 fpti
Use this command to enable FPTI mode either globally (in Global Config mode) or for a specific interface (in Interface Config
mode).
Default enabled
Format fpti
Mode Global Config
Interface Config
3.16.1.0.1 no fpti
Use this command to disable FPTI mode.
Format no fpti
Mode Global Config
Interface Config
Example:
(Switching) show port fpti
Intf Mode
--------- ---------------
0/1 Enabled
0/2 Enabled
0/3 Enabled
0/4 Enabled
0/5 Enabled
0/6 Enabled
0/7 Enabled
0/8 Enabled
0/9 Enabled
0/10 Enabled
0/11 Enabled
0/12 Enabled
0/13 Enabled
0/14 Enabled
0/15 Enabled
0/16 Enabled
0/17 Enabled
0/18 Enabled
0/19 Enabled
0/20 Enabled
0/21 Enabled
0/22 Enabled
0/23 Enabled
0/24 Enabled
Example:
(Switching) show port fpti 0/1
Port........................................... 0/1
Front Panel Tap Interface Mode................. Enabled
Default both
Format authentication control-direction {both|in}
Mode Interface Config
Port channel
VLAN routing
A port profile can be referenced in another port profile to inherit its properties to the other port profile.
3.17.1 port-profile
Use this command to create and name a port profile for the specified type of interface, and enter the port-profile configuration
mode.
A-Z
0-9
No special characters are allowed, except for the following:
– . (dot)
– - (hyphen)
– _ (underscore)
The maximum length of the port profile name is 80 characters. The name of the port profile is case sensitive.
3.17.1.0.1 no port-profile
Use this command to delete the port profile for the specified type of interface.
Default disabled
Format state enabled
Mode Port Profile Config
Default disabled
Format no state enabled
Mode Port Profile Config
Default none
Format description <description>
Mode Port Profile Config
Default none
Format no description
Mode Port Profile Config
Default none
Format inherit port-profile <name>
Mode Port Profile Config
Default none
Format no inherit port-profile <name>
Mode Port Profile Config
Default none
Format inherit port-profile <name>
Mode Interface Config
Example 1:
(Routing)(Interface 0/1)#inherit port-profile test
Example 2:
(Routing)(Interface 0/3-0/6)#inherit port-profile test
Example 3:
(Routing)(Interface 0/8,0/11-0/12)#inherit port-profile test
Default none
Format no inherit port-profile <name>
Mode Interface Config
Command Description
show port-profile Displays the port profile configuration in detail. See Example 1.
show port-profile name name Displays the configuration for a named port profile. See Example 2.
show port-profile brief Displays a tabular view of all configured port profiles. See Example 3.
show port-profile expand-interface Displays all configured port profiles expanded to include the interfaces assigned to
them. See Example 4.
show port-profile expand-interface name name Displays a named port profile expanded to include the interfaces assigned to it. See
Example 5.
show port-profile sync-status [interface if-name] Displays the interfaces that are not synchronized with the port profile. See Example
6.
Example 1
(Routing)# show port-profile
port-profile test
type: Ethernet
description: ethernet_port_profile
status: disabled
inherit:
config attributes:
authentication port-control force-authorized
load-interval 90
no shutdown
evaluated config attributes:
authentication port-control force-authorized
load-interval 90
no shutdown
assigned interfaces:
0/1, 0/3 - 0/6, 0/8, 0/11 - 0/12
port-profile test1
type: Ethernet
description:
status: disabled
inherit: test
config attributes:
evaluated config attributes:
authentication port-control force-authorized
load-interval 90
no shutdown
assigned interfaces:
Example 2
(Routing)# show port-profile name test
port-profile test
type: Ethernet
description: ethernet_port_profile
status: disabled
inherit:
config attributes:
authentication port-control force-authorized
load-interval 90
no shutdown
evaluated config attributes:
authentication port-control force-authorized
load-interval 90
no shutdown
assigned interfaces:
0/1, 0/3 - 0/6, 0/8, 0/11 - 0/12
Example 3
(Routing)# show port-profile brief
--------------------------------------------------------------------------
Port Profile Profile Conf Eval Assigned
Profile Type State Items Items Intfs
--------------------------------------------------------------------------
profile1 ethernet disabled 0 0 0
profile2 ethernet disabled 0 0 0
Example 4
(Routing)# show port-profile expand-interface
port-profile P1
Ethernet1/1
bandwidth 1000
port-profile P2
Ethernet1/2
bandwidth 100
port-profile P3
Ethernet1/3
bandwidth 10000
Example 5
(Routing)# show port-profile expand-interface name P1
port-profile P1
Ethernet1/1
bandwidth 1000
Example 6
(Routing)# show port-profile sync-status
-------------------------------------------------------------
Port Out of
Profile Sync
-------------------------------------------------------------
p1 0/1
p2 None
Example 1
(Routing)#show running-config port-profile
port-profile type ethernet "p2"
description "p2"
state enabled
bandwidth 20000
load-interval 30
exit
interface 0/1
inherit port-profile test
exit
Example 2
(Routing)#show running-config port-profile p1
port-profile type ethernet "p1"
interface 0/1
inherit port-profile test
exit
NOTE: The commands in this chapter are in one of five functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration command, there
is a show command that displays the configuration setting.
Copy commands transfer or save configuration and informational files to and from the switch.
Debug commands provide diagnostic information and help troubleshoot network issues.
Clear commands clear some or all of the settings to factory defaults.
When the switch boots and no configuration file is found, it attempts to obtain an IP address from a network DHCP server.
The response from the DHCP server includes the IP address of the TFTP server where the image and configuration flies
are located.
After acquiring an IP address and the additional relevant information from the DHCP server, the switch downloads the image
file or configuration file from the TFTP server. A downloaded image is automatically installed. A downloaded configuration
file is saved to non-volatile memory.
NOTE: AutoInstall from a TFTP server can run on any IP interface, including the network port, service port, and in-band
routing interfaces (if supported). To support AutoInstall, the DHCP client is enabled operationally on the service
port, if it exists, or the network port, if there is no service port.
Default stopped
Format boot autoinstall {start | stop}
Mode Privileged EXEC
Default 3
Format boot host retrycount 1-3
Mode Privileged EXEC
Default enabled
Format boot host dhcp
Mode Privileged EXEC
Default disabled
Format boot host autosave
Mode Privileged EXEC
Default enabled
Format boot host autoreboot
Mode Privileged EXEC
Default disable
Format erase factory-defaults
Mode Privileged EXEC
Default disable
Format erase application filename
Mode Privileged EXEC
Example: The following shows example CLI display output for the command.
(Routing) #show autoinstall
This command can be issued using an already installed application file name to update the parameters. This updates the
configuration for the next time the application is started.
This command can be issued for a file that is not currently on the switch. This allows preconfiguration of the execution
parameters. The configuration does not take effect until the executable file is present in the switch file system.
Parameter Description
filename The name of the application.
start-on-boot If the application is configured to start on boot up.
Yes: The application will start on boot up.
No: The application will not start on boot up.
auto-restart If the application is configured to restart when the application process ends.
Yes: The application will restart when the application process ends.
No: The application will not restart when the application process ends.
Max-CPU-Util The configured application CPU utilization limit expressed as a percentage. “None” if unlimited.
Max-memory The configured application memory limit in megabytes. “None” if unlimited.
Parameter Description
filename Name of the file.
File size Number of bytes the file occupies in the file system.
Directory Size Number of bytes all the files in the application directory.
spanning-tree bpduguard
spanning-tree bpdufilter default
(Routing) #
interface 0/1
no spanning-tree port mode
exit
EFOS software supports a dual image feature that allows the switch to have two software images in the permanent storage.
You can specify which image is the active image to be loaded in subsequent reboots. This feature allows reduced down-time
when you upgrade or downgrade the software.
4.4.1 delete
This command deletes the backup image file from the permanent storage or the core dump file from the local file system.
4.4.4 filedescr
This command associates a given text description with an image. Any existing description will be replaced.
Format filedescr {active | backup} text-description
Mode Privileged EXEC
Not supported on x86 platforms and not available on all embedded platforms. Only some vendors include the ability to
update the U-Boot firmware from inside EFOS.
4.5.1 load-interval
This command changes the length of time for which data is used to compute load statistics. The value is given in seconds,
and must be a multiple of 30. The allowable range for interval is from 30 to 600 seconds. The smaller the value of the load
interval is, the more accurate is the instantaneous rate given by load statistics. Smaller values may affect system
performance.
Example:
(Routing) (Interface 0/1)#load-interval 30
4.5.1.0.1 no load-interval
This command resets the load interval on the interface to the default value.
Parameter Description
IP Address IP address of the management interface or another device on the management network.
MAC Address Hardware MAC address of that device.
Interface For a service port the output is Management. For a network port, the output is the slot/port of the physical
interface.
4.5.3 dir
Use this command to list the files in the directory /mnt/fastpath in flash from the CLI.
Format dir
Mode Privileged EXEC
(Routing) #dir
Parameter Description
File The file in which the event originated.
Line The line number of the event.
Task Id The task ID of the event.
Code The event code.
Time The time this event occurred.
NOTE: The show version command and the show hardware command display the same information. In future releases
of the software, the show hardware command will not be available. For a description of the command output, see
the command show version.
Parameter Description
Slot The slot identifier in a unit/slot format.
Slot Status The slot is empty, full, or has encountered an error
Admin State The slot administrative mode is enabled or disabled.
Power State The slot power mode is enabled or disabled.
Configured Card The model identifier of the card preconfigured in the slot. Model Identifier is a 32-character field used to identify
Model Identifier a card.
Pluggable Cards are pluggable or non-pluggable in the slot.
Power Down Indicates whether the slot can be powered down.
If you supply a value for unit/slot, the following additional information appears:
Parameter Description
Inserted Card Model The model identifier of the card inserted in the slot. Model Identifier is a 32-character field used to identify a card.
Identifier This field is displayed only if the slot is full.
Inserted Card The card description. This field is displayed only if the slot is full.
Description
Configured Card 10BASE-T half duplex
Description
Parameter Description
min Sets the minimum allowed temperature for normal operation. The range is between
–100°C and 100°C. The default is 0°C.
max Sets the maximum allowed temperature for normal operation. The range is between
–100°C and 100°C. The default is 0°C.
Parameter Description
fan Enables or disables the sending of traps for fan status events. The default is enable.
powersupply Enables or disables the sending of traps for power supply status events. The default is enable.
temperature Enables or disables the sending of traps for temperature status events. The default is enable.
Parameter Description
Fan Control Mode The fan control mode, which can be Auto, Cool, Off, or Quiet, based on the platform
Unit The system unit number.
Total Space The total amount of disk space on the system, in KB.
Free Space The amount of available disk space on the system, in KB.
Used Space The amount of disk space in use on the system, in KB.
Utilization The amount of disk space in use on the system, as a percentage of total disk space.
Temperature Sensors:
Unit Sensor Description Temp (C) State Max_Temp (C)
---- ------ ---------------- ---------- ----------------- --------------
1 1 sensor-1 58 Normal 80
Fans:
Unit Fan Description Type Speed Duty level State
---- --- -------------- --------- ------------- ------------- --------------
1 1 FAN-1 Fixed 2500 25% Operational
1 2 FAN-2 Fixed 2500 25% Operational
1 3 FAN-3 Fixed 2500 25% Operational
Power Modules:
Unit Power supply Description Type State
---- ------------ ---------------- ---------- --------------
1 1 PS-1 Fixed Operational
NOTE: The show version command will replace the show hardware command in future releases of the software.
Parameter Description
System Description Text used to identify the product name of this switch.
Machine Type The machine model as defined by the Vital Product Data.
Machine Model The machine model as defined by the Vital Product Data
Serial Number The unique box serial number for this switch.
FRU Number The field replaceable unit number.
Part Number Manufacturing part number.
Maintenance Level Hardware changes that are significant to software.
Manufacturer Manufacturer descriptor field.
Burned in MAC Address Universally assigned network address.
Software Version The release.version.revision number of the code currently running on the switch.
Operating System The operating system currently running on the switch.
Network Processing The type of the processor microcode.
Device
Additional Packages The additional packages incorporated into this system.
Parameter Description
Operational Code Build Signature loaded into the switch
Image File Name
Software Version Release Version Maintenance Level and Build (RVMB) information of the switch.
Timestamp Timestamp at which the image is built
Example: The following shows example CLI display output for the command.
(Routing) #show platform vpd
Parameters Description
Packets Received Without Error The total number of packets (including broadcast packets) received by the processor.
Packets Received With Error The number of inbound packets that contained errors preventing them from being deliverable to a
higher-layer protocol.
Broadcast Packets Received The total number of packets received that were directed to the broadcast address.
Receive Packets Discarded The number of inbound packets which were chosen to be discarded even though no errors had been
detected to prevent their being deliverable to a higher-layer protocol. One possible reason for
discarding such a packet could be to free up buffer space.
Packets Transmitted Without Error The total number of packets transmitted out of the interface.
Parameters Description
Transmit Packets Discarded The number of outbound packets which were chosen to be discarded even though no errors had
been detected to prevent their being deliverable to a higher-layer protocol. A possible reason for
discarding a packet could be to free up buffer space.
Transmit Packets Errors The number of outbound packets that could not be transmitted because of errors.
Collisions Frames The best estimate of the total number of collisions on this Ethernet segment.
Load Interval The length of time for which data is used to compute load statistics. The value is given in seconds,
and must be a multiple of 30. The allowable range is from 30 to 600 seconds
Bits Per Second Received Approximate number of bits per second received. This value is an exponentially weighted average
and is affected by the configured load-interval.
Bits Per Second Transmitted. Approximate number of bits per second transmitted. This value is an exponentially weighted average
and is affected by the configured load-interval.
Packets Per Second Received Approximate number of packets per second received. This value is an exponentially weighted
average and is affected by the configured load-interval.
Packets Per Second Transmitted Approximate number of packets per second transmitted. This value is an exponentially weighted
average and is affected by the configured load-interval.
Percent Utilization Received Value of link utilization in percentage representation for the RX line.
Percent Utilization Transmitted Value of link utilization in percentage representation for the TX line.
Link Flaps The number of link flaps (link up and down cycle) that have occurred.
MMU discard counters The number of MMU discard counters for a particular interface.
Time Since Counters Last Cleared The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last
cleared.
Parameter Description
Broadcast Packets Received The total number of packets received that were directed to the broadcast address.
Packets Received With Error The number of inbound packets that contained errors preventing them from being deliverable to
a higher-layer protocol.
Packets Transmitted Without Error The total number of packets transmitted out of the interface.
Broadcast Packets Transmitted The total number of packets that higher-level protocols requested to be transmitted to the
Broadcast address, including those that were discarded or not sent.
Transmit Packet Errors The number of outbound packets that could not be transmitted because of errors.
Address Entries Currently In Use The total number of Forwarding Database Address Table entries now active on the switch,
including learned and static entries.
VLAN Entries Currently In Use The number of VLAN entries presently occupying the VLAN table.
Time Since Counters Last Cleared The elapsed time, in days, hours, minutes, and seconds since the statistics for this switch were
last cleared.
Collision Frames............................... 0
Load Interval.................................. 300
Bits Per Second Received....................... 0
Bits Per Second Transmitted.................... 0
Packets Per Second Received.................... 0
Packets Per Second Transmitted................. 0
Percent Utilization Received...................... 0%
Percent Utilization Transmitted................... 0%
Time Since Counters Last Cleared............... 377 day 6 hr 9 min 10 sec
(Routing) #
The description of the interface is configurable through the existing command description <name> which has a maximum
length of 64 characters that is truncated to 28 characters in the output. The long form of the description can be displayed
using show port description. The interfaces displayed by this command are physical interfaces, LAG interfaces and
VLAN routing interfaces.
The command show interfaces status all displays the configured vlan/trunk for each port under the VLAN column.
Parameter Description
Port The interface associated with the rest of the data in the row.
Name The descriptive user-configured name for the interface.
Link State Indicates whether the link is up or down.
Physical Mode The speed and duplex settings on the interface.
Physical Status Indicates the port speed and duplex mode for physical interfaces. The physical status for LAGs is not
reported. When a port is down, the physical status is unknown.
Media Type The media type of the interface.
Flow Control Status The 802.3x flow control status.
Flow Control The configured 802.3x flow control mode.
VLAN When switchport mode for an interface is configured as trunk, this column displays Trunk. For switchport
mode other than trunk, only the VLAN ID is displayed. The mode is not displayed.
Example: The following shows example CLI display output for the command show interfaces status all.
(Switching) #show interfaces status all
Parameter Description
Interface Name The interface associated with the rest of the data in the row.
Congestion Drops The number of packets that have been dropped on the interface due to congestion.
TX Queue The number of bytes in the transmit queue.
RX Queue The number of bytes in the receive queue.
Color Drops: Green The number of green packets that were dropped.
Color Drops: Yellow The number of yellow (conformed) packets that were dropped.
Color Drops: Red The number of red (exceeded) packets that were dropped.
WRED TX Queue The number of packets in the WRED transmit queue.
ECN Tx Queue The number of packets in the ECN transmit queue.
Example: The following shows example CLI display output for the command.
(Routing) #show interfaces traffic
Intf Congestion Tx Queue Rx Queue Color Drops (Pkts) WRED Tx ECN Tx
Name Drops(Pkts) (KB) (KB) Green Yellow Red Queue(KB) (Pkts)
------- ----------- -------- -------- ----------- ---------- ---------- ------------- --------
0/1 0 0 NA 0 0 0 0 0
0/2 0 0 NA 0 0 0 0 0
0/3 0 0 NA 0 0 0 0 0
0/4 0 0 NA 0 0 0 0 0
0/5 0 0 NA 0 0 0 0 0
0/6 0 0 NA 0 0 0 0 0
0/7 0 0 NA 0 0 0 0 0
0/8 0 0 NA 0 0 0 0 0
0/9 0 0 NA 0 0 0 0 0
0/10 0 0 NA 0 0 0 0 0
0/11 0 0 NA 0 0 0 0 0
The show interfaces traffic <u/s/p> command displays per cos queue statistics.
NOTE:
If counter is not supported in hardware, the show command displays the counter value as NA.
The clear counters command clears all the new counters except peak count because this is a status
value not a counter.
Parameter Description
Port The physical port, LAG, or CPU interface associated with the rest of the data in the row.
InOctets The number of inbound octets received by the interface.
InUcastPkts The number of inbound unicast packets received by the interface.
InMcastPkts The number of inbound multicast packets received by the interface.
InBcastPkts The number of inbound broadcast packets received by the interface.
InDropPkts The number of packets dropped at the ingress.
Parameter Description
Rx Error The number of error packets (FCS, Jabbers, Undersize, and so on) captured at the ingress.
OutOctets The number of outbound octets transmitted by the interface.
OutUcastPkts The number of outbound unicast packets transmitted by the interface.
OutMcastPkts The number of outbound multicast packets transmitted by the interface.
OutBcastPkts The number of outbound broadcast packets transmitted by the interface.
OutDropPkts The number of packets dropped at the egress.
Tx Error The number of error packets (FCS, Jabbers, Undersize, and so on) captured at the egress.
Example: The following shows example CLI display output for the command.
(Routing) #show interface counters
The command consolidates all information related to port flaps, which includes the following details:
Admin state, fault type—local or remote
Statistics
Example: The following shows example CLI display output for the command when the port is up.
(Routing)#show interfaces diag 1/0/4
Thu Jan 1 00:01:09 1970
1/0/4 is Up, line protocol is up
Description :
MTU 1500 bytes, BW 1000000 kbps
Example: The following shows example CLI display output for the command when the port is local Admin down.
Sun Jan 4 18:05:16 1970
0/23 is Down, line protocol status is phy-link-down
Interface is Administratively Down.
Description : abcd
MTU 1500 bytes, BW 10000000 kbps
LineSpeed is 10G Full, Auto-negotiation is off
Time Since Counters Last Cleared : 3 day 18 hr 4 min 52 sec
Link Down Event Counter : 0
input rate is 0 packet/sec, 0 bits/sec
output rate is 0 packet/sec, 0 bits/sec
Input statistics:
0 packets, 0 octets
0 Multicasts, 0 Broadcasts, 0 Unicasts
0 Errors, 0 Discarded, 0 Jabber
0 Overruns, 0 FCS, 0 Undersize
Output statistics:
23 packets, 4378 octets
23 Multicasts, 0 Broadcasts, 0 Unicasts
0 Output errors, 0 Collisions, 6 Discarded
Example: The following shows example CLI display output for the command when the port is down because of remote
port admin shutdown.
0/1 is Down, line protocol status is phy-link-down
Local Fault. Reason Code - 0x0
Description :
MTU 1500 bytes, BW 100000000 kbps
LineSpeed is 100G Full, Auto-negotiation is off
Time Since Counters Last Cleared : 3 day 0 hr 48 min 25 sec
Link Down Event Counter : 0
input rate is 0 packet/sec, 0 bits/sec
output rate is 0 packet/sec, 0 bits/sec
Input statistics:
0 packets, 0 octets
0 Multicasts, 0 Broadcasts, 0 Unicasts
0 Errors, 0 Discarded, 0 Jabber
0 Overruns, 0 FCS, 0 Undersize
Output statistics:
23 packets, 4378 octets
23 Multicasts, 0 Broadcasts, 0 Unicasts
0 Output errors, 0 Collisions, 6 Discarded
Example: The following shows example CLI display output for the command when the port is down because of err-
disabled.
0/1 is Down, line protocol status is err-disabled
Interface down by UDLD
Description :
MTU 1500 bytes, BW 100000000 kbps
LineSpeed is 100G Full, Auto-negotiation is off
Time Since Counters Last Cleared : 3 day 0 hr 48 min 25 sec
Link Down Event Counter : 0
input rate is 0 packet/sec, 0 bits/sec
output rate is 0 packet/sec, 0 bits/sec
Input statistics:
0 packets, 0 octets
0 Multicasts, 0 Broadcasts, 0 Unicasts
0 Errors, 0 Discarded, 0 Jabber
0 Overruns, 0 FCS, 0 Undersize
Output statistics:
23 packets, 4378 octets
23 Multicasts, 0 Broadcasts, 0 Unicasts
0 Output errors, 0 Collisions, 6 Discarded
When you specify a value for slot/port, the command displays the following information.
Parameter Description
Packets Received Total Packets Received (Octets) – The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including Frame Check Sequence (FCS) octets). This
object can be used as a reasonable estimate of Ethernet utilization. If greater precision is desired, the
etherStatsPkts and etherStatsOctets objects should be sampled before and after a common interval. The
result of this equation is the value Utilization which is the percent utilization of the Ethernet segment on a
scale of 0 to 100 percent.
Packets Received 64 Octets – The total number of packets (including bad packets) received that were 64
octets in length (excluding framing bits but including FCS octets).
Packets Received 65–127 Octets – The total number of packets (including bad packets) received that were
between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 128–255 Octets – The total number of packets (including bad packets) received that were
between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 256–511 Octets – The total number of packets (including bad packets) received that were
between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 512–1023 Octets – The total number of packets (including bad packets) received that
were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received 1024–1518 Octets – The total number of packets (including bad packets) received that
were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Received > 1518 Octets – The total number of packets received that were longer than 1522 octets
(excluding framing bits, but including FCS octets) and were otherwise well formed.
Parameter Description
Packets RX and TX 64 Octets – The total number of packets (including bad packets) received and
transmitted that were 64 octets in length (excluding framing bits but including FCS octets).
Packets RX and TX 65–127 Octets – The total number of packets (including bad packets) received and
transmitted that were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS
octets).
Packets RX and TX 128–255 Octets – The total number of packets (including bad packets) received and
transmitted that were between 128 and 255 octets in length inclusive (excluding framing bits but including
FCS octets).
Packets RX and TX 256–511 Octets – The total number of packets (including bad packets) received and
transmitted that were between 256 and 511 octets in length inclusive (excluding framing bits but including
FCS octets).
Packets Received Packets RX and TX 512–1023 Octets – The total number of packets (including bad packets) received and
(con’t) transmitted that were between 512 and 1023 octets in length inclusive (excluding framing bits but including
FCS octets).
Packets RX and TX 1024–1518 Octets – The total number of packets (including bad packets) received and
transmitted that were between 1024 and 1518 octets in length inclusive (excluding framing bits but including
FCS octets).
Packets RX and TX 1519–2047 Octets – The total number of packets received and transmitted that were
between 1519 and 2047 octets in length inclusive (excluding framing bits, but including FCS octets) and were
otherwise well formed.
Packets RX and TX 1523–2047 Octets – The total number of packets received and transmitted that were
between 1523 and 2047 octets in length inclusive (excluding framing bits, but including FCS octets) and were
otherwise well formed.
Packets RX and TX 2048–4095 Octets – The total number of packets received that were between 2048 and
4095 octets in length inclusive (excluding framing bits, but including FCS octets) and were otherwise well
formed.
Packets RX and TX 4096–9216 Octets – The total number of packets received that were between 4096 and
9216 octets in length inclusive (excluding framing bits, but including FCS octets) and were otherwise well
formed.
Packets Received Total Packets Received Without Error – The total number of packets received that were without errors.
Successfully Unicast Packets Received – The number of subnetwork-unicast packets delivered to a higher-layer
protocol.
Broadcast Packets Received – The total number of good packets received that were directed to the
broadcast address.
Receive Packets The number of inbound packets which were chosen to be discarded even though no errors had been detected to
Discarded prevent their being deliverable to a higher-layer protocol. One possible reason for discarding such a packet could
be to free up buffer space.
Packets Received with Total Packets Received with MAC Errors – The total number of inbound packets that contained errors
MAC Errors preventing them from being deliverable to a higher-layer protocol.
Jabbers Received – The total number of packets received that were longer than 1518 octets (excluding
framing bits, but including FCS octets), and had either a bad Frame Check Sequence (FCS) with an integral
number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Note that
this definition of jabber is different than the definition in IEEE-802.3 section 8.2.1.5 (10BASE5) and section
10.3.1.4 (10BASE2). These documents define jabber as the condition where any packet exceeds 20 ms. The
allowed range to detect jabber is between 20 ms and 150 ms.
Fragments/Undersize Received – The total number of packets received that were less than 64 octets in
length (excluding framing bits but including FCS octets).
Alignment Errors – The total number of packets received that had a length (excluding framing bits, but
including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS)
with a non-integral number of octets.
Rx FCS Errors – The total number of packets received that had a length (excluding framing bits, but including
FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS) with an
integral number of octets.
Overruns – The total number of frames discarded as this port was overloaded with incoming packets, and
could not keep up with the inflow.
uRPF Discards – The number of packets dropped due to failing the uRPF.
Parameter Description
Received Packets Not Total Received Packets Not Forwarded – A count of valid frames received which were discarded (in other
Forwarded words, filtered) by the forwarding process
Local Traffic Frames – The total number of frames dropped in the forwarding process because the
destination address was located off of this port.
802.3x Pause Frames Received – A count of MAC Control frames received on this interface with an opcode
indicating the PAUSE operation. This counter does not increment when the interface is operating in
half-duplex mode.
Unacceptable Frame Type – The number of frames discarded from this port due to being an unacceptable
frame type.
Reserved Address Discards – The number of frames discarded that are destined to an IEEE 802.1
reserved address and are not supported by the system.
Broadcast Storm Recovery – The number of frames discarded that are destined for FF:FF:FF:FF:FF:FF
when Broadcast Storm Recovery is enabled.
CFI Discards – The number of frames discarded that have CFI bit set and the addresses in RIF are in
non-canonical format.
Upstream Threshold – The number of frames discarded due to lack of cell descriptors available for that
packet's priority level.
Packets Transmitted Total Packets Transmitted (Octets) – The total number of octets of data (including those in bad packets)
Octets received on the network (excluding framing bits but including FCS octets). This object can be used as a
reasonable estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and
etherStatsOctets objects should be sampled before and after a common interval. -----
Packets Transmitted 64 Octets – The total number of packets (including bad packets) received that were
64 octets in length (excluding framing bits but including FCS octets).
Packets Transmitted 65-127 Octets – The total number of packets (including bad packets) received that
were between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Transmitted 128-255 Octets – The total number of packets (including bad packets) received that
were between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Transmitted 256-511 Octets – The total number of packets (including bad packets) received that
were between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Transmitted 512-1023 Octets – The total number of packets (including bad packets) received that
were between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Transmitted 1024-1518 Octets – The total number of packets (including bad packets) received that
were between 1024 and 1518 octets in length inclusive (excluding framing bits but including FCS octets).
Packets Transmitted > 1518 Octets – The total number of packets transmitted that were longer than 1518
octets (excluding framing bits, but including FCS octets) and were otherwise well formed.
Max Frame Size – The maximum size of the Info (non-MAC) field that this port will receive or transmit.
Maximum Transmit Unit – The maximum Ethernet payload size.
Packets Transmitted Total Packets Transmitted Successfully – The number of frames that have been transmitted by this port to
Successfully its segment.
Unicast Packets Transmitted – The total number of packets that higher-level protocols requested be
transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
Broadcast Packets Transmitted – The total number of packets that higher-level protocols requested be
transmitted to the Broadcast address, including those that were discarded or not sent.
Transmit Packets The number of outbound packets which were chosen to be discarded even though no errors had been detected
Discarded to prevent their being deliverable to a higher-layer protocol. A possible reason for discarding a packet could be
to free up buffer space.
Transmit Errors Total Transmit Errors – The sum of Single, Multiple, and Excessive Collisions.
Tx FCS Errors – The total number of packets transmitted that had a length (excluding framing bits, but
including FCS octets) of between 64 and 1518 octets, inclusive, but had a bad Frame Check Sequence (FCS)
with an integral number of octets.
Oversized – The total number of frames that exceeded the max permitted frame size. This counter has a
maximum increment rate of 815 counts per second at 10 megabits per second (Mb/s).
Underrun Errors – The total number of frames discarded because the transmit FIFO buffer became empty
during frame transmission.
Parameter Description
Transmit Discards Total Transmit Packets Discards – The sum of single collision frames discarded, multiple collision frames
discarded, and excessive frames discarded.
Single Collision Frames – A count of the number of successfully transmitted frames on a particular interface
for which transmission is inhibited by exactly one collision.
Multiple Collision Frames – A count of the number of successfully transmitted frames on a particular
interface for which transmission is inhibited by more than one collision.
Excessive Collisions – A count of frames for which transmission on a particular interface fails due to
excessive collisions.
Port Membership Discards – The number of frames discarded on egress for this port due to egress filtering
being enabled.
Protocol Statistics 802.3x Pause Frames Transmitted – A count of MAC Control frames transmitted on this interface with an
opcode indicating the PAUSE operation. This counter does not increment when the interface is operating in
half-duplex mode.
GVRP PDUs Received – Generic Attribute Registration Protocol (GARP) VLAN Registration Protocol PDUs
received.
GVRP PDUs Transmitted – GARP VLAN Registration Protocol PDUs transmitted.
GVRP Failed Registrations – Number of failed GVRP registrations.
GMRP PDUs Received – GARP Multicast Registration Protocol PDUs received.
GMRP PDUs Transmitted – GARP Multicast Registration Protocol PDUs transmitted
GMRP Failed Registrations – Number of failed GMRP registrations.
Protocol Statistics STP BPDUs Transmitted – Spanning Tree Protocol Bridge Protocol Data Units sent.
STP BPDUs Received – Spanning Tree Protocol Bridge Protocol Data Units received.
RST BPDUs Transmitted – Rapid Spanning Tree Protocol Bridge Protocol Data Units sent.
RSTP BPDUs Received – Rapid Spanning Tree Protocol Bridge Protocol Data Units received.
MSTP BPDUs Transmitted – Multiple Spanning Tree Protocol Bridge Protocol Data Units sent.
MSTP BPDUs Received – Multiple Spanning Tree Protocol Bridge Protocol Data Units received.
SSTP BPDUs Transmitted – Shared Spanning Tree Protocol Bridge Protocol Data Units sent.
SSTP BPDUs Received – Shared Spanning Tree Protocol Bridge Protocol Data Units received.
Dot1x Statistics EAPOL Frames Transmitted – The number of EAPOL frames of any type that have been transmitted by this
authenticator.
EAPOL Start Frames Received – The number of valid EAPOL start frames that have been received by this
authenticator.
Traffic Load Statistics Load Interval – The length of time for which data is used to compute load statistics. The value is given in
seconds, and must be a multiple of 30. The allowable range is from 30 to 600 seconds
Bits Per Second Received – Approximate number of bits per second received. This value is an exponentially
weighted average and is affected by the configured load-interval.
Bits Per Second Transmitted – Approximate number of bits per second transmitted. This value is an
exponentially weighted average and is affected by the configured load-interval.
Packets Per Second Received – Approximate number of packets per second received. This value is an
exponentially weighted average and is affected by the configured load-interval.
Packets Per Second Transmitted – Approximate number of packets per second transmitted. This value is
an exponentially weighted average and is affected by the configured load-interval.
Percent Utilization Received – Value of link utilization in percentage representation for the RX line.
Percent Utilization Transmitted – Value of link utilization in percentage representation for the TX line.
Time Since Counters The elapsed time, in days, hours, minutes, and seconds since the statistics for this port were last cleared.
Last Cleared
Parameter Description
Total Octets Transmitted The total number of octets of data (including those in bad packets) transmitted on the network (excluding
framing bits but including FCS octets). This object can be used as a reasonable estimate of Ethernet
utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets objects should be
sampled before and after a common interval.
Total Octets Received The total number of octets of data (including those in bad packets) received on the network (excluding
framing bits but including Frame Check Sequence [FCS] octets). This object can be used as a reasonable
estimate of Ethernet utilization. If greater precision is desired, the etherStatsPkts and etherStatsOctets
objects should be sampled before and after a common interval. The result of this equation is the value
utilization which is the percent utilization of the Ethernet segment on a scale of 0 to 100 percent.
Total Packets Transmitted The number of frames that have been transmitted by this port to its segment.
Successfully
Total Packets Received The total number of packets received that were without errors.
Without Error
Parameter Description
Octets Received The total number of octets of data received by the processor (excluding framing bits but including FCS
octets).
Total Packets Received The total number of packets (including broadcast packets) received by the processor.
Without Error
Unicast Packets Received The number of subnetwork-unicast packets delivered to a higher-layer protocol.
Broadcast Packets Received The total number of packets received that were directed to the broadcast address.
Receive Packets Discarded The number of inbound packets which were chosen to be discarded even though no errors had been
detected to prevent their being deliverable to a higher-layer protocol. A possible reason for discarding a
packet could be to free up buffer space.
Octets Transmitted The total number of octets transmitted out of the interface, including framing characters.
Packets Transmitted without The total number of packets transmitted out of the interface.
Errors
Unicast Packets Transmitted The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast
address, including those that were discarded or not sent.
Broadcast Packets The total number of packets that higher-level protocols requested be transmitted to the Broadcast
Transmitted address, including those that were discarded or not sent.
Most Address Entries Ever The highest number of Forwarding Database Address Table entries that have been learned by this switch
Used since the most recent reboot.
Address Entries in Use The number of Learned and static entries in the Forwarding Database Address Table for this switch.
Maximum VLAN Entries The maximum number of Virtual LANs (VLANs) allowed on this switch.
Most VLAN Entries Ever Used The largest number of VLANs that have been active on this switch since the last reboot.
Static VLAN Entries The number of presently active VLAN entries on this switch that have been created statically.
VLAN Deletes The number of VLANs on this switch that have been created and then deleted since the last reboot.
Time Since Counters Last The elapsed time, in days, hours, minutes, and seconds, since the statistics for this switch were last
Cleared cleared.
Example: The following shows example CLI display output for the command when you use the all keyword.
(Routing) #show interface ethernet all
Enter all or no parameter to display the entire table. Enter a MAC Address and VLAN ID to display the table entry for the
requested MAC address on the specified VLAN. Enter the count parameter to view summary information about the
forwarding database table. Use the interface {slot/port | lag lag-id} parameter to view MAC addresses on a
specific interface. Use the vlan vlan_id parameter to display information about MAC addresses on a specified VLAN.
On a service provider build with the PBB package, the command shows the forwarding database table and additionally
shows the ISID-MAC entries learned on the DUT. To view only the ISID-MAC entries on the DUT, provide the option isid
to the show mac-addr-table command. MAC entries of other BEB’s are not shown in the pass-through BEB mac-addr-
table for bidirectional traffic between them.
The following information displays if you do not enter a parameter, the keyword all, or the MAC address and VLAN ID.
Parameter Description
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A unicast MAC address for which the switch has forwarding and or filtering information. The format is six 2-digit
hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Interface The port through which this address was learned.
Interface Index This object indicates the ifIndex of the interface table entry associated with this port.
Status The status of this entry. The meanings of the values are:
Static – The value of the corresponding instance was added by the system or a user when a static MAC filter
was defined. It cannot be relearned.
Learned – The value of the corresponding instance was learned by observing the source MAC addresses of
incoming traffic, and is currently in use.
Management – The value of the corresponding instance (system MAC address) is also the value of an existing
instance of dot1dStaticAddress. It is identified with interface 0/1. and is currently used when enabling VLANs for
routing.
Self – The value of the corresponding instance is the address of one of the switch’s physical interfaces (the
system’s own MAC address).
Other – The value of the corresponding instance does not fall into one of the other categories.
If you enter vlan vlan_id, only the MAC Address, Interface, and Status fields appear. If you enter the interface slot/
port parameter, in addition to the MAC Address and Status fields, the VLAN ID field also appears.
Parameter Description
Dynamic Address count Number of MAC addresses in the forwarding database that were automatically learned.
Static Address (User-defined) count Number of MAC addresses in the forwarding database that were manually entered by a user.
Total MAC Addresses in use Number of MAC addresses currently in the forwarding database.
Total MAC Addresses available Number of MAC addresses the forwarding database can handle.
Parameter Description
rising threshold The percentage of CPU resources that, when exceeded for the configured rising interval, triggers a notification.
The range is 1 to 100. The default is 0 (disabled).
rising interval The duration of the CPU rising threshold violation, in seconds, that must be met to trigger a notification. The range
is 5 to 86400. The default is 0 (disabled).
falling threshold The percentage of CPU resources that, when usage falls below this level for the configured interval, triggers a
notification. The range is 1 to 100. The default is 0 (disabled).
A notification is triggered when the total CPU utilization falls below this level for a configured period of time. The
falling utilization threshold notification is made only if a rising threshold notification was previously done. The
falling utilization threshold must always be equal or less than the rising threshold value. The CLI does not allow
setting the falling threshold to be greater than the rising threshold.
falling interval The duration of the CPU falling threshold, in seconds, that must be met to trigger a notification. The range is 5 to
86400. The default is 0 (disabled).
Parameter Description
ID The application identifier.
Name The name that identifies the process.
PID The number the software uses to identify the process.
Parameter Description
Admin Status The administrative status of the process.
Auto Restart Indicates whether the process will automatically restart if it stops.
Running Status Indicates whether the process is currently running or stopped.
Example: The following shows example CLI display output for the command.
Admin Auto Running
ID Name PID Status Restart Status
---- ---------------- ----- --------- --------- -------
1 dataplane 15309 Enabled Disabled Running
2 switchdrvr 15310 Enabled Disabled Running
3 syncdb 15314 Enabled Disabled Running
4 lighttpd 18718 Enabled Enabled Running
5 syncdb-test 0 Disabled Disabled Stopped
6 proctest 0 Disabled Enabled Stopped
7 user.start 0 Enabled Disabled Stopped
Parameter Description
PID The number the software uses to identify the process.
Process Name The name that identifies the process.
Application ID-Name The application identifier and its associated name.
Child Indicates whether the process has spawned a child process.
VM Size Virtual memory size.
VM Peak The maximum amount of virtual memory the process has used at a given time.
FD Count The file descriptors count for the process.
Example: The following shows example CLI display output for the command.
(Routing) #show process proc-list
Parameter Description
ID The application identifier.
Name The name that identifies the process.
PID The number the software uses to identify the process.
Memory Limit The maximum amount of memory the process can consume.
CPU Share The maximum percentage of CPU utilization the process can consume.
Memory Usage The amount of memory the process is currently using.
Max Mem Usage The maximum amount of memory the process has used at any given time since it started.
NOTE: It is not necessarily the traffic to the CPU, but different tasks that keep the CPU busy.
The following shows example CLI display output for the command using Linux.
(Switching) #show process cpu threshold
Memory Utilization Report
status bytes
------ ----------
free 106450944
alloc 423227392
CPU Utilization:
The command output displays the non-default option configured as part of the Section 5.23.8, dhcp l2relay trust no-option-
82 update command, in addition to the existing non-default configuration that each interface has.
NOTE: Show running-config does not display the user password, even if you set one different from the default.
The output is displayed in script format, which can be used to configure another switch with the same configuration. If the
optional scriptname is provided with a file name extension of .scr, the output is redirected to a script file.
NOTE:
If you issue the show running-config command from a serial connection, access to the switch through remote
connections (such as Telnet) is suspended while the output is being generated and displayed.
If you use a text-based configuration file, the show running-config command will only display configured
physical interfaces, that is, if any interface only contains the default configuration, that interface will be skipped
from the show running-config command output. This is true for any configuration mode that contains nothing
but default configuration. That is, the command to enter a particular config mode, followed immediately by its
exit command, are both omitted from the show running-config command output (and hence from the
startup-config file when the system configuration is saved.)
Key Action
Enter Advance one line.
Space Bar Advance one page.
q Stop the output and return to the prompt.
Note that --More-- or (q)uit is displayed at the bottom of the output screen until you reach the end of the output.
If all the flags in a particular group are enabled, then the command displays trapflags group name all.
If some, but not all, of the flags in that group are enabled, the command displays trapflags groupname flag-name.
The show running-config [interface slot/port] command output displays the non-default option configured as part
of the Section 5.23.8, dhcp l2relay trust no-option-82 update command, in addition to the existing non-default configuration
that each interface has.
Parameter Description
interface Running configuration for the specified interface.
lag-intf-num Running configuration for the LAG interface.
loopback-id Running configuration for the loopback interface.
tunnel-id Running configuration for the tunnel interface.
vlan-id Running configuration for the VLAN routing interface.
Parameter Description
interface Enter an interface in slot/port format.
lag Display the running config for a specified lag interface.
loopback Display the running config for a specified loopback interface.
tunnel Display the running config for a specified tunnel interface.
vlan Display the running config for a specified VLAN routing interface.
Example: The following shows example CLI display output for the command.
(Routing) #show running-config interface 0/1
!Current Configuration:
!
interface 0/1
addport 3/1
exit
(Routing) #
4.5.27 show
This command displays the content of text-based configuration files from the CLI. The text-based configuration files (startup-
config, backup-config and factory-defaults) are saved compressed in flash. With this command, the files are decompressed
while displaying their content.
Parameter Description
startup-config Display the content of the startup-config file.
backup-config Display the content of the backup-config file.
factory-defaults Display the content of the factory-defaults file.
Example: The following shows example CLI display output for the command using the startup-config parameter.
(Routing) #show startup-config
!Current Configuration:
!
!System Description "Quanta LB6M, 8.1.14.41, Linux 2.6.27.47, U-Boot 2009.06 (Apr 19 2011 - 15:57:06)"
!System Software Version "8.1.14.41"
!System Up Time "0 days 0 hrs 48 mins 19 secs"
!Cut-through mode is configured as disabled
!Additional Packages BGP-4,QOS,IPv6,IPv6 Management,Routing,Data Center
!Current System Time: Oct 14 05:42:12 2022
!
vlan database
vlan 10
exit
configure
ipv6 router ospf
exit
line console
exit
line telnet
exit
line ssh
exit
!
--More-- or (q)uit
interface 0/1
description 'intf1'
exit
router ospf
exit
exit
Example: The following shows example CLI display output for the command using the backup-config parameter.
(Routing) #show backup-config
!Current Configuration:
!
!System Description "Quanta LB6M, 8.1.14.41, Linux 2.6.27.47, U-Boot 2009.06 (Apr 19 2011 - 15:57:06)"
!System Software Version "8.1.14.41"
!System Up Time "0 days 0 hrs 48 mins 19 secs"
Parameter Description
Switch Description Text used to identify this switch.
System Name Name used to identify the switch.The factory default is blank. To configure the system name, see the snmp-
server command.
System Location Text used to identify the location of the switch. The factory default is blank. To configure the system location,
see the snmp-server command.
System Contact Text used to identify a contact person for this switch. The factory default is blank. To configure the system
location, see the snmp-server command.
System ObjectID The base object ID for the switch’s enterprise MIB.
System Up Time The time in days, hours, and minutes since the last switch reboot.
MIBs Supported A list of MIBs supported by this agent.
noMibs Displays system information excluding MIB information.
show sysinfo
show port all
show logging
show debugging
NOTE: The log messages are sorted and displayed in reverse chronological order.
Default 24
Format length value
Mode Line Config
Example: The following shows example CLI display output for the command.
(Routing) #show terminal length
Terminal Length:
----------------------
For Current Session………………….. 24
For Serial Console…………………… 24
For Telnet Sessions…………………... 24
For SSH Sessions…………………….. 24
Parameter Description
low-watermark When CPU free memory falls below this threshold, a notification message is triggered. The range is 1 to the
maximum available memory on the switch. The default is 0 (disabled).
Parameter Description
all Clears dynamically learned forwarding database entries in the forwarding database table.
vlan vlanId Clears dynamically learned forwarding database entries for this vlanId.
interface slot/port Clears forwarding database entries learned on for the specified interface.
macAddr macMask Clears dynamically learned forwarding database entries that match the range specified by MAC address and MAC
mask. When MAC mask is not entered, only specified MAC is removed from the forwarding database table.
Default none
Format clear mac-address-table notification
Mode Privileged EXEC
Parameter Description
history-size Configures the size of the MAC address table. The range is 1 to 255.
interval Configures the SNMP trap notification interval. The range is 1 to 2147483647.
Parameter Description
EULA offer The contents of the end-user license agreement offer.
Example: The following shows example CLI display output for the command.
Parameter Description
gpl The contents of the GPL license file.
Example: The following shows example CLI display output for the command.
(Routing) #show gpl
The GNU General Public License version 2
[Note: The Linux kernel is GPL v2 only. The other utilities we use are licensed
under GPLv2 or, at our option, any later version.]
Parameter Description
lgpl The contents of the LGPL license file.
Example: The following shows example CLI display output for the command.
Default enabled
Format logging buffered wrap
Mode Global Config
Default enabled
Format logging cli-command
Mode Global Config
Parameter Description
hostaddress|hostname The IP address of the logging host.
address-type Indicates the type of address being passed: DNS or IPv4.
tls Enables TLS security for the host.
anon|x509name The type of authentication mode: anonymous or x509name.
certificate-index The certificate number to be used for authentication. The valid range is 0 to 8. Index 0 is used to the
default file.
port A port number from 1 to 65535.
severitylevel Specify this value as either an integer from 0 to 7, or symbolically through one of the following
keywords: emergency (0), alert (1), critical (2), error (3), warning (4), notice
(5), info (6), or debug (7).
Parameter Description
hostindex Enter the Logging Host Index for which to change the IP address.
Default disable
Format logging persistent severity level
Mode Global Config
Default disabled
Format logging syslog [facility facility]
Mode Global Config
Default disabled
Format logging syslog port portid
Mode Global Config
Parameter Description
slot/port Specifies the port to use as the source interface.
Parameter Description
loopback-id Specifies the loopback interface to use as the source interface. The range of the loopback ID is 0 to 7.
tunnel-id Specifies the tunnel interface to use as the source interface. The range of the tunnel ID is 0 to 7.
vlan-id Specifies the VLAN to use as the source interface.
Default none
Format logging syslog vrf <vrf-name>
Mode Global Config
Default none
Format no logging syslog vrf
Mode Global Config
If you use the stop-on-full option, the switch stops logging into the USB flash drive once there is no free space. Otherwise,
if you use the overwrite-on-full option, even if the drive is full, the switch continues logging into the USB flash drive by
overwriting corresponding old log files. Setting the severity is optional, but severity configuration is allowed only if USB
logging mode is enabled.
Default By default, USB logging is enabled with overwrite-on-full option with notice severity.
Format logging usb {{overwrite-on-full | stop-on-full} [<severity>]} | <severity>
Mode Global Config
Parameter Description
overwrite-on-full Overwrite old logs when the USB drive is full.
stop-on-full Stop USB logging when the drive is full.
severity The logging severity level:
emergency|0
alert|1
critical|2
error|3
warning|4
notice|5
info|6
debug|7
Example: The following example enables USB logging with a different mode.
(Switching)(Config)#logging usb?
(Switching)(Config)#logging usb 6
(Switching)(Config)#
Example: The following example changes USB logging severity without enabling USB logging:
(Switching)(Config)#logging usb 7
Please enable USB logging mode before configuring USB logging severity.
Parameter Description
Logging Client Local Port Port on the collector/relay to which syslog messages are sent.
Logging Client USB File Name
Logging Client Source Interface Shows the configured syslog source-interface (source IP address).
Logging Client Source IPv4 Address
CLI Command Logging Shows whether CLI Command logging is enabled.
Logging Protocol The logging protocol version number.
0: RFC 3164
1: RFC 5424
Example: The following shows example CLI display output for the command.
(Routing) #show logging
Format show logging buffered {[start <time> <date>] [end <time> <date>]}
Mode Privileged EXEC
Parameter Description
time Expressed in a 24-hour clock, in the form of hours:minutes. For example, 8:00 is 8:00 a.m. and
20:00 is 8:00 p.m.
date Expressed in the format day month year.
Buffered (In-Memory) Logging Shows whether the In-Memory log is enabled or disabled.
Buffered Logging Wrapping Behavior The behavior of the In Memory log when faced with a log full situation.
Buffered Log Count The count of valid entries in the buffered log.
Example: The following shows example CLI display output for the command.
(Routing)#show logging buffered
Parameter Description
Host Index (Used for deleting hosts.)
IP Address / IP address or host name of the logging host.
Hostname
Severity Level The minimum severity to log to the specified address. The possible values are emergency (0), alert (1),
critical (2), error (3), warning (4), notice (5), info (6), or debug (7).
Port The server port number, which is the port on the local host from which syslog messages are sent.
Status Status field provides the current status of snmp row status (Active, Not in Service, Not Ready).
Mode The type of security: UDP or TLS.
Auth The type of authentication mode: anonymous or x509name.
Cert # The certificate number to be used for authentication. The valid range is 0 to 8. Index 0 is used to the default file.
Example: The following shows example CLI display output for the command.
(Routing) #show logging hosts
Index IP Address/Hostname Severity Port Status Mode
----- --------------------- ---------- ------ --------- -----
1 1.1.1.17 critical 514 Active udp
2 10.130.191.90 debug 10514 Active tls
3 5.5.5.5 debug 333 Active tls
Auth Cert#
-------- -----
x509name 6
x509name 4
Format show logging persistent {[start <time> <date>] [end <time> <date>]} [log-files
| previous] <cr>
Mode Privileged EXEC
Option Description
time Expressed in a 24-hour clock, in the form of hours:minutes. For example, 8:00 is 8:00 a.m. and 20:00 is 8:00 p.m.
date Expressed in the format day month year.
none Display persistent log entries.
log-files Display the list of persistent log files existing in the system.
previous Display persistent log entries from the last reboot.
Example: The following shows example CLI display output for the command.
(Switching) #show logging persistent
Persistent Logging : disabled
Persistent Log Count: 0
slog0.txt
slog1.txt
slog2.txt
olog0.txt
olog1.txt
olog2.txt
Parameter Description
Number of Traps Since Last Reset The number of traps since the last boot.
Trap Log Capacity The number of traps the system can retain.
Number of Traps Since Log Last Viewed The number of new traps since the command was last executed.
Log The log number.
System Time Up How long the system had been running at the time the trap was sent.
Trap The text of the trap message.
Default disabled; when enabled, log messages at or above severity Warning (4) are emailed
Format logging email [severitylevel]
Mode Global Config
Default Alert (1) and emergency (0) messages are sent immediately.
Format logging email urgent {severitylevel | none}
Mode Global Config
Default [email protected]
Format logging email from-addr from-email-addr
Mode Global Config
Default 30 minutes
Format logging email logtime minutes
Mode Global Config
This command sets the severity at which SNMP traps are logged and sent in an email. Specify the severitylevel value as
either an integer from 0 to 7 or symbolically through one of the following keywords: emergency (0), alert (1), critical (2),
error (3), warning (4), notice (5), info (6), or debug (7).
Format logging email test message-type {urgent |non-urgent |both} message-body message-body
Mode Global Config
Parameter Description
Email Alert Logging The administrative status of the feature: enabled or disabled
Email Alert From Address The email address of the sender (the switch).
Email Alert Urgent Severity Level The lowest severity level that is considered urgent. Messages of this type are sent immediately.
Email Alert Non Urgent Severity Level The lowest severity level that is considered non-urgent. Messages of this type, up to the urgent
level, are collected and sent in a batch email. Log messages that are less severe are not sent
in an email message at all.
Parameter Description
Email Alert Trap Severity Level The lowest severity level at which traps are logged.
Email Alert Notification Period The amount of time to wait between non-urgent messages.
Email Alert To Address Table The configured email recipients.
Email Alert Subject Table The subject lines included in urgent (Type 1) and non-urgent (Type 2) messages.
For Msg Type urgent, subject is The configured email subject for sending urgent messages.
For Msg Type non-urgent, subject is The configured email subject for sending non-urgent messages.
Parameter Description
Email Alert Operation Status The operational status of the email alerting feature.
No of Email Failures The number of email messages that have attempted to be sent but were unsuccessful.
No of Email Sent The number of email messages that were sent from the switch since the counter was cleared.
Time Since Last Email Sent The amount of time that has passed since the last email was sent from the switch.
4.7.12 mail-server
This command configures the SMTP server to which the switch sends email alert messages and changes the mode to Mail
Server Configuration mode. The server address can be in the IPv4 or DNS name format.
4.7.12.0.1 no mail-server
This command removes the specified SMTP server from the configuration.
4.7.13 security
This command sets the email alerting security protocol by enabling the switch to use TLS authentication with the SMTP
Server. If the TLS mode is enabled on the switch but the SMTP sever does not support TLS mode, no email is sent to the
SMTP server.
Default none
Format security {tlsv1 | none}
Mode Mail Server Config
Default 25
Format port {465 | 25 | 1–65535}
Mode Mail Server Config
Default admin
Format username name
Mode Mail Server Config
Default admin
Format password password
Mode Mail Server Config
Parameter Description
No of mail servers configured The number of SMTP servers configured on the switch.
Email Alert Mail Server Address The IPv4 address or DNS host name of the configured SMTP server.
Parameter Description
Email Alert Mail Server Port The TCP port the switch uses to send email to the SMTP server.
Email Alert Security Protocol The security protocol (TLS or none) the switch uses to authenticate with the SMTP server.
Email Alert Username The user name the switch uses to authenticate with the SMTP server.
Email Alert Password The password the switch uses to authenticate with the SMTP server.
The clear config interface command clears the configuration only for commands issued in Interface Config mode.
Interface-related commands which were not issued in Interface Config mode, such as enabling routing on a VLAN interface,
cannot be cleared using this command
Format clear config interface {slot/port | lag lag_id | vlan vlan_id | loopback loopback_id}
Mode Privileged EXEC
4.8.11 logout
This command closes the current telnet connection or resets the current serial connection.
Format logout
Modes Privileged EXEC
User EXEC
4.8.12 ping
Use this command to determine whether another computer is on the network. Ping provides a synchronous response when
initiated from the CLI interface.
Using the options described in the following table, you can specify the number and size of Echo Requests and the interval
between Echo Requests.
Parameter Description
vrf-name The name of the virtual router from which to initiate the ping. Only hosts reachable from within the VRF instance
can be pinged. If a source parameter is specified in conjunction with a vrf parameter, it must be a member of
the vrf. If no virtual router is specified, the ping is initiated in the default router instance.
address IPv4 or IPv6 addresses to ping.
Parameter Description
count Use the count parameter to specify the number of ping packets (ICMP Echo requests) that are sent to the
destination address specified by the ip-address field. The range for count is 1 to 15 requests.
interval Use the interval parameter to specify the time between Echo Requests, in seconds. Range is 1 to 60 seconds.
size Use the size parameter to specify the size, in bytes, of the payload of the Echo Requests sent. Range is 0 to
65507 bytes.
source Use the source parameter to specify the source IP/IPv6 address or interface to use when sending the Echo
requests packets.
hostname Use the hostname parameter to resolve to an IPv4 or IPv6 address. The ipv6 keyword is specified to resolve
the host name to IPv6 address. The IPv4 address is resolved if no keyword is specified.
ipv6 The optional keyword ipv6 can be used before the ipv6-address or hostname argument. Using the ipv6
optional keyword before hostname tries to resolve it directly to the IPv6 address. Also used for pinging a
link-local IPv6 address.
interface Use the interface keyword to ping a link-local IPv6 address over an interface.
link-local-address The link-local IPv6 address to ping over an interface.
outgoing-interface Use the outgoing-interface parameter to specify the outgoing interface for multicast IP/IPv6 ping.
4.8.13 quit
This command closes the current telnet connection or resets the current serial connection. The system asks you whether to
save configuration changes before quitting.
Format quit
Modes Privileged EXEC
User EXEC
4.8.14 reload
This command resets the switch without powering it off. Reset means that all network connections are terminated and the
boot code executes. The switch uses the stored configuration to initialize the switch. You are prompted to confirm that the
reset should proceed. The LEDs on the switch indicate a successful reset.
If ONIE is installed, the os parameter is added to the reload command. This parameter enables the user to boot back into
ONIE.
Parameter Description
warm When the Warm Reload feature is present, the reload command adds the warm option. This option reduces the
time it takes to reboot a Linux switch, thereby reducing the traffic disruption in the network during a switch reboot.
For a typical Linux Enterprise switch, the traffic disruption is reduced from about two minutes for a cold reboot to
about 20 seconds for a warm reboot.
NOTE: The Warm Reload starts only the application process. The Warm Reload does not restart the boot code,
the Linux kernel and the root file system. Since the Warm Reload does not restart all components, some code
upgrades require that customers perform a cold reboot.
NOTE: Warm resets can only be initiated by the administrator and do not occur automatically.
configuration Gracefully reloads the configuration. If no configuration file is specified, the startup-config file is loaded.
scriptname The configuration file to load. The scriptname must include the extension.
4.8.15 dying-gasp
Use this command to allow a dying-gasp notification to be sent through Syslog or Ethernet-OAM when the switch loses
power or resets abruptly. The switch reset might be due to an unexpected software failure, a LOG_ERROR, or a user-
triggered switch reload. The Dying Gasp feature also notifies dying gasp events as SNMP trap to the trap receiver
The ability to send a dying-gasp notification on loss of power depends on the platform hardware capability. The switch
hardware must be able to supply back power for approximately 300 ms to send the dying gasp notification after the abrupt
power loss or reset occurs.
Parameter Description
primary Dying Gasp primary notification
secondary Dying Gasp secondary notification
ethernet-oam Enable Ethernet-OAM notification
syslog Enable system logger
snmptrap Enable SNMP trap notification
4.8.15.0.1 no dying-gasp
This command disables the sending of dying gasp notifications.
Format no dying-gasp
Mode Global Config
Parameter Description
Dying Gasp Primary Mode Identifies the primary notification mode, which can be one of the following:
Syslog
Ethernet-OAM
SnmpTrap
Dying Gasp Secondary Mode Identifies the secondary notification mode, which can be one of the following:
Syslog
Ethernet-OAM
SnmpTrap
4.8.17 copy
The copy command uploads and downloads files to and from the switch. You can also use the copy command to manage
the dual images (active and backup) on the file system. Upload and download files from a server using FTP, TFTP,
Xmodem, Ymodem, or Zmodem. SFTP and SCP are available as additional transfer methods if the software package
supports secure management. If FTP is used, a password is required. CLI-based file transfers using the HTTP and HTTPS
protocols are supported on selected platforms where a native wget utility is available.
Format copy source destination [vrf vrf-name] [source option] [{verify | noverify}]
[checkcert | nocheckcert]
Mode Privileged EXEC
Replace the source and destination parameters with the options in Table 9, Copy Parameters. For the url source or
destination, use one of the following values:
{xmodem | tftp://ipaddr|hostname | ip6address|hostname/filepath/filename [noval]| sftp|scp://
username@ipaddr | ipv6address/filepath/filename | ftp://user@ipaddress | hostname/filepath/filename}
| http://{user@}ipaddr|hostname/filepath/filename | https://{user@}ipaddr|hostname/filepath/
filename}
The optional vrf vrf-name parameter specifies the VRF instance through which the remote location (upload-destination/
download-source) needs to be reached for the copy command. If the source option is selected along with this option then
the interface needs to be part of the specified VRF instance for the copy operation to succeed. This option is supported for
SCP, SFTP, FTP, TFTP, HTTP and HTTPS protocols. When the user selects the VRF option for these protocols, the transfer
operation takes place within the specified VRF instance, otherwise, it happens in the default VRF instance.
The optional source option parameters specify the source-interface or source IP address for the copy command. The
selected source-interface IP address is used for filling the IP header of management protocol packets (SCP, SFTP and
TFTP). This allows security devices (firewalls) to identify the source packets coming from the specific switch. If a source-
interface is not specified, the primary IP address of the originating (outbound) interface (within the VRF instance if VRF is
specified) is used as source address. When the user selects the source interface for SCP, SFTP, TFTP applications, it
(re)binds the interface source IP address with the server. The source interface is not supported for HTTP/HTTPS protocols.
verify | noverify is only available if the image/configuration verify options feature is enabled (see the file verify command).
verify specifies that digital signature verification will be performed for the specified downloaded image or configuration file.
noverify specifies that no verification will be performed.
For HTTPS transfers, the [checkcert | nocheckcert] options are available to enable or disable server certificate
validation. This option is valid only for HTTPS file transfer. If no option is specified, default action is applied for HTTPS file
transfer.
The keyword ias-users supports the downloading of the IAS user database file. When the IAS users file is downloaded,
the switch IAS user’s database is replaced with the users and its attributes available in the downloaded file. In the command
copy url ias-users, for url one of the following is used for IAS users file:
{ { tftp://<ipaddr | hostname> | <ipv6address | hostname> /<filepath>/<filename> } | { sftp | scp:/
/<username>@<ipaddress>/<filepath>/<filename>} }
NOTE: The maximum length for the file path is 160 characters, and the maximum length for the file name is 31 characters.
For FTP, TFTP, SFTP and SCP, the ipaddr|hostname parameter is the IP address or host name of the server, filepath is
the path to the file, and filename is the name of the file you want to upload or download. For SFTP and SCP, the username
parameter is the user name for logging into the remote server using SSH.
NOTE: ip6address is also a valid parameter for routing packages that support IPv6.
To copy OpenFlow SSL certificates to the switch using TFTP or XMODEM, using only the following options pertinent to the
OpenFlow SSL certificates.
CAUTION! Remember to upload the existing fastpath.cfg file off the switch prior to loading a new release image to
make a backup.
Example: The following shows an example of downloading and applying ias-users file.
(Routing) #copy tftp://10.131.17.104/aaa_users.txt ias-users
Mode........................................... TFTP
Example: The following shows an example of the command to copy running config to a remote system URL for
upload operation.
(Routing) #copy system:running-config tftp://10.89.105.143/run-cfg
Mode........................................... TFTP
Set Server IP.................................. 10.89.105.143
Path........................................... ./
Filename....................................... run-cfg
Data Type...................................... Text Configuration
Source Filename................................ running-config
File transfer in progress. Management access will be blocked for the duration of the transfer. Please
wait...
(Routing)#
Example: The following shows an example of downloading a license file in a specific index.
(dhcp-10-130-84-117) #copy scp://[email protected]/license.dat nvram:license-key 2
Remote Password:**********
Mode........................................... SCP
Set Server IP.................................. 10.89.25.12
Path........................................... ./
Filename....................................... license.dat
Data Type...................................... license
File transfer in progress. Management access will be blocked for the duration of the transfer. Please
wait...
Warning: Identity file /mnt/fastpath/ssh_host_key not accessible: No such file or directory.
+---------------------------------------------------------------------------+
| Authorized Use Only. Use of this system must be in accordance with |
| our Acceptable Use Policy located at http://accept-use.broadcom.com. |
| Activity on this system is subject to monitoring and logging. |
+---------------------------------------------------------------------------+
Example: The following shows an example of making a backup of a license file of a specific index.
(localhost) # copy nvram:license-key 1 scp://[email protected]/ license1.dat
Example: The following shows an example of the command to copy running config to a remote system URL through
VRF red.
(Routing) #copy system:running-config tftp://10.89.105.143/run-cfg vrf red
Mode........................................... TFTP
Set Server IP.................................. 10.89.105.143
Path........................................... ./
Filename....................................... run-cfg
Data Type...................................... Text Configuration
Source Filename................................ running-config
Management access will be blocked for the duration of the transfer
Are you sure you want to start? (y/n) y
File transfer in progress. Management access will be blocked for the duration of the transfer. Please
wait...
File transfer operation completed successfully.
(Routing)#
The source and destination parameters are shown in the following table.
Source Destination
sourceURL {<download url>}
destinationURL {<upload url>}
NOTE: This command is available only when the image/configuration verify options feature is enabled.
Default none
Parameter Description
All Verifies the digital signature of both image and configuration files.
Image Verifies the digital signature of image files only.
None Disables digital signature verification for both images and configuration files.
Config Verifies the digital signature of configuration files.
Parameter Description
active Specifies an active image file that needs verification.
backup Specifies an backup image file that needs verification.
To allow the SCP file transfers from the host system to the EFOS switch, the SCP server must be enabled on the switch.
Default disabled
Format ip scp server enable
Mode Privileged EXEC
The transfer is initiated using the CLI on the host system, and not from the EFOS CLI. The following examples show the
syntax for SCP push commands executed on a PC host for configuration and firmware images.
scp <config file> user@<scp server IP>:startup-config
scp <config file> user@<scp server IP>:backup-config
scp <config file> user@<scp server IP>:factory-defaults
Default disabled
Format ntp authenticate
Mode Global Config
(Routing)(Config)#ntp authenticate
Default disabled
Format no ntp authenticate
Mode Global Config
Default none
Format ntp authentication-key <key-number> <msg-auth-algorithm> [encrypted <key-name>]
Mode Global Config
Parameter Description
key-number The number for identifying an authentication key. The range is 1 to 4,294,967,295.
msg-auth-algorithm A selection of hashing algorithm for message authentication (MD5/SHA1/SHA256). The default is MD5.
key-name The encrypted key-value.
Default none
Format no ntp authentication-key <key-number>
Mode Global Config
Default none
Format ntp trusted-key <key-number> [,<key-number-list>]
Mode Global Config
Parameter Description
key-number The number for identifying an authentication key. The range is 1 to 4,294,967,295.
key-number-list The comma-separated list of authentication keys. The range is 1 to 4,294,967,295.
Example: The following is an example of the command designating one trusted key.
(Routing) #configure
(Routing)(Config)#ntp trusted-key 81
Example: The following is an example of the command designating multiple trusted keys.
(Routing) #configure
(Routing)(Config)#ntp trusted-key 1,5
Default none
Format no ntp trusted-key <key-number> [,<key-number-list>]
Mode Global Config
Example: The following is an example of the command removing one trusted key.
(Routing) #configure
(Routing)(Config)#no ntp trusted-key 81
Example: The following is an example of the command removing multiple trusted keys.
(Routing) #configure
(Routing)(Config)#no ntp trusted-key 1,5
Default none
Format ntp broadcast client
Mode Global Config
Default none
Format no ntp broadcast client
Mode Global Config
Parameter Description
microseconds The delay in microseconds. The range is 1 to 999,999.
Default none
Format ntp server <server-address> [version <number>] [key <key-id>] [minpoll <interval>]
[maxpoll <interval>] [prefer] [burst] [iburst]
Mode Global Config
Parameter Description
server-address Server address (IPv4 or IPv6), or hostname of the server, for this client to synchronize time. The hostname
range is 1 to 256 characters.
version number The protocol version. The default is 4. The range is 1 to 4.
key key-id Authentication key. The key-id range is 1 to 4,294,967,295.
minpoll interval Minimum polling interval in seconds as a power of 2. The range is 4 to 17, which in seconds is 16 seconds
to 131,072 seconds. The default is 64 seconds.
maxpoll interval Maximum polling interval in seconds as a power of 2. The range is 4 to 17, which in seconds is 16 seconds
to 131,072 seconds. The default is 1024 seconds.
prefer Preference status for this server. A value of true indicates this server is preferred in server selection.
burst Sends a series of packets instead of a single packet within each synchronization interval to achieve faster
synchronization.
iburst Same as burst but applicable during initial synchronization.
Default none
Format no ntp server <server-address>
Mode Global Config
Default none
Format ntp source-interface <interface-name>
Mode Global Config
Default none
Format ntp source-interface
Mode Global Config
Default none
Format ntp vrf <vrf-name>
Mode Global Config
Parameter Description
vrf-name The name of an existing VRF name.
(Routing) #configure
(Routing)(Config)#ntp vrf mgmt
Default none
Format no ntp vrf
Mode Global Config
Default none
Format show ntp
Mode User EXEC
Parameter Description
Admin Mode The client mode: disabled, unicast, or broadcast.
Authentication Mode NTP authentication is enabled or disabled.
Broadcast Delay The delay in microseconds (the delay in receiving broadcast packets from the server).
Source Interface Source interface used in NTP client communication with the server.
Source IPv4 Address IPv4 address when not null.
Source IPv6 Address IPv6 address when not null.
VRF Name The VRF instance the client is associated with.
Example: The following shows example display output for the command.
(Routing) #show ntp
(Routing) #
Default none
Format show ntp authentication-keys
Mode User EXEC
The following table describes the significant fields shown in the display.
Parameter Description
Key Id The specified authentication key.
Key Value The configured key value (encrypted).
Message Authentication Algorithm MD5, SHA1, or SHA2.
Trusted Yes or No.
Example: The following shows example display output for the command.
(Routing) #show ntp authentication-keys
Key Id ........................................ 1
Key Value ..................................... 66f7e003db45a5f4688fd3a7ee7112df
Message Authentication Algorithm .............. md5
Trusted ....................................... Yes
Key Id ........................................ 2
Key Value ..................................... 66f7e003db45a5f4688fd3a7ee7112df
Message Authentication Algorithm .............. md5
Trusted ....................................... No
Default none
Format show ntp servers
Mode User EXEC
The following table describes the significant fields shown in the display.
Parameter Description
Address Server IP address.
Version Protocol version.
Key Id Authentication key.
Minimum Poll Interval Minimum polling interval in seconds as a power of 2.
Maximum Poll Interval Maximum polling interval in seconds as a power of 2.
Prefer The preference status for this server in the selection algorithm.
Burst If true, a series of packets are sent instead of a single packet.
Iburst If true, a series of packets are sent instead of a single packet during initial synchronization.
Example: The following shows example display output for the command.
(Routing) #show ntp servers
Address ....................................... 1.1.1.1
Version ....................................... 4
Key Id ........................................ NA
Minimum Poll Interval ......................... 6
Maximum Poll Interval ......................... 6
Prefer ........................................ No
Burst ......................................... No
Iburst ........................................ No
The following table describes the significant fields shown in the display.
Parameter Description
associd The association identifier.
status Status string with client protocol status.
leap indicator A 2-bit integer warning of an impeding leap second to be inserted or deleted in the last minute of the current
month.
stratum An 8-bit integer indicating the stratum level of the local clock.
log2 precision The precision of the local clock, in seconds to the nearest power of two.
root delay The round trip delay to the reference clock.
root dispersion The dispersion to the reference clock.
reference ID The code identifying the particular server or reference clock.
Example: The following shows example display output for the command.
(Routing) #show ntp status
associd=0 status=c016 leap_alarm, sync_unspec, 1 event, restart,
system peer: 0.0.0.0:0
system peer mode: unspec
leap indicator: 11
stratum: 16
log2 precision: -22
root delay: 0.000
root dispersion: 2.835
reference ID
Default none
Format show ntp packets
Mode User EXEC
The following table describes the significant fields shown in the display.
Parameter Description
In packets The number of packets received by the client.
Out packets The number of packets transmitted by the client.
old version packets The number of packets that do not match the running version of the protocol.
protocol error packets The number of packets received that fail protocol validation checks.
Example: The following shows example display output for the command.
(Routing) #show ntp packets
Ntp In packets ................................ 0
Ntp Out packets ............................... 0
Ntp old version packets ....................... 0
Ntp protocol error packets .................... 0
Default none
Format show ntp associations [details|statistics]
Mode User EXEC
The following table describes the significant fields shown in the display.
Parameter Description
Assoc ID The association identifier.
Status Status string with client protocol status.
Leap indicator A 2-bit integer warning of an impeding leap second to be inserted or deleted in the last minute of the current
month.
Stratum An 8-bit integer indicating the stratum level of the local clock.
Precision The precision of the local clock, in seconds to the nearest power of two.
Root delay The round trip delay to the reference clock.
Root dispersion The dispersion to the reference clock.
Reference ID The code identifying the particular server or reference clock.
Example: The following shows example display output for the command.
(Routing)(Config)#show ntp associations
remote refid st t when poll reach delay offset jitter
=====================================================
10.52.146.147 .INIT. 16 u - 64 0 0.000 +0.000 0.000
Example: The following shows example display output for the command per association details.
(Routing)(Config)#show ntp associations details
Example: The following shows example display output for the command per association statistics.
(Routing)(Config)#show ntp associations statistics
Default none
Format show ntp information
Mode User EXEC
Example: The following shows example display output for the command.
(Routing) #show ntp information
Ntp Software Name : ntpd
Ntp Software Version : ntpd [email protected]
Ntp Software Vendor : FASTPATH
Ntp System Type : Linux/4.15.18-d60bb35b
(Routing) #
NOTE: System time and date cannot be set when SNTP is enabled. If SNTP is enabled after you configure the system
time and date, the SNTP clock takes precedence over the user-configured system time and date. If the platform
supports real-time clock (RTC), the set time and date can be retained after a save and reload. Otherwise, the
configured clock will not be retained across reloads.
Parameter Description
hh Hours in 24-hour format. The range is 0 to 23.
mm Minutes, the range is 0 to 59.
ss Seconds, the range is 0 to 59.
mm Month, in 2-character numeric format. The range is 01 to 12.
dd Day, in 2-character numeric format. The range is 01 to 31.
yyyy Year, in 4-character numeric format. The range is 2010 to 2079.
Format clock summer-time date {date month year hh:mm date month year hh:mm}[offset offset]
[zone acronym]
Mode Global Config
Parameter Description
date Day of the month. The range is 1 to 31.
month Month. The range is the first three letters by name (for example, Jan).
year Year. The range is 2000 to 2097.
hh:mm Time in 24-hour format in hours and minutes. hh range is 0 to 23, mm range is 0 to 59.
offset The number of minutes to add during the summertime. The range is 1 to 1440.
acronym The acronym for the time zone to be displayed when summertime is in effect. The range is up to four characters.
Format clock summer-time recurring {week day month hh:mm week day month hh:mm}[offset offset]
[zone acronym]
Mode Global Config
Parameter Description
EU The system clock uses the standard recurring summer time settings used in countries in the European Union.
USA The system clock uses the standard recurring daylight saving time settings used in the United States.
week Week of the month. Range is 1 to 5, first, last.
day Day of the week. The range is the first three letters by name; sun, for example.
month Month. The range is the first three letters by name; jan for example.
hh:mm Time in 24-hour format in hours and minutes. hh range is 0 to 23, mm range is 0 to 59.
offset The number of minutes to add during the summertime. The range is 1 to 1440.
acronym The acronym for the time zone to be displayed when summertime is in effect. The range is up to four characters.
Parameter Description
hours Hours difference from UTC. The range is –12 to 14.
minutes Minutes difference from UTC. The range is zero (0) to 59.
acronym The acronym for the time zone. The range is up to four characters.
Example: The following shows example CLI display output for the command.
(Routing) # show clock
15:02:09 (UTC+0:00) Nov 1 2011
No time source
Example: With the preceding configuration, the following output appears.
(Routing) # show clock
Example: The following shows example CLI display output for the command.
(Routing) # show clock detail
Time zone:
Acronym not configured
Offset is UTC+0:00
Summertime:
Summer-time is disabled
Example: With the preceding configuration, the following output appears.
(Routing) # show clock detail
Time zone:
Acronym is INDA
Offset is UTC+5:30
Summertime:
Acronym is INDA
Recurring every year
Begins on second Sunday of Nov at 03:18
Ends on second Monday of Nov at 03:18
Offset is 120 minutes
Default none
Format ip dhcp pool name
Mode Global Config
4.11.2 client-identifier
This command specifies the unique identifier for a DHCP client. Unique-identifier is a valid notation in hexadecimal format.
In some systems, such as Microsoft DHCP clients, the client identifier is required instead of hardware addresses. The
unique-identifier is a concatenation of the media type and the MAC address. For example, the Microsoft client identifier for
Ethernet address c819.2488.f177 is 01c8.1924.88f1.77 where 01 represents the Ethernet media type. For more information,
refer to the Address Resolution Protocol Parameters section of RFC 1700, Assigned Numbers for a list of media type codes.
Default none
Format client-identifier uniqueidentifier
Mode DHCP Pool Config
4.11.2.0.1 no client-identifier
This command deletes the client identifier.
Format no client-identifier
Mode DHCP Pool Config
4.11.3 client-name
This command specifies the name for a DHCP client. Name is a string consisting of standard ASCII characters.
Default none
Format client-name name
Mode DHCP Pool Config
4.11.3.0.1 no client-name
This command removes the client name.
Format no client-name
Mode DHCP Pool Config
4.11.4 default-router
This command specifies the default router list for a DHCP client. {address1, address2… address8} are valid IP
addresses, each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid.
Default none
Format default-router address1 [address2....address8]
Mode DHCP Pool Config
4.11.4.0.1 no default-router
This command removes the default router list.
Format no default-router
Mode DHCP Pool Config
4.11.5 dns-server
This command specifies the IP servers available to a DHCP client. Address parameters are valid IP addresses; each made
up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid.
Default none
Format dns-server address1 [address2....address8]
Mode DHCP Pool Config
4.11.5.0.1 no dns-server
This command removes the DNS Server list.
Format no dns-server
Mode DHCP Pool Config
4.11.6 hardware-address
This command specifies the hardware address of a DHCP client. Hardware-address is the MAC address of the hardware
platform of the client consisting of 6 bytes in dotted hexadecimal format. Type indicates the protocol of the hardware platform.
It is 1 for 10 MB Ethernet and 6 for IEEE 802.
Default ethernet
Format hardware-address hardwareaddress type
4.11.6.0.1 no hardware-address
This command removes the hardware address of the DHCP client.
Format no hardware-address
Mode DHCP Pool Config
4.11.7 host
This command specifies the IP address and network mask for a manual binding to a DHCP client. address and mask are
valid IP addresses; each made up of four decimal bytes ranging from 0 to 255. IP address 0.0.0.0 is invalid. The
prefix-length is an integer from 0 to 32.
Default none
Format host address [{mask | prefix-length}]
Mode DHCP Pool Config
4.11.7.0.1 no host
This command removes the IP address of the DHCP client.
Format no host
Mode DHCP Pool Config
4.11.8 lease
This command configures the duration of the lease for an IP address that is assigned from a DHCP server to a DHCP client.
The overall lease time should be between 1-86400 minutes. If you specify infinite, the lease is set for 60 days. You can
also specify a lease duration. days is an integer from 0 to 59. hours is an integer from 0 to 23. minutes is an integer from 0
to 59.
Default 1 (day)
Format lease [{days [hours] [minutes] | infinite}]
Mode DHCP Pool Config
4.11.8.0.1 no lease
This command restores the default value of the lease time for DHCP server.
Format no lease
Mode DHCP Pool Config
Default none
Format network networknumber [{mask | prefixlength}]
Mode DHCP Pool Config
4.11.9.0.1 no network
This command removes the subnet number and mask.
Format no network
Mode DHCP Pool Config
4.11.10 ntp
Use this command to configure two NTP servers in a DHCP pool in the boot process of a DHCP client. The argument
specifies the IP addresses of the Network Time Protocol Server.
Default none
Format ntp <ip-address1> <ip-address2>
Mode DHCP Pool Config
Parameter Description
ip-address1 NTP Server 1
ip-address2 NTP Server 2
(localhost)(Config-dhcp-pool)#ntp 192.168.99.9
(localhost)(Config-dhcp-pool)#no ntp
Example: The following example configures the NTP servers.
(localhost) (Config)#ip dhcp pool Pool1
(localhost) (Config-dhcp-pool)#ntp 10.10.1.1 10.10.1.2
4.11.10.0.1 no ntp
Use the no form of the command to unconfigure the NTP server address.
Format no ntp
Mode DHCP Pool Config
4.11.11.0.1 no bootfile
This command deletes the boot image name.
Format no bootfile
Mode DHCP Pool Config
4.11.12 domain-name
This command specifies the domain name for a DHCP client. domain specifies the domain name string of the client.
Default none
Format domain-name domain
Mode DHCP Pool Config
4.11.12.0.1 no domain-name
This command removes the domain name.
Format no domain-name
Mode DHCP Pool Config
4.11.14 netbios-name-server
This command configures NetBIOS Windows Internet Naming Service (WINS) name servers that are available to DHCP
clients.
One IP address is required, although one can specify up to eight addresses in one command line. Servers are listed in order
of preference (address1 is the most preferred server, address2 is the next most preferred server, and so on).
Default none
Format netbios-name-server address1 [address2...address8]
Mode DHCP Pool Config
4.11.14.0.1 no netbios-name-server
This command removes the NetBIOS name server list.
Format no netbios-name-server
Mode DHCP Pool Config
4.11.15 netbios-node-type
The command configures the NetBIOS node type for Microsoft Dynamic Host Configuration Protocol (DHCP) clients. type
specifies the NetBIOS node type. Valid types are:
b-node—Broadcast
p-node—Peer-to-peer
m-node—Mixed
h-node—Hybrid (recommended)
Default none
Format netbios-node-type type
Mode DHCP Pool Config
4.11.15.0.1 no netbios-node-type
This command removes the NetBIOS node Type.
Format no netbios-node-type
Mode DHCP Pool Config
4.11.16 next-server
This command configures the next server in the boot process of a DHCP client.The address parameter is the IP address of
the next server in the boot process, which is typically a TFTP server.
4.11.16.0.1 no next-server
This command removes the boot server list.
Format no next-server
Mode DHCP Pool Config
4.11.17 option
The option command configures DHCP server options. The code parameter specifies the DHCP option code and ranges
from 1-254. The ascii string parameter specifies an NVT ASCII character string. ASCII character strings that contain
white space must be delimited by quotation marks. The hex string parameter specifies hexadecimal data. In hexadecimal,
character strings are two hexadecimal digits. You can separate each byte by a period (for example, a3.4f.22.0c), colon
(for example, a3:4f:22:0c), or white space (for example, a3 4f 22 0c).
Default none
Format option code {ascii string | hex string1 [string2...string8] | ip address1
[address2...address8]}
Mode DHCP Pool Config
4.11.17.0.1 no option
This command removes the DHCP server options. The code parameter specifies the DHCP option code.
Using this command, a DHCP pool is associated with a specific VRF instance. The interfaces belonging to a specific VRF
instance are allocated IP addresses from among the DHCP pools associated with this VRF instance only. If the given VRF
does not exist, the command fails and an error is displayed.
Default By default, all address pools are associated with the default VRF.
Format vrf <vrf-name>
Mode DHCP Pool Config
Parameter Description
vrf-name The VPN routing and forwarding (VRF) name.
Example: The following example associates DHCP server DHCP pool poolRed with VRF VrfRed.
(dhcp-10-130-187-64)#configure
(dhcp-10-130-187-64)(Config)# ip dhcp pool poolRed
(dhcp-10-130-187-64)(Config-dhcp-pool)#vrf VrfRed
(dhcp-10-130-187-64)(Config-dhcp-pool)#
4.11.18.0.1 no vrf
Use the no form of the command to disassociate the address pool from the currently associated VRF and associate it to the
default VRF.
Format no vrf
Mode DHCP Pool Config
Example: The following example disassociates DHCP server DHCP pool poolRed from VRF VrfRed.
(dhcp-10-130-187-64)#configure
(dhcp-10-130-187-64)(Config)# ip dhcp pool poolRed
(dhcp-10-130-187-64)(Config-dhcp-pool)#no vrf
(dhcp-10-130-187-64)(Config-dhcp-pool)#
Default none
Format ip dhcp excluded-address low-address [high-address]
Mode Global Config
Syntax Description
low-address The IP address (in dotted decimal notation) which, or starting with which, to exclude during address
allocation from default VRF instance.
high-address (Optional parameter). IP address (in dotted decimal notation) ending with which to exclude during
address allocation from default VRF instance.
Default none
Format ip dhcp excluded-address vrf vrf-name low-address [high-address]
Syntax Description
vrf-name The name of the VRF instance from which the given address or range of addresses are to be excluded
during address allocation.
low-address The IP address (in dotted decimal notation) which, or starting with which, to exclude during address
allocation from a given VRF instance.
high-address (Optional parameter). IP address (in dotted decimal notation) ending with which to exclude during
address allocation from a given VRF instance.
Example: The following example shows how to configure this command to exclude the IP address 10.10.10.1 to
10.10.10.3 during address allocation in the VRF instance red.
(config)# ip dhcp excluded-address vrf red 10.10.10.1 10.10.10.3
Default 2
Format ip dhcp ping packets 0,2-10
Mode Global Config
Default disabled
Format service dhcp
Mode Global Config
Default disabled
Format ip dhcp bootp automatic
Mode Global Config
Default none
Format ip dhcp class <name>
Mode Global Config
Parameter Description
name The DHCP class name.
Default none
Format relay agent information remote-id <remote-string> [circuit-id circuit-string]
Parameter Description
remote-string The remote ID configured in DHCP L2 Relay where the DHCP client is connected.
circuit-string The circuit ID is the interface number where the DHCP client is connected.
Example: The following example configures the DHCP class Option-82 parameters.
(Routing)#configure
(Routing)(Config)#ip dhcp class Class1
(Routing)(Config-dhcp-class)#relay agent information remote-id COACH1 circuit-id 1/0/13
(Routing)(Config-dhcp-class)#
Default none
Format class <name>
Mode DHCP Pool Config
Parameter Description
name The class to be associated with the DHCP pool.
Example: The following example associates the DHCP class to the pool.
(Routing)(Config)#ip dhcp pool Pool1
(Routing)(Config-dhcp-pool)#class Class1
(Routing)(Config-dhcp-pool-class)#
NOTE: All DHCP classes under a pool must have a unique IP address range. This ensures that every DHCP client gets a
unique IP address from a pool.
You can also configure only the start address (and not the end address). It implies a single IP address where the start and
the end addresses are the same.
Default none
Format address range <ip-address-start> [<ip-address-end>]
Mode Pool Class Config
Parameter Description
ip-address-start The start address in the DHCP class.
ip-address-end The end address in the DHCP class.
Example: The following example associates the DHCP class to the pool.
(localhost) (Config)#ip dhcp pool Pool1
(localhost) (Config-dhcp-pool)#network 1.2.3.0 24
(localhost) (Config-dhcp-pool)#class Class1
(localhost) (Config-dhcp-pool-class)#address range 1.2.3.4 1.2.3.10
Default enabled
Format ip dhcp conflict logging
Mode Global Config
Syntax Description
* This symbol represents all and is used as part of this command to convey that all bindings in all VRF instances (including
the default VRF) are to be deleted.
Syntax Description
address IP address (in dotted decimal notation) whose matching binding entry from the default VRF instance is
to be deleted.
Syntax Description
vrf-name The name of the VRF instance from which the binding entry matching the given address is to be deleted.
address IP address (in dotted decimal notation) whose matching binding entry from the default VRF instance is
to be deleted.
Syntax Description
vrf-name The name of the VRF instance from which the binding entry matching the given address is to be deleted.
Default none
Format clear ip dhcp conflict {address | *}
Mode Privileged EXEC
Parameter Description
IP address The IP address of the client.
Hardware Address The MAC Address or the client identifier.
Lease Expiry The lease expiration time of the IP address assigned to the client.
Type The manner in which IP address was assigned to the client.
Pool Name The associated pool-name information for each binding entry.
Example: The following example shows all the DHCP binding entries associated with the default VRF instance.
(dhcp-10-130-187-64)#show ip dhcp binding
Parameter Description
IP address The IP address (in dotted decimal notation) whose matching binding entry from the default VRF instance
is displayed.
Hardware Address The MAC Address or the client identifier.
Lease Expiry The lease expiration time of the IP address assigned to the client.
Type The manner in which IP address was assigned to the client.
Pool Name The associated pool-name information for each binding entry.
Example: The following example shows the DHCP binding information of IP address 4.4.4.2 belonging to the default
VRF instance.
dhcp-10-130-187-64)#show ip dhcp binding 4.4.4.2
Syntax Description
vrf-name The name of the VRF instance from which the binding entry matching the given address is displayed.
address The IP address (in dotted decimal notation) whose matching binding entry from the given VRF instance
is displayed.
Parameter Description
IP address The IP address (in dotted decimal notation) whose matching binding entry from the default VRF instance
is displayed.
Hardware Address The MAC Address or the client identifier.
Lease Expiry The lease expiration time of the IP address assigned to the client.
Type The manner in which IP address was assigned to the client.
Pool Name The associated pool-name information for each binding entry.
Example: The following example shows the DHCP binding information of IP address 9.9.9.10 belonging to VRF instance
red.
(dhcp-10-130-187-64)#show ip dhcp binding vrf red 9.9.9.10
Syntax Description
vrf-name The name of the VRF instance for which all associated binding entries are displayed.
Parameter Description
IP address The IP address (in dotted decimal notation) whose matching binding entry from the default VRF instance
is displayed.
Hardware Address The MAC Address or the client identifier.
Lease Expiry The lease expiration time of the IP address assigned to the client.
Type The manner in which IP address was assigned to the client.
Pool Name The associated pool-name information for each binding entry.
Example: The following example shows all the DHCP binding entries associated with the VRF instance red.
(dhcp-10-130-187-64)#show ip dhcp binding vrf red
Syntax Description
all This keyword is used as part of the command to convey that all bindings in all VRF instances (including
default VRF) have to be displayed.
Parameter Description
IP address The IP address (in dotted decimal notation) whose matching binding entry from the default VRF instance
is displayed.
Hardware Address The MAC Address or the client identifier.
Parameter Description
Lease Expiry The lease expiration time of the IP address assigned to the client.
Type The manner in which the IP address was assigned to the client.
Pool Name The associated pool-name information for each binding entry.
Example: The following example shows the DHCP binding entries for all VRF instances. Assume there is one
non-default VRF instance red, and assume that both default and non-default VRFs have two DHCP pools configured in
each VRF instance.
(dhcp-10-130-187-64)#show ip dhcp binding all
Parameter Description
Service DHCP The field to display the status of DHCP protocol.
Number of Ping The maximum number of ping packets that will be sent to verify that an IP address is not already assigned.
Packets
Conflict Logging Shows whether conflict logging is enabled or disabled.
BootP Automatic Shows whether BootP for dynamic pools is enabled or disabled.
Parameter Description
pool-name The name of the configured DHCP pool for which the DHCP pool configuration details are to be displayed.
Pool Type The pool type.
Lease Time The lease expiration time of the IP address assigned to the client.
NTP Server The configured NTP server.
DNS Servers The list of DNS servers available to the DHCP client.
Default Routers The list of the default routers available to the DHCP client
Class DHCP classes associated with a DHCP pool.
IP Range From The start address for a DHCP class that is associated with a DHCP pool.
IP Range To The end address for a DHCP class that is associated with a DHCP pool.
Parameter Description
Network The network number and the mask for the DHCP address pool.
The following additional fields are displayed for Manual pool type:
Parameter Description
Client Name The name of a DHCP client.
Client Identifier The unique identifier of a DHCP client.
Hardware Address The hardware address of a DHCP client.
Hardware Address The protocol of the hardware platform.
Type
Host The IP address and the mask for a manual binding to a DHCP client.
Example: The following example shows the DHCP pool configuration for all the pools configured. Assume there are
three DHCP pools configured with the names poolRed, poolBlue, and poolGreen.
(dhcp-10-130-187-64)#show ip dhcp pool configuration all
Pool: poolGreen
Pool Type...................................... Dynamic
Network........................................ 9.9.9.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
VRF Name....................................... Default
Pool: poolRed
Pool Type...................................... Dynamic
Network........................................ 8.8.8.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
VRF Name....................................... VrfRed
Pool: poolBlue
Pool Type...................................... Dynamic
Network........................................ 7.7.7.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
VRF Name....................................... VrfBlue
Example: The following example shows the DHCP pool configuration for the poolBlue.
(dhcp-10-130-187-64)#show ip dhcp pool configuration poolBlue
Pool: poolBlue
Pool Type...................................... Dynamic
Network........................................ 7.7.7.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
VRF Name....................................... VrfBlue
Example: The following examples show the DHCP pool configuration for all the pools configured or a specific pool.
(localhost) #show ip dhcp pool configuration all
Pool: Pool1
Pool Type...................................... Dynamic
Network........................................ 1.2.3.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
NTP Server..................................... 10.10.1.1
10.10.1.2
Class Binding:
Class: Class1
IP Range From................................ 1.2.3.4
IP Range To.................................. 1.2.3.10
Deny Lease................................... True
Bootfile..................................... COACH_R1.cfg
Pool: Pool2
Pool Type...................................... Dynamic
Network........................................ 2.3.4.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
NTP Server..................................... 20.20.20.1
20.20.20.2
Class Binding:
Class: Class2
IP Range From................................ 2.3.4.2
IP Range To.................................. 2.3.4.20
Pool: Pool1
Pool Type...................................... Dynamic
Network........................................ 1.2.3.0 255.255.255.0
Lease Time..................................... 1 days 0 hrs 0 mins
NTP Server..................................... 10.10.1.1
10.10.1.2
Class Binding:
Class: Class1
IP Range From................................ 1.2.3.4
IP Range To.................................. 1.2.3.10
Parameter Description
Automatic Bindings The number of IP addresses that have been automatically mapped to the MAC addresses of hosts that are found
in the DHCP database.
Expired Bindings The number of expired leases.
Malformed Bindings The number of truncated or corrupted messages that were received by the DHCP server.
Message Received.
Message Description
DHCP DISCOVER The number of DHCPDISCOVER messages the server has received.
DHCP REQUEST The number of DHCPREQUEST messages the server has received.
DHCP DECLINE The number of DHCPDECLINE messages the server has received.
DHCP RELEASE The number of DHCPRELEASE messages the server has received.
DHCP INFORM The number of DHCPINFORM messages the server has received.
Message Sent.
Message Description
DHCP OFFER The number of DHCPOFFER messages the server sent.
DHCP ACK The number of DHCPACK messages the server sent.
DHCP NACK The number of DHCPNACK messages the server sent.
Automatic Bindings............................. 0
Expired Bindings............................... 0
Malformed Bindings............................. 0
DHCP DISCOVER packets discarded................ 0
DHCP DISCOVER packets denied lease............. 0
Messages Received
---------- ----------
DHCP DISCOVER.................................. 0
DHCP REQUEST................................... 0
DHCP DECLINE................................... 0
DHCP RELEASE................................... 0
DHCP INFORM.................................... 0
Messages Sent
---------- ------
DHCP OFFER..................................... 0
DHCP ACK....................................... 0
DHCP NACK...................................... 0
Default none
Format show ip dhcp class configuration {all|<name>}
Mode Privileged EXEC
Parameter Description
name The DHCP class name.
Class Name Displays the class name configured.
Remote ID Displays the remote ID configured in the DHCP class.
Circuit ID Displays the circuit ID configured in the DHCP class.
Class: Class1
Remote ID Circuit ID
--------------------------------- ---------------------------------
COACH1 1/0/13
Parameter Description
IP address The IP address of the host as recorded on the DHCP server.
Detection Method The manner in which the IP address of the hosts were found on the DHCP server.
Detection time The time when the conflict was found.
Default enabled
Format ip domain lookup [vrf vrf-name]
Mode Global Config
Default none
Format ip domain name [vrf vrf-name] name
Mode Global Config
Example: The CLI command ip domain name yahoo.com will configure yahoo.com as a default domain name. For an
unqualified host name xxx, a DNS query is made to find the IP address corresponding to xxx.yahoo.com.
Default none
Format ip domain list [vrf vrf-name] name
Mode Global Config
4.12.4 ip name-server
Use this command to configure the available name servers. Up to eight servers can be defined in one command or by using
multiple commands. The parameter server-address is a valid IPv4 address of the server. The preference of the servers is
determined by the order they were entered. Use the optional vrf argument to configure a set of name servers within a VRF.
Parameter Description
slot/port Specifies the port to use as the source interface.
Parameter Description
loopback-id Specifies the loopback interface to use as the source interface. The range of the loopback ID is 0 to 7.
tunnel-id Specifies the tunnel interface to use as the source interface. The range of the tunnel ID is 0 to 7.
vlan-id Specifies the VLAN to use as the source interface.
4.12.6 ip host
Use this command to define static host name-to-address mapping in the host cache. The parameter name is host name and
ip address is the IP address of the host. The host name can include 1–255 alphanumeric characters, periods, hyphens,
underscores, and non-consecutive spaces. Host names that include one or more space must be enclosed in quotation
marks, for example “lab-pc 45”. Use the optional vrf argument to configure a static host name to address mapping within
a VRF.
Default none
Format ip host [vrf vrf-name] name ipaddress
Mode Global Config
4.12.6.0.1 no ip host
Use this command to remove the name-to-address mapping.
Parameter Description
name A particular host entry to remove. The parameter name ranges from 1-255 characters.
all Removes all entries.
Parameter Description
Host Name Domain host name.
Default Domain Default domain name.
Default Domain List Default domain list.
Domain Name Lookup DNS client enabled or disabled.
Number of Retries Number of time to retry sending Domain Name System (DNS) queries.
Retry Timeout Period Amount of time to wait for a response to a DNS query.
Parameter Description
Name Servers Configured name servers.
Example: The following shows example CLI display output for the command.
(Switching) show hosts
Host Addresses
------------------------------ ------------------------------
accounting.gm.com 176.16.8.8
Parameter Description
Address Conflict Detection Status Identifies whether the switch has detected an address conflict on any IP address.
Last Conflicting IP Address The IP Address that was last detected as conflicting on any interface.
Last Conflicting MAC Address The MAC Address of the conflicting host that was last detected on any interface.
Time Since Conflict Detected The time in days, hours, minutes and seconds since the last address conflict was detected.
CAUTION! The output of debug commands can be long and may adversely affect system performance.
remote capture
capture line
Parameter Description
all Capture all traffic.
receive Capture only received traffic.
transmit Capture only transmitted traffic.
Parameter Description
file In the capture file mode, the captured packets are stored in a file on NVRAM. The maximum file size defaults to
524288 bytes. The switch can transfer the file to a TFTP server using TFTP, SFTP, SCP using CLI, and SNMP.
The file is formatted in pcap format, is named cpuPktCapture.pcap, and can be examined using network analyzer
tools, such as Wireshark or Ethereal. Starting a file capture automatically terminates any remote capture sessions
and line capturing. After the packet capture is activated, the capture proceeds until the capture file reaches its
maximum size, or until the capture is stopped manually using the CLI command capture stop.
Parameter Description
remote In the remote capture mode, the captured packets are redirected in real time to an external PC running the
Wireshark tool for Microsoft Windows. A packet capture server runs on the switch side and sends the captured
packets using a TCP connection to the Wireshark tool.
The remote capture can be enabled or disabled using the CLI. There should be a Windows PC with the Wireshark
tool to display the captured file. When using the remote capture mode, the switch does not store any captured
data locally on its file system.
You can configure the IP port number for connecting Wireshark to the switch. The default port number is 2002. If
a firewall is installed between the Wireshark PC and the switch, then these ports must be allowed to pass through
the firewall. You must configure the firewall to allow the Wireshark PC to initiate TCP connections to the switch.
If the client successfully connects to the switch, the CPU packets are sent to the client PC, then Wireshark
receives the packets and displays them. This continues until the session is terminated by either end.
Starting a remote capture session automatically terminates the file capture and line capturing.
line In the capture line mode, the captured packets are saved into the RAM and can be displayed on the CLI. Starting
a line capture automatically terminates any remote capture session and capturing into a file. There is a maximum
128 packets of maximum 128 bytes that can be captured and displayed in Line mode.
Capturing packets is stopped automatically when 128 packets are captured and have not yet been displayed during a
capture session. Captured packets are not retained after a reload cycle.
NOTE: The offset should consider the VLAN tag headers as the packet to the CPU is always a tagged packet.
Default none
Format cpu-traffic direction {tx|rx|both} interface interface-range
Mode Global Config
NOTE: The offset should consider the VLAN tag headers as the packet to the CPU is always a tagged packet.
Default none
Format cpu-traffic direction {tx|rx|both} match cust-filter offset1 data1 [mask1 mask1]
offset2 data2 [mask2 mask2] offset3 data3 [mask3 mask3]
Mode Global Config
Format no cpu-traffic direction {tx|rx|both} match cust-filter offset1 data1 [mask1 mask1]
offset2 data2 [mask2 mask2] offset3 data3 [mask3 mask3]
Mode Global Config
Default none
Format cpu-traffic direction {tx|rx|both} match srcip ipaddress [mask mask]
Mode Global Config
Default none
Format cpu-traffic direction {tx|rx|both} match dstip ipaddress [mask mask]
Mode Global Config
Default none
Format cpu-traffic direction {tx|rx|both} match {srctcp|dsttcp} port [mask mask]
Default none
Format cpu-traffic direction {tx|rx|both} match {srcudp|dstudp} port [mask mask]
Mode Global Config
Default disabled
Format cpu-traffic mode
Mode Global Config
Default disabled
Format cpu-traffic trace {dump-pkt}
Mode Global Config
Default none
Format show cpu-traffic
Mode Privileged EXEC
Example:
(Routing) #show cpu-traffic
Direction TX:
Filter Options................................. N/A
Interface...................................... N/A
Src TCP parameters............................. 0 0
Dst TCP parameters............................. 0 0
Src UDP parameters............................. 0 0
Dst UDP parameters............................. 0 0
Src IP parameters.............................. 0.0.0.0 0.0.0.0
Dst IP parameters.............................. 0.0.0.0 0.0.0.0
Src MAC parameters............................. 00:00:00:00:00:00 00:00:00:00:00:00
Dst MAC parameters............................. 00:00:00:00:00:00 00:00:00:00:00:00
Custom filter parameters1...................... Offset=0x0 Value=0x0 Mask=0x0
Custom filter parameters2...................... Offset=0x0 Value=0x0 Mask=0x0
Custom filter parameters3...................... Offset=0x0 Value=0x0 Mask=0x0
Direction RX:
Filter Options................................. N/A
Interface...................................... N/A
Src TCP parameters............................. 0 0
Dst TCP parameters............................. 0 0
Default none
Format show cpu-traffic interface {all | slot/port | cpu } filter
Mode Privileged EXEC
Default none
Format show cpu-traffic summary
Mode Privileged EXEC
Example:
(Routing) #show cpu-traffic summary
Default none
Format show cpu-traffic trace filter
Mode Privileged EXEC
Example:
(Routing) #show cpu-traffic summary
Packet #1: IP; DHCP; UCAST; SRCMAC=00:10:10:10:10:10;
<08:06:10> Sysnet received in sysNetNotifyPduReceive()
<08:06:10> Packet delivered to IP using ipMapRecvIP()
<08:06:10> Freed
0000 00 10 18 82 18 b3 00 10 10 10 10 10 81 00 00 01 ................
0010 08 00 45 10 01 21 00 00 00 00 40 11 79 bd 00 00 [email protected]...
0020 00 00 ff ff ff ff 00 44 00 43 01 0d 48 10 03 01 .......D.C..H...
0030 06 00 18 85 4a 83 00 00 80 00 00 00 00 00 00 00 ....J...........
Default none
Format clear cpu-traffic {counters | traces}
Mode Global Config
Default disabled
Format debug arp [vrf vrf-name]
Mode Privileged EXEC
Default none
Format debug authentication packet {all | event} interface
Mode Privileged EXEC
Default disabled
Format debug auto-voip [H323|SCCP|SIP|oui]
Mode Privileged EXEC
Default disabled
Format debug clear
Mode Privileged EXEC
NOTE: The debug console command is used to direct debug data to a login session. The severity level of messages
appearing in the session is still decided by the console logging severity filter specified with the logging console
command.
Default disabled
Format debug console
Mode Privileged EXEC
Log status
Buffered logging
Event logging
Persistent logging
Default disabled
Format debug crashlog {[kernel] crashlog-number [upload url] | proc | verbose | deleteall}
Mode Privileged EXEC
Parameter Description
kernel View the crash log file for the kernel
crashlog-number Specifies the file number to view. The system maintains up to four copies, and the valid range is 1 to 4.
upload url To upload the crash log (or crash dump) to a TFTP server, use the upload keyword and specify the
required TFTP server information.
proc View the application process crashlog.
verbose Enable the verbose crashlog.
deleteall Delete all crash log files on the system.
data Crash log data recorder.
crashdump-number Specifies the crash dump number to view. The valid range is 0 to 2.
download url To download a crash dump to the switch, use the download keyword and specify the required TFTP
server information.
component-id The ID of the component that caused the crash.
item-number The item number.
additional-parameter Additional parameters to include.
Default disabled
Format debug crashlog kernel crashlog-number
Mode Privileged EXEC
Default disabled
Format debug crashlog kernel crashlog-number upload tftpaddress
Mode Privileged EXEC
Default disabled
Format debug dcbx packet {receive | transmit}
Mode Privileged EXEC
Default disabled
Format debug debug-config {download <url> | upload <url>}
Mode Privileged EXEC
Default disabled
Format debug dhcp packet [transmit | receive]
Mode Privileged EXEC
Default disabled
Default disabled
Format debug dynamic ports
Mode Privileged EXEC
Default disabled
Format debug fip-snooping packet [{transmit | receive | filter {dst-mac mac-addr |
fip-proto-code 1-15 | src-intf slot/port | src-mac mac-addr | vlan 1-4093}]
Mode User EXEC
Privileged EXEC
Parameter Description
dst-mac If the dst-mac filter option is given, trace output is filtered on matching the given Destination MAC Address.
fip-proto-code If the fip-proto-code filter option is given, trace output is filtered on matching the supported types.
src-intf If the src-intf filter option is given, trace output is filtered on matching the incoming source interface.
src-mac If the src-mac filter option is given, trace output is filtered on matching the given Source MAC Address.
vlan If the vlan filter option is given, trace output is filtered on matching the given VLAN ID.
Format no debug fip-snooping packet [{transmit | receive | filter {dst-mac mac-addr | fip-
proto-code 1-15 | src-intf slot/port | src-mac mac-addr | vlan 1-4093}]
Mode User EXEC
Privileged EXEC
Default disabled
Format debug igmpsnooping packet [transmit | receive]
Mode Privileged EXEC
Default disabled
Format debug igmpsnooping packet transmit
Mode Privileged EXEC
Parameter Description
TX A packet transmitted by the device.
Intf The interface that the packet went out on. Format used is slot/port (internal interface number). Unit is always
shown as 1 for interfaces on a non-stacking device.
Src_Mac Source MAC address of the packet.
Dest_Mac Destination multicast MAC address of the packet.
Src_IP The source IP address in the IP header in the packet.
Parameter Description
Dest_IP The destination multicast IP address in the packet.
Type The type of IGMP packet. Type can be one of the following:
Membership Query – IGMP Membership Query
V1_Membership_Report – IGMP Version 1 Membership Report
V2_Membership_Report – IGMP Version 2 Membership Report
V3_Membership_Report – IGMP Version 3 Membership Report
V2_Leave_Group – IGMP Version 2 Leave Group
Default disabled
Format debug igmpsnooping packet receive
Mode Privileged EXEC
Default disabled
Format debug ip acl acl Number
Mode Privileged EXEC
The debug options enabled for a specific peer are the union of the options enabled globally and the options enabled
specifically for the peer.
Enabling one of the packet type options enables packet tracing in both the inbound and outbound directions.
Parameter Description
peer-address (Optional) The IPv4 address of a BGP peer. Debug traces are enabled for a specific peer when this option is
specified. The command can be issued multiple times to enable simultaneous tracing for multiple peers.
events (Optional) Trace adjacency state events.
keepalives (Optional) Trace transmit and receive of KEEPALIVE packets.
notification (Optional) Trace transmit and receive of NOTIFICATION packets.
open (Optional) Trace transmit and receive of OPEN packets.
refresh (Optional) Traces transmit and receive of ROUTE REFRESH packets.
updates (Optional) Traces transmit and receive of UPDATE packets.
Default disabled
Format debug ip dvmrp packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ip igmp packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ip mcache packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ip pimdm packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ip pimsm packet [receive | transmit]
Mode Privileged EXEC
Parameter Description
vrf (Optional) Specify the VRF name for which the DHCPv6 debug needs to be enabled. If the VRF argument
is not used, the debug is enabled for the default router.
transmit (Optional) Enables debug tracing for only the transmitted DHCPv6 packets.
receive (Optional) Enables debug tracing for only the received DHCPv6 packets.
Example: The following shows an example of the command for transmit and receive flows for the default router.
(Routing) #debug ipv6 dhcp packet
Example: The following shows an example of the command for the transmit flow for the default router.
(Routing) #debug ipv6 dhcp packet transmit
Example: The following shows an example of the command for the receive flow for the default router.
(Routing) #debug ipv6 dhcp packet receive
Example: The following shows an example of the command for transmit and receive flows for the RED virtual router.
(Routing) #debug ipv6 dhcp packet vrf red
Example: The following shows an example of the command for the transmit flow for the RED virtual router.
Format debug ipv6 dhcp server packet [vrf <vrf-name>] [transmit | receive]
Mode Privileged EXEC
Parameter Description
vrf (Optional) Specify the VRF name for which the DHCPv6 debug needs to be enabled. If the VRF argument
is not used, the debug is enabled for the default router.
transmit (Optional) Enables debug tracing for only the transmitted DHCPv6 packets.
receive (Optional) Enables debug tracing for only the received DHCPv6 packets.
Example: The following shows an example of the command for transmit and receive flows for the default router.
(Routing) #debug ipv6 dhcp server packet
Example: The following shows an example of the command for the transmit flow for the default router.
(Routing) #debug ipv6 dhcp server packet transmit
Example: The following shows an example of the command for the receive flow for the default router.
(Routing) #debug ipv6 dhcp server packet receive
Example: The following shows an example of the command for transmit and receive flows for the RED virtual router.
(Routing) #debug ipv6 dhcp server packet vrf red
Example: The following shows an example of the command for the transmit flow for the RED virtual router.
(Routing) #debug ipv6 dhcp server packet transmit vrf red
Example: The following shows an example of the command for the receive flow for the RED virtual router.
(Routing) #debug ipv6 dhcp server packet receive vrf red
Format no debug ipv6 dhcp server packet [vrf <vrf-name>] [transmit | receive]
Mode Privileged EXEC
Format debug ipv6 dhcp relay packet [vrf <vrf-name>] [transmit | receive]
Mode Privileged EXEC
Parameter Description
vrf (Optional) Specify the VRF name for which the DHCPv6 debug needs to be enabled. If the VRF argument
is not used, the debug is enabled for the default router.
transmit (Optional) Enables debug tracing for only the transmitted DHCPv6 packets.
receive (Optional) Enables debug tracing for only the received DHCPv6 packets.
Example: The following shows an example of the command for transmit and receive flows for the default router.
(Routing) #debug ipv6 dhcp relay packet
Example: The following shows an example of the command for the transmit flow for the default router.
(Routing) #debug ipv6 dhcp relay packet transmit
Example: The following shows an example of the command for the receive flow for the default router.
(Routing) #debug ipv6 dhcp relay packet receive
Example: The following shows an example of the command for transmit and receive flows for the RED virtual router.
(Routing) #debug ipv6 dhcp relay packet vrf red
Example: The following shows an example of the command for the transmit flow for the RED virtual router.
(Routing) #debug ipv6 dhcp relay packet transmit vrf red
Example: The following shows an example of the command for the receive flow for the RED virtual router.
(Routing) #debug ipv6 dhcp relay packet receive vrf red
Format no debug ipv6 dhcp relay packet [vrf <vrf-name>] [transmit | receive]
Mode Privileged EXEC
Default disabled
Format debug ipv6 mcache packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ipv6 mld packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ipv6 ospfv3 packet [vrf vrf-name]
Mode Privileged EXEC
Default disabled
Format debug ipv6 pimdm packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ipv6 pimsm packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ipv6 ping packet [vrf vrf-name]
Mode Privileged EXEC
The debug options enabled for a specific peer are the union of the options enabled globally and the options enabled
specifically for the peer. Enabling one of the packet type options enables packet tracing in both the inbound and outbound
directions.
Default enabled
Format debug ip vrrp
Mode Privileged EXEC
Default disabled
Format debug mldsnooping packet [receive | transmit]
Mode Privileged EXEC
Default disabled
Format debug ospf packet [vrf vrf-name]
Mode Privileged EXEC
Sample outputs of the trace messages are shown in the following code snippets.
<15> JAN 02 11:03:31 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25430 % Pkt RX - Intf:2/0/48 Src
Ip:192.168.50.2 DestIp:224.0.0.5 AreaId:0.0.0.0 Type:HELLO NetMask:255.255.255.0 D
esigRouter:0.0.0.0 Backup:0.0.0.0
<15> JAN 02 11:03:35 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25431 % Pkt TX - Intf:2/0/48 Src
Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:DB_DSCR Mtu:1500 Options:E
Flags: I/M/MS Seq:126166
<15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(297) 25434 % Pkt RX - Intf:2/0/48 Src
Ip:192.168.50.2 DestIp:192.168.50.1 AreaId:0.0.0.0 Type:LS_REQ Length: 1500
<15> JAN 02 11:03:36 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25435 % Pkt TX - Intf:2/0/48 Src
Ip:10.50.50.1 DestIp:192.168.50.2 AreaId:0.0.0.0 Type:LS_UPD Length: 1500
<15> JAN 02 11:03:37 10.50.50.1-2 OSPF[46300472]: ospf_debug.c(293) 25441 % Pkt TX - Intf:2/0/48 Src
Ip:10.50.50.1 DestIp:224.0.0.6 AreaId:0.0.0.0 Type:LS_ACK Length: 1500
Parameter Description
TX/RX TX refers to a packet transmitted by the device. RX refers to packets received by the device.
Intf The interface that the packet came in or went out on. Format used is slot/port (internal interface number).
SrcIp The source IP address in the IP header of the packet.
DestIp The destination IP address in the IP header of the packet.
AreaId The area ID in the OSPF header of the packet.
Parameter Description
Type Could be one of the following:
HELLO – Hello packet
DB_DSCR – Database descriptor
LS_REQ – LS Request
LS_UPD – LS Update
LS_ACK – LS Acknowledge
The remaining fields in the trace are specific to the type of OSPF packet.
Parameter Description
Netmask The netmask in the hello packet.
DesignRouter Designated router IP address.
Backup Backup router IP address.
Parameter Description
MTU MTU
Options Options in the OSPF packet.
Flags Could be one or more of the following:
I – Init
M – More
MS – Master/Slave
Parameter Description
Length Length of packet
Parameter Description
Length Length of packet
Parameter Description
Length Length of packet
Default disabled
Format debug ping packet [vrf vrf-name]
Mode Privileged EXEC
Parameter Description
TX/RX TX refers to a packet transmitted by the device. RX refers to packets received by the device.
Intf The interface that the packet came in or went out on. Format used is slot/port (internal interface number). Unit is
always shown as 1 for interfaces on a non-stacking device.
SRC_IP The source IP address in the IP header in the packet.
DEST_IP The destination IP address in the IP header in the packet.
Type Type determines whether or not the ICMP message is a REQUEST or a RESPONSE.
Default disabled
Format debug sflow packet
Default disabled
Format debug spanning-tree bpdu
Mode Privileged EXEC
Default disabled
Format debug spanning-tree bpdu receive
Mode Privileged EXEC
Parameter Description
RX A packet received by the device.
Intf The interface that the packet came in on. Format used is unit/port/slot (internal interface number). Unit is always
shown as 1 for interfaces on a non-stacking device.
Source_Mac Source MAC address of the packet.
Version Spanning tree protocol version (0 to 3). 0 refers to STP, 2 RSTP and 3 MSTP.
Root_Mac MAC address of the CIST root bridge.
Parameter Description
Root_Priority Priority of the CIST root bridge. The value is between 0 and 61440. It is displayed in hex in multiples of 4096.
Path_Cost External root path cost component of the BPDU.
Default disabled
Format debug spanning-tree bpdu transmit
Mode Privileged EXEC
A sample output of the trace message is shown in the following code snippet.
<15> JAN 01 01:02:04 192.168.17.29-1 DOT1S[191096896]: dot1s_debug.c(1249) 101 % Pkt TX - Intf: 0/
7(7), Source_Mac: 00:11:88:4e:c2:00 Version: 3, Root_Mac: 00:11:88:4e:c2:00, Root_Priority: 0x8000
Path_Cost: 0
Parameter Description
TX A packet transmitted by the device.
Intf The interface that the packet went out on. Format used is unit/port/slot (internal interface number). Unit is always
shown as 1 for interfaces on a non-stacking device.
Source_Mac Source MAC address of the packet.
Version Spanning tree protocol version (0 to 3). 0 refers to STP, 2 RSTP and 3 MSTP.
Root_Mac MAC address of the CIST root bridge.
Root_Priority Priority of the CIST root bridge. The value is between 0 and 61440. It is displayed in hex in multiples of 4096.
Path_Cost External root path cost component of the BPDU.
Parameter Description
packet receive Turn on TACACS+ receive packet debugs.
packet transmit Turn on TACACS+ transmit packet debugs.
accounting Turn on TACACS+ authentication debugging.
authentication Turn on TACACS+ authorization debugging.
Parameter Description
password The optional telnet password. If no password is specified, the default password lvl7dbg is used.
port The optional telnet port number. If no telnet port is specified, the default port 2323 is used.
Default disabled
Format debug udld events
Mode Privileged EXEC
Default disabled
Format debug udld packet receive
Mode Privileged EXEC
Default disabled
Format debug udld packet transmit
Mode Privileged EXEC
Example: The following shows example CLI display output for the command.
(Routing)# debug arp
Arp packet tracing enabled.
If hostname is selected:
file-name-prefix_hostname_Time_Stamp.bin
If hostname is configured the core file name takes the hostname, otherwise the core-file names uses the MAC address when
generating a core dump file. The prefix length is 15 characters.
Default Core
Format exception core-file {file-name-prefix | [hostname] | [time-stamp]}
Mode Global Config
Default Core
Format no exception core-file
Mode Global Config
This command specifies the interface enabled for the core dump. It is the only port used to upload the core dump.
Default none
Format exception dump active-port slot/port
Mode Global Config
Default none
Format no exception dump active-port
Mode Global Config
Default none
Format exception dump filepath dir
Mode Global Config
Default none
Format exception dump filepath
Mode Global Config
Default none
Format exception dump nfs ip-address/dir
Mode Global Config
Default none
Format no exception dump nfs
Mode Global Config
Default none
Format exception dump tftp-server {ip-address}
Mode Global Config
Default none
Format no exception dump tftp-server
Mode Global Config
Default none
Format exception kernel-dump
Mode Global Config
Default none
Format no exception kernel-dump crashlog-number
Mode Global Config
Default none
Format exception kernel-dump path path
Mode Global Config
Default none
Format no exception kernel-dump path
Mode Global Config
Default none
Format exception protocol {nfs | tftp | ftp | local | usb | none}
Mode Global Config
Default disable
Format exception switch-chip-register {enable | disable}
Mode Global Config
Default none
Format exception dump ftp-server ip-address [{username user-name password password}]
Mode Global Config
Default none
Format no exception dump ftp-server
Mode Global Config
Default enabled
Format exception dump compression
Mode Global Config
Default none
Format no exception compression
Mode Global Config
Default disable
Format exception nmi {enable | disable}
Mode Global Config
4.14.90 mbuf
Use this command to configure memory buffer (MBUF) threshold limits and generate notifications when MBUF limits have
been reached.
Parameter Description
Rising Threshold The percentage of the memory buffer resources that, when exceeded for the configured rising interval, triggers a
notification. The range is 1 to 100. The default is 0 (disabled).
Falling Threshold The percentage of memory buffer resources that, when usage falls below this level for the configured interval,
triggers a notification. The range is 1 to 100. The default is 0 (disabled).
Severity The severity level at which Mbuf logs messages. The range is 1 to 7. The default is 5
(L7_LOG_SEVERITY_NOTICE).
NOTE: write core reloads the switch that is useful when the device malfunctions, but has not crashed.
For the write core test command, the destination file name is used for the TFTP test. Optionally, you can specify the
destination file name when the protocol is configured as TFTP.
Default none
Format write core [test [dest_file_name]]
Mode Privileged EXEC
Default none
Format debug exception
Mode Privileged EXEC
Default none
Format show exception
Mode Privileged EXEC
Default none
Format show exception core-dump-file
Mode Privileged EXEC, Config Mode
Default none
Format show exception log [previous]
Mode Privileged EXEC, Config Mode
Parameter Description
Rising Threshold The percentage of the memory buffer resources that, when exceeded for the configured rising interval, triggers a
notification. The range is 1 to 100. The default is 0 (disabled).
Falling Threshold The percentage of memory buffer resources that, when usage falls below this level for the configured interval,
triggers a notification. The range is 1 to 100. The default is 0 (disabled).
Severity The severity level.
Default none
Format clear mbuf stats
Mode Privileged EXEC
Default none
Format show msg-queue
Mode Privileged EXEC mode
Default none
Format debug packet-trace
Mode Privileged EXEC
Default none
Format packet-trace eth src-mac src-mac dst-mac dst-mac vlan vlan
Mode Privileged EXEC
Default none
Format packet-trace ipv4 src-ip src-ip dst-ip dst-ip tos tos
Mode Privileged EXEC
Default none
Format packet-trace ipv6 src-ip src-ip dst-ip dst-ip tos tos
Mode Privileged EXEC
4.14.103 packet-trace l4
Use this command to specify TCP packet fields.
Default none
Format packet-trace l4 src-port src-port dst-port dst-port
Mode Privileged EXEC
Default none
Format show packet-trace ecmp prefix/prefix-length port slot/port pcap summary
Mode Privileged EXEC
Default none
Format show packet-trace lag lag-id port slot/port pcap summary
Mode Privileged EXEC
Example:
(Routing)#show packet-trace lag 1 port 0/1 pcap summary
Example:
DUT#show packet-trace packet-data
L2 Header fields:
-----------------------
Src MAC: 00 00 00 0a 0b 0c
Dst MAC: 00 00 00 0d 0e 0f
VLAN: 10
L3 Header fields:
-------------------------
IPv4:
Src IP: 10.0.10.1
Dst IP: 10.0.10.10
TOS: 0
IPv6:
Src IP: 4001::1/8
Dst IP: 5001::1/8
Traffic Class: 0
L4 header fields:
-----------------------
Src Port: 80
Dst Port: 80
Default none
Format show packet-trace port slot/port pcap detailed maxpkts
Mode Privileged EXEC
Example:
DUT#show packet-trace port 0/1 pcap detailed 5
Packet fields:
src-Mac -------------- 00:00:00:00:00:0a
dst-mac -------------- 00:00:00:00:00:0b
vlan -------------- 10
src-ip -------------- 10.0.1.10
dst-ip -------------- 10.0.1.20
Packet fields:
src-Mac -------------- 00:00:00:00:00:0c
dst-mac -------------- 00:00:00:00:00:0d
vlan -------------- 10
src-ip -------------- 10.0.1.10
dst-ip -------------- 10.0.1.20
Packet fields:
src-Mac -------------- 00:00:00:00:00:0e
dst-mac -------------- 00:00:00:00:00:0f
vlan -------------- 10
src-ip -------------- 10.0.1.10
dst-ip -------------- 10.0.1.20
Packet fields:
src-Mac -------------- 00:00:00:00:00:1a
dst-mac -------------- 00:00:00:00:00:1b
vlan -------------- 10
src-ip -------------- 10.0.1.10
dst-ip -------------- 10.0.1.20
Packet fields:
src-Mac -------------- 00:00:00:00:00:1c
dst-mac -------------- 00:00:00:00:00:1d
vlan -------------- 10
src-ip -------------- 10.0.1.10
dst-ip -------------- 10.0.1.20
Default none
Format show packet-trace port slot/port eth
Mode Privileged EXEC
Example:
(Routing)# show packet-trace port 0/1 eth
Default none
Format show packet-trace port slot/port ipv4
Mode Privileged EXEC
Example:
(Routing)# show packet-trace port 0/1 ipv4
ECMP Egress port Next Hop IP
----------- ---------------- -----------------
10.0.0.2/16 0/4 3.3.3.3
Default none
Format show packet-trace port slot/port ipv6
Mode Privileged EXEC
Example:
(Routing)# show packet-trace port 0/1 udpv6
Default none
Format show packet-trace port slot/port tcpv4
Mode Privileged EXEC
Default none
Format show packet-trace port slot/port tcpv6
Mode Privileged EXEC
Default none
Format show packet-trace port slot/port udpv4
Mode Privileged EXEC
Default none
Format show packet-trace port slot/port udpv6
Mode Privileged EXEC
Default disabled
Format watchdog disable
Mode Privileged EXEC
Default disabled
Format watchdog enable
Mode Privileged EXEC
4.15.1 bcmsh
The bcmsh command is used to enter into the BCM shell from Privileged EXEC mode. Only users with Level 15 permissions
can execute this command. Management is blocked during this mode; the user is notified and asked whether to continue.
This command is only supported on the serial console and not using telnet/ssh.
Format bcmsh
Mode Privileged EXEC
NOTE: To exit the shell and return to the CLI, enter exit.
NOTE:
The cable test feature is supported only for copper cable. It is not supported for optical fiber cable.
If the port has an active link while the cable test is run, the link can go down for the duration of the test.
4.16.1 cablestatus
This command returns the status of the specified port.
Parameter Description
Cable Status One of the following statuses is returned:
Normal: The cable is working correctly.
Open: The cable is disconnected or there is a faulty connector.
Short: There is an electrical short in the cable.
Cable Test Failed: The cable status could not be determined. The cable may in fact be working.
Crosstalk: There is crosstalk present on the cable.
No Cable: There is no cable present.
Cable Length If this feature is supported by the PHY for the current link speed, the cable length is displayed as a range between
the shortest estimated length and the longest estimated length. Note that if the link is down and a cable is
attached to a 10/100 Ethernet adapter, then the cable status may display as Open or Short because some
Ethernet adapters leave unused wire pairs unterminated or grounded. Unknown is displayed if the cable length
could not be determined.
The link debounce feature tries to solve this problem by delaying the link-down event notification to applications by waiting
for a configurable duration of time known as the debounce time. During this time, the link may cycle through down-and-up
states several times before it finally settles down. If the link goes down (and stays down), applications are notified after the
debounce time period expires; otherwise it is ignored.
Parameter Description
Interface The physical port, LAG, or CPU interface associated with the rest of the data in the row.
Debounce Time The time, in milliseconds, to delay a link-down event notification to applications after a link-down
event occurs on the interface. If the link goes down (and stays down), applications are notified
after the debounce time period expires; otherwise it is ignored. While the debounce timer is
running, link flaps (up and down cycles) are counted but ignored.
Flaps The number of link flaps (up and down cycles) the interface experienced while the debounce
time was running.
Example: The following shows example CLI display output for the command.
If an interface has two LEDs, one for link and a second for activity, only the link LED is used for the port locator function. The
activity LED is turned off while the port locator feature is active. If an interface has one LED for link and activity, the LED will
not blink if activity is present on the interface while the port locator feature is active.
Out-of-band port LEDs are not affected by this feature. This feature is configurable on physical ports, LAGs, diagnostically
disabled ports, and pluggable module ports.
Example:
(Routing)(Config)# port-locator disable
Example:
(Routing)(Interface 0/1,0/3,0/5,0/7)#port-locator enable
Example:
(Routing)#show port-locator
Locator
Intf Mode
--------- --------
0/1 Enable
0/2 Disable
0/3 Enable
0/4 Disable
0/5 Enable
0/6 Disable
0/7 Enable
0/8 Disable
0/9 Enable
Example: The following interface 3/1 is a LAG interface, members are 0/1 and 0/45.
0/1 enable
0/45 enable
3/1 enable
NOTE: Use this command to configure a receiver as a nontimeout entry. Unlike entries configured with a specific timeout
value, this command is shown in show running-config and retained after reboot. As the sFlow receiver is
configured as a nontimeout entry, information related to sampler and pollers are also shown in the running-config
and are retained after reboot. (If a receiver is configured with a specific value, these configurations are not shown
in running-config. Sampler and poller information related to this receiver are also not shown in running-config.)
Format sflow receiver rcvr_idx {owner owner-string {timeout rcvr_timeout | notimeout} | max
datagram size | ip ip | port port}
Mode Global Config
Parameter Description
Receiver Owner The identity string for the receiver, the entity making use of this sFlowRcvrTable entry. The range is 127
characters. The default is a null string. The empty string indicates that the entry is currently unclaimed and the
receiver configuration is reset to the default values. An entity wishing to claim an sFlowRcvrTable entry must
ensure that the entry is unclaimed before trying to claim it. The entry is claimed by setting the owner string to a
non-null value. The entry must be claimed before assigning a receiver to a sampler or poller.
Receiver Timeout The time, in seconds, remaining before the sampler or poller is released and stops sending samples to receiver.
A management entity wanting to maintain control of the sampler is responsible for setting a new value before the
old one expires. The allowed range is 0 to 2147483647 seconds. The default is zero (0).
No Timeout Entries configured with a notimeout entry will be in the running config until the user explicitly removes the entry.
Receiver Max The maximum number of data bytes that can be sent in a single sample datagram. The management entity should
Datagram Size set this value to avoid fragmentation of the sFlow datagrams. The allowed range is 200 to 9116). The default is
1400.
Receiver IP The sFlow receiver IP address. If set to 0.0.0.0, no sFlow datagrams will be sent. The default is 0.0.0.0.
Receiver Port The destination Layer4 UDP port for sFlow datagrams. The range is 1 to 65535. The default is 6343.
Format no sflow receiver indx {ip ip-address | maxdatagram size | owner string timeout interval
| port 14-port}
Mode Global Config
If a receiver is configured with a specific value, these configurations will not be shown in running-config. Samplers and
pollers information related to this receiver will also not be shown in running-config.
Parameter Description
index Receiver index identifier. The range is 1 to 8.
Receiver Owner The owner name corresponds to the receiver name. The identity string for the receiver, the entity making use of
this sFlowRcvrTable entry. The range is 127 characters. The default is a null string. The empty string indicates
that the entry is currently unclaimed and the receiver configuration is reset to the default values. An entity wishing
to claim an sFlowRcvrTable entry must ensure that the entry is unclaimed before trying to claim it. The entry is
claimed by setting the owner string to a non-null value. The entry must be claimed before assigning a receiver to
a sampler or poller.
If a receiver is configured with a specific value, these configurations will not be shown in running-config. Samplers and
pollers information related to this receiver will also not be shown in running-config.
Parameter Description
rcvr_idx Receiver index identifier.
Receiver Owner The owner name corresponds to the receiver name. The identity string for the receiver, the entity making use of
this sFlowRcvrTable entry. The range is 127 characters. The default is a null string. The empty string indicates
that the entry is currently unclaimed and the receiver configuration is reset to the default values. An entity wishing
to claim an sFlowRcvrTable entry must ensure that the entry is unclaimed before trying to claim it. The entry is
claimed by setting the owner string to a non-null value. The entry must be claimed before assigning a receiver to
a sampler or poller.
Default 0.0.0.0
Format sflow remote-agent index ip ipv4-address
Mode Global Config
Default 16343
Format sflow remote-agent index port value
Mode Global Config
Parameter Description
Receiver Index The sFlow Receiver for this sFlow sampler to which flow samples are to be sent. A value of zero (0) means that
no receiver is configured, no packets will be sampled. Only active receivers can be set. If a receiver expires, then
all samplers associated with the receiver will also expire. Possible values are 1 to 8. The default is 0.
Maxheadersize The maximum number of bytes that should be copied from the sampler packet. The range is 20 to 256. The
default is 128. When set to zero (0), all the sampler parameters are set to their corresponding default value.
Sampling Rate The statistical sampling rate for packet sampling from this source. A sampling rate of 1 counts all packets. A value
of zero (0) disables sampling. A value of N means that out of N incoming packets, 1 packet will be sampled. The
range is 1024 to 65536 and 0. The default is 0.
Parameter Description
Receiver Index Enter the sFlow Receiver associated with the sampler/poller. A value of zero (0) means that no receiver is
configured. The range is 1 to 8. The default is 0.
Poll Interval Enter the sFlow instance polling interval. A poll interval of zero (0) disables counter sampling. When set to zero
(0), all the poller parameters are set to their corresponding default value. The range is 0 to 86400. The default is
0. A value of N means once in N seconds a counter sample is generated.
NOTE: The sFlow task is heavily loaded when the sFlow polling interval is configured at the minimum value (that is, one
second for all the sFlow supported interfaces). In this case, the sFlow task is always busy collecting the counters
on all the configured interfaces. This can cause the device to stop responding for some time when the user tries
to configure or issue show sFlow commands. To overcome this situation, sFlow polling interval configuration on an
interface or range of interfaces is controlled as mentioned in the following:
1. The maximum number of allowed interfaces for the polling intervals max (1, (interval – 10)) to min ((interval +
10), 86400) is: interval * 5
2. For every one second increment in the polling interval that is configured, the number of allowed interfaces that
can be configured increases by 5.
Default none
Format sflow sampler remote-agent index
Mode Interface Config
Parameter Description
slot/port Specifies the port to use as the source interface.
loopback-id Specifies the loopback interface to use as the source interface. The range of the loopback ID is 0 to 7.
tunnel-id Specifies the tunnel interface to use as the source interface. The range of the tunnel ID is 0 to 7.
vlan-id Specifies the VLAN to use as the source interface.
Parameter Description
sFlow Version Uniquely identifies the version and implementation of this MIB. The version string must have the following
structure: MIB Version; Organization; Software Revision where:
MIB Version: 1.3, the version of this MIB.
Organization: Broadcom Corp.
Revision: 1.0
Example: The following shows example CLI display output for the command.
(Routing) #show sflow agent
Parameter Description
Poller Data Source The sFlowDataSource (slot/port) for this sFlow sampler. This agent will support Physical ports only.
Receiver Index The sFlowReceiver associated with this sFlow counter poller.
Poller Interval The number of seconds between successive samples of the counters associated with this data source.
Parameter Description
Receiver Index The sFlow Receiver associated with the sampler/poller.
Owner String The identity string for receiver, the entity making use of this sFlowRcvrTable entry.
Parameter Description
Time Out The time (in seconds) remaining before the receiver is released and stops sending samples to sFlow
receiver. The no timeout value of this parameter means that the sFlow receiver is configured as a
non-timeout entry.
Max Datagram Size The maximum number of bytes that can be sent in a single sFlow datagram.
Port The destination Layer4 UDP port for sFlow datagrams.
IP Address The sFlow receiver IP address.
Address Type The sFlow receiver IP address type. For an IPv4 address, the value is 1.
Datagram Version The sFlow protocol version to be used while sending samples to sFlow receiver.
Example: The following shows example CLI display output for the show sflow receivers command.
(Routing) #show sflow receivers 1
Receiver Index................................. 1
Owner String................................... tulasi
Time out....................................... 0
IP Address:.................................... 0.0.0.0
Address Type................................... 1
Port........................................... 6343
Datagram Version............................... 5
Maximum Datagram Size.......................... 1400
Example: The following examples show CLI display output for the command when a receiver is configured as a
non-timeout entry.
(Routing) #show sflow receivers
Receiver Index................................. 1
Owner String................................... tulasi
Time out....................................... No Timeout
IP Address:.................................... 0.0.0.0
Address Type................................... 1
Port........................................... 6343
Datagram Version............................... 5
Maximum Datagram Size.......................... 1400
Example:
(Routing) (Config)#show sflow remote-agents
Example:
(Routing) #show sflow remote-agents source-interface
Parameter Description
Sampler Data Source The sFlowDataSource (slot/port) for this sFlow sampler. This agent will support Physical ports only.
Receiver Index The sFlowReceiver configured for this sFlow sampler.
Remote Agent The remote agent instance index number.
Ingress Sampling Rate The sampling rate for the ingress.
Flow Sampling Rate The statistical sampling rate for packet sampling from this source.
Egress Sampling Rate The sampling rate for the egress.
Max Header Size The maximum number of bytes that should be copied from a sampled packet to form a flow sample.
Example:
Example: The following shows example command output using the both option.
(Routing) (Interface 0/12)#show sflow sampler rate 1234 both
Parameter Description
sFlow Client Source Interface The interface ID of the physical or logical interface configured as the sFlow client source interface.
sFlow Client Source IPv4 Address The IP address of the interface configured as the sFlow client source interface.
Example: The following shows example CLI display output for the command.
(Routing) #show sflow source-interface
The IPv4 and IPv6 route limits on an SDM template give the over-subscribed maximum routes supported by the switch when
only the respective route type (IPv4 or IPv6) is present on the switch. The actual maximum number of routes will be less
when both IPv4 and IPv6 routes are present and will depend on the mix of these two route types.
dual-ipv4-and-ipv6 alpm-mpls-data-center:
The max ARP template supports 16k ARP entries for the StrataXGS® IV platforms. The other EFOS platforms support 6k
(unchanged, existing value) ARP entries.
NOTE: After setting the template, you must reboot for the configuration change to take effect.
Use the optional keywords to list the scaling parameters of a specific template.
Parameter Description
dual-ipv4-and-ipv6 default (Optional) List the scaling parameters for the template supporting IPv4 and
IPv6.
dual-ipv4-and-ipv6 data-center (Optional) List the scaling parameters for the Dual IPv4 and IPv6 template
supporting more ECMP next hops.
dual-ipv4-and-ipv6 alpm (Optional) Lists the scaling parameters for the alpm template.
dual-ipv4-and-ipv6 alpm-mpls-data-center (Optional) Lists the scaling parameters for the alpm-mpls-data-center
template.
ipv4-routing default (Optional) List the scaling parameters for the IPv4-only template maximizing
the number of unicast routes.
ipv4-routing data-center default (Optional) List the scaling parameters for the IPv4-only template supporting
more ECMP next hops.
ipv4-routing data-center plus (Optional) List the scaling parameters for the IPv4-only template maximizing
the number of unicast routes and also supporting more ECMP next hops.
dcvpn-data-center (Optional) List the scaling parameters for the IPv4-only template for DCVPN
feature.
default (Optional) List the scaling parameters for the IPv4-only template.
Parameter Description
plus (Optional) List the scaling parameters for the IPv4-only template maximizing
the ipv4 routes.
max-arp (Optional) List the scaling parameters for the IPv4-only template supporting
max number of arp entries.
unicast-only (Optional) List the scaling parameters for the IPv4-only template supporting
only unicast routes
alpm (Optional) List the scaling parameters for IPv4 and IPv6 template maximizing
the number of IPv4 and IPv6 routes
alpm-mpls-data-center (Optional) List the scaling parameters for IPv4 and IPv6 template maximizing
the number of IPv4 and IPv6 routes for data center.
data-center (Optional) List the scaling parameters for IPv4 and IPv6 template to support
routes for data-center.
dcvpn-data-center (Optional) List the scaling parameters for IPv4 and IPv6 template for the
DCVPN feature
mpls-data-center (Optional) List the scaling parameters for IPv4 and IPv6 template for the
MPLS feature
Parameter Description
ARP Entries The maximum number of entries in the IPv4 Address Resolution Protocol (ARP) cache for routing
interfaces.
IPv4 Unicast Routes The maximum number of IPv4 unicast forwarding table entries.
IPv6 NDP Entries The maximum number of IPv6 Neighbor Discovery Protocol (NDP) cache entries.
IPv6 Unicast Routes The maximum number of IPv6 unicast forwarding table entries.
ECMP Next Hops The maximum number of next hops that can be installed in the IPv4 and IPv6 unicast forwarding
tables.
Example: This example shows the current SDM template. The user has not changed the next active SDM template.
(router)#show sdm prefer
(router) # configure
(router) (Config) # sdm prefer ipv4-only data-center
Changes to the running SDM preferences have been stored, but cannot take effect until the next reload.
Use 'show sdm prefer' to see what SDM preference is currently active.
ARP Entries..................................4096
IPv4 Unicast Routes..........................8160
On the next reload, the template will be the IPv4 data center template.
To list the scaling parameters for the data center template, invoke the command with the ipv4-only data-center
keywords.
(router) # show sdm prefer ipv4-only data-center
ARP Entries..................................4096
IPv4 Unicast Routes..........................8160
IPv6 NDP Entries.............................0
IPv6 Unicast Routes..........................0
ECMP Next Hops...............................32
Parameter Description
Temp Internally measured transceiver temperature.
Voltage Internally measured supply voltage.
Current Measured TX bias current.
Output Power Measured optical output power relative to 1mW.
Input Power Measured optical power received relative to 1mW.
TX Fault Transmitter fault.
LOS Loss of signal.
Example: The following shows example CLI display output for the command.
(Routing) #show fiber-ports optical-transceiver all
Output Input
Port Temp Voltage Current Power Power TX LOS
[C] [Volt] [mA] [dBm] [dBm] Fault
-------- ---- ------- ------- ------- ------- ----- ---
0/49 39.3 3.256 5.0 -2.234 -2.465 No No
0/50 33.9 3.260 5.3 -2.374 -40.000 No Yes
0/51 32.2 3.256 5.6 -2.300 -2.897 No No
Output Input
Port Temp Voltage Current Power Power TX LOS
[C] [Volt] [mA] [dBm] [dBm] Fault
-------- ---- ------- ------- ------- ------- ----- ---
0/49 39.3 3.256 5.0 -2.234 -2.465 No No
Parameter Description
Vendor Name The vendor name is the full name of the corporation, an abbreviation for the name of the corporation, the SCSI
company code for the corporation, or the stock exchange symbol for the corporation. The name is 1 to 16 ASCII
characters in length.
Link Length 50um This value specifies the link length that is supported by the transceiver while operating in compliance with
applicable standards using 50 micron multimode OM2 [500 MHz * km at 850nm] fiber. A value of zero means that
the transceiver does not support 50 micron multimode fiber or that the length information must be determined
from the transceiver technology.
Link Length 62.5um This value specifies the link length that is supported by the transceiver while operating in compliance with
applicable standards using 62.5 micron multimode OM1 [200 MHz * km at 850nm, 500 MHz * km at 1310nm]
fiber. A value of zero means that the transceiver does not support 62.5 micron multimode fiber or that the length
information must be determined from the transceiver technology.
Serial Number The vendor serial number for the transceiver. The serial number is 1 to 16 ASCII characters in length. A value of
all zeros in the field indicates that the vendor serial number is unspecified.
Part Number The vendor part number or product name. A value of all zeros in the 16-byte field indicates that the vendor part
number is unspecified.
Nominal Bit Rate The nominal bit (signaling) rate, specified in units of 100 MBd, rounded off to the nearest 100 MBd. The bit rate
includes those bits necessary to encode and delimit the signal, as well as those bits carrying data information. A
value of zero indicates that the bit rate is not specified and must be determined from the transceiver technology.
The actual information transfer rate depends on the encoding of the data, as defined by the encoding value.
Rev The vendor’s product revision number. A blank value in this field indicates that the vendor revision is unspecified.
Example: The following shows example CLI display output for the command.
(Switching) #show fiber-ports optical-transceiver-info all
NOTE: There is no configuration command for ether stats and high capacity ether stats. The data source for ether stats
and high capacity ether stats are configured during initialization.
Format rmon alarm alarm number variable sample interval {absolute|delta} rising-threshold
value [rising-event-index] falling-threshold value [falling-event-index] [startup
{rising|falling|rising-falling}] [owner string]
Mode Global Config
Parameter Description
Alarm Index An index that uniquely identifies an entry in the alarm table. Each entry defines a diagnostic sample at a particular
interval for an object on the device. The range is 1 to 65535.
Alarm Variable The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1 primitive
type of integer.
Alarm Interval The interval in seconds over which the data is sampled and compared with the rising and falling thresholds. The
range is 1 to 2147483647. The default is 1.
Alarm Absolute Value The value of the statistic during the last sampling period. This object is a read-only, 32-bit signed value.
Alarm Rising The rising threshold for the sample statistics. The range is 2147483648 to 2147483647. The default is 1.
Threshold
Alarm Rising Event The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to 65535. The default
Index is 1.
Alarm Falling The falling threshold for the sample statistics. The range is 2147483648 to 2147483647. The default is 1.
Threshold
Alarm Falling Event The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to 65535. The default
Index is 2.
Alarm Startup Alarm The alarm that may be sent. Possible values are rising, falling or both rising-falling. The default is
rising-falling.
Alarm Owner The owner string associated with the alarm entry. The default is monitorAlarm.
Format rmon hcalarm alarm number variable sample interval {absolute|delta} rising-threshold
high value low value status {positive|negative} [rising-event-index] falling-threshold
high value low value status {positive|negative} [falling-event-index] [startup
{rising|falling|rising-falling}] [owner string]
Mode Global Config
Parameter Description
High Capacity Alarm Index An arbitrary integer index value used to uniquely identify the high capacity alarm entry. The range
is 1 to 65535.
High Capacity Alarm Variable The object identifier of the particular variable to be sampled. Only variables that resolve to an
ASN.1 primitive type of integer.
High Capacity Alarm Interval The interval in seconds over which the data is sampled and compared with the rising and falling
thresholds. The range is 1 to 2147483647. The default is 1.
High Capacity Alarm Sample Type The method of sampling the selected variable and calculating the value to be compared against
the thresholds. Possible types are Absolute Value or Delta Value. The default is
Absolute Value.
High Capacity Alarm Absolute Value The absolute value (that is, the unsigned value) of the hcAlarmVariable statistic during the last
sampling period. The value during the current sampling period is not made available until the
period is complete. This object is a 64-bit unsigned value that is Read-Only.
High Capacity Alarm Absolute Alarm This object indicates the validity and sign of the data for the high capacity alarm absolute value
Status object (hcAlarmAbsValueobject). Possible status types are valueNotAvailable,
valuePositive, or valueNegative. The default is valueNotAvailable.
High Capacity Alarm Startup Alarm High capacity alarm startup alarm that may be sent. Possible values are rising, falling, or
rising-falling. The default is rising-falling.
High Capacity Alarm Rising-Threshold The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Absolute Value Low 4294967295. The default is 1.
High Capacity Alarm Rising-Threshold The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Absolute Value High 4294967295. The default is 0.
High Capacity Alarm Rising-Threshold This object indicates the sign of the data for the rising threshold, as defined by the objects
Value Status hcAlarmRisingThresAbsValueLow and hcAlarmRisingThresAbsValueHigh. Possible values are
valueNotAvailable, valuePositive, or valueNegative. The default is
valuePositive.
High Capacity Alarm Falling-Threshold The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Absolute Value Low 4294967295. The default is 1.
High Capacity Alarm Falling-Threshold The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is 0 to
Absolute Value High 4294967295. The default is 0.
High Capacity Alarm Falling-Threshold This object indicates the sign of the data for the falling threshold, as defined by the objects
Value Status hcAlarmFallingThresAbsValueLow and hcAlarmFallingThresAbsValueHigh. Possible values are
valueNotAvailable, valuePositive, or valueNegative. The default is
valuePositive.
High Capacity Alarm Rising Event The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to
Index 65535. The default is 1.
Parameter Description
High Capacity Alarm Falling Event The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to
Index 65535. The default is 2.
High Capacity Alarm Failed Attempts The number of times the associated hcAlarmVariable instance was polled on behalf of the
hcAlarmEntry (while in the active state) and the value was not available. This object is a 32-bit
counter value that is read-only.
High Capacity Alarm Owner The owner string associated with the alarm entry. The default is monitorHCAlarm.
High Capacity Alarm Storage Type The type of non-volatile storage configured for this entry. This object is read-only. The default is
volatile.
Parameter Description
Event Index An index that uniquely identifies an entry in the event table. Each such entry defines one event that is to be
generated when the appropriate conditions occur. The range is 1 to 65535.
Event Description A comment describing the event entry. The default is alarmEvent.
Event Type The type of notification that the probe makes about the event. Possible values are None, and Log, SNMP Trap,
Log and SNMP Trap. The default is None.
Event Owner Owner string associated with the entry. The default is monitorEvent.
Event Community The SNMP community specific by this octet string which is used to send an SNMP trap. The default is public.
NOTE: This command is not supported on interface range. Each RMON history control collection entry can be configured
on only one interface. If you try to configure on multiple interfaces, DUT displays an error.
Format rmon collection history index number [buckets number|interval interval in sec|owner
string]
Mode Interface Config
Parameter Description
History Control Index An index that uniquely identifies an entry in the historyControl table. Each such entry defines a set of
samples at a particular interval for an interface on the device. The range is 1 to 65535.
History Control Data Source The source interface for which historical data is collected.
History Control Buckets The requested number of discrete time intervals over which data is to be saved. The range is 1 to 65535.
Requested The default is 50.
History Control Buckets The number of discrete sampling intervals over which data shall be saved. This object is read-only. The
Granted default is 10.
History Control Interval The interval in seconds over which the data is sampled. The range is 1 to 3600. The default is 1800.
History Control Owner The owner string associated with the history control entry. The default is monitorHistoryControl.
Parameter Description
Alarm Index An index that uniquely identifies an entry in the alarm table. Each entry defines a diagnostic sample at a particular
interval for an object on the device. The range is 1 to 65535.
Alarm Variable The object identifier of the particular variable to be sampled. Only variables that resolve to an ASN.1 primitive
type of integer.
Alarm Interval The interval in seconds over which the data is sampled and compared with the rising and falling thresholds. The
range is 1 to 2147483647. The default is 1.
Alarm Absolute Value The value of the statistic during the last sampling period. This object is a read-only, 32-bit signed value.
Alarm Rising The rising threshold for the sample statistics. The range is 2147483648 to 2147483647. The default is 1.
Threshold
Alarm Rising Event The index of the eventEntry that is used when a rising threshold is crossed. The range is 1 to 65535. The default
Index is 1.
Alarm Falling The falling threshold for the sample statistics. The range is 2147483648 to 2147483647. The default is 1.
Threshold
Alarm Falling Event The index of the eventEntry that is used when a falling threshold is crossed. The range is 1 to 65535. The default
Index is 2.
Alarm Startup Alarm The alarm that may be sent. Possible values are rising, falling or both rising-falling. The default is
rising-falling.
Alarm Owner The owner string associated with the alarm entry. The default is monitorAlarm.
Example: The following shows example CLI display output for the command.
(Routing) #show rmon alarms
Example: The following shows example CLI display output for the command.
(Routing) #show rmon alarm 1
Alarm 1
----------
OID: alarmInterval.1
Last Sample Value: 1
Interval: 1
Sample Type: absolute
Startup Alarm: rising-falling
Rising Threshold: 1
Falling Threshold: 1
Rising Event: 1
Falling Event: 2
Owner: MibBrowser
Parameter Description
History Control Index An index that uniquely identifies an entry in the historyControl table. Each such entry defines a set of samples at
a particular interval for an interface on the device. The range is 1 to 65535.
History Control Data The source interface for which historical data is collected.
Source
History Control The requested number of discrete time intervals over which data is to be saved. The range is 1 to 65535. The
Buckets Requested default is 50.
History Control The number of discrete sampling intervals over which data shall be saved. This object is read-only. The default
Buckets Granted is 10.
History Control The interval in seconds over which the data is sampled. The range is 1 to 3600. The default is 1800.
Interval
History Control Owner The owner string associated with the history control entry. The default is monitorHistoryControl.
Example: The following shows example CLI display output for the command.
(Routing) #show rmon collection history
Parameter Description
Event Index An index that uniquely identifies an entry in the event table. Each such entry defines one event that is to be
generated when the appropriate conditions occur. The range is 1 to 65535.
Event Description A comment describing the event entry. The default is alarmEvent.
Event Type The type of notification that the probe makes about the event. Possible values are None, Log, SNMP Trap, Log
and SNMP Trap. The default is None.
Event Owner Owner string associated with the entry. The default is monitorEvent.
Event Community The SNMP community specific by this octet string which is used to send an SNMP trap. The default is public.
Owner Event owner. The owner string associated with the entry.
Last time sent The last time over which a log or a SNMP trap message is generated.
Example: The following shows example CLI display output for the command.
(Routing) # show rmon events
Format show rmon history index {errors |other |throughput | high-capacity}[period seconds]
Mode Privileged EXEC
Parameter Description
Common Fields
Sample set The index (identifier) for the RMON history entry within the RMON history group. Each such entry defines a
set of samples at a particular interval for an interface on the device.
Owner The owner string associated with the history control entry. The default is monitorHistoryControl.
Interface The interface that was sampled.
Interval The time between samples, in seconds.
Requested Samples The number of samples (intervals) requested for the RMON history entry.
Granted Samples The number of samples granted for the RMON history entry.
Maximum Table Size Maximum number of entries that the history table can hold.
Output for Errors Parameter
Time Time at which the sample is collected, displayed as period seconds.
CRC Align Number of CRC align errors.
Undersize Packets Total number of undersize packets. Packets are less than 64 octets long (excluding framing bits, including
FCS octets).
Oversize Packets Total number of oversize packets. Packets are longer than 1518 octets (excluding framing bits, including FCS
octets).
Fragments Total number of fragment packets. Packets are not an integral number of octets in length or had a bad Frame
Check Sequence (FCS), and are less than 64 octets in length (excluding framing bits, including FCS octets).
Jabbers Total number of jabber packets. Packets are longer than 1518 octets (excluding framing bits, including FCS
octets), and are not an integral number of octets in length or had a bad FCS.
Parameter Description
Output for Others Parameter
Time Time at which the sample is collected, displayed as period seconds.
Dropped Collisions Total number of dropped collisions.
Output for Throughput Parameter
Time Time at which the sample is collected, displayed as period seconds.
Octets Total number of octets received on the interface.
Packets Total number of packets received (including error packets) on the interface.
Broadcast Total number of good broadcast packets received on the interface.
Multicast Total number of good multicast packets received on the interface.
Util Port utilization of the interface associated with the history index specified.
Output for High-Capacity Parameter
Time Time at which the sample is collected, displayed as period seconds.
Overflow Pkts The number of times the associated packet counter has overflowed.
Pkts The total number of packets (including bad packets, broadcast packets, and multicast packets) received.
Overflow Octets The number of times the associated octet counter has overflowed.
Octets The total number of octets of data (including those in bad packets) received on the network (excluding framing
bits but including FCS octets).
Example: The following shows example CLI display output for the command.
(Routing) #show rmon history 1 errors
Example: The following shows example CLI display output for the command.
Parameter Description
Maximum table size Maximum number of entries that the log table can hold.
Event Event index for which the log is generated.
Description A comment describing the event entry for which the log is generated.
Time Time at which the event is generated.
Example: The following shows example CLI display output for the command.
(Routing) #show rmon log
Parameter Description
Port slot/port
Dropped Total number of dropped events on the interface.
Octets Total number of octets received on the interface.
Packets Total number of packets received (including error packets) on the interface.
Broadcast Total number of good broadcast packets received on the interface.
Multicast Total number of good multicast packets received on the interface.
CRC Align Errors Total number of packets received have a length (excluding framing bits, including FCS octets) of
between 64 and 1518 octets inclusive.
Collisions Total number of collisions on the interface.
Undersize Pkts Total number of undersize packets. Packets are less than 64 octets long (excluding framing bits,
including FCS octets).
Parameter Description
Oversize Pkts Total number of oversize packets. Packets are longer than 1518 octets (excluding framing bits,
including FCS octets).
Fragments Total number of fragment packets. Packets are not an integral number of octets in length or had a
bad Frame Check Sequence (FCS), and are less than 64 octets in length (excluding framing bits,
including FCS octets).
Jabbers Total number of jabber packets. Packets are longer than 1518 octets (excluding framing bits,
including FCS octets), and are not an integral number of octets in length or had a bad Frame Check
Sequence (FCS).
64 Octets Total number of packets which are 64 octets in length (excluding framing bits, including FCS
octets).
65-127 Octets Total number of packets which are between 65 and 127 octets in length (excluding framing bits,
including FCS octets).
128-255 Octets Total number of packets which are between 128 and 255 octets in length (excluding framing bits,
including FCS octets).
256-511 Octets Total number of packets which are between 256 and 511 octets in length (excluding framing bits,
including FCS octets).
512-1023 Octets Total number of packets which are between 512 and 1023 octets in length (excluding framing bits,
including FCS octets).
1024-1518 Octets Total number of packets which are between 1024 and 1518 octets in length (excluding framing bits,
including FCS octets).
HC Overflow Pkts Total number of times the packet counter has overflowed.
HC Overflow Octets Total number of times the octet counter has overflowed.
HC Overflow Pkts 64 Octets The number of times the associated 64-octet counter has overflowed.
HC Overflow Pkts 65 - 127 Octets The number of times the associated 65 to 127 octet counter has overflowed.
HC Overflow Pkts 128 - 255 Octets The number of times the associated 128 to 255 octet counter has overflowed.
HC Overflow Pkts 256 - 511 Octets The number of times the associated 256 to 511 octet counter has overflowed.
HC Overflow Pkts 512 - 1023 Octets The number of times the associated 512 to 1023 octet counter has overflowed.
HC Overflow Pkts 1024 - 1518 Octets The number of times the associated 1024 to 1518 octet counter has overflowed.
Example: The following shows example CLI display output for the command.
(Routing) # show rmon statistics interfaces 0/1
Port: 0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 - 127 Octets: 0
128 - 255 Octets: 0 256 - 511 Octets: 0
512 - 1023 Octets: 0 1024 - 1518 Octets: 0
HC Overflow Pkts: 0 HC Pkts: 0
HC Overflow Octets: 0 HC Octets: 0
HC Overflow Pkts 64 Octets: 0 HC Pkts 64 Octets: 0
HC Overflow Pkts 65 - 127 Octets: 0 HC Pkts 65 - 127 Octets: 0
HC Overflow Pkts 128 - 255 Octets: 0 HC Pkts 128 - 255 Octets: 0
HC Overflow Pkts 256 - 511 Octets: 0 HC Pkts 256 - 511 Octets: 0
HC Overflow Pkts 512 - 1023 Octets: 0 HC Pkts 512 - 1023 Octets: 0
HC Overflow Pkts 1024 - 1518 Octets: 0 HC Pkts 1024 - 1518 Octets: 0
Parameter Description
High Capacity Alarm Index An arbitrary integer index value used to uniquely identify the high capacity alarm entry. The
range is 1 to 65535.
High Capacity Alarm Variable The object identifier of the particular variable to be sampled. Only variables that resolve to
an ASN.1 primitive type of integer.
High Capacity Alarm Interval The interval in seconds over which the data is sampled and compared with the rising and
falling thresholds. The range is 1 to 2147483647. The default is 1.
High Capacity Alarm Sample Type The method of sampling the selected variable and calculating the value to be compared
against the thresholds. Possible types are Absolute Value or Delta Value. The default
is Absolute Value.
High Capacity Alarm Absolute Value The absolute value (that is, the unsigned value) of the hcAlarmVariable statistic during the
last sampling period. The value during the current sampling period is not made available until
the period is complete. This object is a 64-bit unsigned value that is Read-Only.
High Capacity Alarm Absolute Alarm This object indicates the validity and sign of the data for the high capacity alarm absolute
Status value object (hcAlarmAbsValueobject). Possible status types are valueNotAvailable,
valuePositive, or valueNegative. The default is valueNotAvailable.
High Capacity Alarm Startup Alarm High capacity alarm startup alarm that may be sent. Possible values are rising, falling,
or rising-falling. The default is rising-falling.
High Capacity Alarm Rising-Threshold The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0
Absolute Value Low to 4294967295. The default is 1.
High Capacity Alarm Rising-Threshold The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is
Absolute Value High 0 to 4294967295. The default is 0.
High Capacity Alarm Rising-Threshold This object indicates the sign of the data for the rising threshold, as defined by the objects
Value Status hcAlarmRisingThresAbsValueLow and hcAlarmRisingThresAbsValueHigh. Possible values
are valueNotAvailable, valuePositive, or valueNegative. The default is
valuePositive.
High Capacity Alarm Falling-Threshold The lower 32 bits of the absolute value for threshold for the sampled statistic. The range is 0
Absolute Value Low to 4294967295. The default is 1.
High Capacity Alarm Falling-Threshold The upper 32 bits of the absolute value for threshold for the sampled statistic. The range is
Absolute Value High 0 to 4294967295. The default is 0.
High Capacity Alarm Falling-Threshold This object indicates the sign of the data for the falling threshold, as defined by the objects
Value Status hcAlarmFallingThresAbsValueLow and hcAlarmFallingThresAbsValueHigh. Possible values
are valueNotAvailable, valuePositive, or valueNegative. The default is
valuePositive.
High Capacity Alarm Rising Event Index The index of the eventEntry that is used when a rising threshold is crossed. The range is 1
to 65535. The default is 1.
High Capacity Alarm Falling Event Index The index of the eventEntry that is used when a falling threshold is crossed. The range is 1
to 65535. The default is 2.
High Capacity Alarm Failed Attempts The number of times the associated hcAlarmVariable instance was polled on behalf of the
hcAlarmEntry (while in the active state) and the value was not available. This object is a 32-
bit counter value that is read-only.
High Capacity Alarm Owner The owner string associated with the alarm entry. The default is monitorHCAlarm.
Parameter Description
High Capacity Alarm Storage Type The type of non-volatile storage configured for this entry. This object is read-only. The default
is volatile.
Example: The following shows example CLI display output for the command.
(Routing) #show rmon hcalarms
Alarm 1
----------
OID: alarmInterval.1
Last Sample Value: 1
Interval: 1
Sample Type: absolute
Startup Alarm: rising-falling
Rising Threshold High: 0
Rising Threshold Low: 1
Rising Threshold Status: Positive
Falling Threshold High: 0
Falling Threshold Low: 1
Falling Threshold Status: Positive
Rising Event: 1
Falling Event: 2
Startup Alarm: Rising-Falling
Owner: MibBrowser
Configuring the device to display statistics using syslog or email alert. The syslog or email alert messages are sent by
the statistics application at END time.
You can configure the device to display statistics on the console. The collected statistics are presented on the console at
END time.
Format stats group group {id | name} timerange time range name reporting list of reporting methods
Mode Global Config
Parameter Description
group ID, name Name of the group of statistics or its identifier to apply on the interface. The range is:
1. Received
2. Received-errors
3. Transmitted
4. Transmitted-errors
5. Received-transmitted
6. Port-utilization
7. Congestion
The default is None.
time range name Name of the time range for the group or the flow-based rule. The range is 1 to 31 alphanumeric characters. The
default is None.
list of reporting Report the statistics to the configured method. The range is:
methods 0. None
1. Console
2. Syslog
3. E-mail
The default is None.
(Routing) (Config)# stats group received-errors timerange test reporting email syslog
Format stats flow-based rule-id timerange time range name [{srcip ip-address} {dstip
ip-address} {srcmac mac-address} {dstmac mac-address} {srctcpport portid} {dsttcpport
portid} {srcudpport portid} {dstudpport portid}]
Mode Global Config
Parameter Description
rule ID The flow-based rule ID. The range is 1 to 16. The default is None.
time range name Name of the time range for the group or the flow-based rule. The range is 1 to 31 alphanumeric
characters. The default is None.
srcip ip-address Configure the source IP address of the rule.
dstip ip-address Configure the destination IP address of the rule.
srcmac mac-address Configure the source MAC address of the rule
dstmac mac-address Configure the destination MAC address of the rule.
srctcpport portid Configure the source TCP port for the rule.
dsttcpport portid Configure the destination TCP port for the rule.
srcudpport portid Configure the source UDP port for the rule.
dstudpport portid Configure the destination UDP port for the rule.
(Routing) (Config)#stats flow-based 2 timerange test srcip 1.1.1.1 dstip 2.2.2.2 srctcpport 123
dsttcpport 123 srcudpport 123 dstudpport 123
Parameter Description
group id, name Specify the ID or name of the group. The ID and name associations are as follows:
1. received
2. received-errors
3. transmitted
4. transmitted-errors
5. received-transmitted
6. port-utilization
7. congestion
The default is None.
Parameter Description
rule-id The flow-based rule ID. The range is 1 to 16. The default is None.
Parameter Description
group id, name Specify the ID or name of the group. The ID and name associations are as follows:
1. Received
2. Received-errors
3. Transmitted
4. Transmitted-errors
5. Received-transmitted
6. Port-utilization
7. Congestion
The default is None.
Example: The following shows example CLI display output for the command.
(Routing) #show stats group received
Group: received
Time Range: test
Interface List
-----------------
0/2, 0/4, lag 1
Group: port-utilization
Time Range: test
Interface List
--------------
0/2, 0/4, lag 1
Interface Utilization (%)
--------- ---------------
0/2 0
0/4 0
lag 1 0
Parameter Description
rule-id The flow-based rule ID. The range is 1 to 16. The default is None.
Example: The following shows example CLI display output for the command.
(Routing) #show stats flow-based all
Interface List
--------------
0/1 - 0/2
This feature is mainly targeted for top-of-rack (TOR) switches in data center Clos topologies. The goal of ISSU is to maintain
Ethernet data connectivity with the servers attached to TOR switches while the TOR switch software is being upgraded. A
software upgrade that requires a reboot or a kernel upgrade is not supported using ISSU.
During the ISSU process, management to the switch is disrupted. After the upgrade, users must log on to the switch again
and reauthenticate to resume any switch management session.
The ISSU feature is available only on x86 platforms. As of the current EFOS release, the following features support ISSU.
SIM NIM L2 FDB DoS
The 802.1Q, DOT3AD, and DHCP client features have limited support for ISSU.
Any feature not listed previously is ISSU unaware. This means that the feature does not distinguish between an ISSU restart
and a normal restart. A feature that is not ISSU-aware tends to initialize afresh without the knowledge of previously active
instance of the same and can cause traffic disruption during initialization.
Example: The following shows an example of the command output when ISSU succeeds.
Example: The following shows an example of the command output when ISSU succeeds.
Feature licensing allows a disabled license feature to be enabled once a valid feature license file is installed.
For example, the BCM56870 IX8-B ODM platform has 48 × 25G + 8 × 100G ports. But only 16 × 25G + 2 × 100G ports are
enabled by default. An additional downloadable software license is needed to enable multiples of 8 × 25G + 2 × 100G port
blocks and the BroadView feature.
License Index.................................. 1
License File Version........................... 1.0
License Key.................................... 102D-V79T-0001-104F
Serial Number.................................. QTFCU38290010
Model.......................................... IX8-B
Description.................................... Instru license
Downlink Ports................................. 8
Uplink Ports................................... 2
Features....................................... BROADVIEW
License Index.................................. 2
License Type................................... Feature
License Status................................. License applied
Status Details................................. Reboot required to apply license file with index 6
Default disable
Format mmu config enable
Mode Global Config
Parameter Description
ingress Apply ingress MMU configuration.
egress Apply egress MMU configuration.
Parameter Description
id Range 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value In bytes. The range is 0 to 33,030,144.
Parameter Description
id Range 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value In bytes. The range is 0 to 5,242,880.
Parameter Description
id Range 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value In bytes. The range is 0 to 33,030,144.
Parameter Description
start Starts monitoring.
stop Stops monitoring.
view Displays the peak headroom usage value on a service pool basis.
Example 1.
(Routing) (Config)#mmu pool monitor start
Error! Unable to start mmu pool monitoring.
(Routing) (Config)#mmu pool monitor stop
Error! Unable to stop mmu pool monitoring.
(Routing) (Config)#mmu pool monitor view
Error! mmu pool monitor not started.
Example 2.
(Routing) (Config)#mmu pool monitor start
(Routing)(Config)#mmu pool monitor view
Error! Unable to view mmu pool monitor data.
Check mmu pool monitor mode is stopped or not.
Parameter Description
pg-id The priority group ID. The range is 0 to 7.
value The pg-min value in bytes. The range is 0 to 1,048,576.
Format mmu ingress priority-group pg-id pg-shared {static bytes val | dynamic}
Mode Profile Config
Parameter Description
pg-id The priority group ID. The range is 0 to 7.
value The shared buffer value in bytes. The range is 0 to 33,030,144.
Format no mmu ingress priority-group pg-id pg-shared {static bytes val | dynamic}
Mode Profile Config
NOTE: Headroom only makes sense for priority groups that map to no-drop queues—this will be enforced here.
Parameter Description
pg-id The priority group ID. The range is 0 to 7.
value The priority-group headroom buffer value in bytes. The range is 0 to 1,048,576.
Parameter Description
id The service pool ID. The range is 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value The port-min value in bytes. The range is 0 to 1,048,576.
Parameter Description
id The service pool ID. The range is 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value The port-shared value in bytes. The range is 0 to 33,030,144.
Parameter Description
uc-queue-id The Unicast Queue ID. The range is 0 to 9.
value The queue-min value in bytes. The range is 0 to 1,048,576.
Format mmu egress uc-queue-id uc-queue-id queue-shared {static bytes <val> | dynamic}
Mode Profile Config
Interface Config
Parameter Description
uc-queue-id The Unicast Queue ID. The range is 0 to 9.
value The queue-shared value in bytes. The range is 0 to 1,048,576.
Parameter Description
uc-queue-id The Unicast Queue ID. The range is 0 to 9.
value The queue-min value in bytes. The range is 0 to 1,048,576.
Format mmu egress uc-qgroup-id uc-qgroup-id queue-shared {static bytes val | dynamic}
Mode Profile Config
Interface Config
Parameter Description
uc-queue-id The Unicast Queue ID. The range is 0 to 9.
value The queue-shared value in bytes. The range is 0 to 1,048,576.
Parameter Description
uc-queue-id The service pool ID. The range is 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value The port-shared value in bytes. The range is 0 to 33,030,144.
Parameter Description
profile-name The configured MMU profile name.
Parameter Description
pg-id The priority group ID. The range is 0 to 7.
value The pg-min value in bytes. The range is 0 to 1,048,576.
Format mmu ingress priority-group pg-id pg-shared {static bytes val | dynamic}
Mode Interface Config
Parameter Description
pg-id The priority group ID. The range is 0 to 7.
value The shared buffer value in bytes. The range is 0 to 33,030,144.
Format no mmu ingress priority-group pg-id pg-shared {static bytes val | dynamic}
Mode Interface Config
NOTE: Headroom only makes sense for priority groups that map to no-drop queues—this will be enforced here.
Parameter Description
pg-id The priority group ID. The range is 0 to 7.
value The priority- group headroom buffer value in bytes. The range is 0 to 1,048,576.
Parameter Description
id The service-pool ID. The range is 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value The port-min value in bytes. The range is 0 to 1,048,576.
Parameter Description
id The service-pool ID. The range is 0 to 3.
NOTE: In EFOS 3.6, only value 0 is supported.
value The port-shared buffer value in bytes. The range is 0 to 33,030,144.
Fields Description
MMU Config Status Indicates whether MMU configuration is enabled or disabled.
Total System MMU Memory The number of bytes available for user configuration.
Reserved System MMU The reserved number of bytes. This includes PG, SP min limits, headroom pool, and global headroom.
Memory
Shared System MMU Memory The shared number of bytes allocated for shared usage. This is the shared pool limit configuration.
The user should always ensure that the sum of the reserved system MMU and shared system MMU space adds up to the
total MMU memory. Otherwise, the user will lose predictability on packets being buffered as expected in MMU.
Example: The following is an example of the command.
(Routing)# show mmu config
*** (b)-bytes
*** System MMU is underutilized by 60299984 bytes. Allocate more shared space or increase the minimum
limits.
*** (b)-bytes
*** (b)-bytes
*** (b)-bytes
Transparent clocks are PTP nodes that do not process PTP packets but only modifies them to account for residence time
correction (latency incurred while transit through the device). Transparent clocks measure the variable delay as the PTP
packets pass through the switch or router. The measured delay is accounted for by adding the residence time into the
correction field of the PTP packet.
Transparent clocks can be E2E or P2P. E2E transparent clock update the correction field of the PTP packet with the
residence time alone while P2P clocks can update the correction field with the residence time of packet + path delay.
Default disabled
Format ptp clock e2e-transparent
Mode Global Config
Default disabled
Format ptp clock e2e-transparent
Mode Interface Config
Parameter Description
Admin Mode Global admin mode of E2E TC configuration. Possible values are Enabled or Disabled.
NOTE: The commands in this chapter are in one of three functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration command, there
is a show command that displays the configuration setting.
Clear commands clear some or all of the settings to factory defaults.
5.1.1 interface
This command gives you access to the Interface Config mode, which allows you to enable or modify the operation of an
interface (port). You can also specify a range of ports to configure at the same time by specifying the starting slot/port and
ending slot/port, separated by a hyphen.
Example: The following example enters Interface Config mode for port 0/1:
(Routing) #configure
(Routing) (config)#interface 0/1
(Routing) (interface 0/1)#
Example: The following example enters Interface Config mode for ports 0/1 through 0/4:
(Routing)#configure
(Routing) (config)#interface 0/1-0/4
(Routing) (interface 0/1-0/4)#
5.1.2 auto-negotiate
This command enables automatic negotiation on a port or range of ports.
Default enabled
Format auto-negotiate
Mode Interface Config
5.1.2.0.1 no auto-negotiate
This command disables automatic negotiation on a port.
Format no auto-negotiate
Mode Interface Config
5.1.4 description
Use this command to create an alphanumeric description of an interface or range of interfaces.
5.1.5 fec
Use this command to enable forward error correction (FEC) for an interface in adherence with IEEE requirements (IEEE
802.3bj -CL 91). This command is available only on interfaces operating at 100G, 50G, and 25G speeds. If you change the
speed of an interface to a speed at which FEC is not supported, FEC is automatically disabled on the interface. When the
interface returns to the speed that supports FEC, EFOS retains the original FEC configuration and re-applies it on the
interface.
5.1.5.0.1 no fec
Use this command to disable FEC on an interface.
Format no fec
Mode Interface Config
5.1.6 media-type
Use this command to change between fiber and copper mode on the Combo port.
Combo Port: A port or an interface that can operate in either copper or in fiber mode.
Copper and Fiber port: A port that uses copper a medium for communication (for example, RJ-45 ports). A fiber port
uses the fiber optics as a medium for communication (for example, example SFP ports).
RJ45: Only the copper medium works. The fiber medium is always down.
5.1.6.0.1 no media-type
Use this command to revert the media-type configuration and configure the default value on the interface.
Format no media-type
Mode Interface Config
5.1.7 mtu
Use the mtu command to set the maximum transmission unit (MTU) size, in bytes, for frames that ingress or egress the
interface. You can use the mtu command to configure jumbo frame support for physical and port-channel (LAG) interfaces.
For the standard EFOS implementation, the MTU size is a valid integer between 1504 to 12270 for tagged packets and a
valid integer between 1500 to 12270 for untagged packets.
NOTE: To receive and process packets, the Ethernet MTU must include any extra bytes that Layer-2 headers might
require. To configure the IP MTU size, which is the maximum size of the IP packet (IP Header + IP payload), see
the ip mtucommand.
5.1.7.0.1 no mtu
This command sets the default MTU size (in bytes) for the interface.
Format no mtu
Mode Interface Config
5.1.8 shutdown
This command disables a port or range of ports.
NOTE: You can use the shutdown command on physical and port-channel (LAG) interfaces, but not on VLAN routing
interfaces.
Default enabled
Format shutdown
Mode Interface Config
5.1.8.0.1 no shutdown
This command enables a port.
Format no shutdown
Mode Interface Config
NOTE: You can use the shutdown all command on physical and port-channel (LAG) interfaces, but not on VLAN routing
interfaces.
Default enabled
Format shutdown all
Mode Global Config
5.1.10 speed
Use this command to enable or disable auto-negotiation and set the speed that will be advertised by that port. The duplex
parameter allows you to set the advertised speed for both half as well as full duplex mode.
Use the auto keyword to enable auto-negotiation on the port. Use the command without the auto keyword to ensure
auto-negotiation is disabled and to set the port speed and mode according to the command values. If auto-negotiation is
disabled, the speed and duplex mode must be set.
Default Auto-negotiation is enabled. Advertised speed is 10h, 10f, 100h, 100f, 1000f.
Format speed all {100 | 10} {half-duplex | full-duplex}
Mode Global Config
Parameter Description
Interface The interface associated with the rest of the information in the row.
Configured FEC The FEC status for the interface.
Status
Parameter Description
Port The slot/port.
Configured Media The media type for the interface.
Type auto-select—The media type is automatically selected. The preferred media type is displayed.
RJ45—RJ-45
SFP—SFP
Parameter Description
Interface slot/port
Type If not blank, this field indicates that this port is a special type of port. The possible values are:
Mirror – This port is a monitoring port.
PC Mbr – This port is a member of a port-channel (LAG).
Probe – This port is a probe port.
Admin Mode The port control administration state. The port must be enabled in order for it to be allowed into the network. May
be enabled or disabled. The factory default is enabled.
Physical Mode The desired port speed and duplex mode. If auto-negotiation support is selected, then the duplex mode and
speed is set from the auto-negotiation process. Note that the maximum capability of the port (full duplex -100M)
is advertised. Otherwise, this object determines the port's duplex mode and transmission rate. The factory default
is Auto.
Physical Status The port speed and duplex mode.
Link Status The link is up or down.
Link Trap This object determines whether to send a trap when link status changes. The factory default is enabled.
LACP Mode LACP is enabled or disabled on this port.
Example: The following command shows an example of the command output for all ports.
(Routing) #show port all
Example: The following command shows an example of the command output for a range of ports.
(Routing) #show port 0/1-1/6
Parameter Description
Interface The slot/port or LAG with the information to view.
ifIndex The interface index number associated with the port.
Description The alphanumeric description of the interface created by the description command.
MAC address The MAC address of the port. The format is six 2-digit hexadecimal numbers that are separated by colons, for
example, 01:23:45:67:89:AB.
Bit Offset Val The bit offset value.
Example: The following shows example CLI display output for the command.
Interface...........0/1
ifIndex.............1
Description.........
MAC address.........00:10:18:82:0C:10
Bit Offset Val......1
This command can only be executed on interfaces that support the expandable ports feature. Entering the command on any
other type of interface will give an error.
Parameter Description
mode The available modes depend on the platform. Possible modes are:
1×40g: Configure the port as a single 40G port using four lanes.
4×10g: Configure the port as four 10G ports, each on a separate lane. This mode requires the use of a
suitable 4×10G to 1×40G pigtail cable.
1×100g: Configure the port as a single 100G port using four lanes. The 100G ports may be reconfigured as
40G ports using the interface speed command.
2×50g: Configure the port as two 50G ports, each using two lanes. This mode requires the use of a suitable
1×100G to 2×50G pigtail cable
4×25g: Configure the port as a four 25G ports, each on a separate lane. This mode requires the use of a
suitable 4×25G to 1×100G pigtail cable. The 4×25G ports may be reconfigured as 4×10G ports with the
interface speed command.
The user can optionally specify an interface or all expandable interfaces to display.
Example: The following shows example CLI display output for the command.
NOTE: The port mappings can vary from platform to platform. This example is only for illustration, and may not represent
the actual port mappings on all platforms.
For platforms that support expandable ports (high-density ports that can be split into multiple lane modes), additional
information is displayed in the output.
NOTE:
STP is enabled on the switch and on all ports and LAGs by default.
If STP is disabled, the system does not forward BPDU messages.
5.2.1 spanning-tree
This command sets the spanning-tree operational mode to enabled.
Default enabled
Format spanning-tree
Mode Global Config
5.2.1.0.1 no spanning-tree
This command sets the spanning-tree operational mode to disabled. While disabled, the spanning-tree configuration is
retained and can be changed but is not activated.
Format no spanning-tree
Mode Global Config
Default enabled
Format spanning-tree auto-edge
Mode Interface Config
Backbonefast accelerates finding an alternate path when an indirect link to the root port goes down.
Backbonefast can be configured even if the switch is configured for MST(RSTP) or PVST mode. It only has an effect when
the switch is configured for the PVST mode.
If a backbonefast-enabled switch receives an inferior BPDU from its designated switch on a root or blocked port, it sets the
maximum aging time on the interfaces on which it received the inferior BPDU if there are alternate paths to the designated
switch. This allows a blocked port to immediately move to the listening state where the port can be transitioned to the
forwarding state in the normal manner.
On receipt of an inferior BPDU from a designated bridge, backbonefast enabled switches send a Root Link Query (RLQ)
request to all non-designated ports except the port from which it received the inferior BPDU. This check validates that the
switch can receive packets from the root on ports where it expects to receive BPDUs. The port from which the original inferior
BPDU was received is excluded because it has already encountered a failure. Designated ports are excluded as they do not
lead to the root.
On receipt of an RLQ response, if the answer is negative, the receiving port has lost connection to the root and its BPDU is
immediately aged out. If all nondesignated ports have already received a negative answer, the whole bridge has lost the root
and can start the STP calculation from scratch.
If the answer confirms the switch can access the root bridge on a port, it can immediately age out the port on which it initially
received the inferior BPDU.
A bridge that sends an RLQ puts its bridge ID in the PDU. This ensures that it does not flood the response on designated
ports.
A bridge that receives an RLQ and has connectivity to the root forwards the query toward the root through its root port.
A bridge that receives a RLQ request and does not have connectivity to the root (switch bridge ID is different from the root
bridge ID in the query) or is the root bridge immediately answers the query with its root bridge ID.
Default NA
Format spanning-tree backbonefast
Mode Global Config
NOTE: Per VLAN Rapid Spanning Tree Protocol (PVRSTP) embeds support for FastBackbone and FastUplink. Even if
FastUplink and FastBackbone are configured, they are effective only in PVSTP mode.
Default auto
Format spanning-tree cost {cost | auto}
Mode Interface Config
Default disabled
Format spanning-tree bpdufilter
Mode Interface Config
Default disabled
Format no spanning-tree bpdufilter
Mode Interface Config
Default disabled
Format spanning-tree bpdufilter
Mode Global Config
Default disabled
Format no spanning-tree bpdufilter default
Mode Global Config
Default disabled
Format spanning-tree bpduflood
Mode Interface Config
Default disabled
Format no spanning-tree bpduflood
Mode Interface Config
Default disabled
Format spanning-tree bpduguard
Mode Global Config
Default disabled
Format no spanning-tree bpduguard
Mode Global Config
Default 0
Format spanning-tree configuration revision 0-65535
Mode Global Config
Default 15
Format spanning-tree forward-time 4-30
Default none
Format spanning-tree guard {none | root | loop}
Mode Interface Config
Default 20
Format spanning-tree max-age 6-40
Mode Global Config
Default 20
When PVSTP or rapid PVSTP (PVRSTP) is enabled, MSTP/RSTP/STP is operationally disabled. To reenable MSTP/RSTP/
STP, disable PVSTP/RVPVSTP. By default, EFOS has MSTP enabled. In PVSTP or PVRSTP mode, BPDUs contain per-
VLAN information instead of the common spanning-tree information (MST/RSTP).
PVSTP maintains independent spanning tree information about each configured VLAN. PVSTP uses IEEE 802.1Q trunking
and allows a trunked VLAN to maintain blocked or forwarding state per port on a per-VLAN basis. This allows a trunk port
to be forwarded on some VLANs and blocked on other VLANs.
PVRSTP is based on the IEEE 8012.1w standard. It supports fast convergence IEEE 802.1D. RVPVSTP is compatible with
IEEE 802.1D spanning tree. PVRSTP sends BPDUs on all ports, instead of only the root bridge sending BPDUs, and
supports the discarding, learning, and forwarding states.
When the mode is changed to PVRSTP, version 0 STP BPDUs are no longer transmitted and version 2 PVRSTP BPDUs
that carry per-VLAN information are transmitted on the VLANs enabled for spanning-tree. If a version 0 BPDU is seen,
RVPVSTP reverts to sending version 0 BPDUs.
Per VLAN Rapid Spanning Tree Protocol (PVRSTP) embeds support for PVSTP FastBackbone and FastUplink. There is no
provision to enable or disable these features in PVRSTP.
Default MST
Format spanning-tree mode {mst | pvst | rapid-pvst | stp | rstp }
Mode Global Config
If you specify the cost option, the command sets the path cost for this port within a multiple spanning tree instance or the
common and internal spanning tree instance, depending on the mstid parameter. You can set the path cost as a number in
the range of 1 to 200,000,000 or auto. If you select auto, the path cost value is set based on Link Speed.
If you specify the port-priority option, this command sets the priority for this port within a specific multiple spanning tree
instance or the common and internal spanning tree instance, depending on the mstid parameter. The port-priority value is
a number in the range of 0 to 240 in increments of 16.
Default cost—auto
port-priority—128
Format spanning-tree mst mstid {{cost 1-200000000 | auto} | port-priority 0-240}
Mode Interface Config
If the you specify cost, this command sets the path cost for this port within a multiple spanning tree instance or the common
and internal spanning tree instance, depending on the mstid parameter, to the default value, that is, a path cost value based
on the Link Speed.
If you specify port-priority, this command sets the priority for this port within a specific multiple spanning tree instance
or the common and internal spanning tree instance, depending on the mstid parameter, to the default value.
Default none
Format spanning-tree mst instance mstid
Mode Global Config
If you specify 0 (defined as the default CIST ID) as the mstid, this command sets the Bridge Priority parameter to a new
value for the common and internal spanning tree. The bridge priority value is a number within a range of 0 to 61440. The 12
least significant bits are masked according to the 802.1s specification. This causes the priority to be rounded down to the
next lower valid priority.
Default 32768
Format spanning-tree mst priority mstid 0-61440
Mode Global Config
If 0 (defined as the default CIST ID) is passed as the mstid, this command sets the Bridge Priority parameter for the common
and internal spanning tree to the default value.
Format no spanning-tree mst priority mstid
Mode Global Config
All LAN ports have 128 as priority value by default. PVSTP/PVRSTP puts the LAN port with the lowest LAN port number in
the forwarding state and blocks other LAN ports.
The application uses the port priority value when the LAN port is configured as an edge port.
Default enabled
Format spanning-tree port-priority 0-240
Mode Interface Config
Default 6
Format spanning-tree transmit hold-count
Mode Global Config
Parameter Description
hold-count The Bridge Tx hold-count parameter. The value in an integer between 1 and 10.
Default enabled
Format spanning-tree tcnguard
Mode Interface Config
Uplinkfast can be configured even if the switch is configured for MST(RSTP) mode, but it only has an effect when the switch
is configured for PVST mode. Enabling FastUplink increases the priority by 3000. Path costs less than 3000 have an
additional 3000 added when uplinkfast is enabled. This reduces the probability that the switch will become the root switch.
Uplinkfast immediately changes to an alternate root port on detecting a root port failure and changes the new root port
directly to the forwarding state. A TCN is sent for this event.
After a switchover to an alternate port (new root port), uplinkfast multicasts a gratuitous frame on the new root port on behalf
of each attached machine so that the rest of the network knows to use the secondary link to reach that machine.
PVRSTP embeds support for backbonefast and uplinkfast. There is no provision to enable or disable these features in
PVRSTP configured switches.
Default 150
Default none
Format spanning-tree vlan vlan-list
Mode Global Config
Parameter Description
vlan-list The VLANs to which to apply this command.
Default none
Format spanning-tree vlan vlan-id cost {auto |1-200000000}
Mode Interface Config
Set this value to a lower number to accelerate the transition to forwarding. The network operator should take into account
the end-to-end BPDU propagation delay, the maximum frame lifetime, the maximum transmission halt delay, and the
message age overestimate values specific to their network when configuring this parameter.
Default 15 seconds
Format spanning-tree vlan vlan-list forward-time 4-30
Mode Global Config
Parameter Description
vlan-list The VLANs to which to apply this command.
forward-time The spanning tree forward delay time. The range is 4 to 30 seconds.
Default 2 seconds
Format spanning-tree vlan vlan-list hello-time 1-10
Mode Global Config
Parameter Description
vlan-list The VLANs to which to apply this command.
hello-time The spanning tree forward hello time. The range is 1 to 10 seconds.
Set this value to a lower number to accelerate the discovery of topology changes. The network operator must take into
account the end-to-end BPDU propagation delay and message age overestimate for their specific topology when configuring
this value.
The default setting of 20 seconds is suitable for a network of diameter 7, lost message value of 3, transit delay of 1, hello
interval of 2 seconds, overestimate per bridge of 1 second, and a BPDU delay of 1 second. For a network of diameter 4, a
setting of 16 seconds is appropriate if all other timers remain at their default values.
Default 20 seconds
Format spanning-tree vlan vlan-list max-age 6-40
Mode Global Config
Parameter Description
vlan-list The VLANs to which to apply this command.
hello-time The spanning tree forward hello time. The range is 1 to 10 seconds.
Default none
Parameter Description
vlan-list The VLANs to which to apply this command.
priority The VLAN port priority. The range is 0 to 255.
The logic takes care of setting the bridge priority to a value lower (primary) or next lower (secondary) than the lowest bridge
priority for the specified VLAN or a range of VLANs.
Default 32768
Format spanning-tree vlan vlan-list root {primary|secondary}
Mode Global Config
Parameter Description
vlan-list The VLANs to which to apply this command.
If the value configured is not among the specified values, it will be rounded off to the nearest valid value.
Default 32768
Format spanning-tree vlan vlan-list priority priority
Mode Global Config
Parameter Description
vlan-list The VLANs to which to apply this command.
priority The VLAN bridge priority. Valid values are 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864,
40960, 45056, 49152, 53248, 57344, and 61440.
Parameter Description
Bridge Priority Specifies the bridge priority for the Common and Internal Spanning tree (CST). The value lies between 0
and 61440. It is displayed in multiples of 4096.
Bridge Identifier The bridge identifier for the CST. It is made up using the bridge priority and the base MAC address of the
bridge.
Time Since Topology Change Time in seconds.
Topology Change Count Number of times changed.
Topology Change Boolean value of the Topology Change parameter for the switch indicating if a topology change is in
progress on any port assigned to the common and internal spanning tree.
Designated Root The bridge identifier of the root bridge. It is made up from the bridge priority and the base MAC address
of the bridge.
Root Path Cost Value of the Root Path Cost parameter for the common and internal spanning tree.
Root Port Identifier Identifier of the port to access the Designated Root for the CST
Root Port Max Age Derived value.
Root Port Bridge Forward Derived value.
Delay
Hello Time Configured value of the parameter for the CST.
Bridge Hold Time Minimum time between transmission of Configuration Bridge Protocol Data Units (BPDUs).
Bridge Max Hops Bridge max-hops count for the device.
CST Regional Root Bridge Identifier of the CST Regional Root. It is made up using the bridge priority and the base MAC
address of the bridge.
Regional Root Path Cost Path Cost to the CST Regional Root.
Associated FIDs List of forwarding database identifiers currently associated with this instance.
Associated VLANs List of VLAN IDs currently associated with this instance.
Example 1
(Routing)#show spanning-tree active
Spanning Tree: Enabled (BPDU Flooding: Disabled) Portfast BPDU Filtering: Disabled
Mode: rstp
CST Regional Root: 80:00:00:01:85:48:F0:0F
Regional Root Path Cost: 0
Address 00:00:EE:EE:EE:EE
This Switch is the Root.
Hello Time: 2s Max Age: 20s Forward Delay: 15s
Interfaces
Example 2
(Routing)#show spanning-tree active
VLAN 1
RootID Priority 32769
Address 00:00:EE:EE:EE:EE
Cost 0
Port This switch is the root
Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec
BridgeID Priority 32769 (priority 32768 sys-id-ext 1)
Address 00:00:EE:EE:EE:EE
Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300 sec
Example 3
(Routing)#show spanning-tree active
VLAN 1
RootID Priority 32769
Address 00:00:EE:EE:EE:EE
Cost 0
Port 10(3/10 )
Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec
BridgeID Priority 32769 (priority 32768 sys-id-ext 1)
Address 00:00:EE:EE:EE:EE
Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300 sec
VLAN 3
RootID Priority 32771
Address 00:00:EE:EE:EE:EE
Cost 0
Port 10(3/10 )
Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec
BridgeID Priority 32771 (priority 32768 sys-id-ext 3)
Address 00:00:EE:EE:EE:EE
Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300 sec
Parameter Description
Transitions using Backbonefast The number of backbonefast transitions.
Inferior BPDUs received (all VLANs) The number of inferior BPDUs received on all VLANs.
RLQ request PDUs received (all VLANs) The number of root link query (RLQ) requests PDUs received on all VLANs.
RLQ response PDUs received (all VLANs) The number of RLQ response PDUs received on all VLANs.
RLQ request PDUs sent (all VLANs) The number of RLQ request PDUs sent on all VLANs.
RLQ response PDUs sent (all VLANs) The number of RLQ response PDUs sent on all VLANs.
Backbonefast Statistics
-----------------------
Transitions using Backbonefast (all VLANs) : 0
Inferior BPDUs received (all VLANs) : 0
RLQ request PDUs received (all VLANs) : 0
RLQ response PDUs received (all VLANs) : 0
RLQ request PDUs sent (all VLANs) : 0
RLQ response PDUs sent (all VLANs) : 0
Parameter Description
Bridge Priority Configured value.
Bridge Identifier The bridge identifier for the selected MST instance. It is made up using the bridge priority and the base
MAC address of the bridge.
Bridge Max Age Configured value.
Bridge Max Hops Bridge max-hops count for the device.
Bridge Hello Time Configured value.
Bridge Forward Delay Configured value.
Bridge Hold Time Minimum time between transmission of Configuration Bridge Protocol Data Units (BPDUs).
Parameter Description
Hello Time Admin hello time for this port.
Port Mode Enabled or disabled.
BPDU Guard Effect Enabled or disabled.
Root Guard Enabled or disabled.
Loop Guard Enabled or disabled.
TCN Guard Enable or disable the propagation of received topology change notifications and topology changes to
other ports.
BPDU Filter Mode Enabled or disabled.
Parameter Description
BPDU Flood Mode Enabled or disabled.
Auto Edge To enable or disable the feature that causes a port that has not seen a BPDU for edge delay time,
to become an edge port and transition to forwarding faster.
Port Up Time Since Counters Last Time since port was reset, displayed in days, hours, minutes, and seconds.
Cleared
STP BPDUs Transmitted Spanning Tree Protocol Bridge Protocol Data Units sent.
STP BPDUs Received Spanning Tree Protocol Bridge Protocol Data Units received.
RSTP BPDUs Transmitted Rapid Spanning Tree Protocol Bridge Protocol Data Units sent.
RSTP BPDUs Received Rapid Spanning Tree Protocol Bridge Protocol Data Units received.
MSTP BPDUs Transmitted Multiple Spanning Tree Protocol Bridge Protocol Data Units sent.
MSTP BPDUs Received Multiple Spanning Tree Protocol Bridge Protocol Data Units received.
Parameter Description
mstid A multiple spanning tree instance identifier. The value is 0 to 4094.
Format show spanning-tree mst port detailed mstid {slot/port | lag lag-id}
Mode Privileged EXEC
User EXEC
Parameter Description
MST Instance ID The ID of the existing MST instance.
Port Identifier The port identifier for the specified port within the selected MST instance. It is made up from the port
priority and the interface number of the port.
Port Priority The priority for a particular port within the selected MST instance. The port priority is displayed in
multiples of 16.
Port Forwarding State Current spanning tree state of this port.
Port Role Each enabled MST Bridge Port receives a Port Role for each spanning tree. The port role is one of
the following values: Root Port, Designated Port, Alternate Port, Backup Port, Master Port or Disabled
Port
Auto-Calculate Port Path Cost Indicates whether auto calculation for port path cost is enabled.
Parameter Description
Port Path Cost Configured value of the Internal Port Path Cost parameter.
Designated Root The Identifier of the designated root for this port.
Root Path Cost The path cost to get to the root bridge for this instance. The root path cost is zero if the bridge is the
root bridge for that instance.
Designated Bridge Bridge Identifier of the bridge with the Designated Port.
Designated Port Identifier Port on the Designated Bridge that offers the lowest cost to the LAN.
Loop Inconsistent State The current loop inconsistent state of this port in this MST instance. When in loop inconsistent state,
the port has failed to receive BPDUs while configured with loop guard enabled. Loop inconsistent
state maintains the port in a blocking state until a subsequent BPDU is received.
Transitions Into Loop Inconsistent The number of times this interface has transitioned into loop inconsistent state.
State
Transitions Out of Loop The number of times this interface has transitioned out of loop inconsistent state.
Inconsistent State
If you specify 0 (defined as the default CIST ID) as the mstid, this command displays the settings and parameters for a
specific switch port within the common and internal spanning tree. The slot/port is the desired switch port. In this case,
the following are displayed.
Parameter Description
Port Identifier The port identifier for this port within the CST.
Port Priority The priority of the port within the CST.
Port Forwarding State The forwarding state of the port within the CST.
Port Role The role of the specified interface within the CST.
Auto-Calculate Port Path Cost Indicates whether auto calculation for port path cost is enabled or not (disabled).
Port Path Cost The configured path cost for the specified interface.
Auto-Calculate External Port Path Indicates whether auto calculation for external port path cost is enabled.
Cost
External Port Path Cost The cost to get to the root bridge of the CIST across the boundary of the region. This means that if
the port is a boundary port for an MSTP region, then the external path cost is used.
Designated Root Identifier of the designated root for this port within the CST.
Root Path Cost The root path cost to the LAN by the port.
Designated Bridge The bridge containing the designated port.
Designated Port Identifier Port on the Designated Bridge that offers the lowest cost to the LAN.
Topology Change Value of flag in next Configuration Bridge Protocol Data Unit (BPDU) transmission indicating if a
Acknowledgement topology change is in progress for this port.
Hello Time The hello time in use for this port.
Edge Port The configured value indicating if this port is an edge port.
Edge Port Status The derived value of the edge port status. True if operating as an edge port; false otherwise.
Point To Point MAC Status Derived value indicating if this port is part of a point to point link.
CST Regional Root The regional root identifier in use for this port.
CST Internal Root Path Cost The internal root path cost to the LAN by the designated external port.
Loop Inconsistent State The current loop inconsistent state of this port in this MST instance. When in loop inconsistent state,
the port has failed to receive BPDUs while configured with loop guard enabled. Loop inconsistent
state maintains the port in a blocking state until a subsequent BPDU is received.
Transitions Into Loop Inconsistent The number of times this interface has transitioned into loop inconsistent state.
State
Parameter Description
Transitions Out of Loop The number of times this interface has transitioned out of loop inconsistent state.
Inconsistent State
If you specify 0 (defined as the default CIST ID) as the mstid, the status summary displays for one or all ports within the
common and internal spanning tree.
Format show spanning-tree mst port summary mstid {slot/port | lag lag-id | all}
Mode Privileged EXEC
User EXEC
Parameter Description
MST Instance ID The MST instance associated with this port.
Interface slot/port
STP Mode Indicates whether spanning tree is enabled or disabled on the port.
Type Currently not used.
STP State The forwarding state of the port in the specified spanning tree instance.
Port Role The role of the specified port within the spanning tree.
Desc Indicates whether the port is in loop inconsistent state or not. This field is blank if the loop guard feature is not
available.
Parameter Description
MST Instance ID The ID of the existing MST instance.
Interface slot/port
STP Mode Indicates whether spanning tree is enabled or disabled on the port.
Type Currently not used.
STP State The forwarding state of the port in the specified spanning tree instance.
Port Role The role of the specified port within the spanning tree.
Desc Indicates whether the port is in loop inconsistent state. This field is blank if the loop guard feature is not available.
Parameter Description
MST Instance ID List List of multiple spanning trees IDs currently configured.
For each MSTID: List of forwarding database identifiers associated with this instance.
Associated FIDs List of VLAN IDs associated with this instance.
Associated VLANs
Parameter Description
Spanning Tree Adminmode Enabled or disabled.
Spanning Tree Version Version of 802.1 currently supported (IEEE 802.1s, IEEE 802.1w, or IEEE 802.1d) based upon
the Force Protocol Version parameter.
BPDU Guard Mode Enabled or disabled.
BPDU Filter Mode Enabled or disabled.
Configuration Name Identifier used to identify the configuration currently being used.
Configuration Revision Level Identifier used to identify the configuration currently being used.
Configuration Digest Key A generated key used in the exchange of the BPDUs.
Configuration Format Selector Specifies the version of the configuration format being used in the exchange of BPDUs. The
default value is zero.
MST Instances List of all multiple spanning tree instances configured on the switch.
Parameter Description
Uplinkfast transitions (all VLANs) The number of uplinkfast transitions on all VLANs.
Proxy multicast addresses transmitted (all VLANs) The number of proxy multicast addresses transmitted on all VLANs.
Uplinkfast is enabled.
BPDU update rate : 150 packets/sec
Uplinkfast Statistics
---------------------
Uplinkfast transitions (all VLANs)................. 0
Proxy multicast addresses transmitted (all VLANs).. 0
Example: The following shows example CLI display output for the command.
(Routing) show spanning-tree vlan 1
VLAN 1
Spanning-tree enabled protocol rpvst
RootID Priority 32769
Address 00:0C:29:D3:80:EA
Cost 0
Port This switch is the root
Hello Time 2 Sec Max Age 15 sec Forward Delay 15 sec
BridgeID Priority 32769 (priority 32768 sys-id-ext 1)
Address 00:0C:29:D3:80:EA
Hello Time 2 Sec Max Age 15 sec Forward Delay 15 sec
Aging Time 300
Interface Role Sts Cost Prio.Nbr
--------- ---------- ------------- --------- --------
1/0/1 Designated Forwarding 3000 128.1
1/0/2 Designated Forwarding 3000 128.2
1/0/3 Disabled Disabled 3000 128.3
1/0/4 Designated Forwarding 3000 128.4
1/0/5 Designated Forwarding 3000 128.5
1/0/6 Designated Forwarding 3000 128.6
1/0/7 Designated Forwarding 3000 128.7
1/0/8 Designated Forwarding 3000 128.8
0/1/1 Disabled Disabled 3000 128.1026
0/1/2 Disabled Disabled 3000 128.1027
5.3.3 vlan
This command creates a new VLAN and assigns it an ID. The ID is a valid VLAN identification number (ID 1 is reserved for
the default VLAN). VLAN range is 1 to 4093.
Format vlan 1-4093
Mode VLAN Database
5.3.3.0.1 no vlan
This command deletes an existing VLAN. The ID is a valid VLAN identification number (ID 1 is reserved for the default
VLAN). The VLAN range is 1 to 4093.
Format no vlan 1-4093
Mode VLAN Database
Default all
Format vlan acceptframe {admituntaggedonly |vlanonly | all}
Mode Interface Config
Default disabled
Format vlan ingressfilter
Mode Interface Config
Format vlan internal allocation {base vlan-id | policy ascending | policy descending}
Mode Global Config
Parameter Description
base vlan-id The first VLAN ID to be assigned to a port-based routing interface.
Parameter Description
policy ascending VLAN IDs assigned to port-based routing interfaces start at the base and increase in value
policy descending VLAN IDs assigned to port-based routing interfaces start at the base and decrease in value
Mode Description
VLAN Only mode Untagged frames or priority frames received on this interface are discarded.
Admit All mode Untagged frames or priority frames received on this interface are accepted and assigned the value of the interface
VLAN ID for this port.
With either option, VLAN tagged frames are forwarded in accordance with the IEEE 802.1Q VLAN Specification.
Default 1
Format vlan pvid 1-4093
Mode Interface Config
Interface Range Config
Default enable
Format vlan vlan-list stats
Mode VLAN Database
Default enable
Format no vlan vlan-list stats
Mode VLAN Database
Parameter Description
Primary Primary VLAN identifier. The range of the VLAN ID is 1 to 4093.
Secondary Secondary VLAN identifier.
Type Secondary VLAN type (community, isolated, or primary).
Ports Ports which are associated with a private VLAN.
VLAN ID The VLAN identifier (VID) associated with each VLAN. The range of the VLAN ID is 1 to 4093.
VLAN Name A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric characters long, including
blanks. The default is blank. VLAN ID 1 always has a name of Default. This field is optional.
VLAN Type Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and permanently defined), or
Dynamic. A dynamic VLAN can be created by GVRP registration or during the 802.1X authentication process
(DOT1X) if a RADIUS-assigned VLAN does not exist on the switch.
Interface The physical port, or LAG interface associated with the rest of the data in the row.
Current The degree of participation of this port in this VLAN. The permissible values are:
Include - This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE
802.1Q standard.
Exclude - This port is never a member of this VLAN. This is equivalent to registration forbidden in the IEEE
802.1Q standard.
Autodetect - To allow the port to be dynamically registered in this VLAN using GVRP. The port will not
participate in this VLAN unless a join request is received on this port. This is equivalent to registration normal
in the IEEE 802.1Q standard.
Configured The configured degree of participation of this port in this VLAN. The permissible values are:
Include - This port is always a member of this VLAN. This is equivalent to registration fixed in the IEEE
802.1Q standard.
Exclude - This port is never a member of this VLAN. This is equivalent to registration forbidden in the IEEE
802.1Q standard.
Autodetect - To allow the port to be dynamically registered in this VLAN using GVRP. The port will not
participate in this VLAN unless a join request is received on this port. This is equivalent to registration normal
in the IEEE 802.1Q standard.
Tagging The tagging behavior for this port in this VLAN.
Tagged - Transmit traffic for this VLAN as tagged frames.
Untagged - Transmit traffic for this VLAN as untagged frames.
VlanID............................................ 20
RxBytes........................................... 0
RxFrames.......................................... 0
RxDiscardBytes.................................... 0
RxDiscardFrames................................... 0
TxBytes........................................... 0
TxFrames.......................................... 0
TxDiscardBytes.................................... 0
TxDiscardFrames................................... 0
VlanID............................................ 30
RxBytes........................................... 0
RxFrames.......................................... 0
RxDiscardBytes.................................... 0
RxDiscardFrames................................... 0
TxBytes........................................... 0
TxFrames.......................................... 0
TxDiscardBytes.................................... 0
TxDiscardFrames................................... 0
Example: To display statistics on all available VLANs.
(Switching) # show vlan stats
VlanID............................................ 1
RxBytes........................................... 0
RxFrames.......................................... 0
RxDiscardBytes.................................... 0
RxDiscardFrames................................... 0
TxBytes........................................... 0
TxFrames.......................................... 0
TxDiscardBytes.................................... 0
TxDiscardFrames................................... 0
VlanID............................................ 10
RxBytes........................................... 0
RxFrames.......................................... 0
RxDiscardBytes.................................... 0
RxDiscardFrames................................... 0
TxBytes........................................... 0
TxFrames.......................................... 0
TxDiscardBytes.................................... 0
TxDiscardFrames................................... 0
VlanID............................................ 20
RxBytes........................................... 0
RxFrames.......................................... 0
RxDiscardBytes.................................... 0
RxDiscardFrames................................... 0
TxBytes........................................... 0
TxFrames.......................................... 0
TxDiscardBytes.................................... 0
TxDiscardFrames................................... 0
VlanID............................................ 30
RxBytes........................................... 0
RxFrames.......................................... 0
RxDiscardBytes.................................... 0
RxDiscardFrames................................... 0
TxBytes........................................... 0
TxFrames.......................................... 0
TxDiscardBytes.................................... 0
TxDiscardFrames................................... 0
Parameter Description
Base VLAN ID Identifies the base VLAN ID for Internal allocation of VLANs to the routing interface.
Allocation policy Identifies whether the system allocates VLAN IDs in ascending or descending order.
Parameter Description
VLAN ID There is a VLAN Identifier (vlanid) associated with each VLAN. The range of the VLAN ID is 1 to 4093.
VLAN Name A string associated with this VLAN as a convenience. It can be up to 32 alphanumeric characters long, including
blanks. The default is blank. VLAN ID 1 always has a name of “Default.” This field is optional.
VLAN Type Type of VLAN, which can be Default (VLAN ID = 1) or static (one that is configured and permanently defined).
Parameter Description
Interface slot/port It is possible to set the parameters for all ports by using the selectors on the top line.
Port VLAN ID The VLAN ID that this port will assign to untagged frames or priority tagged frames received on this port. The
Configured value must be for an existing VLAN. The factory default is 1.
Port VLAN ID Current The current VLAN ID that this port assigns to untagged frames or priority tagged frames received on this port.
The factory default is 1.
Acceptable Frame The types of frames that may be received on this port. The options are 'VLAN only' and 'Admit All'. When set to
Types 'VLAN only', untagged frames or priority tagged frames received on this port are discarded. When set to 'Admit
All', untagged frames or priority tagged frames received on this port are accepted and assigned the value of the
Port VLAN ID for this port. With either option, VLAN tagged frames are forwarded in accordance to the 802.1Q
VLAN specification.
Ingress Filtering May be enabled or disabled. When enabled, the frame is discarded if this port is not a member of the VLAN with
Configured which this frame is associated. In a tagged frame, the VLAN is identified by the VLAN ID in the tag. In an untagged
frame, the VLAN is the Port VLAN ID specified for the port that received this frame. When disabled, all frames
are forwarded in accordance with the 802.1Q VLAN bridge specification. The factory default is disabled.
Ingress Filtering Shows the current ingress filtering configuration.
Current
GVRP May be enabled or disabled.
Default Priority The 802.1p priority assigned to tagged packets arriving on the port.
Protected Port Specifies if this is a protected port. If False, it is not a protected port; If true, it is.
Switchport mode The current switchport mode for the port.
Operating parameters The operating parameters for the operational switchport mode port, including the VLAN, name, egress rule, and
type.
Static configuration The static configuration for the port, including the VLAN, name, and egress rule.
Forbidden VLANs The forbidden VLAN configuration for the port, including the VLAN and name.
Parameter Description
host-association Defines the VLAN association for community or host ports.
mapping Defines the private VLAN mapping for promiscuous ports.
mapping trunk Maps the port to a primary VLAN and selected secondary VLANs.
primary-vlan-id Primary VLAN ID of a private VLAN.
secondary-vlan-id Secondary (isolated or community) VLAN ID of a private VLAN.
add Associates the secondary VLAN with the primary one.
remove Deletes the secondary VLANs from the primary VLAN association.
secondary-vlan-list A list of secondary VLANs to be mapped to a primary VLAN.
trunk native vlan Defines the VLAN association for untagged packets. If not configured, untagged packets are dropped.
trunk allowed vlan Specifies the list of allowed normal VLANs on the trunk port.
association trunk Associates a primary VLAN with a secondary (isolated only) VLAN. Multiple private VLAN pairs can be
configured using this command.
Default general
Format switchport mode private-vlan {host | promiscuous | trunk promiscuous | trunk secondary}
Mode Interface Config
Parameter Description
host Configures an interface as a private VLAN host port. It can be either an isolated or community port depending on
the secondary VLAN it is associated with.
promiscuous Configures an interface as a private VLAN promiscuous port. The promiscuous ports are members of the primary
VLAN.
trunk promiscuous Configures an interface as a private VLAN promiscuous trunk port. These ports can carry traffic of several primary
VLANs and normal VLANs.
An endpoint connected to a promiscuous trunk port is allowed to communicate with all the endpoints within the
private VLAN and also with other ports participating in normal VLANs. These ports carry the traffic of multiple
primary VLANs towards the upstream router and regular VLANs.
Promiscuous trunk ports are used when it is required to reduce the number of links connected to upstream
devices while still being able to manage all the endpoints in a private VLAN—in addition to carrying traffic of
normal VLANs. These ports are typically used where the switches are connected to upstream devices that do not
understand private VLANs.
trunk secondary Configures an interface as a private VLAN isolated trunk port. These ports can carry traffic of several secondary
VLANs and normal VLANs.
5.4.3 private-vlan
This command configures the private VLANs and configures the association between the primary private VLAN and
secondary VLANs.
Parameter Description
association Associates the primary and secondary VLAN.
secondary-vlan-list A list of secondary VLANs to be mapped to a primary VLAN.
community Designates a VLAN as a community VLAN.
isolated Designates a VLAN as the isolated VLAN.
primary Designates a VLAN as the primary VLAN.
5.4.3.0.1 no private-vlan
This command restores normal VLAN configuration.
Parameter Description
interface-id The slot/port of the switch.
The command displays the following information. Note that the fields that display depend on the configured mode on the port.
Parameter Description
Port The port number for which data is displayed.
VLAN Switchport Mode The private VLAN mode of the interface, which is one of the following:
General – The interface is in general mode and is not a member of a private VLAN.
Private VLAN Promiscuous – The interface belongs to a primary VLAN and can communicate with
all interfaces in the private VLAN, including other promiscuous ports, community ports, and isolated
ports.
Private VLAN Promiscuous Trunk – The interface belongs to a primary VLAN and can communicate
with all interfaces in the private VLAN, including other promiscuous trunk ports, community ports, and
isolated ports.
Private VLAN Host – The interface belongs to a secondary VLAN and, depending upon the type of
secondary VLAN, can either communicate with other ports in the same community (if the secondary
VLAN is a community VLAN) and with the promiscuous ports or is able to communicate only with the
promiscuous ports (if the secondary VLAN is an isolated VLAN).
Private VLAN Isolated Trunk – The interface belongs to an isolated VLAN and can communicate with
promiscuous, promiscuous trunk, and trunk ports.
Private VLAN Host Association The VLAN association for the private-VLAN host ports.
Private VLAN Mapping The VLAN mapping for the private-VLAN promiscuous ports.
Private VLAN trunk native Displays the native VLAN for the promiscuous trunk ports. When the port is configured to operate in
VLAN Promiscuous Trunk mode, the native VLAN defines VLAN association for untagged packets. If not
configured, untagged packets are dropped.
Private VLAN trunk normal The list of normal VLANs for the promiscuous trunk ports.
VLANs
Private-VLAN trunk mappings The mappings of all the primary VLANs and their associated secondary VLANs of promiscuous trunk
ports.
Private-vlan trunk associations The associations of all the primary VLANs and their associated isolated VLANs of isolated trunk ports.
Operational Private VLANS The operational private VLANs on this interface.
In Trunk mode, the port becomes a member of all VLANs on switch unless specified in the allowed list in the switchport trunk
allowed vlan command. The PVID of the port is set to the Native VLAN as specified in the switchport trunk native vlan
command. It means that trunk ports accept both tagged and untagged packets, where untagged packets are processed on
the native VLAN and tagged packets are processed on the VLAN ID contained in the packet. MAC learning is performed on
both tagged and untagged packets. Tagged packets received with a VLAN ID of which the port is not a member are discarded
and MAC learning is not performed. The Trunk ports always transmit packets untagged on native VLAN.
In Access mode, the port becomes a member of only one VLAN. The port sends and receives untagged traffic. It can also
receive tagged traffic.The ingress filtering is enabled on port. It means that when the VLAN ID of received packet is not
identical to Access VLAN ID, the packet is discarded.
In General mode, the user can perform custom configuration of VLAN membership, PVID, tagging, ingress filtering, and so
on. This is legacy EFOS behavior of switch port configuration. Legacy EFOS CLI commands are used to configure port in
general mode.
The VLANs list can be modified using the add or remove options or replaced with another list using the vlan-list, all, or except
options. If all is chosen, all VLANs are added to the list of allowed VLANs. The except option provides an exclusion list.
Trunk ports accept tagged packets, where tagged packets are processed on the VLAN ID contained in the packet, if this
VLAN is in the allowed VLAN list. Tagged packets received with a VLAN ID to which the port is not a member are discarded
and MAC learning is not performed. If a VLAN is added to the system after a port is set to the Trunk mode and it is in the
allowed VLAN list, this VLAN is assigned to this port automatically.
Default All
Format switchport trunk allowed vlan {vlan-list | all | {add vlan-list} | {remove vlan-list}
| {except vlan-list }}
Parameter Description
all Specifies all VLANs from 1 to 4093. This keyword is not allowed on commands that do not permit
all VLANs in the list to be set at the same time.
add Adds the defined list of VLANs to those currently set instead of replacing the list.
remove Removes the defined list of VLANs from those currently set instead of replacing the list. Valid IDs
are from 1 to 4093; extended-range VLAN IDs of the form X-Y or X,Y,Z are valid in this command.
except Lists the VLANs that should be calculated by inverting the defined list of VLANs. (VLANs are
added except the ones specified.)
vlan-list Either a single VLAN number from 1 to 4093 or a continuous range of VLANs described by two
VLAN numbers, the lesser one first, separated by a hyphen.
Example:
(Switching) # show interfaces switchport 1/0/20
Port: 1/0/20
Switchport Mode: Access Mode
Access Mode VLAN: 1 (default)
General Mode PVID: 1 (default)
General Mode Ingress Filtering: Enabled
General Mode Acceptable Frame Type: Admit All
General Mode Dynamically Added VLANs:
General Mode Untagged VLANs: 1
General Mode Tagged VLANs:
General Mode Forbidden VLANs:
Trunking Mode Native VLAN: 1 (default)
Trunking Mode Native VLAN Tagging: Disabled
Trunking Mode VLANs Enabled: All
Protected: False
Port: 1/0/1
VLAN Membership Mode: General
Access Mode VLAN: 1 (default)
General Mode PVID: 1 (default)
General Mode Ingress Filtering: Disabled
General Mode Acceptable Frame Type: Admit all
General Mode Dynamically Added VLANs:
General Mode Untagged VLANs: 1
General Mode Tagged VLANs:
General Mode Forbidden VLANs:
Trunking Mode Native VLAN: 1 (default)
Trunking Mode Native VLAN tagging: Disable
Trunking Mode VLANs Enabled: All
Protected Port: False
Example:
Switching) # show interfaces switchport access 1/0/1
Intf PVID
--------- ----
1/0/1 1
Intf PVID
Ingress Acceptable Untagged Tagged Forbidden Dynamic
Filtering Frame Type Vlans Vlans Vlans Vlans
--------- ----- ---------- ---------- --------- --------- --------- ---------
1/0/5 1 Enabled Admit All 7 10-50,55 9,100-200 88,96
Intf PVID
Ingress Acceptable Untagged Tagged Forbidden Dynamic
Filtering Frame Type Vlans Vlans Vlans Vlans
--------- ----- ---------- ---------- --------- --------- --------- ---------
1/0/1 1 Enabled Admit All 1,4-7 30-40,55 3,100-200 88,96
1/0/2 1 Disabled Admit All 1 30-40,55 none none
..
Default vman
Format dvlan-tunnel ethertype {802.1Q | vman | custom 1-65535}
Mode Interface Config
Parameter Description
802.1Q Configure the ethertype as 0x8100.
custom Configure the value of the custom tag in the range from 1 to 65535.
vman Represents the commonly used value of 0x88A8.
NOTE: If the default primary TPID (0x8100) of the switch is changed, this TPID is stored as one of the secondary TPIDs.
If the configured Primary TPID is reset with no form of command, the default TPID becomes primary again and is
removed from secondary list.
Parameter Description
802.1Q Configure the ethertype as 0x8100.
Parameter Description
custom Configure the value of the custom tag in the range from 1 to 65535.
vman Represents the commonly used value of 0x88A8.
Default disabled
Format mode dot1q-tunnel
Mode Interface Config
NOTE: When you use the mode dvlan-tunnel command on an interface, it becomes a service provider port. Ports that
do not have double VLAN tunneling enabled are customer ports.
Default disabled
Format mode dvlan-tunnel
Mode Interface Config
Parameter Description
Interface slot/port
Mode The administrative mode through which Double VLAN tunneling can be enabled or disabled. The default value
for this field is disabled.
EtherType A 2-byte hex EtherType to be used as the first 16 bits of the DVLAN tunnel. There are three different EtherType
tags. The first is 802.1Q, which represents the commonly used value of 0x8100. The second is vMAN, which
represents the commonly used value of 0x88A8. If EtherType is not one of these two values, then it is a custom
tunnel value, representing any value in the range of 1 to 65535.
Parameter Description
Interface slot/port
Mode The administrative mode through which Double VLAN tunneling can be enabled or disabled. The default value
for this field is disabled.
EtherType A 2-byte hex EtherType to be used as the first 16 bits of the DVLAN tunnel. There are three different EtherType
tags. The first is 802.1Q, which represents the commonly used value of 0x8100. The second is vMAN, which
represents the commonly used value of 0x88A8. If EtherType is not one of these two values, then it is a custom
tunnel value, representing any value in the range of 0 to 65535.
Example: The following shows examples of the CLI display output for the commands.
(Routing) #show dvlan-tunnel
(Routing) #
Default 0
Format vlan priority priority
Mode Interface Config
If an interface is configured as a protected port, and you add that interface to a Port Channel or Link Aggregation Group
(LAG), the protected port status becomes operationally disabled on the interface, and the interface follows the configuration
of the LAG port. However, the protected port configuration for the interface remains unchanged. Once the interface is no
longer a member of a LAG, the current configuration for that interface automatically becomes effective.
NOTE: Port protection occurs within a single switch. Protected port configuration does not affect traffic between ports on
two different switches. No traffic forwarding is possible between two protected ports.
Default unprotected
Format switchport protected groupid name name
Mode Global Config
NOTE: Port protection occurs within a single switch. Protected port configuration does not affect traffic between ports on
two different switches. No traffic forwarding is possible between two protected ports.
Default unprotected
Format switchport protected groupid
Mode Interface Config
Parameter Description
Group ID The number that identifies the protected port group.
Name An optional name of the protected port group. The name can be up to 32 alphanumeric characters long, including
blanks. The default is blank.
List of Physical Ports List of ports, which are configured as protected for the group identified with groupid. If no port is configured as
protected for this group, this field is blank.
Parameter Description
Name A string associated with this group as a convenience. It can be up to 32 alphanumeric characters long, including
blanks. The default is blank. This field is optional.
Protected Indicates whether the interface is protected or not. It shows TRUE or FALSE. If the group is a multiple groups
then it shows TRUE in Group groupid.
The authenticator and supplicant PACP state machines comply with the 2010 standard.
Due to this migration, several IEEE 802.1X (dot1x) commands have been deprecated. For information about the deprecated
commands, see Section 5.9.41, Deprecated IEEE 802.1X Commands
Default disabled
Format dot1x eapolflood
Default disabled
Format authentication event no-response action authorize vlan vlan-id
Mode Interface Config
Default disabled
Format no authentication event no-response action authorize vlan
Mode Interface Config
Default 0
Format authentication event fail action authorize vlan vlan id
Mode Interface Config
Default 3
Format authentication event fail retry max-attempts
Mode Interface Config
Default 2
Format dot1x max-reauth-req count
Mode Interface Config
Default 2
Format dot1x max-req count
Mode Interface Config
Default 48
Format authentication max-users count
Mode Interface Config
Default disabled
Format authentication periodic
Mode Interface Config
Use the force-unauthorized parameter to specify that the authenticator PAE unconditionally sets the controlled port to
unauthorized. Use the force-authorized parameter to specify that the authenticator PAE unconditionally sets the
controlled port to authorized. Use the auto parameter to specify that the authenticator PAE sets the controlled port mode to
reflect the outcome of the authentication exchanges between the supplicant, authenticator and the authentication server.
Default auto
Format authentication port-control {force-unauthorized | force-authorized | auto }
Mode Interface Config
Select force-unauthorized to specify that the authenticator PAE unconditionally sets the controlled port to unauthorized.
Select force-authorized to specify that the authenticator PAE unconditionally sets the controlled port to authorized. Select
auto to specify that the authenticator PAE sets the controlled port mode to reflect the outcome of the authentication
exchanges between the supplicant, authenticator and the authentication server.
Default auto
Format authentication port-control all {force-unauthorized | force-authorized | auto }
Default multi-host
Format authentication host-mode { multi-auth | multi-domain | multi-host | single-host |
multi-domain-multi-host }
Mode Interface Config
Default multi-host
Format authentication host-mode all { multi-auth | multi-domain | multi-host | single-host |
multi-domain-multi-host }
Mode Global Config
5.9.18 mab
This command is used to enable MAC Authentication Bypass (MAB) on an interface. MAB is a supplemental authentication
mechanism that allows 802.1X unaware clients, such as printers, fax machines, and some IP phones, to authenticate to the
network using the client MAC address as an identifier. However MAB can also be used to authenticate 802.1X aware clients.
This command also provides options to specify the type of authentication to be used, which can be either EAP-MD5, PAP,
or CHAP. If enabled, EAP-MD5 is used by default.
5.9.18.0.1 no mab
This command disables MAC authentication bypass (MAB) on an interface and resets the authentication type to the default
value.
Format no mab
Mode Interface Config
While disabled, the dot1x configuration is retained and can be changed, but is not activated.
Default disabled
Format dot1x system-auth-control
Mode Global Config
Default disabled
This command cannot be run from the CLI. The software version is set to 1 whenever the dot1x system-auth-control
command is executed.
Default 0
Format dot1x software version { 0 | 1 }
Mode N/A
Tokens Description
quiet-period The value, in seconds, of the timer used by the authenticator state machine on this port to define periods of time
in which it will not attempt to acquire a supplicant. This is the period for which the authenticator state machine
stays in the HELD state.
tx-period The value, in seconds, of the timer used by the authenticator state machine on this port to determine when to
send an EAPOL EAP Request/Identity frame to the supplicant.
server-timeout The value, in seconds, of the timer used by the authenticator state machine on this port to timeout the
authentication server.
supp-timeout The value, in seconds, of the timer used by the authenticator state machine on this port to timeout the supplicant.
auth-period The value, in seconds, of the timer used by the supplicant state machine on this port to timeout an authenticator
when waiting for a response to packets other than EAPOL-Start.
start-period The value, in seconds, of the timer used by the supplicant state machine on this port to determine the interval
between two successive EAPOL-Start frames when they are being retransmitted.
held-period The value, in seconds, of the timer used by the supplicant state machine on this port to determine the length of
time it will wait before trying to send the authentication credentials again after a failed attempt. This is the period
for which the supplicant state machine stays in the HELD state.
The reinitialize action triggers reauthentication for all authenticated clients on the port. Supplicants on the voice VLAN,
unauthenticated VLAN (authentication failed clients), and guest VLAN are not disturbed. During reauthentication if all the
servers are still dead, the supplicant is authorized and placed in the critical VLAN without contacting the RADIUS server for
authentication.
The authorize action authorizes the authenticated supplicants and assigns them to the critical VLAN. Supplicants on the
RADIUS assigned VLAN, voice VLAN, unauthenticated VLAN, and guest VLAN are not disturbed. Supplicants authorized
on the port PVID are reauthorized on the critical VLAN.
The connected device is identified as a voice device by the vendor-specific RADIUS attribute
device-traffic-class=voice, which is sent in the RADIUS Access-Accept message. This means that the device
should have been identified and authenticated once by reachable RADIUS servers before they went dead. The critical voice
VLAN feature is activated under the following conditions:
This command is configured.
The RADIUS servers have stopped responding (that is, are dead).
When this command is not configured, the voice device is not authorized when all RADIUS servers are dead.
Default Restrict
Format authentication violation { protect | restrict | shutdown }
Mode Interface Config
Parameter Description
groupsize The number of characters included in a group.
In the following example, the group size is 2:
00:10:18:99:F2:B3
In the following example, the group size is 4:
0010:1899:F2B3
Parameter Description
separator The character that separates the group.
In the following example, the separator is - (hyphen):
00-10-18-99-F2-B3
In the following example, the separator is : (colon):
00:10:18:99:F2:B3
lowercase | uppercase The case of any letters in the user name.
In the following example, the case is lowercase:
00:10:18:99:f2:b3
In the following example, the case is uppercase:
00:10:18:99:F2:B3
Default disabled
Format authentication allow-unauth dhcp
Mode Interface Config
Default 10 clients
Format authentication critical recovery max-reauth number-of-clients
Mode Global Config
Default disabled
Format authentication enable
Mode Global Config
Default disabled
Format authentication open
Mode Interface Config
Each method can only be entered once. Ordering is only possible between 802.1x and MAB. Captive portal can be
configured either as a stand-alone method or as the last method in the order.
For reauthentication to happen after the configured or server-provided timeout, the authentication periodic command
should have periodic reauthentication enabled (see the authentication max-users command).
Default authenticator
Format dot1x pae {supplicant | authenticator | none}
Mode Interface Config
Parameter Description
auto The port is in the Unauthorized state until it presents its user name and password credentials to an authenticator.
If the authenticator authorizes the port, then it is placed in the Authorized state.
force-authorized Sets the authorization state of the port to Authorized, bypassing the authentication process.
force-unauthorized Sets the authorization state of the port to Unauthorized, bypassing the authentication process.
Default auto
Format no dot1x supplicant port-control
Mode Interface Config
Default 3
Format dot1x max-start <1-10>
Mode Interface Config
Parameter Description
Authentication Manager Status The admin status of the Authentication Manager on the switch. This is a global configuration.
Dynamic VLAN Creation Mode Indicates whether the switch can dynamically create a RADIUS-assigned VLAN if it does not
currently exist on the switch.
VLAN Assignment Mode Indicates whether assignment of an authorized port to a RADIUS-assigned VLAN is allowed
(enabled) or not (disabled).
Authentication Monitor Mode Indicates whether the Monitor mode on the switch is enabled or disabled.
Critical Recovery Max ReAuth Indicates the number of supplicants that are reauthenticated per second.
Number of Authenticated clients The total number of clients authenticated on the switch except the ones in Monitor Mode.
Number of clients in Monitor Mode The number clients authorized by Monitor mode on the switch.
Example:
(dhcp-10-130-86-142) #show authentication
Parameter Description
Timestamp The time of the authentication.
Interface The interface.
MAC-Address The MAC address for the interface.
Auth Status The authentication and status for the interface.
Method The authentication method for the interface.
Parameter Description
Interface The interface for which authentication configuration information is being displayed.
Mac Address The MAC address of the client.
User Name The user name associated with the client.
VLAN Assigned Reason This can take one of the following values:
Default VLAN—The client has been authenticated on the port default VLAN and the authentication
server is not RADIUS.
RADIUS—RADIUS is used for authenticating the client.
Voice VLAN—The client is identified as a Voice device.
Critical VLAN—The client has been authenticated on the Critical VLAN.
Unauthenticated VLAN—The client has been authenticated on the Unauthenticated VLAN.
Guest VLAN—The client has been authenticated on the Guest VLAN.
Monitor Mode—The client has been authenticated by Monitor mode.
Host Mode The authentication host mode configured on the interface. The possible values are multi-auth, multi-
domain, multi-host, single-host and multi-domain-multi-host.
Method The method used to authenticate the client on the interface. The possible values are 802.1x. MAB,
Captive Portal and None.
Control Mode The configured control mode for this port. Possible values are force-unauthorized, auto and unauthorized.
Session Time The amount of time the client session has been active.
Session Timeout This value indicates the time for which the given session is valid. The time period in seconds is returned
by the RADIUS server on authentication of the port.
Session Termination Action This value indicates the action to be taken once the session timeout expires. Possible values are Default
and Radius-Request. If the value is Default, the session is terminated and client details are cleared. If the
value is Radius-Request, then a reauthentication of the client is performed.
Filter ID Identifies the Filter ID returned by the RADIUS server when the client was authenticated. This is a
configured DiffServ policy name on the switch.
ACS ACL Name Identifies the dynamic ACL returned by the RADIUS server when the client was authenticated. The
downloadable ACL is the same as that returned by using CiscoSecure-Defined-ACL-AVP.
DACL Identifies the Dynamic ACL returned by the RADIUS server when the client was authenticated. The name
of the DACL includes the name of the static ACL name that was used to create the dynamic ACL.
Redirect ACL A static ACL sent in the RADIUS attribute redirect-acl. It is used to redirect matching packets to the CPU
for further action.
Redirect URL A URL sent in the RADIUS attribute redirect-url. It is used by the Redirect component logic to redirect
matching packets to the redirect URL by using HTTP 302 response code.
Acct Session ID The Accounting Session Id associated with the client session.
Parameter Description
LinkSec Policy The LinkSec policy for the client.
Interface MAC-Address Method Host Mode Control Mode VLAN Assigned Reason
--------- ----------------- ------ --------- ------------ --------------------
0/16 10:8D:B6:C6:00:00 802.1X multi-host auto RADIUS Assigned VLAN (10)
Example: The following shows example command output.
(switch) #show authentication clients interface 1/0/2
Interface...................................... 0/1
Mac Address.................................... 00:00:00:11:22:33
User Name...................................... 00:00:00:11:22:33
VLAN Assigned Reason........................... RADIUS Assigned VLAN (20)
Host Mode...................................... multi-auth
Method......................................... mab
Control Mode................................... auto
Session time................................... 71
Session timeout................................ 600
Time left for Session Termination Action....... 229
Session Termination Action..................... Reauthenticate
Filter ID......................................
DACL........................................... IP-STATIC-IN-ipacl-00000001#d
Redirect ACL...................................
Redirect URL...................................
Acct SessionId................................. 000000112233:100000001
Linksec policy.................................
Parameter Description
Authentication Manager Status The admin status of Authentication on the switch. This is a global configuration.
Interface The interface for which authentication configuration information is being displayed.
Port Control Mode The configured control mode for this port. Possible values are force-unauthorized | auto |
unauthorized.
Host Mode The authentication host mode configured on the interface.
Authentication Restart timer The time, in seconds, after which reauthentication starts.
Configured method order The order of authentication methods used on the interface.
Enabled method order The order of authentication methods used on the interface.
Configured method priority The priority for the authentication methods used on the interface.
Enabled method priority The priority for the authentication methods used on the interface.
Reauthentication Period The period after which all clients on the interface will be reauthenticated.
Reauthentication Enabled Indicates whether reauthentication is enabled on the interface.
Maximum Users The maximum number of clients that can be authenticated on the interface if the interface is
configured as multi-auth host mode.
Guest VLAN ID The VLAN id to be used to authorize clients that time out or fail authentication due to invalid
credentials. This is applicable only for 802.1x unaware clients.
Unauthenticated VLAN ID The VLAN id to be used to authorize clients that that time out or fail authentication due to invalid
credentials. This is applicable only for 802.1x clients.
Critical VLAN ID The VLAN id to be used to authorize clients that that time out due to unreachable RADIUS
servers.
Authentication Violation Mode The action to be taken when a security violation occurs on a port.
Authentication Server Dead action The action to be undertaken for data clients when all RADIUS servers are found dead.
Authentication Server Dead action for The action to be undertaken for voice clients when all RADIUS servers are found dead.
Voice
Authentication Server Alive action The action to be undertaken for data clients when a RADIUS server comes back alive after all
were found dead.
Allowed Protocols on Unauthorized Port The action to drop or forward the particular protocol packet from and to unauthorized clients on
the port.
Open Authentication Indicates if Open Authentication is enabled on the interface.
LinkSec Policy Displays the MACsec LinkSec configured on the interface.
Example: The following example displays the output for the command.
Interface...................................... 1/0/1
Authentication Restart timer................... 300
Parameter Description
Authentication Login List The authentication login listname.
Method 1 The first method in the specified authentication login list, if any.
Method 2 The second method in the specified authentication login list, if any.
Method 3 The third method in the specified authentication login list, if any.
HTTPS :local
HTTP :local
DOT1X :
Parameter Description
Port The port for which information is being displayed.
802.1X attempts The number of Dot1x authentication attempts for the port.
802.1X failed attempts The number of failed Dot1x authentication attempts for the port.
MAB attempts The number of MAB (MAC authentication bypass) authentication attempts for the port.
MAB failed attempts The number of failed MAB authentication attempts for the port.
Captive-portal attempts The number of captive portal (Web authorization) authentication attempts for the port.
Captive-portal failed attempts The number of failed captive portal authentication attempts for the port.
Example:
(Routing) #show authentication statistics 1/0/1
Port........................................... 1/0/1
802.1X attempts................................ 0
802.1X failed attempts......................... 0
Mab attempts................................... 0
Mab failed attempts............................ 0
Captive-portal attempts........................ 0
Captive-Portal failed attempts................. 0
Format show dot1x [{supplicant summary {slot/port | all} | detail slot/port | statistics slot/
port]
Mode Privileged EXEC
If you do not use the optional parameters slot/port, the command displays the global configuration.
Parameter Description
Administrative Mode Indicates whether 8021X is enabled or disabled.
EAPOL Flood Mode Indicates whether the EAPOL flood support is enabled on the switch.
Software Version The version of the dot1X implementation running on the switch.
Example:
(switch) #show dot1x
If you use the optional parameter supplicant summary {slot/port | all}, the dot1x supplicant authorization for the
specified port or all ports are displayed.
Parameter Description
Port The interface whose configuration is displayed.
Port Status Indicates whether the port is authorized or unauthorized. Possible values are authorized | unauthorized.
Example: The following shows example CLI display output for the command show dot1x supplicant summary 1/0/1.
Operating
Interface Port Status
--------- ------------
0/1 Authorized
If the port is configured as an Authenticator, the optional parameter detail slot/port displays the detailed dot1x
configuration for the specified port.
Parameter Description
Port The interface whose configuration is displayed.
Protocol Version The protocol version associated with this port. The only possible value is 1,corresponding to the first
version of the dot1x specification.
PAE Capabilities The port access entity (PAE) functionality of this port. Possible values are Authenticator or Supplicant.
Quiet Period The timer used by the authenticator state machine on this port to define periods of time in which it will
not attempt to acquire a supplicant. The value is expressed in seconds and will be in the range 0 and
65535. This is the period for which the authenticator state machine stays in the HELD state.
Transmit Period The timer used by the authenticator state machine on the specified port to determine when to send an
EAPOL EAP Request/Identity frame to the supplicant. The value is expressed in seconds and will be in
the range of 1 and 65535.
Supplicant Timeout The timer used by the authenticator state machine on this port to timeout the supplicant. The value is
expressed in seconds and will be in the range of 1 and 65535.
Server Timeout The timer used by the authenticator on this port to timeout the authentication server. The value is
expressed in seconds and will be in the range of 1 and 65535.
Maximum Request-Identities The maximum number of times (attempts), the authenticator state machine on this port will retransmit
an EAPOL EAP Request-Identity frames before timing out the supplicant.
Maximum Requests The maximum number of times the authenticator state machine on this port will retransmit an EAPOL
EAP Request/Identity before restarting the authentication process.
Key Transmission Enabled Indicates if the key is transmitted to the supplicant for the specified port. Possible values are True or
False.
Example: The following shows example CLI display output for the command.
(switch) #show dot1x detail 1/0/3
Port........................................... 1/0/3
Protocol Version............................... 1
PAE Capabilities............................... Authenticator
Quiet Period (secs)............................ 60
If the port is configured as a Supplicant, the show dot1x detail slot/port command will display the following dot1x
parameters.
Parameter Description
Port The interface whose statistics are displayed.
Protocol Version The protocol version associated with this port. The only possible value is 1,corresponding to the
first version of the dot1x specification.
PAE Capabilities The port access entity (PAE) functionality of this port. Possible values are Authenticator or
Supplicant.
Control Mode The configured control mode for this port. Possible values are force-unauthorized | auto |
unauthorized.
Supplicant PACP State Current state of the authenticator PACP state machine. Possible values are Initialize, Logoff,
Held, Unauthenticated, Authenticating and Authenticated.
Maximum Start Messages The maximum number of EAP Start messages that the supplicant will send before moving to
Unauthenticated State.
Start period The timer period between each EAP Start message the supplicant sends when it does not hear
from the authenticator.
Held period The time period the supplicant waits before it restarts authentication after an EAP failure.
Authentication period The time period the supplicant waits before it declares EAP timeout after it sends an EAP
message (except EAP Start).
Example: The following shows example CLI display output for the command.
(switch) (Config)#show dot1x detail 1/0/24
Port........................................... 1/0/24
Protocol Version............................... 1
PAE Capabilities............................... Supplicant
Control Mode................................... auto
Supplicant PAE State........................... Authenticated
If you use the optional parameter statistics slot/port, the following dot1x statistics for the specified port appear.
Parameter Description
Port The interface whose statistics are displayed.
PAE Capabilities The port access entity (PAE) functionality of this port. Possible values are Authenticator or
Supplicant.
EAPOL Frames Received The number of valid EAPOL frames of any type that have been received by this
authenticator.
Parameter Description
EAPOL Frames Transmitted The number of EAPOL frames of any type that have been transmitted by this authenticator.
EAPOL Start Frames Received The number of EAPOL start frames that have been received by this authenticator.
EAPOL Logoff Frames Received The number of EAPOL logoff frames that have been received by this authenticator.
Last EAPOL Frame Version The protocol version number carried in the most recently received EAPOL frame.
Last EAPOL Frame Source The source MAC address carried in the most recently received EAPOL frame.
EAP Response/Id Frames Received The number of EAP response/identity frames that have been received by this
authenticator.
EAP Response Frames Received The number of valid EAP response frames (other than resp/id frames) that have been
received by this authenticator.
EAP Request/Id Frames Transmitted The number of EAP request/identity frames that have been transmitted by this
authenticator.
EAP Request Frames Transmitted The number of EAP request frames (other than request/identity frames) that have been
transmitted by this authenticator.
Invalid EAPOL Frames Received The number of EAPOL frames that have been received by this authenticator in which the
frame type is not recognized.
EAP Length Error Frames Received The number of EAPOL frames that have been received by this authenticator in which the
frame type is not recognized.
Example: The following shows example CLI display output for the command.
(switch) #show dot1x statistics 0/1
Port........................................... 0/1
EAPOL Frames Received.......................... 0
EAPOL Frames Transmitted....................... 0
EAPOL Start Frames Transmitted................. 3
EAPOL Logoff Frames Received................... 0
EAP Resp/Id frames transmitted................. 0
EAP Response frames transmitted................ 0
EAP Req/Id frames transmitted.................. 0
EAP Req frames transmitted..................... 0
Invalid EAPOL frames received.................. 0
EAP length error frames received............... 0
Last EAPOL Frame Version....................... 0
Last EAPOL Frame Source........................ 00:00:00:00:02:01
Parameter Description
Users Users configured locally to have access to the specified port.
Example:
#show dot1x users 1/0/1
Users
-----------------
admin
guest
test4
Parameter Description
MAB Request Fmt Displays the group size to be used by the switch for formatting RADIUS attribute 1 in MAB requests.
Attr1 Groupsize
MAB Request Fmt Displays the separator to be used by the switch for formatting RADIUS attribute 1 in MAB requests.
Attr1 Separator
MAB Request Fmt Displays the case (uppercase or lowercase) to be used by the switch for formatting RADIUS attribute 1 in MAB
Attr1 Case requests.
Interface Identifies the port.
Admin Mode Indicates whether authentication control on the switch is enabled or disabled.
Auth-type The type of authentication used for a MAB-enabled port, which can be either EAP-MD5, PAP, or CHAP.
Example:
(switch) #show mab
LDAP is defined in RFC 4511 and is a standard application protocol for accessing and maintaining distributed directory
information services over the network. It is typically used to store information such as organizations, individuals, and other
resources such as files and devices in a hierarchical manner. Microsoft Windows domain users and devices can be
authenticated by looking up such information by using the LDAP protocol.
In EFOS, authentication into the Windows domain network is done using an LDAP simple bind operation and optionally over
TLS. Authorization is done based on the memberOf attribute or the description attribute carrying a Cisco VSA (cisco-av-pair)
configured on MS AD.
Example:
(switch) (config-ldap-search-map)#userprofile attribute-name memberOf search-filter "(cn=$userid)"
base-DN DC=broadcom,DC=net
5.10.2.2 no userprofile
This command deletes the user profile mapping with the LDAP search query
Format no userprofile
Mode LDAP Search Map Mode Config
The command output includes the fields shown in the following table.
Parameter Description
Host Address Host address of the LDAP server
SSL Enabled Whether SSL mode is enabled
Port LDAP port
Timeout Timeout value for the LDAP operation, in seconds.
Example:
(localhost) (Config)#show ldap-server
The command output includes the fields shown in the following table.
Parameter Description
Search Map Name User-configured name of the search map.
Parameter Description
Attribute Name Name of the LDAP attribute.
Search Filter Search filter names
Base DN Base DN within which the search was performed.
Example:
(localhost)#show ldap-search-map
The command output includes the fields shown in the following table.
Parameter Description
Failed Transactions Number of failed transactions
Successful Transactions Number of successful transactions
Number of requests sent Number of total requests sent
Number of requests timed out Number of requests timed out
Number of requests searches Number of searches done
Users are assigned to User Groups that are, in turn, associated with Task Groups. Each Task Group is then associated with
one or more tasks or components. This release supports the AAA, BGP and OSPF components. Also, this feature is
supported only for users who are authenticated locally using the CLI interface.
5.11.1 usergroup
This command creates a user group with the specified name and enters user group configuration mode.
5.11.1.0.1 no usergroup
This command removes the user group with the specified name.
5.11.2 taskgroup
This command creates a task group with the specified name and enters task group configuration mode.
5.11.2.0.1 no taskgroup
This command removes the task group with the specified name.
Format no description
Mode User Group
Format no description
Mode Task Group
Default No permissions
Format task [read] [write] [debug] [execute] {aaa | ospf | bgp}
Mode Task Group
Example: The following example gives all users in the task group tg1 read-only permissions for AAA and read, write,
execute, and debug permissions for OSPF.
(Routing) #configure
(Routing) (Config)#taskgroup tg1
(Routing) (config-taskgroup)#task read aaa
(Routing) (config-taskgroup)#task read write execute debug ospf
Example: The following shows example CLI display output for the command.
(Routing) #show aaa usergroup group1
Description : "Example"
Parent user groups: “”
Contained task groups:
task group#1: "tg1"
Operational permissions:
Task: aaa : READ WRITE EXECUTE DEBUG
Task: ospf : READ WRITE EXECUTE DEBUG
Task: bgp : READ WRITE EXECUTE DEBUG
Example: The following shows example CLI display output for the command.
(Routing) #show aaa taskgroup
Description : ""
Parent taskgroups: ""
Configured permissions:
Task: aaa : READ WRITE EXECUTE DEBUG
Task: ospf : READ WRITE EXECUTE DEBUG
Task: bgp : READ WRITE EXECUTE DEBUG
Operational permission:
Task: aaa : READ WRITE EXECUTE DEBUG
Task: ospf : READ WRITE EXECUTE DEBUG
Task: bgp : READ WRITE EXECUTE DEBUG
Description : ""
Parent taskgroups: ""
Configured permissions:
Task: aaa : READ WRITE EXECUTE DEBUG
Task: ospf : READ
Task: bgp : READ
Operational permission:
Task: aaa : READ WRITE EXECUTE DEBUG
Task: ospf : READ
Task: bgp : READ
Example: The following shows example CLI display output for the command.
(Routing) #show aaa userdb admin
User "admin"
Operational permissions:
Task: aaa : READ WRITE EXECUTE DEBUG
Task: ospf : READ WRITE EXECUTE DEBUG
Task: bgp : READ WRITE EXECUTE DEBUG
ASF reduces latency for larger packets. In this mode, the MMU is allowed to forward a packet to the egress port before it
has been entirely received in the Cell Buffer Pool (CBP) memory. These switch devices provide a threshold to define how
many cells must be received before the MMU is allowed to dispatch a packet to the egress. This value is generally
configurable between 3–15 cells. Cell size varies from silicon to silicon.
Default enabled
Format cut-through mode
Mode Global Config
Example: The following shows example CLI display output for the command.
802.3x Flow control, the MAC control PAUSE operation, is specified in IEEE 802.3 Annex 31 B. It allows traffic from one
device to be throttled for a specified period of time and is defined for devices that are directly connected. A device that wishes
to inhibit transmission of data frames from another device on the LAN transmits a PAUSE frame as defined in the IEEE
specification.
When Symmetric flow control is enabled, the ports asserts back pressure to the MAC, the MAC will respond by generating
PAUSE frames, and the partner device will respond by stopping packet transmission to avoid packet loss. The ports are also
capable of throttling the transmit rate in response to the PAUSE frames received from peer. When transmission of symmetric
flow control frames is enabled, the entire switch is placed in ingress drop mode. When in ingress drop mode, the switch will
behave like any other ingress buffered switch and exhibit head of line blocking during times of congestion.
Asymmetric flow control provides the switch the ability to respond to PAUSE frames received from peer, but the switch does
not have the ability to generate MAC control PAUSE frames. It allows the user to configure the switch such that it never
generates a MAC control PAUSE frame but will respond to received MAC control PAUSE frame by stopping the packet
transmission.
5.13.1 flowcontrol
Use this command to enable or disable the symmetric or asymmetric flow control on the switch. Asymmetric here means
that Tx Pause can never be enabled. Only Rx Pause can be enabled.
NOTE: Support for asymmetric flow control is platform-dependent. For platforms that support only symmetric flow control,
the {symmetric | asymmetric} keywords are not available.
Default disabled
Format flowcontrol {symmetric | asymmetric}
Mode Global Config
5.13.1.0.1 no flowcontrol
Use this command to disable the symmetric or asymmetric flow control.
Format no flowcontrol
Mode Global Config
Parameter Description
Admin Flow Control The administrative mode of flow control.
Port The port associated with the rest of the data in the row.
Flow Control Oper The operational mode of flow control.
RxPause The received pause frame count.
TxPause The transmitted pause frame count.
Example: The following shows example CLI display output for the command.
(Routing)#show flowcontrol
EFOS provides broadcast, and unicast story recovery for individual interfaces. Unicast Storm-Control protects against traffic
whose MAC addresses are not known by the system. For broadcast and unicast storm-control, if the rate of traffic ingressing
on an interface increases beyond the configured threshold for that type, the traffic is dropped.
To configure storm-control, you will enable the feature for all interfaces or for individual interfaces, and you will set the
threshold (storm-control level) beyond which the broadcast or unicast traffic will be dropped. The Storm-Control feature
allows you to limit the rate of specific types of packets through the switch on a per-port, per-type, basis.
Configuring a storm-control level also enables that form of storm-control. Disabling a storm-control level (using the “no”
version of the command) sets the storm-control level back to the default value and disables that form of storm-control. Using
the “no” version of the “storm-control” command (not stating a “level”) disables that form of storm-control but maintains the
configured “level” (to be active the next time that form of storm-control is enabled.)
NOTE: The actual rate of ingress traffic required to activate storm-control is based on the size of incoming packets and
the hard-coded average packet size of 512 bytes—used to calculate a packet-per-second (pps) rate—as the
forwarding-plane requires pps versus an absolute rate kb/s. For example, if the configured limit is 10%, this is
converted to ~25000 pps, and this pps limit is set in forwarding plane (hardware). You get the approximate desired
output when 512-byte packets are used.
Default disabled
Format storm-control broadcast
Mode Global Config
Interface Config
Default none
Format storm-control broadcast action {shutdown | trap}
Mode Global Config
Interface Config
Default 5
Format storm-control broadcast level 0-100
Mode Global Config
Interface Config
Default 0
Format storm-control broadcast rate 0-33554431
Mode Global Config
Interface Config
Default disabled
Format storm-control multicast
Mode Global Config
Interface Config
Default none
Format storm-control multicast action {shutdown | trap}
Mode Global Config
Interface Config
Default 5
Format storm-control multicast level 0-100
Mode Global Config
Interface Config
Default 0
Format storm-control multicast rate 0-33554431
Mode Global Config
Interface Config
Default disabled
Format storm-control unicast
Mode Global Config
Interface Config
Default none
Format storm-control unicast action {shutdown | trap}
Mode Global Config
Interface Config
Default 5
Format storm-control unicast level 0-100
Mode Global Config
Interface Config
Default 0
Format storm-control unicast rate 0-33554431
Mode Global Config
Interface Config
802.3x Flow Control Mode may be enabled or disabled. The factory default is disabled.
Use the all keyword to display the per-port configuration parameters for all interfaces, or specify the slot/port to display
information about a specific interface.
Parameter Description
Bcast Mode Shows whether the broadcast storm control mode is enabled or disabled. The factory default is disabled.
Bcast Level The broadcast storm control level.
Mcast Mode Shows whether the multicast storm control mode is enabled or disabled.
Mcast Level The multicast storm control level.
Ucast Mode Shows whether the Unknown Unicast or DLF (Destination Lookup Failure) storm control mode is enabled or
disabled.
Ucast Level The Unknown Unicast or DLF (Destination Lookup Failure) storm control level.
Example: The following shows example CLI display output for the command.
(Routing) #show storm-control
Example: The following shows an example of part of the CLI display output for the command.
(Routing) #show storm-control all
Use this command to set link-dependency options for the selected group identifier.
Default Down
Format link state group group-id action {up | down}
Mode Global Config
Example: This example displays information for all configured link-dependency groups.
(Switching)#show link-state group
Group Transitions: 0
Last Transition Time: 00:52:35 (UTC+0:00) Jan 1 1970
5.16.1 llpf
Use this command to block LLPF protocols on a port.
Default Enabled for the blockudld parameter; disabled for all others.
Format llpf {blockisdp | blockvtp | blockdtp | blockudld | blockpagp | blocksstp | blockall}
Mode Interface Config
5.16.1.0.1 no llpf
Use this command to unblock LLPF protocols on a port.
Parameter Description
Block ISDP Shows whether the port blocks ISDP PDUs.
Block VTP Shows whether the port blocks VTP PDUs.
Block DTP Shows whether the port blocks DTP PDUs.
Block UDLD Shows whether the port blocks UDLD PDUs.
Block PAGP Shows whether the port blocks PAgP PDUs.
Block SSTP Shows whether the port blocks SSTP PDUs.
Block All Shows whether the port blocks all proprietary PDUs available for the LLDP feature.
5.17.1 mvr
Use this command to enable MVR. This is disabled by default.
Default disabled
Format mvr
Mode Interface Config; Global Config
5.17.1.0.1 no mvr
Use this command to disable MVR.
Format no mvr
Mode Interface Config; Global Config
Default disabled
Format mvr immediate
Mode Interface Config
Default 1
Format mvr vlan 1-4093
Mode Global Config
Example:
(Switching) # show mvr
MVR Disabled.
Example:
(Switching) # show mvr members
MVR Disabled
Example:
Example:
(Switching) # show mvr traffic
A port-channel (LAG) interface can be either static or dynamic, but not both. All members of a port channel must participate
in the same protocols. A static port-channel interface does not require a partner system to be able to aggregate its member
ports.
NOTE: If you configure the maximum number of dynamic port-channels (LAGs) that your platform supports, additional
port-channels that you configure are automatically static.
5.18.1 port-channel
This command configures a new port-channel (LAG) and generates a logical slot/port number for the port-channel. The
name field is a character string which allows the dash “-” character as well as alphanumeric characters. Use the show
port-channel command to display the slot/port number for the logical interface.
NOTE: Before you include a port in a port-channel, set the port physical mode. For more information, see the speed
command.
5.18.2 addport
This command adds one port to the port-channel (LAG). The first interface is a logical slot/port number of a configured
port-channel. You can add a range of ports by specifying the port range when you enter Interface Config mode (for example:
interface 0/1-0/4.
NOTE: Before adding a port to a port-channel, set the physical mode of the port. For more information, see the speed
command.
Default 0x07
Format lacp actor admin state {individual|longtimeout|passive}
Mode Interface Config
NOTE: Both the no portlacptimeout and the no lacp actor admin state commands set the values back to default,
regardless of the command used to configure the ports. Consequently, both commands will display in show
running-config.
Default 0x80
Format lacp actor port priority 0-65535
Mode Interface Config
5.18.17 ip resilient-hashing
Use this command to enable resilient hashing on all ECMP objects on the router. The default value is enabled.
NOTE: This command takes effect after reboot. The behavior of the system after executing the command and before
rebooting the switch is undefined. The user is asked to confirm before proceeding. After successful execution of
the command, the user is asked to reboot the switch.
Format ip resilient-hashing
Mode Global Config
5.18.17.0.1 no ip resilient-hashing
Use this command to disable resilient hashing on all the ECMP objects on the router.
NOTE: This command takes effect after reboot. The behavior of the system after executing the command and before
rebooting the switch is undefined. The user is asked to confirm before proceeding. After successful execution of
the command, the user is asked to reboot the switch.
Format no ip resilient-hashing
Mode Global Config
NOTE: This command takes effect after reboot. The behavior of the system after executing the command and before
rebooting the switch is undefined. The user must confirm before proceeding.
NOTE: This command takes effect after reboot. The behavior of the system after executing the command and before
rebooting the switch is undefined. The user is asked to confirm before proceeding. After completion, the user is
asked to reboot the switch
Default enabled
Format port-channel static
Mode Interface Config
Default enabled
Format port lacpmode
Mode Interface Config
Default long
Format port lacptimeout {actor | partner} {long | short}
Mode Interface Config
NOTE: Both the no portlacptimeout and the no lacp actor admin state commands set the values back to default,
regardless of the command used to configure the ports. Consequently, both commands will display in show
running-config.
Default long
Format port lacptimeout {actor | partner} {long | short}
Mode Global Config
NOTE: Both the no portlacptimeout and the no lacp actor admin state commands set the values back to default,
regardless of the command used to configure the ports. Consequently, both commands will display in show
running-config.
Load-balancing is not supported on every device. The range of options for load-balancing may vary per device.
This command can be configured for a single interface, a range of interfaces, or all interfaces.
Default 3
Format port-channel load-balance {1 | 2 | 3 | 4 | 5 | 6 | 7} {slot/port | all}
Mode Interface Config
Global Config
Parameter Description
1 Source MAC, VLAN, EtherType, and incoming port associated with the packet
2 Destination MAC, VLAN, EtherType, and incoming port associated with the packet
3 Source/Destination MAC, VLAN, EtherType, and incoming port associated with the packet
4 Source IP and Source TCP/UDP fields of the packet
5 Destination IP and Destination TCP/UDP Port fields of the packet
6 Source/Destination IP and source/destination TCP/UDP Port fields of the packet
7 Enhanced hashing mode
slot/port| all Global Config Mode only: The interface is a logical slot/port number of a configured port-channel. All
applies the command to all currently configured port-channels.
Parameter Description
slot/port| all Global Config Mode only: The interface is a logical slot/port number of a configured port-channel. All applies the
command to all currently configured port-channels.
Default 1
Format port-channel min-links 1-8
Mode Interface Config
Default 0x8000
Format port-channel system priority priority
Mode Global Config
Format show hashdest {lag lag-id | ecmp prefix/prefix-length} in_port slot/port src-mac
macaddr dst-mac macaddr [vlan vlan-id] ethertype 0xXXXX [src-ip {ipv4-addr | ipv6-addr}
dst-ip {ipv4-addr | ipv6-addr} protocol pid src-l4-port port-num dst-l4-port port-num]
Mode Privileged EXEC
Parameter Description
lag The LAG group for which to display the egress physical port.
ecmp The IP address of the EMC_ group for which to display the egress physical port.
in_port The incoming physical port for the system.
src-mac The source MAC address.
dst-mac The destination MAC address.
vlan The VLAN ID for VLAN-tagged packets. Do not use this parameter or enter 0 for non-VLAN-tagged packets.
ethertype The 16-bit EtherType value, in the form 0xXXXX. For Layer 3 packets, hash prediction is only available for IPv4
(0x0800) and IPv6 (0x86DD).
src-ip The source IP address, entered as x.x.x.x for IPv4 or x:x:x:x:x:x:x:x for IPv6 packets.
dst-ip The destination IP address, entered as x.x.x.x for IPv4 or x:x:x:x:x:x:x:x for IPv6 packets.
protocol The protocol ID.
src-l4-port The layer 4 source port.
dst-l4-port The layer 4 destination port.
1 0/29
Example: Layer 2 non-VLAN tagged packet forwarded to a LAG.
(Routing) # show hashdest lag 1 in_port 0/3 src-mac 00:00:20:21:AE:8A dst-mac 00:10:18:99:F7:4E
ethertype 0x8870
Egress Port
----------------------------
30.0.0.2 on interface 0/31
Example: VLAN tagged IPv4 TCP packet forwarded to an ECMP group.
(Routing) #show hashdest ecmp 10.0.0.2/16 in_port 0/3 src-mac 00:00:20:21:AE:8A dst-mac
00:10:18:99:F7:4E vlan 10 ethertype 0x0800 src-ip 7.0.0.2 dst-ip 3.0.0.2 protocol 6 src-l4-port 67
dst-l4-port 68
Egress Port
-----------
0/29
Example: Non-VLAN tagged IPv6 UDP packet forwarded to an ECMP group.
(Routing) #show hashdest ecmp 4001::200/64 in_port 0/3 src-mac 00:00:20:21:AE:8A dst-mac
00:10:18:99:F7:4E ethertype 0x86dd src-ip 7001:0:0:0:0:0:0:2 dst-ip 3001:0:0:0:0:0:0:2 protocol 17
src-l4-port 63 dst-l4-port 64
Egress Port
----------------------------
6001::200 on interface 0/31
Example: Non-VLAN tagged IPv6 TCP packet forwarded to an ECMP group.
(Routing) #show hashdest ecmp 6001::200/64 in_port 0/3 src-mac 00:00:20:21:AE:8A dst-mac
00:10:18:99:F7:4E ethertype 0x86dd src-ip 7001:0:0:0:0:0:0:2 dst-ip 3001:0:0:0:0:0:0:2 protocol 6 src-
l4-port 67 dst-l4-port 68
Egress Port
----------------------------
Parameter Description
Resilient Hashing Resilient hashing mode for the system.
Example:
(Routing) #show ip resilient-hashing
(Routing)#
Parameter Description
System Priority The administrative value of the Key.
Actor Admin Key The administrative value of the Key.
Port Priority The priority value assigned to the Aggregation Port.
Admin State The administrative values of the actor state as transmitted by the Actor in LACPDUs.
Parameter Description
System Priority The administrative value of priority associated with the Partner’s System ID.
Parameter Description
System-ID Represents the administrative value of the Aggregation Port’s protocol Partner’s System ID.
Admin Key The administrative value of the Key for the protocol Partner.
Port Priority The administrative value of the Key for protocol Partner.
Port-ID The administrative value of the port number for the protocol Partner.
Admin State The administrative values of the actor state for the protocol Partner.
Parameter Description
Logical Interface The slot/port of the logical interface.
Port-channel Name The name of port-channel (LAG) interface.
Link-State Shows whether the link is up or down.
Trap Flag Shows whether trap flags are enabled or disabled.
Type Shows whether the port-channel is statically or dynamically maintained.
Mbr Ports The members of this port-channel.
Active Ports The ports that are actively participating in the port-channel.
Parameter Description
Logical Interface The valid slot/port number.
Port-Channel Name The name of this port-channel (LAG). You may enter any string of up to 15 alphanumeric characters.
Link State Indicates whether the Link is up or down.
Admin Mode May be enabled or disabled. The factory default is enabled.
Type The status designating whether a particular port-channel (LAG) is statically or dynamically maintained.
Static - The port-channel is statically maintained.
Dynamic - The port-channel is dynamically maintained.
Load Balance Option The load balance option associated with this LAG. See the port-channel load-balance command.
Parameter Description
Local Preference Indicates whether the local preference mode is enabled or disabled.
Mode
Mbr Ports A listing of the ports that are members of this port-channel (LAG), in slot/port notation. There can be a
maximum of eight ports assigned to a given port-channel (LAG).
Device Timeout For each port, lists the timeout (long or short) for Device Type (actor or partner).
Port Speed Speed of the port-channel port.
Active Ports This field lists ports that are actively participating in the port-channel (LAG).
Example: The following shows example CLI display output for the command.
(Switch) #show port-channel 3/1
Parameter Description
Local Interface The valid slot/port number.
Channel Name The name of this port-channel (LAG).
Link State Indicates whether the Link is up or down.
Admin Mode May be enabled or disabled. The factory default is enabled.
Port Channel Flap The number of times the port-channel was inactive.
Count
Parameter Description
Mbr Ports The slot/port for the port member.
Mbr Flap Counters The number of times a port member is inactive, either because the link is down, or the admin state is disabled.
Example: The following shows example CLI display output for the command.
(Switch) #show port-channel 0/3/1 counters
Parameter Description
Resilient Hashing Resilient hashing mode for the system.
Example:
(Routing) #show port-channel resilient-hashing
(Routing) #
The administrator needs to ensure that the no two VPC domains can share the same VPC domain-id. Domain-id is used to
derive the auto-generated VPC MAC address that is used in the actor ID field in the LACP PDUs and STP BPDUs sent out
on VPC interfaces. When two VPC domains have the same domain-id, it leads to the same actor IDs and results in LACP
convergence issues and STP convergence issues.
Default none
Format peer detection enable
Mode VPC Config
The configurable transmission interval range is 200 ms to 4000 ms. The configurable reception timeout range is 700 ms to
14000 ms. The default transmission interval is 1000 ms; the default reception timeout is 3500 ms.
The configurable range for the UDP port 1 to 65535 (Default is 60000).
Default disabled
Format peer-keepalive enable
Mode VPC Config
NOTE: The keepalive state machine is not restarted if keepalive priority is modified post election.
NOTE: The keepalive state machine is not restarted even if the keepalive priority is modified post-election.
The priority can be between 1 and 255 seconds. The default is 100.
5.19.9 system-mac
Use this command to manually configure the MAC address for the VPC domain. The VPC MAC address should be
configured same on both the peer devices. The specified MAC address should be a unicast MAC address in
<aa:bb:cc:dd:ee:ff> format and cannot be equal to the MAC address of either the primary VPC or secondary VPC device.
The configured VPC MAC address is exchanged during role election and, if they are configured differently on the peer
devices, VPC does not become operational.
The mac-address is used in the LACP PDUs and STP BPDUs that are sent out on VPC member ports, if VPC primary device
election takes place after the VPC MAC address is configured. When the VPC MAC address is configured after the VPC
primary device is elected, the operational VPC MAC address is used in the LACP PDUs and STP BPDUs instead of the
configured VPC MAC address.
5.19.9.0.1 no system-mac
This command unconfigures the manually configured VPC MAC address for the VPC domain.
Format no system-mac
Mode VPC Domain
5.19.10 system-priority
Use this command to manually configures a system priority for the VPC domain. The system-priority should be
configured identically on both VPC peers. If the configured VPC system priority is different on VPC peers, the VPC will not
come up.
The system-priority is used in the LACP PDUs that are sent out on VPC member ports if VPC primary device election takes
place after the VPC system priorities are configured. When the VPC system priority is configured after the VPC primary
device is elected, the operational VPC system priority is used in the LACP PDUs instead of the configured VPC system
priority.
5.19.10.0.1 no system-priority
This command restores the VPC system priority to the default value.
5.19.11 vpc
This command configures a port-channel (LAG) as part of an VPC. Upon issuing this command, the port-channel is down
until the port-channel member information is exchanged and agreed between the VPC peer switches.
The configurable range for the VPC id 1 to (Max number of LAG interfaces [64] – 1).
Default none
Format vpc id
Mode LAG Interface
5.19.11.0.1 no vpc
This command unconfigures a port channel as VPC.
Format no vpc id
Mode LAG Interface
Example:
(Switching) # show running-config vpc
feature vpc
vpc domain 1
role priority 120
system-mac 00:10:18:82:1A:A0
system-priority 32767
peer-keepalive destination 1.1.1.1 source 1.1.1.2
peer detection interval 2000 timeout 6000
interface lag 1
vpc peer-link
interface lag 2
vpc 2
Peer-Link details
-----------------
Interface...................................... 3/2
Peer link status............................... UP
Peer-link STP Mode............................. Disabled
Configured Vlans............................... 1
Egress tagging................................. none
VPC Details
-----------
Number of VPCs configured...................... 1
Number of VPCs operational..................... 1
VPC id# 1
-----------
Interface...................................... 3/1
Configured Vlans............................... 1
VPC Interface State............................ Active
Example:
switch # show vpc consistency-parameters global
Parameter
Name Value
--------------------- -------------------------------------------
STP Mode Enabled
STP Version IEEE 802.1s
BPDU Filter Mode Enabled
4 30,32,34-38
PV(R)STP Configuration:
1 7,8
2 4,5
PV(R)STP Configuration:
STP port-priority <0-240>
Peer
----
VPC Domain ID.................................. 1
Role Priority.................................. 100
Configured VPC MAC..............................<AA:BB:CC:DD:EE:FF>
Operational VPC MAC.............................<AA:BB:CC:DD:EE:FF>
Configured VPC system priority..................32767
Operational VPC system priority.................32767
Role............................................Secondary
Local System MAC................................00:10:18:82:1b:ab
Example 1
(Switching) # show vpc statistics peer-keepalive
Total trasmitted……………………….………. 123
Tx successful…………………….……………. 118
Tx errors……………........................................ 5
Total received…………………………………. 115
Rx successful………………………………….. 108
Rx Errors……………………………………… 7
Timeout counter………………………………. 6
Example 2
(Switching) #show vpc statistics peer-link
Peer link control messages trasmitted…………... 123
Peer link control messages Tx errors..................... 5
Peer link control messages Tx timeout…….…….. 4
Format debug vpc peer-link control-message async {error | msg [receive | transmit]}
Format debug vpc peer-link control-message bulk {error | msg [receive | transmit]}
Mode User EXEC
Format debug vpc peer-link control-message ckpt {error | msg [receive | transmit]}
Mode User EXEC
A VLAN can be configured as the source to a session (all member ports of that VLAN are monitored). Remote port mirroring
is configured by adding the RSPAN VLAN ID. At the source switch, the destination is configured as the RSPAN VLAN and
at the destination switch, the source is configured as the RSPAN VLAN.
NOTE: The source and destination cannot be configured as remote on the same device.
The commands described in the following paragraphs add a mirrored port (source port) to a session identified with
session-id. The session-id parameter is an integer value used to identify the session. The maximum number of
sessions which can be configured is L7_MIRRORING_MAX_SESSIONS. Option rx is used to monitor only ingress packets.
Option tx is used to monitor only egress packets. If no option is specified, both ingress and egress packets, RX and TX, are
monitored.
A VLAN can also be configured as the source to a session (all the member ports of that VLAN are monitored).
NOTE: If an interface participates in some VLAN and is a LAG member, this VLAN cannot be assigned as a source VLAN
for a Monitor session. At the same time, if an interface participates in some VLAN and this VLAN is assigned as a
source VLAN for a Monitor session, the interface can be assigned as a LAG member.
Remote port mirroring is configured by giving the RSPAN VLAN ID. At the source switch the destination is configured as
RSPAN VLAN and at the destination switch the source is configured as RSPAN VLAN.
NOTE: On the intermediate switch, RSPAN VLAN should be created, the ports connected towards Source and Destination
switch should have the RSPAN VLAN participation. RSPAN VLAN egress tagging should be enabled on the
interface on the intermediate switch connected towards the Destination switch.
Default none
Format monitor session session-id source {interface {slot/port | cpu | lag } | vlan vlan-id |
remote vlan vlan-id }[{rx | tx}]
Mode Global Config
Default none
Format no monitor session session-id source {interface {slot/port | cpu | lag } | vlan | remote
vlan}
Mode Global Config
A VLAN can be configured as the source to a session (all member ports of that VLAN are monitored). Remote port mirroring
is configured by adding the RSPAN VLAN ID. At the source switch, the destination is configured as the RSPAN VLAN and
at the destination switch, the source is configured as the RSPAN VLAN.
NOTE: The source and destination cannot be configured as remote on the same device.
The reflector-port is configured at the source switch along with the destination RSPAN VLAN. The reflector-port
forwards the mirrored traffic towards the destination switch.
Use the destination interface slot/port to specify the interface to receive the monitored traffic.
The following commands add a mirrored port (source port) to a session identified with session-id. The session-id
parameter is an integer value used to identify the session. The maximum number of sessions which can be configured is
L7_MIRRORING_MAX_SESSIONS. Option rx is used to monitor only ingress packets. Option tx is used to monitor only
egress packets. If no option is specified, both ingress and egress packets, RX and TX, are monitored.
A VLAN can also be configured as the source to a session (all the member ports of that VLAN are monitored).
NOTE: If an interface participates in some VLANs and is a LAG member, this VLAN cannot be assigned as a source VLAN
for a Monitor session. At the same time, if an interface participates in some VLANs and this VLAN is assigned as
a source VLAN for a Monitor session, the interface can be assigned as a LAG member.
Remote port mirroring is configured by giving the RSPAN VLAN ID. At the source switch the destination is configured as
RSPAN VLAN and at the destination switch the source is configured as RSPAN VLAN.
NOTE: On the intermediate switch: RSPAN VLAN should be created, the ports connected towards Source and Destination
switch should have the RSPAN VLAN participation. RSPAN VLAN egress tagging should be enabled on the
interface on the intermediate switch connected towards the Destination switch.
Default none
Format monitor session <session-ID> destination {interface {<slot/port>|lag <lag ID>}
[remove-rspan-tag]|remote vlan <vlan ID> reflector-port {<slot/port>|lag <lag ID>}}
Mode Global Config
An IP/MAC ACL can be attached to a session by giving the access list number/name.
Use the filter parameter to filter a specified access group either by IP address or MAC address.
The commands described in the following paragraphs add a mirrored port (source port) to a session identified with
session-id. The session-id parameter is an integer value used to identify the session. The maximum number of
sessions which can be configured is L7_MIRRORING_MAX_SESSIONS.
Remote port mirroring is configured by giving the RSPAN VLAN ID. At the source switch the destination is configured as
RSPAN VLAN and at the destination switch the source is configured as RSPAN VLAN.
NOTE:
Source and destination cannot be configured as remote on the same device.
IP/MAC ACL can be attached to a session by giving the access list number/name. On the platforms that do not
support both IP and MAC ACLs to be assigned on the same Monitor session, an error message is thrown when
user tries to configure ACLs of both types.
Default none
Format monitor session session-id filter {ip access-group acl-id/aclname | mac access-group
acl-name}
Mode Global Config
A VLAN can be configured as the source to a session (all member ports of that VLAN are monitored). Remote port mirroring
is configured by adding the RSPAN VLAN ID. At the source switch, the destination is configured as the RSPAN VLAN and
at the destination switch, the source is configured as the RSPAN VLAN.
NOTE: The source and destination cannot be configured as remote on the same device.
The commands described in the following paragraphs add a mirrored port (source port) to a session identified with
session-id. The session-id parameter is an integer value used to identify the session. The maximum number of
sessions which can be configured is L7_MIRRORING_MAX_SESSIONS. Option rx is used to monitor only ingress packets.
Option tx is used to monitor only egress packets. If no option is specified, both ingress and egress packets, RX and TX, are
monitored.
A VLAN can also be configured as the source to a session (all the member ports of that VLAN are monitored).
NOTE: If an interface participates in some VLAN and is a LAG member, this VLAN cannot be assigned as a source VLAN
for a Monitor session. At the same time, if an interface participates in some VLAN and this VLAN is assigned as a
source VLAN for a Monitor session, the interface can be assigned as a LAG member.
Remote port mirroring is configured by giving the RSPAN VLAN ID. At the source switch the destination is configured as
RSPAN VLAN and at the destination switch the source is configured as RSPAN VLAN.
NOTE:
Source and destination cannot be configured as remote on the same device.
On the intermediate switch: RSPAN VLAN should be created, the ports connected towards the Source and
Destination switch should have the RSPAN VLAN participation. RSPAN VLAN egress tagging should be
enabled on interface on intermediate switch connected towards Destination switch.
Default none
Format monitor session session-id mode
Mode Global Config
Format no monitor session session-id {source {interface slot/port | cpu | lag} |vlan| remote
vlan} | destination { interface | remote vlan | mode |filter {ip access-group |mac
access-group}}]
Mode Global Config
5.20.6 no monitor
This command removes all the source ports and a destination port and restores the default value for mirroring session mode
for all the configured sessions.
NOTE: This is a stand-alone “no” command. This command does not have a “normal” form.
Default enabled
Format no monitor
Mode Global Config
5.20.7 remote-span
This command identifies the VLAN as the RSPAN VLAN. It allows configuring up to L7_MIRRORING_MAX_RSPAN_VLANS
RSPAN VLANs. To enter VLAN Config mode, use the vlan vlan-id from Global Config mode.
Default none
Format remote-span
Mode VLAN configuration
5.20.7.0.1 no remote-span
This command clears RSPAN information for the VLAN.
Format no remote-span
Mode VLAN configuration
NOTE: The session-id parameter is an integer value used to identify the session. In the current version of the software,
the session-id parameter is always one (1).
Parameter Description
Session ID An integer value used to identify the session. Its value can be anything between 1 and the
maximum number of mirroring sessions allowed on the platform.
Admin Mode Indicates whether the Port Mirroring feature is enabled or disabled for the session identified with
session-id. The possible values are Enabled and Disabled.
Probe Port Probe port (destination port) for the session identified with session-id. If probe port is not set
then this field is blank.
Remove RSPAN Tag Remove RSPAN VLAN tag on the probe (destination) port. To configure this value probe port and
remove RSPAN tag values should be specified simultaneously. If no probe port is configured for
the session then this field is blank.
Mirrored Ports The port that is configured as a mirrored port (source port) for the session identified with
session-id. If no source port is configured for the session, this field is blank.
Session Type The type of monitor session.
Source VLAN All member ports of this VLAN are mirrored. If the source VLAN is not configured, this field is blank.
Reflector Port This port carries all the mirrored traffic at the source switch.
Source RSPAN VLAN The source VLAN configured at the destination switch. If remote VLAN is not configured, this field
is blank
Destination RSPAN VLAN The destination VLAN configured at the source switch. If remote VLAN is not configured, this field
is blank
Source ERSPAN Flow ID The ID number used by the source session to identify the ERSPAN traffic.
Parameter Description
Destination ERSPAN Flow ID The ID number used by the destination session to identify the ERSPAN traffic, must also be
entered in the ERSPAN destination session configuration.
Source ERSPAN IP address The ERSPAN flow destination IP address , which must be an address on a local interface and
match the address entered in the ERSPAN destination session configuration.
Destination ERSPAN IP address The ERSPAN flow destination IPv4 address , which must also be configured on an interface on the
destination switch and be entered in the ERSPAN destination session configuration.
Destination ERSPAN Origin IP The IPv4 address used as the source of the ERSPAN traffic.
address
Destination ERSPAN IP TTL The IPv4 TTL value of the packets in the ERSPAN traffic.
Destination ERSPAN IP DSCP The IP DSCP value of the packets in the ERSPAN traffic.
Destination ERSPAN IP Precedence The IP precedence value of the packets in the ERSPAN traffic.
IP ACL The IP access-list id or name attached to the port mirroring session.
MAC ACL The MAC access-list name attached to the port mirroring session.
Example: This example shows the command output when the session ID is specified.
(Switch)#show monitor session 1
Session ID..................................... 1
Session Type................................... ERSPAN Source
Admin Mode..................................... Enabled
Probe Port..................................... 1/0/8
Remove RSPAN Tag............................... False
Source VLAN....................................
Mirrored Ports.................................
Reflector Port.................................
Source RSPAN VLAN..............................
Destination RSPAN VLAN.........................
Source ERSPAN Flow ID.......................... 1023
Source ERSPAN IP Address....................... 255.255.255.255
Destination ERSPAN Flow ID.....................
Destination ERSPAN IP Address..................
Destination ERSPAN Origin IP...................
Destination ERSPAN IP TTL......................
Destination ERSPAN IP DSCP.....................
Destination ERSPAN IP Precedence...............
IP ACL.........................................
MAC ACL........................................ mymac
Example: This example shows the command output when all is specified.
Session ID..................................... 1
Session Type................................... ERSPAN Destination
Admin Mode..................................... Enable
Probe Port..................................... 1/0/8
Remove RSPAN Tag............................... False
Source VLAN....................................
Mirrored Ports.................................
Reflector Port.................................
Source RSPAN VLAN..............................
Destination RSPAN VLAN.........................
Source ERSPAN Flow ID.......................... 1023
Session ID..................................... 2
Session Type................................... Local
Admin Mode..................................... Disabled
Probe Port..................................... 1/0/2
Remove RSPAN Tag............................... False
Source VLAN....................................
Mirrored Ports................................. 1/0/1(Rx), 1/0/19(Rx,Tx), 1/0/20(Tx)
Reflector Port.................................
Source RSPAN VLAN..............................
Destination RSPAN VLAN.........................
Source ERSPAN Flow ID..........................
Source ERSPAN IP Address.......................
Destination ERSPAN Flow ID.....................
Destination ERSPAN IP Address..................
Destination ERSPAN Origin IP...................
Destination ERSPAN IP TTL......................
Destination ERSPAN IP DSCP.....................
Destination ERSPAN IP Precedence...............
IP ACL.........................................
MAC ACL........................................
Session ID..................................... 3
Session Type................................... RSPAN Source
Admin Mode..................................... Disabled
Probe Port.....................................
Remove RSPAN Tag...............................
Source VLAN....................................
Mirrored Ports................................. 0/5/1(Rx,Tx)
Reflector Port................................. 1/0/10
Source RSPAN VLAN..............................
Destination RSPAN VLAN......................... 2
Source ERSPAN Flow ID..........................
Source ERSPAN IP Address.......................
Destination ERSPAN Flow ID.....................
Destination ERSPAN IP Address..................
Destination ERSPAN Origin IP...................
Destination ERSPAN IP TTL......................
Destination ERSPAN IP DSCP.....................
Destination ERSPAN IP Precedence...............
IP ACL.........................................
MAC ACL........................................
Session ID..................................... 4
Session Type................................... RSPAN Destination
Admin Mode..................................... Disabled
Probe Port.....................................
Remove RSPAN Tag...............................
Source VLAN....................................
ERSPAN uses a GRE tunnel to carry traffic between switches. ERSPAN consists of an ERSPAN source session, an
ERSPAN destination session, and routable ERSPAN GRE-encapsulated traffic. All participating switches must be connected
at Layer 3, and the network path must support the size of the ERSPAN traffic for the egress mirroring session.
To configure the source ERSPAN session, the following parameters should be configured at the source switch:
Source ports (that is, the traffic on this port is mirrored)
ERSPAN session ID
TX/RX
The following sections describe the commands to configure the ERSPAN source session.
5.21.1 source
This command configures the source interface for selected ERSPAN monitor session.
Default none
Format source {interface {slot/port | cpu | lag lag-group-id} | vlan vlan-id }[rx | tx]
Mode ERSPAN Source Session Configuration Mode
5.21.1.0.1 no source
This command removes the specified mirrored port from the selected ERSPAN mirroring session.
5.21.2 destination
Use this command to enter the ERSPAN Source Session Destination Configuration mode.
Default none
Format destination
Mode ERSPAN Source Session Configuration Mode
5.21.3 ip address
This command configures the ERSPAN destination IP address.
NOTE: The IP address is the address of the monitoring station on which the GRE traffic is recorded or decoded.
Default none
Format ip address ip-address
Mode ERSPAN Source Session Destination Configuration Mode
5.21.3.0.1 no ip address
This command removes the ERSPAN destination IP address configuration.
Format no ip address
Mode ERSPAN Source Session Destination Configuration Mode
5.21.4 erspan-id
This command configures the ERSPAN flow ID number used by the source and destination sessions to identify the ERSPAN
traffic. The valid range for erspan-id is 1 to 1023.
Default none
Format erspan-id erspan-id
Mode ERSPAN Source Session Destination Configuration Mode
5.21.4.0.1 no erspan-id
This command removes the ERSPAN destination IP address configuration.
Format no erspan-id
Mode ERSPAN Source Session Destination Configuration Mode
Default none
Format origin ip address ip-address
Mode ERSPAN Source Session Destination Configuration Mode
5.21.6 ip ttl
This command configures the IP time-to-live (TTL) value of the packets in the ERSPAN traffic. The valid range for
ttl-value is 1 to 255.
Default 64
Format ip ttl ttl-value
Mode ERSPAN Source Session Destination Configuration Mode
5.21.6.0.1 no ip ttl
This command removes the ERSPAN IP TTL value configuration.
Format no ip ttl
Mode ERSPAN Source Session Destination Configuration Mode
5.21.7 ip dscp
This command configures the IP DSCP value of the packets in the ERSPAN traffic. The valid range for dscp-value is 0 to
63.
Default 64
Format ip dscp dscp-value
Mode ERSPAN Source Session Destination Configuration Mode
5.21.7.0.1 no ip dscp
This command removes the ERSPAN IP DSCP value configuration.
Format no ip dscp
Mode ERSPAN Source Session Destination Configuration Mode
5.21.8 ip prec
This command configures the IP precedence value of the packets in the ERSPAN traffic. The valid range for
precedence-value is 0 to 7.
Default 0
Format ip prec precedence-value
Mode ERSPAN Source Session Destination Configuration Mode
5.21.8.0.1 no ip prec
This command removes the ERSPAN IP precedence value configuration.
Format no ip prec
Mode ERSPAN Source Session Destination Configuration Mode
NOTE: This command is not available in builds with the routing package. The command is only available in builds with the
switching-only package.
Default none
Format nexthop mac MAC_address
Mode ERSPAN Source Session Configuration Mode
NOTE: This command is not available in builds with the routing package. The command is only available in builds with the
switching-only package.
Default none
Format nexthop vlan vlan_ID
Mode ERSPAN Source Session Configuration Mode
5.21.11 reflector-port
This command configures the reflector interface for the selected ERSPAN monitor session. You can configure a LAG port
as a destination or reflector port in SPAN, RSPAN, and ERSPAN modes. In these modes, source and destination ports of a
mirror session are distributed across multiple devices.
NOTE: This command is not available in builds with the routing package. The command is only available in builds with the
switching-only package.
Default 0
5.21.11.0.1 no reflector-port
This command removes the reflector port from the selected ERSPAN mirroring session.
Format no reflector-port
Mode ERSPAN Source Session Configuration Mode
5.22.1 macfilter
This command adds a static MAC filter entry for the MAC address macaddr on the VLAN vlanid. The value of the macaddr
parameter is a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6. The restricted MAC Addresses are:
00:00:00:00:00:00, 01:80:C2:00:00:00 to 01:80:C2:00:00:0F, 01:80:C2:00:00:20 to 01:80:C2:00:00:21, and
FF:FF:FF:FF:FF:FF. The vlanid parameter must identify a valid VLAN.
The number of static mac filters supported on the system is different for MAC filters where source ports are configured and
MAC filters where destination ports are configured.
For current Broadcom platforms, you can configure the following combinations:
Unicast MAC and source port
5.22.1.0.1 no macfilter
This command removes all filtering restrictions and the static MAC filter entry for the MAC address macaddr on the VLAN
vlanid. The macaddr parameter must be specified as a 6-byte hexadecimal number in the format of b1:b2:b3:b4:b5:b6.
NOTE: Configuring a destination port list is only valid for multicast MAC addresses.
NOTE: Configuring a destination port list is only valid for multicast MAC addresses.
Parameter Description
MAC Address The MAC Address of the static MAC filter entry.
VLAN ID The VLAN ID of the static MAC filter entry.
Source Ports The source port filter set's slot and ports.
NOTE: Only multicast address filters will have destination port lists.
Parameter Description
VLAN ID The VLAN in which the MAC Address is learned.
MAC Address A unicast MAC address for which the switch has forwarding and or filtering information. As the data is gleaned
from the MFDB, the address will be a multicast address. The format is six 2-digit hexadecimal numbers that are
separated by colons, for example 01:23:45:67:89:AB.
Parameter Description
Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to
the table as a result of a learning process or protocol.
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Default disabled
Format dhcp l2relay circuit-id subscription-name subscription-string
Mode Interface Config
Parameter Description
vlan–list The VLAN ID. The range is 1 to 4093. Separate non-consecutive IDs with a comma (,) no spaces and no zeros
in between the range. Use a dash (–) for the range.
Parameter Description
vlan–list The VLAN ID. The range is 1 to 4093. Separate non-consecutive IDs with a comma (,), no spaces and no zeros
in between the range. Use a dash (–) for the range.
Default untrusted
Format dhcp l2relay trust
Mode Interface Config
Default drop
Format dhcp l2relay trust no-option-82 update
Mode Interface Config
Default disable
Format dhcp l2relay vlan vlan-list
Mode Global Config
Parameter Description
vlan–list The VLAN ID. The range is 1 to 4093. Separate non-consecutive IDs with a comma (,) no spaces and no zeros
in between the range. Use a dash (–) for the range.
Example: The following shows example CLI display output for the command show dhcp l2relay all.
(Switching) #show dhcp l2relay all
Example: The following shows example CLI display output for the command show dhcp l2relay interface 0/13/1.
(Switching) #show dhcp l2relay interface 0/13/1
Parameter Description
vlan-list Enter VLAN IDs in the range 1 to 4093. Use a dash (–) to specify a range or a comma (,) to separate VLAN IDs
in a list. Spaces and zeros are not permitted.
Example: The following shows example CLI display output for the command.
(Switching) #show dhcp l2relay interface all
Parameter Description
vlan-list Enter VLAN IDs in the range 1 to 4093. Use a dash (–) to specify a range or a comma (,) to separate VLAN IDs
in a list. Spaces and zeros are not permitted.
Example: The following shows example CLI display output for the command.
(Switching) #show dhcp l2relay stats interface all
Example: The following shows example CLI display output for the command.
(Switching) #show dhcp l2relay subscription interface all
Interface SubscriptionName L2Relay mode Circuit-Id mode Remote-Id mode
----------- ---------------- -------------- --------------- ----------------
0/1 sub1 Enabled Disabled --NULL--
0/2 sub3 Enabled Disabled EnterpriseSwitch
0/2 sub22 Disabled Enabled --NULL--
0/4 sub4 Enabled Enabled --NULL--
Example: The following shows example CLI display output for the command.
(Switching) #show dhcp l2relay agent-option vlan 5-10
Parameter Description
vlan-list Enter VLAN IDs in the range 1 to 4093. Use a dash (–) to specify a range or a comma (,) to separate VLAN IDs
in a list. Spaces and zeros are not permitted.
Example: The following shows example CLI display output for the command.
(Switching) #show dhcp client vendor-id-option
Default disabled
Format ip dhcp snooping
Mode Global Config
Default disabled
Format ip dhcp snooping vlan vlan-list
Mode Global Config
Default enabled
Format ip dhcp snooping verify mac-address
Mode Global Config
Default local
Format ip dhcp snooping database {local|tftp://hostIP/filename}
Mode Global Config
Format ip dhcp snooping binding mac-address vlan vlan id ip address interface interface id
Mode Global Config
Default disabled
Format ip dhcp snooping log-invalid
Mode Interface Config
Default disabled
Format ip dhcp snooping trust
Mode Interface Config
Parameter Description
Interface The interface for which data is displayed.
Trusted If it is enabled, DHCP Snooping considers the port as trusted. The factory default is disabled.
Parameter Description
Log Invalid Pkts If it is enabled, DHCP Snooping application logs invalid packets on the specified interface.
Example: The following shows example CLI display output for the command.
(Routing) #show ip dhcp snooping
DHCP snooping is Disabled
DHCP snooping source MAC verification is enabled
DHCP snooping is enabled on the following VLANs:
11 - 30, 40
Format show ip dhcp snooping binding [{static|dynamic}] [interface slot/port] [vlan id]
Mode Privileged EXEC
User EXEC
Parameter Description
MAC Address Displays the MAC address for the binding that was added. The MAC address is the key to the binding database.
IP Address Displays the valid IP address for the binding rule.
VLAN The VLAN for the binding rule.
Interface The interface to add a binding into the DHCP Snooping interface.
Type Binding type; statically configured from the CLI or dynamically learned.
Lease (sec) The remaining lease time for the entry.
Example: The following shows example CLI display output for the command.
(Routing) #show ip dhcp snooping binding
Parameter Description
Agent URL Bindings database agent URL.
Write Delay The maximum write time to write the database into local or remote.
Example: The following shows example CLI display output for the command.
(Routing) #show ip dhcp snooping database
write-delay: 5000
Example: The following shows example CLI display output for the command.
(Routing) #show ip dhcp snooping interfaces
Parameter Description
Interface The IP address of the interface in slot/port format.
MAC Verify Failures Represents the number of DHCP messages that were filtered on an untrusted interface because of source MAC
address and client HW address mismatch.
Client Ifc Mismatch Represents the number of DHCP release and Deny messages received on the different ports than learned
previously.
DHCP Server Msgs Represents the number of DHCP server messages received on Untrusted ports.
Received
Example: The following shows example CLI display output for the command.
(Routing) #show ip dhcp snooping statistics
Parameter Description
Interface Interface address in slot/port format.
Filter Type Is one of two values:
ip-mac: User has configured MAC address filtering on this interface.
ip: Only IP address filtering on this interface.
Example: The following shows example CLI display output for the command.
(Routing) #show ip verify source
Parameter Description
Interface Interface address in slot/port format.
Filter Type Is one of two values:
ip-mac: User has configured MAC address filtering on this interface.
ip: Only IP address filtering on this interface.
Parameter Description
MAC Address The MAC address for the entry that is added.
IP Address The IP address of the entry that is added.
Type Entry type; statically configured from CLI or dynamically learned from DHCP Snooping.
VLAN VLAN for the entry.
Interface IP address of the interface in slot/port format.
Example: The following shows example CLI display output for the command.
(Routing) #show ip source binding
DAI relies on DHCP Snooping. DHCP Snooping listens to DHCP message exchanges and builds a binding database of valid
{MAC address, IP address, VLAN, and interface} tuples.
When DAI is enabled, the switch drops ARP packets whose sender MAC address and sender IP address do not match an
entry in the DHCP Snooping bindings database. You can optionally configure additional ARP packet validation.
Default disabled
Format ip arp inspection vlan vlan-list
Mode Global Config
Default disabled
Format ip arp inspection validate {[src-mac] [dst-mac] [ip]}
Mode Global Config
Default enabled
Format ip arp inspection validate interface
Mode Global Config
Default enabled
Format ip arp inspection vlan vlan-list logging
Mode Global Config
Default disabled
Format ip arp inspection trust
Mode Interface Config
NOTE: The user interface will accept a rate limit for a trusted interface, but the limit will not be enforced unless the interface
is configured to be untrusted.
Parameter Description
Source MAC Displays whether Source MAC Validation of ARP frame is enabled or disabled.
Validation
Destination MAC Displays whether Destination MAC Validation is enabled or disabled.
Validation
IP Address Validation Displays whether IP Address Validation is enabled or disabled.
VLAN The VLAN ID for each displayed row.
Configuration Displays whether DAI is enabled or disabled on the VLAN.
Log Invalid Displays whether logging of invalid ARP packets is enabled on the VLAN.
ACL Name The ARP ACL Name, if configured on the VLAN.
Static Flag If the ARP ACL is configured static on the VLAN.
Example: The following shows example CLI display output for the command.
(Routing) #show ip arp inspection vlan 10-12
Parameter Description
VLAN The VLAN ID for each displayed row.
Forwarded The total number of valid ARP packets forwarded in this VLAN.
Dropped The total number of not valid ARP packets dropped in this VLAN.
DHCP Drops The number of packets dropped due to DHCP Snooping binding database match failure.
ACL Drops The number of packets dropped due to ARP ACL rule match failure.
DHCP Permits The number of packets permitted due to DHCP Snooping binding database match.
ACL Permits The number of packets permitted due to ARP ACL rule match.
ACL Denials The number of packets denied due to ARP ACL deny rule match.
Bad Src MAC The number of packets dropped due to Source MAC validation failure.
Bad Dest MAC The number of packets dropped due to Destination MAC validation failure.
Parameter Description
Invalid IP The number of packets dropped due to invalid IP checks.
Example: The following shows example CLI display output for the command show ip arp inspection
statistics, which lists the summary of forwarded and dropped ARP packets on all DAI-enabled VLANs.
(Routing) #show ip arp inspection
Example: The following shows example CLI display output for the command show ip arp inspection statistics
vlan 10,20.
VLAN DHCP ACL DHCP ACL ACL Bad Src Bad Dest Invalid
Drops Drops Permits Permits Denials MAC MAC IP
----- -------- --------- ----------- --------- --------- ---------- ----------- ---------
10 11 1 65 25 5 1 1 0
20 1 0 8 2 3 0 1 1
Default none
Format clear ip arp inspection statistics
Mode Privileged EXEC
Parameter Description
Interface The interface ID for each displayed row.
Trust State Whether the interface is trusted or untrusted for DAI.
Rate Limit The configured rate limit value in packets per second.
Burst Interval The configured burst interval value in seconds.
Example: The following shows example CLI display output for the command.
(Routing) #show ip arp inspection interfaces
Example: The following shows example CLI display output for the command.
(Routing) #show arp access-list
ARP access list H2
permit ip host 1.1.1.1 mac host 00:01:02:03:04:05
permit ip host 1.1.1.2 mac host 00:03:04:05:06:07
deny ip host 1.1.1.3 mac host 00:08:09:0A:0B:0C
ARP access list H3
ARP access list H4
permit ip host 1.1.1.3 mac any
deny ip any mac host 00:11:11:11:11:11
ARP access list H5
permit ip host 2.1.1.2 mac host 00:03:04:05:06:08
NOTE: This note clarifies the prioritization of MGMD Snooping Configurations. Many of the IGMP Snooping commands
are available both in the Interface and VLAN modes. Operationally the system chooses or prefers the VLAN
configured values over the Interface configured values for most configurations when the interface participates in
the VLAN.
If an interface has IGMP Snooping enabled and you enable this interface for routing or enlist it as a member of a port-channel
(LAG), IGMP Snooping functionality is disabled on that interface. IGMP Snooping functionality is reenabled if you disable
routing or remove port-channel (LAG) membership from an interface that has IGMP Snooping enabled.
The presence of the router alert option (9404) and ToS Byte = 0xC0 (Internet Control) in the IP packet header of
IGMPv3 message and drops packets that do not include these options.
Default enabled
Format set igmp header-validation
Mode Global Config
You should enable fast-leave admin mode only on VLANs where only one host is connected to each Layer 2 LAN port. This
prevents the inadvertent dropping of the other hosts that were connected to the same Layer 2 LAN port but were still
interested in receiving multicast traffic directed to that group. Also, fast-leave processing is supported only with IGMP version
2 hosts.
Default disabled
Format set igmp fast-leave [vlan_id]
Mode Interface Config
Interface Range
VLAN Database
Default 0
Format set igmp mcrtrexpiretime [vlan_id] 0-3600
Mode Global Config
Interface Config
VLAN Database
Default disabled
Format set igmp mrouter interface
Default disabled
Format set igmp report-suppression vlan-id
Mode VLAN Database
Parameter Description
vlan-id A valid VLAN ID. Range is 1 to 4093.
When the optional arguments slot/port or vlan_id are not used, the command displays the following information:
Parameter Description
Admin Mode Indicates whether or not IGMP Snooping is active on the switch.
Multicast Control Frame Count The number of multicast control frames that are processed by the CPU.
Interface Enabled for IGMP Snooping The list of interfaces on which IGMP Snooping is enabled.
VLANS Enabled for IGMP Snooping The list of VLANS on which IGMP Snooping is enabled.
When you specify the slot/port values, the following information appears.
Parameter Description
IGMP Snooping Indicates whether IGMP Snooping is active on the interface.
Admin Mode
Fast Leave Mode Indicates whether IGMP Snooping Fast-leave is active on the interface.
Group Membership The amount of time in seconds that a switch will wait for a report from a particular group on a particular interface
Interval before deleting the interface from the entry.This value may be configured.
Maximum Response The amount of time the switch waits after it sends a query on an interface because it did not receive a report for
Time a particular group on that interface. This value may be configured.
Multicast Router The amount of time to wait before removing an interface from the list of interfaces with multicast routers attached.
Expiry Time The interface is removed if a query is not received. This value may be configured.
When you specify a value for vlan_id, the following information appears.
Parameter Description
VLAN ID The VLAN ID.
IGMP Snooping Indicates whether IGMP Snooping is active on the VLAN.
Admin Mode
Fast Leave Mode Indicates whether IGMP Snooping Fast-leave is active on the VLAN.
Group Membership The amount of time in seconds that a switch will wait for a report from a particular group on a particular interface,
Interval (secs) which is participating in the VLAN, before deleting the interface from the entry.This value may be configured.
Maximum Response The amount of time the switch waits after it sends a query on an interface, participating in the VLAN, because it
Time (secs) did not receive a report for a particular group on that interface. This value may be configured.
Multicast Router The amount of time to wait before removing an interface that is participating in the VLAN from the list of interfaces
Expiry Time (secs) with multicast routers attached. The interface is removed if a query is not received. This value may be configured.
Report Suppression Indicates whether IGMP reports (set by the command set igmp report-suppression) in enabled or not.
Mode
Example: The following shows example CLI display output for the command.
(Routing) #show igmpsnooping 1
VLAN ID........................................ 1
IGMP Snooping Admin Mode....................... Disabled
Fast Leave Mode................................ Disabled
Group Membership Interval (secs)............... 260
Max Response Time (secs)....................... 10
Multicast Router Expiry Time (secs)............ 0
Report Suppression Mode........................ Enabled
Parameter Description
Interface The port on which multicast router information is being displayed.
Multicast Router Indicates whether multicast router is statically enabled on the interface.
Attached
VLAN ID The list of VLANs of which the interface is a member.
Parameter Description
Interface The port on which multicast router information is being displayed.
VLAN ID The list of VLANs of which the interface is a member.
Parameter Description
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A multicast MAC address for which the switch has forwarding or filtering information. The format is six 2-digit
hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Parameter Description
Type The type of the entry, which is either static (added by the user) or dynamic (added to the table as a result of a
learning process or protocol).
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
This section describes commands used to configure and display information on IGMP Snooping Queriers on the network
and, separately, on VLANs.
NOTE: This note clarifies the prioritization of MGMD Snooping Configurations. Many of the IGMP/MLD Snooping
commands are available both in the Interface and VLAN modes. Operationally the system chooses or prefers the
VLAN configured values over the Interface configured values for most configurations when the interface
participates in the VLAN.
If a VLAN has IGMP Snooping Querier enabled and IGMP Snooping is operationally disabled on it, IGMP Snooping Querier
functionality is disabled on that VLAN. IGMP Snooping functionality is reenabled if IGMP Snooping is operational on the
VLAN.
NOTE: The Querier IP Address assigned for a VLAN takes preference over global configuration.
The IGMP Snooping Querier application supports sending periodic general queries on the VLAN to solicit membership
reports.
Default disabled
Format set igmp querier [vlan-id] [address ipv4_address]
Mode Global Config
VLAN Mode
Default disabled
Format set igmp querier query-interval 1-1800
Mode Global Config
Default disabled
Format set igmp querier election participate
Mode VLAN Database
When the optional argument vlanid is not used, the command displays the following information.
Parameter Description
Admin Mode Indicates whether or not IGMP Snooping Querier is active on the switch.
Admin Version The version of IGMP that will be used while sending out the queries.
Querier Address The IP Address which will be used in the IPv4 header while sending out IGMP queries. It can be configured using
the appropriate command.
Query Interval The amount of time in seconds that a Snooping Querier waits before sending out the periodic general query.
Querier Timeout The amount of time to wait in the Non-Querier operational state before moving to a Querier state.
When you specify a value for vlanid, the following additional information appears.
Parameter Description
VLAN Admin Mode Indicates whether iGMP Snooping Querier is active on the VLAN.
VLAN Operational State Indicates whether IGMP Snooping Querier is in Querier or Non-Querier state. When the switch is in
Querier state, it will send out periodic general queries. When in Non-Querier state, it will wait for
moving to Querier state and does not send out any queries.
VLAN Operational Max Indicates the time to wait before removing a Leave from a host upon receiving a Leave request. This value
Response Time is calculated dynamically from the Queries received from the network. If the Snooping Switch is in Querier
state, then it is equal to the configured value.
Querier Election Participation Indicates whether the IGMP Snooping Querier participates in querier election if it discovers the presence
of a querier in the VLAN.
Querier VLAN Address The IP address will be used in the IPv4 header while sending out IGMP queries on this VLAN. It can be
configured using the appropriate command.
Operational Version The version of IPv4 will be used while sending out IGMP queries on this VLAN.
Last Querier Address Indicates the IP address of the most recent Querier from which a Query was received.
Last Querier Version Indicates the IGMP version of the most recent Querier from which a Query was received on this VLAN.
When the optional argument detail is used, the command shows the global information and the information for all
Querier-enabled VLANs.
NOTE: This note clarifies the prioritization of MGMD Snooping Configurations. Many of the IGMP/MLD Snooping
commands are available both in the Interface and VLAN modes. Operationally the system chooses or prefers the
VLAN configured values over the Interface configured values for most configurations when the interface
participates in the VLAN.
If an interface has MLD Snooping enabled and you enable this interface for routing or enlist it as a member of a port-channel
(LAG), MLD Snooping functionality is disabled on that interface. MLD Snooping functionality is reenabled if you disable
routing or remove port channel (LAG) membership from an interface that has MLD Snooping enabled.
Maintenance of the forwarding table entries based on the MAC address versus the IPv6 address.
Default disabled
Format set mld vlanid
Mode Global Config
Interface Config
VLAN Mode
Default disabled
Format set mld interfacemode
Mode Global Config
NOTE:
You should enable fast-leave admin mode only on VLANs where only one host is connected to each Layer 2
LAN port. This prevents the inadvertent dropping of the other hosts that were connected to the same Layer 2
LAN port but were still interested in receiving multicast traffic directed to that group.
Fast-leave processing is supported only with MLD version 1 hosts.
Default disabled
Format set mld fast-leave vlanid
Mode Interface Config
VLAN Mode
Default 10 seconds
Format set mld maxresponse 1-65
Mode Global Config
Interface Config
VLAN Mode
Default 0
Format set mld mcrtexpiretime vlanid 0-3600
Mode Global Config
Interface Config
Default disabled
Format set mld mrouter interface
Mode Interface Config
When the optional arguments slot/port or vlanid are not used, the command displays the following information.
Parameter Description
Admin Mode Indicates whether or not MLD Snooping is active on the switch.
Interfaces Enabled for Interfaces on which MLD Snooping is enabled.
MLD Snooping
MLD Control Frame Displays the number of MLD Control frames that are processed by the CPU.
Count
VLANs Enabled for VLANs on which MLD Snooping is enabled.
MLD Snooping
When you specify the slot/port values, the following information displays.
Parameter Description
MLD Snooping Admin Indicates whether MLD Snooping is active on the interface.
Mode
Fast Leave Mode Indicates whether MLD Snooping Fast Leave is active on the VLAN.
Group Membership Shows the amount of time in seconds that a switch will wait for a report from a particular group on a particular
Interval interface, which is participating in the VLAN, before deleting the interface from the entry. This value may be
configured.
Max Response Time Displays the amount of time the switch waits after it sends a query on an interface, participating in the VLAN,
because it did not receive a report for a particular group on that interface. This value may be configured.
Multicast Router Displays the amount of time to wait before removing an interface that is participating in the VLAN from the list of
Present Expiration interfaces with multicast routers attached. The interface is removed if a query is not received. This value may be
Time configured.
When you specify a value for vlanid, the following information appears.
Parameter Description
VLAN Admin Mode Indicates whether MLD Snooping is active on the VLAN.
Parameter Description
Interface Shows the interface on which multicast router information is being displayed.
Multicast Router Indicates whether multicast router is statically enabled on the interface.
Attached
VLAN ID Displays the list of VLANs of which the interface is a member.
Parameter Description
Interface Shows the interface on which multicast router information is being displayed.
VLAN ID Displays the list of VLANs of which the interface is a member.
Parameter Description
VLAN The VLAN on which the entry is learned.
Group The IPv6 multicast group address.
Source The IPv6 source address.
Source Filter Mode The source filter mode (Include/Exclude) for the specified group.
Interfaces 1. If Source Filter Mode is “Include,” specifies the list of interfaces on which a incoming packet is forwarded. If
it’s source IP address is equal to the current entry’s Source, the destination IP address is equal to the current
entry’s Group and the VLAN ID on which it arrived is current entry’s VLAN.
2. If Source Filter Mode is “Exclude,” specifies the list of interfaces on which a incoming packet is forwarded. If
it’s source IP address is not equal to the current entry’s Source, the destination IP address is equal to current
entry’s Group and VLAN ID on which it arrived is current entry’s VLAN.
Parameter Description
Total Entries The total number of entries that can possibly be in the MLD snooping’s SSMFDB.
Most SSMFDB Entries The largest number of entries that have been present in the MLD snooping’s SSMFDB.
Ever Used
Current Entries The current number of entries in the MLD snooping’s SSMFDB.
Parameter Description
VLAN VLAN on which the MLD v2 report is received.
Group The IPv6 multicast group address.
Interface The interface on which the MLD v2 report is received.
Reporter The IPv6 address of the host that sent the MLDv2 report.
Source Filter Mode The source filter mode (Include/Exclude) for the specified group.
Source Address List List of source IP addresses for which source filtering is requested.
Parameter Description
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A multicast MAC address for which the switch has forwarding or filtering information. The format is six 2-digit
hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Type The type of entry, which is either static (added by the user) or dynamic (added to the table as a result of a learning
process or protocol.)
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
This section describes the commands you use to configure and display information on MLD Snooping queries on the network
and, separately, on VLANs.
NOTE: This note clarifies the prioritization of MGMD Snooping Configurations. Many of the IGMP/MLD Snooping
commands are available both in the Interface and VLAN modes. Operationally the system chooses or prefers the
VLAN configured values over the Interface configured values for most configurations when the interface
participates in the VLAN.
If a VLAN has MLD Snooping Querier enabled and MLD Snooping is operationally disabled on it, MLD Snooping Querier
functionality is disabled on that VLAN. MLD Snooping functionality is reenabled if MLD Snooping is operational on the VLAN.
The MLD Snooping Querier sends periodic general queries on the VLAN to solicit membership reports.
Default disabled
Format set mld querier [vlan-id] [address ipv6_address]
Mode Global Config
VLAN Mode
Default 60 seconds
Format set mld querier query_interval 1-1800
Mode Global Config
Default 60 seconds
Format set mld querier timer expiry 60-300
Mode Global Config
Default disabled
Format set mld querier election participate
Mode VLAN Database
When the optional arguments vlanid are not used, the command displays the following information.
Parameter Description
Admin Mode Indicates whether or not MLD Snooping Querier is active on the switch.
Admin Version Indicates the version of MLD that will be used while sending out the queries. This is defaulted to MLD v1 and it
cannot be changed.
Querier Address Shows the IP address which will be used in the IPv6 header while sending out MLD queries. It can be configured
using the appropriate command.
Query Interval Shows the amount of time in seconds that a Snooping Querier waits before sending out the periodic general
query.
Querier Timeout Displays the amount of time to wait in the Non-Querier operational state before moving to a Querier state.
When you specify a value for vlanid, the following information appears.
Parameter Description
VLAN Admin Mode Indicates whether MLD Snooping Querier is active on the VLAN.
VLAN Operational Indicates whether MLD Snooping Querier is in Querier or Non-Querier state. When the switch is in Querier
State state, it will send out periodic general queries. When in Non-Querier state, it will wait for moving to Querier
state and does not send out any queries.
VLAN Operational Indicates the time to wait before removing a Leave from a host upon receiving a Leave request. This value is
Max Response Time calculated dynamically from the Queries received from the network. If the Snooping Switch is in Querier state,
then it is equal to the configured value.
Querier Election Indicates whether the MLD Snooping Querier participates in querier election if it discovers the presence of a
Participate querier in the VLAN.
Querier VLAN The IP address will be used in the IPv6 header while sending out MLD queries on this VLAN. It can be configured
Address using the appropriate command.
Operational Version This version of IPv6 will be used while sending out MLD queriers on this VLAN.
Last Querier Address Indicates the IP address of the most recent Querier from which a Query was received.
Last Querier Version Indicates the MLD version of the most recent Querier from which a Query was received on this VLAN.
When the optional argument detail is used, the command shows the global information and the information for all
Querier-enabled VLANs.
NOTE: To enable the SNMP trap specific to port security, see the snmp-server enable traps violation command.
5.31.1 port-security
This command enables port locking on an interface, a range of interfaces, or at the system level.
Default disabled
Format port-security
Mode Global Config (to enable port locking globally)
Interface Config (to enable port locking on an interface or range of interfaces)
5.31.1.0.1 no port-security
This command disables port locking for one (Interface Config) or all (Global Config) ports.
Format no port-security
Mode Global Config
Interface Config
Default 5
Format port-security aging time minutes
Mode Interface Config
Sticky addresses that are dynamically learned will appear in show running-config as port-security mac-address
sticky <mac-address> <vid> entries. This distinguishes them from static entries.
If VLAN and port MAC locking are enabled, VLAN MAC locking will be given precedence over port MAC locking.
Default disabled
Format mac-address-table limit [action shutdown] [notification trap ] [maximum-num] [vlan
vlan-id]
Mode Global Config
Parameter Description
[action shutdown] After the MAC limit has been reached, the action will shut down the ports participating in the VLAN.
[notification trap] Enables snmp-server enable traps violation on the ports participating in the VLAN.
After the MAC limit has been reached, log message will be generated with the violation MAC address
details.
[maximum-num] MAC limit to be configured.
[vlan vlan] VLAN on which the MAC limit is to be applied.
NOTE: Packets on all other VLAN will be discarded.
Default disabled
Format no mac-address-table limit [action shutdown] [notification trap ] [maximum-num] [vlan
vlan-id]
Mode Global Config
Parameter Description
Admin Mode Port Locking mode for the entire system. This field displays if you do not supply any parameters.
For each interface, or for the interface you specify, the following information appears.
Parameter Description
Admin Mode Port Locking mode for the Interface.
Dynamic Limit Maximum dynamically allocated MAC addresses.
Static Limit Maximum statically allocated MAC addresses.
Violation Trap Mode Whether violation traps are enabled.
Sticky Mode The administrative mode of the port security Sticky Mode feature on the interface.
Aging Time The aging time in minutes configured on the port. See Section 5.31.2, port-security aging time.
Example: The following shows example CLI display output for the command.
(Routing) #show port-security 0/1
Parameter Description
MAC Address MAC Address of dynamically locked MAC.
Parameter Description
Statically Configured MAC Address The statically configured MAC address.
VLAN ID The ID of the VLAN that includes the host with the specified MAC address.
Sticky Indicates whether the static MAC address entry is added in sticky mode.
Example: The following shows example CLI display output for the command.
(Routing) #show port-security static 0/1
Parameter Description
MAC Address The source MAC address of the last frame that was discarded at a locked port.
VLAN ID The VLAN ID, if applicable, associated with the MAC address of the last frame that was discarded at a locked port.
Parameter Description
vlan-ID The VLAN ID on which MAC locking has been configured.
Example:
(Routing) #show mac-address-table limit
For Vlan 10
Configured mac limit 3
Operational mac limit 3
Violation trap mode Enabled
Violation shutdown mode Disabled
For Vlan 20
Configured mac limit 3
Operational mac limit 3
Violation trap mode Enabled
Violation shutdown mode Disabled
For Vlan 10
Configured mac limit 3
Operational mac limit 3
Default disabled
Format lldp notification
Default disabled
Format no lldp notification
Mode Interface Config
Default 5
Format lldp notification-interval interval
Mode Global Config
Default mac-address
Format lldp portid-subtype [interface-name | mac-address]
Mode Interface Config
Parameter Description
interface-name Configures LLDP port-id-subtype as interface-name.
mac-address Configures LLDP port-id-subtype as MAC-address.
Parameter Description
Transmit Interval How frequently the system transmits local data LLDPDUs, in seconds.
Transmit Hold The multiplier on the transmit interval that sets the TTL in local data LLDPDUs.
Multiplier
Re-initialization Delay The delay before reinitialization, in seconds.
Notification Interval How frequently the system sends remote data change notifications, in seconds.
Parameter Description
Interface The interface in a slot/port format.
Link Shows whether the link is up or down.
Transmit Shows whether the interface transmits LLDPDUs.
Receive Shows whether the interface receives LLDPDUs.
Notify Shows whether the interface sends remote data change notifications.
TLVs Shows whether the interface sends optional TLVs in the LLDPDUs. The TLV codes can be 0 (Port Description),
1 (System Name), 2 (System Description), or 3 (System Capability).
Mgmt Shows whether the interface transmits system management address information in the LLDPDUs.
Parameter Description
Last Update The amount of time since the last update to the remote table in days, hours, minutes, and seconds.
Total Inserts Total number of inserts to the remote data table.
Total Deletes Total number of deletes from the remote data table.
Total Drops Total number of times the complete remote data received was not inserted due to insufficient resources.
Total Ageouts Total number of times a complete remote data entry was deleted because the Time to Live interval expired.
Parameter Description
Interface The interface in slot/port format.
TX Total Total number of LLDP packets transmitted on the port.
RX Total Total number of LLDP packets received on the port.
Discards Total number of LLDP frames discarded on the port for any reason.
Errors The number of invalid LLDP frames received on the port.
Ageouts Total number of times a complete remote data entry was deleted for the port because the Time to Live interval
expired.
TVL Discards The number of TLVs discarded.
TVL Unknowns Total number of LLDP TLVs received on the port where the type value is in the reserved range, and not
recognized.
TLV MED The total number of LLDP-MED TLVs received on the interface.
TLV 802.1 The total number of LLDP TLVs received on the interface which are of type 802.1.
TLV 802.3 The total number of LLDP TLVs received on the interface which are of type 802.3.
Parameter Description
Local Interface The interface that received the LLDPDU from the remote device.
RemID An internal identifier to the switch to mark each remote device to the system.
Chassis ID The ID that is sent by a remote device as part of the LLDP message, it is usually a MAC address of the device.
Port ID The port number that transmitted the LLDPDU.
Parameter Description
System Name The system name of the remote device.
Example: The following shows example CLI display output for the command.
(Switching) #show lldp remote-device all
Local
Interface RemID Chassis ID Port ID System Name
------- ------- -------------------- ------------------ ------------------
0/1
0/2
0/3
0/4
0/5
0/6
0/7 2 00:FC:E3:90:01:0F 00:FC:E3:90:01:11
0/7 3 00:FC:E3:90:01:0F 00:FC:E3:90:01:12
0/7 4 00:FC:E3:90:01:0F 00:FC:E3:90:01:13
0/7 5 00:FC:E3:90:01:0F 00:FC:E3:90:01:14
0/7 1 00:FC:E3:90:01:0F 00:FC:E3:90:03:11
0/7 6 00:FC:E3:90:01:0F 00:FC:E3:90:04:11
0/8
0/9
0/10
0/11
0/12
--More-- or (q)uit
Parameter Description
Local Interface The interface that received the LLDPDU from the remote device.
Remote Identifier An internal identifier to the switch to mark each remote device to the system.
Chassis ID Subtype The type of identification used in the Chassis ID field.
Chassis ID The chassis of the remote device.
Port ID Subtype The type of port on the remote device.
Port ID The port number that transmitted the LLDPDU.
System Name The system name of the remote device.
System Description Describes the remote system by identifying the system name and versions of hardware, operating
system, and networking software supported in the device.
Port Description Describes the port in an alphanumeric format. The port description is configurable.
System Capabilities Supported Indicates the primary functions of the device.
Parameter Description
System Capabilities Enabled Shows which of the supported system capabilities are enabled.
Management Address For each interface on the remote device with an LLDP agent, lists the type of address the remote
LLDP agent uses and specifies the address used to obtain information related to the device.
Time To Live The amount of time (in seconds) the remote device's information received in the LLDPDU should be
treated as valid information.
Example: The following shows example CLI display output for the command.
(Switching) #show lldp remote-device detail 0/7
Remote Identifier: 2
Chassis ID Subtype: MAC Address
Chassis ID: 00:FC:E3:90:01:0F
Port ID Subtype: MAC Address
Port ID: 00:FC:E3:90:01:11
System Name:
System Description:
Port Description:
System Capabilities Supported:
System Capabilities Enabled:
Time to Live: 24 seconds
Parameter Description
Interface The interface in a slot/port format.
Port ID The port ID associated with this interface.
Port Description The port description associated with the interface.
Parameter Description
Interface The interface that sends the LLDPDU.
Chassis ID Subtype The type of identification used in the Chassis ID field.
Chassis ID The chassis of the local device.
Port ID Subtype The type of port on the local device.
Port ID The port number that transmitted the LLDPDU.
System Name The system name of the local device.
System Description Describes the local system by identifying the system name and versions of hardware, operating system, and
networking software supported in the device.
Port Description Describes the port in an alphanumeric format.
System Capabilities Indicates the primary functions of the device.
Supported
System Capabilities Shows which of the supported system capabilities are enabled.
Enabled
Management Address The type of address and the specific address the local LLDP agent uses to send and receive information.
Default disabled
Format lldp med
Mode Interface Config
Default disabled
Format lldp med confignotification
Mode Interface Config
Parameter Description
capabilities Transmit the LLDP capabilities TLV.
ex-pd Transmit the LLDP extended PD TLV.
ex-pse Transmit the LLDP extended PSE TLV.
inventory Transmit the LLDP inventory TLV.
location Transmit the LLDP location TLV.
network-policy Transmit the LLDP network policy TLV.
Default 3
Format lldp med faststartrepeatcount [count]
Mode Global Config
Default By default, the capabilities and network policy TLVs are included.
Format lldp med transmit-tlv all [capabilities] [ex-pd] [ex-pse] [inventory] [location]
[network-policy]
Mode Global Config
Parameter Description
capabilities Transmit the LLDP capabilities TLV.
ex-pd Transmit the LLDP extended PD TLV.
ex-pse Transmit the LLDP extended PSE TLV.
inventory Transmit the LLDP inventory TLV.
location Transmit the LLDP location TLV.
network-policy Transmit the LLDP network policy TLV.
Example: The following shows example CLI display output for the command.
(Routing) #show lldp med
LLDP MED Global Configuration
(Routing) #
Example: The following shows example CLI display output for the command.
(Routing) #show lldp med interface all
(Routing) #
Example: The following shows example CLI display output for the command.
(Routing) #show lldp med local-device detail 0/8
LLDP MED Local Device Detail
Interface: 0/8
Network Policies
Media Policy Application Type : voice
Vlan ID: 10
Priority: 5
DSCP: 1
Unknown: False
Tagged: True
Inventory
Hardware Rev: xxx xxx xxx
Firmware Rev: xxx xxx xxx
Software Rev: xxx xxx xxx
Serial Num: xxx xxx xxx
Mfg Name: xxx xxx xxx
Model Name: xxx xxx xxx
Asset ID: xxx xxx xxx
Location
Subtype: elin
Info: xxx xxx xxx
Extended POE
Device Type: pseDevice
Extended POE PD
Parameter Description
Local Interface The interface that received the LLDPDU from the remote device.
Remote ID An internal identifier to the switch to mark each remote device to the system.
Device Class Device classification of the remote device.
Example: The following shows example CLI display output for the command.
(Routing) #show lldp med remote-device all
Local
Interface Remote ID Device Class
--------- --------- ------------
0/8 1 Class I
0/9 2 Not Defined
0/10 3 Class II
0/11 4 Class III
0/12 5 Network Con
Example: The following shows example CLI display output for the command.
(Routing) #show lldp med remote-device detail 0/8
Network Policies
Media Policy Application Type : voice
Vlan ID: 10
Priority: 5
DSCP: 1
Unknown: False
Tagged: True
Tagged: True
Inventory
Hardware Rev: xxx xxx xxx
Firmware Rev: xxx xxx xxx
Software Rev: xxx xxx xxx
Serial Num: xxx xxx xxx
Mfg Name: xxx xxx xxx
Model Name: xxx xxx xxx
Asset ID: xxx xxx xxx
Location
Subtype: elin
Info: xxx xxx xxx
Extended POE
Device Type: pseDevice
Extended POE PD
This section describes the commands you use to configure Denial of Service (DoS) Control. EFOS software provides
support for classifying and blocking specific types of Denial of Service attacks. You can configure your system to monitor
and block these types of attacks:
SIP = DIP: Source IP address = Destination IP address.
TCP Fragment: Allows the device to drop packets that have a TCP payload where the IP payload length minus the IP
header size is less than the minimum allowed TCP header size.
TCP Flag: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence Number = 0 or
TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set.
L4 Port: Source TCP/UDP Port = Destination TCP/UDP Port.
NOTE: Monitoring and blocking of the types of attacks in the following list are only supported on the BCM56538,
BCM56840, BCM56843, BCM56845, BCM56846, and BCM5685x platforms.
SMAC = DMAC: Source MAC address = Destination MAC address.
TCP Port: Source TCP Port = Destination TCP Port.
UDP Port: Source UDP Port = Destination UDP Port.
TCP Flag and Sequence: TCP Flag SYN set and Source Port < 1024 or TCP Control Flags = 0 and TCP Sequence
Number = 0 or TCP Flags FIN, URG, and PSH set and TCP Sequence Number = 0 or TCP Flags SYN and FIN set.
TCP Offset: Allows the device to drop packets that have a TCP header Offset set to 1.
TCP SYN: TCP Flag SYN set.
TCP SYN and FIN: TCP Flags SYN and FIN set.
TCP FIN and URG and PSH: TCP Flags FIN and URG and PSH set and TCP Sequence Number = 0.
ICMP V6: Limiting the size of ICMPv6 Ping packets.
ICMP Fragment: Checks for fragmented ICMP packets.
Default disabled
Format dos-control all
Mode Global Config
Default disabled
Format dos-control sipdip
Mode Global Config
Default disabled
Format dos-control tcpfrag
Mode Global Config
The TCP Flags FIN, URG, and PSH are set and the TCP Sequence Number is set to 0.
Default disabled
Format dos-control tcpflag
Mode Global Config
Default disabled
Format dos-control l4port
Mode Global Config
Default disabled
Format dos-control port-ddisable
Mode Global Config
This command enables Source MAC address = Destination MAC address (SMAC = DMAC) Denial of Service protection. If
the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with SMAC = DMAC,
the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control smacdmac
Mode Global Config
This command enables TCP L4 source = destination port number (Source TCP Port = Destination TCP Port) Denial of
Service protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress
with Source TCP Port = Destination TCP Port, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpport
Mode Global Config
This command enables UDP L4 source = destination port number (Source UDP Port = Destination UDP Port) DoS
protection. If the mode is enabled, Denial of Service prevention is active for this type of attack. If packets ingress with Source
UDP Port = Destination UDP Port, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control udpport
Mode Global Config
This command enables TCP Flag and Sequence Denial of Service protections. If the mode is enabled, Denial of Service
prevention is active for this type of attack and packets will be dropped if the TCP Control Flags are set to 0 and the TCP
Sequence Number is set to 0.
Default disabled
Format dos-control tcpflagseq
Mode Global Config
This command enables TCP Offset Denial of Service protection. If the mode is enabled, Denial of Service prevention is
active for this type of attack. If packets ingress having TCP Header Offset equal to one (1), the packets will be dropped if the
mode is enabled.
Default disabled
Format dos-control tcpoffset
Mode Global Config
This command enables TCP SYN and L4 source = 0 to 1023 Denial of Service protection. If the mode is enabled, Denial of
Service prevention is active for this type of attack. If packets ingress having TCP flag SYN set and an L4 source port from 0
to 1023, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpsyn
Mode Global Config
This command enables TCP SYN and FIN Denial of Service protection. If the mode is enabled, Denial of Service prevention
is active for this type of attack. If packets ingress having TCP flags SYN and FIN set, the packets will be dropped if the mode
is enabled.
Default disabled
Format dos-control tcpsynfin
Mode Global Config
This command enables TCP FIN and URG and PSH and SEQ = 0 checking Denial of Service protections. If the mode is
enabled, Denial of Service prevention is active for this type of attack. If packets ingress having TCP FIN, URG, and PSH all
set and TCP Sequence Number set to 0, the packets will be dropped if the mode is enabled.
Default disabled
Format dos-control tcpfinurgpsh
Mode Global Config
This command enables Maximum ICMPv4 Packet Size Denial of Service protections. If the mode is enabled, Denial of
Service prevention is active for this type of attack. If ICMPv4 Echo Request (ping) packets ingress having a size greater than
the configured value, the packets will be dropped if the mode is enabled.
This command enables Maximum ICMPv6 Packet Size Denial of Service protections. If the mode is enabled, Denial of
Service prevention is active for this type of attack. If ICMPv6 Echo Request (ping) packets ingress having a size greater than
the configured value, the packets will be dropped if the mode is enabled.
This command enables ICMP Fragment Denial of Service protection. If the mode is enabled, Denial of Service prevention
is active for this type of attack. If packets ingress having fragmented ICMP packets, the packets will be dropped if the mode
is enabled.
Default disabled
Format dos-control icmpfrag
Mode Global Config
Default disabled
Format dos-control vlan0tagged-snap
Mode Global Config
NOTE: Some of the information in the following table displays only if you are using the BCM56538, BCM56840,
BCM56843, BCM56845, BCM56846, and BCM5685x platforms.
Parameter Description
Port D-disable Mode May be enabled or disabled. The factory default is disabled.
First Fragment Mode May be enabled or disabled. The factory default is disabled.
Min TCP Hdr Size The minimum TCP header size the switch will accept if First Fragment DoS prevention
is enabled. The range is 0 to 255. The factory default is 20.
ICMP Mode The administrative mode of ICMP DoS prevention. When enabled, this causes the
switch to drop ICMP packets that have a type set to ECHO_REQ (ping) and a size
greater than the configured ICMP Payload Size. May be enabled or disabled. The
factory default is disabled.
Parameter Description
Max ICMP Pkt Size The range is 0 to 1023. The factory default is 512.
Max ICMPv4 Pkt Size The range is 0 to 16376. The factory default is 512.
Max ICMPv6 Pkt Size The range is 0 to 16376. The factory default is 512.
ICMP Fragment Mode May be enabled or disabled. The factory default is disabled.
L4 Port Mode May be enabled or disabled. The factory default is disabled.
TCP Port Mode May be enabled or disabled. The factory default is disabled.
UDP Port Mode May be enabled or disabled. The factory default is disabled.
SIPDIP Mode May be enabled or disabled. The factory default is disabled.
SMACDMAC Mode May be enabled or disabled. The factory default is disabled.
TCP Flag Mode May be enabled or disabled. The factory default is disabled.
TCP FIN and URG and PSH Mode May be enabled or disabled. The factory default is disabled.
TCP Flag and Sequence Mode The administrative mode of TCP Flag DoS prevention. Enabling this causes the switch
to drop packets that have TCP control flags set to 0 and TCP sequence number set to
0. The factory default is disabled.
TCP SYN Mode May be enabled or disabled. The factory default is disabled.
TCP SYN and FIN Mode May be enabled or disabled. The factory default is disabled.
TCP Fragment Mode The administrative mode of TCP Fragment DoS prevention. Enabling this causes the
switch to drop packets that have a TCP payload in which the IP payload length minus
the IP header size is less than the minimum allowed TCP header size. The factory
default is disabled.
TCP Offset Mode May be enabled or disabled. The factory default is disabled.
Stacked VLAN0 Tag Drop Mode May be enabled or disabled. The factory default is disabled.
Default 300
Format bridge aging-time 10-1,000,000
Mode Global Config
Default all
Format show forwardingdb agetime
Mode Privileged EXEC
Parameter Description
Address Aging Displays the system's address aging timeout value in seconds.
Timeout
Parameter Description
VLAN ID The VLAN in which the MAC address is learned.
MAC Address A multicast MAC address for which the switch has forwarding or filtering information. The format is six 2-digit
hexadecimal numbers that are separated by colons, for example 01:23:45:67:89:AB.
Parameter Description
Source The component that is responsible for this entry in the Multicast Forwarding Database. The source can be IGMP
Snooping, GMRP, and Static Filtering.
Type The type of the entry. Static entries are those that are configured by the end user. Dynamic entries are added to
the table as a result of a learning process or protocol.
Description The text description of this multicast table entry.
Interfaces The list of interfaces that are designated for forwarding (Fwd:) and filtering (Flt:).
Fwd Interface The resultant forwarding list is derived from combining all the component’s forwarding interfaces and removing
the interfaces that are listed as the static filtering interfaces.
Example: If one or more entries exist in the multicast forwarding table, the command output looks similar to the following.
(Routing) #show mac-address-table multicast
Fwd
VLAN ID MAC Address Source Type Description Interface Interface
------- ----------------- ------- ------- --------------- --------- ---------
1 01:00:5E:01:02:03 Filter Static Mgmt Config Fwd: Fwd:
1/0/1, 1/0/1,
1/0/2, 1/0/2,
1/0/3, 1/0/3,
1/0/4, 1/0/4,
1/0/5, 1/0/5,
1/0/6, 1/0/6,
1/0/7, 1/0/7,
1/0/8, 1/0/8,
1/0/9, 1/0/9,
1/0/10, 1/0/10,
--More-- or (q)uit
Parameter Description
Total Entries The total number of entries that can possibly be in the Multicast Forwarding Database table.
Most MFDB Entries The largest number of entries that have been present in the Multicast Forwarding Database table. This value is
Ever Used also known as the MFDB high-water mark.
Current Entries The current number of entries in the MFDB.
Default enabled
Format isdp run
Mode Global Config
NOTE: ISDP must be enabled both globally and on the interface for the interface to transmit ISDP packets. If ISDP is
globally disabled on the switch, the interface will not transmit ISDP packets, regardless of the ISDP status on the
interface. To enable ISDP globally, use the command isdp run.
Default enabled
Format isdp enable
Mode Interface Config
Parameter Description
Timer The frequency with which this device sends ISDP packets. This value is given in seconds.
Hold Time The length of time the receiving device should save information sent by this device. This value is given in
seconds.
ISDPv2 The setting for sending ISDPv2 packets. If disabled, version 1 packets are transmitted.
Advertisements
Device ID The Device ID advertised by this device. The format of this Device ID is characterized by the value of the Device
ID Format object.
Device ID Format Indicates the Device ID format capability of the device.
Capability serialNumber indicates that the device uses a serial number as the format for its Device ID.
macAddress indicates that the device uses a Layer 2 MAC address as the format for its Device ID.
other indicates that the device uses its platform-specific format as the format for its Device ID.
Parameter Description
Mode ISDP mode enabled/disabled status for the interfaces.
Parameter Description
Device ID The device ID associated with the neighbor which advertised the information.
IP Addresses The IP address(es) associated with the neighbor.
Platform The hardware platform advertised by the neighbor.
Interface The interface (slot/port) on which the neighbor's advertisement was received.
Port ID The port ID of the interface from which the neighbor sent the advertisement.
Hold Time The holdtime advertised by the neighbor.
Version The software version that the neighbor is running.
Advertisement Version The version of the advertisement packet received from the neighbor.
Capability ISDP Functional Capabilities advertised by the neighbor.
Parameter Description
Device ID The device ID associated with the neighbor which advertised the information.
IP Address(es) The IP addresses associated with the neighbor.
Capability ISDP functional capabilities advertised by the neighbor.
Platform The hardware platform advertised by the neighbor.
Interface The interface (slot/port) on which the neighbor's advertisement was received.
Port ID The port ID of the interface from which the neighbor sent the advertisement.
Hold Time The holdtime advertised by the neighbor.
Advertisement Version The version of the advertisement packet received from the neighbor.
Time when last Displays when the entry was last modified.
changed
Version The software version that the neighbor is running.
Example: The following shows example CLI display output for the command.
(Switching) #show isdp neighbors detail
Device ID none
Address(es):
Capability Router
Platform BCM-56846
Interface 0/33
Port ID 0/37
Holdtime 180
Advertisement Version 2
Time when last changed 2 days 05:47:33
Version :
1.2.0.3
Parameter Description
ISDP Packets Received Total number of ISDP packets received
ISDP Packets Transmitted Total number of ISDP packets transmitted
Parameter Description
ISDPv1 Packets Received Total number of ISDPv1 packets received
ISDPv1 Packets Transmitted Total number of ISDPv1 packets transmitted
ISDPv2 Packets Received Total number of ISDPv2 packets received
ISDPv2 Packets Transmitted Total number of ISDPv2 packets transmitted
ISDP Bad Header Number of packets received with a bad header
ISDP Checksum Error Number of packets received with a checksum error
ISDP Transmission Failure Number of packets which failed to transmit
ISDP Invalid Format Number of invalid packets received
ISDP Table Full Number of times a neighbor entry was not added to the table due to a full database
ISDP IP Address Table Full Displays the number of times a neighbor entry was added to the table without an IP address.
The purpose of the UDLD feature is to detect and avoid unidirectional links. A unidirectional link is a forwarding anomaly in
a Layer 2 communication channel in which a bi-directional link stops passing traffic in one direction.
Default disable
Format udld enable
Mode Global Config
Default 15
Format udld message time interval
Mode Global Config
Default 5
Format udld timeout interval interval
Mode Global Config
Default disable
Default normal
Format udld port [aggressive]
Mode Interface Config
Parameter Description
Admin Mode The global administrative mode of UDLD.
Message Interval The time period (in seconds) between the transmission of UDLD probe packets.
Timeout Interval The time period (in seconds) before making the decision that the link is unidirectional.
Example: The following shows example CLI display output for the command.
(Routing) #show udld
Admin Mode........................Enabled
Message Interval..................15 seconds
Timeout Interval...................5 seconds
Parameter Description
Port The identifying port of the interface.
Admin Mode The administrative mode of UDLD configured on this interface. The mode is either Enabled or Disabled.
UDLD Mode The UDLD mode configured on this interface. The mode is either Normal or Aggressive.
UDLD Status The status of the link as determined by UDLD. The options are:
Undetermined – UDLD has not collected enough information to determine the state of the link
Not applicable – UDLD is disabled, either globally or on the port.
Shutdown – UDLD has detected a unidirectional link and shutdown the port. That is, the port is in an
errDisabled state.
Bidirectional – UDLD has detected a bidirectional link.
Undetermined (Link Down) – The port would transition into this state when the port link physically goes down
due to any reasons other than the port has been put into D-Disable mode by the UDLD protocol on the switch.
Example: The following shows example CLI display output for the command.
(Routing) #show udld 0/2
Port Admin UDLD UDLD
Port Mode Mode Status
---- --------- ---- ------
0/2 Enabled AggressiveBidirectional
Default disabled
Format link-flap d-disable
Mode Global Config
Default 10 seconds
Format link-flap d-disable duration duration
Mode Global Config
Default 5
Format link-flap d-disable max-count count
Mode Global Config
Parameter Description
Admin State Specifies whether the link-flap feature is enabled or disabled.
Duration Specifies the duration in seconds.
Max-Count Specifies the max-count of link-flaps.
Example:
(Routing) #show link-flap d-disable
For interface error disable and auto recovery, an error condition is detected for an interface, the interface is placed in a
diagnostic disabled state by shutting down the interface. The error disabled interface does not allow any traffic until the
interface is reenabled. The error disabled interface can be manually enabled. Alternatively administrator can enable auto
recovery feature. EFOS Auto Recovery reenables the interface after the expiry of configured time interval.
Default none
Format errdisable recovery cause {all | arp-inspection | bpduguard | dhcp-rate-limit |
sfp-mismatch | udld | ucast-storm | bcast-storm | mcast-storm | bpdustorm | keep-alive
| mac-locking | denial-of-service | link-flap}
Mode Global Config
Default 300
Format errdisable recovery interval 30-86400
Mode Global Config
Parameter Description
arp-inspection Enable/disable status of arp-inspection auto recovery.
bpdguard Enable/disable status of bpduguard auto recovery.
dhcp-rate-limit Enable/disable status of dhcp-rate-limit auto recovery.
sfp-mismatch Enable/disable status of sfp-mismatch auto recovery.
udld Enable/disable status of UDLD auto recovery.
bpdustorm Enable/disable status of bpdustorm auto recovery.
keepalive Enable/disable status of keepalive auto recovery.
mac-locking Enable/disable status of MAC locking auto recovery.
denial-of-service Enable/disable status of DoS auto recovery.
link-flap Enable/disable status of link-flap auto recovery.
time interval Time interval for auto recovery in seconds.
Example:
(Routing) #show errdisable recovery
Parameter Description
interface An interface that is error disabled.
Errdisable Reason The cause of the interface being error disabled.
Auto-Recovery Time The amount of time left before auto recovery begins.
Left
Example:
(Routing) #show interfaces status err-disabled
The DHCP Snooping feature (see Section 5.25, DHCP Snooping Configuration Commands) already provides mapping from
host IP address to physical port on L2 switch, for the IP address acquired using DHCP. But DHCP Snooping cannot track
the statically configured hosts, nor can it detect the movement of the hosts in a VLAN.
The IPv4 Device Tracking feature snoops the ARP packets exchanged in a VLAN and populates the tracking table with the
information like {IP address, MAC address, VLAN, Interface} for each host.
Default inactive
Format ip device tracking
Mode Global Config
Default active
Format ip device tracking probe
Mode Global Config
Default 30 seconds
Parameter Description
seconds The minimum time between two ARP probes for each entry in the IPv4 Device Tracking database in seconds.
The range is 30 to 300 seconds.
Default 3
Format ip device tracking probe count number
Mode Global Config
Parameter Description
number The number of ARP probes sent without responses from the client. The range is 1 to 255.
Default 30 seconds
Format ip device tracking probe delay seconds
Mode Global Config
Parameter Description
seconds The minimum delay to send the first ARP probe for each entry in the IPv4 Device Tracking database in seconds
whenever the entry’s associated port is moved from non-forwarding state to forwarding state. The range is 1 to
120 seconds.
Default The source IP address in the probe packet for non-routing interfaces is set to 0.0.0.0 address.
Format ip device tracking probe auto-source fallback host-ip mask override
Mode Global Config
Parameter Description
host-ip An IPv4 host in dotted notation (for example, 0.0.0.1).
mask An IPv4 host used for the destination IP of the IPv4DT entries in dotted notation (for example, 255.255.0.0).
Example: The following example sets the source ip address in the probe packet for non-routing interfaces.
(Switching)(Config)# ip device tracking probe auto-source fallback 0.0.0.1 255.255.255.0 override
If the probe entry is for a host IP address 10.5.5.20, then an ARP probe with source address 10.5.5.1 is generated.
Default no limit
Format ip device tracking maximum number
Mode Interface Config
Parameter Description
number The number of entries learned on an interface by IPv4DT. The range is 0 to 10.
Format clear ip device tracking {all | interface if-name | ip ipv4-address | mac mac-address}
Mode Privileged EXEC
Parameter Description
all Clears the entire IPv4DT table.
if-name Clears the entries learned on a specified interface.
ipv4-address Clears the entries matching the host IPv4 address.
mac-address Clears the entries matching the mac address.
Parameter Description
active (Optional) Displays only the ACTIVE status entries.
inactive (Optional) Displays only the INACTIVE status entries.
Parameter Description
IP Address The learned IPv4 address of the device.
MAC Address The MAC address associated with the learned IPv4 address.
VLAN The VLAN ID associated with an interface on which the device is learned.
Interface The interface name on which the device is learned.
Time left to inactive The number of seconds before the reachable device is set to INACTIVE.
Time since inactive The number of seconds since the INACTIVE device was last reachable.
State Specifies the device is in ACTIVE or INACTIVE state.
Parameter Description
Source Specifies the source of the device whether it is ARP, DHCP, or Static.
Example: The following shows example CLI display output for the command.
(Switching) #show ip device tracking all
Enabled interfaces:
1/0/1
Example: The following shows example CLI display output for the command.
(Switching) #show ip device tracking all count
Parameter Description
if-name Interface name.
Parameter Description
IP Address The learned IPv4 address of the device.
MAC Address The MAC address associated with the learned IPv4 address.
VLAN The VLAN ID associated with an interface on which the device is learned.
Interface The interface name on which the device is learned.
Time left to inactive The number of seconds before the reachable device is set to INACTIVE.
Time since inactive The number of seconds since the INACTIVE device was last reachable.
State Specifies the device is in ACTIVE or INACTIVE state.
Source Specifies the source of the device whether it is ARP, DHCP, or Static.
Example: The following shows example CLI display output for the command.
(Switching) #show ip device tracking interface Gi1/0/1
Parameter Description
ipv4-address IPv4 address of the device.
Parameter Description
IP Address The learned IPv4 address of the device.
MAC Address The MAC address associated with the learned IPv4 address.
VLAN The VLAN ID associated with an interface on which the device is learned.
Interface The interface name on which the device is learned.
Time left to inactive The number of seconds before the reachable device is set to INACTIVE.
Parameter Description
Time since inactive The number of seconds since the INACTIVE device was last reachable.
State Specifies the device is in ACTIVE or INACTIVE state.
Source Specifies the source of the device whether it is ARP, DHCP, or Static.
Example: The following shows example CLI display output for the command.
(Switching) #show ip device tracking ip 10.21.1.1
Parameter Description
mac-address MAC address of the device.
Parameter Description
IP Address The learned IPv4 address of the device.
MAC Address The MAC address associated with the learned IPv4 address.
VLAN The VLAN ID associated with an interface on which the device is learned.
Interface The interface name on which the device is learned.
Time left to inactive The number of seconds before the reachable device is set to INACTIVE.
Time since inactive The number of seconds since the INACTIVE device was last reachable.
State Specifies the device is in ACTIVE or INACTIVE state.
Source Specifies the source of the device whether it is ARP, DHCP, or Static.
Example: The following shows example CLI display output for the command.
(Switching) #show ip device tracking mac 01:02:03:04:05:06
Default enabled
Format debug ipdt logging
Mode Privileged EXEC
Default Disabled
Format auto-camera
Mode Global Config
5.41.1.0.1 no auto-camera
Use the no form of the command to disable the auto camera VLAN feature in the system.
Format no auto-camera
Mode Global Config
Default none
Format auto-camera oui <oui-prefix> oui-desc <string>
Mode Global Config
Parameter Description
oui-prefix OUI is specified in three octet values with colons and each octet is represented by two hexadecimal digits.
string A description of OUI that indicates the manufacturer or vendor.
Default none
Format auto-camera vlan <vlan-id>
Mode Global Config
Default Disabled
Format auto-wifi
Mode Global Config
5.41.5.0.1 no auto-wifi
Use the no form of the command to disable the auto Wi-Fi VLAN feature in the system.
Format no auto-wifi
Mode Global Config
Default none
Format auto-wifi oui <oui-prefix> oui-desc <string>
Mode Global Config
Parameter Description
oui-prefix OUI is specified in three octet values with colons and each octet is represented by two hexadecimal digits.
string A description of OUI that indicates the manufacturer or vendor.
Default none
Format auto-wifi vlan <vlan-id>
Mode Global Config
Default Disabled
Format auto-camera
Mode Interface Config
5.41.9.0.1 no auto-camera
Use the no form of the command to disable the auto camera VLAN feature on a specific interface.
Format no auto-camera
Mode Interface Config
Default Disabled
Format auto-wifi
Mode Interface Config
Format no auto-wifi
Mode Interface Config
Example: The following shows example CLI display output for the command.
(Routing)# show auto-camera
Example: The following shows example CLI display output for the command.
(Routing)# show auto-camera interface 1/0/2
Interface Auto camera mode Operational status
--------- ---------------- ------------------
1/0/2 Disabled Down
Example: The following shows example CLI display output for the command.
(Routing)# show auto-camera interface all
Interface Auto camera mode Operational status
--------- ---------------- ------------------
1/0/1 Disabled Down
1/0/2 Disabled Down
1/0/3 Disabled Down
1/0/4 Disabled Down
1/0/5 Disabled Down
1/0/6 Disabled Down
1/0/7 Disabled Down
1/0/8 Disabled Down
Default none
Format show auto-camera oui-table
Mode User EXEC
Example: The following shows example CLI display output for the command.
(Routing)# show auto-camera oui-table
Camera OUI Description
------------- -----------
44:47:CC HIKVISION
B8:A4:4F AXIS
E0:50:8B DAHUA
E4:30:22 HANWHA TECHWIN
FC:D6:BD BOSCH
Example: The following shows example CLI display output for the command.
(Routing)# show auto-wifi
Auto wifi status............................. Disabled
Auto wifi VLAN ID............................ 0
Priority..................................... 7
Number of wifi channels detected............. 0
Example: The following shows example CLI display output for the command.
(Routing)# show auto-wifi interface 1/0/2
Interface Auto wifi mode Operational status
--------- ---------------- ------------------
1/0/2 Disabled Down
Example: The following shows example CLI display output for the command.
(Routing)# show auto-wifi interface all
Interface Auto wifi mode Operational status
--------- ---------------- ------------------
1/0/1 Disabled Down
1/0/2 Disabled Down
1/0/3 Disabled Down
1/0/4 Disabled Down
1/0/5 Disabled Down
1/0/6 Disabled Down
1/0/7 Disabled Down
1/0/8 Disabled Down
Example: The following shows example CLI display output for the command.
(Routing)# show auto-wifi oui-table
Camera OUI Description
------------- -----------
FC:D7:33 TP-LINK
F8:73:94 NETGEAR
FC:75:16 D-LINK
FC:C2:33 ASUS
Example: The following shows example CLI display output for the command.
(Routing)# show auto-vlan interface all
MAC Address Auto VLAN type Interface
----------------- -------------- ---------
B8:A4:4F:11:22:33 Camera 1/0/4
FC:D7:33:44:55:AA Wifi 1/0/3
Example: The following shows example CLI display output for the command.
(Routing)# show auto-vlan interface 1/0/4
MAC Address Auto VLAN type Interface
----------------- -------------- ---------
B8:A4:4F:11:22:33 Camera 1/0/4
Default Disabled
Format debug auto-vlan
Mode Privileged EXEC
In auto mode, the switch will attempt to jump start the exchange by sending an IEEE frame, followed by a CEE frame
followed by a CIN frame. The switch will parse the received response and immediately switch to the peer version.
NOTE: CIN is Cisco Intel Nuova DCBX (version 1.0). CEE is converged enhanced Ethernet DCBX (version 1.06).
Default auto
Format lldp dcbx version { auto | cin | cee | ieee }
Mode Global Config
Parameter Description
auto Automatically select the version based on the peer response.
cin Force the mode to Cisco-Intel-Nuova (DCBX 1.0).
cee Force the mode to CEE (DCBX 1.06).
ieee Force the mode to IEEE 802.1Qaz.
Example: The following example configures the switch to use CEE DCBX.
(Routing)(config)#lldp dcbx version cee
Parameter Description
ets-config Transmit the ETS configuration TLV.
ets-recommend Transmit the ETS recommendation TLV.
pfc Transmit the PFC configuration TLV.
application-priority Transmit the application priority TLV.
Example: The following example configures the port to transmit all TLVs.
(Routing) (Config)#no lldp tlv-select dcbxp
Parameter Description
Manual Ports operating in the Manual role do not have their configuration affected by peer devices or by internal
propagation of configuration. These ports will advertise their configuration to their peer if DCBX is enabled on that
port. The willing bit is set to disabled on manual role ports.
Parameter Description
Auto-up Advertises a configuration, but is also willing to accept a configuration from the link-partner and propagate it
internally to the auto-downstream ports as well as receive configuration propagated internally by other auto-
upstream ports. These ports have the willing bit enabled. These ports should be connected to FCFs.
Auto-down Advertises a configuration but is not willing to accept one from the link partner. However, the port will accept a
configuration propagated internally by the configuration source. These ports have the willing bit set to disabled.
Selection of a port based upon compatibility of the received configuration is suppressed. These ports should be
connected to a trusted FCF.
Configuration Source In this role, the port has been manually selected to be the configuration source. Configuration received over this
port is propagated to the other auto-configuration ports. Selection of a port based upon compatibility of the
received configuration is suppressed. These ports should be connected to a trusted FCF. These ports have the
willing bit enabled.
Parameter Description
all All interfaces.
slot/port A valid physical interface specifier.
Example: The following command shows the TLVs selected for transmission on multiple interfaces.
(Routing) # show lldp tlv-select interface all
Interface ETS Config ETS Recommend PFC App Priority QCN
-------------- ---------- ------------- --- ------------ ---
0/1 Yes No Yes No Yes
0/2 No No Yes No Yes 4.1.3.2
Parameter Description
slot/port A valid physical interface specifier.
all All interfaces.
Detail Display detailed DCBX information.
Status Displays a status summary.
Error counters:
ETS incompatible configuration................. 0
PFC incompatible configuration................. 0
Disappearing neighbor.......................... 0
Multiple neighbors detected.................... 0
Error counters:
Local configuration:
Default disabled
Format qcn enable
Mode Global Config
Parameter Description
dot1p priority The range is 0 to 7.
Parameter Description
cnpv-priority The range is 1 to 7.
The possible selections for a Congestion Point (CP) are:
Interior congestion Used when a flow with the specified dot1p priority needs to be congestion aware. This setting enables detection
point (ICP) of congestion of the selected priority.
Edge congestion point Used when the congestion point (CP) is on the edge of the congestion notification domain (CND).
(ECP)
Disabled for QCN Used when it is desired that the priority be congestion unaware. This setting disables detection of congestion on
the priority.
Use the alternate priority setting to steer away traffic that comes from CN-unaware sources. Traffic from non-congestion
aware sources is remarked when entering the CND domain so that the resources assigned to the congestion-enabled
queues are not exhausted with traffic from QCN unaware sources. Because the frames are coming from non-QCN sources,
they do not have a CN-TAG. If the frames are mapped to the congestion-enabled queue, then they may contribute to the
congestion and, in turn, trigger generation of CNMs. This is not useful to sources that are QCN-unaware.
Parameter Description
cnpv priority The range is 1 to 7.
non-cnpv priority The range of alternate priority is 0 to 7.
Parameter Description
cnpv-priority The range is 1 to 7.
admin scope Is per-priority.
component scope Is per priority level configuration.
enable If cp-creation is enabled, the per-port defense mode choice is set to component.
disable If cp-creation is disabled, the per-port defense mode choice is set to admin.
Default enable
Format qcn cnpv-priority cnpv-priority defense-mode-choice {admin | component}
Mode Interface Config
Parameter Description
cnpv priority The range is 1 to 7.
admin scope Is per-priority.
component scope Is per priority level configuration.
Parameter Description
cnpv-priority The range is 1 to 7.
The possible selections for a Congestion Point (CP) are:
Interior congestion Used when a flow with the specified dot1p priority needs to be congestion aware. This setting enables detection
point (ICP) of congestion of the selected priority.
Edge congestion point Used when the congestion point (CP) is on the edge of the congestion notification domain (CND).
(ECP)
Disabled for QCN Used when it is desired that the priority be congestion unaware. This setting disables detection of congestion on
the priority.
Parameter Description
cnpv-priority The range is 1 to 7.
alternate-priority The range is 0 to 7.
Parameter Description
slot/port If only the interface number is specified, then all the CNM transmit counters on that interface are cleared.
cp-index If only the cp index is specified, then CNM transmit counters for that cp index on all interfaces are cleared.
Parameter Description
priority If only priority is specified, then per-priority configuration is displayed.
all If all is specified, then per priority information for all dot1p priorities is displayed.
slot/port If the interface number is also specified, then the command displays the configuration per-port-priority for the
given priority.
Global configuration:
Per-priority configuration:
Global configuration:
Per-priority configuration:
Example: The following shows example CLI display output for the command.
(Routing) #show qcn priority 1 interface 0/1
Global configuration:
Per-port-priority configuration:
Global configuration:
QCN status: Enabled
CNM transmit priority : 0
Per-port-priority configuration.
Example: The following shows example CLI display output for the command.
(Routing) #show qcn active priority 1
Port Defense Alternate
mode priority
------ ------------ ---------------
0/1 disable 0
0/2 disable 0
0/3 disable 0
0/4 disable 0
0/5 disable 0
0/6 disable 0
0/7 disable 0
0/8 disable 0
0/9 disable 0
--More-- or (q)uit
Example: The following shows example CLI display output for the command.
(Routing) #show qcn interface 0/1 cp-index 1
Interface 0/1
cp-index 1
MAC-Address 00:10:18:00:00:FF
CP-Identifier : 00012610071005
CNM-transmit-Priority 0
Sample-base
Cp-Sizesetpoint
Min-HeaderOctets
Example: The following data is displayed in tabular format as output for this command.
(Routing) #show qcn statistics interface 0/1 cp-index 1
Interface Cp Index CNMs transmitted
0/1 1 1230
ETS is configured with CoS Queuing, which allows you to directly configure certain aspects of the device hardware queuing
to provide the desired Quality of Service (QoS) behavior for different types of network traffic. The priority of a packet arriving
at an interface can be used to steer the packet to the appropriate outbound CoS queue through a mapping table. CoS queue
characteristics such as minimum guaranteed bandwidth, transmission rate shaping, and so on, are user configurable at the
queue (or port) level. For more information about the CoS commands, see Section 12.1, Class of Service Commands.
Parameter Description
trafficclass The Traffic Class can range from 0 to 7, although the actual number of available traffic classes depends on the
platform.
traffic class group The Traffic Class Group can range from 0 to 7, although the actual number of available traffic classes depends
on the platform.
This command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is
applied to all interfaces. The Interface Config mode command is only available on platforms that support independent per-
port class of service queue configuration.
Each bw-x value is a percentage that ranges from 0 to 100 in increments of 1. All n bandwidth values must be specified with
this command, and each is independent of the others. The number n is platform-dependent and corresponds to the number
of supported traffic classes groups. The default maximum bandwidth value for each TCG is 0, meaning no upper limit is
enforced, which allows the TCG queue to consume any available non-guaranteed bandwidth of the interface.
If a nonzero value is specified for any bw-x maximum bandwidth parameter, it must not be less than the current minimum
bandwidth value for the corresponding queue. A bw-x maximum bandwidth parameter value of 0 may be specified at any
time without restriction.
The maximum bandwidth limits may be used with either a weighted or strict priority scheduling scheme.
NOTE: A value of 0 (the default) implies an unrestricted upper transmission limit, which is similar to 100%, although there
may be subtle operational differences depending on how the device handles a no limit case versus limit to 100%.
The command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is
applied to all interfaces. The Interface Config mode command is only available on platforms that support independent per-
port class-of-service queue configuration.
Each bw-x value is a percentage that ranges from 0 to 100 in increments of 1. All n bandwidth values must be specified with
this command, and their combined sum must not exceed 100%. The number n is platform dependent and corresponds to
the number of supported Traffic Class Groups. The default minimum bandwidth value for each TCG is 0, meaning no
bandwidth is guaranteed (best effort).
If the value of any bw-x minimum bandwidth parameter is specified as greater than the current maximum bandwidth value
for the corresponding TCG, then its corresponding maximum bandwidth automatically increases the maximum to the same
value.
The command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is
applied to all interfaces. The Interface Config mode command is only available on platforms that support independent per-
port class-of-service queue configuration.
At least one, but no more than n, tcg-id values are specified with this command. Duplicate tcg-id values are ignored. Each
tcg-id value ranges from 0 to (n-1), where n is the total number of TCG supported per interface. The number n is platform
dependent and corresponds to the number of supported Traffic Class Groups.
When strict priority scheduling is used for a TCG, the minimum bandwidth setting for the TCG is ignored and packets are
scheduled for transmission as soon as they arrive. A maximum bandwidth setting for the queue, if configured, serves to limit
the outbound transmission rate of a strict priority TCG queue so that it does not consume the entire capacity of the interface.
If multiple TCG on the same interface are configured for strict priority mode, the method of handling their packet transmission
is platform specific. One typical scheme is to schedule all strict priority TCG ahead of the weighted queues, giving preference
among the strict priority TCG to the one with the highest tcg-id.
The command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is
applied to all interfaces. The Interface Config mode command is only available on platforms that support independent per-
port class-of-service queue configuration.
Each wp-x (weight percentage) value is a percentage that ranges from 0 to 100 in increments of 1. All n bandwidth values
must be specified with this command, and their combined sum must not exceed 100%. The number n is platform dependent
and corresponds to the number of supported Traffic Class Groups. The default weight percentage value is in the ratio of 1:2:3
for TCG0:TCG1:TCG2, which is calculated as 100%:0%:0%.
The weight percentage is not considered for TCG that are configured for strict scheduling.
Parameter Description
slot/port Optional and is only valid on platforms that support independent per-port class of service mappings.
If slot/port is specified, the TCG mapping table of the interface is displayed.
If slot/port is omitted, the global configuration settings are displayed (these may have been subsequently
overridden by per-port configuration).
Traffic Class The traffic class queue identifier.
Traffic Class Group The traffic class group identifier.
Example: The following shows example CLI display output for the command.
(Routing) #show classofservice traffic-class-group
Parameter Description
slot/port Optional and is only valid on platforms that support independent per-port class of service mappings.
If slot/port is specified, the TCG mapping table of the interface is displayed.
If slot/port is omitted, the global configuration settings are displayed (these may have been subsequently
overridden by per-port configuration).
Interface This displays the slot/port of the interface. If displaying the global configuration, this output line is replaced with
a Global Configuration indication.
Traffic Class Group The traffic class Group identifier.
Min-Bandwidth The minimum transmission bandwidth, expressed as a percentage. A value of zero means bandwidth is not
guaranteed and the TCG operates using best-effort. This is a configured value.
Max-Bandwidth The maximum transmission bandwidth, expressed as a percentage. A value of zero means no upper limit is
enforced, so the queue may use any or all of the available bandwidth of the interface. This is a configured value.
Scheduler Type Indicates whether this queue is scheduled for transmission using a strict priority or a weighted scheme. Strict
priority scheduler is to provide lower latency to the higher CoS classes of traffic. Weighted scheduling is a round
robin mechanism with weights associated to each CoS class of traffic. This is a configured value.
Weight Percentage The weight of the TCG used during non-strict scheduling.
Example: The following shows example CLI display output for the command.
(Routing) #show interfaces traffic-class-group
Global Configuration
This document describes FIP snooping, which is a frame inspection method used by FIP Snooping Bridges to monitor FIP
frames and apply policies based upon the L2 header information in those frames, following recommendations in Annex C of
FC_BB_5 Rev 2.00. This allows for the following:
1. Auto-configuration of Ethernet ACLs based on information in the Ethernet headers of FIP frames.
2. Emulation of FC point-to-point links within the DCB Ethernet network.
3. Enhanced FCoE security/robustness by preventing FCoE MAC spoofing.
The FIP Snooping Bridge solution in EFOS supports configuration-only of perimeter port role and FCF-facing port roles and
is only intended for use at the edge of the switched network.
The role of FIP Snooping-enabled ports on the switch falls under one of the following types:
1. Perimeter or Edge port (connected directly to ENode).
2. FCF facing port (that receives traffic from FCFs targeted to the ENodes).
The default port role in an FCoE enabled VLAN is as a perimeter port. FCF facing ports must be configured by the user.
When FIP snooping is enabled, FC-BB-5 Annex D ACLs are installed on the switch and FIP frames are snooped. FIP
snooping will not allow FIP or Fiber Channel over Ethernet (FCoE) frames to be forwarded over a port until the port is
operationally enabled for PFC. VLAN tagging must be enabled on the interface in order to carry the dot1p values through
the network.
Default disabled
Format feature fip-snooping
Mode Global Config
Priority Flow Control (PFC) must be operationally enabled before FIP snooping can operate on an interface. VLAN tagging
must be enabled on the interface in order to carry the dot1p value through the network.
This command can only be entered after FIP snooping is enabled using the priority-flow-control mode command. Otherwise,
it does not appear in the CLI syntax tree.
Default disabled
Format fip-snooping enable
Mode VLAN Config
When configured using fabric-provided MAC addresses, FCoE devices transmit frames containing the FC map value in the
upper 24 bits. Only frames that match the configured FC map value are passed across the VLAN. Frames with MAC
addresses that do not match the FC map value are discarded.
This command can only be entered after FIP snooping is enabled using the priority-flow-control mode command. Otherwise,
it does not appear in the CLI syntax tree.
Parameter Description
map value Valid FC map values are in the range of 0x0 to 0xffffff.
Example: The following example configures an FC map value of 0x100 on VLAN 208.
(config)# vlan 208
(config-vlan)# fip-snooping enable
(config-vlan)# fip-snooping fc-map 0x100
Example: The following example configures an FC value of 0xFFCB for VLAN range 2 to 8.
It is recommended that FCF-facing ports be placed into auto-upstream mode in order to receive DCBX information and
propagate it to the CNAs on the downstream (host-facing) ports.
Interfaces enabled for PFC should be configured in trunk or general mode and must be PFC-operationally enabled before
FCoE traffic can pass over the port.
This command can only be entered after FIP snooping is enabled using the priority-flow-control mode command. Otherwise,
it does not appear in the CLI syntax tree.
Parameter Description
fcf Fibre Channel Fabric
Example: The following example sets the interface to be connected towards the host.
(Config)# interface 1/0/1
(Interface 1/0/1)# no fip-snooping port-mode fcf
(Interface 1/0/1)# exit
Parameter Description
Global Mode FIP snooping configuration status on the switch. It displays Enable when FIP snooping is enabled on the switch
and Disable when FIP snooping is disabled on the switch.
FCoE VLAN List List of VLAN IDs on which FIP snooping is enabled.
FCFs Number of FCFs discovered on the switch.
ENodes Number of Enodes discovered on the switch.
Sessions Total virtual sessions on the switch.
Max VLANs Maximum number of VLANs that can be enabled for FIP snooping on the switch.
Max FCFs in VLAN Maximum number of FCFs supported in a VLAN.
Max ENodes Maximum number of ENodes supported in the switch.
Max Sessions Maximum number of Sessions supported in the switch.
Example: The following shows example CLI display output for the command.
(switch)# show fip-snooping
NOTE: This command can only be entered after FIP snooping is enabled using the feature fip-snooping command.
Otherwise, it does not appear in the CLI syntax tree.
Parameter Description
enode-mac MAC address of the enode to display.
Parameter Description
Interface Interface to which the ENode is connected.
VLAN ID number of the VLAN to which the ENode belongs.
NameID Name of the ENode.
FIP-MAC MAC address of the ENode.
FCID Fiber channel ID number of the virtual port that was created by FCF when the ENode logged into the network.
Sessions Established Number of successful virtual connections established.
The command displays the following additional information when the optional argument is supplied.
Parameter Description
Sessions Waiting Number of virtual connections waiting for FCF acceptance.
Sessions Failed Number of virtual sessions failed.
Max-FCoE-PDU Maximum FCoE PDU size the ENode MAC intends to use for FCoE traffic. This is equivalent to the
maximum Ethernet frame payload the ENode intends to send.
Time elapsed Time elapsed since first successful login session snooped from the ENode.
Example: The following example displays sample output of the command with no optional argument supplied.
(switch)# show fip-snooping enode
Interface VLAN Name-ID ENode-MAC FCFs Sessions
-----------------------------------------------------1/0/2 1 00000000 00:0c:29:65:82:bc
1 3
1/0/5 100 00000000 00:0d:31:23:53:11 2 5
Example: The following sample command output is displayed with the optional argument supplied.
(switch)# show fip-snooping enode 00:0c:29:65:82:bc
Interface 1/0/2
VLAN 1
Name-ID 000000
ENode-MAC 00:0c:29:65:82:bc
FCFs Connected1
Sessions Established3
Sessions Waiting 1
Session Failed 0
Max-FCoE-PDU 2158
Time elapsed 0 days, 1 hours, 20 minutes
NOTE: This command can only be entered after FIP snooping is enabled using the feature fip-snooping command.
Otherwise, it does not appear in the CLI syntax tree.
Parameter Description
Interface Interface to which the FCF is connected.
VLAN ID number of the VLAN to which the FCF belongs.
No. of ENodes Total number of ENodes that are connected to the FCF.
FPMA/SPMA Type of the MAC address for ENode as negotiated by the FCF.
FCMAP FCMAP value used by the FCF.
FCF-MAC MAC address of the FCF.
Fabric Name Name of the FCF.
In the following table is additional information regarding the FCF that is displayed when the optional fcf-mac address
argument is provided.
Parameter Description
Sessions Total number of virtual sessions accepted by FCF in the associated VLAN.
D-bit This reflects the value of the D-bit provided by the most recently received Discovery Advertisement from the FCF.
When D-bit value is zero then FIP snooping bridge verifies the periodic VN_Port FIP Keep Alive frames
associated with FCF and Discovery Advertisements sent by FCF. When D-bit is set to 1, switch discards snooped
VN_Port FIP Keep Alive frames associated with FCF and does not timeout the FCoE sessions established with
the FCF based on FKA_VN_PERIOD*5 interval.
Available for Login This reflects the value of the A bit provided by the most recently received Discovery Advertisement from the FCF.
This provides the information that the transmitting FCF is available for FIP FLOGI/FDISC from ENodes. This is
informational and shall have no effect on existing logins.
Priority The Priority returned from the FCF in the Solicited Discovery Advertisement. This indicates the Priority that has
been manually assigned to the FCF.
FKA-ADV FIP keepalive interval (FKA_ADV_PERIOD) in seconds configured on the FCF multiplied by five. For example, if
the FKA_ADV period configured on the FCF is 80 seconds, the value of this field is 400.
FCF Expiry Time This is timer value to monitor the status of the FCF. FCF entry and all its associated virtual sessions will be
removed when the value reaches 0. This value is reset to Configured FKA-ADV every time a Discovery
Advertisement is received from the FCF-MAC.
Time Elapsed Time since FCF is discovered.
Example: The following displays sample output of the command when no optional argument is provided.
(config)# show fip-snooping fcf
-------------------------------------------------------------------------------
Interface VLAN ENodes FPMA/ FC-MAP FCF-MAC Name-ID Fabric-Name
SPMA
-------------------------------------------------------------------------------1/0/11 1 2
FPMA 0e:fc:00 00:0d:ec:b2:2c:80 20:65:00:0d: 20:65:00:0d:
ec:b1:9e:81 ec:97:52:c1
3/0/10 1 1 FPMA 0e:fc:00 00:0d:ec:b2:2c:81 00000000 00000000
3/0/15 100 1 FPMA 0e:fc:10 00:0c:ab:2c:eb:12 00000000 00000000
Example: The following displays sample output of the command when the optional argument is provided.
(switch)# show fip-snooping fcf 00:0d:ec:b2:2c:81
Interface 3/0/10
VLAN 1
ENodes 1
FPMA/SPMA FPMA
FCF-MAC 00:0d:ec:b2:2c:81
FC-MAP 0e:fc:00
Name-ID 20:65:00:0d:ec:b1:9e:81
Fabric-Name 20:65:00:0d:ec:97:52:c1
Sessions 3
D-bit 0
Available for Login1
Priority 2
FKA-ADV(FKA_ADV_PERIOD*5) 250
FCF Expiry Time219
Time Elapsed 0 days, 2 hours, 8 minutes
NOTE: This command can only be entered after FIP snooping is enabled using the feature fip-snooping command.
Otherwise, it does not appear in the CLI syntax tree.
Format show fip-snooping sessions [[[vlan vlan-id] | [interface interface-id] | [fcf fcf-mac
[enode enode-mac]]] [detail]]
Mode User EXEC
Privileged EXEC
Parameter Description
Interface-id ID of an interface on which FIP snooping has been enabled.
FCF-MAC MAC address of the FCF that is part of the session.
ENode-MAC MAC address of the ENode that is part of the session.
VLAN ID number of the VLAN that contains the session.
FCoE MAC Source MAC address of the FCoE packets that are originated by the ENode as part of the session.
FC-ID Fiber Channel ID of the virtual port that was created by the FCF when the ENode VN_Port did a FLOGI/NPIV/
FDISC request.
The command output format is different when the detail option is used. The information in the following table is displayed.
Parameter Description
VLAN VLAN to which the session belongs.
FC-MAP FCMAP value used by the FCF.
FCFs Number of FCFs discovered.
ENodes Number of ENodes discovered.
Sessions Total virtual sessions in FCoE VLAN.
FCF Information
Interface Interface on which the FCF is discovered.
MAC MAC address of the FCF.
ENodes Total number of ENodes that are connected to the FCF.
Sessions Total number of virtual sessions accepted by FCF in the associated VLAN.
ENode Information
Interface Interface to which the ENode is connected.
MAC MAC address of the ENode.
Sessions Total number of virtual sessions originated from ENodes to FCF in the VLAN.
Waiting Total number of virtual connections waiting for FCF acceptance in the VLAN.
Session Information
FCoE-MAC Source MAC address of the FCoE packets that are originated by the ENode as part of the session.
Request (FP, SP) FIP session request type sent by ENode. This can be FLOGI or FDESC (NPIV FDISC). Whereas FP and SP
values are the FP bit and the SP bit values in the FLOGI or NPIV FDISC request respectively.
Parameter Description
Expiry Time This is virtual connection/session expiry interval. This is used to monitor the status of the session. Session entry
is removed when the value reaches 0. This value is reset to 450 secs (5*90 secs) every time an associated
VN_Port FKA is received from the ENode. This is ignored (marked as NA) if the D-bit is set to one in the FCF
Discovery Advertisements.
Mode This is the addressing mode in use by the VN_Port at ENode. In other words, this is the type of MAC address
granted (selected and returned) by FCF. This can be one of the addressing modes, that is, FPMA or SPMA.
State This is the state of the virtual session. The state is displayed as Tentative during the process of ENode login
to FCF (using FLOGI or FDESC). It displays Active after ENode and FCF establish a successful virtual
connection.
Session-Time Time elapsed after this successful virtual session is established by ENode with FCF. The value is displayed in xd,
yh, zm format where x represents number of days, y represents hours and z represents minutes elapsed
following this successful virtual session. This field has no useful information for waiting sessions.
Example: The following sample command output is displayed when no arguments are provided.
(switch)# show fip-snooping sessions
------------------------------------------------------------------------------
FCF-MAC ENode-MAC VLAN FCoE-MAC FC-ID
------------------------------------------------------------------------------
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:00 38:0f:db
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:01 38:0f:dc
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:02 38:0f:dd
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:05 38:0f:e1
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:07 38:0f:e3
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:10 38:0f:e6
00:0d:ec:b2:2c:80 00:0c:29:65:82:bc 100 0e:fc:00:ad:00:19 38:0f:ee
00:0e:ad:12:23:53 00:0d:29:12:22:a6 200 0e:fc:11:aa:bb:00 44:23:a4
00:0e:ad:12:23:53 00:0d:29:12:22:a6 200 0e:fc:11:aa:bb:01 44:02:ab
00:0e:ad:12:23:53 00:0d:29:23:14:22 200 0e:fc:11:aa:bb:02 44:35:1b
00:0e:ad:12:23:53 00:0d:29:23:14:22 200 0e:fc:11:aa:bb:03 44:35:2a
00:0e:ad:12:23:53 00:0d:29:23:14:22 200 0e:fc:11:aa:bb:04 44:36:3b
Example: The following sample command output is displayed when the detail option is specified.
(switch)# show fip-snooping sessions detail
<FCF Information>
Interface: 3/0/11 MAC: 00:0e:ad:12:23:53 ENodes: 2 Sessions: 5
<ENode Information>
Interface: 1/0/10 MAC: 00:0d:29:12:22:a6 Sessions: 2 Waiting: 0
<Session Information>
FCoE-MAC Request Expiry Mode State Session-Time
(FP,SP) Time
0e:fc:11:ad:00:00 FLOGI(1,1) 242 FPMA ACTIVE 0d, 02h, 30m
0e:fc:11:ad:00:01 FDESC(1,1) 245 FPMA ACTIVE 0d, 02h, 28m
<ENode Information>
Interface: 1/0/11 MAC: 00:0d:29:23:14:22 Sessions: 3 Waiting: 1
<Session Information>
FCoE-MAC Request Expiry Mode State Session-Time
(FP,SP) Time
0e:fc:11:ad:00:02 FLOGI(1,1) 202 FPMA ACTIVE 0d, 02h, 20m
0e:fc:11:ad:00:03 FDESC(1,1) 228 FPMA ACTIVE 0d, 01h, 18m
0e:fc:11:ad:00:03 FDESC(1,1) 232 FPMA ACTIVE 0d, 01h, 02m
----------------- FDESC(1,1) --- FPMA TENTATIVE ------------
Example: The following sample command output displays sessions between specified FCF and ENode.
(switch)# show fip-snooping sessions fcf 00:0e:ad:12:23:53 enode 00:0d:29:12:22:a6
------------------------------------------------------------------------------
FCF-MAC ENode-MAC VLAN FCoE-MAC FC-ID
------------------------------------------------------------------------------
00:0e:ad:12:23:53 00:0d:29:12:22:a6 200 0e:fc:11:aa:bb:00 44:23:a4
00:0e:ad:12:23:53 00:0d:29:12:22:a6 200 0e:fc:11:aa:bb:01 44:02:ab
Example: The following sample command output displays sessions between specified FCF and ENode with the detail
option.
(switch)# show fip-snooping sessions fcf 00:0e:ad:12:23:53 enode 00:0d:29:12:22:a6 detail
<FCF Information>
Interface: 3/0/11 MAC: 00:0e:ad:12:23:53 ENodes: 2 Sessions: 5
<ENode Information>
Interface: 1/0/10 MAC: 00:0d:29:12:22:a6 Sessions: 2 Waiting: 0
<Session Information>
FCoE-MAC Request Expiry Mode State Session-Time
(FP,SP) Time
0e:fc:11:ad:00:00 FLOGI(1,1) 242 FPMA ACTIVE 0d, 02h, 30m
0e:fc:11:ad:00:01 FDESC(1,1) 245 FPMA ACTIVE 0d, 02h, 28m
NOTE: This command can only be entered after FIP snooping is enabled using the feature fip-snooping command.
Otherwise, it does not appear in the CLI syntax tree.
Parameter Description
vlan-id A VLAN on which FIP snooping is enabled.
interface-id An interface belonging to a VLAN on which FIP snooping is enabled.
The following table describes the packet counters per FIP operation.
When an interface is provided as an argument, interface applicable statistics are only displayed. See Example 3 for
applicable statistics on interface.
Example 1
The following is the sample command usage with no optional arguments supplied.
(switch)# show fip-snooping statistics
VLAN: 4
---------------------------------
FIP-Operation Number of Pkts
VR 2
VN 2
MDS 2
UDS 2
FLOGI 2
FDISC 2
LOGO 0
VNPort-keep-alive 200
MDA 25
UDA 2
FLOGI_ACC 2
FLOGI_RJT 0
FDISC_ACC 2
FDISC_RJT 0
LOGO_ACC 0
LOGO_RJT 0
CVL 0
----------------------------------
Number of Virtual Session Timeouts:23
Number of FCF Session Timeouts: 6
Number of Session configuration failures: 10
Number of Sessions denied with FCF limit: 10
Number of Sessions denied with ENode limit: 10
Number of Sessions denied with System limit: 12
VLAN: 200
-------------------------------
FIP-Operation Number of Pkts
VR 2
VN 2
MDS 5
UDS 4
FLOGI 5
FDISC 5
LOGO 1
VNPort-keep-alive 310
MDA 35
UDA 3
FLOGI_ACC 4
FLOGI_RJT 0
FDISC_ACC 15
FDISC_RJT 0
LOGO_ACC 1
LOGO_RJT 0
CVL 0
--------------------------------
Example 2
The following is the sample command output with optional vlan argument supplied.
(switch)# show fip-snooping statistics vlan 200
VLAN: 200
-------------------------------
FIP-Operation Number of Pkts
-------------------------------
VR 2
VN 2
MDS 5
UDS 4
FLOGI 5
FDISC 5
LOGO 1
VNPort-keep-alive 310
MDA 35
UDA 3
FLOGI_ACC 4
FLOGI_RJT 0
FDISC_ACC 15
FDISC_RJT 0
LOGO_ACC 1
LOGO_RJT 0
CVL 0
--------------------------------
Example 3
The following is the sample command output with optional interface argument supplied.
(switch)# show fip-snooping statistics interface 1/0/5
-------------------------------
FIP-Operation Number of Pkts
-------------------------------
VR 2
VN 2
MDS 5
UDS 1
FLOGI 2
FDISC 5
LOGO 1
VNPort-keep-alive 310
MDA 35
UDA 3
FLOGI_ACC 4
FLOGI_RJT 0
FDISC_ACC 15
FDISC_RJT 0
LOGO_ACC 1
LOGO_RJT 0
CVL 0
--------------------------------
NOTE: This command can only be entered after FIP snooping is enabled using the feature fip-snooping command.
Otherwise, it does not appear in the CLI syntax tree.
Parameter Description
vlan-id A VLAN enabled for FIP snooping.
VLAN VLAN in which FIP snooping is enabled/operational.
FC-MAP FCoE mapped address prefix of the FCoE forwarder for the FCoE VLAN.
FCFs Number of FCFs discovered.
ENodes Number of ENodes discovered.
Sessions Total virtual sessions in FCoE VLAN.
Example: The following shows example CLI display output for the command.
(switch)# show fip-snooping
NOTE: This command can only be entered after FIP snooping is enabled using the feature fip-snooping command.
Otherwise, it does not appear in the CLI syntax tree.
Parameter Description
vlan-id A VLAN on which FIP snooping is enabled.
interface-id An interface belonging to a VLAN on which FIP snooping is enabled.
Ordinarily, when flow control is enabled on a physical link, it applies to all traffic on the link. When congestion occurs, the
hardware sends pause frames that temporarily suspend traffic flow. Pausing traffic helps prevent buffer overflow and
dropped frames.
Priority-based flow control (PFC) provides a way to distinguish which traffic on physical link is paused when congestion
occurs, based on the priority of the traffic. An interface can be configured to pause only high priority (that is, loss-sensitive)
traffic when necessary prevent dropped frames, while allowing traffic that has greater loss tolerance to continue to flow on
the interface.
Priorities are differentiated by the priority field of the IEEE 802.1Q VLAN header, which identifies an IEEE 802.1p priority
value. In EFOS, these priority values must be mapped to internal class-of-service (CoS) values.
When priority-flow-control is disabled, the interface defaults to the IEEE 802.3x flow control setting for the interface.
When priority-flow-control is enabled, the interface will not pause any CoS unless there is at least one no-drop
priority.
Use the no form of the command to return the mode to the default (off). VLAN tagging (trunk or general mode) must be
enabled on the interface in order to carry the dot1p value through the network. Additionally, the dot1mapping to
class-of-service must be set to one-to-one.
When PFC is enabled on an interface, the normal PAUSE control mechanism is operationally disabled.
Parameter Description
on Enable PFC on the interface.
off Disable PFC on the interface.
The command has no effect on interfaces not enabled for PFC. VLAN tagging needs to be turned on to carry the dot1p value
through the network. Additionally, the dot1pmapping to class of service must be set to one.
Parameter Description
drop Disable lossless behavior on the selected priorities.
no-drop Enable lossless behavior on the selected priorities.
Parameter Description
slot/port A valid Ethernet port.
When an interface number is not provided, the following information displays for all interfaces.
Parameter Description
Interface Detail The port for which data is displayed.
PFC Operational Status The operational status of the interface.
PFC Configured State The administrative mode of PFC on the interface.
Configured Drop Priorities The 802.1p priority values that are configured with a drop priority on the interface. Drop priorities do not
participate in pause.
Configured No-Drop Priorities The 802.1p priority values that are configured with a no-drop priority on the interface. If an 802.1p priority
that is designated as no-drop is congested, the priority is paused.
Operational Drop Priorities The 802.1p priority values that the switch is using with a drop priority. The operational drop priorities might
not be the same as the configured priorities if the interface has accepted different priorities from a peer
device
Configured No-Drop Priorities The 802.1p priority values that the switch is using with a no-drop priority. The operational drop priorities
might not be the same as the configured priorities if the interface has accepted different priorities from a
peer device
Delay Allowance The operational status of the interface.
Peer Configuration Indicates whether the local switch has accepted a compatible configuration from a peer switch.
Compatible
Compatible Configuration The number of received configurations accepted and processed as valid. This number does not include
Count duplicate configurations.
Incompatible Configuration The number of received configurations that were not accepted from a peer device because they were
Count incompatible.
Priority The 802.1p priority value.
Received PFC Frames The number of PFC frames received by the interface with the associated 802.1p priority.
Transmitted PFC Frames The number of PFC frames transmitted by the interface with the associated 802.1p priority.
The following examples show the priority flow control status and statistics.
Example 1:
(Routing) #show interface 0/1 priority-flow-control
Example 2:
(Routing) #show interface priority-flow-control
Default disabled
Format openflow enable
Mode Global Config
If the OpenFlow feature is enabled when this command is issued and the specified static IP address is not the same as the
IP address already in use by the OpenFlow feature then the feature is automatically disabled and reenabled.
Default 0.0.0.0
Format openflow static-ip IPv4 address
Mode Global Config
Parameter Description
ip-address Specify up to five IP addresses to which the switch should establish an OpenFlow Management connection.
ip-port IP port to use for an OpenFlow Management connection. If the IP port is omitted, then the default IP port number
6632 is used.
connection mode TCP or SSL. The default is SSL.
Default full-match
Format openflow default-table parameter
Mode Global Config
Parameter Description
parameter Possible values are full-match or layer-2-match.
Default disabled
Format openflow ip-mode {auto|static|serviceport}
Mode Global Config
Default disabled
Format openflow passive-mode
Mode Global Config
Parameter Description
Administrative Mode The OpenFlow feature administrative mode set by the openflow enable command.
Administrative Status The operational status of the OpenFlow feature. Although the feature may be administratively enabled, it could
be operationally disabled due to various reasons.
Disable Reason If the OpenFlow feature is operationally disabled, then this status shows the reason for the feature to be disabled.
IP Address IPv4 Address assigned to the feature. If the IP address is not assigned, then the status is None.
IP Mode IP mode assigned by the openflow ip-mode command. The IP mode can be Auto, Static, or ServicePort
IP.
Static IP Address Static IP address assigned by the openflow static-ip command.
OpenFlow Variant OpenFlow Protocol Variant. The OpenFlow protocol can be OpenFlow 1.0 or OpenFlow 1.3.
Default Table The Hardware Table used as the target for flows installed by an OpenFlow 1.0 controller which is not enhanced
to handle multiple hardware tables.
Passive Mode The OpenFlow passive mode set by the openflow passive-mode command.
Example: The following shows example CLI display output for the command.
(Routing) #show openflow
Parameter Description
IP Address IPv4 address of the controller.
Parameter Description
IP Port IPv4 port number for the controller connection.
Connection Mode SSL or TCP Controller Connection mode.
Role The role of the controller: Master, Equal, Slave
Example: The following shows example CLI display output for the command.
(Routing) # show openflow configured controller
Format show openflow installed flows [dest_ip ip-address | dest_ip_port 1-65535 | dest_mac
macaddr | dscp 0-63 | ether_type 0-0xFFFF | ingress_port slot/port | ip_proto 0-255 |
priority 1-65535 | source_ip ip-address | source_ip_port 1-65535 | source_mac macaddr
| table 4,24,25 | vlan 1-4093 | vlan_prio 0-7]
Mode Privileged EXEC
Parameter Description
dest_ip The IP address of the destination.
dest_ip_port The port number of the destination.
dest_mac The MAC address of the destination.
dscp The DSCP value.
ether_type The ethertype value.
ingress_port The slot and port for the ingress.
ip_proto The IP protocol.
priority The priority of the flow.
source_ip The IP address of the source.
source_ip_port The port number of the source.
source_mac The MAC address of the source.
table The table number.
vlan The VLAN.
vlan_prio The VLAN priority.
Parameter Description
Flow Type The type of flow. (For example, 1.0 or Layer 2 Match).
Flow Table The hardware table in which the flow is installed.
Flow Priority The priority of the flow versus other flows.
Match Criteria The match criteria specified by the flow.
Ingress Port The port on which the flow is active.
Action The action specified by the flow.
Parameter Description
Idle The time since the flow was hit.
Installed in hardware If the flow could be added to the hardware.
0 is displayed if the flow cannot be added.
1 is displayed if the flow was added.
Hard Timeout The number of seconds after which the flow is expired regardless of whether or not packets are
hitting the entry.
Idle Timeout The number of seconds after which the flow is expired with no received traffic.
Queue The queue that should be used to queue when packets are output.
Example: The following shows example CLI display output for the command for the flow type 1DOT0.
(Routing) #show openflow installed flows
Match criteria:
Flow table 24 : Priority 1
Ingress port 0/0
Actions:
Action: Drop
Status:
Duration 2 : Idle 0 : installed in hardware 1
Match criteria:
Flow table 24 : Priority 102
Ingress port 0/0 : Ether type 88CC
Actions:
Status:
Duration 55 : Idle 45 : installed in hardware 1
Example: The following shows example CLI display output for the command for the flow type 1DOT3.
(Routing) # show openflow installed flows
Match criteria:
Flow table 60 : Priority 10
Ingress port 0/1 : Src MAC 00:00:02:37:38:01 : Dst MAC 00:00:18:37:22:01
VLAN 1 : VLAN prio 1 : Ether type 0x0800
IP proto 17 : Src IP 100.0.0.225 : Dst IP 192.0.0.225
Src IP port 1 : Dst IP port 1 : TOS 32(DSCP: 8)
Actions:
New Src IP 3.3.3.3 : New SrcIP Mask 255.255.255.255 : New Dst IP 4.4.4.4
New DstIP Mask 255.255.255.255 : Egress port 0/1
Status:
Duration 5 : Idle 2 : installed in hardware 1
Match criteria:
Flow table 60 : Priority 32768
Dst MAC 00:00:00:00:00:55 : Dst MAC Mask FF:FF:FF:FF:FF:FF : VLAN 100
Status:
Duration 5 : Packet Count 0 : Byte Count 0
Idle 0 : installed in hardware 0
Parameter Description
Group Type Type of the Group – Indirect, All, Select and so on.
Group Id Unique Id of the Group.
Reference Count Group Reference Count - is used only for Indirect groups. This count indicates how many Select groups are
referring to the current Indirect group.
Duration The time since the group was created.
Bucket Count Number of Buckets in the group.
Reference Group Id References the Indirect group ID and used for Select group only.
Example:
(Routing) # show openflow installed groups
Parameter Description
Flow Table OpenFlow table identifier. The range is 0 to 255.
Flow Table Name The name of this table.
Flow Table Description A detailed description for this table.
Maximum Size Platform-defined maximum size for this flow table.
Number of Entries Total number of entries in this table. The count includes delete-pending entries.
Hardware Entries Number of entries currently inserted into the hardware.
Software-Only Entries Number of entries that are not installed in the hardware for any reason. This includes entries pending for insertion,
entries that cannot be inserted due to missing interfaces and entries that cannot be inserted due to table-full
condition.
Waiting for Space Number of entries that are not currently in the hardware because the attempt to insert the entry failed.
Entries
Parameter Description
Flow Insertion Count Total number of flows that were added to this table since the switch powered up.
Flow Deletion Count Total number of flows that were deleted from this table since the switch powered up.
Insertion Failure Total number of hardware insertion attempts that were rejected due to lack of space since the switch powered up.
Count
Example: The following shows example CLI display output for the command.
(Routing) # show openflow table-status openflow10
Flow Table...............................1
Flow Table Name.......................... Forwarding Database
Maximum Size.............................64
Number of Entries........................8
Hardware Entries.........................7
Software-Only Entries....................1
Waiting for Space Entries................0
Flow Insertion Count.....................1
Flow Deletion Count......................0
Insertion Failure Count..................0
Flow Table Description:
The forwarding database maps non-multicast MAC addresses and the ports on which these addresses are
located.
Example: The following shows example CLI display output for the command.
(Routing) #show openflow table-status openflow13
Flow Table..................................... 60
Flow Table Name................................ Openflow 1.3
Maximum Size................................... 1920
Number of Entries............................. 0
Hardware Entries............................... 0
Software-Only Entries.......................... 0
Waiting for Space Entries...................... 0
Flow Insertion Count........................... 0
Flow Deletion Count............................ 0
Insertion Failure Count........................ 0
Flow Table Description......................... The Openflow 1.3 table matches on the packet layer-2
header, including DA-MAC, SA-MAC, VLAN, Vlan priority ether type; layer-3 header, including SRC-IP,
DST-IP, IP protocol, IP-TOS; layer-4 header, including UDP/TCP source and dest port, ICMP type, and
code; SRC-IPv6, DST_IPv6, IPv6 Flow Label,ECN, ICMPv6 type and code, source L4 Port for TCP / UDP /
SCTP and input port including physical port and LAG port.
The swap command transmits the packet with the same label as it was received. The same label is used because the
switches associate one label to one subnet in the entire routing domain.
The pop command strips the top label from the label stack.
The last-pop command strips the top label from the label stack and sends the packet without the MPLS header.
The swap command transmits the packet with the same label as it was received. The same label is used because the
switches associate one label to one subnet in the whole routing domain.
The pop command strips the top label from the label stack. The last-pop command strips the top label from the label stack
and sends the packet without the MPLS header.
Note that the swap-label parameter is applicable only if the swap option is selected. The other parameters are present for
all options. The pop option strips the top label from the label stack. The last-pop option strips the top label from the label
stack and sends the packet without the MPLS header.
Format mplsd lfdb layer-2 label {swap | pop | last-pop} {swap-label} slot/port vlan mac-addr
Mode Global Config
The command may be invoked for port-based and VLAN routing interfaces to assign per-interface labels. The command
may be invoked for the loopback interfaces to assign the per-switch labels. This command is not supported for the tunnel
interfaces.
This command may be invoked for port-based and VLAN routing interfaces. This command is not supported for tunnel
interfaces.
The label parameters are accepted only if the packet type is mpls.
If a packet capture session is already active when the command is issued, the previous session is terminated and a new
session is started.
Parameter Description
MPLS MAC The MAC address that MPLS packets to this switch must use for the switch to handle the packets.
BGP Label Distribution Mode Flag indicating whether BGP is configured to distribute per-switch and per-interface MPLS labels.
LFDB Size Maximum number of entries in the Label Forwarding Database.
Parameter Description
Maximum number of MPLS tunnel Maximum number of tunnel initiators supported in hardware
initiators
Current number of MPLS tunnel Current number of tunnel initiators in the hardware
initiators
LFDB Label Range The MPLS label IDs supported by the switch.
Number of MPLS tunnels with 1- The current number of MPLS tunnels with one-label encapsulation
label
Number of MPLS tunnels with 2- The current number of MPLS tunnels with two-label encapsulation
labels
Number of MPLS tunnels with 3- The current number of MPLS tunnels with three-label encapsulation
labels
LFDB Entries The number of MPLS labels currently in the database.
LFDB Entries In Hardware The number of MPLS labels currently inserted in the hardware.
LFDB Entries Not In Hardware The number of MPLS labels in the LFDB, that are currently not inserted into the hardware.
LFDB Static Entries The number of LFDB entries added by the static protocol, which means these labels are saved in the
configuration file.
LFDB Dynamic Entries Number of LFDB entries added by the Dynamic protocol. These entries can be added using Open
API or SNMP.
LFDB BGP Entries Number of LFDB entries added by the BGP protocol.
LFDB Layer-2 Entries Number of Layer 2 entries currently in the LFDB.
LFDB IPv4 Entries Number of IPv4 entries currently in the LFDB.
LFDB IPv6 Entries Number of IPv6 entries currently in the LFDB.
LFDB Dynamic Insert Failure Number of failed LFDB insertion attempts from the BGP protocol or from the dynamic protocol.
Count
LFDB High Watermark The maximum number of LFDB entries that was ever added to the database since the last time the
counters were cleared.
ECMP In-Use/High/Max The current number, the high watermark, and the maximum size of the ECMP database. The In-Use
and High counts include the entries used by the routing feature as well as the MPLS feature.
LFDB Lookup Failure Packets The number of MPLS packets received by the switch that did not match any MPLS entry in the
hardware label forwarding database.
Example:
#show mplsd
Format show mpls lfdb {all | bgp | dynamic | ipv4 | ipv6 | layer-2 | static} | {label[-label]}
Mode Global
Parameter Description
Label The MPLS Label.
Protocol Which protocol added the label, such as BGP, Static, and Dynamic. The Dynamic entries can only be created
using SNMP and Open API.
Type The type of label, such as ipv4, ipv6, or layer-2.
Subnet The subnet associated with this label. For layer-2 labels, this field is set to N/A.
Egress Label Action Label action, such as swap, pop, and last-pop.
Egress Label For entries with swap actions this is the label used to replace the top label in the MPLS stack.
Egress Port For layer-2 entries, this is the egress port on which the packet is transmitted. The field is N/A for IPv4 and
IPv6 entries.
Vlan For layer-2 entries, this is the VLAN with which the packets are transmitted. The field is N/A for IPv4 and IPv6
entries.
MAC For layer-2 entries, this is the MAC address appended to the transmitted MPLS packets. The field is N/A for
IPv4 and IPv6 entries.
Hardware Status This flag indicates whether the label is inserted into the hardware.
Not Inserted Reason If the label is not inserted into the hardware, this field displays the reason for not inserting the label.
Byte Count A 64 bit counter that counts the number of bytes received by the switch that match this MPLS label.
Packet Count A 64 bit counter that counts the number of packets received by the switch that match the MPLS label.
Duplicate Insertion The number of times an attempt was made to insert this label when the label was already in the database.
Attempts
Example:
#show mplsd lfdb label 3000
Parameter Description
Interface USP of the interface.
IPv4 MPLS Label MPLS Label associated with the primary IPv4 address. The field reports None if no label is assigned for IPv4.
IPv6 MPLS Label MPLS label associated with the primary IPv6 address.
Example:
#show mplsd interface vlan 100
When the all option is specified, the command displays all tunnel initiators which are configured for either IPv4 or IPv6.
Parameter Description
Label The MPLS Label.
Type The type of label, such as ipv4, ipv6 or all
IP address The IPv4 or IPv6 address of the next hop with which this tunnel is associated.
MPLS Label-1 The top MPLS label of the tunnel.
MPLS Label-2 The second MPLS label of the tunnel.
MPLS Label-3 The third MPLS label of the tunnel.
Egress Interface The interface index to which this tunnel entry is pointing. The value is displayed as U/S/P or LAG-n
format.
Egress VLAN VLAN on which the packets egress the switch. Port based routing interfaces report the internal MPLS
tunneling VLAN.
Parameter Description
Egress MAC MAC address used as the destination MAC for packets transmitted on this MPLS tunnel.
Reference Count Number of routes and ECMP groups pointing to this MPLS tunnel initiator.
Age since last update Number of seconds since last update.
Example:
(Routing) #show mplsd tunnels all
NOTE: VXLAN mode and NVGRE mode are mutually exclusive modes. NVGRE mode cannot be enabled if VXLAN mode
is enabled on the switch. VXLAN mode must be disabled prior to enabling NVGRE mode.
Multiple remote NVEs can be configured one by one for the same VSID, as required.
NOTE: The switch does support configuration of Multicast IP address to discover remote NVEs automatically to define a
flood group for DCVPN. This command should be used to manually configure all remote NVEs behind which
Tenant (VSID) hosts are present for each DCVPN.
The user can optionally specify one or more tenant systems reachable through the NVE. The tenant systems for a particular
VN can be added or deleted incrementally one by one. Normally, the system automatically learns tenant systems from
received messages. If a tenant system is configured, the configuration overrides learning for the given MAC address.
The tenant system MAC addresses are maintained in a separate table. These are not listed as part of FDB mac-address
table. They internally consume shared system hardware Layer 2 address table resources. So the maximum number of
tenant systems depends on the number of resources left in the hardware Layer 2 table, which is dynamic in nature.
The user is allowed to configure a maximum of 600 remote tenant system entries per VN and overall 4096 entries on the
switch.
The configurable range for the VSID 1 to 16777214. 16777215 is reserved for internal purposes.
The configurable range for the VSID 1 to 16777214. 16777215 is reserved for internal purposes.
NOTE: It is recommended to configure a loopback interface with the intended local NVGRE Gateway IP address and use
it as the source-ip for all tenants. It is also possible to configure tenants with a different source-ip when multiple
loopback interfaces are configured and used as local NVGRE Gateways, if required. Loopback interfaces that are
intended to be used as local NVGRE Gateways, should be dedicated interfaces and must not be used for any other
purposes.
NOTE: This command is valid only on physical and port-channel interfaces. The configured interface should also be a
member of VLAN that is associated with the specified vsid.
These tenant system MAC addresses are maintained in a separate table. These are not listed as part of the FDB mac-
address table. They internally consume shared system hardware L2 address table resources. The maximum number of
tenant systems configured or learned depends on the number of resources left in the hardware L2 table which is dynamic in
nature.
The configurable range for the VSID 1 to 16777214. 16777215 is reserved for internal purposes.
The user is allowed to configure maximum 24 tenant systems per physical or port-channel interface.
NOTE: When an access port configuration of the VN specified by vsid is removed, by removing the port participation of
associated VLAN, all forwarding entries, if any, configured by user and learned by the switch on that access port
are also removed.
The packets that arrive with the specified VLAN vlan-id tag are associated to the NVGRE VN. This command only
associates the traffic from the specified VLAN to a given VN identified by vsid. For this command to work, the VLAN vlan-id
must already by created. The user must configure access ports for the VN specified by the vsid configuring the VLAN
vlan-id membership on eligible interfaces before or after this command is issued.
NOTE: It is recommended to configure ingress filtering on all member ports of the VLAN vlan-id.
The configurable range for the VSID 1 to 16777214. 16777215 is reserved for internal purposes.
NOTE: VXLAN mode and NVGRE mode are mutually exclusive modes. VXLAN mode cannot be enabled if NVGRE mode
is enabled on the switch. NVGRE mode must be disabled prior to enabling VXLAN mode.
The configurable range for the VNID 1 to 16777214. 16777215 is reserved for internal purposes.
NOTE: It is recommended to configure a loopback interface with the intended local VXLAN Gateway IP address and use
it as the source-ip for all tenants. It is also possible to configure tenants with a different source-ip when
multiple loopback interfaces are configured and used as local VXLAN Gateways, if required. Loopback interfaces
intended to be used as local VXLAN Gateways should be dedicated interfaces and must not be used for any other
purpose.
NOTE: This command is valid only on physical and port-channel interfaces. The configured interface should also be a
member of VLAN that is associated with the specified vnid.
These tenant system MAC addresses are maintained in a separate table. These are not listed as part of FDB mac-address
table. They internally consume shared system hardware L2 address table resources. So, the maximum number of tenant
systems configured or learned depend on the number of resources left in the hardware L2 table, which is dynamic in nature.
The configurable range for the vnid 1 to 16777214. 16777215 is reserved for internal purposes.
User is allowed to configure maximum 24 tenant systems per physical or port-channel interface.
NOTE: When an access port configuration of the VN specified by vnid is removed, by removing the port participation of
associated VLAN, all forwarding entries, if any, configured by the user and learned by the switch on that access
port are also removed.
This command also updates all existing VXLAN tunnels in the hardware with newly configured UDP destination port. There
is no or very minimal traffic disruption during this operation.
The packets that arrive with the specified VLAN vlan-id tag are associated to the VXLAN vnid. This command only
associates the traffic from the specified VLAN to a given VN identified by vsid. The VLAN vlan-id must be created already
for this command to work. The user must configure the access ports for the VN specified by vnid by configuring the VLAN
vlan-id membership on the eligible interfaces before or after this command is issued.
NOTE: It is recommended to configure ingress filtering on all member ports of the VLAN vlan-id.
The configurable range for the VNID 1 to 16777214. 16777215 is reserved for internal purposes.
NOTE: The switch does support configuration of Multicast IP address to automatically discover remote VTEPs to define a
flood group for DCVPN. This command should be used to manually configure, for each DCVPN, all remote VTEPs
behind which Tenant (VNID) hosts are present.
The user can optionally specify one or more tenant systems reachable through the VTEP. The tenant systems for a particular
VXLAN can be added or deleted incrementally one by one. Normally, the system automatically learns tenant systems from
received messages. If a tenant system is configured, the configuration overrides learning for the given MAC address.
The tenant system MAC addresses are maintained in a separate table. These are not listed as part of FDB mac-address
table. They internally consume shared system hardware L2 address table resources. The maximum number of tenant
systems configured depend on the number of resources left in the hardware L2 table, which is dynamic in nature.
The user is allowed to configure maximum of 600 remote tenant system entries per VN and overall 4096 entries on the
switch.
The configurable range for the VNID 1 to 16777214. 16777215 is reserved for internal purposes.
The following counter information is cleared for all configured NVGRE NVEs.
Parameter Description
Packets TX Number of unicast packets sent to the NVE.
Packets RX Number of unicast packets received from the NVE.
Bytes TX Number of unicast bytes sent to the NVE.
Bytes RX Number of unicast bytes received from the NVE.
The following counter information is cleared for all configured VXLAN VTEPs.
Parameter Description
Packets TX Number of unicast packets sent to the VTEP
Packets RX Number of unicast packets received from the VTEP
Bytes TX Number of unicast bytes sent to the VTEP
Bytes RX Number of unicast bytes received from the VTEP
Parameter Description
NVGRE Admin Mode Admin mode of NVGRE Enable/Disable
NVGRE ID Virtual Subnet ID (VSID)
Source Address Source IP address of the local TEP
VLAN Associated VLAN ID to classify access ports
Access Ports List of access ports associated with this VN
Remote TEPs List of remote NVEs participating in this VN
Example:
(Routing) (Config)#show nvgre
Tenant VLAN.................................... 10
Access Ports................................... 0/2
Remote TEPs.................................... 10.10.10.1
100.100.100.1
Parameter Description
NVGRE ID Virtual subnet ID (VSID)
Remote NVE Remote NVE IP address
Up Time How long the NVE has been reachable
Reachable Whether the NVE is currently reachable
Reachable Transitions Number of times the NVE has transitioned to reachable state
Packets TX Number of unicast packets sent to the NVE
Packets RX Number of unicast packets received from the NVE
Bytes TX Number of unicast bytes sent to the NVE
Bytes RX Number of unicast bytes received from the NVE
Example:
Uptime Reachable
Remote NVE (sec) Reachable Transitions
--------------------------------------------------------
10.10.10.1 0 NO 0
100.100.100.1 0 NO 0
NVGRE ID....................................... 1
Remote NVE..................................... 10.10.10.1
Reachable...................................... NO
Uptime (sec)................................... 0
Reachable Transitions.......................... 0
Unicast Counters
-----------------------------------------------
Packets Tx..................................... 0
Packets Rx..................................... 0
Bytes Tx....................................... 0
Bytes Rx....................................... 0
Parameter Description
Tenant MAC MAC address of a host or tenant system
NVE IP address of NVE if the tenant system is behind the remote NVE. This is valid for remote tenant
system, otherwise, it is blank.
Interface Access interface on which MAC entry is learned or configured. This is valid for tenant system on local
access interface, otherwise, it is blank.
Entry Type Configured or learned
Age How long since the entry was learned. Not applicable for configured entries.
Example:
The user may also optionally filter entries based on tenant system location, local or remote. Local entries are reachable
through configured local access ports. Remote entries are behind the remote NVEs and reachable through the configured
NVGREs to remote NVEs.
Parameter Description
Tenant ID Virtual Subnet ID (VSID)
Tenant MAC MAC address of a host or tenant system
NVE IP address of NVE if the tenant system is behind the remote NVE. This is valid for the remote tenant
system, otherwise, it is blank.
Interface Access interface on which the MAC entry is learned or configured. This valid for the tenant system on
the local access interface, otherwise, it is blank.
AppIfIndex Internal access or tunnel port handle.
Entry Type Configured or learned.
Example:
(Routing) #show nvgre tenant-systems
Parameter Description
VXLAN Admin Mode Admin mode of VXLAN Enable/Disable
Parameter Description
Destination UDP Port UDP destination port used in VXLAN header
VXLAN ID Virtual network ID (VNID)
Source Address Source IP address of the local TEP
Access Ports List of access ports associated with this VXLAN
VLAN Associated VLAN ID to classify access ports
Remote TEPs List of remote VTEPs participating in this VXLAN
Example:
(Routing) (Config)#show vxlan
Parameter Description
Tenant MAC MAC address of tenant system
VTEP Remote VTEP IP address
Interface Access interface on which MAC entry is learned or configured
Entry Type Configured or learned
Age How long since the entry was learned. Not applicable for configured entries.
Example:
User may also optionally filter entries based on tenant system location, local or remote. Local entries are reachable through
configured local VN access ports. Remote entries are behind the remote VTEPs and reachable through the configured
VXLANs to remote VTEPs.
Parameter Description
Tenant ID Virtual Subnet ID (VSID)
Tenant MAC MAC address of a host or tenant system
VTEP IP address of the VTEP if the tenant system is behind the remote VTEP. This is valid for the remote
tenant system, otherwise it is blank.
Interface Access interface on which the MAC entry is learned or configured. This valid for the tenant system on
the local access interface, otherwise it is blank.
AppIfIndex Internal access or tunnel port handle.
Entry Type Configured or learned.
Example:
(Routing) #show vxlan tenant-systems
Parameter Description
VXLAN ID Virtual Network ID (VNID)
Remote VTEP Remote VTEP IP address
Dest UDP Port UDP destination port used in UDP header
Up Time How long the VTEP has been reachable
Reachable Whether the VTEP is currently reachable
Reachable Transitions Number of times the VTEP has transitioned to reachable state.
Packets TX Number of unicast packets sent to the VTEP
Packets RX Number of unicast packets received from the VTEP
Parameter Description
Bytes TX Number of unicast bytes sent to the VTEP
Bytes RX Number of unicast bytes received from the VTEP
Example:
VXLAN ID....................................... 1
Remote VTEP.................................... 20.20.20.1
Destination UDP Port........................... 4789
Reachable...................................... NO
Uptime (sec)................................... 0
Reachable Transitions.......................... 0
Unicast Counters
-----------------------------------------------
Packets Tx..................................... 0
Packets Rx..................................... 0
Bytes Tx....................................... 0
Bytes Rx....................................... 0
NOTE: The commands in this chapter are in one of three functional groups:
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration command, there
is a show command that displays the configuration setting.
Clear commands clear some or all of the settings to factory defaults.
7.1.1 arp
This command creates an ARP entry in the specified virtual router instance (vrf vrf-name). If a virtual router is not specified,
the static ARP entry is created in the default router. The value for ipaddress is the IP address of a device on a subnet
attached to an existing routing interface. The parameter macaddr is a unicast MAC address for that device. The interface
parameter specifies the next hop interface.
The format of the MAC address is six 2-digit hexadecimal numbers that are separated by colons, for example
00:06:29:32:81:40.
Format arp [vrf vrf-name] ipaddress macaddr interface {slot/port | vlan id}
Mode Global Config
7.1.1.0.1 no arp
This command deletes an ARP entry in the specified virtual router. The value for ipaddress is the IP address of a device
on a subnet attached to an existing routing interface. The parameter macaddr is a unicast MAC address for that device. The
interface parameter specifies the next hop interface.
Format no arp [vrf vrf-name] ipaddress macaddr interface {slot/port | vlan id}
Mode Global Config
The disadvantage of enabling dynamic renew is that once an ARP cache entry is created, that cache entry continues to take
space in the ARP cache as long as the neighbor continues to respond to ARP requests, even if no traffic is being forwarded
to the neighbor. In a network where the number of potential neighbors is greater than the ARP cache capacity, enabling
dynamic renew could prevent some neighbors from communicating because the ARP cache is full.
Default disabled
Format arp dynamicrenew
Mode Privileged EXEC
Format arp purge [vrf vrf-name] ipaddress interface {slot/port | vlan id}
Mode Privileged EXEC
Parameter Description
ipaddress The IP address to remove from the ARP cache.
Parameter Description
vrf-name The virtual router from which IP addresses will be removed.
interface The interface from which IP addresses will be removed.
7.1.5 resptime
This command configures the ARP request response timeout.
The value for seconds is a valid positive integer, which represents the IP ARP entry response timeout time in seconds. The
range for seconds is between 1 to 10 seconds.
Default 1
Format arp resptime seconds
Mode Global Config
The value for retries is an integer, which represents the maximum number of request for retries. The range for retries is
an integer between 0 to 10 retries.
Default 4
Format arp retries 0-10
Mode Global Config
The value for seconds is a valid positive integer, which represents the IP ARP entry ageout time in seconds. The range for
seconds is between 15 to 21600 seconds.
Default 1200
Format arp timeout 15-21600
Parameter Description
Age Time (seconds) The time it takes for an ARP entry to age out. This is configurable. Age time is measured in seconds.
Response Time The time it takes for an ARP request timeout. This value is configurable. Response time is measured in
(seconds) seconds.
Retries The maximum number of times an ARP request is retried. This value is configurable.
Cache Size The maximum number of entries in the ARP table. This value is configurable.
Dynamic Renew Mode Displays whether the ARP component automatically attempts to renew dynamic ARP entries when they age out.
Parameter Description
Total Entry Count The total entries in the ARP table and the peak entry count in the ARP table.
Current / Peak
Static Entry Count The static entry count in the ARP table and maximum static entry count in the ARP table.
Current / Max
Parameter Description
IP Address The IP address of a device on a subnet attached to an existing routing interface.
MAC Address The hardware MAC address of that device.
Interface The routing slot/port associated with the device ARP entry.
Type The type that is configurable. The possible values are Local, Gateway, Dynamic and Static.
Age The current age of the ARP entry since last refresh (in hh:mm:ss format).
Parameter Description
Age Time (seconds) The time it takes for an ARP entry to age out. This value is configurable. Age time is measured in seconds.
Response Time The time it takes for an ARP request timeout. This value is configurable. Response time is measured in seconds.
(seconds)
Retries The maximum number of times an ARP request is retried. This value is configurable.
Cache Size The maximum number of entries in the ARP table. This value is configurable.
Dynamic Renew Mode Displays whether the ARP component automatically attempts to renew dynamic ARP entries when they age out.
Total Entry Count The total entries in the ARP table and the peak entry count in the ARP table.
Current / Peak
Static Entry Count The static entry count in the ARP table and maximum static entry count in the ARP table.
Current / Max
Parameter Description
IP Address The IP address of a device on a subnet attached to the switch.
MAC Address The hardware MAC address of that device.
Interface The routing slot/port associated with the device’s ARP entry.
7.2.1 routing
This command enables IPv4 routing for an interface or range of interfaces. You can view the current value for this function
with the show ip brief command. The value is labeled as “Routing Mode.”
Default disabled
Format routing
Mode Interface Config
7.2.1.0.1 no routing
This command disables routing for an interface.
You can view the current value for this function with the show ip brief command. The value is labeled as “Routing Mode.”
Format no routing
Mode Interface Config
7.2.2 ip routing
This command enables the IP Router Admin Mode.
Format ip routing
Mode Global Config
Virtual Router Config
7.2.2.0.1 no ip routing
This command disables the IP Router Admin Mode.
Format no ip routing
Mode Global Config
7.2.3 ip address
This command configures an IP address on an interface or range of interfaces. You can also use this command to configure
one or more secondary IP addresses on the interface. The command supports RFC 3021 and accepts using 31-bit prefixes
on IPv4 point-to-point links. This command adds the label IP address in the show ip interface command.
NOTE: The 31-bit subnet mask is only supported on routing interfaces. The feature is not supported on network port and
service port interfaces because EFOS acts as a host, not a router, on these management interfaces.
Parameter Description
ipaddr The IP address of the interface.
Parameter Description
subnetmask A 4-digit dotted-decimal number that represents the subnet mask of the interface.
masklen Implements RFC 3021. Using the / notation of the subnet mask, this is an integer that indicates the length of the
subnet mask. Range is 5 to 32 bits.
Example: The following example of the command shows the configuration of the subnet mask with an IP address in the
dotted decimal format on interface vlan 100.
(Routing) (Interface vlan 300)#ip address 192.168.10.1 255.255.255.254
Example: The next example of the command shows the configuration of the subnet mask with an IP address in the /
notation on interface vlan 100.
7.2.3.0.1 no ip address
This command deletes an IP address from an interface. The value for ipaddr is the IP address of the interface in a.b.c.d
format where the range for a, b, c, and d is 1 to 255. The value for subnetmask is a 4-digit dotted-decimal number that
represents the Subnet Mask of the interface. To remove all of the IP addresses (primary and secondary) configured on the
interface, enter the command no ip address.
Format no ip address [{ipaddr subnetmask [secondary]}]
Mode Interface Config
To enable the DHCPv4 client on an in-band interface and send DHCP client messages with the client identifier option (DHCP
Option 61), use the ip address dhcp client-id configuration command in interface configuration mode.
Default disabled
Format ip address dhcp [client-id]
Mode Interface Config
7.2.5 ip default-gateway
This command manually configures a default gateway for the switch. Only one default gateway can be configured. If you
invoke this command multiple times, each command replaces the previous value.
7.2.5.0.1 no ip default-gateway
This command removes the default gateway address from the configuration.
7.2.6 ip load-sharing
This command configures IP ECMP load balancing mode.
Default 6
Format ip load-sharing mode {inner | outer}
Mode Global Config
Parameter Description
mode Configures the load balancing or sharing mode for all EMCP groups.
1: Based on a hash using the Source IP address of the packet.
2: Based on a hash using the Destination IP address of the packet.
3: Based on a hash using the Source and Destination IP addresses of the packet.
4: Based on a hash using the Source IP address and the Source TCP/UDP Port field of the packet.
5: Based on a hash using the Destination IP address and the Destination TCP/UDP Port field of the packet.
6: Based on a hash using the Source and Destination IP address, and the Source and Destination TCP/UDP
Port fields of the packet.
inner Use the inner IP header for tunneled packets.
outer Use the outer IP header for tunneled packets.
7.2.6.0.1 no ip load-sharing
Format no ip load-sharing
Mode Global Config
IPsec packets are IPv4 and IPv6 packets with the following IP protocols:
IP protocol 50—Encapsulating Security Payload (ESP)
IP protocol 51—Authentication Header (AH).
The ESP and AH protocols do not employ the IP source and destination port numbers, so the hardware does not use the IP
port numbers for hashing the packets. The ESP and AH packet headers contain the SPI field, which is associated with packet
flows and can be used for hashing IPsec packets.
Default enabled
Format ip ipsec-load-sharing spi
Mode Global Config
NOTE: This command can be used on in-band ports as well as the service or network (out-of-band) port.
7.2.12 ip route
This command configures a static route. Use the optional vrf parameter to configure the static route in the specified virtual
router instance. The ipaddr parameter is a valid IP address, and subnetmask is a valid subnet mask. The nexthopip
parameter is a valid IP address of the next hop router. Specifying Null0 as nexthop parameter adds a static reject route. The
optional preference parameter is an integer (value from 1 to 255) that allows you to specify the preference value
(sometimes called “administrative distance”) of an individual static route. Among routes to the same destination, the route
with the lowest preference value is the route entered into the forwarding database. By specifying the preference of a static
route, you control whether a static route is more or less preferred than routes from dynamic routing protocols. The preference
also controls whether a static route is more or less preferred than other static routes to the same destination. A route with a
preference of 255 cannot be used to forward traffic.
This command also enables static provisioning of MPLS tunnels based on the MPLS labels parameters. Up to three MPLS
labels can be specified as part of this command. The unique identifier for the tunnel is the nexthop IPv4 address and the
MPLS labels. The label-1 appears first in the packet (outer label) followed by the optional labels, label-2 and label-3. The
mplsd-label values are 20-bit MPLS labels. The valid range of an MPLS label is 16 to 1048575.
NOTE: The nexthop IPv4 address along with MPLS-labels define the nexthop. So, you can configure a route to the same
network with the same nexthop IPv4 address but with different MPLS-labels.
Use the track object-number to specify that the static route is installed only if the configured track object is up. When the
track object is down the static route is removed from the Route Table. Use the no form of this command to delete the tracked
static route. The object-number parameter is the object number representing the object to be tracked. The range is from 1
to 128. Only one track object can be associated with a specific static route. If you configure a different track object, the
previously configured track object is replaced by the newly configured track object. To display the IPv4 static routes that
being tracked by track objects, use the show ip route track-table command.
For the static routes to be visible, you must perform the following steps:
Enable IP routing globally.
Default preference—1
Format ip route [vrf vrf-name]ipaddr subnetmask { nexthopip | Null0 | interface {slot/port|
vlan-id}} [mplsd-label label-1] [mplsd-label label-2] [mplsd-label label-3]
[preference] [description description] [track object-number]
Mode Global Config
Example:
Subnetwork 9.0.0.0/24 is a connected subnetwork in global table and subnet 56.6.6.0/24 is reachable using a gateway
9.0.0.2 in the global table.
Now we leak the 2 routes from global route table into the virtual router Red and leak the connected subnet 8.0.0.0/24 from
Red to global table.
When leaking connected route in the global routing table to a virtual router, the /32 host route for the leaked host is added
in the virtual router instance’s route table.
Also we add a non-leaked static route for 66.6.6.0/24 subnetwork scoped to the domain of virtual router Red in the following
example.
Routes leaked from global routing table to VRF’s route table are :
(Router) (Config)#ip route vrf Red 9.0.0.2 255.255.255.255 9.0.0.2 0/26
(Router) (Config)#ip route vrf Red 56.6.6.0 255.255.255.0 9.0.0.2 0/26
7.2.12.0.1 no ip route
This command deletes a single next hop to a destination static route. If you use the nexthopip parameter, the next hop is
deleted.
Format no ip route ipaddr subnetmask {nexthopip | Null0 | interface {slot/port | vlan vlan-id}}
Mode Global Config
This command also enables static provisioning of MPLS tunnels based on the MPLS labels parameters. Up to three MPLS
labels can be specified as part of this command. The unique identifier for the tunnel is the nexthop IPv4 address and the
MPLS labels. The label-1 appears first in the packet (outer label) followed by the optional labels, label-2 and label-3.
The mplsd-label values are 20-bit MPLS labels. The valid range of an MPLS label is 16 to 1048575.
Default preference—1
Format ip route default [vrf vrf-name] nexthopip [mplsd-label label-1][mplsd-label label-2]
[mplsd-label label-3][preference]
Mode Global Config
Default 1
Format ip route distance 1-255
Mode Global Config
Parameter Description
prefix/prefix-length The destination network and mask for the route.
nexthopip The next-hop ip address, It must belong to an active routing interface, but it does not need to be resolved.
num-routes The number of routes need to added into hardware starting from the given prefix argument and within the given
prefix-length.
This command is supported in IPv4 networks. The maximum number of IP static BFD sessions that can be supported is
limited by the maximum BFD sessions configurable per DUT.
Parameter Description
interface Specify the local interface either in unit/slot/port format or as a VLAN ID.
neighbor IP address Specify the other end of the BFD session, peer address.
Example:
(localhost) #configure
(localhost) (Config)#interface 0/29
(localhost) (Interface 0/29)#routing
(localhost) (Interface 0/29)#ip address 1.1.1.1 /24
(localhost) (Interface 0/29)#bfd interval 100 min_rx 100 multiplier 5
(localhost) (Interface 0/29)#exit
!Current Configuration:
!
interface 0/29
no shutdown
routing
ip address 1.1.1.1 255.255.255.0
bfd interval 100 min_rx 100 multiplier 5
exit
7.2.17 ip netdirbcast
This command enables the forwarding of network-directed broadcasts on an interface or range of interfaces. When enabled,
network directed broadcasts are forwarded. When disabled, they are dropped.
Default disabled
Format ip netdirbcast
Mode Interface Config
7.2.17.0.1 no ip netdirbcast
This command disables the forwarding of network-directed broadcasts. When disabled, network directed broadcasts are
dropped.
Format no ip netdirbcast
Mode Interface Config
7.2.18 ip mtu
This command sets the IP Maximum Transmission Unit (MTU) on a routing interface or range of interfaces. The IP MTU is
the size of the largest IP packet that can be transmitted on the interface without fragmentation. Forwarded packets are
dropped if they exceed the IP MTU of the outgoing interface.
Packets originated on the router, such as OSPF packets, may be fragmented by the IP stack.
OSPF advertises the IP MTU in the Database Description packets it sends to its neighbors during database exchange. If two
OSPF neighbors advertise different IP MTUs, they will not form an adjacency. (unless OSPF has been instructed to ignore
differences in IP MTU with the ip ospf mtu-ignore command.)
NOTE: The IP MTU size refers to the maximum size of the IP packet (IP Header + IP payload). It does not include any
extra bytes that may be required for Layer-2 headers. To receive and process packets, the Ethernet MTU (see the
mtu command) must take into account the size of the Ethernet header.
7.2.18.0.1 no ip mtu
This command resets the ip mtu to the default value.
Format no ip mtu
Mode Interface Config
Default Interface route installation for receiving gratuitous ARP is enabled by default.
Format ip unnumbered gratuitous-arp accept
Mode Interface Config
Parameter Description
interface The numbered interface providing the borrowed address. This interface cannot be unnumbered. The
loopback interface is identified by its loopback interface number.
7.2.21 encapsulation
This command configures the link layer encapsulation type for the packet on an interface or range of interfaces. The
encapsulation type can be ethernet or snap.
Default ethernet
Format encapsulation {ethernet | snap}
Mode Interface Config
NOTE: Routed frames are always Ethernet encapsulated when a frame is routed to a VLAN.
Parameter Description
IP address, Subnet mask The IP address and network mask leased from the DHCP server.
DHCP Lease server The IPv4 address of the DHCP server that leased the address.
State State of the DHCPv4 Client on this interface.
DHCP transaction ID The transaction ID of the DHCPv4 Client.
Lease The time (in seconds) that the IP address was leased by the server.
Renewal The time (in seconds) when the next DHCP renew Request is sent by DHCPv4 Client to renew the
leased IP address.
Rebind The time (in seconds) when the DHCP Rebind process starts.
Retry count Number of times the DHCPv4 client sends a DHCP REQUEST message before the server
responds.
Parameter Description
Default Time to Live The computed TTL (Time to Live) of forwarding a packet from the local router to the final destination.
Routing Mode Shows whether the routing mode is enabled or disabled.
Maximum Next Hops The maximum number of next hops the packet can travel.
Parameter Description
Maximum Routes The maximum number of routes the packet can travel.
Maximum Static Routes The maximum number of static routes that can be configured.
ICMP Rate Limit Interval Shows how often the token bucket is initialized with burst-size tokens. Burst-interval is from 0 to
2147483647 milliseconds. The default burst-interval is 1000 ms.
ICMP Rate Limit Burst Size Shows the number of ICMPv4 error messages that can be sent during one burst-interval. The range is
from 1 to 200 messages. The default value is 100 messages.
ICMP Echo Replies Shows whether ICMP Echo Replies are enabled or disabled.
ICMP Redirects Shows whether ICMP Redirects are enabled or disabled.
System uRPF Mode Shows whether unicast Reverse Path Forwarding (uRPF) is enabled.
Example: The following shows example CLI display output for the command.
(Routing) #show ip brief
Parameter Description
interface-name Identifies a specific interface.
Field Description
DHCP DISCOVER The number of DHCP Discover packets sent by the client.
DHCP REQUEST The number of DHCP Request packets sent by the client.
DHCP RELEASE The number of DHCP Release packets sent by the client.
DHCP INFORM The number of DHCP Inform packets sent by the client.
DHCP REBIND The number of DHCP Rebind packets sent by the client.
DHCP RENEW The number of DHCP Renew packets sent by the client.
Field Description
DHCP OFFER The number of DHCP Offer packets received by the client.
DHCP ACK The number of DHCP ACK packets received by the client.
DHCP NACK The number of DHCP NACK packets received by the client.
Example: The following example shows the output from this command when the DHCP client is enabled on interface 0/5.
(Routing)#show ip dhcp client statistics interface 0/5
Messages Sent
---------- ------
DHCP DISCOVER.................................. 1
DHCP REQUEST................................... 0
DHCP RELEASE................................... 0
DHCP INFORM.................................... 0
DHCP REBIND.................................... 0
DHCP RENEW..................................... 0
Messages Received
---------- ----------
DHCP OFFER..................................... 0
DHCP ACK....................................... 0
DHCP NACK...................................... 0
Example: The following example of this command displays the client-specific DHCP statistics on all interfaces.
Messages Sent
---------- ------
DHCP DISCOVER.................................. 4
DHCP REQUEST................................... 0
DHCP RELEASE................................... 0
DHCP INFORM.................................... 0
DHCP REBIND.................................... 0
DHCP RENEW..................................... 0
Messages Received
---------- ----------
DHCP OFFER..................................... 0
DHCP ACK....................................... 0
DHCP NACK...................................... 0
Messages Sent
---------- ------
DHCP DISCOVER.................................. 2
DHCP REQUEST................................... 0
DHCP RELEASE................................... 0
DHCP INFORM.................................... 0
DHCP REBIND.................................... 0
DHCP RENEW..................................... 0
Messages Received
---------- ----------
DHCP OFFER..................................... 0
DHCP ACK....................................... 0
DHCP NACK...................................... 0
Parameter Description
Routing Interface Status Determine the operational status of IPv4 routing Interface. The possible values are Up or Down.
Unnumbered For unnumbered interfaces, the IP address of the borrowed interface.
Primary IP Address The primary IP address and subnet masks for the interface. This value appears only if you configure
it.
Method Shows whether the IP address was configured manually or acquired from a DHCP server.
Secondary IP Address One or more secondary IP addresses and subnet masks for the interface. This value appears only
if you configure it.
Helper IP Address The helper IP addresses configured by the command ip helper-address (Interface Config).
Routing Mode The administrative mode of router interface participation. The possible values are enable or disable.
This value is configurable.
Administrative Mode The administrative mode of the specified interface. The possible values of this field are enable or
disable. This value is configurable.
Forward Net Directed Broadcasts Displays whether forwarding of network-directed broadcasts is enabled or disabled. This value is
configurable.
Active State Displays whether the interface is active or inactive. An interface is considered active if its link is up
and it is in forwarding state.
Link Speed Data Rate An integer representing the physical link data rate of the specified interface. This is measured in
Megabits per second (Mb/s).
MAC Address The burned in physical address of the specified interface. The format is six 2-digit hexadecimal
numbers that are separated by colons.
Encapsulation Type The encapsulation type for the specified interface. The types are: Ethernet or SNAP.
IP MTU The maximum transmission unit (MTU) size of a frame, in bytes.
Bandwidth Shows the bandwidth of the interface.
Destination Unreachables Displays whether ICMP Destination Unreachables may be sent (enabled or disabled).
ICMP Redirects Displays whether ICMP Redirects may be sent (enabled or disabled).
DHCP Client Identifier The client identifier is displayed in the output of the command only if DHCP is enabled with the
client-id option on the in-band interface. See the ip address dhcp command.
Interface Suppress Status Identifies whether the interface is suppressed.
Parameter Description
Interface Name The user-configured name of the interface.
Unicast Reverse Path Forwarding The uRPF mode on the interface. See the ip verify unicast source reachable-via command.
Mode
Unicast Reverse Path Forwarding Identifies whether the uRPF allow-default parameter has been set. See the ip verify unicast
Allow-Default source reachable-via command.
Example: The following shows example CLI display output for the command.
(Routing) #show ip interface 0/1
Example: In the following example the DHCP client is enabled on a VLAN routing interface.
Parameter Description
Interface Valid slot and port number separated by a forward slash.
State Routing operational state of the interface.
IP Address The IP address of the routing interface in 32-bit dotted decimal format. Unnumbered interfaces show unnumbered
and the corresponding numbered interface instead of the IP address.
IP Mask The IP mask of the routing interface in 32-bit dotted decimal format.
Method Indicates how each IP address was assigned. The field contains one of the following values:
DHCP - The address is leased from a DHCP server.
Manual - The address is manually configured.
Example: The following shows example CLI display output for the command.
(alpha1) #show ip interface brief
Example: The following shows example CLI display output for the command.
(Routing) #show ip load-sharing
ip load-sharing 6 inner
IPSEC Security Parameter Index (SPI) Hashing is Enabled.
Parameter Description
BGP Section:
Routing Protocol BGP.
Router ID The router ID configured for BGP.
Local AS Number The AS number that the local router is in.
BGP Admin Mode Whether BGP is globally enabled or disabled.
Maximum Paths The maximum number of next hops in an internal or external BGP route.
Always Compare MED Whether BGP is configured to compare the MEDs for routes received from peers in different ASs.
Maximum AS Path Limit on the length of AS paths that BGP accepts from its neighbors.
Length
Fast Internal Failover Whether BGP immediately brings down a iBGP adjacency if the routing table manager reports that the peer
address is no longer reachable.
Fast External Failover Whether BGP immediately brings down an eBGP adjacency if the link to the neighbor goes down.
Distance The default administrative distance (or route preference) for external, internal, and locally-originated BGP routes.
The table that follows lists ranges of neighbor addresses that have been configured to override the default
distance with a neighbor-specific distance. If a neighbor’s address falls within one of these ranges, routes from
that neighbor are assigned the configured distance. If a prefix list is configured, then the distance is only assigned
to prefixes from the neighbor that are permitted by the prefix list.
Redistribution A table showing information for each source protocol (connected, static, and ospf). For each of these sources the
distribution list and route-map are shown, as well as the configured metric. Fields which are not configured are
left blank. For ospf, an additional line shows the configured ospf match parameters.
Prefix List In The global prefix list used to filter inbound routes from all neighbors.
Prefix List Out The global prefix list used to filter outbound routes to all neighbors.
Networks Originated The set of networks originated through a network command. Those networks that are actually advertised to
neighbors are marked “active.”
Neighbors A list of configured neighbors and the inbound and outbound policies configured for each.
OSPFv2 Section:
Routing Protocol OSPFv2.
Router ID The router ID configured for OSPFv2.
OSPF Admin Mode Whether OSPF is enabled or disabled globally.
Maximum Paths The maximum number of next hops in an OSPF route.
Routing for Networks The address ranges configured with an OSPF network command.
Distance The administrative distance (or “route preference”) for intra-area, inter-area, and external routes.
Default Route Whether OSPF is configured to originate a default route.
Advertise
Always Whether default advertisement depends on having a default route in the common routing table.
Parameter Description
Metric The metric configured to be advertised with the default route.
Metric Type The metric type for the default route.
Redist Source A type of routes that OSPF is redistributing.
Metric The metric to advertise for redistributed routes of this type.
Metric Type The metric type to adveritse for redistributed routes of this type.
Subnets Whether OSPF redistributes subnets of classful addresses, or only classful prefixes.
Dist List A distribute list used to filter routes of this type. Only routes that pass the distribute list are redistributed.
Number of Active The number of OSPF areas with at least one interface running on this router. Also broken down by area type.
Areas
ABR Status Whether the router is currently an area border router. A router is an area border router if it has interfaces that are
up in more than one area.
ASBR Status Whether the router is an autonomous system boundary router. The router is an ASBR if it is redistributing any
routes or originating a default route.
Example: The following shows example CLI display output for the command.
(Router) #show ip protocols
Redistributing:
Source Metric Dist List Route Map
--------- ---------- ----------------------- ---------------------------
connected connected_list
static 32120 static_routemap
ospf ospf_map
ospf match: int ext1 nssa-ext2
Networks Originated:
10.1.1.0 255.255.255.0 (active)
20.1.1.0 255.255.255.0
Neighbors:
172.20.1.100
Filter List In........................ 1
Filter List Out....................... 2
Prefix List In........................ PfxList2
Prefix List Out....................... PfxList3
Redist
Source Metric Metric Type Subnets Dist List
--------- ------- ----------- ------- ---------
static default 2 Yes None
connected 10 2 Yes 1
NOTE: If you use the connected keyword for protocol, the all option is not available because there are no best or
non-best connected routes.
Parameter Description
Route Codes The key for the routing protocol codes that might appear in the routing table output.
The show ip route command displays the routing tables in the following format:
The columns for the routing table display the following information.
Parameter Description
Code The codes for the routing protocols that created the routes.
Default Gateway The IP address of the default gateway. When the system does not have a more specific route to a packet's
destination, it sends the packet to the default gateway.
IP-Address/Mask The IP-Address and mask of the destination network corresponding to this route.
Preference The administrative distance associated with this route. Routes with low values are preferred over routes with
higher values.
Metric The cost associated with this route.
using Next-Hop The outgoing router IP address to use when forwarding traffic to the next router (if any) in the path toward the
destination.
Route-Timestamp The last updated time for dynamic routes. The format of Route-Timestamp will be
Days:Hours:Minutes if days ≥ 1
Hours:Minutes:Seconds if days < 1
Interface The outgoing router interface to use when forwarding traffic to the next destination. For reject routes, the next hop
interface would be Null0 interface.
T A flag appended to a route to indicate that it is an ECMP route, but only one of its next hops has been installed
in the forwarding table. The forwarding table may limit the number of ECMP routes or the number of ECMP
groups. When an ECMP route cannot be installed because such a limit is reached, the route is installed with a
single next hop. Such truncated routes are identified by a T after the interface name.
To administratively control the traffic destined to a particular network and prevent it from being forwarded through the router,
you can configure a static reject route on the router. Such traffic would be discarded and the ICMP destination unreachable
message is sent back to the source. This is typically used for preventing routing loops. The reject route added in the RTO is
of the type OSPF Inter-Area. Reject routes (routes of REJECT type installed by any protocol) are not redistributed by
OSPF. Reject routes are supported in OSPFv2.
Example: The following shows example CLI display output for the command.
(Routing) #show ip route
Subnetwork 9.0.0.0/24 is a connected subnetwork in global table and subnet 56.6.6.0/24 is reachable using a gateway
9.0.0.2 in the global table. These two routes leak into the virtual router Red and leak the connected subnet 8.0.0.0/24 from
Red to global table.
When leaking connected route in the global routing table to a virtual router, the /32 host route for the leaked host is added
in the virtual router instance’s route table. Leaking of non /32 connected routes into the virtual router table from global routing
table is not supported.
This enables the nodes in subnet 8.0.0.0/24 to access shared services using the global routing table. Also we add a non-
leaked static route for 66.6.6.0/24 subnetwork scoped to the domain of virtual router Red.
The routes obtained from the kernel can be configured to be redistributed in the kernel. The CLI command (in both IPv4 and
Pv6) BGP Router mode has the kernel option kernel.
(7001) (Config)#router bgp 65401
(7001) (Config-router)#redistribute ?
(7001) (config-router-af)#redistribute ?
Example: The following shows example CLI display output for the command.
(router) #show ip route ecmp-groups
Example:
(Routing) #show ip route net-prototype
Example:
(localhost)#show ip route static bfd
When the optional all keyword is given, some statistics, such as the number of routes from each source, include counts for
alternate routes. An alternate route is a route that is not the most preferred route to its destination and therefore is not
installed in the forwarding table. To include only the number of best routes, do not use the optional keyword.
Parameter Description
Connected Routes The total number of connected routes in the routing table.
Static Routes Total number of static routes in the routing table.
RIP Routes Total number of routes installed by RIP protocol.
BGP Routes Total number of routes installed by the BGP protocol.
External The number of external BGP routes.
Internal The number of internal BGP routes.
Local The number of local BGP routes.
OSPF Routes Total number of routes installed by OSPF protocol.
Intra Area Routes Total number of Intra Area routes installed by OSPF protocol.
Inter Area Routes Total number of Inter Area routes installed by OSPF protocol.
Parameter Description
External Type-1 Total number of External Type-1 routes installed by OSPF protocol.
Routes
External Type-2 Total number of External Type-2 routes installed by OSPF protocol.
Routes
Reject Routes Total number of reject routes installed by all protocols.
Net Prototype Routes The number of net-prototype routes.
Total Routes Total number of routes in the routing table.
Best Routes (High) The number of best routes currently in the routing table. This number only counts the best route to each
destination. The value in parentheses indicates the highest count of unique best routes since counters were last
cleared.
Alternate Routes The number of alternate routes currently in the routing table. An alternate route is a route that was not selected
as the best route to its destination.
Route Adds The number of routes that have been added to the routing table.
Route Modifies The number of routes that have been changed after they were initially added to the routing table.
Route Deletes The number of routes that have been deleted from the routing table.
Unresolved Route The number of route adds that failed because none of the route’s next hops were on a local subnet. Note that
Adds static routes can fail to be added to the routing table at startup because the routing interfaces are not yet up. This
counter gets incremented in this case. The static routes are added to the routing table when the routing interfaces
come up.
Invalid Route Adds The number of routes that failed to be added to the routing table because the route was invalid. A log message
is written for each of these failures.
Failed Route Adds The number of routes that failed to be added to the routing table because of a resource limitation in the routing
table.
Hardware Failed The number of routes failed be inserted into the hardware due to hash error or a table full condition.
Route Adds
Reserved Locals The number of routing table entries reserved for a local subnet on a routing interface that is down. Space for local
routes is always reserved so that local routes can be installed when a routing interface bounces.
Unique Next Hops The number of distinct next hops used among all routes currently in the routing table. These include local
(High) interfaces for local routes and neighbors for indirect routes. The value in parentheses indicates the highest count
of unique next hops since counters were last cleared.
Next Hop Groups The current number of next hop groups in use by one or more routes. Each next hop group includes one or more
(High) next hops. The value in parentheses indicates the highest count of next hop groups since counters were last
cleared.
ECMP Groups (High) The number of next hop groups with multiple next hops. The value in parentheses indicates the highest count of
next hop groups since counters were last cleared.
ECMP Groups The number of next hop groups with multiple next hops.
ECMP Routes The number of routes with multiple next hops currently in the routing table.
Truncated ECMP The number of ECMP routes that are currently installed in the forwarding table with just one next hop. The
Routes forwarding table may limit the number of ECMP routes or the number of ECMP groups. When an ECMP route
cannot be installed because such a limit is reached, the route is installed with a single next hop.
ECMP Retries The number of ECMP routes that have been installed in the forwarding table after initially being installed with a
single next hop.
Routes with n Next The current number of routes with each number of next hops.
Hops
Example: The following shows example CLI display output for the command.
(Routing) #show ip route summary
Connected Routes............................... 7
Static Routes.................................. 1
RIP Routes..................................... 20
BGP Routes..................................... 10
External..................................... 0
Internal..................................... 10
Local........................................ 0
OSPF Routes.................................... 1004
Intra Area Routes............................ 4
Inter Area Routes............................ 1000
External Type-1 Routes....................... 0
External Type-2 Routes....................... 0
Reject Routes.................................. 0
Net Prototype Routes........................... 10004
Total routes................................... 1032
Connected Routes............................... 8
Static Routes.................................. 62
Unnumbered Peer Routes......................... 0
RIP Routes..................................... 0
BGP Routes..................................... 0
External..................................... 0
Internal..................................... 0
Local........................................ 0
Parameter Description
Local The local route preference value.
Parameter Description
Static The static route preference value.
BGP External The BGP external route preference value.
OSPF Intra The OSPF Intra route preference value.
OSPF Inter The OSPF Inter route preference value.
OSPF External The OSPF External route preference value.
RIP The RIP route preference value.
BGP Internal The BGP internal route preference value.
BGP Local The BGP local route preference value.
Configured Default Gateway The route preference value of the statically-configured default gateway
DHCP Default Gateway The route preference value of the default gateway learned from the DHCP server.
Example: The following shows example CLI display output for the command.
(alpha-stack) #show ip route preferences
Local.......................................... 0
Static......................................... 1
BGP External................................... 20
OSPF Intra..................................... 110
OSPF Inter..................................... 110
OSPF External.................................. 110
RIP............................................ 120
BGP Internal................................... 200
BGP Local...................................... 200
Configured Default Gateway..................... 253
DHCP Default Gateway........................... 254
Parameter Description
Heap Size The amount of memory, in bytes, allocated at startup for the routing heap.
Memory In Use The number of bytes currently allocated.
Parameter Description
Memory on Free List The number of bytes currently on the free list. When a chunk of memory from the routing heap is freed, it is placed
on a free list for future reuse.
Memory Available in The number of bytes in the original heap that have never been allocated.
Heap
In Use High Water The maximum memory in use since the system last rebooted.
Mark
Example: The following shows example CLI display output for the command.
(Router) #show routing heap summary
Parameter Description
Half-life period The number of seconds it takes for the penalty to reduce by half. The configurable range is 1 to 30 seconds.
Default value is 5 seconds.
Reuse Threshold The value of the penalty at which the dampened interface is restored. The configurable range is 1 to 20,000.
Default value is 1000.
Suppress Threshold The value of the penalty at which the interface is dampened. The configurable range is 1 to 20,000. Default value
is 2000.
Max Suppress Time The maximum amount of time (in seconds) an interface can be in suppressed state after it stops flapping. The
configurable range is 1 to 255 seconds. The default value is four times of half-life period. If half-period value is
allowed to default, the maximum suppress time defaults to 20 seconds.
Restart Penalty Penalty applied to the interface after the device reloads. The configurable range is 1 to 20,000. Default value is
2000.
7.3.1.0.1 no dampening
This command disables IP event dampening on a routing interface.
Format no dampening
Mode Interface Config
Example: The following shows example CLI display output for the command.
(Router)# show dampening interface
2 interfaces are configured with dampening.
1 interface is being suppressed.
Parameter Description
Flaps The number times the link state of an interface changed from UP to DOWN.
Penalty Accumulated Penalty.
Supp Indicates if the interface is suppressed or not.
ReuseTm Number of seconds until the interface is allowed to come up again.
HalfL Configured half-life period.
ReuseV Configured reuse-threshold.
SuppV Configured suppress threshold.
MaxSTm Configured maximum suppress time in seconds.
MaxP Maximum possible penalty.
Restart Configured restart penalty.
NOTE:
The CLI command clear counters resets the flap count to zero.
The interface CLI command no shutdown resets the suppressed state to False.
Any change in the dampening configuration resets the current penalty, reuse time and suppressed state to their
default values, meaning 0, 0, and FALSE respectively.
Example: The following shows example CLI display output for the command.
Router# show interface dampening
Interface 0/2
Flaps Penalty Supp ReuseTm HalfL ReuseV SuppV MaxSTm MaxP Restart
0 0 FALSE 0 5 1000 2000 20 16000 0
Interface 0/3
Flaps Penalty Supp ReuseTm HalfL ReuseV SuppV MaxSTm MaxP Restart
6 1865 TRUE 18 20 1000 2001 30 2828 1500
The Anycast IP Resilient Hashing feature works in concert with the IP Resilient hashing feature, which is enabled using the
ip resilient-hashing command. If IP resilient hashing is disabled, then the network administrator can still add routes to the IP
Anycast RH table, but the changes to these ECMP routes are not resilient.
If customers are unable or unwilling to add routes to the Anycast IP RH table, then they can still enable the IP Resilient
hashing mode and benefit from that feature. Some route modifications can be done resiliently without adding the routes to
the IP RH table, but some route modifications are not resilient. The customer can assess how well the network handles
various failure scenarios by running the network failure tests and using the dev hapiBroadL3DebugNonResilientShow
command to see how many ECMP route changes were resilient and non-resilient, and which ECMP routes were changed
non-resiliently.
7.4.1 ip anycast
Use this command to add an IPv4 route to the Anycast IP Resilient Hashing table. If the VRF name is not specified, then the
command applies to the default router instance.
Default none
Format ip anycast [vrf vrf-name] route/net-mask-length
Format ip anycast vrf red IPv4 Address/Network Mask Length
Mode Global Config
7.4.1.0.1 no ip anycast
Use this command to remove the specified IPv4 route from the Anycast IP Resilient Hashing table.
Default none
Format ipv6 anycast IPv6 Address/Network Mask Length
Mode Global Config
Parameter Description
vrf-name Optional VRF name. If the VRF name is not specified, then the content for the default VRF is displayed.
Example: The following shows an example of the command when the VRF name is specified.
(Routing)#show ip anycast vrf red
Example: The following shows an example of the command when the VRF name is not specified.
(Routing)#show ip anycast
Attention: The IP Resilient Hashing feature is disabled. The Anycast IP addresses listed below are not
modified resiliently. Use the “ip resilient-hashing” command to enable the IP Resilient Hashing
feature.
Parameter Description
vrf-name Optional VRF name. If the VRF name is not specified, then the content for the default VRF is displayed.
Example: The following shows an example of the command when the VRF name is specified.
(Routing)#show ipv6 anycast vrf red
Example: The following shows an example of the command when the VRF name is not specified.
(Routing)#show ipv6 anycast
Attention: The IP Resilient Hashing feature is disabled. The Anycast IP addresses listed below are not
modified resiliently. Use the “ip resilient-hashing” command to enable the IP Resilient Hashing
feature.
Loose mode: The path to the source IP address can be through any interface on the device. The packet need not need
to arrive on the same routing interface to which the source IP route lookup is resolved in order to pass the uRPF check
This command also causes the IP routing to be disabled and enabled if it was enabled prior to issuing the command.
.
Format system urpf enable
Mode Global Config
Example:
(Routing) #configure
(Routing) #system urpf enable
Warning! Enabling the system uRPF mode toggles the global routing mode in all VRFs,disrupting the L3
forwarding plane and control plane for few seconds.Enabling this mode also reduces the Route Table
capacity.
Example:
(Routing) (Config)#no system urpf enable
Warning! Disabling the system uRPF mode toggles the global routing mode in all VRFs,
disrupting the L3 forwarding plane and control plane for few seconds.
The same command works for both IPv4 and IPv6 interfaces.
Parameter Description
any The uRPF verification mode is set to loose. In any mode, a check is performed to see if the source address is
reachable in the routing table and when found the packet is forwarded.
rx The uRPF verification mode is set to strict. In rx mode, a check is performed to see if the source address is
reachable in the routing table using the same interface as to where the packet was received and when both these
conditions are met the packet is forwarded.
allow-default Include IP addresses not specifically contained in the routing table.
When allow-default is set in loose mode (any), if the source IP address is not found but a default route is
present in the table, the uRPF check will pass.
When allow-default is set in strict mode (rx), it will prevent the incoming packet's source IP address to have
a route out of a different interface than received. The strict mode option with the default route is used typically on
the upstream interface.
The Black Hole Detection (BHD) feature helps in getting notification logs intermittently whenever packets are getting
black-holed in the network. This feature is an alternative to uRPF in Clos networks and has the advantage of not cutting the
routing table in half.
Default disabled
Format bhd enable
Mode Global Config
Default disabled
Format bhd spine-port enable
Mode Interface Config
Example:
(Routing)# show bhd status
7.7.1 ip policy
Use this command to identify a route map to use for policy-based routing on an interface specified by route-map-name.
Policy-based routing is configured on the interface that receives the packets, not on the interface from which the packets are
sent.
When a route-map applied on the interface is changed, that is, if new statements are added to the route-map or match/set
terms are added to or removed from the route-map statement, and also if the route-map that is applied on an interface is
removed, the route-map needs to be removed from the interface and added back again for the changed route-map
configuration to take effect.
A route-map statement should contain eligible match/set conditions for policy-based routing to be applied to hardware.
Valid match conditions: match ip address acl, match mac-list, match length
Valid set conditions: set ip next-hop, set ip default next-hop, set ip precedence
A route-map statement should contain at least one match condition and one set condition as specified above for it to be
eligible to be applied to hardware. If not, the route-map is not applied to hardware.
When a route-map is applied on a VLAN interface and a DiffServ policy is applied on a member port of the same VLAN
interface, the port policy takes priority over the VLAN policy.
To disable policy based routing from an interface, use no form of this command
no ip policy route-map route-map-name
When a route-map has both IPv4 and IPv6 statements provisioned and the user applies the route-map using IP policy
command, the IPv6 statements in the route-map will not take effect. A message will be displayed to the user to indicate this.
Example:
(Routing) (Interface vlan 40)#ip policy route-map rm4
IPv6 statements in this route-map will not be applied using IPv4 policy-based routing.
7.7.2 route-map
To create a route map and enter Route Map Configuration mode, use the route-map command in Global Configuration
mode. One use of a route map is to limit the redistribution of routes to a specified range of route prefixes. The redistribution
command specifies a route map which refers to a prefix list. The prefix list identifies the prefixes that may be redistributed.
EFOS accepts up to 64 route maps.
Default No route maps are configured by default. If no permit or deny tag is given, permit is the default.
Format route-map map-tag [permit|deny] [sequence-number]
Mode Global Configuration
Parameter Description
map-tag Text name of the route map. Route maps with the same name are grouped together in order of their sequence
numbers. A route map name may be up to 32 characters long.
permit (Optional) Permit routes that match all of the match conditions in the route map.
deny (Optional) Deny routes that match all of the match conditions in the route map.
sequence-number (Optional) An integer used to order the set of route maps with the same name. Route maps are ordered from
lowest to greatest sequence number, with lower sequence numbers being considered first. If no sequence
number is specified, the system assigns a value ten greater than the last statement in the route map. The range
is 0 to 65,535.
Example: In the following example, BGP is configured to redistribute the all prefixes within 172.20.0.0 and reject all
others.
(Routing)(config)# ip prefix-list redist-pl permit 172.20.0.0/16 le 32
(Routing)(config)# route-map redist-rm permit
(Routing)(config-route-map)# match ip address prefix-list redist-pl
(Routing)(config-route-map)# exit
(Routing)(config) router bgp 1
(Routing)(Config-router) redistribute ospf route-map redist-rm
7.7.2.0.1 no route-map
To delete a route map or one of its statements, use the no form of this command.
If there are a list of IP access-lists specified in this command and the packet matches at least one of these access-list match
criteria, the corresponding set of actions in route-map are applied to packet.
If there are duplicate IP access-list numbers/names in this command, the duplicate configuration is ignored.
Parameter Description
Access-list-number The access-list number that identifies an access-list configured through access-list CLI configuration
commands. This number is 1 to 99 for standard access list number. This number is 100 to 199 for extended
access list number.
Access-list-name The access-list name that identifies named IP ACLs. Access-list name can be up to 31 characters in length.
A maximum of 16 ACLs can be specified in this ‘match’ clause.
Example: The following sequence shows creating a route-map with “match” clause on ACL number and applying that
route-map on an interface.
(Routing) (config)#access-list 1 permit ip 10.1.0.0 0.0.255.255
(Routing) (config)#access-list 2 permit ip 10.2.0.0 0.0.255.255
(Routing) (config)#route-map equal-access permit 10
(Routing) (config-route-map)#match ip address 1
(Routing) (config-route-map)#set ip default next-hop 192.168.6.6
(Routing) (config-route-map)#route-map equal-access permit 20
(Routing) (config-route-map)#match ip address 2
(Routing) (config-route-map)#set ip default next-hop 172.16.7.7
(Routing) (config)#interface 0/1
(Routing) (Interface 0/1)#ip address 10.1.1.1 255.255.255.0
(Routing) (Interface 0/1)#ip policy route-map equal-access
(Routing) (config)#interface 0/2
(Routing) (Interface 0/2)#ip address 192.168.6.5 255.255.255.0
(Routing) (config)#interface 0/3
(Routing) (Interface 0/3)#ip address 172.16.7.6 255.255.255.0
The ip policy route-map equal-access command is applied to interface 0/1. All packets coming inside
0/1 are policy-routed.
Sequence number 10 in route map equal-access is used to match all packets sourced from any host in
subnet 10.1.0.0. If there is a match, and if the router has no explicit route for the packet’s
destination, it is sent to next-hop address 192.168.6.6 .
Sequence number 20 in route map equal-access is used to match all packets sourced from any host in
subnet 10.2.0.0. If there is a match, and if the router has no explicit route for the packet’s
destination, it is sent to next-hop address 172.16.7.7.
Rest all packets are forwarded as per normal L3 destination-based routing.
Example: This example illustrates the scenario where IP ACL referenced by a route-map is removed or rules are added
or deleted from that ACL, this is how configuration is rejected.
(Routing) #
(Routing) #configure
(Routing) (route-map)#exit
(Routing) (Config)#exit
Request denied. Another application using this ACL restricts the number of rules allowed.
Request denied. Another application using this ACL restricts the number of rules allowed.
NOTE: This command is available for both IPv4 and IPv6 traffic. This command can policy route IPv4/IPv6 traffic for a
length match and an access-list match condition in addition to the match IPv4/IPv6 access-list condition.
A MAC ACL is configured before it is linked to a route-map. Actions present in MAC ACL configuration are applied with other
actions involved in route-map. When a MAC ACL referenced by a route-map is removed, the route-map rule is also removed
and the corresponding rule is not effective. When a MAC ACL referenced by a route-map is removed or rules are added or
deleted from that ACL, the configuration is rejected.
Parameter Description
mac-list-name The mac-list name that identifies MAC ACLs. MAC Access-list name can be up to 31 characters in length.
Example: This example illustrates the scenario where a MAC ACL, referenced by a route-map, is removed, or rules are
added, or deleted, from that ACL; this is how configuration is rejected.
(Routing) #
(Routing) #
(Routing) #configure
(Routing) (route-map)#exit
(Routing) (Config)#exit
Parameter Description
value A metric value, from 0 to 4,294,967,295 (any 32 bit integer).
Parameter Description
value External LSA metric-type (type1 or type2).
Parameter Description
value A tag value, from 0 to 4,294,967,295 (any 32 bit integer).
A route-map statement that is used for PBR is configured as permit or deny. If the statement is marked as deny, traditional
destination-based routing is performed on the packet meeting the match criteria. If the statement is marked as permit, and
if the packet meets all the match criteria, then set commands in the route-map statement are applied. If no match is found
in the route-map, the packet is not dropped, instead the packet is forwarded using the routing decision taken by performing
destination-based routing.
NOTE: This command can be used with both IPv4 and IPv6 traffic.
This command affects all incoming packet types and is always used if configured. If configured next-hop is not present in
the routing table, an ARP request is sent from the router.
In a route-map statement, ‘set ip next-hop’ and ‘set ip default next-hop’ terms are mutually exclusive. However, a ‘set ip
default next-hop’ can be configured in a separate route-map statement.
Parameter Description
ip-address The IP address of the next hop to which packets are output. It must be the address of an adjacent router. A maximum
of 16 next-hop IP addresses can be specified in this ‘set’ clause.
A packet is routed to the next hop specified by this command only if there is no explicit route for the packet’s destination
address in the routing table. A default route in the routing table is not considered an explicit route for an unknown destination
address.
In a route-map statement, set ip next-hop and set ip default next-hop terms are mutually exclusive. However, a set
ip next-hop can be configured in a separate route-map statement
Parameter Description
ip-address The IP address of the next hop to which packets are output. It must be the address of an adjacent router. A
maximum of 16 next-hop IP addresses can be specified in this ‘set’ clause.
Parameter Description
0 Sets the routine precedence
1 Sets the priority precedence
2 Sets the immediate precedence
3 Sets the Flash precedence
4 Sets the Flash override precedence
5 Sets the critical precedence
6 Sets the internetwork control precedence
7 Sets the network control precedence
Parameter Description
value A tag value, from 0 to 4,294,967,295 (any 32-bit integer).
Parameter Description
Interface The interface.
Route-map The route map
Parameter Description
map-name (Optional) Name of a specific route map.
Example: The following shows example CLI display output for the command.
(Routing) # show route-map test
(Routing) #
(Routing) #configure
(Routing) (Config)#exit
Example: The following output shows an example of the command when the specified route map is IPv6-based.
(dhcp-10-130-84-138)#show route-map
7.8.1 ip irdp
This command enables Router Discovery on an interface or range of interfaces.
Default disabled
Format ip irdp
Mode Interface Config
7.8.1.0.1 no ip irdp
This command disables Router Discovery on an interface.
Format no ip irdp
Mode Interface Config
Default 600
Format ip irdp maxadvertinterval 4-1800
Mode Interface Config
Parameter Description
Interface The interface (slot/port or VLAN) that matches the rest of the information in the row.
Ad Mode The advertise mode, which indicates whether router discovery is enabled or disabled on this interface.
Dest Address The destination IP address for router advertisements.
Max Int The maximum advertise interval, which is the maximum time, in seconds, allowed between sending router
advertisements from the interface.
Min Int The minimum advertise interval, which is the minimum time, in seconds, allowed between sending router
advertisements from the interface.
Hold Time The amount of time, in seconds, that a system should keep the router advertisement before discarding it.
Preference The preference of the address as a default router address, relative to other router addresses on the same subnet.
Parameter Description
vrf-name The name of the virtual router. The name is a string of up to 64 characters from an ASCII set.
Example: The following example creates two virtual router instances. The routing in the virtual router instance is enabled
only when ‘ip routing’ command is issued at the virtual router level.
(Router) (Config)#ip vrf Red
(Router) (Config-vrf-Red)#ip routing
(Router) (Config-vrf-Red)#exit
(Router) (Config)#ip vrf Blue
(Router) (Config-vrf-Blue)#ip routing
(Router) (Config-vrf-Blue)#exit
7.9.1.0.1 no ip vrf
Deletes the virtual router with the specified name.
Parameter Description
limit The number of routes for a virtual router instance in the total routing table space for the router. The
limit ranges from 1 to 4294967295. If the limit value is greater than the total router table size, it is
limited to the total size.
warn threshold The threshold value ranges from 1 to 100 and indicates the percent of the limit value at which a
warning message is to be generated. If no limit value is given the platform maximum is taken as
the limit value.
Example:
(Router) (Config)#ip vrf Red
(Router) (Config-vrf-Red)#ip routing
(Router) (Config-vrf-Red)#maximum routes 2048
(Router) (Config-vrf-Red)#maximum routes warn 80
(Router) (Config-vrf-Red)#exit
(Router) (Config)#ip vrf Blue
(Router) (Config-vrf-Blue)#ip routing
(Router) (Config-vrf-Blue)#maximum routes 4096
(Router) (Config-vrf-Blue)#exit
7.9.3 description
This command allows the user to configure a descriptive text for a virtual router.
Default none
Format description text
Mode Virtual Router Config
Parameter Description
text The descriptive text for the virtual router. A set of ASCII characters up to 512 characters in length.
7.9.3.0.1 no description
This command removes the descriptive text configuration for a virtual router.
Format no description
Mode Virtual Router Config
Parameter Description
vrf-name The name of the virtual router.
Example: This example creates two virtual router instances and assigns interfaces to those virtual routers.
(Router) (Config)#ip vrf Red
(Router) (Config)#ip vrf Blue
(Router) (Config)#interface 0/1
(Router) (Interface 0/1)#ip vrf forwarding Red
(Router) (Interface 0/1)#exit
(Router) (Config)#interface 0/2
(Router) (Interface 0/2)#ip vrf forwarding Blue
(Router) (Interface 0/2)#exit
Parameter Description
vrf-name Name of the virtual router instance.
detail Displays the configuration and status of the virtual router.
interfaces Displays the list of interfaces and the virtual routers to which they belong.
Example:
Router# show ip vrf
Number of VRs.........3
Name Identifier Route Distinguisher
---------------------
Red 2 2:200
Blue 4 4:400
Green 3 3:300
VRF Identifier................................. 2
Description.................................... ”India office bangalore”
Route Distinguisher............................ 300:6
Maximum Routes................................. 512
Threshold...................................... 80%
Warning-only................................... TRUE
Interfaces:
-----------
1/0/1
Vlan 10
Example: This example shows the command specifying a vlanid value. The interface ID argument is not used.
(Routing) (Vlan)#vlan 14
(Routing) (Vlan)#vlan routing 14 ?
<cr> Press enter to execute the command.
<1-128> Enter interface ID
Typically, you press Enter without supplying the Interface ID value; the system automatically selects the interface ID.
Example: In this example, the command specifies interface ID 51 for VLAN 14 interface. The interface ID becomes the
port number in the slot/port for the VLAN routing interface. In this example, slot/port is 4/51 for VLAN 14 interface.
(Routing) (Vlan)#vlan 14 51
(Routing) (Vlan)#
(Routing) #show ip vlan
MAC Address used by Routing VLANs: 00:11:88:59:47:36
Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
10 4/1 172.16.10.1 255.255.255.0
11 4/50 172.16.11.1 255.255.255.0
12 4/3 172.16.12.1 255.255.255.0
13 4/4 172.16.13.1 255.255.255.0
14 4/51 0.0.0.0 0.0.0.0 <--s/p is 4/51 for VLAN 14 interface
Example: In this example, select an interface ID that is already in use. In this case, the CLI displays an error message
and does not create the VLAN interface.
Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
10 4/1 172.16.10.1 255.255.255.0
11 4/50 172.16.11.1 255.255.255.0
12 4/3 172.16.12.1 255.255.255.0
13 4/4 172.16.13.1 255.255.255.0
14 4/51 0.0.0.0 0.0.0.0
(Routing) #config
(Routing) (Config)#exit
(Routing) (Vlan)#vlan 15
Example: The show running configuration command always lists the interface ID for each routing VLAN as shown in this
example.
(Routing) #show running-config
!Current Configuration:
!
!System Description "Broadcom Trident 56846 Development System - 48xTenGig + 4 FortyGig , 1.2.0.3,
Linux 2.6.34.6"
!System Software Version "1.2.0.3"
!System Up Time "4 days 19 hrs 5 mins 38 secs"
!Cut-through mode is configured as disabled
!Additional Packages BGP-4,QOS,IPv6,IPv6 Management,Routing,Data Center
!Current System Time: Oct 14 05:42:12 2022
!
set prompt "02.08"
network protocol dhcp
vlan database
vlan 10-14
vlan routing 10 1
vlan routing 12 3
vlan routing 13 4
vlan routing 11 50
vlan routing 14 51
7.10.3 autostate
Autostate is enabled on all VLAN routing interfaces by default. In this mode, when all ports in the VLAN are down, the IP
interface for that VLAN is also down.
Default enabled
Format autostate
Mode VLAN Interface Config
7.10.3.0.1 no autostate
When the no autostate command is enabled on a VLAN interface, the VLAN routing interface will stay up, even if there
are no ports that are members of the VLAN. The switch responds to the pings on that IP address.
Format no autostate
Mode VLAN Interface Config
Default none
Format switchport mapping vlan wire-vlan device-vlan
Mode Interface Config
Example:
#show interfaces vlan mapping 0/50
0/50 11 101
Parameter Description
MAC Address used by The MAC address associated with the internal bridge-router interface (IBRI). The same MAC Address is used by
Routing VLANs all VLAN routing interfaces. It will be displayed above the per-VLAN information.
VLAN ID The identifier of the VLAN.
Logical Interface The logical slot/port associated with the VLAN routing interface.
IP Address The IP address associated with this VLAN.
Subnet Mask The subnet mask that is associated with this VLAN.
7.11.1.0.1 no ip vrrp
Use this command in Global Config mode to disable the default administrative mode of VRRP on the router.
Format no ip vrrp
Mode Global Config
7.11.2.0.1 no ip vrrp
Use this command in Interface Config mode to delete the virtual router associated with the interface. The virtual Router ID,
vrid, is an integer value that ranges from 1 to 255.
Default disabled
Format ip vrrp vrid mode
Mode Interface Config
7.11.4 ip vrrp ip
This command sets the virtual router IP address value for an interface or range of interfaces. The value for ipaddr is the IP
address that is to be configured on that interface for VRRP. The parameter vrid is the virtual router ID that has an integer
value range from 1 to 255. You can use the optional [secondary] parameter to designate the IP address as a secondary IP
address.
Default none
Format ip vrrp vrid ip ipaddr [secondary]
Mode Interface Config
7.11.4.0.1 no ip vrrp ip
Use this command in Interface Config mode to delete a secondary IP address value from the interface. To delete the primary
IP address, you must delete the virtual router on the interface.
Format no ip vrrp vrid ipaddress secondary
Mode Interface Config
NOTE: VRRP accept-mode allows only ICMP Echo Request packets. No other type of packet is allowed to be delivered
to a VRRP address.
Default disabled
Format ip vrrp vrid accept-mode
Mode Interface Config
The router with the highest priority is elected master. If a router is configured with the address used as the address of the
virtual router, the router is called the “address owner.” The priority of the address owner is always 255 so that the address
owner is always master. If the master has a priority less than 255 (it is not the address owner) and you configure the priority
of another router in the group higher than the master’s priority, the router will take over as master only if preempt mode is
enabled.
Default 100 unless the router is the address owner, in which case its priority is automatically set to 255.
Format ip vrrp vrid priority 1-254
Mode Interface Config
When the tracked interface is down or the interface has been removed from the router, the priority of the VRRP router will
be decremented by the value specified in the priority argument. When the interface is up for IP protocol, the priority will
be incremented by the priority value.
A VRRP configured interface can track more than one interface. When a tracked interface goes down, then the priority of
the router will be decreased by 10 (the default priority decrement) for each downed interface. The default priority decrement
is changed using the priority argument. The default priority of the virtual router is 100, and the default decrement priority
is 10. By default, no interfaces are tracked. If you specify just the interface to be tracked, without giving the optional priority,
then the default priority will be set. The default priority decrement is 10.
Default priority: 10
Format ip vrrp vrid track interface {slot/port | vlan vlan-id} [decrement priority]
Mode Interface Config
A VRRP configured interface can track more than one route. When a tracked route goes down, then the priority of the router
will be decreased by 10 (the default priority decrement) for each downed route. By default no routes are tracked. If you
specify just the route to be tracked, without giving the optional priority, then the default priority will be set. The default priority
decrement is 10. The default priority decrement is changed using the priority argument.
Default priority: 10
Format ip vrrp vrid track ip route ip-address/prefix-length [decrement priority]
Mode Interface Config
Parameter Description
slot/port The interface number to which the virtual router belongs.
vlan-id The VLAN number to which the virtual router belongs.
Parameter Description
Uptime The time that the virtual router has been up, in days, hours, minutes and seconds.
Parameter Description
Protocol The protocol configured on the interface.
State Transitioned to Master The total number of times virtual router state has changed to MASTER.
Advertisement Received The total number of VRRP advertisements received by this virtual router.
Advertisement Interval Errors The total number of VRRP advertisements received for which advertisement interval is different than
the configured value for this virtual router.
Authentication Failure The total number of VRRP packets received that don't pass the authentication check.
IP TTL errors The total number of VRRP packets received by the virtual router with IP TTL (time to live) not equal
to 255.
Zero Priority Packets Received The total number of VRRP packets received by virtual router with a priority of '0'.
Zero Priority Packets Sent The total number of VRRP packets sent by the virtual router with a priority of '0'.
Invalid Type Packets Received The total number of VRRP packets received by the virtual router with invalid 'type' field.
Address List Errors The total number of VRRP packets received for which address list does not match the locally
configured list for the virtual router.
Invalid Authentication Type The total number of VRRP packets received with unknown authentication type.
Authentication Type Mismatch The total number of VRRP advertisements received for which 'auth type' not equal to locally
configured one for this virtual router.
Packet Length Errors The total number of VRRP packets received with packet length less than length of VRRP header.
Parameter Description
VRRP Admin Mode The administrative mode for VRRP functionality on the switch.
Router Checksum The total number of VRRP packets received with an invalid VRRP checksum value.
Errors
Router Version Errors The total number of VRRP packets received with Unknown or unsupported version number.
Router VRID Errors The total number of VRRP packets received with invalid VRID for this virtual router.
Parameter Description
IP Address The configured IP address for the Virtual router.
VMAC address The VMAC address of the specified router.
Parameter Description
Authentication type The authentication type for the specific virtual router.
Priority The priority value for the specific virtual router, taking into account any priority decrements for tracked
interfaces or routes.
Configured Priority The priority configured through the ip vrrp vrid priority 1-254 command.
Advertisement interval The advertisement interval in seconds for the specific virtual router.
Pre-Empt Mode The preemption mode configured on the specified virtual router.
Administrative Mode The status (Enable or Disable) of the specific router.
Accept Mode When enabled, the VRRP Master can accept ping packets sent to one of the virtual router’s IP
addresses.
State The state (Master/backup) of the virtual router.
Example: The following shows example CLI display output for the command.
(Routing) #show ip vrrp interface <slot/port> vrid
<0/1> down 10
TrackRoute (pfx/len) State DecrementPriority
------------------------ ------ ------------------
10.10.10.1/255.255.255.0 down 10
Parameter Description
Interface slot/port
VRID The router ID of the virtual router.
IP Address The virtual router IP address.
Mode Indicates whether the virtual router is enabled or disabled.
State The state (Master/backup) of the virtual router.
VRRPv2 VRRPv3
Supports redundancy to IPv4 addresses Supports redundancy to IPv4 and IPv6 addresses
Supports authentication Does not support authentication
No concept of link-local address in IPv4 address space For IPv6 addresses, VRRP IP contains the link-local IPv6 address
too.
The interval time used for sending VRRP Advertisement packets is The interval time is in the order of centiseconds.
in seconds.
VRRP MAC address format is 00-00-5E-00-01-{VRID} VRRP MAC address format for IPv6 VR IP is 00-00-5E-00-02-
{VRID}
SNMP MIB RFC according to 2787. The counters are 32-bit ones. SNMP MIB RFC as per RFC 6527. The counters are 64-bit ones.
NOTE:
To enable VRRP on the device, use the ip vrrp command. See the ip vrrp (Global Config) command. This
command enables VRRP (v2 or v3, whichever version is the configured version) and makes it operational.
A command is available to configure debugging for VRRP packets. For information, see the debug ip vrrp
command.
When VRRPv3 is in use, VRRP version 2 (VRRPv2) is unavailable. If you invoke no fhrp version vrrp v3, VRRPv3 is
disabled and VRRPv2 is enabled. Also, operational data is reset, and the VRRPv2 configuration is applied. The same
guidelines apply when VRRPv2 is in use and the no ip vrrp command is issued.
Defaults disabled
Format fhrp version vrrp v3
Mode Global Config
Defaults enabled
Defaults enabled
Format no snmp-server enable traps vrrp
Mode Global Config
7.12.3 vrrp
Use the vrrp command to create a VRRPv3 group and enter VRRPv3 group configuration mode.
Parameter Description
group-id Virtual router group number. The range is from 1 to 255.
address-family Specifies the address-family for this VRRP group.
ipv4 (Optional) Specifies IPv4 address.
ipv6 (Optional) Specifies IPv6 address.
7.12.3.0.1 no vrrp
Use the no vrrp command to remove the specified VRRPv3 group. Before you can use this command, you must disable
Virtual Router using the shutdown command in the appropriate VRRP Config mode.
7.12.4 preempt
Use this command to configure the device to take over as master virtual router for a VRRP group if it has higher priority than
the current master virtual route
Parameter Description
delay minimum Number of seconds that the device will delay before issuing an advertisement claiming master ownership. The
default delay is 0 seconds. The valid range is 0 to 3600 seconds.
7.12.4.0.1 no preempt
Use this command to prevent device from taking over as master virtual router for a VRRP group if it has higher priority than
the current master virtual route.
Format no preempt
Mode VRRPv3 Config
7.12.5 accept-mode
Use this command to control whether a virtual router in master state will accept packets addressed to the address owner's
virtual IP address as its own if it is not the virtual IP address owner.
Default disabled
Format accept-mode
Mode VRRPv3 Config
7.12.5.0.1 no accept-mode
Use this command to reset the accept mode to the default value.
Format no accept-mode
Mode VRRPv3 Config
7.12.6 priority
Use this command to set the priority level of the device within a VRRPv3 group. The priority level controls which device
becomes the master virtual router.
Default 100
Format priority level
Mode VRRPv3 Config
Parameter Description
level Priority of the device within the VRRP group. The range is from 1 to 254. The default is 100.
7.12.6.0.1 no priority
Use this command to reset the priority level of the device to the default value.
Format priority
Mode VRRPv3 Config
The advertisements being sent by the master virtual router communicate the advertisement interval, state, and priority of the
current master virtual router. The VRRP timers advertise command configures the time between successive
advertisement packets and the time before other routers declare the master router to be down. VRRP backup routers learn
timer values from the master router advertisements. The timers configured on the master router always override any other
timer settings that are used for calculating the master down time interval on VRRP backup routers.
Default 100
Format timers advertise centiseconds
Mode VRRPv3 Config
Parameter Description
centiseconds Time interval between successive advertisements by the master virtual router. The unit of the interval is in
centiseconds. The valid range is 1 to 4095 centiseconds.
Format shutdown
Mode VRRPv3 Config
7.12.8.0.1 no shutdown
Enter the no shutdown command to update the virtual router state after completing configuration.
Format no shutdown
Mode VRRPv3 Config
7.12.9 address
Use this command to set the primary or secondary IP address of the device within a VRRPv3 group. To remove the
secondary address, use the no form of this command.
If the primary or secondary option is not specified, the specified IP address is set as the primary. The Virtual IPv6 primary
address should be a link-local address only. When a global IPv6 address is given as a primary address for the VRRP IP then
the config fails with the following error message – “Error! Primary virtual IPv6 address should be a
link-local address only.” Also the removing of the primary virtual IP (IPv4 or IPv6) is not allowed. The primary virtual
IP of a virtual router can only be modified. The secondary virtual IP can be removed using the no form of the this command.
Also, VRRPv3 for IPv6 requires that a primary virtual link-local IPv6 address is configured to allow the group to operate. After
the primary link-local IPv6 address is established on the group, you can add the secondary global addresses.
Parameter Description
ip-address IPv4 or IPv6 address, it can be specified in one of the following format: <ipv4-address, ipv6-
link-local-address, ipv6-address>/<prefix-len>.
primary (Optional) Set primary IP address of the VRRPv3 group.
secondary (Optional) Set additional IP address of the VRRPv3 group.
7.12.9.0.1 no address
Use this command to remove the configured secondary IP or IPv6 address. The primary address can only be modified, not
removed.
Default enabled
Format track interface {slot/port | vlan vlan-id} [bfdneighbor IP-address][decrement
number]
Mode VRRPv3 Config
Parameter Description
slot/port The interface to track.
vlan-id The VLAN to track.
Parameter Description
bfdneighbor (Optional) BFD neighbor tracking.
IP-address (Optional) IPv4 or IPv6 address of BFD neighbor to be tracked for reachability using a BFD session.
decrement number (Optional) Specify the VRRP priority decrement for the tracked object. The number is the amount by which
priority is decremented. The range is 1 to 254.
Default enabled
Format track interface {slot/port | vlan vlan-id} [decrement number]
Mode VRRPv3 Config
Default disabled
Format track ip route ip-address/prefix-len [decrement number]
Mode VRRPv3 Config
Parameter Description
ip-address/prefix-len Prefix and prefix length of the route to be tracked.
decrement number (Optional) Specify the VRRP priority decrement for the tracked route. The number is the amount
by which priority is decremented. The range is 1 to 254.
If the optional arguments are specified, the statistics are reset for the virtual router corresponding to the given (IP address
family, interface and VR-id) combination.
Format clear vrrp statistics [{ipv4| ipv6} {slot/port | vlan vlan-id} vrid]
Mode Privileged EXEC
Parameter Description
ipv4 (Optional) indicates the Virtual router group belongs to IPv4 address family.
ipv6 (Optional) indicates the Virtual router group belongs to IPv6 address family.
slot/port (Optional) indicates the interface number to which the Virtual router belongs.
vlan-id (Optional) indicates the VLAN number to which the Virtual router belongs.
vr-id (Optional) Virtual router group number. The range is from 1 to 255.
Parameter Description
ipv4 (Optional) indicates the Virtual router group belongs to IPv4 address family.
ipv6 (Optional) indicates the Virtual router group belongs to IPv6 address family.
slot/port (Optional) indicates the interface number to which the Virtual router belongs.
vlan-id (Optional) indicates the VLAN number to which the Virtual router belongs.
vr-id (Optional) Virtual router group number. The range is from 1 to 255.
Example: This example shows command output when no parameters are specified.
(Routing)#show vrrp
Example: This example shows command output when the IPv6 parameter is specified.
(Routing)#show vrrp ipv6
Example:
(Routing)#show vrrp ipv4 0/3 1
Parameter Description
Interface Interface on which VRRP is configured.
VR ID of the virtual router.
A-F IP address family type (IPv4 or Ipv6) this Virtual Router belongs to.
Pri Priority range of the virtual router.
AdvIntvl Advertisement interval configured for this virtual router.
Pre Preemption state of the virtual router.
Acc Accept Mode of the virtual router.
Parameter Description
State VRRP group state. The state can be one of the following: Init, Backup, Master
VR IP address Virtual IP address for a VRRP group.
Example:
(Routing)#show vrrp brief
If the optional arguments are specified, the statistics are displayed for the virtual router corresponding to the given (IP
address family, interface and VR-id) combination.
Format show vrrp statistics [{ipv4| ipv6} {slot/port | vlan vlan-id} vrid]
Mode Privileged EXEC
Parameter Description
ipv4 (Optional) indicates the Virtual router group belongs to IPv4 address family.
ipv6 (Optional) indicates the Virtual router group belongs to IPv6 address family.
slot/port (Optional) indicates the interface number to which the Virtual router belongs.
vlan-id (Optional) indicates the VLAN number to which the Virtual router belongs.
vr-id (Optional) Virtual router group number. The range is from 1 to 255.
Example:
(Routing)#show vrrp statistics ipv6 0/1 2
Master Transitions............................. 2
New Master Reason.............................. Priority
Advertisements Received........................ 64
Advertisements Sent............................ 12
Advertisement Interval Errors.................. 0
IP TTL Errors.................................. 1
Last Protocol Error Reason..................... Version Error
Zero Priority Packets Received................. 0
Zero Priority Packets Sent..................... 1
Invalid Type Packets Received.................. 0
Address List Errors............................ 2
Packet Length Errors........................... 4
Row Discontinuity Time......................... 0 days 0 hrs 0 mins 0 secs
Refresh Rate (in milliseconds)................. 0
Default disabled
Format bootpdhcprelay cidoptmode
Mode Global Config
Virtual Router Config
Default 4
Format bootpdhcprelay maxhopcount 1-16
Mode Global Config
Virtual Router Config
Default 0
Format bootpdhcprelay minwaittime 0-100
Mode Global Config
Virtual Router Config
The bootpdhcprelay server-override command, when issued in Global Config mode, enables the server-override
globally. All routing interfaces then have the feature enabled. Any DHCP packet received from a DHCP client will have
sub-option 5 and sub-option 11 for option 82 added to the packet.
When this command is issued in Interface Config mode, server-override is enabled for that interface only.
If the source interface is set in Interface Config mode, that value takes precedence over the globally set value.
Parameter Description
Maximum Hop Count The maximum allowable relay agent hops.
Minimum Wait Time (Seconds) The minimum wait time.
Admin Mode Indicates whether relaying of requests is enabled or disabled.
Circuit Id Option Mode The DHCP circuit Id option which may be enabled or disabled.
Server Override Mode Indicates whether the server-override mode for the specified interface is enabled or disabled.
Source Interface Displays the configured source interface for the specified interface.
Example: The following shows example CLI display output for the command.
(Routing)#show bootpdhcprelay
The IP Helper feature provides a mechanism that allows a router to forward certain configured UDP broadcast packets to a
particular IP address. This allows various applications to reach servers on non-local subnets, even if the application was
designed to assume a server is always on a local subnet and uses broadcast packets (with either the limited broadcast
address 255.255.255.255, or a network directed broadcast address) to reach the server.
The network administrator can configure relay entries both globally and on routing interfaces. Each relay entry maps an
ingress interface and destination UDP port number to a single IPv4 address (the helper address). The network administrator
may configure multiple relay entries for the same interface and UDP port, in which case the relay agent relays matching
packets to each server address. Interface configuration takes priority over global configuration. That is, if a packet’s
destination UDP port matches any entry on the ingress interface, the packet is handled according to the interface
configuration. If the packet does not match any entry on the ingress interface, the packet is handled according to the global
IP helper configuration.
The network administrator can configure discard relay entries, which direct the system to discard matching packets. Discard
entries are used to discard packets received on a specific interface when those packets would otherwise be relayed
according to a global relay entry. Discard relay entries may be configured on interfaces, but are not configured globally.
In addition to configuring the server addresses, the network administrator also configures which UDP ports are forwarded.
Certain UDP port numbers can be specified by name in the UI as a convenience, but the network administrator can configure
a relay entry with any UDP port number. The network administrator may configure relay entries that do not specify a
destination UDP port. The relay agent relays assumes these entries match packets with the UDP destination ports listed in
the following table. This is the list of default ports.
The system limits the number of relay entries to four times the maximum number of routing interfaces. The network
administrator can allocate the relay entries as he likes. There is no limit to the number of relay entries on an individual
interface, and no limit to the number of servers for a given {interface, UDP port} pair.
The relay agent relays DHCP packets in both directions. It relays broadcast packets from the client to one or more DHCP
servers, and relays to the client packets that the DHCP server unicasts back to the relay agent. For other protocols, the relay
agent only relays broadcast packets from the client to the server. Packets from the server back to the client are assumed to
be unicast directly to the client. Because there is no relay in the return direction for protocols other than DHCP, the relay
agent retains the source IP address from the original client packet. The relay agent uses a local IP address as the source
IP address of relayed DHCP client packets.
When a switch receives a broadcast UDP packet on a routing interface, the relay agent checks if the interface is configured
to relay the destination UDP port. If so, the relay agent unicasts the packet to the configured server IP addresses. Otherwise,
the relay agent checks if there is a global configuration for the destination UDP port. If so, the relay agent unicasts the packet
to the configured server IP addresses. Otherwise the packet is not relayed. Note that if the packet matches a discard relay
entry on the ingress interface, then the packet is not forwarded, regardless of the global configuration.
The relay agent only relays packets that meet the following conditions:
The destination MAC address must be the all-ones broadcast address (FF:FF:FF:FF:FF:FF)
The destination IP address must be the limited broadcast address (255.255.255.255) or a directed broadcast address
for the receive interface.
The IP time-to-live (TTL) must be greater than 1.
Parameter Description
server-address The IPv4 unicast or directed broadcast address to which relayed UDP broadcast packets are sent. The server
address cannot be an IP address configured on any interface of the local router.
dest-udp-port A destination UDP port number from 0 to 65535.
Parameter Description
port-name The destination UDP port may be optionally specified by its name. Whether a port is specified by its number or
its name has no effect on behavior. The names recognized are as follows:
dhcp (port 67)
domain (port 53)
isakmp (port 500)
mobile-ip (port 434)
nameserver (port 42)
netbios-dgm (port 138)
netbios-ns (port 137)
ntp (port 123)
pim-auto-rp (port 496)
tacacs (port 49)
tftp (port 69)
time (port 37)
Other ports must be specified by number.
Example: To relay DHCP packets received on any interface to two DHCP servers, 10.1.1.1 and 10.1.2.1, use the
following commands:
(Routing) #config
(Routing) (config)#ip helper-address 10.1.1.1 dhcp
(Routing) (config)#ip helper-address 10.1.2.1 dhcp
Example: To relay UDP packets received on any interface for all default ports to the server at 20.1.1.1, use the following
commands:
(Routing) #config
(Routing) (config)#ip helper-address 20.1.1.1
Parameter Description
server-address The IPv4 unicast or directed broadcast address to which relayed UDP broadcast packets are sent. The server
address cannot be in a subnet on the interface where the relay entry is configured, and cannot be an IP address
configured on any interface of the local router.
discard Matching packets should be discarded rather than relayed, even if a global ip helper-address configuration
matches the packet.
dest-udp-port A destination UDP port number from 0 to 65535.
port-name The destination UDP port may be optionally specified by its name. Whether a port is specified by its number or
its name has no effect on behavior. The names recognized are as follows:
dhcp (port 67)
domain (port 53)
isakmp (port 500)
mobile-ip (port 434)
nameserver (port 42)
netbios-dgm (port 138)
netbios-ns (port 137)
ntp (port 123)
pim-auto-rp (port 496)
tacacs (port 49)
tftp (port 69)
time (port 37)
Other ports must be specified by number.
Example: To relay DHCP packets received on interface 0/2 to two DHCP servers, 192.168.10.1 and 192.168.20.1, use
the following commands:
(Routing)#config
(Routing)(config)#interface 0/2
(Routing)(interface 0/2)#ip helper-address 192.168.10.1 dhcp
(Routing)(interface 0/2)#ip helper-address 192.168.20.1 dhcp
Example: To relay both DHCP and DNS packets to 192.168.30.1, use the following commands:
(Routing)#config
(Routing)(config)#interface 0/2
(Routing)(interface 0/2)#ip helper-address 192.168.30.1 dhcp
(Routing)(interface 0/2)#ip helper-address 192.168.30.1 dns
Example: This command takes precedence over an ip helper-address command given in global configuration mode.
With the following configuration, the relay agent relays DHCP packets received on any interface other than 0/2 and 0/17
to 192.168.40.1, relays DHCP and DNS packets received on 0/2 to 192.168.40.2, relays SNMP traps (port 162) received
on interface 0/17 to 192.168.23.1, and drops DHCP packets received on 0/17:
(Routing)#config
(Routing)(config)#ip helper-address 192.168.40.1 dhcp
(Routing)(config)#interface 0/2
(Routing)(interface 0/2)#ip helper-address 192.168.40.2 dhcp
(Routing)(interface 0/2)#ip helper-address 192.168.40.2 domain
(Routing)(interface 0/2)#exit
(Routing)(config)#interface 0/17
(Routing)(interface 0/17)#ip helper-address 192.168.23.1 162
(Routing)(interface 0/17)#ip helper-address discard dhcp
Default disabled
Format ip helper enable
Mode Global Config
Virtual Router Config
Parameter Description
interface The relay configuration is applied to packets that arrive on this interface. This field is set to any for global IP helper
entries.
UDP Port The relay configuration is applied to packets whose destination UDP port is this port. Entries whose UDP port is
identified as any are applied to packets with the destination UDP ports listed in Table 4.
Parameter Description
Discard If Yes, packets arriving on the given interface with the given destination UDP port are discarded rather than
relayed. Discard entries are used to override global IP helper address entries which otherwise might apply to a
packet.
Hit Count The number of times the IP helper entry has been used to relay or discard a packet.
Server Address The IPv4 address of the server to which packets are relayed.
Example: The following shows example CLI display output for the command.
(Routing) #show ip helper-address
IP helper is enabled
Parameter Description
DHCP client messages The number of valid messages received from a DHCP client. The count is only incremented if IP helper is
received enabled globally, the ingress routing interface is up, and the packet passes a number of validity checks, such
as having a TTL>1 and having valid source and destination IP addresses.
DHCP client messages The number of DHCP client messages relayed to a server. If a message is relayed to multiple servers, the
relayed count is incremented once for each server.
DHCP server messages The number of DHCP responses received from the DHCP server. This count only includes messages that the
received DHCP server unicasts to the relay agent for relay to the client.
DHCP server messages The number of DHCP server messages relayed to a client.
relayed
UDP clients messages The number of valid UDP packets received. This count includes DHCP messages and all other protocols
received relayed. Conditions are similar to those for the first statistic in this table.
UDP clients messages The number of UDP packets relayed. This count includes DHCP messages relayed as well as all other
relayed protocols. The count is incremented for each server to which a packet is sent.
DHCP message hop The number of DHCP client messages received whose hop count is larger than the maximum allowed. The
count exceeded max maximum hop count is a configurable value listed in the show bootpdhcprelay command. A log message is
written for each such failure. The DHCP relay agent does not relay these packets.
DHCP message with secs The number of DHCP client messages received whose secs field is less than the minimum value. The
field below min minimum secs value is a configurable value and is displayed in the show bootpdhcprelay command. A log
message is written for each such failure. The DHCP relay agent does not relay these packets.
Parameter Description
DHCP message with The number of DHCP client messages received whose gateway address, giaddr, is already set to an IP
giaddr set to local address address configured on one of the relay agent’s own IP addresses. In this case, another device is attempting
to spoof the relay agent’s address. The relay agent does not relay such packets. A log message gives details
for each occurrence.
Packets with expired TTL The number of packets received with TTL of 0 or 1 that might otherwise have been relayed.
Packets that matched a The number of packets ignored by the relay agent because they match a discard relay entry.
discard entry
Example: The following shows example CLI display output for the command.
(Routing) #show ip helper statistics
Default disabled
Format router ospf [vrf vrf-name]
Mode Global Config
Parameter Description
vrf vrf-name The virtual router on which to enable OSPF routing.
7.15.1.4 1583compatibility
This command enables OSPF 1583 compatibility.
NOTE: 1583 compatibility mode is enabled by default. If all OSPF routers in the routing domain are capable of operating
according to RFC 2328, OSPF 1583 compatibility mode should be disabled.
Default enabled
Format 1583compatibility
Mode Router OSPF Config
7.15.1.4.1 no 1583compatibility
This command disables OSPF 1583 compatibility.
Format no 1583compatibility
Mode Router OSPF Config
Parameter Description
areaid The area identifier for the area whose networks are to be summarized.
prefix netmask The summary prefix to be advertised when the ABR computes a route to one or more networks within this prefix
in this area.
summarylink When this keyword is given, the area range is used when summarizing prefixes advertised in type 3 summary
LSAs.
nssaexternallink When this keyword is given, the area range is used when translating type 7 LSAs to type 5 LSAs.
advertise (Optional) When this keyword is given, the summary prefix is advertised when the area range is active. This is
the default.
not-advertise (Optional) When this keyword is given, neither the summary prefix nor the contained prefixes are advertised when
the area range is active. When the not-advertise option is given, any static cost previously configured is removed
from the system configuration.
cost (Optional) If an optional cost is given, OSPF sets the metric field in the summary LSA to the configured value
rather than setting the metric to the largest cost among the networks covered by the area range. A static cost may
only be configured if the area range is configured to advertise the summary. The range is 0 to 16,777,215. If the
cost is set to 16,777,215 for type 3 summarization, a type 3 summary LSA is not advertised, but contained
networks are suppressed. This behavior is equivalent to specifying the not-advertise option. If the range is
configured for type 7 to type 5 translation, a type 5 LSA is sent if the metric is set to 16,777,215; however, other
routers will not compute a route from a type 5 LSA with this metric.
Format no area areaid range prefix netmask {summarylink | nssaexternallink} [advertise | not-
advertise] [cost]
Mode OSPFv2 Router Configuration
The no form may be used to revert the [advertise | not-advertise] option to its default without deleting the area
range. Deleting and recreating the area range would cause OSPF to temporarily advertise the prefixes contained within the
range. Note that using either the advertise or not-advertise keyword reverts the configuration to the default. For
example:
The no form may be use to remove a static area range cost, so that OSPF sets the cost to the largest cost among the
contained routes.
!! Create area range with static cost.
(Routing) (Config-router)#area 1 range 10.0.0.0 255.0.0.0 summarylink cost 1000
!! Remove static cost.
(Routing) (Config-router)#no area 1 range 10.0.0.0 255.0.0.0 summarylink cost
Default disable
Format distribute-list route-map route-map-name in
Mode Router OSPF Config
7.15.1.34.1 no exit-overflow-interval
This command configures the default exit overflow interval for OSPF.
Format no exit-overflow-interval
Mode Router OSPF Config
7.15.1.35.1 no external-lsdb-limit
This command configures the default external LSDB limit for OSPF.
Format no external-lsdb-limit
Mode Router OSPF Config
7.15.1.36 log-adjacency-changes
To enable logging of OSPFv2 neighbor state changes, use the log-adjacency-changes command in router configuration
mode. State changes are logged with INFORMATIONAL severity.
Default Adjacency state changes are logged, but without the detail option.
Format log-adjacency-changes [detail]
Mode OSPFv2 Router Configuration
Parameter Description
detail (Optional) When this keyword is specified, all adjacency state changes are logged. Otherwise, OSPF only logs
transitions to FULL state and when a backwards transition occurs.
7.15.1.36.1 no log-adjacency-changes
Use the no form of the command to disable state change logging.
To suppress a loopback or passive interface, use the ip ospf prefix-suppression command in interface configuration mode.
Prefixes associated with secondary IPv4 addresses can never be suppressed.
7.15.1.37.1 no prefix-suppression
This command disables prefix-suppression. No prefixes are suppressed from getting advertised.
Format no prefix-suppression
Mode Router OSPF Config
To suppress a loopback or passive interface, use the ipv ospf prefix-suppression command in interface configuration
mode. Prefixes associated with secondary IPv6 addresses can never be suppressed.
7.15.1.38.1 no prefix-suppression
This command disables prefix-suppression. No prefixes are suppressed from getting advertised.
Format no prefix-suppression
Mode Router OSPFv3 Config
Use the command in Router OSPF Config mode to take the optional route-map parameter to set OSPF attributes on a
matching set of redistributed routes from other protocols.
When the metric, metric-type, and tag are configured along with the route-map parameter, the overlapping set actions for
metric, metric-type, and tag within the matching route-map statement take precedence over them for the matching set of
routes.
Format redistribute {bgp | static | connected} [metric 0-16777214] [metric-type {1 | 2}] [tag
0-4294967295] [route-map <route-map-name>] [subnets]
Mode Router OSPF Config
Router OSPF VRF Config
7.15.1.40.1 no redistribute
This command configures OSPF protocol to prohibit redistribution of routes from the specified source protocol/routers.
Format no redistribute {bgp | static | connected} [metric] [metric-type] [tag] [route-map
<route-map-name>] [subnets]
Mode Router OSPF Config
Router OSPF VRF Config
7.15.1.41.1 no maximum-paths
This command resets the number of paths that OSPF can report for a given destination back to its default value.
Format no maximum-paths
Mode Router OSPF Config
7.15.1.43.1 no passive-interface
Use this command to set the interface as non-passive. It overrides the global passive mode that is currently effective on the
interface.
Format no passive-interface {slot/port | vlan vlan-id}
Mode Router OSPF Config
Default 33 milliseconds
Format timers pacing flood milliseconds
Mode OSPFv2 Router Configuration
Parameter Description
milliseconds The average time between transmission of LS Update packets. The range is from 5 ms to 100 ms. The default is
33 ms.
When OSPF originates a new or changed LSA, it selects a random refresh delay for the LSA. When the refresh delay
expires, OSPF refreshes the LSA. By selecting a random refresh delay, OSPF avoids refreshing a large number of LSAs at
one time, even if a large number of LSAs are originated at one time.
Default 60 seconds
Format timers pacing lsa-group seconds
Mode OSPFv2 Router Configuration
Parameter Description
seconds Width of the window in which LSAs are refreshed. The range for the pacing group window is from 10 to 1800
seconds.
To enable the individual flag, enter the group name followed by that particular flag.
To enable all the flags in that group, give the group name followed by all.
Default disabled
Format trapflags {
all | errors {all | authentication-failure | bad-packet | config-error | virt-
authentication-failure | virt-bad-packet | virt-config-error} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
state-change {all | if-state-change | neighbor-state-change | virtif-state-change |
virtneighbor-state-change}
}
Mode Router OSPF Config
7.15.1.47.1 no trapflags
Use this command to revert to the default reference bandwidth.
To disable the individual flag, enter the group name followed by that particular flag.
To disable all the flags in that group, give the group name followed by all.
To disable all the flags, give the command as trapflags all.
Format no trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error | virt-
authentication-failure | virt-bad-packet | virt-config-error} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
state-change {all | if-state-change | neighbor-state-change | virtif-state-
change | virtneighbor-state-change}
}
Default disabled
Format ip ospf area area-id [secondaries none]
Mode Interface Config
7.15.2.2 bandwidth
By default, OSPF computes the link cost of an interface as the ratio of the reference bandwidth to the interface bandwidth.
Reference bandwidth is specified with the auto-cost command. For the purpose of the OSPF link cost calculation, use the
bandwidth command to specify the interface bandwidth. The bandwidth is specified in kilobits per second. If no bandwidth
is configured, the bandwidth defaults to the actual interface bandwidth for port-based routing interfaces and to 10 Mb/s for
VLAN routing interfaces. This command does not affect the actual speed of an interface. You can use this command to
configure a single interface or a range of interfaces.
Default actual interface bandwidth
Format bandwidth 1-10000000
Mode Interface Config
7.15.2.2.1 no bandwidth
Use this command to set the interface bandwidth to its default value.
Format no bandwidth
Mode Interface Config
Default disabled
Format ip ospf database-filter all out
Mode Interface Configuration
Default disabled
Format no ip ospf database-filter all out
Mode Interface Configuration
Default broadcast
Format ip ospf network {broadcast | point-to-point}
Mode Interface Config
prefix-suppression can be disabled at the interface level by using the disable option. The disable option is useful for
excluding specific interfaces from performing prefix-suppression when the feature is enabled globally.
Note that the disable option disable is not equivalent to not configuring the interface specific prefix-suppression. If
prefix-suppression is not configured at the interface level, the global prefix-suppression configuration is applicable for the
IPv4 prefixes associated with the interface.
Graceful restart uses the concept of “helpful neighbors”. A fully adjacent router enters helper mode when it receives a link
state announcement (LSA) from the restarting management unit indicating its intention of performing a graceful restart. In
helper mode, a switch continues to advertise to the rest of the network that they have full adjacencies with the restarting
router, thereby avoiding announcement of a topology change and the potential for flooding of LSAs and shortest-path-first
(SPF) runs (which determine OSPF routes). Helpful neighbors continue to forward packets through the restarting router. The
restarting router relearns the network topology from its helpful neighbors.
Graceful restart can be enabled for either planned or unplanned restarts, or both. A planned restart is initiated by the operator
through the management command initiate failover. The operator may initiate a failover in order to take the
management unit out of service (for example, to address a partial hardware failure), to correct faulty system behavior which
cannot be corrected through less severe management actions, or other reasons. An unplanned restart is an unexpected
failover caused by a fatal hardware failure of the management unit, or when software stops responding, or a crash on the
management unit.
7.15.3.1 nsf
Use this command to enable the OSPF graceful restart functionality on an interface. To disable graceful restart, use the no
form of the command.
Default disabled
Format nsf [ietf] [planned-only]
Modes OSPF Router Configuration
Parameter Description
ietf This keyword is accepted but not required.
planned-only This optional keyword indicates that OSPF should only perform a graceful restart when the restart is planned (that
is, when the restart is a result of the initiate failover command).
7.15.3.1.1 no nsf
Use this command to disable graceful restart for all restarts.
The grace period must be set long enough to allow the restarting router to reestablish all of its adjacencies and complete a
full database exchange with each of those neighbors.
Valid values for the restart interval seconds range from 1 to 1800.
Parameter Description
ietf This keyword is accepted but not required.
seconds The number of seconds that the restarting router asks its neighbors to wait before exiting helper mode. The range
is from 1 to 1800 seconds.
7.15.3.2.1 no nsfrestart-interval
Use this command to revert the grace period to its default value.
Default OSPF may act as a helpful neighbor for both planned and unplanned restarts
Format nsf helper [planned-only]
Modes OSPF Router Configuration
Parameter Description
planned-only This optional keyword indicates that OSPF should only help a restarting router performing a planned restart.
NOTE: The commands no nsf helper and nsf ietf helper disable are functionally equivalent. The command nsf
ietf helper disable is supported solely for compatibility with other network software CLI.
Use this command to require that an OSPF helpful neighbor exit helper mode whenever a topology change occurs.
Default enabled
Format nsf [ietf] helper strict-lsa-checking
Modes OSPF Router Configuration
Parameter Description
ietf This keyword is accepted but not required.
Default enabled
Format no nsf [ietf] helper strict-lsa-checking
Modes OSPF Router Configuration
You can administratively force OSPF into stub router mode. OSPF remains in stub router mode until you take OSPF out of
stub router mode. Alternatively, you can configure OSPF to start in stub router mode for a configurable period of time after
the router boots up.
If you set the summary LSA metric to 16,777,215, other routers will skip the summary LSA when they compute routes.
If you have configured the router to enter stub router mode on startup (max-metric router-lsa on-startup), and then enter max-
metric router lsa, there is no change. If OSPF is administratively in stub router mode (the max-metric router-lsa command
has been given), and you configure OSPF to enter stub router mode on startup (max-metric router-lsa on-startup), OSPF
exits stub router mode (assuming the startup period has expired) and the configuration is updated.
Parameter Description
on-startup (Optional) OSPF starts in stub router mode after a reboot.
seconds (Required if on-startup) The number of seconds that OSPF remains in stub router mode after a reboot. The range
is 5 to 86,400 seconds. There is no default value.
summary-lsa (Optional) Set the metric in type 3 and type 4 summary LSAs to LsInfinity (0xFFFFFF).
metric (Optional) Metric to send in summary LSAs when in stub router mode. The range is 1 to 16,777,215. The default
is 16,711,680 (0xFF0000).
Route-map information displays if configured for redistributing other protocol routes into OSPF. The route-map name is
displayed in the command output.
NOTE: Some of the information in the following table displays only if you enable OSPF and configure certain features.
Parameter Description
Router ID A 32-bit integer in dotted decimal format identifying the router, about which information is displayed. This is a
configured value.
OSPF Admin Mode Shows whether the administrative mode of OSPF in the router is enabled or disabled. This is a configured value.
RFC 1583 Indicates whether 1583 compatibility is enabled or disabled. This is a configured value.
Compatibility
External LSDB Limit The maximum number of nondefault AS-external-LSA (link state advertisement) entries that can be stored in the
link-state database.
Exit Overflow Interval The number of seconds that, after entering overflow state, a router will attempt to leave overflow state.
Spf Delay Time The number of seconds between two subsequent changes of LSAs, during which time the routing table
calculation is delayed.
Spf Hold Time The number of seconds between two consecutive spf calculations.
Flood Pacing Interval The average time, in milliseconds, between LS Update packet transmissions on an interface. This is the value
configured with the timers pacing flood command.
LSA Refresh Group The size in seconds of the LSA refresh group window. This is the value configured with the timers pacing lsa-
Pacing Time group command.
Opaque Capability Shows whether the router is capable of sending Opaque LSAs. This is a configured value.
Autocost Ref BW Shows the value of auto-cost reference bandwidth configured on the router.
Default Passive Shows whether the interfaces are passive by default.
Setting
Maximum Paths The maximum number of paths that OSPF can report for a given destination.
Default Metric Default value for redistributed routes.
Stub Router When OSPF runs out of resources to store the entire link state database, or any other state information, OSPF
Configuration goes into stub router mode. As a stub router, OSPF reoriginates its own router LSAs, setting the cost of all
nonstub interfaces to infinity. Use this field to set stub router configuration to one of Always, Startup, None.
Stub Router Startup Configured value in seconds. This row is only listed if OSPF is configured to be a stub router at startup.
Time
Summary LSA Metric One of Enabled (met), Disabled, where met is the metric to be sent in summary LSAs when in stub router
Override mode.
BFD Enabled Displays the BFD status.
Default Route Indicates whether the default routes received from other source protocols are advertised or not.
Advertise
Always Shows whether default routes are always advertised.
Metric The metric of the routes being redistributed. If the metric is not configured, this field is blank.
Parameter Description
Metric Type Shows whether the routes are External Type 1 or External Type 2.
Number of Active The number of active OSPF areas. An “active” OSPF area is an area with at least one interface up.
Areas
ABR Status Shows whether the router is an OSPF Area Border Router.
ASBR Status Reflects whether the ASBR mode is enabled or disabled. Enable implies that the router is an autonomous system
border router. The router automatically becomes an ASBR when it is configured to redistribute routes learned
from other protocols. The possible values for the ASBR status is enabled (if the router is configured to redistribute
routes learned by other protocols) or disabled (if the router is not configured for the same).
Stub Router Status One of Active, Inactive.
Stub Router Reason One of Configured, Startup, Resource Limitation.
NOTE: The row is only listed if stub router is active.
Stub Router Startup The remaining time, in seconds, until OSPF exits stub router mode. This row is only listed if OSPF is in startup
Time Remaining stub router mode.
Stub Router Duration The time elapsed since the router last entered the stub router mode. The row is only listed if stub router is active
and the router entered stub mode because of a resource limitation. The duration is displayed in DD:HH:MM:SS
format.
External LSDB When the number of nondefault external LSAs exceeds the configured limit, External LSDB Limit, OSPF goes
Overflow into LSDB overflow state. In this state, OSPF withdraws all of its self-originated nondefault external LSAs. After
the Exit Overflow Interval, OSPF leaves the overflow state, if the number of external LSAs has been reduced.
External LSA Count The number of external (LS type 5) link-state advertisements in the link-state database.
External LSA The sum of the LS checksums of external link-state advertisements contained in the link-state database.
Checksum
AS_OPAQUE LSA Shows the number of AS Opaque LSAs in the link-state database.
Count
AS_OPAQUE LSA Shows the sum of the LS Checksums of AS Opaque LSAs contained in the link-state database.
Checksum
New LSAs Originated The number of new link-state advertisements that have been originated.
LSAs Received The number of link-state advertisements received determined to be new instantiations.
LSA Count The total number of link state advertisements currently in the link state database.
Maximum Number of The maximum number of LSAs that OSPF can store.
LSAs
LSA High Water Mark The maximum size of the link state database since the system started.
AS Scope LSA Flood The number of LSAs currently in the global flood queue waiting to be flooded through the OSPF domain. LSAs
List Length with AS flooding scope, such as type 5 external LSAs and type 11 Opaque LSAs.
Retransmit List Entries The total number of LSAs waiting to be acknowledged by all neighbors. An LSA may be pending acknowledgment
from more than one neighbor.
Maximum Number of The maximum number of LSAs that can be waiting for acknowledgment at any given time.
Retransmit Entries
Retransmit Entries The maximum number of LSAs on all neighbors’ retransmit lists at any given time.
High Water Mark
NSF Support Indicates whether nonstop forwarding (NSF) is enabled for the OSPF protocol for planned restarts, unplanned
restarts or both (“Always”).
NSF Restart Interval The user-configurable grace period during which a neighboring router will be in the helper state after receiving
notice that the management unit is performing a graceful restart.
NSF Restart Status The current graceful restart status of the router.
Not Restarting
Planned Restart
Unplanned Restart
Parameter Description
NSF Restart Age Number of seconds until the graceful restart grace period expires.
NSF Restart Exit Indicates why the router last exited the last restart:
Reason None—Graceful restart has not been attempted.
In Progress—Restart is in progress.
Completed—The previous graceful restart completed successfully.
Timed Out—The previous graceful restart timed out.
Topology Changed—The previous graceful restart terminated prematurely because of a topology change.
NSF Help Support Indicates whether helpful neighbor functionality has been enabled for OSPF for planned restarts, unplanned
restarts, or both (Always).
NSF help Strict LSA Indicates whether strict LSA checking has been enabled. If enabled, then an OSPF helpful neighbor will exit
checking helper mode whenever a topology change occurs. If disabled, an OSPF neighbor will continue as a helpful
neighbor in spite of topology changes.
Prefix-suppression Displays whether prefix-suppression is enabled or disabled.
Example: The following shows example CLI display output for the command.
Parameter Description
Type The type of the route to the destination. It can be either:
intra — Intra-area route
inter — Inter-area route
Parameter Description
AreaID The area id of the requested OSPF area.
External Routing A number representing the external routing capabilities for this area.
Spf Runs The number of times that the intra-area route table has been calculated using this area's link-state database.
Area Border Router The total number of area border routers reachable within this area.
Count
Area LSA Count Total number of link-state advertisements in this area's link-state database, excluding AS External LSAs.
Area LSA Checksum A number representing the Area LSA Checksum for the specified AreaID excluding the external (LS type 5)
link-state advertisements.
Flood List Length The number of LSAs waiting to be flooded within the area.
Import Summary LSAs Shows whether to import summary LSAs.
OSPF Stub Metric The metric value of the stub area. This field displays only if the area is a configured as a stub area.
Value
The following OSPF NSSA specific information displays only if the area is configured as an NSSA.
Parameter Description
Import Summary LSAs Shows whether to import summary LSAs into the NSSA.
Redistribute into Shows whether to redistribute information into the NSSA.
NSSA
Default Information Shows whether to advertise a default route into the NSSA.
Originate
Default Metric The metric value for the default route advertised into the NSSA.
Default Metric Type The metric type for the default route advertised into the NSSA.
Translator Role The NSSA translator role of the ABR, which is always or candidate.
Translator Stability The amount of time that an elected translator continues to perform its duties after it determines that its translator
Interval status has been deposed by another router.
Translator State Shows whether the ABR translator state is disabled, always, or elected.
Example: The following shows example CLI display output for the command.
(R1) #show ip ospf area 1
AreaID......................................... 0.0.0.1
External Routing............................... Import External LSAs
Spf Runs....................................... 10
Area Border Router Count....................... 0
Area LSA Count................................. 3004
Area LSA Checksum.............................. 0x5e0abed
Flood List Length.............................. 0
Import Summary LSAs............................ Enable
Parameter Description
Type The type of the route to the destination. It can be one of the following values:
intra — Intra-area route
inter — Inter-area route
Router ID Router ID of the destination.
Cost Cost of using this route.
Area ID The area ID of the area from which this route is learned.
Next Hop Next hop toward the destination.
Next Hop Intf The outgoing router interface to use when forwarding traffic to the next hop.
Parameter Description
vrf-name Specifies the virtual router for which to display information.
asbr-summary Use asbr-summary to show the autonomous system boundary router (ASBR) summary LSAs.
external Use external to display the external LSAs.
network Use network to display the network LSAs.
nssa-external Use nssa-external to display NSSA external LSAs.
opaque-area Use opaque-area to display area opaque LSAs.
opaque-as Use opaque-as to display AS opaque LSAs.
opaque-link Use opaque-link to display link opaque LSAs.
router Use router to display router LSAs.
summary Use summary to show the LSA database summary information.
lsid Use lsid to specify the link state ID (LSID). The value of lsid can be an IP address or an integer in the range
of 0 to 4,294,967,295.
adv-router Use adv-router to show the LSAs that are restricted by the advertising router.
self-originate Use self-originate to display the LSAs in that are self originated.
Parameter Description
Link Id A number that uniquely identifies an LSA that a router originates from all other self originated LSAs of the same
LS type.
Adv Router The Advertising Router. Is a 32-bit dotted decimal number representing the LSDB interface.
Age A number representing the age of the link state advertisement in seconds.
Sequence A number that represents which LSA is more recent.
Checksum The total number LSA checksum.
Options This is an integer. It indicates that the LSA receives special handling during routing calculations.
Rtr Opt Router Options are valid for router links only.
Parameter Description
Router Total number of router LSAs in the OSPF link state database.
Network Total number of network LSAs in the OSPF link state database.
Summary Net Total number of summary network LSAs in the database.
Summary ASBR Number of summary ASBR LSAs in the database.
Type-7 Ext Total number of Type-7 external LSAs in the database.
Self-Originated Type-7 Total number of self originated AS external LSAs in the OSPF link state database.
Opaque Link Number of opaque link LSAs in the database.
Opaque Area Number of opaque area LSAs in the database.
Subtotal Number of entries for the identified area.
Opaque AS Number of opaque AS LSAs in the database.
Total Number of entries for all areas.
Parameter Description
IP Address The IP address for the specified interface.
Subnet Mask A mask of the network and host portion of the IP address for the OSPF interface.
Secondary IP The secondary IP addresses if any are configured on the interface.
Address(es)
OSPF Admin Mode States whether OSPF is enabled or disabled on a router interface.
OSPF Area ID The OSPF Area ID for the specified interface.
OSPF Network Type The type of network on this interface that the OSPF is running on.
Router Priority A number representing the OSPF Priority for the specified interface.
Retransmit Interval A number representing the OSPF Retransmit Interval for the specified interface.
Hello Interval A number representing the OSPF Hello Interval for the specified interface.
Dead Interval A number representing the OSPF Dead Interval for the specified interface.
LSA Ack Interval A number representing the OSPF LSA Acknowledgment Interval for the specified interface.
Transmit Delay A number representing the OSPF Transmit Delay Interval for the specified interface.
Authentication Type The OSPF Authentication Type for the specified interface are: none, simple, and encrypt.
Metric Cost The cost of the OSPF interface.
Passive Status Shows whether the interface is passive or not.
OSPF MTU-ignore Indicates whether to ignore MTU mismatches in database descriptor packets sent from neighboring routers.
Flood Blocking Indicates whether flood blocking is enabled on the interface.
The information in the following table will only be displayed if OSPF is enabled.
Parameter Description
OSPF Interface Type Broadcast LANs, such as Ethernet and IEEE 802.5, take the value broadcast. The OSPF Interface
Type will be 'broadcast'.
State The OSPF Interface States are: down, loopback, waiting, point-to-point, designated router, and
backup designated router.
Designated Router The router ID representing the designated router.
Backup Designated Router The router ID representing the backup designated router.
Number of Link Events The number of link events.
Local Link LSAs The number of Link Local Opaque LSAs in the link-state database.
Local Link LSA Checksum The sum of LS Checksums of Link Local Opaque LSAs in the link-state database.
Prefix-suppression Displays whether prefix-suppression is enabled, disabled, or unconfigured on the given interface.
Example: The following shows example CLI display output for the command when the OSPF Admin Mode is disabled.
(Routing) >show ip ospf interface 0/1
IP Address..................................... 0.0.0.0
Subnet Mask.................................... 0.0.0.0
Secondary IP Address(es).......................
OSPF Admin Mode................................ Disable
OSPF Area ID................................... 0.0.0.0
OSPF Network Type.............................. Broadcast
Router Priority................................ 1
Retransmit Interval............................ 5
Hello Interval................................. 10
Dead Interval.................................. 40
LSA Ack Interval............................... 1
Transmit Delay................................. 1
Authentication Type............................ None
Metric Cost.................................... 1 (computed)
Passive Status................................. Non-passive interface
OSPF Mtu-ignore................................ Disable
Flood Blocking................................. Disable
(Routing) #
Parameter Description
Interface slot/port
OSPF Admin Mode States whether OSPF is enabled or disabled on a router interface.
OSPF Area ID The OSPF Area Id for the specified interface.
Router Priority A number representing the OSPF Priority for the specified interface.
Cost The metric cost of the OSPF interface.
Hello Interval A number representing the OSPF Hello Interval for the specified interface.
Dead Interval A number representing the OSPF Dead Interval for the specified interface.
Retransmit Interval A number representing the OSPF Retransmit Interval for the specified interface.
Interface Transmit A number representing the OSPF Transmit Delay for the specified interface.
Delay
LSA Ack Interval A number representing the OSPF LSA Acknowledgment Interval for the specified interface.
Parameter Description
OSPF Area ID The area id of this OSPF interface.
Parameter Description
Area Border Router The total number of area border routers reachable within this area. This is initially zero, and is calculated in each
Count SPF pass.
AS Border Router The total number of Autonomous System border routers reachable within this area.
Count
Area LSA Count The total number of link-state advertisements in this area's link-state database, excluding AS External LSAs.
IP Address The IP address associated with this OSPF interface.
OSPF Interface The number of times the specified OSPF interface has changed its state, or an error has occurred.
Events
Virtual Events The number of state changes or errors that occurred on this virtual link.
Neighbor Events The number of times this neighbor relationship has changed state, or an error has occurred.
Sent Packets The number of OSPF packets transmitted on the interface.
Received Packets The number of valid OSPF packets received on the interface.
Discards The number of received OSPF packets discarded because of an error in the packet or an error in processing the
packet.
Bad Version The number of received OSPF packets whose version field in the OSPF header does not match the version of
the OSPF process handling the packet.
Source Not On Local The number of received packets discarded because the source IP address is not within a subnet configured on
Subnet a local interface.
NOTE: This field applies only to OSPFv2.
Virtual Link Not Found The number of received OSPF packets discarded where the ingress interface is in a non-backbone area and the
OSPF header identifies the packet as belonging to the backbone, but OSPF does not have a virtual link to the
packet’s sender.
Area Mismatch The number of OSPF packets discarded because the area ID in the OSPF header is not the area ID configured
on the ingress interface.
Invalid Destination The number of OSPF packets discarded because the packet’s destination IP address is not the address of the
Address ingress interface and is not the AllDrRouters or AllSpfRouters multicast addresses.
Wrong Authentication The number of packets discarded because the authentication type specified in the OSPF header does not match
Type the authentication type configured on the ingress interface.
NOTE: This field applies only to OSPFv2.
Authentication Failure The number of OSPF packets dropped because the sender is not an existing neighbor or the sender’s IP address
does not match the previously recorded IP address for that neighbor.
NOTE: This field applies only to OSPFv2.
No Neighbor at Source The number of OSPF packets dropped because the sender is not an existing neighbor or the sender’s IP address
Address does not match the previously recorded IP address for that neighbor.
NOTE: Does not apply to Hellos.
Invalid OSPF Packet The number of OSPF packets discarded because the packet type field in the OSPF header is not a known type.
Type
Hellos Ignored The number of received Hello packets that were ignored by this router from the new neighbors after the limit has
been reached for the number of neighbors on an interface or on the system as a whole.
The following table lists the number of OSPF packets of each type sent and received on the interface.
Table 13: Type of OSPF Packets Sent and Received on the Interface
Parameter Description
Total self-originated LSAs The number of LSAs the router is currently originating.
Average LSAs per group The number of self-originated LSAs divided by the number of LSA groups. The number of LSA
groups is the refresh interval (1800 seconds) divided by the pacing interval (configured with
timers pacing lsa-group) plus two.
Pacing group limit The maximum number of self-originated LSAs in one LSA group. If the number of LSAs in a
group exceeds this limit, OSPF redistributes LSAs throughout the refresh interval to achieve
better balance.
Groups For each LSA pacing group, the output shows the range of LSA ages in the group and the
number of LSAs in the group.
If you do not specify an IP address, a table with the following columns displays for all neighbors or the neighbor associated
with the interface that you specify.
Parameter Description
Router ID The 4-digit dotted-decimal number of the neighbor router.
Priority The OSPF priority for the specified interface. The priority of an interface is a priority integer from 0 to 255. A value
of '0' indicates that the router is not eligible to become the designated router on this network.
IP Address The IP address of the neighbor.
Interface The physical routing interface or VLAN routing interface of the local router in slot/port format
State The state of the neighboring routers. Possible values are:
Down—Initial state of the neighbor conversation; no recent information has been received from the neighbor.
Attempt—No recent information has been received from the neighbor but a more concerted effort should be
made to contact the neighbor.
Init—An Hello packet has recently been seen from the neighbor, but bidirectional communication has not yet
been established.
2 way—Communication between the two routers is bidirectional.
Exchange start—The first step in creating an adjacency between the two neighboring routers, the goal is to
decide which router is the master and to decide upon the initial DD sequence number.
Exchange—The router is describing its entire link state database by sending Database Description packets
to the neighbor.
Loading—Link State Request packets are sent to the neighbor asking for the more recent LSAs that have
been discovered (but not yet received) in the Exchange state.
Full—The neighboring routers are fully adjacent and they will now appear in router-LSAs and network-LSAs.
Dead Time The amount of time, in seconds, to wait before the router assumes the neighbor is unreachable.
If you specify an IP address for the neighbor router, the following fields are displayed.
Parameter Description
Interface slot/port
Neighbor IP Address The IP address of the neighbor router.
Interface Index The interface ID of the neighbor router.
Area ID The area ID of the OSPF area associated with the interface.
Options An integer value that indicates the optional OSPF capabilities supported by the neighbor. The neighbor's optional
OSPF capabilities are also listed in its Hello packets. This enables received Hello Packets to be rejected (that is,
neighbor relationships will not even start to form) if there is a mismatch in certain crucial OSPF capabilities.
Router Priority The OSPF priority for the specified interface. The priority of an interface is a priority integer from 0 to 255. A value
of '0' indicates that the router is not eligible to become the designated router on this network.
Dead Timer Due The amount of time, in seconds, to wait before the router assumes the neighbor is unreachable.
Up Time Neighbor uptime; how long since the adjacency last reached the Full state.
State The state of the neighboring routers.
Events The number of times this neighbor relationship has changed state, or an error has occurred.
Retransmitted LSAs The number of LSAs retransmitted to this neighbor.
Retransmission An integer representing the current length of the retransmission queue of the specified neighbor router Id of the
Queue Length specified interface.
Restart Helper Status Indicates the status of this router as a helper during a graceful restart of the router specified in the command line:
Helping—This router is acting as a helpful neighbor to this neighbor. A helpful neighbor does not report an
adjacency change during graceful restart, but continues to advertise the restarting router as a FULL
adjacency. A helpful neighbor continues to forward data packets to the restarting router, trusting that the
restarting router's forwarding table is maintained during the restart.
Not Helping—This router is not a helpful neighbor at this time.
Parameter Description
Restart Reason When this router is in helpful neighbor mode, this indicates the reason for the restart as provided by the restarting
router:
Unknown (0)
Software restart (1)
Software reload/upgrade (2)
Switch to redundant control processor (3)
Unrecognized - a value not defined in RFC 3623
When EFOS sends a grace LSA, it sets the Restart Reason to Software Restart on a planned warm restart (when
the initiate failover command is invoked), and to Unknown on an unplanned warm restart.
Remaining Grace The number of seconds remaining the in current graceful restart interval. This is displayed only when this router
Time is currently acting as a helpful neighbor for the router specified in the command.
Restart Helper Exit Indicates the reason that the specified router last exited a graceful restart.
Reason None—Graceful restart has not been attempted
In Progress—Restart is in progress
Completed—The previous graceful restart completed successfully
Timed Out—The previous graceful restart timed out
Topology Changed—The previous graceful restart terminated prematurely because of a topology change
Example: The following shows example CLI display output for the command.
(Routing) #show ip ospf neighbor 170.1.1.50
Interface.....................................0/17
Neighbor IP Address...........................170.1.1.50
Interface Index...............................17
Area Id.......................................0.0.0.2
Options.......................................0x2
Router Priority...............................1
Dead timer due in (secs)......................15
Up Time.......................................0 days 2 hrs 8 mins 46 secs
State.........................................Full/BACKUP-DR
Events........................................4
Retransmitted LSAs............................32
Retransmission Queue Length...................0
Restart Helper Status........................ Helping
Restart Reason............................... Software Restart (1)
Remaining Grace Time......................... 10 sec
Restart Helper Exit Reason................... In Progress
Parameter Description
Prefix The summary prefix.
Subnet Mask The subnetwork mask of the summary prefix.
Parameter Description
Type S (Summary Link) or E (External Link).
Action Advertise or Suppress.
Cost Metric to be advertised when the range is active. If a static cost is not configured, the field displays Auto. If the
action is Suppress, the field displays N/A.
Active Whether the range is currently active. Y or N.
Example: The following shows example CLI display output for the command.
(R1) #show ip ospf range 0
Parameter Description
Delta T The time since the routing table was computed. The time is in the format hours, minutes, and seconds
(hh:mm:ss).
Intra The time taken to compute intra-area routes, in milliseconds.
Summ The time taken to compute inter-area routes, in milliseconds.
Ext The time taken to compute external routes, in milliseconds.
SPF Total The total time to compute routes, in milliseconds. The total may exceed the sum of the Intra, Summ, and Ext
times.
RIB Update The time from the completion of the routing table calculation until all changes have been made in the common
routing table [the Routing Information Base (RIB)], in milliseconds.
Reason The event or events that triggered the SPF. Reason codes are as follows:
R - new router LSA
N - new network LSA
SN - new network summary LSA
SA - new ASBR summary LSA
X - new external LSA
Example: The following shows example CLI display output for the command.
(Router) #show ip ospf statistics
00:05:33 0 0 0 0 0 R
00:05:30 0 0 0 0 0 R
00:05:19 0 0 0 0 0 N, SN
00:05:15 0 10 0 10 0 R, N, SN
00:05:11 0 0 0 0 0 R
00:04:50 0 60 0 60 460 R, N
00:04:46 0 90 0 100 60 R, N
00:03:42 0 70 10 90 160 R
00:03:39 0 70 40 120 240 X
00:03:36 0 60 60 130 160 X
00:01:28 0 60 50 130 240 X
00:01:25 0 30 50 110 310 SN
00:01:22 0 0 40 50 260 SN
00:01:19 0 0 20 20 190 X
00:01:16 0 0 0 0 110 R, X
Parameter Description
Area ID A 32-bit identifier for the created stub area.
Type of Service The type of service associated with the stub metric. EFOS only supports Normal TOS.
Metric Val The metric value is applied based on the TOS. It defaults to the least metric of the type of service among the
interfaces to other areas. The OSPF cost for a route is a function of the metric value.
Import Summary LSA Controls the import of summary LSAs into stub areas.
NOTE: The clear ip ospf counters command does not clear the message queue high water marks.
Parameter Description
OSPFv2 Packet The number of packets of each type sent and received since OSPF counters were last cleared.
Statistics
LSAs Retransmitted The number of LSAs retransmitted by this router since OSPF counters were last cleared.
Parameter Description
LS Update Max The maximum rate of LS Update packets received during any 5-second interval since OSPF counters were last
Receive Rate cleared. The rate is in packets per second.
LS Update Max Send The maximum rate of LS Update packets transmitted during any 5-second interval since OSPF counters were
Rate last cleared. The rate is in packets per second.
Number of LSAs The number of LSAs of each type received since OSPF counters were last cleared.
Received
OSPFv2 Queue For each OSPFv2 message queue, the current count, the high water mark, the number of packets that failed to
Statistics be enqueued, and the queue limit. The high water marks are not cleared when OSPF counters are cleared.
Example: The following shows example CLI display output for the command.
(Routing) #show ip ospf traffic
LSAs Retransmitted................0
LS Update Max Receive Rate........20 pps
LS Update Max Send Rate...........10 pps
T1 (Router).......................10
T2 (Network)......................0
T3 (Net Summary)..................300
T4 (ASBR Summary).................15
T5 (External).....................20
T7 (NSSA External)................0
T9 (Link Opaque)..................0
T10 (Area Opaque).................0
T11 (AS Opaque)...................0
Total.............................345
Parameter Description
Area ID The area id of the requested OSPF area.
Neighbor Router ID The input neighbor Router ID.
Hello Interval The configured hello interval for the OSPF virtual interface.
Dead Interval The configured dead interval for the OSPF virtual interface.
Interface Transmit The configured transmit delay for the OSPF virtual interface.
Delay
Retransmit Interval The configured retransmit interval for the OSPF virtual interface.
Authentication Type The configured authentication type of the OSPF virtual interface.
State The OSPF Interface States are: down, loopback, waiting, point-to-point, designated router, and backup
designated router. This is the state of the OSPF interface.
Neighbor State The neighbor state.
Parameter Description
Area ID The area id of the requested OSPF area.
Neighbor The neighbor interface of the OSPF virtual interface.
Hello Interval The configured hello interval for the OSPF virtual interface.
Dead Interval The configured dead interval for the OSPF virtual interface.
Retransmit Interval The configured retransmit interval for the OSPF virtual interface.
Transmit Delay The configured transmit delay for the OSPF virtual interface.
7.16.1 ip unreachables
Use this command to enable the generation of ICMP Destination Unreachable messages on an interface or range of
interfaces. By default, the generation of ICMP Destination Unreachable messages is enabled.
Default enable
Format ip unreachables
Mode Interface Config
7.16.1.0.1 no ip unreachables
Use this command to prevent the generation of ICMP Destination Unreachable messages.
Format no ip unreachables
Mode Interface Config
7.16.2 ip redirects
Use this command to enable the generation of ICMP Redirect messages by the router. By default, the generation of ICMP
Redirect messages is enabled. You can use this command to configure an interface, a range of interfaces, or all interfaces.
Default enable
Format ip redirects
Mode Global Config
Interface Config
Virtual Router Config
7.16.2.0.1 no ip redirects
Use this command to prevent the generation of ICMP Redirect messages by the router.
Format no ip redirects
Mode Global Config
Interface Config
Default enable
Format ipv6 redirects
Mode Interface Config
Default enable
Format ip icmp echo-reply
Mode Global Config
The burst-interval specifies how often the token bucket is initialized with burst-size tokens. burst-interval is
from 0 to 2147483647 milliseconds (ms). The burst-size is the number of ICMP error messages that can be sent during
one burst-interval. The range is from 1 to 200 messages. To disable ICMP rate limiting, set burst-interval to zero
(0).
7.17.1 bfd
This command enables BFD on all interfaces associated with the OSPF process. BFD must be enabled on the individual
interface to trigger BFD on that interface.
Default disabled
Format bfd
Mode Router OSPF Config
Example: Do the following to trigger BFD processing through OSPF globally on all the interfaces that are associated
with it.
7.17.1.0.1 no bfd
This command disables BFD globally on all interfaces associated with the OSPF process.
Format no bfd
Mode Router OSPF Config
Default disabled
Format feature bfd
Mode Global Config
Example:
(Router)# configure
(Router) (Config)# no feature bfd
(Router) (Config)# exit
Default disabled
Format bfd echo
Mode Interface Config
Example:
(Router) (Config)# interface 0/1
(Router) (Interface 0/1)# bfd echo
(Router) (Interface 0/1)# exit
Default none
Format bfd interval transmit-interval min_rx minimum-receive-interval multiplier
detection-time-multiplier
Mode Global Config
Interface Config
Parameters Description
transmit-interval The desired minimum transmit interval, which is the minimum interval that the user wants to use
while transmitting BFD control packets. It is represented in milliseconds. Its range is 100 ms to
1000 ms (with a change granularity of 100) with a default value of 100 ms.
minimum-receive-interval The required minimum receive interval, which is the minimum interval at which the system can
receive BFD control packets. It is represented in milliseconds. Its range is 100 ms to 1000 ms
(with a change granularity of 100) with a default value of 100 ms.
detection-time-multiplier The number of BFD control packets that must be missed in a row to declare a session down. Its
range is 1 to 50 with default value of 3.
Example: The following steps configure BFD session parameters on the device, in Privileged EXEC mode.
(Router)# configure
(Router) (Config)# bfd interval 100 min_rx 200 multiplier 5
(Router) (Config)# exit
Example: The following steps configure BFD session parameters on an interface (for example, 0/1).
(Router) (Config)# interface 0/1
(Router) (Interface 0/1)# bfd interval 100 min_rx 200 multiplier 5
(Router) (Interface 0/1)# exit
Default 2000
Format bfd slow-timer echo-receive-interval
Mode Global Config
Parameters Description
echo-receive-interval The value is represented in milliseconds. Its range is 1000 ms to 30000 ms (with a change
granularity of 100) with default value of 2000 ms.
Example:
(Router)# configure
(Router) (Config)# bfd slow-timer 10000
(Router) (Config)# exit
Default disabled
Format ip ospf bfd
Mode Interface Config
Default disabled
Format no ip ospf bfd
Mode Interface Config
Default disabled
Format neighbor ipaddress fall-over bfd
Mode BGP Router Config
Parameter Description
ipaddress The IP address of a configured neighbor reachable over a VLAN routing interface expressed in dotted quad
notation.
Example: Do the following to trigger BFD processing through BGP on an interface that is associated with it.
7.17.7.0.1 no bfd
This command disables BFD support for fast failover for a BGP neighbor.
Parameters Description
details Provides additional details with the routing protocol BFD has registered and displays the Admin
Mode status as Enabled or Disabled.
Parameters Description
Our IP address The current IP address.
Neighbor IP address The IP address of the active BFD neighbor.
State The current state, either Up or Down.
Interface The current interface.
Uptime The amount of time the interface has been up.
Registered Protocol The protocol from which the BFD session was initiated and that is registered to receive events
from BFD. (for example, BGP).
Local Diag The diagnostic state specifying the reason for the most recent change in the local session state.
Demand mode Indicates if the system wishes to use Demand mode.
NOTE: Demand mode is not supported in the current EFOS release.
Minimum transmit interval The minimum interval to use when transmitting BFD control packets.
Actual TX Interval The transmitting interval being used for control packets.
Actual TX Echo interval The transmitting interval being used for echo packets.
Minimum receive interval The minimum interval at which the system can receive BFD control packets.
Detection interval multiplier The number of BFD control packets that must be missed in a row to declare a session down.
My discriminator Unique Session Identifier for Local BFD Session.
Your discriminator Unique Session Identifier for Remote BFD Session.
Tx Count The number of transmitted BFD packets.
Rx Count The number of received BFD packets.
Drop Count The number of dropped packets.
Example:
(Router)# show bfd neighbors
Interface...................................... 0/15
Uptime......................................... 0:0:0:10
Registered Protocol............................ BGP
Local Diag..................................... None
Demand mode.................................... FALSE
Minimum transmit interval...................... 100
Minimum receive interval....................... 100
Actual tx interval............................. 100
Actual tx echo interval........................ 0
Detection interval multiplier.................. 3
My discriminator............................... 1
Your discriminator............................. 1
Tx Count....................................... 105
Rx Count....................................... 107
Drop Count..................................... 0
These metrics are collected by measuring ICMP response time and connectivity. This feature is deployed mostly in
Enterprise networks on multi-homed customer edge devices, where there is a need to automatically switch to the next priority
ISP in case of reachability issues with the current ISP.
7.18.1 ip sla
Use this command to start configuring an IP Service Level Agreements (SLAs) operation and enter the IP SLA configuration
mode.
Parameters Description
operation-number Identifies the IP SLAs operation being configured. The range is from 1 to 128.
Usage Guidelines
Start configuring an IP SLA operation by using the ip sla command. This command specifies an identification number for
the operation to being configured. Once this command is entered, the router enters IP SLA configuration mode.
This command is supported in IPv4 networks and also for IPv6 networks where IPv6 addresses are supported.
The maximum number of IP SLAs supported is 128 (IPv4 and IPv6 combined).
When an operation is configured, it needs to be scheduled to be started. See the ip sla schedule global configuration
command for more details on scheduling of an operation.
NOTE: The configuration of an operation cannot be modified after an operation has been scheduled to start. For modifying
the configuration of the operation after it is scheduled, the operation must either be stopped or must be deleted first
(using the no ip sla command) and then reconfigured with new operation parameters.
To display the current operational state of an IP SLA operation, use the show ip sla configuration command in user
EXEC or privileged EXEC mode.
Example: The following example shows an operation 55 being configured as an ICMP Echo operation in an IPv4 network
and being scheduled to start. In the following example, the ip sla command being used in an IPv4 network is shown.
(Routing)(config)# ip sla 55
(Routing)(config-ip-sla)#icmp-echo 172.16.1.175
(Routing) (config-ip-sla-echo)#exit
(Routing)(config-ip-sla)#exit
(Routing)(config)# ip sla schedule 55
NOTE: In case the operation 55 is already configured and has not been scheduled, the command line interface will enter
IP SLA configuration mode for operation 55. If the operation already exists and has been scheduled, this command
will fail.
7.18.1.0.1 no ip sla
Use this command to remove all the configuration information of an IP SLA operation, which also includes removing the
schedule of the operation.
Default By default the operation is put in a pending state. In the pending state the operation is enabled but does
not actively probe and collect information.
Format ip sla schedule operation-number
Mode Global Config
Parameters Description
operation-number Identifies the IP SLAs operation being configured. The range is from 1 to 128.
Usage Guidelines
By default IP SLAs are not scheduled to start. When an IP SLA object is created using the ip sla global configuration
command, it needs to be started (with a lifetime of forever) by using the ip sla schedule CLI configuration command.
When an ip sla schedule command is issued, the ip sla operation transitions from pending state to active and immediately
begins probing and collecting information. The IP SLA probes can be stopped by unconfiguring the IP SLA schedule config
by using the no ip sla schedule command.
This command is supported in IPv4 networks and also for IPv6 networks where IPv6 addresses are supported.
NOTE: After you schedule an operation, you cannot modify the configuration of the operation. To modify the configuration
of the operation after it is scheduled, you must first stop the operation by using the no ip schedule command and
then modifying the configuration. Or else you must first delete the IP SLAs operation (using the no ip sla
command) and then reconfigure the operation with the new operation parameters.
To display the current configuration settings of the operation, use the show ip sla configuration command in user EXEC
or privileged EXEC mode.
Example: In the following example, operation 55 is configured as a ICMP Echo operation in an IPv4 network and is
scheduled to start. The example shows the ip sla schedule command being used in an IPv4 network.
(Routing)(config)# ip sla 55
(Routing)(config-ip-sla)# icmp-echo 172.16.1.175
(Routing) (config-ip-sla-echo)#exit
(Routing)(config-ip-sla)#exit
(Routing)(config)# ip sla schedule 55
Default disabled
Format track object-number ip sla operation-number [reachability | state]
Mode Global Config
Parameters Description
object-number Identifies the object to be tracked. The range is from 1 to 128.
operation-number Identifies the IP SLAs operation to be tracked.
reachability Tracks whether the route is reachable.
state Tracks the operation return code.
Usage Guidelines
An operation return-code value is maintained by every IP SLAs operation. This return code is interpreted by the tracking
process. The return code may return OK, OverThreshold, and Timeout.
Two facets of an IP SLAs operation can be tracked: reachability and state. The acceptance of the OverThreshold return code
is the difference between these facets. The following table shows the comparison between the reachability and state facets
of IP SLAs operations that can be tracked.
Tracking of a maximum of 128 (IPv4 and IPv6 combined) track objects is supported. If neither of the optional keywords
(reachability or state) is specified in a configured track ip sla CLI command, then the default tracking type value
reachability gets configured.
Example: In the following example, the tracking process is configured to track the state of IP SLAs operation 5.
Example: In the following example, the tracking process is configured to track the reachability of IP SLAs operation 6.
7.18.4.1 delay
To configure a delay for acting upon a track object reachability state changes, use the delay command in Track
configuration mode.
Default none
Format delay {up seconds [down seconds] | [down seconds] up seconds}
Mode Track Config
Parameters Description
up seconds Time to delay the notification of an up event. Delay value, in seconds. The range is from 0 to
180. The default is 0.
down seconds Time to delay the notification of an down event. Delay value, in seconds. The range is from 0 to
180. The default is 0.
Usage Guidelines
To minimize flapping of the reachability state (Up/Down), use the delay command to introduce a nonzero delay in seconds
between the UP and DOWN state transitions per Track object.
Delay time specifies the hold interval for an (UP/DOWN) state before taking action on the associated static routes.
Example: In the following example, Track object 10 is created and is associated with the IP SLAs operation 11 and then
an up delay of 5 seconds and a down delay of 3 seconds is configured.
(Routing)(config)#track 10 ip sla 11
(Routing)(config-track)#delay up 5 down 3
7.18.4.1.1 no delay
Use this command to reset the delay for acting upon a track object reachability state changes to the default value.
Format no delay
Mode Track Config
7.18.5.1 icmp-echo
Use this command in IP SLA configuration mode, to configure an IP Service Level Agreements (SLAs) Internet Control
Message Protocol (ICMP) echo operation.
Default No IP SLAs operation type is configured for the operation being configured.
Format icmp-echo destination-ip-address [source-interface {interface-name | vlan vlan-id}]
Mode IP SLA Config
Parameters Description
destination-ip-address Destination IPv4 or IPv6 address.
source-interface {interface-name | vlan Used to specify the source interface for the operation.
vlan-id}
Usage Guidelines
You must configure the type of IP SLAs operation (ICMP echo) before you can configure any of the other parameters of the
operation. To change the operation values (destination-ip-address or source-interface-name) of an existing
scheduled IP SLAs ICMP echo operation, you must stop the IP SLA operation by using the no ip sla schedule
operation-number. Or else you must first delete the IP SLAs operation (using the no ip sla global configuration
command) and then reconfigure the operation with the new operation values.
IP SLAs ICMP echo operations support both IPv4 and IPv6 addresses.
Example: In the following example, IP SLAs operation 12 is created and configured as an echo operation using the ICMP
protocol and the destination IPv4 address 143.1.16.125.
(Routing)(config)#ip sla 12
(Routing)(config-ip-sla)#icmp-echo 143.1.16.125
Example: In the following example, IP SLAs operation 13 is created and configured as an echo operation using the ICMP
protocol and the destination IPv6 address 3001:CD6:200::1.
(Routing)(config)#ip sla 13
(Routing)(config-ip-sla)#icmp-echo 3001:CD6:200::1
7.18.6.1 frequency
Use this command to set the rate at which a specified IP Service Level Agreements (SLAs) operation repeats in the ICMP
echo configuration sub-mode of IP SLA configuration mode.
Default 60 seconds
Format frequency seconds
Mode IP SLA ICMP ECHO Config
Parameters Description
seconds Number of seconds between the IP SLAs operations. Range is 1 to 3600.
Usage Guidelines
A single IP SLAs operation will repeat at a given frequency for the lifetime of the operation. For example, the ICMP Echo
operation with a frequency of 60 sends an ICMP Echo Request packet once every 60 seconds, for the lifetime of the
operation. This packet is sent when the operation is started, then is sent again 60 seconds later.
If an individual IP SLAs operation takes longer to execute than the specified frequency value, a statistics counter called
“busy” is incremented rather than immediately repeating the operation.
Following are the recommended guidelines for configuring the frequency, timeout, and threshold commands of the IP
SLAs ICMP Echo operation:
(frequency seconds) → (timeout milliseconds) → (threshold milliseconds)
NOTE: It is recommended to not to set the frequency value to less than 60 seconds because the potential overhead from
numerous active operations could significantly affect network performance.
This command is supported in IPv4 networks and also for IPv6 networks where IPv6 addresses are supported.
Example: The following example shows how to configure an IP SLAs ICMP echo operation (operation 11) to repeat
every 80 seconds. This example shows the frequency (IP SLA) command being used in an IPv4 network in ICMP echo
configuration mode within IP SLA configuration mode.
(Routing)(config)#ip sla 11
(Routing)(config-ip-sla)#icmp-echo 152.15.10.145
(Routing)(config-ip-sla-echo)#frequency 80
7.18.6.1.1 no frequency
Use this command to return the frequency to the default value.
Format no frequency
Mode IP SLA ICMP ECHO Config
7.18.6.2 timeout
Use this command to set the amount of time an IP Service Level Agreements (SLAs) operation waits for a response from its
request packet. This command is available in the ICMP echo configuration sub-mode of IP SLA configuration mode.
Parameters Description
milliseconds Length of time the operation waits to receive a response from its request packet, in milliseconds
(ms). The range is 50 to 300,000.
The value of the milliseconds argument should be based on the sum of both the maximum
round-trip time (RTT) value for the packets and the processing time of the IP SLAs operation.
Usage Guidelines
It is recommended that the value of the milliseconds argument be based on the sum of both the maximum round-trip time
(RTT) value for the packets and the processing time of the IP SLAs operation.
Use the timeout (IP SLA) command to set how long the operation waits to receive a response from its request packet, and
use the frequency (IP SLA) command to set the rate at which the IP SLAs operation restarts. The value specified for the
timeout (IP SLA) command cannot be greater than the value specified for the frequency (IP SLA) command.
Following are the recommended guidelines for configuring the frequency, timeout, and threshold commands of the IP
SLAs ICMP Echo operation:
(frequency seconds) → (timeout milliseconds) → (threshold milliseconds)
This command is supported in IPv4 networks and also for IPv6 networks where IPv6 addresses are supported.
Example: In the following example, the timeout value for an IP SLAs operation 11 is set for 2500 ms:
(Routing)(config)#ip sla 11
(Routing)(config-ip-sla)#icmp-echo 152.17.10.145
(Routing)(config-ip-sla-echo)#timeout 2500
7.18.6.2.1 no timeout
Use this command to return the timeout to the default value.
Format no timeout
Mode IP SLA ICMP ECHO Config
7.18.6.3 threshold
Use this command in the ICMP echo configuration sub-mode of IP SLA configuration to set the upper threshold value for
calculating network monitoring statistics created by an IP SLAs operation.
Parameters Description
milliseconds Length of the time in milliseconds, required for a rising threshold to be declared. Range is 50 to
60,000. Default is 5000.
Usage Guidelines
The value specified for this command must not be greater than the value specified for the timeout command. The threshold
value configured by this command is used only to calculate network monitoring statistics created by an IP SLAs operation.
For the IP SLAs ICMP Echo operation, the threshold (IP SLA) command sets the upper threshold value for the round-trip
time (RTT) measurement.
Following are the recommended guidelines for configuring the frequency, timeout, and threshold commands of the IP
SLAs ICMP Echo operation:
(frequency seconds) → (timeout milliseconds) → (threshold milliseconds)
This command is supported in IPv4 networks and also for IPv6 networks where IPv6 addresses are supported.
Example: The following example shows how to configure the threshold of the IP SLAs ICMP echo operation to 3500.
This example shows the threshold (IP SLA) command being used in an IPv4 network in ICMP echo configuration mode
within IP SLA configuration mode:
(Routing)(config)#ip sla 11
(Routing)(config-ip-sla)#icmp-echo 152.17.10.145
(Routing)(config-ip-sla-echo)#threshold 3500
7.18.6.3.1 no threshold
Use this command to reset the threshold to the default value.
Format no threshold
Mode IP SLA ICMP ECHO Config
Default By default, every IP SLA operation is used to monitor in the Default VRF.
Format vrf vrf-name
Mode IP SLA ICMP ECHO Config
Parameters Description
vrf-name VPN routing and forwarding (VRF) name.
Usage Guidelines
This command identifies the VPN for the operation being configured.
Use this command only if the response time over the VPN tunnel needs to be measured.
The vrf (IP SLA) command is supported only in IPv4 networks. This command is not supported in IPv6 networks to
configure an IP SLAs operation that supports IPv6 addresses.
Example: How to configure an IP SLAs operation for a VPN is shown in the following example. This example shows how
test traffic can be sent in an already existing VPN tunnel between two endpoints.
(Routing)(config)#ip sla 11
(Routing)(config-ip-sla)#icmp-echo 35.1.10.2
(Routing)(config-ip-sla-echo)#vrf vpn1
Format no vrf
Mode IP SLA ICMP ECHO Config
Parameters Description
operation-number IP SLA number of a specific operation whose statistics needs to be cleared.
Parameters Description
operation-number IP SLA number of a specific operation associated with the statistics to display.
Example: IP SLAs Internet Control Message Protocol (ICMP) echo operations support both IPv4 and IPv6 addresses.
The sample outputs from the show ip sla configuration command for different IP SLAs operations in IPv4 and IPv6
networks are shown in the following examples.
Entry number: 3
Type of operation: echo
Target address/Source address: 1.1.1.1/0.0.0.0
Operation timeout (milliseconds): 5000
Vrf Name:
Schedule:
Next Scheduled Start Time: Start Time already passed
Operation frequency (seconds): 60
Life: Forever
Threshold (milliseconds): 5000
In the following example the output from the show ip sla configuration command when the specified operation is an
ICMP echo operation in an IPv6 network is shown:
Entry number: 3
Type of operation: echo
Target address/Source address: 2001:DB8:100::1/2001:0DB8:200::FFFE
Operation timeout (milliseconds): 5000
Vrf Name:
Schedule:
Next Scheduled Start Time: Pending Trigger
Operation frequency (seconds): 60
Life: Forever
Threshold (milliseconds): 5000
Parameters Description
operation-number IP SLA operation number for which statistics and the operational status are displayed.
details Include this option to display statistics and the operational status in greater detail.
Usage Guidelines
This command shows the current state of IP SLAs operations, including whether the operation is active and also the
monitoring data returned for the last (most recently completed) operation.
Example:
(Routing)# show ip sla statistics details
Parameters Description
vrf vrf-name Displays all tracked static routes associated with a specific VRF.
Example:
(Routing)#show ip route track-table
Example:
(Routing)#show ipv6 route track-table
Parameters Description
brief Displays brief information for all track objects.
track-number The track object’s number with the detailed information to display.
ip sla operation-number> IP SLA operation number of whose associated track-objects related brief information needs to
be displayed.
Example: The following example shows detailed information for all track objects.
(Routing)#show track
Track 10
IP SLA 1 reachability
Reachability is Up
1 change, last change 01:12:36
Delay up 5 secs, down 5 secs
Latest operation return code: OK
Latest RTT (millisecs) 1500
Track 11
IP SLA 2 state
State is Up
1 change, last change 00:41:55
Delay up 10 secs, down 10 secs
Latest operation return code: OK
Latest RTT (millisecs) 1000
Track 13
IP SLA 1 state
State is Up
1 change, last change 00:34:08
Delay up 5 secs, down 5 secs
Latest operation return code: OK
Latest RTT (millisecs) 1500
Example: The following example shows detailed information for track object 10.
(Routing)#show track 10
Track 10
IP SLA 1 reachability
Reachability is Up
1 change, last change 01:12:36
Delay up 5 secs, down 5 secs
Latest operation return code: OK
Latest RTT (millisecs) 1500
Example: The following example shows brief information for all track objects associated with IP SLA operation 1.
(Routing)#show track ip sla 1
Example: The following example shows brief information for all track objects.
(Routing)#show track brief
If you do not specify a loopback ID, the following information appears for each loopback interface on the system:
Parameter Description
Loopback ID The loopback ID associated with the rest of the information in the row.
Interface The interface name.
IP Address The IPv4 address of the interface.
Parameter Description
Interface Link Status Shows whether the link is up or down.
Parameter Description
IP Address The IPv4 address of the interface.
MTU size The maximum transmission size for packets on this interface, in bytes.
If you do not specify a tunnel ID, the command shows the following information for each configured tunnel.
Parameter Description
Tunnel ID The tunnel identification number.
Interface The name of the tunnel interface.
Tunnel Mode The tunnel mode.
Source Address The source transport address of the tunnel.
Destination Address The destination transport address of the tunnel.
If you specify a tunnel ID, the command shows the following information for the tunnel.
Parameter Description
Interface Link Status Shows whether the link is up or down.
MTU Size The maximum transmission unit for packets on the interface.
IPv6 Address/Length If you enable IPv6 on the interface and assign an address, the IPv6 address and prefix display.
Default disabled
Format ipv6 unicast-routing
Mode Global Config
Default disabled
Format ipv6 enable
You can express IPv6 addresses in eight blocks. Also of note is that instead of a period, a colon now separates each block.
For simplification, leading zeros of each 16 bit block can be omitted. One sequence of 16 bit blocks containing only zeros
can be replaced with a double colon “::”, but not more than one at a time (otherwise, it is no longer a unique representation).
Dropping zeros: 3ffe:ffff:100:f101:0:0:0:1 becomes 3ffe:ffff:100:f101::1
The hexadecimal letters in the IPv6 addresses are not case-sensitive. An example of an IPv6 prefix and prefix length is
3ffe:1::1234/64.
The optional [eui-64] field designates that IPv6 processing on the interfaces was enabled using an EUI-64 interface ID in
the low order 64 bits of the address. If you use this option, the value of prefix_length must be 64 bits.
If you do not supply any parameters, the command deletes all the IPv6 addresses on an interface.
Default disabled
Format ipv6 address autoconfig
Mode Interface Config
Default disabled
Format ipv6 route [vrf vrf-name]{ipv6-prefix/prefix_length {next-hop-address | Null0 |
interface {slot/port | vlan vlan-id} [next-hop-address]}[preference] [track object-
number]
Mode Global Config
Parameter Description
vrf vrf-name The optional vrf argument specifies the VRF instance.
ipv6-prefix The ipv6-prefix is the IPv6 network that is the destination of the static route.
Parameter Description
prefix_length The prefix_length is the length of the IPv6 prefix—a decimal value (usually 0 to 64) that shows
how many of the high-order contiguous bits of the address comprise the prefix (the network
portion of the address). A slash mark must precede the prefix_length.
next-hop-address The next-hop-address is the IPv6 address of the next hop that can be used to reach the
specified network. Specifying Null0 as nexthop parameter adds a static reject route.
preference The preference parameter is a value the router uses to compare this route with routes from other
route sources that have the same destination. The range for preference is 1 to 255, and the
default value is 1. A route with a preference of 255 cannot be used to forward traffic.
track object-number Use the track object-number to specify that the static route is installed only if the configured
track object is up. When the track object is down the static route is removed from the route table.
The object-number parameter is the object number representing the object to be tracked. The
range is from 1 to 128. Only one track object can be associated with a specific static route.
If you configure a different track object, the previously configured track object is replaced by the newly
configured track object. To display the IPv6 static routes being tracked by track objects, use the show ipv6
route track-table command.
slot/port The argument slot/port corresponds to a physical routing interface or VLAN routing interface.
vlan vlan-id The keyword vlan is used to specify the VLAN ID of the routing VLAN directly instead of a slot/
port format. You can specify a slot/port or vlan vlan-id or tunnel tunnel_id interface to
identify direct static routes from point-to-point and broadcast interfaces. The interface must be
specified when using a link-local address as the next hop.
Changing the default distance does not update the distance of existing static routes, even if they were assigned the original
default distance. The new default distance will only be applied to static routes created after invoking the ipv6 route
distance command.
Default 1
Format ipv6 route [vrf vrf-name] distance 1-255
Parameter Description
prefix/prefix-length The destination network and mask for the route.
nexthopip The next-hop IP address, It must belong to an active routing interface, but it does not need to be resolved.
num-routes The number of routes need to added into hardware starting from the given prefix argument and within the given
prefix-length.
This command is supported in IPv6 networks. The maximum number of IP static BFD sessions that can be supported is
limited by the max BFD sessions configurable per DUT.
Format ipv6 route static bfd interface unit/slot/port | vlan id neighbor ip address [global |
link-local]
Mode Global Config
Parameter Description
interface Specify the local interface either in unit/slot/port format or as a VLAN ID.
neighbor ip address Specify the other end of the BFD session, peer address.
Example:
(localhost) #configure
(localhost) (Config)#interface 0/29
(localhost) (Interface 0/29)#routing
(localhost) (Interface 0/29)#ipv6 address 2001::1/64
(localhost) (Interface 0/29)#bfd interval 100 min_rx 100 multiplier 5
(localhost) (Interface 0/29)#exit
!Current Configuration:
!
interface 0/29
no shutdown
routing
ipv6 address 2001::1/64
bfd interval 100 min_rx 100 multiplier 5
exit
NOTE: The default MTU value for a tunnel interface is 1480. You cannot change this value.
Default 1
Format ipv6 nd dad attempts 0-600
Default false
Format ipv6 nd managed-config-flag
Mode Interface Config
Default 0
Format ipv6 nd ns-interval {1000-4294967295 | 0}
Mode Interface Config
Default false
Format ipv6 nd other-config-flag
Mode Interface Config
Default 600
Format ipv6 nd ra-interval-max 4-1800
Mode Interface Config
Default 1800
Format ipv6 nd ra-lifetime lifetime
Mode Interface Config
Default disable
Format ipv6 nd ra hop-limit unspecified
Mode Interface Config
Default 0
Format ipv6 nd reachable-time 0–4294967295
Mode Interface Config
Default medium
Format ipv6 nd router-preference { low | medium | high}
Mode Interface Config
Default disabled
Format ipv6 nd suppress-ra
Mode Interface Config
The router advertises its global IPv6 prefixes in its router advertisements (RAs). An RA only includes the prefixes of the IPv6
addresses configured on the interface where the RA is transmitted. Addresses are configured using the ipv6 address
interface configuration command. Each prefix advertisement includes information about the prefix, such as its lifetime
values and whether hosts should use the prefix for on-link determination or address auto-configuration. Use the ipv6 nd
prefix command to configure these values.
The ipv6 nd prefix command allows you to preconfigure RA prefix values before you configure the associated interface
address. For the prefix to be included in RAs, you must configure an address that matches the prefix using the ipv6 address
command. Prefixes specified using ipv6 nd prefix without associated interface address will not be included in RAs and
will not be committed to the device configuration.
Default valid-lifetime—2592000
preferred-lifetime—604800
autoconfig—enabled
on-link—enabled
Format ipv6 nd prefix prefix/prefix_length [{0-4294967295 | infinite} {0-4294967295 |
infinite}] [no-autoconfig on-link]
Mode Interface Config
Parameter Description
vrf The optional argument vrf is passed to create the neighbor in the VRF instance.
ipv6address The IPv6 address of the neighbor.
slot/port The slot/port for the interface.
vlan The VLAN for the interface.
macaddr The MAC address for the neighbor.
Default disabled
Format ipv6 neighbors dynamicrenew
Mode Global Config
Parameter Description
backoff-multiple Sets the exponential backoff multiple to calculate time outs in NS transmissions during NUD. The value ranges
from 1 to 5. 1 is the default. The next timeout value is limited to a maximum value of 60 seconds if the value with
exponential backoff calculation is greater than 60 seconds.
max-multicast-solicits Sets the maximum number of multicast solicits sent during Neighbor Unreachability Detection. The value ranges
from 3 to 255. 3 is the default.
max-unicast-solicits Sets the maximum number of unicast solicits sent during Neighbor Unreachability Detection. The value ranges
from 3 to 10. 3 is the default.
Up to 128 prefix lists may be configured. The maximum number of statements allowed in prefix list is 64.
Default No prefix lists are configured by default. When neither the ge nor the le option is configured, the destination prefix
must match the network/length exactly. If the ge option is configured without the le option, any prefix with a network
mask greater than or equal to the ge value is considered a match. Similarly, if the le option is configured without the
ge option, a prefix with a network mask less than or equal to the le value is considered a match.
Format ip prefix-list list-name {[seq number] {permit | deny} ipv6-prefix/prefix-length [ge
length] [le length] | renumber renumber-interval first-statement-number}
Mode Global Configuration
Parameter Description
list-name The text name of the prefix list. Up to 32 characters.
seq number (Optional) The sequence number for this prefix list statement. Prefix list statements are ordered from lowest
sequence number to highest and applied in that order. If you do not specify a sequence number, the system will
automatically select a sequence number five larger than the last sequence number in the list. Two statements
may not be configured with the same sequence number. The value ranges from 1 to 4,294,967,294.
permit Permit routes whose destination prefix matches the statement.
deny Deny routes whose destination prefix matches the statement.
ipv6-prefix/prefix- Specifies the match criteria for routes being compared to the prefix list statement. The ipv6-prefix can be any valid
length IP prefix. The length is any IPv6 prefix length from 0 to 32.
ge length (Optional) If this option is configured, then a prefix is only considered a match if its network mask length is greater
than or equal to this value. This value must be longer than the network length and less than or equal to 32.
le length (Optional) If this option is configured, then a prefix is only considered a match if its network mask length is less
than or equal to this value. This value must be longer than the ge length and less than or equal to 32.
renumber (Optional) Provides the option to renumber the sequence numbers of the IP prefix list statements with a given
interval starting from a particular sequence number. The valid range for renumber-interval is 1 to 100, and
the valid range for first-statement-number is 1 to 1000.
Format no ipv6 prefix-list list-name [seq number] {permit | deny} network/length [ge length]
[le length]
Mode Global Configuration
Default enable
Format ipv6 unreachables
Mode Interface Config
Default enable
Format ipv6 unresolved-traffic rate-limit 50-1024
Mode Global Config
The burst-interval specifies how often the token bucket is initialized with burst-size tokens. burst-interval is
from 0 to 2147483647 milliseconds (ms).
The burst-size is the number of ICMPv6 error messages that can be sent during one burst-interval. The range is
from 1 to 200 messages.
Parameter Description
IPv6 Forwarding Mode Shows whether the IPv6 forwarding mode is enabled.
IPv6 Unicast Routing Shows whether the IPv6 unicast routing mode is enabled.
Mode
IPv6 Hop Limit Shows the unicast hop count used in IPv6 packets originated by the node. For more information, see the ipv6
hop-limit (Global Config) command.
ICMPv6 Rate Limit Shows how often the token bucket is initialized with burst-size tokens. For more information, see the ipv6 icmp
Error Interval error-interval command.
ICMPv6 Rate Limit Shows the number of ICMPv6 error messages that can be sent during one burst-interval. For more information,
Burst Size see the ipv6 icmp error-interval command.
Maximum Routes Shows the maximum IPv6 route table size.
IPv6 Unresolved Data Shows the rate in packets-per-second for the number of IPv6 data packets trapped to CPU when the packet fails
Rate Limit to be forwarded in the hardware due to unresolved hardware address of the destined IPv6 node.
IPv6 Neighbors Shows the dynamic renewal mode for the periodic NUD (neighbor unreachability detection) run on the existing
Dynamic Renew IPv6 neighbor entries based on the activity of the entries in the hardware.
IPv6 NUD Maximum Shows the maximum number of unicast Neighbor Solicitations sent during NUD (neighbor unreachabililty
Unicast Solicits detection) before switching to multicast Neighbor Solicitations.
IPv6 NUD Maximum Shows the maximum number of multicast Neighbor Solicitations sent during NUD (neighbor unreachabililty
Multicast Solicits detection) when in UNREACHABLE state.
IPv6 NUD Exponential Shows the exponential backoff multiple to be used in the calculation of the next timeout value for Neighbor
Backoff Multiple Solicitation transmission during NUD (neighbor unreachabililty detection) following the exponential backoff
algorithm.
System uRPF Mode Shows whether unicast Reverse Path Forwarding (uRPF) is enabled.
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 brief
The argument slot/port corresponds to a physical routing interface or VLAN routing interface. The keyword vlan is used
to specify the VLAN ID of the routing VLAN directly instead of a slot/port format. The keyword loopback specifies the
loopback interface directly. The keyword tunnel specifies the IPv6 tunnel interface.
If you use the brief parameter, the following information displays for all configured IPv6 interfaces.
Parameter Description
Interface The interface in slot/port format.
IPv6 Operational Shows whether the mode is enabled or disabled.
Mode
IPv6 Address/Length Shows the IPv6 address and length on interfaces with IPv6 enabled.
Method Indicates how each IP address was assigned. The field contains one of the following values:
DHCP - The address is leased from a DHCP server.
Manual - The address is manually configured.
Global addresses with no annotation are assumed to be manually configured.
Parameter Description
Routing Mode Shows whether IPv6 routing is enabled or disabled.
IPv6 Enable Mode Shows whether IPv6 is enabled on the interface.
Administrative Mode Shows whether the interface administrative mode is enabled or disabled.
Bandwidth Shows bandwidth of the interface.
Interface Maximum Transmission Unit The MTU size, in bytes.
Router Duplicate Address Detection The number of consecutive duplicate address detection probes to transmit.
Transmits
Address Autoconfigure Mode Shows whether the autoconfigure mode is enabled or disabled.
Address DHCP Mode Shows whether the DHCPv6 client is enabled on the interface.
IPv6 Hop Limit Unspecified Indicates if the router is configured on this interface to send Router Advertisements with
unspecified (0) as the Current Hop Limit value.
Router Advertisement NS Interval The interval, in milliseconds, between router advertisements for advertised neighbor
solicitations.
Router Advertisement Lifetime Shows the router lifetime value of the interface in router advertisements.
Router Advertisement Reachable Time The amount of time, in milliseconds, to consider a neighbor reachable after neighbor discovery
confirmation.
Router Advertisement Interval The frequency, in seconds, that router advertisements are sent.
Router Advertisement Managed Config Shows whether the managed configuration flag is set (enabled) for router advertisements on
Flag this interface.
Parameter Description
Router Advertisement Other Config Flag Shows whether the other configuration flag is set (enabled) for router advertisements on this
interface.
Router Advertisement Router Preference Shows the router preference.
Router Advertisement Suppress Flag Shows whether router advertisements are suppressed (enabled) or sent (disabled).
IPv6 Destination Unreachables Shows whether ICMPv6 Destination Unreachable messages may be sent (enabled) or not
(disabled). For more information, see the ipv6 unreachables command.
ICMPv6 Redirect Specifies if ICMPv6 redirect messages are sent back to the sender by the Router in the
redirect scenario is enabled on this interface.
If an IPv6 prefix is configured on the interface, the following information also appears.
Parameter Description
IPv6 Prefix is The IPv6 prefix for the specified interface.
Preferred Lifetime The amount of time the advertised prefix is a preferred prefix.
Valid Lifetime The amount of time the advertised prefix is valid.
Onlink Flag Shows whether the onlink flag is set (enabled) in the prefix.
Autonomous Flag Shows whether the autonomous address-configuration flag (autoconfig) is set (enabled) in the prefix.
Example: The following shows example CLI display output for the command.
(alpha-stack) #show ipv6 interface brief
Oper.
Interface Mode IPv6 Address/Length
---------- -------- ---------------------------------
0/33 Enabled FE80::211:88FF:FE2A:3E3C/128
2033::211:88FF:FE2A:3E3C/64
0/17 Enabled FE80::211:88FF:FE2A:3E3C/128
2017::A42A:26DB:1049:43DD/128 [DHCP]
4/1 Enabled FE80::211:88FF:FE2A:3E3C/128
2001::211:88FF:FE2A:3E3C/64 [AUTO]
4/2 Disabled FE80::211:88FF:FE2A:3E3C/128 [TENT]
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 interface 0/4/1
IPv6 is enabled
IPv6 Prefix is ................................ fe80::210:18ff:fe00:1105/128
2001::1/64
Routing Mode................................... Enabled
IPv6 Enable Mode............................... Enabled
Administrative Mode............................ Enabled
IPv6 Operational Mode.......................... Enabled
Bandwidth...................................... 10000 kbps
Interface Maximum Transmit Unit................ 1500
Router Duplicate Address Detection Transmits... 1
Address DHCP Mode.............................. Disabled
IPv6 Hop Limit Unspecified..................... Enabled
Router Advertisement NS Interval............... 0
Router Advertisement Lifetime.................. 1800
Router Advertisement Reachable Time............ 0
Router Advertisement Interval.................. 600
Router Advertisement Managed Config Flag....... Disabled
Prefix 2001::1/64
Preferred Lifetime............................. 604800
Valid Lifetime................................. 2592000
Onlink Flag.................................... Enabled
Autonomous Flag................................ Enabled
Parameter Description
Mode Displays whether the specified interface is in Client mode or not.
State State of the DHCPv6 Client on this interface.The valid values are: INACTIVE, SOLICIT, REQUEST,
ACTIVE, RENEW, REBIND, RELEASE.
Server DUID DHCPv6 Unique Identifier of the DHCPv6 Server on this interface.
T1 Time The T1 time specified by the DHCPv6 server. After the client has held the address for this length of
time, the client tries to renew the lease.
T2 Time The T2 time specified by the DHCPv6 server. If the lease renewal fails, then when the client has held
the lease for this length of time, the client sends a Rebind message to the server.
Interface IAID An identifier for an identity association chosen by this client.
Leased Address The IPv6 address leased by the DHCPv6 Server for this interface.
Preferred Lifetime The preferred lifetime of the IPv6 address, as defined in RFC 2462.
Valid Lifetime The valid lifetime of the IPv6 address, as defined by RFC 2462.
Renew Time The time until the client tries to renew the lease
Expiry Time The time until the address expires.
Parameter Description
Interface The port/interface on which this feature is enabled.
Role The associated device role for the interface.
Example:
(Switching) # show ipv6 nd raguard policy
Configured Interfaces
Interface Role
--------------- -------
0/1 Host
Format show ipv6 neighbor [vrf vrf-name] [interface {slot/port | tunnel 0-7 | vlan 1-
4093}]
Mode Privileged EXEC
Parameter Description
Interface The interface in slot/port format.
IPv6 Address IPV6 address of neighbor or interface.
MAC Address Link-layer Address.
IsRtr Shows whether the neighbor is a router. If the value is TRUE, the neighbor is known to be a router, and FALSE
otherwise. A value of FALSE might mean that routers are not always known to be routers.
Neighbor State State of neighbor cache entry. Possible values are Incomplete, Reachable, Stale, Delay, Probe, and Unknown.
Last Updated The time in seconds that has elapsed since an entry was added to the cache.
Type The type of neighbor entry. The type is Static if the entry is manually configured and Dynamic if dynamically
resolved.
When a VLAN ID or port routing interface is provided, only the IPv6 neighbors learned on that VLAN or port routing interface
are deleted.
Use the slot/port parameter to specify an interface, or the vlan parameter to specify a VLAN.
Parameter Description
BGP Section:
Routing Protocol BGP.
Router ID The router ID configured for BGP.
Local AS Number The AS number that the local router is in.
BGP Admin Mode Whether BGP is globally enabled or disabled.
Maximum Paths The maximum number of next hops in an internal or external BGP route.
Always Compare MED Whether BGP is configured to compare the MEDs for routes received from peers in different ASs.
Maximum AS Path Limit on the length of AS paths that BGP accepts from its neighbors.
Length
Fast Internal Failover Whether BGP immediately brings down a iBGP adjacency if the routing table manager reports that the peer
address is no longer reachable.
Fast External Failover Whether BGP immediately brings down an eBGP adjacency if the link to the neighbor goes down.
Distance The default administrative distance (or route preference) for external, internal, and locally-originated BGP routes.
The table that follows lists ranges of neighbor addresses that have been configured to override the default
distance with a neighbor-specific distance. If a neighbor’s address falls within one of these ranges, routes from
that neighbor are assigned the configured distance. If a prefix list is configured, then the distance is only assigned
to prefixes from the neighbor that are permitted by the prefix list.
Redistribution A table showing information for each source protocol (connected, static, rip, and ospf). For each of these sources
the distribution list and route-map are shown, as well as the configured metric. Fields which are not configured
are left blank. For ospf, an additional line shows the configured ospf match parameters.
Prefix List In The global prefix list used to filter inbound routes from all neighbors.
Prefix List Out The global prefix list used to filter outbound routes to all neighbors.
Networks Originated The set of networks originated through a network command. Those networks that are actually advertised to
neighbors are marked “active.”
Neighbors A list of configured neighbors and the inbound and outbound policies configured for each.
OSPFv3 Section:
Routing Protocol OSPFv3.
Router ID The router ID configured for OSPFv3.
OSPF Admin Mode Whether OSPF is enabled or disabled globally.
Maximum Paths The maximum number of next hops in an OSPF route.
Default Route Whether OSPF is configured to originate a default route.
Advertise
Always Whether default advertisement depends on having a default route in the common routing table.
Metric The metric configured to be advertised with the default route.
Metric Type The metric type for the default route.
Example: The following shows example CLI display output for the command.
(Router) #show ipv6 protocols
Prefixes Originated:
2005::/64 (active)
3012::/48
Neighbors:
172.20.1.100
Filter List In........................... 1
Filter List Out........................... 2
Prefix List In............................ PfxList2
Prefix List Out........................... PfxList3
Route Map In.............................. rmapUp
Route Map Out............................. rmapDown
NOTE: If you use the connected keyword for protocol, the all option is not available because there are no best or
non-best connected routes.
Parameter Description
vrf vrf-name The optional vrf argument filters and displays the routes belonging to the virtual router. In the absence of the
vrf-name argument, the default router’s routing table is displayed.
ipv6-address The ipv6-address specifies a specific IPv6 address for which the best-matching route would be
displayed.
ipv6-prefix/ The ipv6-prefix/ipv6-prefix-length specifies a specific IPv6 network for which the matching
ipv6-prefix- route would be displayed.
length
interface The interface specifies that the routes with next-hops on the interface be displayed.
slot/port The argument slot/port corresponds to a physical routing interface or VLAN routing interface.
vlan The keyword vlan is used to specify the VLAN ID of the routing VLAN directly instead of a slot/port
format.
protocol The protocol specifies the protocol that installed the routes. The protocol is one of the following
keywords: connected, ospf, static.
all The all specifies that all routes including best and non-best routes are displayed. Otherwise, only the
best routes are displayed.
Route Codes The key for the routing protocol codes that might appear in the routing table output.
The show ipv6 route command displays the routing tables in the following format:
Codes: C - connected, S - static
O - OSPF Intra, OI - OSPF Inter, OE1 - OSPF Ext 1, OE2 - OSPF Ext 2
ON1 - OSPF NSSA Ext Type 1, ON2 - OSPF NSSA Ext Type 2, Truncated, K - kernel
The columns for the routing table display the following information:
Parameter Description
Code The code for the routing protocol that created this routing entry.
Default Gateway The IPv6 address of the default gateway. When the system does not have a more specific route to a packet's
destination, it sends the packet to the default gateway.
IPv6-Prefix/IPv6- The IPv6-Prefix and prefix-length of the destination IPv6 network corresponding to this route.
Prefix-Length
Preference/Metric The administrative distance (preference) and cost (metric) associated with this route. An example of this output
is [1/0], where 1 is the preference and 0 is the metric.
Tag The decimal value of the tag associated with a redistributed route, if it is not 0.
Next-Hop The outgoing router IPv6 address to use when forwarding traffic to the next router (if any) in the path toward the
destination.
Route-Timestamp The last updated time for dynamic routes. The format of Route-Timestamp will be
Days:Hours:Minutes if days > = 1
Hours:Minutes:Seconds if days < 1
Interface The outgoing router interface to use when forwarding traffic to the next destination. For reject routes, the next hop
interface would be Null0 interface.
T A flag appended to an IPv6 route to indicate that it is an ECMP route, but only one of its next hops has been
installed in the forwarding table. The forwarding table may limit the number of ECMP routes or the number of
ECMP groups. When an ECMP route cannot be installed because such a limit is reached, the route is installed
with a single next hop. Such truncated routes are identified by a T after the interface name.
To administratively control the traffic destined to a particular network and prevent it from being forwarded through the router,
you can configure a static reject route on the router. Such traffic would be discarded and the ICMP destination unreachable
message is sent back to the source. This is typically used for preventing routing loops. The reject route added in the RTO is
of the type OSPF Inter-Area. Reject routes (routes of REJECT type installed by any protocol) are not redistributed by OSPF.
Reject routes are supported in both OSPFv2 and OSPFv3.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 route
C 2001:db9:1::/64 [0/0]
using ::, 0/1
OI 3000::/64 [110/1]
using fe80::200:e7ff:fe2e:ec3f, 00h:00m:11s, 0/1 T
Example: The following shows example CLI display output for the command to indicate kernel routes with code K.
(router) #show ipv6 route
C 2009:1::/64 [0/0]
using ::, 0/11
C 2044:1::/64 [0/0]
using ::, 0/18
K 3001:33:3::/64 [1/0]
using 2009:1::12, 00h:00m:25s, 0/11
K 5001:55:5::/64 [1/0]
using 2044:1::14, 00h:00m:35s, 0/18
Example: The following is an example of the CLI display output with a hardware failure.
(router) #
(router) #configure
(router) (Config)#interface 0/1
(router) (Interface 0/1)#routing
(router) (Interface 0/1)#ipv6 enable
(router) (Interface 0/1)#ipv6 address 2001::2/64
(router) (Interface 0/1)#exit
(router) (Config)#ipv6 route net-prototype 3001::/64 2001::4 1
C 2001::/128 [0/0]
using ::, 0/1
P 3001::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1 hw-failure
Example: The following shows example CLI output to display the IPv6 routing table for a virtual router instance.
(Routing) #show ipv6 route vrf Red
(Routing) #
Example: The following shows example CLI display output for the command.
(router) #show ipv6 route ecmp-groups
C 2001::/128 [0/0]
using ::, 0/1
C 2005::/128 [0/0]
using ::, 0/2
P 3001::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1 hw-failure
P 3001:0:0:1::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1 hw-failure
P 3001:0:0:2::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1 hw-failure
P 3001:0:0:3::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1 hw-failure
Example:
P 3001::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1
P 3001:0:0:1::/64 [0/1]
using 2001::4, 00h:00m:04s, 0/1
Parameter Description
Local Preference of directly-connected routes.
Static Preference of static routes.
OSPF Intra Preference of routes within the OSPF area.
OSPF Inter Preference of routes to other OSPF routes that are outside of the area.
OSPF External Preference of OSPF external routes.
BGP External Preference of BGP external routes.
BGP Internal Preference of routes to other BGP routes that are outside of the area.
BGP Local Preference of routes within the BGP area.
Example:
(lb6m) #show ipv6 route preferences
Local.......................................... 0
Static......................................... 1
OSPF Intra..................................... 110
OSPF Inter..................................... 110
OSPF External.................................. 110
BGP External................................... 20
BGP Internal................................... 200
BGP Local...................................... 200
Example:
(localhost) (Config)#show ipv6 route static bfd
When the optional all keyword is given, some statistics, such as the number of routes from each source, include counts for
alternate routes. An alternate route is a route that is not the most preferred route to its destination and therefore is not
installed in the forwarding table. To include only the number of best routes, do not use the optional keyword.
Parameter Description
Connected Routes Total number of connected routes in the routing table.
Static Routes Total number of static routes in the routing table.
BGP Routes Total number of routes installed by the BGP protocol.
External The number of external BGP routes.
Internal The number of internal BGP routes.
Local The number of local BGP routes.
OSPF Routes Total number of routes installed by OSPFv3 protocol.
Reject Routes Total number of reject routes installed by all protocols.
Net Prototype Routes The total number of net-prototype routes.
Number of Prefixes Summarizes the number of routes with prefixes of different lengths.
Total Routes The total number of routes in the routing table.
Best Routes The number of best routes currently in the routing table. This number only counts the best route
to each destination.
Alternate Routes The number of alternate routes currently in the routing table. An alternate route is a route that was
not selected as the best route to its destination.
Route Adds The number of routes that have been added to the routing table.
Route Modifies The number of routes that have been changed after they were initially added to the routing table.
Route Deletes The number of routes that have been deleted from the routing table.
Unresolved Route Adds The number of route adds that failed because none of the route’s next hops were on a local
subnet. Note that static routes can fail to be added to the routing table at startup because the
routing interfaces are not yet up. This counter gets incremented in this case. The static routes are
added to the routing table when the routing interfaces come up.
Invalid Route Adds The number of routes that failed to be added to the routing table because the route was invalid. A
log message is written for each of these failures.
Failed Route Adds The number of routes that failed to be added to the routing table because of a resource limitation
in the routing table.
Parameter Description
Hardware Failed Route Adds The number of routes that failed to be inserted into the hardware due to a hash error or a table full
condition.
Reserved Locals The number of routing table entries reserved for a local subnet on a routing interface that is down.
Space for local routes is always reserved so that local routes can be installed when a routing
interface bounces.
Unique Next Hops The number of distinct next hops used among all routes currently in the routing table. These
include local interfaces for local routes and neighbors for indirect routes.
Unique Next Hops High Water The highest count of unique next hops since counters were last cleared.
Next Hop Groups The current number of next hop groups in use by one or more routes. Each next hop group
includes one or more next hops.
Next Hop Groups High Water The highest count of next hop groups since counters were last cleared.
ECMP Groups The number of next hop groups with multiple next hops.
ECMP Routes The number of routes with multiple next hops currently in the routing table.
Truncated ECMP Routes The number of ECMP routes that are currently installed in the forwarding table with just one next
hop. The forwarding table may limit the number of ECMP routes or the number of ECMP groups.
When an ECMP route cannot be installed because such a limit is reached, the route is installed
with a single next hop.
ECMP Retries The number of ECMP routes that have been installed in the forwarding table after initially being
installed with a single next hop.
Routes with n Next Hops The current number of routes with each number of next hops.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 route summary
Connected Routes............................... 4
Static Routes.................................. 0
6To4 Routes.................................... 0
BGP Routes..................................... 10
External..................................... 0
Internal..................................... 10
Local........................................ 0
OSPF Routes.................................... 13
Intra Area Routes............................ 0
Inter Area Routes............................ 13
External Type-1 Routes....................... 0
External Type-2 Routes....................... 0
Reject Routes.................................. 0
Net Prototype Routes........................... 10004
Total routes................................... 17
Connected Routes............................... 0
Static Routes.................................. 0
Kernel Routes.................................. 0
6To4 Routes.................................... 0
BGP Routes..................................... 0
External..................................... 0
Internal..................................... 0
Local........................................ 0
OSPF Routes.................................... 0
Intra Area Routes............................ 0
Inter Area Routes............................ 0
External Type-1 Routes....................... 0
External Type-2 Routes....................... 0
Reject Routes.................................. 0
MPLS routes.................................... 0
Net Prototype Routes........................... 0
Total routes................................... 0
Number of Prefixes:
Example:
(Switching) # show ipv6 snooping counters
RA Redir
------- -------
0 0
Parameter Description
MAC Address used by Routing VLANs Shows the MAC address.
The rest of the output for this command is displayed in a table with the following column headings:
Format show ipv6 traffic [{slot/port|vlan 1-4093| loopback loopback-id | tunnel tunnel-id}]
Mode Privileged EXEC
Parameter Description
Total Datagrams Received Total number of input datagrams received by the interface, including those received in error.
Received Datagrams Locally Delivered Total number of datagrams successfully delivered to IPv6 user-protocols (including ICMP).
This counter increments at the interface to which these datagrams were addressed, which
might not necessarily be the input interface for some of the datagrams.
Received Datagrams Discarded Due To Number of input datagrams discarded due to errors in their IPv6 headers, including version
Header Errors number mismatch, other format errors, hop count exceeded, errors discovered in processing
their IPv6 options, and so on.
Received Datagrams Discarded Due To Number of input datagrams that could not be forwarded because their size exceeded the link
MTU MTU of outgoing interface.
Received Datagrams Discarded Due To Number of input datagrams discarded because no route could be found to transmit them to
No Route their destination.
Received Datagrams With Unknown Number of locally-addressed datagrams received successfully but discarded because of an
Protocol unknown or unsupported protocol. This counter increments at the interface to which these
datagrams were addressed, which might not be necessarily the input interface for some of the
datagrams.
Received Datagrams Discarded Due To Number of input datagrams discarded because the IPv6 address in their IPv6 header's
Invalid Address destination field was not a valid address to be received at this entity. This count includes invalid
addresses (for example, ::0) and unsupported addresses (for example, addresses with
unallocated prefixes). Forentities which are not IPv6 routers and therefore do not forward
datagrams, this counter includes datagrams discarded because the destination address was
not a local address.
Received Datagrams Discarded Due To Number of input datagrams discarded because datagram frame didn't carry enough data.
Truncated Data
Received Datagrams Discarded Other Number of input IPv6 datagrams for which no problems were encountered to prevent their
continue processing, but which were discarded (for example, for lack of buffer space). Note
that this counter does not include datagrams discarded while awaiting reassembly.
Received Datagrams Reassembly Number of IPv6 fragments received which needed to be reassembled at this interface. Note
Required that this counter increments at the interface to which these fragments were addressed, which
might not be necessarily the input interface for some of the fragments.
Datagrams Successfully Reassembled Number of IPv6 datagrams successfully reassembled. Note that this counter increments at the
interface to which these datagrams were addressed, which might not be necessarily the input
interface for some of the fragments.
Parameter Description
Datagrams Failed To Reassemble Number of failures detected by the IPv6 reassembly algorithm (for whatever reason: timed out,
errors, and so on). Note that this is not necessarily a count of discarded IPv6 fragments since
some algorithms (notably the algorithm in by combining them as they are received. This
counter increments at the interface to which these fragments were addressed, which might not
be necessarily the input interface for some of the fragments.
Datagrams Forwarded Number of output datagrams which this entity received and forwarded to their final
destinations. In entities which do not act as IPv6 routers, this counter will include only those
packets which were Source-Routed using this entity, and the Source-Route processing was
successful. Note that for a successfully forwarded datagram the counter of the outgoing
interface increments.
Datagrams Locally Transmitted Total number of IPv6 datagrams which local IPv6 user-protocols (including ICMP) supplied to
IPv6 in requests for transmission. Note that this counter does not include any datagrams
counted in ipv6IfStatsOutForwDatagrams.
Datagrams Transmit Failed Number of output IPv6 datagrams for which no problem was encountered to prevent their
transmission to their destination, but which were discarded (for example, for lack of buffer
space). Note that this counter would include datagrams counted in
ipv6IfStatsOutForwDatagrams if any such packets met this (discretionary) discard criterion.
Fragments Created Number of output datagram fragments that have been generated as a result of fragmentation
at this output interface.
Datagrams Successfully Fragmented Number of IPv6 datagrams that have been successfully fragmented at this output interface.
Datagrams Failed To Fragment Number of IPv6 datagrams that have been discarded because they needed to be fragmented
at this output interface but could not be.
Multicast Datagrams Received Number of multicast packets received by the interface.
Multicast Datagrams Transmitted Number of multicast packets transmitted by the interface.
Total ICMPv6 messages received Total number of ICMP messages received by the interface which includes all those counted by
ipv6IfIcmpInErrors. Note that this interface is the interface to which the ICMP messages were
addressed which may not be necessarily the input interface for the messages.
ICMPv6 Messages with errors Number of ICMP messages which the interface received but determined as having ICMP-
specific errors (bad ICMP checksums, bad length, and so on).
ICMPv6 Destination Unreachable Number of ICMP Destination Unreachable messages received by the interface.
Messages
ICMPv6 Messages Prohibited Number of ICMP destination unreachable/communication administratively prohibited
Administratively messages received by the interface.
ICMPv6 Time Exceeded Messages Number of ICMP Time Exceeded messages received by the interface.
ICMPv6 Parameter Problem Messages Number of ICMP Parameter Problem messages received by the interface.
ICMPv6 messages with too big packets Number of ICMP Packet Too Big messages received by the interface.
ICMPv6 Echo Request Messages Number of ICMP Echo (request) messages received by the interface.
Received
ICMPv6 Echo Reply Messages Received Number of ICMP Echo Reply messages received by the interface.
ICMPv6 Router Solicit Messages Number of ICMP Router Solicit messages received by the interface.
Received
ICMPv6 Router Advertisement Number of ICMP Router Advertisement messages received by the interface.
Messages Received
ICMPv6 Neighbor Solicit Messages Number of ICMP Neighbor Solicit messages received by the interface.
Received
ICMPv6 Neighbor Advertisement Number of ICMP Neighbor Advertisement messages received by the interface.
Messages Received
ICMPv6 Redirect Messages Received Number of Redirect messages received by the interface.
Transmitted Number of ICMPv6 Group Membership Query messages received by the interface.
Parameter Description
Total ICMPv6 Messages Transmitted Total number of ICMP messages which this interface attempted to send. Note that this counter
includes all those counted by icmpOutErrors.
ICMPv6 Messages Not Transmitted Due Number of ICMP messages which this interface did not send due to problems discovered
To Error within ICMP such as a lack of buffers. This value should not include errors discovered outside
the ICMP layer such as the inability of IPv6 to route the resultant datagram. In some
implementations there may be no types of error which contribute to this counter's value.
ICMPv6 Destination Unreachable Number of ICMP Destination Unreachable messages sent by the interface.
Messages Transmitted
ICMPv6 Messages Prohibited Number of ICMP destination unreachable/communication administratively prohibited
Administratively Transmitted messages sent.
ICMPv6 Time Exceeded Messages Number of ICMP Time Exceeded messages sent by the interface.
Transmitted
ICMPv6 Parameter Problem Messages Number of ICMP Parameter Problem messages sent by the interface.
Transmitted
ICMPv6 Packet Too Big Messages Number of ICMP Packet Too Big messages sent by the interface.
Transmitted
ICMPv6 Echo Request Messages Number of ICMP Echo (request) messages sent by the interface.ICMP echo messages sent.
Transmitted
ICMPv6 Echo Reply Messages Number of ICMP Echo Reply messages sent by the interface.
Transmitted
ICMPv6 Router Solicit Messages Number of ICMP Router Solicitation messages sent by the interface.
Transmitted
ICMPv6 Router Advertisement Number of ICMP Router Advertisement messages sent by the interface.
Messages Transmitted
ICMPv6 Neighbor Solicit Messages Number of ICMP Neighbor Solicitation messages sent by the interface.
Transmitted
ICMPv6 Neighbor Advertisement Number of ICMP Neighbor Advertisement messages sent by the interface.
Messages Transmitted
ICMPv6 Redirect Messages Received Number of Redirect messages sent. For a host, this object will always be zero, since hosts do
not send redirects.
ICMPv6 Group Membership Query Number of ICMPv6 Group Membership Query messages sent.
Messages Received
ICMPv6 Group Membership Response Number of ICMPv6 Group Membership Response messages sent.
Messages Received
ICMPv6 Group Membership Reduction Number of ICMPv6 Group Membership Reduction messages sent.
Messages Received
ICMPv6 Duplicate Address Detects Number of duplicate addresses detected by the interface.
Format clear ipv6 statistics [{slot/port | loopback loopback-id | tunnel tunnel-id | vlan id}]
Mode Privileged EXEC
Default disabled
Format ipv6 router ospf [vrf vrf-name]
Mode Global Config
Parameter Description
area-id The area identifier for the area whose networks are to be summarized.
prefix netmask The summary prefix to be advertised when the ABR computes a route to one or more networks within this prefix
in this area.
summarylink When this keyword is given, the area range is used when summarizing prefixes advertised in type 3 summary
LSAs.
nssaexternallink When this keyword is given, the area range is used when translating type 7 LSAs to type 5 LSAs.
advertise (Optional) When this keyword is given, the summary prefix is advertised when the area range is active. This is
the default.
not-advertise (Optional) When this keyword is given, neither the summary prefix nor the contained prefixes are advertised when
the area range is active. When the not-advertise option is given, any static cost previously configured is removed
from the system configuration.
cost (Optional) If an optional cost is given, OSPF sets the metric field in the inter-area -prefix LSA to the configured
value rather than setting the metric to the largest cost among the networks covered by the area range.
Default enabled
Format area areaid stub no-summary
Mode Router OSPFv3 Config
Default 40
Format area areaid virtual-link neighbor dead-interval seconds
Mode Router OSPFv3 Config
Default 10
Format area areaid virtual-link neighbor hello-interval seconds
Mode Router OSPFv3 Config
Default 5
Format area areaid virtual-link neighbor retransmit-interval seconds
Mode Router OSPFv3 Config
Default 1
Format area areaid virtual-link neighbor transmit-delay seconds
Mode Router OSPFv3 Config
Use the vrf argument to drop the adjacency with all OSPFv3 neighbors for a virtual router. If no vrf argument is given, it
drops the adjacency with all OSPFv3 neighbors for the default router.
To drop all adjacencies with a specific router ID, specify the neighbor’s Router ID using the optional parameter [neighbor-
id].
Use the vrf argument to flush all OSPFv3 self-originated external LSAs and reoriginate them in a virtual router. If no vrf
argument is given, the command is executed for the default router.
Default metric—unspecified
metric-type—2
Format default-information originate [always] [metric 0-16777214] [metric-type {1 | 2}]
Mode Router OSPFv3 Config
Format no default-metric
Default 110
Format distance ospf {intra-area 1-255 | inter-area 1-255 | external 1-255}
Mode Router OSPFv3 Config
Default enabled
Format enable
Mode Router OSPFv3 Config
Format no enable
Mode Router OSPFv3 Config
Default 0
Format exit-overflow-interval seconds
Mode Router OSPFv3 Config
8.4.1.28.1 no exit-overflow-interval
This command configures the default exit overflow interval for OSPF.
Format no exit-overflow-interval
Mode Router OSPFv3 Config
Default –1
Format external-lsdb-limit limit
Mode Router OSPFv3 Config
8.4.1.29.1 no external-lsdb-limit
This command configures the default external LSDB limit for OSPF.
Format no external-lsdb-limit
Mode Router OSPFv3 Config
Default 4
Format maximum-paths maxpaths
Mode Router OSPFv3 Config
8.4.1.30.1 no maximum-paths
This command resets the number of paths that OSPF can report for a given destination back to its default value.
Format no maximum-paths
Mode Router OSPFv3 Config
Default disabled
Default disabled
Format passive-interface {slot/port|vlan 1-4093|tunnel tunnel-id}
Mode Router OSPFv3 Config
8.4.1.32.1 no passive-interface
Use this command to set the interface or tunnel as non-passive. It overrides the global passive mode that is currently
effective on the interface or tunnel.
Default metric—unspecified
metric-type—2
tag—0
Format redistribute {static | connected | bgp} [metric 0-16777214] [metric-type {1 | 2}] [tag
0-4294967295]
Mode Router OSPFv3 Config
8.4.1.33.1 no redistribute
This command configures OSPF protocol to prohibit redistribution of routes from the specified source protocol/routers.
When OSPFv3 originates a new or changed LSA, it selects a random refresh delay for the LSA. When the refresh delay
expires, OSPFv3 refreshes the LSA. By selecting a random refresh delay, OSPFv3 avoids refreshing a large number of
LSAs at one time, even if a large number of LSAs are originated at one time.
seconds is the width of the window in which LSAs are refreshed. The range for the pacing group window is from 10 to 1800
seconds.
Default 60 seconds
Format timers pacing lsa-group seconds
Mode Privileged EXEC
Parameter Description
spf-start Indicates the SPF schedule delay in milliseconds when no SPF calculation has been scheduled during the current
wait interval. Value range is 1 to 600,000 milliseconds.
spf-hold Indicates the initial SPF wait interval in milliseconds. Value range is 1 to 600,000 milliseconds.
spf-maximum Indicates the maximum SPF wait interval in milliseconds. Value range is 1 to 600,000 milliseconds.
Group Flags
errors authentication-failure
bad-packet
config-error
virt-authentication-failure
virt-bad-packet
virt-config-error
lsa lsa-maxage
lsa-originate
overflow lsdb-overflow
lsdb-approaching-overflow
retransmit packets
virt-packets
state-change if-state-change
neighbor-state-change
virtif-state-change
virtneighbor-state-change
To enable the individual flag, enter the group name followed by that particular flag.
To enable all the flags in that group, give the group name followed by all.
To enable all the flags, give the command as trapflags all.
Default disabled
Format trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error | virt-authentication-
failure | virt-bad-packet | virt-config-error} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
state-change {all | if-state-change | neighbor-state-change | virtif-state-change |
virtneighbor-state-change}
}
Mode Router OSPFv3 Config
8.4.1.37.1 no trapflags
Use this command to revert to the default reference bandwidth.
To disable the individual flag, enter the group name followed by that particular flag.
To disable all the flags in that group, give the group name followed by all.
To disable all the flags, give the command as trapflags all.
Format no trapflags {
all |
errors {all | authentication-failure | bad-packet | config-error |
virt-authentication-failure | virt-bad-packet | virt-config-error} |
lsa {all | lsa-maxage | lsa-originate} |
overflow {all | lsdb-overflow | lsdb-approaching-overflow} |
retransmit {all | packets | virt-packets} |
state-change {all | if-state-change | neighbor-state-change | virtif-state-change
|virtneighbor-state-change}}
Mode Router OSPFv3 Config
Default disabled
Format ipv6 ospf bfd
Mode Interface Config
Example: To trigger BFD processing through OSPFv3 on an interface associated with it, use the following steps.
(Routing) (Config)# interface 1/0/1
(Routing) (Interface 1/0/1)# ipv6 ospf bfd
(Routing) (Interface 1/0/1)# exit
Default 10
Format ipv6 ospf cost 1-65535
Mode Interface Config
Default 40
Format ipv6 ospf dead-interval seconds
Mode Interface Config
Default 10
Format ipv6 ospf hello-interval seconds
Mode Interface Config
Default False
Format ipv6 ospf link-lsa-suppression
Mode Privileged EXEC
Default enabled
Format ipv6 ospf mtu-ignore
Mode Interface Config
Default broadcast
Format ipv6 ospf network {broadcast | point-to-point}
Mode Interface Config
The prefix-suppression can be disabled at the interface level by using the disable option. The disable option is useful for
excluding specific interfaces from performing prefix-suppression when the feature is enabled globally.
Note that the disable option disable is not equivalent to not configuring the interface specific prefix-suppression. If
prefix-suppression is not configured at the interface level, the global prefix-suppression configuration is applicable for the
IPv6 prefixes associated with the interface.
Default 5
Format ipv6 ospf retransmit-interval seconds
Mode Interface Config
Default 1
Format ipv6 ospf transmit-delay seconds
Mode Interface Config
Graceful restart uses the concept of “helpful neighbors”. A fully adjacent router enters helper mode when it receives a link
state announcement (LSA) from the restarting management unit indicating its intention of performing a graceful restart. In
helper mode, a switch continues to advertise to the rest of the network that they have full adjacencies with the restarting
router, thereby avoiding announcement of a topology change and the potential for flooding of LSAs and shortest-path-first
(SPF) runs (which determine OSPF routes). Helpful neighbors continue to forward packets through the restarting router. The
restarting router relearns the network topology from its helpful neighbors.
Graceful restart can be enabled for either planned or unplanned restarts, or both. A planned restart is initiated by the operator
through the management command initiate failover. The operator may initiate a failover to take the management unit
out of service (for example, to address a partial hardware failure), to correct faulty system behavior which cannot be
corrected through less severe management actions, or other reasons. An unplanned restart is an unexpected failover
caused by a fatal hardware failure of the management unit, or when software stops responding, or a crash on the
management unit.
Default disabled
Format nsf [ietf] [planned-only]
Modes Router OSPFv3 Config
Parameter Description
ietf This keyword is accepted but not required.
planned-only This optional keyword indicates that OSPF should only perform a graceful restart when the restart is planned (that
is, when the restart is a result of the initiate failover command).
The grace period must be set long enough to allow the restarting router to reestablish all of its adjacencies and complete a
full database exchange with each of those neighbors.
Parameter Description
ietf This keyword is accepted but not required.
seconds The number of seconds that the restarting router asks its neighbors to wait before exiting helper mode. The range
is from 1 to 1800 seconds.
Default OSPF may act as a helpful neighbor for both planned and unplanned restarts
Format nsf helper [planned-only]
Modes Router OSPFv3 Config
Parameter Description
planned-only This optional keyword indicates that OSPF should only help a restarting router performing a planned restart.
NOTE: The commands no nsf helper and nsf ietf helper disable are functionally equivalent. The command nsf
ietf helper disable is supported solely for compatibility with other network software CLI.
Use this command to require that an OSPF helpful neighbor exit helper mode whenever a topology change occurs.
Default enabled
Format nsf [ietf] helper strict-lsa-checking
Modes Router OSPFv3 Config
Parameter Description
ietf This keyword is accepted but not required.
Default enabled
Format nsf [ietf] helper strict-lsa-checking
Modes Router OSPFv3 Config
You can administratively force OSPFv3 into stub router mode. OSPFv3 remains in stub router mode until you take OSPFv3
out of stub router mode. Alternatively, you can configure OSPF to start in stub router mode for a configurable period of time
after the router boots up.
If you set the summary LSA metric to 16,777,215, other routers will skip the summary LSA when they compute routes.
If you have configured the router to enter stub router mode on startup (max-metric router-lsa on-startup), and then
enter max-metric router lsa, there is no change. If OSPFv3 is administratively in stub router mode (the max-metric
router-lsa command has been given), and you configure OSPFv3 to enter stub router mode on startup (max-metric
router-lsa on-startup), OSPFv3 exits stub router mode (assuming the startup period has expired) and the configuration
is updated. Without any parameters, stub router mode only sends maximum metric values for router LSAs.
Parameter Description
external-lsa (Optional) Sends the maximum metric values for external LSAs. max-metric-value is the maximum metric
value to use for LSAs. The range is 1 to 16,777,215 (0xFFFFFF). The default value is 16,711,680 (0xFF0000).
inter-area-lsas (Optional) Sends the maximum metric values for Inter-Area-Router LSAs.
on-startup (Optional) Starts OSPF in stub router mode. seconds is the number of seconds that OSPF remains in stub router
mode after a reboot. The range is 5 to 86,400 seconds. There is no default value.
summary-lsa (Optional) Sends the maximum metric values for Summary LSAs
Use the vrf argument to exit the OSPFv3 stub router mode in a virtual router. If no vrf argument is given, the command is
executed for the default router.
NOTE: Some of the information in the following table displays only if you enable OSPF and configure certain features.
Parameter Description
Router ID A 32-bit integer in dotted decimal format identifying the router, about which information is displayed. This is a
configured value.
OSPF Admin Mode Shows whether the administrative mode of OSPF in the router is enabled or disabled. This is a configured value.
External LSDB Limit The maximum number of non-default AS-external-LSAs entries that can be stored in the link-state database.
Exit Overflow Interval The number of seconds that, after entering overflow state, a router will attempt to leave overflow state.
SPF Start Time The number of milliseconds the SPF calculation is delayed if no SPF calculation has been scheduled during the
current “wait interval”.
SPF Hold Time The number of milliseconds of the initial “wait interval”.
SPF Maximum Hold The maximum number of milliseconds of the “wait interval”.
Time
LSA Refresh Group The size of the LSA refresh group window, in seconds.
Pacing Time
AutoCost Ref BW Shows the value of the auto-cost reference bandwidth configured on the router.
Default Passive Shows whether the interfaces are passive by default.
Setting
Maximum Paths The maximum number of paths that OSPF can report for a given destination.
Default Metric Default value for redistributed routes.
Default Route Indicates whether the default routes received from other source protocols are advertised or not.
Advertise
Always Shows whether default routes are always advertised.
Metric The metric for the advertised default routes. If the metric is not configured, this field is blank.
Metric Type Shows whether the routes are External Type 1 or External Type 2.
Number of Active The number of active OSPF areas. An “active” OSPF area is an area with at least one interface up.
Areas
ABR Status Shows whether the router is an OSPF Area Border Router.
ASBR Status Shows if the ASBR mode is enabled or disabled. Enable implies that the router is an autonomous system border
router. Router automatically becomes an ASBR when it is configured to redistribute routes learnt from other
protocol. The possible values for the ASBR status is enabled (if the router is configured to re-distribute routes
learned by other protocols) or disabled (if the router is not configured for the same).
Stub Router Status The status of the stub router: Active or Inactive.
Stub Router Reason This is displayed only if the stub router is active.
Shows the reason for the stub router: Configured, Startup, or Resource Limitation
Stub Router Startup This is displayed only if the stub router is in startup stub router mode.
Time Remaining The remaining time (in seconds) until OSPF exits stub router mode.
Parameter Description
Stub Router Duration This row is only listed if the stub router is active and the router entered stub mode because of a resource limitation.
The time elapsed since the router last entered the stub router mode. The duration is displayed in DD:HH:MM:SS
format.
External LSDB When the number of non-default external LSAs exceeds the configured limit, External LSDB Limit, OSPF goes
Overflow into LSDB overflow state. In this state, OSPF withdraws all of its self-originated non-default external LSAs. After
the Exit Overflow Interval, OSPF leaves the overflow state, if the number of external LSAs has been reduced.
External LSA Count The number of external (LS type 5) link-state advertisements in the link-state database.
External LSA The sum of the LS checksums of external link-state advertisements contained in the link-state database.
Checksum
New LSAs Originated The number of new link-state advertisements that have been originated.
LSAs Received The number of link-state advertisements received determined to be new instantiations.
LSA Count The total number of link state advertisements currently in the link state database.
Maximum Number of The maximum number of LSAs that OSPF can store.
LSAs
LSA High Water Mark The maximum size of the link state database since the system started.
Retransmit List Entries The total number of LSAs waiting to be acknowledged by all neighbors. An LSA may be pending acknowledgment
from more than one neighbor.
Maximum Number of The maximum number of LSAs that can be waiting for acknowledgment at any given time.
Retransmit Entries
Retransmit Entries The highest number of LSAs that have been waiting for acknowledgment.
High Water Mark
Redistributing This field is a heading and appears only if you configure the system to take routes learned from a non-OSPF
source and advertise them to its peers.
Source Shows source protocol/routes that are being redistributed. Possible values are static, connected, BGP, or RIP.
Metric The metric of the routes being redistributed.
Metric Type Shows whether the routes are External Type 1 or External Type 2.
Tag The decimal value attached to each external route.
Subnets For redistributing routes into OSPF, the scope of redistribution for the specified protocol.
Distribute-List The access list used to filter redistributed routes.
Prefix-suppression Displays whether prefix-suppression is enabled or disabled on the given interface.
NSF Support Indicates whether nonstop forwarding (NSF) is enabled for the OSPF protocol for planned restarts, unplanned
restarts or both (Always).
NSF Restart Interval The user-configurable grace period during which a neighboring router will be in the helper state after receiving
notice that the management unit is performing a graceful restart.
NSF Restart Status The current graceful restart status of the router.
NSF Restart Age Number of seconds until the graceful restart grace period expires.
NSF Restart Exit Indicates why the router last exited the last restart:
Reason None—Graceful restart has not been attempted.
In Progress—Restart is in progress.
Completed—The previous graceful restart completed successfully.
Timed Out—The previous graceful restart timed out.
Topology Changed—The previous graceful restart terminated prematurely because of a topology change.
NSF Help Support Indicates whether helpful neighbor functionality has been enabled for OSPF for planned restarts, unplanned
restarts, or both (Always).
NSF help Strict LSA Indicates whether strict LSA checking has been enabled. If enabled, then an OSPF helpful neighbor will exit
checking helper mode whenever a topology change occurs. If disabled, an OSPF neighbor will continue as a helpful
neighbor in spite of topology changes.
Parameter Description
Type The type of the route to the destination. It can be either:
intra — Intra-area route
inter — Inter-area route
Parameter Description
AreaID The area id of the requested OSPF area.
External Routing A number representing the external routing capabilities for this area.
Spf Runs The number of times that the intra-area route table has been calculated using this area's link-state database.
Area Border Router The total number of area border routers reachable within this area.
Count
Area LSA Count Total number of link-state advertisements in this area's link-state database, excluding AS External LSAs.
Area LSA Checksum A number representing the Area LSA Checksum for the specified AreaID excluding the external (LS type 5) link-
state advertisements.
Stub Mode Represents whether the specified Area is a stub area or not. The possible values are enabled and disabled. This
is a configured value.
Import Summary LSAs Shows whether to import summary LSAs (enabled).
OSPF Stub Metric The metric value of the stub area. This field displays only if the area is a configured as a stub area.
Value
The following OSPF NSSA specific information displays only if the area is configured as an NSSA.
Parameter Description
Import Summary LSAs Shows whether to import summary LSAs into the NSSA.
Redistribute into Shows whether to redistribute information into the NSSA.
NSSA
Default Information Shows whether to advertise a default route into the NSSA.
Originate
Default Metric The metric value for the default route advertised into the NSSA.
Default Metric Type The metric type for the default route advertised into the NSSA.
Translator Role The NSSA translator role of the ABR, which is always or candidate.
Translator Stability The amount of time that an elected translator continues to perform its duties after it determines that its translator
Interval status has been deposed by another router.
Translator State Shows whether the ABR translator state is disabled, always, or elected.
Parameter Description
Type The type of the route to the destination. It can be either:
intra — Intra-area route
inter — Inter-area route
Use the optional areaid parameter to display database information about a specific area. Use the other optional parameters
to specify the type of link state advertisements to display. Use external to display the external LSAs. Use inter-area to
display the inter-area LSAs. Use link to display the link LSAs. Use network to display the network LSAs. Use nssa-
external to display NSSA external LSAs. Use prefix to display intra-area Prefix LSAs. Use router to display router
LSAs. Use unknown area, unknown as, or unknown link to display unknown area, AS or link-scope LSAs, respectively.
Use lsid to specify the link state ID (LSID). Use adv-router to show the LSAs that are restricted by the advertising router.
Use self-originate to display the LSAs in that are self originated. The following information is only displayed if OSPF is
enabled.
Format show ipv6 ospf [areaid] database [vrf vrf-name] [{external | inter-area {prefix |
router} | link | network | nssa-external | prefix | router | unknown {area | as | link}}]
[lsid] [{adv-router [rtrid] | self-originate}]
Modes Privileged EXEC
User EXEC
Parameter Description
Link Id A number that uniquely identifies an LSA that a router originates from all other self originated LSAs of the same
LS type.
Adv Router The Advertising Router. Is a 32-bit dotted decimal number representing the LSDB interface.
Age A number representing the age of the link state advertisement in seconds.
Sequence A number that represents which LSA is more recent.
Checksum The total number LSA checksum.
Prefix The IPv6 prefix.
Interface The interface for the link.
Rtr Count The number of routers attached to the network.
Parameter Description
Router Total number of router LSAs in the OSPFv3 link state database.
Network Total number of network LSAs in the OSPFv3 link state database.
Inter-area Prefix Total number of inter-area prefix LSAs in the OSPFv3 link state database.
Inter-area Router Total number of inter-area router LSAs in the OSPFv3 link state database.
Type-7 Ext Total number of NSSA external LSAs in the OSPFv3 link state database.
Link Total number of link LSAs in the OSPFv3 link state database.
Intra-area Prefix Total number of intra-area prefix LSAs in the OSPFv3 link state database.
Link Unknown Total number of link-source unknown LSAs in the OSPFv3 link state database.
Area Unknown Total number of area unknown LSAs in the OSPFv3 link state database.
AS Unknown Total number of as unknown LSAs in the OSPFv3 link state database.
Type-5 Ext Total number of AS external LSAs in the OSPFv3 link state database.
Self-Originated Type-5 Total number of self originated AS external LSAs in the OSPFv3 link state database.
Parameter Description
Total Total number of router LSAs in the OSPFv3 link state database.
Parameter Description
IP Address The IPv6 address of the interface.
ifIndex The interface index number associated with the interface.
OSPF Admin Mode Shows whether the admin mode is enabled or disabled.
OSPF Area ID The area ID associated with this interface.
Router Priority The router priority. The router priority determines which router is the designated router.
Retransmit Interval The frequency, in seconds, at which the interface sends LSA.
Hello Interval The frequency, in seconds, at which the interface sends Hello packets.
Dead Interval The amount of time, in seconds, the interface waits before assuming a neighbor is down.
LSA Ack Interval The amount of time, in seconds, the interface waits before sending an LSA acknowledgement after
receiving an LSA.
Interface Transmit Delay The number of seconds the interface adds to the age of LSA packets before transmission.
Authentication Type The type of authentication the interface performs on LSAs it receives.
Metric Cost The priority of the path. Low costs have a higher priority than high costs.
Prefix-suppression Displays whether prefix-suppression is enabled, disabled, or unconfigured on the given interface.
Passive Status Shows whether the interface is passive or not.
OSPF MTU-ignore Shows whether to ignore MTU mismatches in database descriptor packets sent from neighboring
routers.
Link LSA Suppression The configured state of Link LSA Suppression for the interface.
Parameter Description
OSPF Interface Type Broadcast LANs, such as Ethernet and IEEE 802.5, take the value broadcast. The OSPF
Interface Type will be 'broadcast'.
State The OSPF Interface States are: down, loopback, waiting, point-to-point, designated router, and
backup designated router.
Designated Router The router ID representing the designated router.
Backup Designated Router The router ID representing the backup designated router.
Number of Link Events The number of link events.
Metric Cost The cost of the OSPF interface.
Parameter Description
Interface The routing interface associated with the rest of the data in the row.
OSPF Admin Mode States whether OSPF is enabled or disabled on a router interface.
OSPF Area ID The OSPF Area ID for the specified interface.
Router Priority The router priority. The router priority determines which router is the designated router.
Metric Cost The priority of the path. Low costs have a higher priority than high costs.
Hello Interval The frequency, in seconds, at which the interface sends Hello packets.
Dead Interval The amount of time, in seconds, the interface waits before assuming a neighbor is down.
Retransmit Interval The frequency, in seconds, at which the interface sends LSA.
Retransmit Delay Interval The number of seconds the interface adds to the age of LSA packets before transmission.
LSA Ack Interval The amount of time, in seconds, the interface waits before sending an LSA acknowledgement after receiving
an LSA.
Parameter Description
OSPFv3 Area ID The area id of this OSPF interface.
IP Address The IP address associated with this OSPF interface.
OSPFv3 Interface Events The number of times the specified OSPF interface has changed its state, or an error has occurred.
Virtual Events The number of state changes or errors that occurred on this virtual link.
Neighbor Events The number of times this neighbor relationship has changed state, or an error has occurred.
Packets Received The number of OSPFv3 packets received on the interface.
Packets Transmitted The number of OSPFv3 packets sent on the interface.
LSAs Sent The total number of LSAs flooded on the interface.
LSA Acks Received The total number of LSA acknowledged from this interface.
LSA Acks Sent The total number of LSAs acknowledged to this interface.
Sent Packets The number of OSPF packets transmitted on the interface.
Received Packets The number of valid OSPF packets received on the interface.
Parameter Description
Discards The number of received OSPF packets discarded because of an error in the packet or an error in processing
the packet.
Bad Version The number of received OSPF packets whose version field in the OSPF header does not match the version
of the OSPF process handling the packet.
Virtual Link Not Found The number of received OSPF packets discarded where the ingress interface is in a non-backbone area and
the OSPF header identifies the packet as belonging to the backbone, but OSPF does not have a virtual link
to the packet’s sender.
Area Mismatch The number of OSPF packets discarded because the area ID in the OSPF header is not the area ID
configured on the ingress interface.
Invalid Destination The number of OSPF packets discarded because the packet’s destination IP address is not the address of
Address the ingress interface and is not the AllDrRouters or AllSpfRouters multicast addresses.
No Neighbor at Source The number of OSPF packets dropped because the sender is not an existing neighbor or the sender’s IP
Address address does not match the previously recorded IP address for that neighbor. NOTE: Does not apply to
Hellos.
Invalid OSPF Packet Type The number of OSPF packets discarded because the packet type field in the OSPF header is not a known
type.
Hellos Ignored The number of received Hello packets that were ignored by this router from the new neighbors after the limit
has been reached for the number of neighbors on an interface or on the system as a whole.
Table 12, Trapflags Groups lists the number of OSPF packets of each type sent and received on the interface.
Parameter Description
Total self-originated The number of LSAs the router is currently originating.
LSAs
Average LSAs per The number of self-originated LSAs divided by the number of LSA groups. The number of LSA groups is the
group refresh interval (1800 seconds) divided by the pacing interval (configured with timers pacing lsa-group)
plus two.
Pacing group limit The maximum number of self-originated LSAs in one LSA group. If the number of LSAs in a group exceeds this
limit, OSPF redistributes LSAs throughout the refresh interval to achieve better balance.
Groups For each LSA pacing group, the output shows the range of LSA ages in the group and the number of LSAs in the
group.
If you do not specify a neighbor IP address, the output displays summary information in a table. If you specify an interface
or tunnel, only the information for that interface or tunnel displays. The argument slot/port corresponds to a physical
routing interface or VLAN routing interface. The keyword vlan is used to specify the VLAN ID of the routing VLAN directly
instead of a slot/port format. The ip-address is the IP address of the neighbor, and when you specify this, detailed
information about the neighbor displays. The following information only displays if OSPF is enabled and the interface has a
neighbor.
Format show ipv6 ospf neighbor [vrf vrf-name] [interface {slot/port|vlan 1-4093|tunnel
tunnel_id}][ip-address]
Modes Privileged EXEC
User EXEC
If you do not specify an IP address, a table with the following columns displays for all neighbors or the neighbor associated
with the interface that you specify.
Parameter Description
Router ID The 4-digit dotted-decimal number of the neighbor router.
Priority The OSPF priority for the specified interface. The priority of an interface is a priority integer from 0 to 255. A value
of '0' indicates that the router is not eligible to become the designated router on this network.
Intf ID The interface ID of the neighbor.
Interface The interface of the local router.
State The state of the neighboring routers. Possible values are:
Down – Initial state of the neighbor conversation - no recent information has been received from the neighbor.
Attempt – No recent information has been received from the neighbor but a more concerted effort should
be made to contact the neighbor.
Init – An Hello packet has recently been seen from the neighbor, but bidirectional communication has not
yet been established.
2 way – Communication between the two routers is bidirectional.
Exchange start – The first step in creating an adjacency between the two neighboring routers, the goal is
to decide which router is the master and to decide upon the initial DD sequence number.
Exchange – The router is describing its entire link state database by sending Database Description packets
to the neighbor.
Full – The neighboring routers are fully adjacent and they will now appear in router-LSAs and network-
LSAs.
Dead Time The amount of time, in seconds, to wait before the router assumes the neighbor is unreachable.
Restart Helper Status Indicates the status of this router as a helper during a graceful restart of the router specified in the command line:
Helping – This router is acting as a helpful neighbor to the specified router.
Not Helping – This router is not a helpful neighbor at this time.
Restart Reason When this router is in helpful neighbor mode, this indicates the reason for the restart as provided by the restarting
router.
Remaining Grace The number of seconds remaining the in current graceful restart interval. This is displayed only when this router
Time is currently acting as a helpful neighbor for the router specified in the command.
Parameter Description
Restart Helper Exit Indicates the reason that the specified router last exited a graceful restart.
Reason None – Graceful restart has not been attempted
In Progress – Restart is in progress
Completed – The previous graceful restart completed successfully
Timed Out – The previous graceful restart timed out
Topology Changed – The previous graceful restart terminated prematurely because of a topology change
If you specify an IP address for the neighbor router, the following fields display:
Parameter Description
Interface The interface of the local router.
Area ID The area ID associated with the interface.
Options An integer value that indicates the optional OSPF capabilities supported by the neighbor. These are listed in its
Hello packets. This enables received Hello Packets to be rejected (that is, neighbor relationships will not even
start to form) if there is a mismatch in certain crucial OSPF capabilities.
Router Priority The router priority for the specified interface.
Dead Timer Due The amount of time, in seconds, to wait before the router assumes the neighbor is unreachable.
State The state of the neighboring routers.
Events Number of times this neighbor relationship has changed state, or an error has occurred.
Retransmission An integer representing the current length of the retransmission queue of the specified neighbor router Id of the
Queue Length specified interface.
Parameter Description
Area ID The area whose prefixes are summarized.
IPv6 Prefix/Prefix The summary prefix and prefix length.
Length
Type S (Summary Link) or E (External Link)
Action Enabled or Disabled
Cost Metric to be advertised when the range is active.
The command displays the following information with the most recent statistics displayed at the end of the table.
Parameter Description
Delta T The time since the routing table was computed. The time is in the format hours, minutes, and seconds
(hh:mm:ss).
Intra The time taken to compute intra-area routes, in milliseconds.
Summ The time taken to compute inter-area routes, in milliseconds.
Ext The time taken to compute external routes, in milliseconds.
SPF Total The total time taken to compute routes, in milliseconds. The total may exceed the sum of Intra, Summ, and Ext
times.
RIB Update The time from the completion of the routing table calculation until all changes have been made in the common
routing table [the Routing Information Base (RIB)], in milliseconds
Reason The event or events that triggered the SPF. The reason codes are as follows:
R: New router LSA
N: New network LSA
SN: New network (inter-area prefix) summary LSA
SA: New ASBR (inter-area router) summary LSA
X: New external LSA
IP: New intra-area prefix LSA
L: New Link LSA
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 ospf statistics
23:32:46 0 0 0 0 0 R, IP
23:32:09 0 0 0 0 0 R, N, IP
23:32:04 0 0 0 0 0 R
23:31:44 0 0 0 0 0 R, N, IP
23:31:39 0 0 0 0 1 R
23:29:57 0 3 7 10 131 R
23:29:52 0 14 29 43 568 SN
04:07:23 0 9 23 33 117 SN
04:07:23 0 9 23 33 117 SN
04:07:18 0 0 0 1 485 SN
04:07:14 0 1 0 1 3 X
The following information will only be displayed if OSPF is initialized on the switch.
Parameter Description
Area ID A 32-bit identifier for the created stub area.
Type of Service Type of service associated with the stub metric. For this release, Normal TOS is the only supported type.
Metric Val The metric value is applied based on the TOS. It defaults to the least metric of the type of service among
the interfaces to other areas. The OSPF cost for a route is a function of the metric value.
Import Summary LSA Controls the import of summary LSAs into stub areas.
The areaid parameter identifies the area and the neighbor parameter identifies the neighbor’s Router ID.
Parameter Description
Area ID The area id of the requested OSPF area.
Neighbor Router ID The input neighbor Router ID.
Hello Interval The configured hello interval for the OSPF virtual interface.
Dead Interval The configured dead interval for the OSPF virtual interface.
Interface Transmit Delay The configured transmit delay for the OSPF virtual interface.
Retransmit Interval The configured retransmit interval for the OSPF virtual interface.
Authentication Type The type of authentication the interface performs on LSAs it receives.
State The OSPF Interface States are: down, loopback, waiting, point-to-point, designated router, and backup
designated router. This is the state of the OSPF interface.
Neighbor State The neighbor state.
Parameter Description
Area ID The area id of the requested OSPFV3 area.
Neighbor The neighbor interface of the OSPFV3 virtual interface.
Hello Interval The configured hello interval for the OSPFV3 virtual interface.
Dead Interval The configured dead interval for the OSPFV3 virtual interface.
Retransmit Interval The configured retransmit interval for the OSPFV3 virtual interface.
Transmit Delay The configured transmit delay for the OSPFV3 virtual interface.
Default enabled
Format service dhcpv6 [vrf <vrf-name>]
Mode Global Config
Example: The following example enables DHCPv6 service in the default VRF.
(Routing)#configure
(Routing)(Config)# service dhcpv6
Example: The following example enables DHCPv6 service in the VRF red.
(Routing)#configure
(Routing)(Config)# service dhcpv6 vrf red
rapid-commit enables the use of a two-message exchange method for prefix delegation and other configuration. If
enabled, the client includes the rapid commit option in a solicit message.
The DHCP for IPv6 client, server, and relay functions are mutually exclusive on an interface. If one of these functions is
already enabled and a user tries to configure a different function on the same interface, a message is displayed.
(Switch) #configure
(Switch) (Config)#interface 0/1
(Switch) (Interface 0/1)# ipv6 dhcp client pd
(Switch) #configure
(Switch) (Config)#interface 0/1
(Switch) (Interface 0/1)# ipv6 dhcp client pd rapid-commit
Default enabled
Format ipv6 dhcp conflict logging [vrf <vrf-name>]
Mode Global Config
The EFOS 3.9 release adds support to have a dedicated automatic pool per VRF.
Parameter Description
pool-name (Optional) The user-defined name for the local prefix pool. The pool name can be a symbolic string (such as
Management) or an integer (such as 0).
automatic (Optional) Enables the server to automatically determine which pool to use when allocating addresses for a
client. When the user chooses to configure the automatic pool, the user must specify the interface number
through which the prefix delegation client learns the IA_PD. The interface on which the user configures the
DHCPv6 server and the interface that is specified for the automatic pool have to be in the same VRF.
Parameter Description
rapid-commit (Optional) Allows the two-message exchange method for prefix delegation and other configuration. If a client
has included a rapid commit option in the solicit message and the rapid-commit keyword is enabled for the
server, the server responds to the solicit message with a reply message.
preference pref-value (Optional) Specifies the preference value carried in the preference option in the advertise message sent by
the server. The range is 0 to 255. The preference value defaults to 0. If the preference keyword is configured
with a value other than 0, the server adds a preference option to carry the preference value for the advertise
messages. This action affects the selection of a server by the client. Any advertise message that does not
include a preference option is considered to have a preference value of 0. If the client receives an advertise
message that includes a preference option with a preference value of 255, the client immediately sends a
request message to the server from which the advertise message was received.
Example: The following example enables DHCP for IPv6 for the local prefix pool named server1.
(Routing) # configure
NOTE: If relay-address is an IPv6 global address, relay-interface is not required. If relay-address is a link-local or
multicast address, relay-interface is required. Finally, if you do not specify a value for relay-address, you
must specify a value for relay-interface and the DHCPV6-ALL-AGENTS multicast address (that is, FF02::1:2)
is used to relay DHCPv6 messages to the relay server.
When the DHCP for IPv6 configuration information pool has been created, use the ipv6 dhcp server command to associate
the pool with a server on an interface. If you do not configure an information pool, use the ipv6 dhcp server interface
configuration command to enable the DHCPv6 server function on an interface.
When you associate a DHCPv6 pool with an interface, only that pool services requests on the associated interface. The pool
also services other interfaces. If you do not associate a DHCPv6 pool with an interface, it can service requests on any
interface. Not using any IPv6 address prefix means that the pool returns only configured options.
If lifetime values are not configured, the default lifetime values for valid-lifetime and preferred-lifetime are
considered to be infinite.
Parameter Description
lifetime (Optional) Sets a length of time for the hosts to remember router advertisements. If configured, both valid and
preferred lifetimes must be configured.
valid-lifetime The amount of time, in seconds, the prefix remains valid for the requesting router to use. The range is from 60
through 4294967294. The preferred-lifetime value cannot exceed the valid-lifetime value.
preferred-lifetime The amount of time, in seconds, that the prefix remains preferred for the requesting router to use. The range is
from 60 through 4294967294. The preferred-lifetime value cannot exceed the valid-lifetime value.
infinite An unlimited lifetime.
Example: The following example shows how to configure an IPv6 address prefix for the IPv6 configuration pool pool1.
(Switch) #configure
(Switch) (Config)# ipv6 dhcp pool pool1
(Switch) (Config-dhcp6s-pool)# address prefix 2001::/64
(Switch) (Config-dhcp6s-pool)# exit
8.5.9.0.1 no domain-name
This command will remove dhcpv6 domain name from dhcpv6 pool.
8.5.10.0.1 no dns-server
This command will remove DHCPv6 server address from DHCPv6 server.
8.5.11.0.1 no prefix-delegation
This command deletes a specific prefix-delegation client.
Parameter Description
DHCPv6 is Enabled (Disabled) The status of the DHCPv6 server.
DHCPv6 Conflict Logging Mode Indicates whether DHCPv6 Conflict Logging is enabled or disabled.
Server DUID If configured, shows the DHCPv6 unique identifier.
vrf <vrf-name> Displays the IPv6 conflict logging mode for the DHCPv6 server.
Example:
(switch) #show ipv6 dhcp
DHCPv6 is enabled
DHCPv6 Conflict Logging Mode is enabled
Server DUID: 00:01:00:06:a5:e6:dc:bb:f8:b1:56:29:fc:2c
Example: The following shows example command output when the VRF is specified.
Parameter Description
vrf-name (Optional) Passing an optional vrf-name argument displays the details about the
specific statistics corresponding to that VRF.
DHCPv6 Solicit Packets Received Number of solicit received statistics.
DHCPv6 Request Packets Received Number of request received statistics.
DHCPv6 Confirm Packets Received Number of confirm received statistics.
DHCPv6 Renew Packets Received Number of renew received statistics.
DHCPv6 Rebind Packets Received Number of rebind received statistics.
DHCPv6 Release Packets Received Number of release received statistics.
DHCPv6 Decline Packets Received Number of decline received statistics.
DHCPv6 Inform Packets Received Number of inform received statistics.
DHCPv6 Relay-forward Packets Received Number of relay forward received statistics.
DHCPv6 Relay-reply Packets Received Number of relay-reply received statistics.
DHCPv6 Malformed Packets Received Number of malformed packets statistics.
Received DHCPv6 Packets Discarded Number of DHCP discarded statistics.
Total DHCPv6 Packets Received Total number of DHCPv6 received statistics
DHCPv6 Advertisement Packets Transmitted Number of advertise sent statistics.
DHCPv6 Reply Packets Transmitted Number of reply sent statistics.
DHCPv6 Reconfig Packets Transmitted Number of reconfigure sent statistics.
DHCPv6 Relay-reply Packets Transmitted Number of relay-reply sent statistics.
DHCPv6 Relay-forward Packets Transmitted Number of relay-forward sent statistics.
Total DHCPv6 Packets Transmitted Total number of DHCPv6 sent statistics.
Parameter Description
IPv6 Interface The interface name in slot/port format.
Mode Shows whether the interface is a IPv6 DHCP relay or server.
Parameter Description
Pool Name The pool name specifying information for DHCPv6 server distribution to DHCPv6 clients.
Server Preference The preference of the server.
Option Flags Shows whether rapid commit is enabled.
Parameter Description
Relay Address The IPv6 address of the relay server.
Relay Interface The relay server interface in slot/port format.
Number
Relay Remote ID If configured, shows the name of the relay remote.
Option Flags Shows whether rapid commit is configured.
If you use the statistics parameter, the command displays the IPv6 DHCP statistics for the specified interface. See the
show ipv6 dhcp statistics command for information about the output.
Parameter Description
vrf-name (Optional) Passing an optional vrf-name argument displays the details about the specific binding corresponding
to that VRF.
DHCP Client Address Address of DHCP Client.
DUID String that represents the Client DUID.
IAID Identity Association ID.
Prefix/Prefix Length IPv6 address and mask length for delegated prefix.
Prefix Type IPV6 Prefix type (IAPD, IANA, or IATA).
Client Address Address of DHCP Client.
Client Interface IPv6 Address of DHCP Client.
Expiration Address of DNS server address.
Valid Lifetime Valid lifetime in seconds for delegated prefix.
Preferred Lifetime Preferred lifetime in seconds for delegated prefix.
Syntax Description
vrf-name (Optional) Passing an optional vrf-name argument displays the details about the specific
conflict binding corresponding to that VRF.
ipv6-address (Optional) Passing an optional ipv6-address argument displays the details about the specific
conflict binding corresponding to that IPv6 address.
Example:
(switch) #show ipv6 dhcp conflict
Parameter Description
DHCP Pool Name Unique pool name configuration.
Client DUID Client’s DHCP unique identifier. DUID is generated using the combination of the local system burned-
in MAC address and a timestamp value.
Host Name of the client.
Prefix/Prefix Length IPv6 address and mask length for delegated prefix.
Preferred Lifetime Preferred lifetime in seconds for delegated prefix.
Valid Lifetime Valid lifetime in seconds for delegated prefix.
DNS Server Address Address of DNS server address.
Domain Name DNS domain name.
Parameter Description
DHCPv6 Advertisement Packets The number of DHCPv6 Advertisement packets received on the network interface.
Received
DHCPv6 Reply Packets The number of DHCPv6 Reply packets received on the network interface.
Received
Received DHCPv6 The number of DHCPv6 Advertisement packets discarded on the network interface.
Advertisement Packets
Discarded
Received DHCPv6 Reply The number of DHCPv6 Reply packets discarded on the network interface.
Packets Discarded
DHCPv6 Malformed Packets The number of DHCPv6 packets that are received malformed on the network interface.
Received
Total DHCPv6 Packets Received The total number of DHCPv6 packets received on the network interface.
DHCPv6 Solicit Packets The number of DHCPv6 Solicit packets transmitted on the network interface.
Transmitted
DHCPv6 Request Packets The number of DHCPv6 Request packets transmitted on the network interface.
Transmitted
DHCPv6 Renew Packets The number of DHCPv6 Renew packets transmitted on the network interface.
Transmitted
DHCPv6 Rebind Packets The number of DHCPv6 Rebind packets transmitted on the network interface.
Transmitted
DHCPv6 Release Packets The number of DHCPv6 Release packets transmitted on the network interface.
Transmitted
Total DHCPv6 Packets The total number of DHCPv6 packets transmitted on the network interface.
Transmitted
Example: The following shows example CLI display output for the command.
(Switching)#show network ipv6 dhcp statistics
DHCPv6 Client Statistics
-------------------------
Parameter Description
DHCPv6 Advertisement Packets The number of DHCPv6 Advertisement packets received on the service port interface.
Received
DHCPv6 Reply Packets Received The number of DHCPv6 Reply packets received on the service port interface.
Received DHCPv6 Advertisement The number of DHCPv6 Advertisement packets discarded on the service port interface.
Packets Discarded
Received DHCPv6 Reply Packets The number of DHCPv6 Reply packets discarded on the service port interface.
Discarded
DHCPv6 Malformed Packets Received The number of DHCPv6 packets that are received malformed on the service port interface.
Total DHCPv6 Packets Received The total number of DHCPv6 packets received on the service port interface.
DHCPv6 Solicit Packets Transmitted The number of DHCPv6 Solicit packets transmitted on the service port interface.
DHCPv6 Request Packets Transmitted The number of DHCPv6 Request packets transmitted on the service port interface.
DHCPv6 Renew Packets Transmitted The number of DHCPv6 Renew packets transmitted on the service port interface.
DHCPv6 Rebind Packets Transmitted The number of DHCPv6 Rebind packets transmitted on the service port interface.
DHCPv6 Release Packets Transmitted The number of DHCPv6 Release packets transmitted on the service port interface.
Total DHCPv6 Packets Transmitted The total number of DHCPv6 packets transmitted on the service port interface.
Example: The following shows example CLI display output for the command.
(Switching)#show serviceport ipv6 dhcp statistics
DHCPv6 Client Statistics
-------------------------
DHCPv6 Advertisement Packets Received................. 0
DHCPv6 Reply Packets Received......................... 0
Received DHCPv6 Advertisement Packets Discarded....... 0
Received DHCPv6 Reply Packets Discarded............... 0
DHCPv6 Malformed Packets Received..................... 0
Total DHCPv6 Packets Received......................... 0
Updated when the client renews, rebinds, or confirms the prefix delegation.
Deleted when the client releases all the prefixes in the binding voluntarily, all prefixes’ valid lifetimes have expired, or an
administrator runs the clear ipv6 dhcp binding command.
If the clear ipv6 dhcp binding command is used with the optional vrf vrf-name argument specified, only the binding for
the specified VRF is deleted.
If the clear ipv6 dhcp binding command is used with the optional ipv6-address argument specified, only the binding
for the specified client is deleted. If the clear ipv6 dhcp binding command is used without the ipv6-address argument,
all automatic client bindings are deleted from the DHCP for IPv6 binding table.
Parameter Description
vrf-name (Optional) The VRF name in which to clear the bindings.
ipv6-address (Optional) The address of a DHCP for IPv6 client.
Example: The following examples deletes all automatic client bindings from the DHCP for IPv6 server binding table.
(Routing) #clear ipv6 dhcp binding
(Routing) #clear ipv6 dhcp binding vrf red
Syntax Description
vrf-name (Optional) The VRF name in which to clear the conflicts.
ipv6-address The conflicting address declined by a DHCPv6 Client.
* Indicates all conflicting addresses in the database.
Usage Guidelines
A conflict binding entry is created by the DHCPv6 server whenever an advertised lease binding is declined by a DHCPv6
client.
If the clear ipv6 dhcp conflict command is used with the optional ipv6-address argument specified, only that specific
conflict binding is deleted. If the clear ipv6 dhcp conflict * command is used without the ipv6-address argument,
then all conflict client bindings are deleted.
If the clear ipv6 dhcp conflict command is used with the optional vrf vrf-name argument specified, only the conflict
binding for the specified VRF is deleted.
Example: The following is an example of the command.
(Switching) # clear ipv6 dhcp conflict 2003:1::2
(Switching) # clear ipv6 dhcp conflict *
(Switching) #clear ipv6 dhcp conflict vrf red
Default disabled
Format ipv6 dhcp snooping
Mode Global Config
Default disabled
Format ipv6 dhcp snooping vlan vlan-list
Mode Global Config
Default enabled
Format ipv6 dhcp snooping verify mac-address
Mode Global Config
Default local
Format ipv6 dhcp snooping database {local|tftp://hostIP/filename}
Mode Global Config
Format ipv6 dhcp snooping binding macaddr vlan 1-4093 ip address interface interface id
Mode Global Config
Default disabled
Format ipv6 dhcp snooping trust
Mode Interface Config
Default disabled
Format ipv6 dhcp snooping log-invalid
Mode Interface Config
Format ipv6 verify binding mac-address vlan vlan id ipv6 address interface interface id
Mode Global Config
Format no ipv6 verify binding mac-address vlan vlan id ipv6 address interface interface id
Mode Global Config
Parameter Description
Interface The interface for which data is displayed.
Trusted If it is enabled, DHCP Snooping considers the port as trusted. The factory default is disabled.
Log Invalid Pkts If it is enabled, DHCP Snooping application logs invalid packets on the specified interface.
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 dhcp snooping
Format show ipv6 dhcp snooping binding [{static/dynamic}] [interface slot/port] [vlan 1-4093]
Mode Privileged EXEC
User EXEC
Parameter Description
MAC Address Displays the MAC address for the binding that was added. The MAC address is the key to the binding database.
IPv6 Address Displays the valid IPv6 address for the binding rule.
VLAN The VLAN for the binding rule.
Interface The interface to add a binding into the DHCP Snooping interface.
Type Binding type; statically configured from the CLI or dynamically learned.
Lease (sec) The remaining lease time for the entry.
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 dhcp snooping binding
MAC Address IPv6 Address VLAN Interface Type Lease time (Secs)
------------------ -------------- ---- --------- ---- ------------------
00:02:B3:06:60:80 2000::1/64 10 0/1 86400
00:0F:FE:00:13:04 3000::1/64 10 0/1 86400
Parameter Description
Agent URL Bindings database agent URL.
Write Delay The maximum write time to write the database into local or remote.
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 dhcp snooping database
write-delay: 5000
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 dhcp snooping interfaces
Parameter Description
Interface The IPv6 address of the interface in slot/port format.
MAC Verify Failures Represents the number of DHCP messages that were filtered on an untrusted interface because of source MAC
address and client hardware address mismatch.
Client Ifc Mismatch Represents the number of DHCP release and Deny messages received on the different ports than learned
previously.
DHCP Server Msgs Represents the number of DHCP server messages received on Untrusted ports.
Received
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 dhcp snooping statistics
Parameter Description
Interface Interface address in slot/port format.
Filter Type Is one of two values:
ip-v6mac: User has configured MAC address filtering on this interface.
ipv6: Only IPv6 address filtering on this interface.
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 verify 0/1
Parameter Description
Interface Interface address in slot/port format.
Filter Type Is one of two values:
ip-v6mac: User has configured MAC address filtering on this interface.
ipv6: Only IPv6 address filtering on this interface.
Example: The following shows example CLI display output for the command.
Format show ipv6 source binding [{dhcp-snooping|static}] [interface slot/port] [vlan id]
Mode Privileged EXEC
User EXEC
Parameter Description
MAC Address The MAC address for the entry that is added.
IP Address The IP address of the entry that is added.
Type Entry type; statically configured from CLI or dynamically learned from DHCP Snooping.
VLAN VLAN for the entry.
Interface IP address of the interface in slot/port format.
Example: The following shows example CLI display output for the command.
(switch) #show ipv6 source binding
For information about routing policy commands for BGP, see Section 11.2, BGP Routing Policy Commands.
Parameter Description
route-map-name The name of the route map to use for policy routing. It must match a map tag specified by a route-
map command. If user tries to apply a route-map name that is not configured/created yet, an error
is shown to user.
Usage Guidelines:
A route-map statement should contain eligible match/set conditions for policy-based routing in order to be applied to
hardware.
Valid match conditions: match ipv6 address acl, match mac-list, match length
Valid set conditions: set ipv6 next-hop, set ipv6 default next-hop, set ipv6 precedence
A route-map statement should contain at least one match condition and one set condition as specified above for it to be
eligible to be applied to hardware. If not, the route-map is not applied to hardware.
When a route-map is applied on a VLAN interface and a DiffServ policy is applied on a member port of the same VLAN
interface, the port policy has priority over the VLAN policy.
The same route-map cannot be applied using both ip policy and ipv6 policy commands on an interface.
Example:
(Routing) (Interface vlan 40)#show ip policy
Interface Route-Map
------------ -----------------------------------------
3/4 rm6
(Routing) (Interface vlan 40)#ipv6 policy route-map rm6
When a route-map has both IPv4 and IPv6 statements provisioned and the user applies the route-map using the ipv6
policy command, then the IPv4 statements in the route-map will not take effect. A message will be displayed to the user to
indicate this.
Example:
(Routing) (Interface vlan 40)#ipv6 policy route-map rm4
IPv4 statements in this route-map will not be applied using IPv6 Policy Based Routing
If you specify a non-configured IPv6 ACL name/number to match, the CLI displays an error message. Make sure the IPv6
ACL is configured before it is linked to a route-map. Actions present in IPv6 ACL configuration are applied with other actions
involved in the route-map. When an IPv6 ACL referenced by a route-map is removed or rules are added or deleted from that
ACL, configuration is rejected. Adding ACLs to or removing ACLs from a route-map that is attached to an interface is allowed.
When a list of IPv6 access-lists is specified in this command, if packet matches at least one of these access-list match
criteria, the corresponding set actions in route-map are applied to packet.
If there are duplicate IPv6 access-list numbers/names in this command, the duplicate configuration is ignored.
Parameter Description
access-list-number The IPv6 access-list number that identifies an access-list configured through access-list CLI configuration
commands. This number is 1 to 99 for standard access list number. This number is 100 to 199 for extended
access list number.
access-list-name The IPv6 access-list name that identifies the named IPv6 ACL. The access-list-name can be up to 31
characters in length.
A maximum of four ACLs can be specified in this match clause.
Example: Following sequence shows how to create a route-map with a match clause on an ACL number and apply that
route-map on an interface.
(Routing) (Config)#ipv6 access-list acl2
(Routing) (Config-ipv6-acl)#permit ipv6 1001::1 any
(Routing) (Config-ipv6-acl)#exit
(Routing) (Config)#route-map rm1 permit 40
The ipv6 policy route-map rm1 command is applied to interface 0/1. All packets ingressing on 0/1 are policy-routed if a
match is made as per the IPv6 access-list.
Sequence number 40 in route map rm1 is used to match all packets sourced from host 1001::1 If there is a match, and if the
router has no explicit route for the packet's destination, it is sent to next-hop address 2001::2.
The rest of the packets are forwarded as per normal L3 destination-based routing.
Format set ipv6 next-hop [interface slot/port | vlan link-local address] ipv6-address
[...ipv6-address]
Mode Route Map Configuration
Parameter Description
ipv6-address The global IPv6 address of the next hop to which packets are output. It must be the address of an adjacent
router.
interface Use the interface keyword to specify an IPv6 next hop using the link local address. You can then specify
the link-local address along with the interface.
A maximum of four next-hop global IPv6 addresses and a link-local address can be specified in this set
clause. The link-local next hop is prioritized over the global next-hops.
Usage Guidelines
The set ipv6 next-hop command affects all incoming packet types and is always used if configured. A check is made in
the NDP table to see if the next hop is resolved, if so packets are forwarded to the next-hop.
In a route-map statement, set ipv6 next-hop and set ipv6 default next-hop terms are mutually exclusive. However,
a set ipv6 default next-hop can be configured in a separate route-map statement.
Example:
(Routing) (route-map)#set ipv6 next-hop 3333::2
Format no set ipv6 next-hop [interface slot/port | vlan link-local address] ipv6-address [...ipv6-address]
Mode Route Map Configuration
Format set ipv6 default next-hop [interface slot/port | vlan link-local address] ipv6-address
[...ipv6-address]
Mode Route Map Configuration
Parameter Description
ipv6-address The Global IPv6 address of the next hop to which packets are output. It must be the address of an adjacent
router.
Interface When the user wants to specify an IPv6 next hop using the link local address, then the interface key word
needs to be used. The user can then specify the link-local address along with the interface.
A maximum of 4 next-hop global IPv6 addresses and a link-local address can be specified in this 'set' clause.
The link-local next hop is prioritized over the global next-hops.
Usage Guidelines
A packet is routed to the next hop specified by the set ipv6 default next-hop command only if there is no explicit route
for the packet's destination address in the routing table. A default route in the routing table is not considered an explicit route
for an unknown destination address.
In a route-map statement, set ipv6 next-hop and set ipv6 default next-hop terms are mutually exclusive.However,
a set ipv6 next-hop can be configured in a separate route-map statement
When a set ipv6 default next-hop is configured in a route-map and applied on an interface, if a default route is present
in the system, it is expected that packets matching route-map rules are still policy route. This is because a default route is
not considered explicit route to destination.
Example:
(Routing)(config-route-map)# set ipv6 default next-hop 2002::2
Parameter Description
0 Sets the routine precedence
1 Sets the priority precedence
2 Sets the immediate precedence
3 Sets the Flash precedence
4 Sets the Flash override precedence
5 Sets the critical precedence
6 Sets the internetwork control precedence
7 Sets the network control precedence
Example:
(Routing) #show ipv6 policy
Interface Route-Map
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -
0/24 rmapv6
Default 64
Format ipv6 hop-limit
Mode Virtual Router Config
Parameter Description
limit If the limit value is greater than the total router table size, it is limited to the total size. If no limit value
is given, the platform maximum is taken as the limit value.
threshold The threshold value ranges from 1 to 100 and indicates the percentage of the limit value at which a
warning message is generated.
Default disable
Format ipv6 neighbors dynamicrenew
Mode Virtual Router Config
Default 1
Format ipv6 nud backoff-multiple
Mode Virtual Router Config
Default 3
Format ipv6 nud max-multicast-solicits
Mode Virtual Router Config
Default 3
Format ipv6 nud max-unicast-solicits
Mode Virtual Router Config
Default disabled
Format ipv6 unicast-routing
Mode Virtual Router Config
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 vrf interfaces
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 vrf blue
VRF Identifier................. 1
Description....................
Route Distinguisher............
Maximum Routes................. Not Set
Warning-only................... FALSE
9.1.2 ip mroute
This command configures an IPv4 Multicast Static Route for a source.
Parameter Description
src-ip-addr The IP address of the multicast source network.
src-mask The IP mask of the multicast data source.
rpf-ip-addr The IP address of the RPF next-hop router toward the source.
preference The administrative distance for this Static MRoute, that is, the preference value. The range is 1 to 255.
9.1.2.0.1 no ip mroute
This command removes the configured IPv4 Multicast Static Route.
9.1.3 ip multicast
This command sets the administrative mode of the IP multicast forwarder in the router to active. This command also enables
the administrative mode of IPv6 multicast routing.
Default disabled
Format ip multicast
Mode Global Config
9.1.3.0.1 no ip multicast
This command sets the administrative mode of the IP multicast forwarder in the router to inactive.
Format no ip multicast
Mode Global Config
Default 1
Format ip multicast ttl-threshold ttlvalue
Mode Interface Config
Parameter Description
Admin Mode The administrative status of multicast. Possible values are enabled or disabled.
Protocol State The current state of the multicast protocol. Possible values are Operational or Non-Operational.
Table Max Size The maximum number of entries allowed in the multicast table.
Protocol The multicast protocol running on the router. Possible values are PIMDM, PIMSM, or DVMRP.
Multicast Forwarding The number of entries in the multicast forwarding cache.
Cache Entry Count
Parameter Description
Interface slot/port
Group Ip The group IP address.
Mask The group IP mask.
Parameter Description
Interface slot/port
TTL The time-to-live value for this interface.
If you use the detail, group, or source parameters in PIM Sparse mode, the command displays the following fields.
Parameter Description
Flags F: Register flag. Indicates that the source connected router is sending registers to RP. This flag
can be seen only on Designated Router connected to source.
T: SPT-bit set. Indicates that packets have been received on the shortest path source tree.
R: RP-bit set. Indicates that the (S, G) entry is pointing toward the RP. This flag typically indicates
a prune state along the shared tree for a particular source.
Outgoing interface flags C: Connected. A member of the multicast group is directly connected to the interface.
J: Received PIM (*,G) Join on this interface.
Timers:Uptime/Expires Uptime: Indicates per interface how long (in hours, minutes, and seconds) the entry has been in
the IP multicast routing table.
Expires: Indicates per interface how long (in seconds) until the entry will be removed from the IP
multicast routing table
Counters Joins: Indicates the number of (*,G) or (S,G) joins received for the given entry.
Prunes: Indicates the number of (*,G) or (S,G) prunes received for the given entry.
Registers: Indicates the number of register messages received for the given (S,G) entry.
Register Stops: Indicates the number of register stop messages received for the given (S,G)
entry.
RPF Address IP address of the upstream router to the source.
Outgoing interface list List of outgoing Interfaces.
Protocol The current operating multicast routing protocol.
RP Address of the RP router.
Incoming interface Expected interface for a multicast packet from the source. If the packet is not received on this
interface, it is discarded.
If you use the detail parameter in any mode other than PIM sparse mode, the command displays the following fields.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Expiry Time The time of expiry of this entry in seconds.
Up Time The time elapsed since the entry was created in seconds.
RPF Neighbor The IP address of the RPF neighbor.
Flags The flags associated with this entry.
If you use the summary parameter in PIM Sparse mode, the command displays the following fields.
Parameter Description
Source IP Source address of the multicast route entry.
Group IP Group address of the multicast route entry.
Protocol The current operating multicast routing protocol.
Parameter Description
Incoming Interface Expected interface for a multicast packet from the source. If the packet is not received on this interface,
it is discarded.
Outgoing Interface List List of outgoing Interfaces.
If you use the summary parameter, the command displays the following fields.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Protocol The multicast routing protocol by which the entry was created.
Incoming Interface The interface on which the packet for the source/group
arrives.
Outgoing Interface List The list of outgoing interfaces on which the packet
is forwarded.
Example: This example shows the output for the summary parameter in PIM Sparse mode.
(Routing) #show ip mroute summary
( *,225.6.6.6)
00:00:41/000 RP: 1.1.1.1
Joins/Prunes: 0/0
Incoming interface: RPF nbr: 0.0.0.0
Outgoing interface list:
4/1 00:00:41/218 Joins: 0 Flags: C
( *,225.7.7.7)
00:00:36/000 RP: 1.1.1.1
Joins/Prunes: 0/0
Incoming interface: RPF nbr: 0.0.0.0
Outgoing interface list:
4/1 00:00:36/224 Joins: 0 Flags: C
(3.3.3.11,225.6.6.6)
00:00:51/158 Flags: T
Joins/Prunes: 0/0 Reg/Reg-stop: 0/0
Incoming interface: 4/2 RPF nbr: 3.3.3.11
Outgoing interface list:
4/1 00:00:41/000 Joins: 0
(3.3.3.11,225.7.7.7)
00:17:42/201 Flags: T
Joins/Prunes: 0/0 Reg/Reg-stop: 0/0
Incoming interface: 4/2 RPF nbr: 3.3.3.11
Outgoing interface list:
4/1 00:00:36/000 Joins: 0
Example: This example shows the output for the detail parameter in PIM Dense mode when a multicast routing protocol
other than PIMSM is enabled.
( *,ff43::3)
00:00:41/000 RP: 2001::1
Joins/Prunes: 0/0
Incoming interface: RPF nbr: ::
Outgoing interface list:
4/1 00:00:41/219 Joins: 0 Flags: C
( *,ff24::6)
00:00:22/000 RP: 2001::1
Joins/Prunes: 0/0
Incoming interface: RPF nbr: ::
Outgoing interface list:
4/1 00:00:41/219 Joins: 0 Flags: C
(3001::10,ff43::3)
00:00:07/203 Flags: T
Joins/Prunes: 0/0 Reg/Reg-stop: 0/0
Incoming interface: 4/2 RPF nbr: 3001::10
Outgoing interface list:
4/1 00:00:07/000 Joins: 0
(4001::33,ff22::3)
00:00:55/108 Flags: T
Joins/Prunes: 0/0 Reg/Reg-stop: 0/0
Incoming interface: 4/1 RPF nbr: 3001::10
Outgoing interface list:
4/2 00:00:66/000 Joins: 0
(3001::10,ff43::3)
00:00:07/203 Flags: T
Joins/Prunes: 0/0 Reg/Reg-stop: 0/0
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Protocol The multicast routing protocol by which this entry was created.
Incoming Interface The interface on which the packet for this group arrives.
Outgoing Interface List The list of outgoing interfaces on which this packet is forwarded.
If you use the groupipaddr parameter, the command displays the following column headings in the output table.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Expiry Time The time of expiry of this entry in seconds.
Up Time The time elapsed since the entry was created in seconds.
RPF Neighbor The IP address of the RPF neighbor.
Flags The flags associated with this entry.
If you use the summary parameter, the command displays the following column headings in the output table.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Protocol The multicast routing protocol by which this entry was created.
Incoming Interface The interface on which the packet for this source arrives.
Outgoing Interface List The list of outgoing interfaces on which this packet is forwarded.
Parameter Description
Source IP IP address of the multicast source network.
Source Mask The subnetwork mask pertaining to the sourceIP.
RPF Address The IP address of the RPF next-hop router toward the source.
Preference The administrative distance for this Static MRoute.
Example: The following shows example CLI display output for the command.
(Routing)#show ip mcast mroute static
NOTE: This command only clears dynamic mroute entries. It does not clear static mroutes.
Parameter Description
* Deletes all IPv4 entries from the IP multicast routing table.
group-address IP address of the multicast group.
source-address The IP address of a multicast source that is sending multicast traffic to the group.
Example: The following deletes all entries from the IP multicast routing table.
(Routing) # clear ip mroute *
Example: The following deletes all entries from the IP multicast routing table that match the given multicast group
address (224.1.2.1), irrespective of which source is sending for this group.
(Routing) # clear ip mroute 224.1.2.1
Example: The following deletes all entries from the IP multicast routing table that match the given multicast group
address (224.1.2.1) and the multicast source address (192.168.10.10).
(Routing) # clear ip mroute 224.1.2.1 192.168.10.10
9.2.1 ip dvmrp
This command sets administrative mode of DVMRP in the router to active.
Default disabled
Format ip dvmrp
Mode Global Config
9.2.1.0.1 no ip dvmrp
This command sets administrative mode of DVMRP in the router to inactive.
Format no ip dvmrp
Mode Global Config
Default 1
Format ip dvmrp metric metric
Mode Interface Config
Default disabled
Format ip dvmrp trapflags
Mode Global Config
9.2.4 ip dvmrp
This command sets the administrative mode of DVMRP on an interface or range of interfaces to active.
Default disabled
Format ip dvmrp
Mode Interface Config
9.2.4.0.1 no ip dvmrp
This command sets the administrative mode of DVMRP on an interface to inactive.
Format no ip dvmrp
Mode Interface Config
Parameter Description
Admin Mode Indicates whether DVMRP is enabled or disabled.
Version String The version of DVMRP being used.
Number of Routes The number of routes in the DVMRP routing table.
Reachable Routes The number of entries in the routing table with non-infinite metrics.
Parameter Description
Interface slot/port
Interface Mode The mode of this interface. Possible values are Enabled and Disabled.
State The current state of DVMRP on this interface. Possible values are Operational or Non-Operational.
Parameter Description
Interface Mode Indicates whether DVMRP is enabled or disabled on the specified interface.
Metric The metric of this interface. This is a configured value.
Local Address The IP address of the interface.
The following field is displayed only when DVMRP is operational on the interface.
Parameter Description
Generation ID The Generation ID value for the interface. This is used by the neighboring routers to detect that the DVMRP table
should be resent.
The following fields are displayed only if DVMRP is enabled on this interface.
Parameter Description
Received Bad Packets The number of invalid packets received.
Received Bad Routes The number of invalid routes received.
Sent Routes The number of routes that have been sent on this interface.
Parameter Description
IfIndex The value of the interface used to reach the neighbor.
Nbr IP Addr The IP address of the DVMRP neighbor for which this entry contains information.
State The state of the neighboring router. The possible value for this field are ACTIVE or DOWN.
Up Time The time since this neighboring router was learned.
Expiry Time The time remaining for the neighbor to age out. This field is not applicable if the State is DOWN.
Generation ID The Generation ID value for the neighbor.
Major Version The major version of DVMRP protocol of neighbor.
Minor Version The minor version of DVMRP protocol of neighbor.
Capabilities The capabilities of neighbor.
Received Routes The number of routes received from the neighbor.
Rcvd Bad Pkts The number of invalid packets received from this neighbor.
Rcvd Bad Routes The number of correct packets received with invalid routes.
Parameter Description
Source IP The sources for which this entry specifies a next hop on an outgoing interface.
Source Mask The IP Mask for the sources for which this entry specifies a next hop on an outgoing interface.
Next Hop Interface The interface in slot/port format for the outgoing interface for this next hop.
Type The network is a LEAF or a BRANCH.
Parameter Description
Group IP The multicast address that is pruned.
Source IP The IP address of the source that has pruned.
Source Mask The network mask for the prune source. It should be all 1s or both the prune source and prune mask must match.
Expiry Time (secs) The expiry time in seconds. This is the time remaining for this prune to age out.
Parameter Description
Source Address The multicast address of the source group.
Source Mask The IP Mask for the source group.
Upstream Neighbor The IP address of the neighbor which is the source for the packets for a specified multicast address.
Interface The interface used to receive the packets sent by the sources.
Metric The distance in hops to the source subnet. This field has a different meaning than the Interface Metric field.
Expiry Time (secs) The expiry time in seconds, which is the time left for this route to age out.
Parameter Description
Up Time (secs) The time when a specified route was learnt, in seconds.
Default disabled
Format ip pim dense
Mode Global Config
Default disabled
Format ip pim sparse
Mode Global Config
9.3.3 ip pim
Use this command to administratively enable PIM on the specified interface.
Default disabled
Format ip pim
Mode Interface Config
Example: The following shows example CLI display output for the command.
(Routing) (Interface 0/1) #ip pim
9.3.3.0.1 no ip pim
Use this command to disable PIM on the specified interface.
Format no ip pim
Mode Interface Config
Default 30
Format ip pim hello-interval seconds
Mode Interface Config
NOTE: This command takes effect only when Sparse mode in enabled in the Global mode.
Default disabled
Format ip pim bsr-border
Mode Interface Config
NOTE: This command takes effect only when PIM-SM is configured as the PIM mode.
Default disabled
Format ip pim bsr-candidate interface {slot/port|vlan 1-4093} hash-mask-length [bsr-priority]
[interval interval]
Parameters Description
slot/port Interface number on this router from which the BSR address is derived, to make it a candidate. This interface
must be enabled with PIM.
hash-mask-length Length of a mask (32 bits maximum) that is to be ANDed with the group address before the hash function is called.
All groups with the same seed hash correspond to the same RP. For example, if this value is 24, only the first 24
bits of the group addresses matter. This allows you to get one RP for multiple groups.
bsr-priority Priority of the candidate BSR. The range is an integer from 0 to 255. The BSR with the larger priority is preferred.
If the priority values are the same, the router with the larger IP address is the BSR. The default value is 0.
interval (Optional) Indicates the BSR candidate advertisement interval. The range is from 1 to 16383 seconds. The default
value is 60 seconds.
NOTE: This command takes effect only when Sparse mode is enabled in the Global mode.
Default 1
Format ip pim dr-priority 0-2147483647
Mode Interface Config
Example: The following shows example CLI display output for the command.
(Routing) (Interface 0/1) #ip pim dr-priority 10
NOTE: This command takes effect only when is configured as the PIM mode.
Default 60
Format ip pim join-prune-interval 0-18000
Mode Interface Config
Default disabled
Format ip pim rp-address rp-address group-address group-mask [override]
Parameter Description
rp-address The IP address of the RP.
group-address The group address supported by the RP.
group-mask The group mask for the group address.
override (Optional) Indicates that if there is a conflict, the RP configured with this command prevails over the RP learned
by BSR.
NOTE: This command takes effect only when PIM-SM is configured as the PIM mode.
Default disabled
Format ip pim rp-candidate interface {slot/port|vlan 1-4093} group-address group-mask
[interval interval]
Parameter Description
slot/port The IP address associated with this interface type and number is advertised as a candidate RP address. This
interface must be enabled with PIM.
group-address The multicast group address that is advertised in association with the RP address.
group-mask The multicast group prefix that is advertised in association with the RP address.
interval (Optional) Indicates the RP candidate advertisement interval. The range is from 1 to 16,383 seconds. The default
value is 60 seconds.
NOTE: This command takes effect only when PIM-SM is configured as the PIM mode.
Default disabled
Format ip pim ssm {default | group-address group-mask}
Mode Global Config
Parameter Description
default-range Defines the SSM range access list to 232/8.
9.3.12 ip pim-trapflags
This command enables the PIM trap mode for both Sparse Mode (SM) and Dense Mode. (DM).
Default disabled
Format ip pim-trapflags
Mode Global Config
9.3.12.0.1 no ip pim-trapflags
This command sets the PIM trap mode to the default.
Format no ip pim-trapflags
Mode Global Config
Terms Parameters
MFC IPv4 Mode Enabled when IPv4 Multicast routing is operational.
MFC IPv6 Mode Enabled when IPv6 Multicast routing is operational.
MFC Entry Count The number of entries present in MFC.
Current multicast IPv4 Protocol The current operating IPv4 multicast routing protocol.
Current multicast IPv6 Protocol The current operating multicast IPv6 routing protocol.
Total Software Forwarded packets Total number of multicast packets forwarded in software.
Source Address Source address of the multicast route entry.
Group Address Group address of the multicast route entry.
Packets Forwarded in Software Number of multicast packets that are forwarded in software for a specific multicast route entry,
for this entry
Protocol Multicast Routing Protocol that has added a specific entry
Expiry Time (secs) Expiry time for a specific Multicast Route entry in seconds.
Up Time (secs) Up time in seconds for a specific Multicast Routing entry.
Incoming interface Incoming interface for a specific Multicast Route entry.
Outgoing interface list Outgoing interface list for a specific Multicast Route entry.
Example:
(Routing) (Config)#show ip mfc
NOTE: If the PIM mode is PIM-DM (dense), some of the fields in the following table do not display in the command output
because they are applicable only to PIM-SM.
Parameter Description
PIM Mode Indicates the configured mode of the PIM protocol as dense (PIM-DM) or sparse (PIM-SM)
Interface slot/port
Interface-Mode Indicates whether PIM is enabled or disabled on this interface.
Operational-Status The current state of PIM on this interface: Operational or Non-Operational.
Example 1: The following shows example CLI display output for the command in PIM Mode = Dense mode.
(Routing) #show ip pim
Example 2: The following shows example CLI display output for the command in PIM Mode = Sparse mode.
(Routing) #show ip pim
Example 3: The following shows example CLI display output for the command in PIM Mode = None mode.
(Routing) #show ip pim
If no SSM Group range is configured, this command displays the following message.
Parameter Description
Group Address The IP multicast address of the SSM group.
Prefix Length The network prefix length.
Example: The following shows example CLI display output for the command.
(Routing) #show ip pim ssm
If no SSM Group range is configured, this command displays the following message:
No SSM address range is configured.
Parameter Description
Interface slot/port The interface number.
Mode Indicates the active PIM mode enabled on the interface is dense or sparse.
Hello Interval The frequency at which PIM hello messages are transmitted on this interface. By default, the value is 30 seconds.
Join Prune Interval The join/prune interval value for the PIM router. The interval is in seconds.
DR Priority The priority of the Designated Router configured on the interface. This field is not applicable if the interface mode
is Dense.
BSR Border Identifies whether this interface is configured as a bootstrap router border interface.
Neighbor Count The number of PIM neighbors learned on this interface. This is a dynamic value and is shown only when a PIM
interface is operational.
Designated Router The IP address of the elected Designated Router for this interface. This is a dynamic value and will only be shown
when a PIM interface is operational. This field is not applicable if the interface mode is Dense.
Example: The following shows example CLI display output for the command.
(Routing) #show ip pim interface
Interface.........................................0/1
Mode............................................Sparse
Hello Interval (secs)...........................30
Join Prune Interval (secs)......................60
DR Priority.....................................1
BSR Border......................................Disabled
Neighbor Count..................................1
Designated Router...............................192.168.10.1
Interface.........................................0/2
Mode............................................Sparse
Hello Interval (secs)...........................30
Join Prune Interval (secs)......................60
DR Priority.....................................1
BSR Border......................................Disabled
Neighbor Count..................................1
Designated Router...............................192.168.10.1
If none of the interfaces are enabled for PIM, the following message is displayed:
None of the routing interfaces are enabled for PIM.
Parameter Description
Neighbor Address The IP address of the PIM neighbor on an interface.
Interface slot/port
Up Time The time since this neighbor has become active on this interface.
Expiry Time Time remaining for the neighbor to expire.
DR Priority The DR Priority configured on this Interface (PIM-SM only).
NOTE: DR Priority is applicable only when sparse-mode configured routers are neighbors. Otherwise, NA
is displayed in this field.
Example: The following shows example CLI display output for the command.
(Routing) #show ip pim neighbor 0/1
If no neighbors have been learned on any of the interfaces, the following message is displayed.
No neighbors exist on the router.
Parameter Description
BSR Address IP address of the BSR.
BSR Priority Priority as configured in the ip pim bsr-candidate command.
BSR Hash Mask Length Length of a mask (maximum 32 bits) that is to be ANDed with the group address before the hash function
is called. This value is configured in the ip pim bsr-candidate command.
C-BSR Advertisement Indicates the configured C-BSR Advertisement interval with which the router, acting as a C-BSR, will
Interval periodically send the C-BSR advertisement messages.
Next Bootstrap Message Time (in hours, minutes, and seconds) in which the next bootstrap message is due from this BSR.
Example 1:
(Routing) #show ip pim bsr-router elected
Example 2:
(Routing) #show ip pim bsr-router candidate
If no configured or elected BSRs exist on the router, the following message is displayed.
No BSR's exist/learned on this router.
Parameter Description
RP Address The IP address of the RP for the group specified.
Type Indicates the mechanism (BSR or static) by which the RP was selected.
Example: The following shows example CLI display output for the command.
(Routing) #show ip pim rp-hash 224.1.2.0
RP Address192.168.10.1
TypeStatic
Parameter Description
RP Address The IP address of the RP for the group specified.
Group Address The IP address of the multicast group.
Group Mask The subnet mask associated with the group.
Origin Indicates the mechanism (BSR or static) by which the RP was selected.
The following show examples of CLI display output for the command.
Example 1:
(Routing) #show ip pim rp mapping 192.168.10.1
RP Address 192.168.10.1
Group Address 224.1.2.1
Group Mask 255.255.255.0
Origin Static
Example 2:
(Routing) #show ip pim rp mapping
RP Address 192.168.10.1
Group Address 224.1.2.1
Group Mask 255.255.255.0
Origin Static
RP Address 192.168.20.1
Group Address 229.2.0.0
Group Mask 255.255.0.0
Origin Static
Example:
Example:
Parameters Description
Stat RX: Packets received
Tx: Packets transmitted
Interface The PIM-enabled routing interface
Hello The number of PIM Hello messages
Register The number of PIM Register messages
Reg-Stop The number of PIM Register-stop messages
Join/Pru The number of PIM Join/Prune messages
BSR The number of PIM Boot Strap messages
Assert The number of PIM Assert messages
CRP The number of PIM Candidate RP Advertisement messages.
Example 1:
(Routing) #show ip pim statistics
=====================================================================
Interface Stat Hello Register Reg-Stop Join/Pru BSR Assert CRP
=====================================================================
Vl10 Rx 0 0 0 0 0 0 0
Tx 2 0 0 0 0 0 0
Vl20 Rx 0 0 0 5 0 0 0
Tx 8 7 0 0 0 0 0
Example 2:
Example 3:
9.4.1 ip igmp
This command sets the administrative mode of IGMP in the system to active on an interface, range of interfaces, or on all
interfaces.
Default disabled
Format ip igmp
Modes Global Config
Interface Config
9.4.1.0.1 no ip igmp
This command sets the administrative mode of IGMP in the system to inactive.
Format no ip igmp
Modes Global Config
Interface Config
Default disabled
Format ip igmp header-validation
Mode Global Config
Default 3
Format ip igmp version version
Modes Interface Config
Default 100
Format ip igmp query-max-response-time 0-255
Mode Interface Config
Default 2
Format ip igmp robustness 1-255
Mode Interface Config
Default 2
Format ip igmp startup-query-count count
Mode Interface Config
Default 31
Format ip igmp startup-query-interval interval
Mode Interface Config
Parameter Description
IGMP Admin Mode The administrative status of IGMP. This is a configured value.
Interface slot/port
Interface Mode Indicates whether IGMP is enabled or disabled on the interface. This is a configured value.
Protocol State The current state of IGMP on this interface. Possible values are Operational or Non-Operational.
If you do not use the detail keyword, the following fields appear.
Parameter Description
IP Address The IP address of the interface participating in the multicast group.
Subnet Mask The subnet mask of the interface participating in the multicast group.
Interface Mode This displays whether IGMP is enabled or disabled on this interface.
The following fields are not displayed if the interface is not enabled.
Parameter Description
Querier Status This displays whether the interface has IGMP in Querier mode or Non-Querier mode.
Groups The list of multicast groups that are registered on this interface.
Parameter Description
Multicast IP Address The IP address of the registered multicast group on this interface.
Last Reporter The IP address of the source of the last membership report received for the specified multicast group address on
this interface.
Up Time The time elapsed since the entry was created for the specified multicast group address on this interface.
Expiry Time The amount of time remaining to remove this entry before it is aged out.
Version1 Host Timer The time remaining until the local router assumes that there are no longer any IGMP version 1 multicast members
on the IP subnet attached to this interface. This could be an integer value or “-----” if there is no Version 1 host
present.
Version2 Host Timer The time remaining until the local router assumes that there are no longer any IGMP version 2 multicast members
on the IP subnet attached to this interface. This could be an integer value or “-----” if there is no Version 2 host
present.
Group Compatibility The group compatibility mode (v1, v2, or v3) for this group on the specified interface.
Mode
Parameter Description
Interface slot/port
IGMP Admin Mode The administrative status of IGMP.
Interface Mode Indicates whether IGMP is enabled or disabled on the interface.
IGMP Version The version of IGMP running on the interface. This value can be configured to create a router capable of running
either IGMP version 1 or 2.
Query Interval The frequency at which IGMP Host-Query packets are transmitted on this interface.
Query Max Response The maximum query response time advertised in IGMPv2 queries on this interface.
Time
Robustness The tuning for the expected packet loss on a subnet. If a subnet is expected to be have a lot of loss, the
Robustness variable may be increased for that interface.
Startup Query Interval The interval between General Queries sent by a Querier on startup.
Startup Query Count The number of Queries sent out on startup, separated by the Startup Query Interval.
Last Member Query The Maximum Response Time inserted into Group-Specific Queries sent in response to Leave Group messages.
Interval
Last Member Query The number of Group-Specific Queries sent before the router assumes that there are no local members.
Count
Parameter Description
Interface Valid slot and port number separated by forward slashes.
Interface IP The IP address of the interface participating in the multicast group.
State The interface that has IGMP in Querier mode or Non-Querier mode.
Group Compatibility The group compatibility mode (v1, v2 or v3) for the specified group on this interface.
Mode
Source Filter Mode The source filter mode (Include/Exclude) for the specified group on this interface. This is “-----” for IGMPv1 and
IGMPv2 Membership Reports.
Parameter Description
Interface Valid slot and port number separated by forward slashes.
Group Compatibility The group compatibility mode (v1, v2, or v3) for the specified group on this interface.
Mode
Source Filter Mode The source filter mode (Include/Exclude) for the specified group on this interface. This is “-----” for IGMPv1 and
IGMPv2 Membership Reports.
Parameter Description
Source Hosts The list of unicast source IP addresses in the group record of the IGMPv3 Membership Report with the specified
multicast group IP address. This is “-----” for IGMPv1 and IGMPv2 Membership Reports.
Expiry Time The amount of time remaining to remove this entry before it is aged out. This is “-----” for IGMPv1 and IGMPv2
Membership Reports.
Parameter Description
Querier Status The status of the IGMP router, whether it is running in Querier mode or Non-Querier mode.
Querier IP Address The IP address of the IGMP Querier on the IP subnet to which this interface is attached.
Querier Up Time The time since the interface Querier was last changed.
Querier Expiry Time The amount of time remaining before the Other Querier Present Timer expires. If the local system is the querier,
the value of this object is zero.
Wrong Version The number of queries received whose IGMP version does not match the IGMP version of the interface.
Queries
Number of Joins The number of times a group membership has been added on this interface.
Number of Groups The current number of membership entries for this interface.
9.5.1 ip igmp-proxy
This command enables the IGMP Proxy on the an interface or range of interfaces. To enable the IGMP Proxy on an interface,
you must enable multicast forwarding. Also, make sure that there are no multicast routing protocols enabled on the router.
Format ip igmp-proxy
Mode Interface Config
9.5.1.0.1 no ip igmp-proxy
This command disables the IGMP Proxy on the router.
Format no ip igmp-proxy
Mode Interface Config
Default 1
Format ip igmp-proxy unsolicit-rprt-interval interval
Mode Interface Config
Parameter Description
Interface index The interface number of the IGMP Proxy.
Admin Mode States whether the IGMP Proxy is enabled or not. This is a configured value.
Operational Mode States whether the IGMP Proxy is operationally enabled or not. This is a status parameter.
Version The present IGMP host version that is operational on the proxy interface.
Number of Multicast The number of multicast groups that are associated with the IGMP Proxy interface.
Groups
Unsolicited Report The time interval at which the IGMP Proxy interface sends unsolicited group membership report.
Interval
Querier IP Address on The IP address of the Querier, if any, in the network attached to the upstream interface (IGMP-Proxy interface).
Proxy Interface
Older Version 1 The interval used to timeout the older version 1 queriers.
Querier Timeout
Older Version 2 The interval used to timeout the older version 2 queriers.
Querier Timeout
Proxy Start Frequency The number of times the IGMP Proxy has been stopped and started.
Example: The following shows example CLI display output for the command.
(Routing) #show ip igmp-proxy
Parameter Description
Interface Index The slot/port of the IGMP proxy.
The column headings of the table associated with the interface are as follows.
Parameter Description
Ver The IGMP version.
Query Rcvd Number of IGMP queries received.
Report Rcvd Number of IGMP reports received.
Report Sent Number of IGMP reports sent.
Leaves Rcvd Number of IGMP leaves received. Valid for version 2 only.
Leaves Sent Number of IGMP leaves sent on the Proxy interface. Valid for version 2 only.
Example: The following shows example CLI display output for the command.
(Routing) #show ip igmp-proxy interface
Ver Query Rcvd Report Rcvd Report Sent Leave Rcvd Leave Sent
------------------------------------------------------------------
1 0 0 0 ----- -----
2 0 0 0 0 0
3 0 0 0 ----- -----
Parameter Description
Interface The interface number of the IGMP Proxy.
Group Address The IP address of the multicast group.
Last Reporter The IP address of host that last sent a membership report for the current group on the network attached to the
IGMP Proxy interface (upstream interface).
Up Time (in secs) The time elapsed since last created.
Member State The status of the entry. Possible values are IDLE_MEMBER or DELAY_MEMBER.
IDLE_MEMBER - interface has responded to the latest group membership query for this group.
DELAY_MEMBER - interface is going to send a group membership report to respond to a group membership
query for this group.
Filter Mode Possible values are Include or Exclude.
Sources The number of sources attached to the multicast group.
Example: The following shows example CLI display output for the command.
Group Address Last Reporter Up Time Member State Filter Mode Sources
------------- -------------- ---------- ------------- ------------- -------
225.4.4.4 5.5.5.48 00:02:21 DELAY_MEMBER Include 3
Parameter Description
Interface The interface number of the IGMP Proxy.
Group Address The IP address of the multicast group.
Last Reporter The IP address of host that last sent a membership report for the current group, on the network attached to the
IGMP-Proxy interface (upstream interface).
Up Time (in secs) The time elapsed since last created.
Member State The status of the entry. Possible values are IDLE_MEMBER or DELAY_MEMBER.
IDLE_MEMBER - interface has responded to the latest group membership query for this group.
DELAY_MEMBER - interface is going to send a group membership report to respond to a group membership
query for this group.
Filter Mode Possible values are Include or Exclude.
Sources The number of sources attached to the multicast group.
Group Source List The list of IP addresses of the sources attached to the multicast group.
Expiry Time Time left before a source is deleted.
Example: The following shows example CLI display output for the command.
Group Address Last Reporter Up Time Member State Filter Mode Sources
------------- -------------- ----------- ------------ ------------ ---------
225.4.4.4 5.5.5.48 00:02:21 DELAY_MEMBER Include 3
----------------- -----------------
5.1.2.3 00:02:21
6.1.2.3 00:02:21
7.1.2.3 00:02:21
NOTE: There is no specific IP multicast enable for IPv6. Enabling of multicast at global config is common for both IPv4
and IPv6.
Parameter Description
src-ip-addr The IP address of the multicast source network.
src-mask The IP mask of the multicast data source.
rpf-ip-addr The IP address of the RPF next-hop router toward the source.
interface Specify the interface if the RPF Address is a link-local address.
preference The administrative distance for this Static MRoute, that is, the preference value. The range is 1 to 255.
Use this command to show the mroute entries specific for IPv6. (This command is the IPv6 equivalent of the IPv4 show ip
mroute command.)
Format show ipv6 mroute {[detail] | [summary] | [group {group-address} [detail | summary]] |
[source {source-address} [grpaddr | summary ]]}
Modes Privileged EXEC
User EXEC
If you use the detail parameter, the command displays the following Multicast Route Table fields.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Expiry Time The time of expiry of this entry in seconds.
Up Time The time elapsed since the entry was created in seconds.
RPF Neighbor The IP address of the RPF neighbor.
Flags The flags associated with this entry.
If you use the summary parameter, the command displays the following fields.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Protocol The multicast routing protocol by which the entry was created.
Incoming Interface The interface on which the packet for the source/group arrives.
Outgoing Interface List The list of outgoing interfaces on which the packet is forwarded.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Protocol The multicast routing protocol by which this entry was created.
Incoming Interface The interface on which the packet for this group arrives.
Outgoing Interface List The list of outgoing interfaces on which this packet is forwarded.
If you use the groupipaddr parameter, the command displays the following column headings in the output table.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Expiry Time The time of expiry of this entry in seconds.
Up Time The time elapsed since the entry was created in seconds.
RPF Neighbor The IP address of the RPF neighbor.
Flags The flags associated with this entry.
If you use the summary parameter, the command displays the following column headings in the output table.
Parameter Description
Source IP Addr The IP address of the multicast data source.
Group IP Addr The IP address of the destination of the multicast packet.
Protocol The multicast routing protocol by which this entry was created.
Incoming Interface The interface on which the packet for this source arrives.
Outgoing Interface List The list of outgoing interfaces on which this packet is forwarded.
Parameter Description
Source Address IP address of the multicast source network.
Source Mask The subnetwork mask pertaining to the sourceIP.
RPF Address The IP address of the RPF next-hop router toward the source.
Interface The interface that is used to reach the RPF next-hop. This is valid if the RPF address is a link-local
address.
Preference The administrative distance for this Static MRoute.
NOTE: This command only clears dynamic mroute entries. It does not clear static mroutes.
Parameter Description
* Deletes all IPv6 entries from the IPv6 multicast routing table.
group-address IPv6 address of the multicast group.
source-address The IPv6 address of a multicast source that is sending multicast traffic to the group.
Example: The following deletes all entries from the IPv6 multicast routing table:
(Routing) # clear ipv6 mroute *
Example: The following deletes all entries from the IPv6 multicast routing table that match the given multicast group
address (FF4E::1), irrespective of which source is sending for this group:
(Routing) # clear ipv6 mroute FF4E::1
Example: The following deletes all entries from the IPv6 multicast routing table that match the given multicast group
address (FF4E::1) and the multicast source address (2001::2):
(Routing) # clear ip mroute FF4E::1 2001::2
Default disabled
Format ipv6 pim dense
Mode Global Config
Default disabled
Format ipv6 pim sparse
Mode Global Config
Default disabled
Example: The following shows example CLI display output for the command.
(Routing) (Interface 0/1) #ipv6 pim
Default 30
Format ipv6 pim hello-interval 0–18000
Mode Interface Config
NOTE: This command takes effect only when PIM-SM is enabled in the Global mode.
Default disabled
Format ipv6 pim bsr-border
Mode Interface Config
NOTE: This command takes effect only when PIM-SM is configured as the PIM mode.
Default disabled
Format ipv6 pim bsr-candidate interface {slot/port|vlan 1-4093} hash-mask-length
[bsr-priority] [interval interval]
Mode Global Config
Parameters Description
slot/port Interface number on this router from which the BSR address is derived, to make it a candidate. This interface
must be enabled with PIM.
hash-mask-length Length of a mask (32 bits maximum) that is to be ANDed with the group address before the hash function is called.
All groups with the same seed hash correspond to the same RP. For example, if this value was 24, only the first
24 bits of the group addresses matter. This allows you to get one RP for multiple groups.
bsr-priority Priority of the candidate BSR. The range is an integer from 0 to 255. The BSR with the larger priority is preferred.
If the priority values are the same, the router with the larger IPv6 address is the BSR. The default value is 0.
interval (Optional) Indicates the BSR candidate advertisement interval. The range is from 1 to 16383 seconds. The default
value is 60 seconds.
NOTE: This command takes effect only when PIM-SM is enabled in the Global mode.
Default 1
Example: The following shows example CLI display output for the command.
(Routing) (Interface 0/1) #ipv6 pim dr-priority 10
NOTE: This command takes effect only when PIM-SM is enabled in the Global mode.
Default 60
Format ipv6 pim join-prune-interval 0-18000
Mode Interface Config
NOTE: This command takes effect only when PIM-SM is configured as the PIM mode.
Default 0
Format ipv6 pim rp-address {rp-address | group-address/group-mask } [override]
Mode Global Config
Parameter Description
rp-address The IPv6 address of the RP.
group-address The group address supported by the RP.
Parameter Description
group-mask The group mask for the group address.
override (Optional) Indicates that if there is a conflict, the RP configured with this command prevails over the RP learned
by BSR.
NOTE: This command takes effect only when PIM-SM is configured as the PIM mode.
Default disabled
Format ipv6 pim rp-candidate interface {slot/port|vlan 1-4093} group-address group-mask
[interval interval]
Mode Global Config
Parameter Description
slot/port The IP address associated with this interface type and number is advertised as a candidate RP address. This
interface must be enabled with PIM.
group-address The multicast group address that is advertised in association with the RP address.
group-mask The multicast group prefix that is advertised in association with the RP address.
interval (Optional) Indicates the RP candidate advertisement interval. The range is from 1 to 16383 seconds. The default
value is 60 seconds.
NOTE:
This command takes effect only when PIM-SM is configured as the PIM mode.
Some EFOS platforms do not support a nonzero data threshold rate. For these platforms, only a “Switch on
First Packet” policy is supported.
Default disabled
Format ipv6 pim ssm {default | group-address group-mask}
Mode Global Config
Parameter Description
default-range Defines the SSM range access list FF3x::/32.
NOTE: If the PIM mode is PIM-DM (dense), some of the fields in the following table do not display in the command output
because they are applicable only to PIM-SM.
Parameter Description
PIM Mode Indicates whether the PIM mode is dense (PIM-DM) or sparse (PIM-SM)
Interface slot/port
Interface Mode Indicates whether PIM is enabled or disabled on this interface.
Operational Status The current state of PIM on this interface: Operational or Non-Operational.
Example: The following shows example CLI display output for the command.
Parameter Description
Group Address The IPv6 multicast address of the SSM group.
Prefix Length The network prefix length.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 pim ssm
If no SSM Group range is configured, this command displays the following message:
No SSM address range is configured.
Parameter Description
Interface slot/port
Mode Indicates whether the PIM mode enabled on the interface is dense or sparse.
Hello Interval The frequency at which PIM hello messages are transmitted on this interface. By default, the value is 30 seconds.
Join Prune Interval The join/prune interval for the PIM router. The interval is in seconds.
DR Priority The priority of the Designated Router configured on the interface. This field is not applicable if the interface mode
is Dense
BSR Border Identifies whether this interface is configured as a bootstrap router border interface.
Neighbor Count The number of PIM neighbors learned on this interface. This is a dynamic value and is shown only when a PIM
interface is operational.
Designated Router The IP address of the elected Designated Router for this interface. This is a dynamic value and will only be shown
when a PIM interface is operational. This field is not applicable if the interface mode is Dense
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 pim interface
Interface...................................... 0/1
Mode........................................... Sparse
Hello Interval (secs).......................... 30
Interface...................................... 0/21
Mode........................................... Sparse
Hello Interval (secs).......................... 30
Join Prune Interval (secs)..................... 60
DR Priority.................................... 1
BSR Border..................................... Disabled
Neighbor Count ................................ 1
Designated Router.............................. fe80::20a:f7ff:fe81:8ad9
If none of the interfaces are enabled for PIM, the following message is displayed:
None of the routing interfaces are enabled for PIM.
Parameter Description
Neighbor Address The IPv6 address of the PIM neighbor on an interface.
Interface slot/port
Up Time The time since this neighbor has become active on this interface.
Expiry Time Time remaining for the neighbor to expire.
DR Priority The DR Priority configured on this Interface (PIM-SM only).
NOTE: DR Priority is applicable only when sparse-mode configured routers are neighbors. Otherwise, NA
is displayed in this field.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 pim neighbor
If no neighbors have been learned on any of the interfaces, the following message is displayed:
No neighbors are learned on any interface.
Parameter Description
BSR Address IPv6 address of the BSR.
BSR Priority Priority as configured in the ipv6 pim bsr-candidate command.
BSR Hash Mask Length Length of a mask (maximum 32 bits) that is to be ANDed with the group address before the hash function
is called. This value is configured in the ipv6 pim bsr-candidate command.
C-BSR Advertisement Indicates the configured C-BSR Advertisement interval with which the router, acting as a C-BSR, will
Interval periodically send the C-BSR advertisement messages.
Next Bootstrap Message Time (in hours, minutes, and seconds) in which the next bootstrap message is due from this BSR.
The following shows example CLI display output for the command.
Example 1:
(Routing) #show ipv6 pim bsr-router elected
BSR Address.................................... 3001::1
BSR Priority................................. 150
BSR Hash Mask Length......................... 120
Next Bootstrap message (hh:mm:ss)............ 00:00:15
Example 2:
(Routing) #show ipv6 pim bsr-router candidate
BSR Address.................................... 3001::1
BSR Priority................................. 150
BSR Hash Mask Length......................... 120
C-BSR Advertisement Interval (secs).......... 60
Next Bootstrap message (hh:mm:ss)............ NA
If no configured or elected BSRs exist on the router, the following message is displayed:
No BSR's exist/learned on this router.
Parameter Description
RP Address The IPv6 address of the RP for the group specified.
Type Indicates the mechanism (BSR or static) by which the RP was selected.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 pim rp-hash ff1e::
RP Address..................................... 2001::1
Type........................................ Static
Parameter Description
RP Address The IPv6 address of the RP for the group specified.
Group Address The IPv6 address and prefix length of the multicast group.
Origin Indicates the mechanism (BSR or static) by which the RP was selected.
C-RP Advertisement Indicates the configured C-RP Advertisement interval with which the router acting as a Candidate RP will
Interval periodically send the C-RP advertisement messages to the elected BSR.
The following shows examples of CLI display output for the command.
Example 1:
(Routing) #show ipv6 pim rp mapping 2001::1
RP Address..................................... 2001::1
Group Address............................... ff1e::/64
Origin...................................... Static
Expiry Time (hh:mm:ss)...................... NA
Next Candidate RP Advertisement (hh:mm:ss).. NA
Example 2:
(Routing) #show ipv6 pim rp mapping
RP Address..................................... 2001::1
Group Address............................... ff1e::/64
Origin...................................... Static
Expiry Time (hh:mm:ss)...................... NA
Next Candidate RP Advertisement (hh:mm:ss).. NA
Example 3:
(Routing) # show ipv6 pim rp mapping candidate
RP Address..................................... 2001::1
Group Address............................... ff1e::/64
Origin...................................... BSR
C-RP Advertisement Interval (secs).......... 200
Default disabled
Format ipv6 mld router
Mode Global Config
Default disabled
Format no ipv6 mld router
Mode Global Config
Default 125
Format ipv6 mld query-interval query-interval
Mode Interface Config
Default 2
Format ipv6 mld last-member-query-count last-member-query-count
Mode Interface Config
Default 2 seconds
Format ipv6 mld startup-query-count <startup-query-count>
Mode Interface Config
Default 31 seconds
Format ipv6 mld startup-query-interval <startup-query-interval>
Mode Interface Config
Default 2
Format ipv6 mld version { 1 | 2 }
Mode Interface Config
Parameter Description
Group Address The address of the multicast group.
Interface Interface through which the multicast group is reachable.
Up Time Time elapsed in hours, minutes, and seconds since the multicast group has been known.
Expiry Time Time left in hours, minutes, and seconds before the entry is removed from the MLD membership table.
When group-address is specified, the following fields are displayed for each multicast group and each interface.
Parameter Description
Interface Interface through which the multicast group is reachable.
Group Address The address of the multicast group.
Last Reporter The IP Address of the source of the last membership report received for this multicast group address on that
interface.
Filter Mode The filter mode of the multicast group on this interface. The values it can take are include and exclude.
Version 1 Host Timer The time remaining until the router assumes there are no longer any MLD version-1 Hosts on the specified
interface.
Group Compat Mode The compatibility mode of the multicast group on this interface. The values it can take are MLDv1 and MLDv2.
The following table is displayed to indicate all the sources associated with this group.
Parameter Description
Source Address The IP address of the source.
Uptime Time elapsed in hours, minutes, and seconds since the source has been known.
Expiry Time Time left in hours, minutes, and seconds before the entry is removed.
Example: The following shows examples of CLI display output for the commands.
(Routing) #show ipv6 mld groups ?
Interface...................................... 0/1
Up Time (hh:mm:ss)............................. 00:03:04
Expiry Time (hh:mm:ss)......................... ------
Interface...................................... 0/1
Group Address.................................. FF43::3
Last Reporter.................................. FE80::200:FF:FE00:3
Up Time (hh:mm:ss)............................. 00:02:53
Expiry Time (hh:mm:ss)......................... ------
Filter Mode.................................... Include
Version1 Host Timer............................ ------
Group compat mode.............................. v2
Source Address ExpiryTime
----------------- -----------
2003::10 00:04:17
2003::20 00:04:17
The following information is displayed for each of the interfaces or for only the specified interface.
Parameter Description
Interface The interface number in slot/port format.
MLD Mode Displays the configured administrative status of MLD.
Operational Mode The operational status of MLD on the interface.
MLD Version Indicates the version of MLD configured on the interface.
Query Interval Indicates the configured query interval for the interface.
Query Max Response Indicates the configured maximum query response time (in seconds) advertised in MLD queries on this interface.
Time
Robustness Displays the configured value for the tuning for the expected packet loss on a subnet attached to the interface.
Startup Query interval This valued indicates the configured interval between General Queries sent by a Querier on startup.
Startup Query Count This value indicates the configured number of Queries sent out on startup, separated by the Startup Query
Interval.
Last Member Query This value indicates the configured Maximum Response Time inserted into Group-Specific Queries sent in
Interval response to Leave Group messages.
Last Member Query This value indicates the configured number of Group-Specific Queries sent before the router assumes that there
Count are no local members.
The following information is displayed if the operational mode of the MLD interface is enabled.
Parameter Description
Querier Status This value indicates whether the interface is an MLD querier or non-querier on the subnet with which it
is associated.
Querier Address The IP address of the MLD querier on the subnet with which the interface is associated.
Querier Up Time Time elapsed in seconds since the querier state has been updated.
Querier Expiry Time Time left in seconds before the Querier loses its title as querier.
Wrong Version Queries Indicates the number of queries received whose MLD version does not match the MLD version of the
interface.
Number of Joins The number of times a group membership has been added on this interface.
Number of Leaves The number of times a group membership has been removed on this interface.
Number of Groups The current number of membership entries for this interface.
Parameter Description
Valid MLD Packets Received The number of valid MLD packets received by the router.
Valid MLD Packets Sent The number of valid MLD packets sent by the router.
Queries Received The number of valid MLD queries received by the router.
Queries Sent The number of valid MLD queries sent by the router.
Reports Received The number of valid MLD reports received by the router.
Reports Sent The number of valid MLD reports sent by the router.
Leaves Received The number of valid MLD leaves received by the router.
Leaves Sent The number of valid MLD leaves sent by the router.
Bad Checksum MLD Packets The number of bad checksum MLD packets received by the router.
Malformed MLD Packets The number of malformed MLD packets received by the router.
Default 1
Format ipv6 mld-proxy unsolicit-rprt-interval interval
Mode Interface Config
The command displays the following parameters only when you enable MLD-Proxy.
Parameter Description
Interface Index The interface number of the MLD-Proxy.
Admin Mode Indicates whether MLD-Proxy is enabled or disabled. This is a configured value.
Operational Mode Indicates whether MLD-Proxy is operationally enabled or disabled. This is a status parameter.
Version The present MLD host version that is operational on the proxy interface.
Number of Multicast Groups The number of multicast groups that are associated with the MLD-Proxy interface.
Unsolicited Report Interval The time interval at which the MLD-Proxy interface sends unsolicited group membership report.
Querier IP Address on Proxy Interface The IP address of the Querier, if any, in the network attached to the upstream interface
(MLD-Proxy interface).
Older Version 1 Querier Timeout The interval used to timeout the older version 1 queriers.
Proxy Start Frequency The number of times the MLD-Proxy has been stopped and started.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 mld-proxy
Interface Index............................................. 0/3
Admin Mode................................................ Enable
Operational Mode......................................... Enable
Version......................................................... 3
Num of Multicast Groups............................. 0
Unsolicited Report Interval.......................... 1
Querier IP Address on Proxy Interface........ fe80::1:2:5
Older Version 1 Querier Timeout................ 00:00:00
Proxy Start Frequency.................................
Parameter Description
Interface Index The slot/port of the MLD-proxy.
The column headings of the table associated with the interface are as follows.
Parameter Description
Ver The MLD version.
Query Rcvd Number of MLD queries received.
Report Rcvd Number of MLD reports received.
Report Sent Number of MLD reports sent.
Leaves Rcvd Number of MLD leaves received. Valid for version 2 only.
Leaves Sent Number of MLD leaves sent on the Proxy interface. Valid for version 2 only.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 mld-proxy interface
Ver Query Rcvd Report Rcvd Report Sent Leave Rcvd Leave Sent
------------------------------------------------------------------
1 2 0 0 0 2
2 3 0 4 ----- -----
Parameter Description
Interface The interface number of the MLD-Proxy.
Group Address The IP address of the multicast group.
Last Reporter The IP address of the host that last sent a membership report for the current group, on the
network attached to the MLD-Proxy interface (upstream interface).
Up Time (in secs) The time elapsed in seconds since last created.
Member State Possible values are:
Idle_Member. The interface has responded to the latest group membership query for this
group.
Delay_Member. The interface is going to send a group membership report to respond to a
group membership query for this group.
Filter Mode Possible values are Include or Exclude.
Sources The number of sources attached to the multicast group.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 mld-proxy groups
Group Address Last Reporter Up Time Member State Filter Mode Sources
------------- -------------- ---------- ----------------- -------------- -------
FF1E::1 FE80::100:2.3 00:01:40 DELAY_MEMBER Exclude 2
Parameter Description
Interface The interface number of the MLD-Proxy.
Group Address The IP address of the multicast group.
Last Reporter The IP address of the host that last sent a membership report for the current group, on the
network attached to the MLD-Proxy interface (upstream interface).
Up Time (in secs) The time elapsed in seconds since last created.
Member State Possible values are:
Idle_Member. The interface has responded to the latest group membership query for this
group.
Delay_Member. The interface is going to send a group membership report to respond to a
group membership query for this group.
Filter Mode Possible values are Include or Exclude.
Sources The number of sources attached to the multicast group.
Group Source List The list of IP addresses of the sources attached to the multicast group.
Expiry Time The time left for a source to get deleted.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 igmp-proxy groups
Group Address Last Reporter Up Time Member State Filter Mode Sources
------------- ---------------- ----------- ----------------- ------------- -------
FF1E::1 FE80::100:2.3 244 DELAY_MEMBER Exclude 2
2001::2 --------
Parameter Description
as-number The router’s autonomous system number (ASN). The as-number ranges from 1-429,496,729.
11.1.2 address-family
To configure policy parameters within a peer template to be applied to a specific address family, use the address-family
command in Peer Template Configuration mode. This command enters an Address Family Configuration mode within the
peer template. Policy commands configured within this mode apply to the address family. The following commands can be
added to a peer template in Address Family Configuration mode:
activate
advertisement-interval seconds
default-originate
next-hop-self
prefix-list prefix-list-name {in | out}
If an IPv6 peer inherits a template that specifies address-family IPv4 parameters, those parameters are ignored.
Parameter Description
ipv4 Configure policy parameters to be applied to IPv4 routes.
ipv6 Configure policy parameters to be applied to IPv6 routes.
l2vpn evpn Configure policy parameters to be applied to L2VPN routes.
Example: In the following example of the command, the peer template AGGR sets the keepalive timer to 3 seconds, the
holdtimer to 9 seconds, allows communities to be sent for both IPv4 and IPv6 routes, and configures different inbound
and outbound route maps for IPv4 and IPv6. Two neighbors, 172.20.1.2 and 172.20.2.2, inherit these parameters from
the template.
(R1) (Config)# router bgp 65000
(R1) (Config-router)# neighbor 172.20.1.2 remote-as 65001
(R1) (Config-router)# neighbor 172.20.2.2 remote-as 65001
(R1) (Config-router)# template peer AGGR
(R1) (Config-rtr-tmplt)# timers 3 9
(R1) (Config-rtr-tmplt)# address-family ipv4
(R1) (Config-rtr-tmplt-af)# send-community
(R1) (Config-rtr-tmplt-af)# route-map RM4-IN in
(R1) (Config-rtr-tmplt-af)# route-map RM4-OUT out
(R1) (Config-rtr-tmplt-af)# exit
(R1) (Config-rtr-tmplt)# address-family ipv6
(R1) (Config-rtr-tmplt-af)# send-community
(R1) (Config-rtr-tmplt-af)# route-map RM6-IN in
(R1) (Config-rtr-tmplt-af)# route-map RM6-OUT out
(R1) (Config-rtr-tmplt-af)# exit
(R1) (Config-rtr-tmplt)# exit
(R1) (Config-router)# neighbor 172.20.1.2 inherit peer AGGR
(R1) (Config-router)# neighbor 172.20.2.2 inherit peer AGGR
(R1) (Config-router)# address-family ipv6
(R1) (Config-router)# neighbor 172.20.1.2 activate
(R1) (Config-router)# neighbor 172.20.2.2 activate
11.1.2.0.1 no address-family
To delete all policy commands for an address family in a peer template, use the no form of this command.
Parameter Description
ipv4 Configure policy parameters to be applied to IPv4 routes.
ipv6 Configure policy parameters to be applied to IPv6 routes.
The following commands are available in VPNv4 address family configuration mode.
neighbor ip-address activate
To exit from the VPNv4 address family mode, use the exit command.
Example: The following example shows how to enter the VPNv4 address family mode and configure neighbor
commands.
This command takes the user into the VPNv6 address family configuration mode. The following two commands are the only
commands available in the VPNv6 address family configuration mode:
neighbor ipv6-address activate
neighbor ipv6-address send-community extended
Usage Guidelines
This command takes the user into the Layer 2 VPN EVPN address family configuration mode. The following commands are
available in this mode.
neighbor ip-address activate
Example: The following example shows how to enter the Layer 2 VPN EVPN address family mode and configure the
available neighbor commands.
(Router) (Config)# route-map permit-all permit 20
(Router) (route-map)# set ip next-hop unchanged
(Router) (route-map)# exit
To be considered a match for an aggregate address, a prefix must be more specific (that is, have a longer prefix length) than
the aggregate address. A prefix whose prefix length equals the length of the aggregate address is not considered a match.
When BGP originates a summary address, it installs a reject route in the common routing table for the summary prefix. Any
received packets that match the summary prefix, but not a more specific route, match the reject route and are dropped.
Default No aggregate addresses are configured by default. Unless the options are specified, the aggregate is
advertised with the ATOMIC_AGGREGATE attribute and an empty AS path, and the more specific routes
are advertised along with the aggregate.
Format aggregate-address {address mask|ipv6-prefix/pfx-len} [as-set] [summary-only]
Mode BGP Router Config
Parameter Description
address mask Summary IPv4 prefix and mask. The default route (0.0.0.0 0.0.0.0) cannot be configured as an
aggregate-address. The mask cannot be a 32-bit mask (255.255.255.255). The combination of prefix and mask
must be a valid unicast destination prefix.
ipv6-prefix/pfx-len Summary IPv6 prefix and prefix length. The range for prefix length is 1 to 127.
as-set (Optional) Normally, the aggregate is advertised with an empty AS path and the ATOMIC_AGGREGATE
attribute. If the as-set option is configured, then the aggregate is advertised with a non-empty AS_PATH. If the
AS_PATH of all contained routes is the same, then the AS_PATH of the aggregate is the AS_PATH of the
contained routes. Otherwise, if the contained routes have different AS_PATHs, the AS_PATH attribute includes
an AS_SET with each of the AS numbers listed in the AS PATHs of the aggregated routes. If the as-set option is
not configured, the aggregate is advertised with an empty AS_PATH.
summary-only (Optional) When the summary-only option is given, the more-specific routes within the aggregate address are
not advertised to neighbors.
11.1.7.0.1 no aggregate-address
Use this command to delete a summary address for BGP. The address mask is a summary prefix and mask.
When this command is given, the path for an active aggregate address is advertised without a MED attribute. When this
command is not given, if multiple routes match an aggregate address, but have different MEDs, the aggregate takes the
MED of the first matching route. Any other matching prefix with the same MED is included in the aggregate. Matching
prefixes with different MEDs are not considered to be part of the aggregate and continue to be advertised as individual
routes.
Default All the routes aggregated by a given aggregate address must have the same MED value.
Format bgp aggregate-different-meds
Mode IPv4 Address Family ConfigIPv6 Address Family Config
Default By default, MED values are only compared for paths received from peers in the same AS.
Format bgp always-compare-med
Mode IPv4 Address Family ConfigIPv6 Address Family Config
Default By default, as-path length is not ignored in the BGP best path calculations.
Format bgp bestpath as-path ignore
Mode IPv4 Address Family ConfigIPv6 Address Family Config
Route reflection can change the routes clients select. A route reflector only reflects those routes it selects as best routes.
Best route selection can be influenced by the IGP metric of the route to reach the BGP next hop. Since a client’s IGP distance
to a given next hop may differ from the route reflector’s IGP distance, a route reflector may not readvertise a route a client
would have selected as best in the absence of route reflection. One way to avoid this effect is to fully mesh the clients within
a cluster. When clients are fully meshed, there is no need for the cluster’s route reflectors to reflect client routes to other
clients within the cluster. When client-to-client reflection is disabled, a route reflector continues to reflect routes from non-
clients to clients and from clients to non-clients.
A route reflector and its clients form a cluster. Since a cluster with a single route reflector has a single point of failure, a cluster
may be configured with multiple route reflectors. To avoid sending multiple copies of a route to a client, each route reflector
in a cluster should be configured with the same cluster ID. Route reflectors with the same cluster ID must have the same set
of clients; otherwise, some routes may not be reflected to some clients. The same cluster ID is used for both IPv4 and IPv6
route reflection.
Default A route reflector with an unconfigured cluster ID uses its BGP router ID (configured with the bgp router-id
command) as the cluster ID.
Format bgp cluster-id cluster-id
Mode BGP Router Config
Parameter Description
cluster-id A non-zero 32-bit identifier that uniquely identifies a cluster of route reflectors and their clients. The cluster ID may
be entered in dotted notation like an IPv4 address or as an integer.
BGP assigns the default local preference to each path received from an external peer. (BGP retains the LOCAL_PREF on
paths received from internal peers.) BGP also assigns the default local preference to locally-originated paths. If you change
the default local preference, BGP automatically initiates a soft inbound reset for all peers to apply the new local preference.
Default If this command is not given, BGP advertises a local preference of 100 in Update messages to internal
peers.
Format bgp default local-preference number
Mode BGP Router Config
Parameter Description
number The value to use as the local preference for routes advertised to internal peers. The range is 0 to 4,294,967,295.
Use limit max-number to define the global maximum number of IPv4 BGP dynamic neighbors that can be created.
BGP dynamic neighbors are configured using a range of IP addresses and BGP peer groups. Each range can be configured
as a subnet IP address. After a subnet range is configured for a BGP peer group, and a TCP session is initiated for an IP
address in the subnet range, a new BGP neighbor is dynamically created. Dynamically created neighbors are not displayed
in the running-config.
If a template peer name is not specified, all dynamic neighbors that are created will inherit default parameters. The template
peer name can be assigned/changed for a listen range in any time.
The total number of both IPv4 and IPv6 listen range groups you can configure are 10.
Default No subnets are associated with a BGP listen subnet range, and the BGP dynamic neighbor feature is not activated.
Format bgp listen { limit max-number | range network/length [ inherit peer peer-template-name
] }
Mode BGP Router Config
Parameter Description
limit max-number Sets a maximum limit number of IPv4 BGP dynamic subnet range neighbors. Number from 1 to
100. Default is 20.
range network/length Specifies a listen subnet range that is to be created. length is the IP prefix representing a subnet,
and the length of the subnet mask in bits. network is a valid IPv4 prefix.
Parameter Description
inherit peer peer-template-name (Optional) Specifies a BGP peer template name that is to be associated with the specified listen
subnet range and inherited with dynamically created neighbors. The template will be inherited
with dynamically created neighbors.
Example: The following commands show how to create a listen range with a template to be inherited with dynamically
created BGP neighbors.
(R1) # configure
(R1) (Config) # router bgp 100
(R1) (Config-router)# bgp listen limit 10
(R1) (Config-router)# bgp listen range 10.12.0.0/16
(R1) (Config-router)# bgp listen range 10.27.0.0/16 inherit peer ABC
Parameter Description
number The maximum length of an AS Path that BGP will accept from any of its neighbors. The length is the number of
autonomous systems listed in the path. The limit may be set to any value from 1 to 100.
The BGP router ID must be a valid IPv4 unicast address, but is not required to be an address assigned to the router. The
router ID is specified in the dotted notation of an IP address. Setting the router ID to 0.0.0.0 disables BGP. Changing the
router ID disables and reenables BGP, causing all adjacencies to be reestablished.
Default 0.0.0.0
Format bgp router-id router-id
Mode BGP Router Config
Parameter Description
router-id An IPv4 address for BGP to use as its router ID.
Default BGP does not originate a default route. The always option is disabled by default.
Format default-information originate [always]
Mode IPv4 Address Family Config
IPv6 Address Family Config
Parameter Description
always (Optional) This optional keyword allows BGP to originate a default route, even if the common routing table has
no default route.
11.1.21 default-metric
Use this command to set the value of the Multi Exit Discriminator (MED) attribute on redistributed routes (either BGP, IPv4
VRF, or IPv6 routes, depending on the mode) when no metric has been specified in the redistribute command.
Parameter Description
value The value to set as the MED. The range is 1 to 4,294,967,295.
11.1.21.0.1 no default-metric
Use this command to delete the default for the metric of redistributed routes.
Format no default-metric
Mode IPv4 Address Family Config
IPv6 Address Family Config
Origination of the default route is not subject to a prefix filter configured with the command distribute-list prefix out.
A route map may be configured to set attributes on the default route sent to the neighbor. If the route map includes a match
ip-address term, that term is ignored. If the route map includes match community or match as-path terms, the default
route is not advertised. If there is no route map with the route map name given, the default route is not advertised.
Issue this command in Peer Template Configuration Mode to add it to a peer template.
Parameter Description
ip-address The neighbor’s IP address.
map-name (Optional) A route map may be configured to set attributes on the default route advertised to the neighbor.
11.1.23 distance
Use this command to set the preference (also known as administrative distance) of BGP routes to specific destinations. You
may enter up to 128 instances of this command. Two instances of this command may not have the same prefix and wildcard
mask. If a distance command is configured that matches an existing distance command’s prefix and wildcard mask, the new
command replaces the existing command. There can be overlap between the prefix and mask configured for different
commands. When there is overlap, the command whose prefix and wildcard mask are the longest match for a neighbor’s
address is applied to routes from that neighbor.
An ECMP route’s distance is determined by applying distance commands to the neighbor that provided the best path.
The distance command is not applied to existing routes. To apply configuration changes to the distance command itself or
the prefix list to which a distance command applies, you must force a hard reset of affected neighbors.
Default BGP assigns preference values according to the distance bgp command, unless overridden for specific
neighbors or prefixes by this command.
Format distance distance [prefix wildcard-mask [prefix-list]]
Mode BGP Router Config
Parameter Description
distance The preference value for matching routes. The range is 1 to 255.
prefix wildcard-mask (Optional) Routes learned from BGP peers whose address falls within this prefix are assigned the configured
distance value. The wildcard-mask is an inverted network mask whose 1 bits indicate the don’t care portion of the
prefix.
prefix-list (Optional) A prefix list can optionally be specified to limit the distance value to a specific set of destination prefixes
learned from matching neighbors.
Example 1: To set the preference value of the BGP route to 100.0.0.0/8 from neighbor 10.1.1.1, use the following distance
command.
(Routing) (Config)# ip prefix-list pfx-list1 permit 100.0.0.0/8
(Routing) (Config)# router bgp 1
(Routing) (Config-router)# distance 25 10.1.1.1 0.0.0.0 pfx-list1
Example 2: To set the preference value to 12 for all BGP routes from neighbor 10.1.1.1, use the following distance
command.
(Routing) (Config-router)# distance 12 10.1.1.1 0.0.0.0
Example 3: To set the preference value of all routes within 100.0.0.0/8 from any neighbor, use the following distance
command.
(Routing) (Config)# ip prefix-list pfx-list2 permit 100.0.0.0/8 ge 8
(Routing) (Config)# router bgp 1
(Routing) (Config-router)#distance 25 0.0.0.0 255.255.255.255 pfx-list2
11.1.23.0.1 no distance
Use this command to set the preference of BGP routes to the default.
The change to the default BGP distances does not affect existing routes. To apply a distance change to existing routes, you
must force the routes to be deleted from the RIB and relearned, either by resetting the peers from which the routes are
learned or by disabling and reenabling BGP.
Default external: 20
internal: 200
local: 200
Format distance bgp external-distance internal-distance local-distance
Mode IPv4 Address Family Config
IPv6 Address Family Config
Parameter Description
external-distance The preference value for routes learned from external peers. The range is 1 to 255.
internal-distance The preference value for routes learned from internal peers. The range is 1 to 255.
local-distance The preference value for locally-originated routes. The range is 1 to 255.
Parameter Description
list-name A prefix list used to filter routes received from all peers based on destination prefix.
If the command refers to a prefix list that does not exist, the command is accepted and all routes are permitted.
When a distribute list is added, changed, or deleted for route redistribution, BGP automatically reconsiders all best routes.
Parameter Description
prefix list-name A prefix list used to filter routes advertised to neighbors.
protocol|connected|st (Optional) When a route source is specified, the distribute list applies to routes redistributed from that source.
atic Only routes that pass the distribute list are redistributed. The protocol value may be either rip or ospf.
When BGP is administratively disabled, BGP sends a Notification message to each peer with a Cease error code.
Format enable
Mode BGP Router Config
Format no enable
Mode BGP Router Config
Default disabled
Format bgp graceful-restart [restart-time restart-time | stalepath-time stalepath-time]
Mode BGP Router Config
Parameter Description
restart-time The maximum time in seconds, before which the graceful restart is supposed to be complete by the restarting
router. The allowed range is 1 to 3600 seconds. The default value is 120 seconds.
stalepath-time The maximum time that the helper router keeps the stale routes from the restarting BGP peer. The allowed range
is 1 to 3600 seconds. The default value is 300 seconds
This command overrides for a specific routing interface the fast external failover behavior configured globally. If permit is
specified, the feature is enabled on the interface, regardless of the global configuration. If deny is specified, the feature is
disabled on the interface, regardless of the global configuration.
Default Fast external failover is enabled globally by default. There is no interface configuration by default.
Format ip bgp fast-external-failover {permit | deny}
Mode Interface Config
Parameter Description
permit This keyword enables fast external failover on the interface, regardless of the global configuration of the feature.
deny This keyword disables fast external failover on the interface, regardless of the global configuration of the feature.
11.1.31 ip extcommunity-list
Use this command to import or export filtering in BGP using route maps with the filtering criteria of extcommunity. This
creates a filtering list that can be used in a route-map.
Parameter Description
list-num The extended community list number in the range of 1 to 99.
ASN:nn or IP-address:nn VPN extended community for route target or site-of-origin.
11.1.32 maximum-paths
Use this command to specify the maximum number of next hops BGP may include in an Equal Cost Multipath (ECMP) route
derived from paths received from neighbors outside the local autonomous system.
Paths are considered for ECMP when their attributes are the same (local preference, AS path, origin, MED, peer type and
IGP distance). When BGP uses multiple paths in an ECMP route, BGP still selects one path as the best path and advertises
only that path to its peers.
Parameter Description
number-of-paths The maximum number of next hops in a BGP route. The range is from 1 to 32 unless the platform or SDM
template further restricts the range.
11.1.32.0.1 no maximum-paths
This command resets back to the default the number of next hops BGP may include in an ECMP route.
Format no maximum-paths
Mode IPv4 Address Family Config
IPv6 Address Family Config
Paths are considered for ECMP when their attributes are the same (local preference, AS path, origin, MED, peer type, and
IGP distance). When BGP uses multiple paths in an ECMP route, BGP still selects one path as the best path and advertises
only that path to its peers.
Parameter Description
number-of-paths The maximum number of next hops in a BGP router. The range is from 1 to 32 unless the platform or SDM
template further restricts the range.
To enable exchange of IPv6 routes with a neighbor, use the neighbor activate command in IPv6 Address Family
Configuration mode. The neighbor address must be the same IP address used in the neighbor remote-as command to create
the peer. When IPv6 is enabled or disabled for a neighbor, the adjacency is brought down and restarted to communicate to
the change to the peer. You should completely configure IPv6 policy for the peer before activating the peer.
Using this command under the address-family vpnv4 unicast mode enables the local BGP router to send VPNv4
prefixes to its BGP peer across the backbone. Each address carried in an NLRI is prefixed with an 8-byte Route distinguisher
value.
Using this command under the address-family l2vpn mode enables the local BGP router to send L2VPN prefixes to
its BGP peer across the backbone. Each address carried in an NLRI is prefixed with an 8-byte Route distinguisher value.
When IPv4 VPNv4, VPNv6, or L2VPN is enabled for a neighbor, the adjacency is brought down and restarted to
communicate the change to the peer. It is recommended that the user completely configures all the required IPv4 routing
policies for the peer before activating the peer.
When L2VPN is disabled for a neighbor, the configured commands for L2VPN address family will be cleared and set the
default configuration in L2VPN EVPN address family.
Default IPv4 VPNv4/L2VPN prefixes are not sent to the neighbor. Exchange of IPv6 routes is disabled by default.
Format neighbor {ipv4-address | ipv6-address [interface interface-name] | autodetect
interface interface-name} activate
Mode All Address Family configuration modes
Parameter Description
ipv4-address The IPv4 address of a peer.
ipv6-address The IPv6 address of a peer.
interface If the neighbor’s IPv6 address is a link local address, the local interface must also be specified.
autodetect interface The routing interface on which the neighbor’s link local IPv6 address is auto detected.
Example: The following example enables the exchange of VPNv4 and L2VPN prefixes with the external peer at 1.1.1.1.
(R1) (Config)# router bgp 1
(R1) (Config-router)# neighbor 1.1.1.1 remote-as 2
(R1) (Config-router)# address-family vpnv4 unicast
(R1) (Config-router-af-vpnv4)# neighbor 1.1.1.1 activate
(R1) (Config-router-af-vpnv4)# exit
(R1) (Config-router)# address-family l2vpn evpn
(R1) (config-router-af-l2vpn-evpn)# neighbor 1.1.1.1 activate
Example: The following example enables the exchange of IPv6 routes with the external peer at 172.20.1.2 and sets the
next hop for IPv6 routes sent to that peer.
(R1) (Config)# router bgp 1
(R1) (Config-router)# neighbor 172.20.1.2 remote-as 2
(R1) (Config-router)# address-family ipv6
(R1) (Config-router-af)# neighbor 172.20.1.2 activate
(R1) (Config-router-af)# neighbor 172.20.1.2 route-map SET-V6-NH out
(R1) (Config-router-af)# exit
(R1) (Config-router)# exit
(R1) (Config)# route-map SET-V6-NH permit 10
(R1) (route-map)# set ipv6 next-hop 2001:1:200::1
EFOS BGP enforces the advertisement interval by limiting how often phase 3 of the decision process can run for each
update group. The interval applies to withdrawals as well as active advertisements.
Parameter Description
ipv4-address|ipv6-address The neighbor’s IP address.
seconds The minimum time between route advertisement, in seconds. The range is 0 to 600 seconds.
Default disabled
Format neighbor {ipv4-address | ipv6-address [interface interface-name] | autodetect interface
interface-name} allowas-in
Parameter Description
ipv4-address The neighbor’s IPv4 address.
ipv6-address [interface interface-name] The neighbor’s IPv6 address. If the neighbor’s IPv6 address is a link local address, the local
interface must also be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto detected.
allowas-in count The maximum no of occurrences of the local ASN allowed in the AS_PATH attribute
received in the prefix updates. The allowed range is 1 to 10.
Example:
(R1) (Config)# router bgp 65000
(R1) (Config-router)# neighbor 172.20.1.2 remote-as 65001
(R1) (Config-router)# neighbor 172.20.1.2 allowas-in 1
(R1) (Config-router)# neighbor 2001::2 remote-as 65003
(R1) (Config-router)# neighbor 2001::2 allowas-in 3
Issue this command in Peer Template Configuration Mode to add it to a peer template.
Parameter Description
ip-address The neighbor’s IP address.
ipv6-address [interface interface- The neighbor’s IPv6 address. If the neighbor’s IPv6 address is a link local address, the local
name] interface must also be specified.
Parameter Description
autodetect interface interface-name The routing interface on which the neighbor’s link local iPv6 address is auto-detected.
retry-time The number of seconds to wait before attempting to establish a TCP connection with a neighbor
after a previous attempt failed.
Parameter Description
ip-address The neighbor’s IP address.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
text Text description of neighbor. Up to 80 characters are allowed.
This command is relevant only for external BGP neighbors. For internal BGP neighbors, the TTL value remains 64 and can’t
be modified. A neighbor can inherit this configuration from a peer template. To make the update-source config work for
external BGP neighbors, ebgp-multihop hop-count should be configured to increase the TTL value instead of the
default TTL of 1.
Issue this command in Peer Template Configuration mode to add it to a peer template.
Parameter Description
ip-address The neighbor’s IPv4 address.
ipv6-address [interface interface-name] The neighbor’s IPv6 address. If the neighbor’s IPv6 address is a link local address, the local
interface must also be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
ebgp-multihop hop-count The maximum hop-count allowed to reach the neighbor. The allowed range is 1 to 255.
Example:
(R1) (Config)# router bgp 65000
(R1) (Config-router)# neighbor 172.20.1.2 remote-as 65001
(R1) (Config-router)# neighbor 172.20.1.2 ebgp-multihop 3
(R1) (Config-router)# neighbor 2001::2 remote-as 65003
(R1) (Config-router)# neighbor 2001::2 ebgp-multihop 4
If you assign a neighbor filter list to a non-existent AS path access list, all routes are filtered.
Parameter Description
ip-address The neighbor’s IP address.
as-path-list-number Identifies an AS path list.
in The AS Path list is applied to advertisements received from the neighbor.
out The AS Path list is applied to advertisements to be sent to the neighbor.
Parameter Description
ip-address The IP address of a neighbor whose configuration parameters are inherited from the peer
template.
ipv6-address [interface interface-name] The neighbor’s IPv6 address. if the neighbor’s IPv6 address is a link local address, the local
interface must be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
template-name The name of the peer template whose peer configuration parameters are to be inherited by
this neighbor.
Parameter Description
ip-address The neighbor’s IPv4 address.
ipv6-address [interface interface- The neighbor’s IPv6 address. If the neighbor’s IPv6 address is a link local address, the local
name] interface must also be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
local-as as-number The AS number to advertise as the local AS in the AS PATH sent to the neighbor.
no-prepend Does not prepend the local-AS in the AS PATH received in the updates from this neighbor.
replace-as Replaces the router’s own AS with the local-AS in the AS PATH sent to the neighbor.
Example:
(R1) (Config)# router bgp 65000
(R1) (Config-router)# neighbor 172.20.1.2 remote-as 65001
(R1) (Config-router)# neighbor 172.20.1.2 local-as 65002 no-prepend replace-as
(R1) (Config-router)# neighbor 2001::2 remote-as 65003
(R1) (Config-router)# neighbor 2001::2 local-as 65002 no-prepend replace-as
Default By default the prefix limit is set to the maximum number of routes that can be installed in the forwarding table. The
default warning threshold is 75%. A neighbor that exceeds the limit is shutdown unless the warning-only option is
configured.
Format neighbor {ipv4-address | ipv6-address} maximum-prefix {maximum | unlimited} [threshold]
[warning-only]
Mode IPv4 Address Family Config
IPv6 Address Family Config
Parameter Description
ipv4-address | ipv6-address The neighbor’s IPv4 or IPv6 address.
maximum The maximum number of prefixes BGP will accept from this neighbor. Range is 0 to the maximum
number of routes the router supports.
unlimited Do not enforce any prefix limit.
threshold (Optional) When the number of prefixes received from the neighbor exceeds this percentage of the
maximum, BGP writes a log message. The range is 1 to 100 percent. The default is 75%.
warning-only (Optional) If BGP receives more than the maximum number of prefixes, BGP accepts the excess
prefixes and writes a log message rather than shutting down the adjacency.
When the next hop attribute in routes from external peers is retained, internal peers must have a route to the external peer’s
IP address. This is commonly done by configuring the IGP on the border router to advertise the external (or DMZ) subnet.
The next-hop-self option eliminates the need to advertise the external subnet in the IGP.
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address.
MD5 must either be enabled or disabled on both peers. The same password must be configured on both peers. After a TCP
connection is established, if the password on one end is changed, then the password on the other end must be changed to
match before the holdtime expires. With default holdtimes, both passwords must be changed within 120 seconds to
guarantee the connection is not dropped.
Issue this command in Peer Template Configuration Mode to add it to a peer template.
Parameter Description
ipv4-address|ipv6 address The neighbor’s IPv4 or IPv6 address.
ipv6-address [interface interface-name] The neighbor’s IPv6 address. if the neighbor’s IPv6 address is a link local address, the
local interface must also be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
string Case-sensitive password from 1 to 25 characters in length.
Only one prefix list may be defined for each neighbor in each direction. If you assign a prefix list that does not exist, all
prefixes are permitted.
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address.
prefix-list-name The name of an IP prefix list.
in Apply the prefix list to advertisements received from this neighbor.
out Apply the prefix list to advertisements to be sent to this neighbor.
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address.
ipv6-address [interface interface-name] The neighbor’s IPv6 address. if the neighbor’s IPv6 address is a link local address, the
local interface must also be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
Parameter Description
remote-as as-number The autonomous system number of the neighbor’s AS. The range is 1 to 429,496,729.
If the neighbor’s AS number is the same as the local router, the peer is an internal peer.
Otherwise, the peer is an external peer. A neighbor can inherit this configuration from a
peer template.
This command can only be applied to external peers. Private AS numbers are removed or replaced whether or not the
original AS path includes any non-private AS numbers. The AS path advertised to the external peer always includes at least
one instance of the local AS number; therefore, removing private AS numbers never results in advertisement of an empty
AS_PATH attribute. AS numbers from 64512 to 65535 inclusive are considered private. Although 65535 is a reserved ASN
and not technically part of the private range, it is treated as a private ASN when removing or replacing private ASNs.
Parameter Description
ip-address The neighbor’s IPv4 address.
all replace-as To retain the original AS path length, replace each private AS number with the local AS number. This is optional.
Default RFC 5549 support is enabled by default for all neighbors if IPv6 package is available in the build.
Format neighbor { ipv6-address | autodetect interface interface-name } rfc5549-support
Mode BGP Router Config
Parameter Description
ipv6-address The neighbor’s IPv6 address
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto detected.
Example:
(R1) # configure
(R1) (Config) # router bgp 100
(R1) (Config-router) # neighbor 2001::2 rfc5549-support
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address.
map-name The name of the route map to be applied.
in|out Whether the route map is applied to incoming or outgoing routes.
Normally, a router does not readvertise BGP routes received from an internal peer to other internal peers. If you configure
a peer as a route reflector client, this router readvertises such routes. A router is a route reflector if it has one or more route
reflector clients. Configuring the first route reflector client automatically makes the router a route reflector.
If you configure multiple route reflectors within a cluster, you must configure each route reflector in the cluster with the same
cluster ID. Use the bgp cluster-id command to configure a cluster ID.
When reflecting a route, BGP ignores the set statements in an outbound route map to avoid causing the receiver to compute
routes that are inconsistent with other routers in the AS.
Parameter Description
ip-address The neighbor’s IPv4 address.
Using this command under the address-family vpnv4 unicast mode enables the local BGP router to send extended
communities attribute to its BGP peer across the backbone.
The neighbor address must be the same IP address used in the Section 11.1.47, neighbor remote-as command to create
the peer.
Parameter Description
ip-address The neighbor’s IPv4 address.
[extended | both] One of the following:
Extended enables the router to send only extended community attributes.
Both enables the router to send both standard and extended community attributes.
Example: The following example enables sending of the extended communities attribute to external peer at 1.1.1.1.
(Config)# router bgp 1
(Config-router)# neighbor 1.1.1.1 remote-as 2
(Config-router)# address-family vpnv4 unicast(R1) (Config-router-af-vpnv4)# neighbor 1.1.1.1 send-
community extended
(Config-router-af-vpnv4)# neighbor 1.1.1.1 activate
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address.
When a neighbor is shut down, BGP first sends a NOTIFICATION message with a Cease error code. When an adjacency
is administratively shut down, the adjacency stays down until administratively reenabled (using the following no neighbor
shutdown command).
Issue this command in Peer Template Configuration Mode to add it to a peer template.
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address on the link that connects the two peers. If the neighbor’s
IPv6 address is a link local address, the local interface must also be specified.
autodetect interface interface-name The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
Issue this command in Peer Template Configuration Mode to add it to a peer template.
Default The keepalive and holdtimers default to the globally configured values set with the Section 11.1.60, redistribute
command.
Format neighbor {ipv4-address | ipv6-address [interface interface-name]| autodetect interface
interface-name } timers keepalive holdtime
Mode BGP Router Config
Peer Template Config
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address. This is the IP address on the link that connects the two peers. If
the neighbor’s IPv6 address is a link local address, the local interface must also be specified.
autodetect interface interface- The routing interface on which the neighbor’s link local IPv6 address is auto-detected.
name
keepalive The time, in seconds, between BGP KEEPALIVE packets sent to a neighbor. The range is 0 to 65,535
seconds. Jitter is applied to the keepalive interval.
holdtime The time, in seconds, that BGP continues to consider a neighbor to be alive without receiving a BGP
KEEPALIVE or UPDATE packet from the neighbor. If no KEEPALIVE is received from a neighbor for
longer than the holdtime, BGP drops the adjacency. If the holdtime is set to 0, then BGP does not enforce
a holdtime and BGP does not send periodic KEEPALIVE messages. The range is 0 to 65,535 seconds.
The IP address used as the source address in IP packets sent to a neighbor must be the same address used to configure
the local system as a neighbor of the neighbor router. In other words, if the update source is configured, it must be the same
IP address used in the neighbor remote-as command on the peer.
It is common to use an IP address on a loopback interface because a loopback interface is always reachable, as long as
any routing interface is up. The peering session can stay up as long as the loopback interface remains reachable. If you use
an IP address on a routing interface, then the peering session will go down if that routing interface goes down.
Issue this command in Peer Template Configuration Mode to add it to a peer template.
Default When no update source is configured, TCP connections use the primary IPv4 address on the outgoing interface to the
neighbor.
Format neighbor {ipv4-address | ipv6-address [interface interface-name]| autodetect interface
interface-name } update-source interface
Mode BGP Router Config
Peer Template Config
Parameter Description
ipv4-address|ipv6-address The neighbor’s IPv4 or IPv6 address. This is the IP address on the link that connects the two peers. If the
neighbor’s IPv6 address is a link local address, the local interface must also be specified.
Parameter Description
auto-detect interface The neighbor’s IPv6 link local address that will be auto detected on the specified interface.
interface-name
update-source interface The primary IPv4 address on this interface is used as the source IP address for the TCP connection with
the neighbor.
11.1.57 network
This command configures BGP to advertise an address prefix.The prefix is only advertised if the common routing table
includes a non-BGP route with the same prefix. The route may be a connected route, a static route, or a dynamic route from
another routing protocol.
BGP accepts up to 64 networks per address family. The network command may specify a default route (network 0.0.0.0
mask 0.0.0.0).
If a route map is configured to set attributes on the advertised routes, match as-path and match community terms in
the route map are ignored. A match ip-address prefix-list term is honored in this context. If your route map includes
such a match term, the network is only advertised if the prefix list permits the network prefix. If there is no route map with
the name given, the network is not advertised.
Parameter Description
prefix An IPv4 address prefix in dotted notation.
network-mask The network mask for the prefix in dotted quad notation (for example, 255.255.0.0).
rm-name (Optional) A route map can be used to set path attributes on the route.
11.1.57.0.1 no network
This command disables BGP from advertising an address prefix.
Default Inactive
Format nv overlay evpn
Mode Global Config
11.1.59 rd
Use this command to specify the route distinguisher (RD) for a VRF instance that is used to create a VPNv4 prefix.
An RD creates routing and forwarding tables and specifies the default route distinguisher for a VPN. The RD is added to the
beginning of the IPv4 prefixes to change them into globally unique VPNv4 prefixes.
An RD is either:
2-byte ASN-related: Composed of an autonomous system number and an arbitrary number.
IP address-related: Composed of an IP address and an arbitrary number.
4-byte ASN related: Composed of an 4-byte autonomous system number and an arbitrary number.
Parameter Description
route-distinguisher An 8-byte value to be added to an IPv4 prefix to create a VPNv4 prefix. The RD value can be specified in either
of the following formats.
16-bit AS number: your 32-bit value (Ex : 100 :11)
32-bit IPv4 address: your 16-bit value (Ex : 10.1.1.1 :22)
4-byte AS number: your 32-bit value (Ex : 66666 :33)
NOTE: This command is effective only if BGP is running on the router. The RD for a VRF once configured cannot be
removed or changed. For this reason, this command does not have the no form. To change the configured RD
value, remove the VRF (using the no ip vrf command) and reconfigure the VRF.
Example: The following example shows how to configure a RD for a VRF instance in ASN format.
(Router) (Config)#ip vrf Red
(Router) (Config-vrf-Red)#rd 62001:10
(Router) (Config-vrf-Red)#exit
Example: The following example shows how to configure a RD for a VRF instance in IP address format.
(Router) (Config)#ip vrf Red
(Router) (Config-vrf-Red)#rd 192.168.10.1:10
(Router) (Config-vrf-Red)#exit
Example: The following example shows how to configure a RD for a VRF instance in 4-byte ASN format.
11.1.60 redistribute
This command configures BGP to advertise routes learned by means outside of BGP. BGP can redistribute local
(connected), static, and OSPF routes.
The distribute-list out command can also be used to filter redistributed routes by prefix. Either a redistribute route map or a
distribute list may be configured, but not both.
A default route cannot be redistributed unless the default-information originate command is given.
If a route map is configured, match as-path and match community terms are ignored. If no route map is configured
with the name given, no prefixes are redistributed.
Default BGP redistributes no routes by default. When BGP redistributes OSPF routes, it redistributes only internal routes
unless the match option specifies external routes.
Format redistribute {ospf |connected | static} [metric metric-value]
[match {internal | external 1 | external 2 | nssa-external 1 | nssa-external 2}] [route-
map map-tag]
Mode IPv4 Address Family Config
IPv6 Address Family Config
Parameter Description
ospf, connected, static A source of routes to redistribute.
metric metric-value (Optional) When this option is specified, BGP advertises the prefix with the Multi Exit Discriminator path
attribute set to the configured value. If this option is not specified, but a default metric is configured for
BGP, the MED is set to the default metric. If a default metric is not configured, the prefix is advertised
without a MED attribute.
match (Optional) If you configure BGP to redistribute OSPF routes, BGP by default only redistributes internal
routes (OSPF intra-area and inter-area routes). Use the match option to configure BGP to also
redistribute specific types of external routes, or to disable redistribution of internal OSPF routes.
route-map map-tag (Optional) A route map can be used to filter redistributed routes by destination prefix using a prefix list. A
route map can be used to set attributes on redistributed routes.
Example: The routes obtained from the kernel can be configured to redistributed in the kernel. The following CLI
commands (in both IPv4 and Pv6) BGP Router mode use the kernel option.
(7001) (Config-router)#redistribute ?
(7001) (Config-router)#redistribute
(7001) (config-router-af)#redistribute ?
11.1.60.0.1 no redistribute
This command removes the configuration for the redistribution for BGP protocol from the specified source protocol/routers.
The command no redistribute ospf match external 1 will withdraw only OSPF external type 1 routes, OSPF
inter routes will still be redistributing.
11.1.61 route-target
Use this command to create a list of export, import, or both route target (RT) extended communities for the specified VRF
instance. Enter the route-target command one time for each target extended community. Routes that are learned and carry
a specific route-target extended community are imported into all VRFs configured with that extended community as an import
route target.
The configured export RT is carried as an extended community in the MP-BGP format to the eBGP peer. An RT is one of
the following:
2-byte ASN-related: Composed of an autonomous system number and an arbitrary number.
4-byte ASN related: Composed of an 4-byte autonomous system number and an arbitrary number.
Parameter Description
export Exports routing information to the target VPN extended community.
import Imports routing information from the target VPN extended community.
both Exports/imports the routing information to/from the target VPN extended community.
Parameter Description
rt-ext-comm The route-target extended community attributes to be added to the list of import, export or both (import and
export) route-target extended communities.
The route target specifies a target VPN extended community. Like a route distinguisher, the route-target extended
community can be specified in one of the following formats.
16-bit AS number: your 32-bit value (Ex : 100 :11)
32-bit IPv4 address: your 16-bit value (Ex : 10.1.1.1 :22)
4-byte AS number: your 32-bit value (Ex: 66666 :33)
11.1.61.0.1 no route-target
This command removes the route target specified for a VRF instance.
Default disabled
Format retain route-target all
Mode L2VPN Address-Family Config Mode
Example: Enabling the configuration to retain the route-targets on received EVPN routes from neighbors.
(Router) (Config)# router bgp 10
(Router) (Config-router)# address-family l2vpn evpn
(Router) (Config-router-af-evpn)# retain route-target all
(Router) (Config-router-af-evpn)# exit
NOTE: EFOS does not support a remote-as as-number command in Peer Template Configuration mode. The
neighbor’s AS number must be specified when the neighbor is created.
Parameter Description
name The name of the template. The name may be no more than 32 characters.
Parameter Description
name The name of the template. The name may be no more than 32 characters.
11.1.64 update-source
Use this command in Peer Template Configuration mode to configure a peer template to use a specific IP address as the
source address for the TCP connection with a neighbor. This IP address must be the IP address configured on the peer as
its neighbor address for this router.
Default When no update source is configured, TCP connections use the primary IPv4 address on the outgoing
interface to the neighbor.
Format update-source {slot/port | vlan id}
Mode Peer Template Config
Parameter Description
update-source interface The primary IPv4 address on this interface is used as the source IP address for the TCP connection with
the neighbor.
11.1.64.0.1 no update-source
This command configures the peer template to use the primary IPv4 address on the outgoing interface to the neighbor for
the TCP connection.
Format no update-source
Mode Peer Template Config
When BGP establishes an adjacency, the neighbors agree to use the minimum holdtime configured on either neighbor. BGP
sends KEEPALIVE messages at either 1/3 of the negotiated holdtime or the configured keepalive interval, whichever is more
frequent.
The new values are not applied to adjacencies already in the ESTABLISHED state. A new keepalive or holdtime is applied
the next time an adjacency is formed.
Default The default keepalive time is 30 seconds. The default holdtime is 90 seconds.
Format timers bgp keepalive holdtime
Mode BGP Router Config
Parameter Description
keepalive The time, in seconds, between BGP KEEPALIVE packets sent to a neighbor. The range is 0 to 65,535 seconds.
Jitter is applied to the keepalive time.
holdtime The time, in seconds, that BGP continues to consider a neighbor to be alive without receiving a BGP KEEPALIVE
or UPDATE packet from the neighbor. If no KEEPALIVE is received from a neighbor for longer than the holdtime,
BGP drops the adjacency. If the holdtime is set to 0, then BGP does not enforce a holdtime and BGP does not
send periodic KEEPALIVE messages. The range is 0 to 65,535 seconds.
For any change in the outbound policies applicable to a neighbor, the withdraw packets are sent followed by the update
packets when they are applied after the delay timeout. In case of changes to other neighbor attributes like send-community,
remove-private-asn, and so on, the withdraw packets are not sent—instead, the new updates are sent after the delay
timeout.
Parameter Description
delay The time, in seconds, after which the global or per neighbor policies are applied. The range is 0 to 180 seconds.
When a change is made to an outbound policy, BGP schedules an outbound soft reset to update neighbors according to the
new policy. Use interface to specify if the changes apply to a specific port or to a VLAN.
Parameter Description
vrf-name The name of the VRF instance.
* Reset adjacency with every BGP peer
as-number Only reset adjacencies with BGP peers in the given autonomous system
ipv4-address Only reset the adjacency with a single specified peer with a given IPv4 peer address.
ipv6-address Only reset the adjacency with a single specified peer with a given IPv6 peer address. An adjacency that is formed
with the autodetect feature cannot be reset with the command.
interface Only reset the adjacency on a specified interface. The adjacency must be formed with IPv6 link-local or with the
auto detect feature
listen range Reset all adjacency that are included in the listen subnet range.
soft (Optional) By default, adjacencies are torn down and reestablished. If the soft keyword is given, BGP resends
all updates to the neighbors and reprocesses updates from the neighbors.
in | out (Optional) If the in keyword is given, then updates from the neighbor are reprocessed. If the out keyword is
given, then updates are resent to the neighbor. If neither keyword is given, then updates are reprocessed in both
directions.
Parameter Description
network/pfx-len (Optional) Display a specific route identified by its destination prefix
longer-prefixes (Optional) Used with the network/pfx-len option to show routes whose prefix length is equal to or longer
than pfx-len. This option may not be given if the shorter-prefixes option is given.
shorter-prefixes [length] (Optional) Used with the network/pfx-len option to show routes whose prefix length is shorter than pfx-len,
and, optionally, longer than a specified length. This option may not be given if the longer-prefixes
option is given.
filter-list as-path-list (Optional) Filter the output to the set of routes that match a given AS Path list. This option may not be given
if a network/pfx-len option is given, or when a prefix list is given.
pfx-list-name (Optional) Filter the output to the set of routes that match a given prefix list. This option may not be given
if a network/pfx-len option is given or when a filter list is given.
Parameter Description
BGP table version Each time phase 2 of the BGP decision process runs to select new BGP routes, this number is incremented
Status codes s – The route is aggregated into an aggregate address configured with the summary-only option
* – EFOS BGP never displays invalid routes; so this code is always displayed
> – Indicates that BGP has selected this path as the best path to the destination
i – If the route is learned from an internal peer
S – This path is STALE. This means either the sender of this path is gracefully restarting in case we are the
helper BGP peer (or) the End-of-RIB is yet to be received from the helper BGP peer after this router restarted
gracefully.
Network Destination prefix
Next Hop The route’s BGP NEXT HOP
Metric Multi Exit Discriminator
LocPrf The local preference
Path The AS path
NOTE: The value of the ORIGIN attribute follows immediately after the AS PATH.
The following examples show CLI display output for the command.
Example 1:
(Routing) # show ip bgp
Example 2: If one or more of the three well-known communities in RFC 1997 is attached to a path, show ip bgp lists them.
(Routing) # show ip bgp
If the command is given with network/pfx-len option and without any additional options, then the output format lists more
information about the individual prefix. The best path is always listed first, followed by any non-best paths. The output only
shows attributes that are included with each path.
Parameter Description
Prefix/Prefix Length The destination prefix and prefix length.
Generation ID The version of the BGP routing table when this route last changed.
Forwarding Whether this BGP route is used for forwarding.
Advertised To Update Groups The outbound update groups that this route is advertised to.
Local Preference The local preference, either as received from the peer or as set according to local policy.
AS Path The AS Path. This form of show ip bgp displays AS Paths as long as allowed by bgp maxas-limit.
Origin Value of the ORIGIN attribute.
Metric Value of the MED attribute, if included.
Type Whether the path is received from an internal or external peer.
IGP Cost The interior gateway cost (for example, OSPF cost) to the BGP NEXT HOP.
Peer (Peer ID) The IP address of the peer that sent this route, and its router ID.
BGP Next Hop The BGP NEXT HOP attribute.
Atomic Aggregate If the ATOMIC AGGEGATE attribute is attached to the path.
Aggregator The AS number and router ID of the speaker that aggregated the route.
Communities The BGP communities attached to the path.
Originator The value of the ORIGINATOR attribute, if the attribute is attached to the path.
Cluster list The value of the CLUSTER LIST attribute, if the attribute is attached to the path.
Example: The following shows example CLI display output for the command.
(R1) # show ip bgp 172.20.1.0/24
Best Path:
Local Preference........................... 100
AS Path.................................... 20 10
Origin..................................... IGP
Metric..................................... 10
Type....................................... External
IGP Cost................................... 30
Peer (Peer ID)............................. 100.10.1.1 (32.4.1.1)
BGP Next Hop............................... 100.10.1.1
Atomic Aggregate........................... Included
Aggregator (AS, Router ID)................. 300, 14.1.1.1
Communities................................ no-export
Non-best Paths:
Local Preference........................... 200
AS Path.................................... 18 50 27
Origin..................................... Incomplete
Type....................................... External
IGP Cost................................... 10
Peer (Peer ID)............................. 200.1.1.1 (18.24.1.3)
BGP Next Hop............................... 200.1.1.1
Parameter Description
Prefix/Len Destination prefix and prefix length
AS Set Indicates whether an empty AS path is advertised with the aggregate address (N) or an AS SET is advertised with
the set of AS numbers for the paths contributing to the aggregate (Y)
Summary Only Indicates whether the individual networks are suppressed (Y) or advertised (N).
Active Indicates whether the aggregate is currently being advertised.
Example: The following shows example CLI display output for the command.
(Routing) # show ip bgp aggregate-address
10.0.0.0/8 N Y Y
20.0.0.0/8 N Y N
Parameter Description
vrf-name (Optional) Displays routes belonging to communities within a VRF instance.
communities A string of zero or more community values, which may be in either format and may contain the well-known
community keywords no-advertise and no-export. The output displays routes that belong to every community
specified in the command.
exact-match (Optional) Only displays routes that are members of those and only those communities specified in the command.
Parameter Description
vrf-name (Optional) Displays routes belonging to communities within a VRF instance.
name A standard community list name.
exact-match (Optional) Display only routes that are an exact match for the set of communities in the matching community list
statement.
Parameter Description
list-name A standard extended community list name.
Parameter Description
Standard extended community-list The standard named extended community list.
permit Permits access for a matching condition. Once a permit value has been configured to match
a given set of extended communities, the extended community list defaults to an implicit deny
for all other values.
RT The route target extended community attribute.
deny Denies access for a matching condition.
Example:
(Routing) # show ip extcommunity-list 1
Standard extended community-list list1
permit RT:1:100 RT:2:100
deny RT:6:600
permit RT:5:200
permit SOO:9:900
Example:
(Routing) (Config-router)#show ip bgp listen range
Format show ip bgp [vrf vrf-name] neighbors ipv4-address [interface [interface-name] policy
Mode Privileged EXEC
Parameter Description
vrf-name (Optional) Display routes belonging to communities within a VRF instance.
ip-address (Optional) Specifies an IPv4 address of a neighbor to which to limit the output.
Parameter Description
Neighbor The peer address of a neighbor.
Parameter Description
Policy A neighbor-specific BGP policy.
Template If the policy is inherited from a peer template, this field lists the template name.
Example: The following shows example CLI display output for the command.
(Routing) #show ip bgp neighbors 172.20.101.100 policy
NOTE: Policy configuration is moved from this command to the show ip bgp neighbors policy command.
Parameter Description
vrf-name (Optional) Display routes belonging to communities within a VRF instance.
ip-address (Optional) The IP address of a neighbor. Used to limit the output to show a single neighbor.
Parameter Description
Description Text string assigned using the command neighbor description. This text string only appears if a
description is configured.
Remote Address The neighbor’s IP address
Remote AS The neighbor’s autonomous system number
BFD Enabled to Detect Fast Failover Specifies if BFD has been enabled for BGP neighbors.
Peer ID The neighbor’s BGP router ID
Peer Admin Status START or STOP
Peer Type If a neighbor was created with the BGP dynamic neighbors feature, Dynamic is shown.
Parameter Description
Listen Range If the neighbor was created with the BGP dynamic neighbors feature, the field shows the listen
range to which the neighbor belongs.
Listen Range The listen range.
Local Interface Address The IPv4 address used as the source IP address in packets sent to this neighbor.
Local Port TCP port number on the local end of the connection
Remote Port TCP port number on the remote end of the connection
Connection Retry Interval How long BGP waits between connection retries
Neighbor Capabilities Optional capabilities reported by the neighbor, recognized and accepted by this router. Codes
listed in the show output are as follows.
MP: Multiprotocol
RF: Route Refresh
AS4: 4-Byte ASN
This version of EFOS does not support any multiprotocol AFI/SAFI pairs other than IPv4 unicast.
The presence of this capability does not imply otherwise.
IPv4 Unicast Support Indicates whether IPv4 unicast routes can be exchanged with this peer. Both indicates that IPv4
is active locally and the neighbor indicated support for IPv4 unicast in its OPEN message. Sent
indicates that IPv4 unicast is active locally, but the neighbor did not include this AFI/SAFI pair in
its OPEN message.
IPv4 unicast is always enabled locally and cannot be disabled.
IPv6 Unicast Support Indicates whether IPv6 unicast routes can be exchanged with this peer. Both and Sent have
the same meaning as for IPv4. None indicates that neither the local router nor the peer has IPv6
enabled for this adjacency. Received indicates that the peer advertised the IPv6 unicast
capability, but it is not enabled locally. IPv6 unicast is enabled locally using the neighbor activate
command in address-family IPv6 configuration mode.
L2VPN EVPN Support Indicates whether EVPN routes can be exchanged with this peer. This capability is enabled
locally using the neighbor activate command in address-family l2vpn evpn configuration mode.
Graceful Restart Support Indicates whether the neighbor supports the Graceful Restart behavior.
Graceful Restart Helper Support Indicates whether the neighbor can help us to gracefully restart.
Update Source The configured value for the source IP address of packets sent to this peer. This field is only
included in the output if the update source is configured.
Configured Hold Time The time, in seconds, that this router proposes to this neighbor as the holdtime
Configured Keep Alive Time The configured KEEPALIVE interval for this neighbor.
Negotiated Hold Time The minimum of the configured holdtime and the holdtime in the OPEN message received from
this neighbor. If the local router does not receive a KEEPALIVE or UPDATE message from this
neighbor within this interval of time, the local router drops the adjacency. This field is only shown
if the adjacency state is OPEN CONFIRM or greater.
MD5 Password The TCP MD5 password, if one is configured, in plain text.
Keep Alive Time The number of seconds between KEEPALIVE messages sent to this neighbor. This field is only
shown if the adjacency state is OPEN CONFIRM or greater.
Last Error (Sent) The last error that occurred on the connection to this neighbor
Last SubError The suberror reported with the last error.
Established Transitions The number of times the adjacency has transitioned into the Established state
Established Time How long since the connection last transitioned to or from the Established state
Time Since Last Update How long since an UPDATE message has been received from this neighbor
IPv4 Outbound Update Group The outbound update group ID.
L2VPN Outbound Update Group The outbound update group ID.
IPv6 Outbound Update Group The outbound update group ID.
Message Table The number of BGP messages sent to and received from this neighbor
Parameter Description
Received UPDATE Queue Size Received UPDATE messages are queued for processing. This section shows the current length
of the neighbor’s UPDATE queue in bytes, the high water mark, the limit, and the number of
UPDATEs that have been dropped because the queue reached the limit.
The following fields are displayed for IPv4, L2VPN EVPN, and IPv6 (If active)
Prefixes Advertised A running count of the number of prefixes advertised to or received from this neighbor
Prefixes Withdrawn A running count of the number of prefixes included in the Withdrawn Routes portion of UPDATE
messages, to and from this neighbor
Prefixes Current The number of prefixes currently advertised to or received from this neighbor. For inbound
prefixes, this count only includes prefixes that passed inbound policy.
Prefixes Accepted The number of prefixes from this neighbor that are eligible to become active in the local RIB.
Received prefixes are ineligible if their BGP Next Hop is not resolvable or if the AS Path contains
a loop. A prefix is only considered accepted if it passes inbound policy.
Prefixes Rejected The number of prefixes currently received from this neighbor that fail inbound policy.
Max NLRI per Update The maximum number of prefixes included in a single UPDATE message, to and from this
neighbor
Min NLRI per Update The minimum number of prefixes included in a single UPDATE message, to and from this
neighbor
Example: The following shows example CLI display output for the command.
(Routing) # show ip bgp neighbors 172.20.1.100
Update Source..................................
Configured Hold Time .......................... 90 sec
Configured Keep Alive Time..................... 30 sec
Negotiated Hold Time .......................... 30 sec
Keep Alive Time ............................... 10 sec
Received UPDATE Queue Size: 0 bytes. High: 355. Limit 196096. Drops 0.
If the router receives an UPDATE message with an invalid path attribute, the router will in most cases send a NOTIFICATION
message and reset the adjacency. BGP maintains a per-neighbor counter for each type of path attribute error. This show
command lists each non-zero counter, just after the LastSubError. The counters that may be listed are as follows.
Parameter Description
Path with duplicate attribute The peer sent an UPDATE message containing the same path attribute more than once.
Path with well-known/optional conflict A received path attribute was flagged as both well-known and optional or neither well-
known nor optional.
Transitive flag not set on transitive attr A received path attribute is known to be transitive, but the transitive flag is not set.
Mandatory attribute non-transitive or partial A mandatory path attribute was received with either the transitive or partial flag set.
Parameter Description
Optional attribute non-transitive and partial An optional path attribute has the transitive flag clear and the partial flag set.
Path attribute too long A received path attribute was longer than the expected length.
Path attribute length error A received path attribute has a length value that exceeds the remaining length of the path
attributes field.
Invalid ORIGIN code A received UPDATE message included an invalid ORIGIN code.
Unexpected first ASN in AS path The AS Path attribute from an external peer did not include the peer’s AS number as the
first AS.
Invalid AS path segment type The AS Path includes a segment with an invalid segment type.
Invalid BGP NEXT HOP The BGP NEXT HOP is not a valid unicast address.
Bad BGP NEXT HOP The BGP NEXT HOP was either the receiver’s IP address or an IP address outside the
subnet to the peer.
Invalid AGGREGATOR attribute The AGGREGATOR attribute was invalid.
Unrecognized well-known path attribute An UPDATE message contained a path attribute with the Optional flag clear, but this
router does not recognize the attribute.
Missing mandatory path attribute An UPDATE message was received without a mandatory path attribute.
Missing LOCAL PREF attribute An UPDATE message was received from an internal peer without the LOCAL PREF
attribute.
Invalid prefix in UPDATE NLRI An UPDATE message received from this peer contained a syntactically incorrect prefix.
Example: In this example, BGP has received an UPDATE message from an external peer 172.20.101.100 with
something other than the peer’s ASN as the first ASN in the AS Path. The additional counter shows that this occurred
one time.
(Routing) #show ip bgp neighbors 172.20.101.100
Parameter Description
vrf-name (Optional) Display routes belonging to communities within a VRF instance.
ip-address The IP address of a neighbor.
Parameter Description
BGP table version Each time phase 2 of the BGP decision process runs to select new BGP routes, this number is incremented
Status codes p – The route has been updated in Adj-RIB-Out since the last UPDATE message was sent. Transmission of an
UPDATE message is pending.
Network Destination prefix
Next Hop The BGP NEXT HOP as advertised to the peer.
Local Pref The local preference. Local preference is never advertised to external peers.
Metric The value of the Multi Exit Discriminator, if the MED is advertised to the peer.
Path The AS path. The AS path does not include the local AS number, which is added to the beginning of the AS path
when a route is advertised to an external peer.
NOTE: The value of the ORIGIN attribute follows immediately after the AS Path.
Example: The following shows example CLI display output for the command.
(Routing) #show ip bgp neighbors 172.20.101.100 advertised-routes
NOTE: This output differs slightly from the output in show ip bgp. Suppressed routes and non-best routes are not
advertised, so these status codes are not relevant here. Advertised routes always have a single next hop, the BGP
NEXT HOP advertised to the peer. Local preference is never sent to external peers.
The output indicates whether BGP is configured to originate a default route to this peer (neighbor default-originate).
Parameter Description
vrf-name (Optional) Display the names of the communities within a VRF instance.
ip-address (Optional) Specifies an IPv4 address of a neighbor to which to limit the output.
Parameter Description
Neighbor The peer address of a neighbor.
Addr-Family The peer address family type.
Policy A neighbor-specific BGP policy.
Template If the policy is inherited from a peer template, this field lists the template name.
Example: The following shows example CLI display output for the command.
(router) #show ip bgp neighbors 192.168.10.2 policy
Parameter Description
vrf-name (Optional) Display the routes belonging to communities within a VRF instance.
ip-address (Optional) The IP address of a neighbor.
received-routes Display all routes received from this neighbor, regardless of if the routes passed inbound policy
routes Display only routes that passed inbound policy.
rejected-routes Display only routes rejected by inbound policy.
Parameter Description
Network Destination prefix
Next Hop The BGP NEXT HOP as advertised by the peer.
Metric The value of the Multi Exit Discriminator, if a MED is received from the peer.
Local Pref The local preference received from the peer.
Path The AS path as received from the peer
Origin The value of the Origin attribute as received from the peer
Example: The following shows example CLI display output for the command.
(Routing) #show ip bgp neighbors 172.20.101.100 received-routes
If a route reflector client is configured with an outbound route map, the output warns that set statements in the route map
are ignored when reflecting routes to this client.
Parameter Description
Cluster ID The cluster ID used by this router. The value configured with the bgp cluster-id command is displayed.
If no cluster ID is configured, the local router ID is shown and tagged as default.
Client-to-client Reflection Displays Enabled when this router reflects routes received from its clients to its other clients; otherwise
Disabled displays.
Clients A list of this router’s internal peers that have been configured as route reflector clients.
Non-client Internal Peers A list of this router’s internal peers that are not configured as route reflector clients. Routes from
non-client peers are reflected to clients and vice-versa.
Example: The following shows example CLI display output for the command.
(Routing) #show ip bgp route-reflection
Skipping set statements in outbound route map gandolf when reflecting to internal peer 172.20.1.2.
Parameter Description
Delta T How long since the decision process was run. hours:minutes:seconds if the elapsed time is less than 24 hours.
Otherwise, days:hours.
Phase Which phase of the decision process was run
Upd Grp Outbound update group ID. Only applies when phase 3 is run.
GenId Generation ID of BGP routing table when decision process was run. The generation ID is incremented each time phase
2 of the decision process is run and when there is a change to the status of aggregate addresses.
Reason The event that triggered the decision process to run
Peer Phase 1 of the decision process can be triggered for a specific peer when a peer’s inbound routing policy changes or
the peer is reset. When phase 1 is run for a single peer, the peer’s IP address is given.
Duration How long the decision process took, in milliseconds
Adds The number of routes added. For phase 1, this is the number of prefixes that pass inbound policy and are added to the
Accept-RIB-In. For phase 2, this is the number of routes added to the BGP routing table. For phase 3, this is the number
of prefixes added to the update group’s Adj-RIB-Out.
Mods The number of routes modified. Always 0 for phase 1.
Dels The number of routes deleted. Always 0 for phase 1.
Example: The following shows example CLI display output for the command.
(Routing) # show ip bgp statistics
Delta T Phase Upd Grp GenId Reason Peer Duration Adds Mods Dels
29:33:49 3 0 2041 Fwd status chng 34 750 0 500
29:33:40 2 2042 Accept-RIB-In- 59 750 0 500
29:33:28 2 2043 Accept-RIB-In- 10 0 0 250
29:23:40 2 2044 Accept-RIB-In- 32 0 0 1000
29:13:40 3 1 2044 Phase 2 done 48 500 2500 1750
29:02:40 1 2044 Adj-RIB-In+ 21 500 0 0
29:02:01 3 0 2044 Phase 2 done 41 750 0 1250
28:33:40 2 2045 Phase 1 done 32 500 0
28:15:00 1 2045 Adj-RIB-In+ 9 250 0 0
28:14:40 2 2046 Phase 1 done 16 250 0
Parameter Description
IPv4 Routing Whether IPv4 routing is globally enabled. BGP does not include the IPv4 unicast AFI/SAFI capability in
OPEN messages it sends unless routing is globally enabled.
BGP Admin Mode Whether BGP is globally enabled
BGP Router ID The configured router ID
Local AS Number The router’s AS number
Traps Whether BGP traps are enabled.
Maximum Paths The maximum number of next hops in an external BGP route.
Maximum Paths iBGP The maximum number of next hops in an internal BGP route.
Default Keep Alive Time The configured keepalive time used by all peers that have not been configured with a peer-specific
keepalive time.
Default Hold Time The configured holdtime used by all peers that have not been configured with a peer-specific holdtime.
Number of Network Entries The number of distinct prefixes in the local RIB
Number of AS Paths The number of AS paths in the local RIB
Default Metric The default value for the MED for redistributed routes.
Default Route Advertise Whether BGP is configured to advertise a default route. Corresponds to the default-information originate
command.
Redistributing Source A source of routes that BGP is configured to redistribute.
Metric The metric configured with the redistribute command.
Match Value For routes redistributed from OSPF, the types of OSPF routes being redistributed.
Distribute List The name of the prefix list used to filter redistributed routes, if one is configured with the distribute-list
prefix out command.
Route Map The name of the route map used to filter redistributed routes.
Dynamic Neighbors Shows the current number of created dynamic IPv4 BGP neighbors, high water mark and a limit of
dynamic IPv4 BGP neighbors that can be created.
Neighbor The IP address of a neighbor. A neighbor, that is created with BGP dynamic neighbors feature, will be
marked with “*”.
ASN The neighbor’s ASN
MsgRcvd The number of BGP messages received from this neighbor
MsgSent The number of BGP messages sent to this neighbor
State The adjacency state. One of IDLE, CONNECT, ACTIVE, OPEN SENT, OPEN CNFRM, EST
Up/Down Time How long the adjacency has been in the ESTABLISHED state, or, if the adjacency is down, how long it
has been down. In days:hours:minutes:seconds
Pfx Rcvd The number of prefixes received from the neighbor
Example: The following shows example CLI display output for the command.
(Routing) # show ip bgp summary
Admin Mode...............................Enable
BGP Router ID............................172.20.1.1
Local AS Number..........................200
Traps....................................Disable
Maximum Paths............................32
Maximum Paths iBGP.......................16
Default Keep Alive Time..................30 sec
Default Hold Time........................90 sec
Number of Network Entries................20
Number of AS Paths.......................5
Redistributing.................................
Source......................................... ospf
Metric......................................... Not Configured
Match Value.................................... 'internal'
Distribute List................................ Not configured
Parameter Description
vrf-name (Optional) The vrf argument lists the templates configured for a VRF instance.
template name (Optional) The name of a BGP peer template. Using this argument limits the output to a single template.
AF The address family to which the configuration command applies. This field is blank for session
parameters, which apply to all address families.
Configuration Configuration commands that are included in the template.
Example: The following shows example CLI display output for the command.
(router) #show ip bgp template
The first table lists the number of BGP messages of each type that this router has sent and received. Following the table is
a maximum send and receive UPDATE message rate. These rates report the busiest one-second interval.
The queue statistics table reports information for BGP work queues. Items placed on each of these work queues are as
follows.
Parameter Description
Events Includes most timer events and configuration changes.
Keepalive Tx Includes timer events to send a KEEPALIVE message to a peer.
Dec Proc Includes events that cause the decision process to be run.
Rx Data holds incoming BGP messages.
RTO Notifications Includes best route change and next hop resolution change notifications from the routing table.
MIB Queries Includes pending SNMP queries for BGP status
Example: The following shows example CLI display output for the command.
(router) #show ip bgp traffic
Time Since Counters Cleared: 55223 Seconds
BGP Message Statistics
Open Update Notification Keepalive Refresh Total
Recd: 6 11 0 7888 0 7905
Sent: 8 56 3 8465 0 8532
Parameter Description
group-index (Optional) If specified, this option restricts the output to a single update group.
ipv4-address | ipv6-address (Optional) If specified, this option restricts the output to the update group containing the peer with the
given IPv4 or IPv6 address.
Parameter Description
Update Group ID Unique identifier for outbound update group
Peer Type Whether peers in this update group are internal or external
Minimum Advertisement Interval The minimum time, in seconds, between sets of UPDATE messages sent to the group
Send Community If the BGP communities are included in route advertisements to members of the group.
Remove Private ASNs If BGP removes private ASNs from paths advertised to members of this update group.
Replace if BGP replaces private ASNs with the local ASN.
Remove if private ASNs are simply removed.
Otherwise No.
Route Reflector Client If peers in this update group are route reflector clients.
Neighbor AS Path Access List Out The AS path access list used to filter UPDATE messages sent to peers in the update group
Neighbor Prefix List Out Name of the prefix list used to filter prefixes advertised to the peers in the update group
Members Added The number of peers added to the group since the group was formed
Members Removed The number of peers removed from the group
Update Version The number of times phase 3 of the BGP decision process has run for this group to determine
which routes should be advertised to the group
Number of UPDATEs Sent The number of UPDATE messages that have been sent to this group. Incremented once for
each UPDATE regardless of the number of group members
Time Since Last UPDATE Time since an UPDATE message was last sent to the group. If no UPDATE has been sent to the
group, the status is “Never.”
Current Prefixes The number of prefixes currently advertised to the group
Current Paths The number of paths currently advertised to the group
Prefixes Advertised The total number of prefixes advertised to the group since the group was formed
Prefixes Withdrawn The total number of prefixes included in the Withdrawn Routes field of UPDATE messages sent
to the group since the group was formed
UPDATE Send Failures The number of UPDATE messages that failed to be delivered to all members of the group
Current Members The IPv4 address of all current members of the group
The update send history table show statistics on as many as the ten most recent executions of the update send process for
the update group. Items in the history table are as follows.
Parameter Description
Version The update version
Delta T The amount of time elapsed since the update send process executed. hours::minutes::seconds.
Duration How long the update send process took, in milliseconds
UPD Built The number of UPDATE messages built
UPD Sent The number of UPDATE messages successfully transmitted to group members. Normally a copy of each
UPDATE message built is sent to each group member.
Paths Sent The number of paths advertised
Pfxs Adv The number of prefixes advertised
Pfxs Wd The number of prefixes withdrawn
Example: The following shows an example of the command displaying information for all update groups.
(Routing) # show ip bgp update-group
Version Delta T Duration UPD Built UPD Sent Paths Sent Pfxs Adv Pfxs Wd
10 00:33:49 100 6 288 5 1250 750
11 00:33:49 0 4 192 3 750 250
12 00:33:49 0 2 96 1 250 1000
13 00:33:49 0 2 96 1 250 1018
14 00:33:49 0 1 48 0 0 482
15 00:33:49 100 8 384 7 1750 750
16 00:33:49 0 3 144 2 500 250
17 00:31:49 0 4 192 3 750 750
18 00:23:49 100 4 192 3 750 1000
19 00:03:49 100 6 288 5 1250 500
Members Added.............................. 3
Members Removed............................ 0
Update Version............................. 4
Number of UPDATEs Sent..................... 8
Time Since Last UPDATE..................... 3 hrs 13 min 22 sec
Current Prefixes........................... 84
Current Paths.............................. 2
Prefixes Advertised........................ 100
Prefixes Withdrawn......................... 16
UPDATE Send Failures....................... 0
Version Delta T Duration UPD Built UPD Sent Paths Sent Pfxs Adv Pfxs Wd
10 00:00:49 100 6 288 5 1250 750
Parameter Description
all Displays the complete VPNv4 database.
rd route-distinguisher Displays NLRI prefixes that match the named route distinguisher.
vrf vrf-name Displays NLRI prefixes associated with the named VRF instance.
ip-prefix/length IP address (in dotted decimal format) and the length of the mask (0 to 32). The slash (/) mark must be
included.
The command outputs the following information, depending on the selected parameters.
Parameter Description
BGP table version Each time phase 2 of the BGP decision process runs to select new BGP routes, this number is
incremented.
Status codes One of the following:
s: The route is aggregated into an aggregate address configured with the summary-only
option.
*: EFOS never displays invalid routes; so this code is always displayed (to maintain
consistency with the industry standard).
>: Indicates that BGP has selected this path as the best path to the destination.
i: The route is learned from an internal peer.
Parameter Description
Prefix/Prefix Length The destination prefix and prefix length.
Generation ID The version of the BGP routing table when this route last changed.
Forwarding if this BGP route is used for forwarding.
Advertised To Update Groups The outbound update groups to which this route is advertised.
Local Preference The local preference, either as received from the peer or as set according to local policy.
AS Path The AS Path. This form of the command displays AS Paths as long as allowed by bgp maxas-
limit.
Origin Value of the ORIGIN attribute.
Metric Value of the MED attribute, if included.
Type If the path is received from an internal or external peer.
IGP Cost The interior gateway cost (for example, OSPF cost) to the BGP NEXT HOP
Peer (Peer ID) The IP address of the peer that sent this route, and its router ID.
BGP Next Hop The BGP NEXT HOP attribute.
Atomic Aggregate If the ATOMIC AGGEGATE attribute is attached to the path.
Aggregator The AS number and router ID of the speaker that aggregated the route.
Communities The BGP communities attached to the path.
Originator If the ORIGINATOR attribute is attached to the path, the value of this attribute.
Cluster List If the CLUSTER_LIST attribute is attached to the path, the sequence of cluster IDs in the cluster
list.
Extended Community Route target value associated with the specified route.
Example: The following example shows all available VPNv4 information in a BGP routing table.
(Routing) # show ip bgp vpnv4 all
Example: .
(Routing) # show ip bgp vpnv4 vrf red
Example: The following example shows the attributes for network 172.20.1.0 that include multi-paths and best path (use
like any of the following formats).
(Routing) # show ip bgp vpnv4 vrf red 172.20.1.0 255.255.255.0
(Routing) # show ip bgp vpnv4 vrf red 172.20.1.0/24
Best Path:
Imported from.............................. 2:200:100.10.1.1
Local Preference........................... 100
AS Path.................................... 20 10
Origin..................................... IGP
Metric..................................... 10
Type....................................... External
IGP Cost................................... 30
Peer (Peer ID)............................. 100.10.1.1 (32.4.1.1)
BGP Next Hop............................... 100.10.1.1
Atomic Aggregate........................... Included
Aggregator (AS, Router ID)................. 300, 14.1.1.1
Communities................................ no-export
Extended Community......................... RT:1:100
RT:2:200
Originator................................ 10.1.1.1
Non-best Paths:
Local Preference........................... 200
AS Path.................................... 18 50 27
Origin..................................... Incomplete
Type....................................... External
IGP Cost................................... 10
Peer (Peer ID)............................. 200.1.1.1 (18.24.1.3)
BGP Next Hop............................... 200.1.1.1
Extended Community......................... RT:3:300
Parameter Description
Delta T How long since the decision process was run. hours:minutes:seconds if the elapsed time is less than 24
hours. Otherwise, days:hours.
Phase Which phase of the decision process was run.
Upd Grp Outbound update group ID. This only applies when phase 3 is run.
GenId Generation ID of the BGP routing table when the decision process was run. The generation ID is incremented
each time phase 2 of the decision process is run and when there is a change to the status of the aggregate
addresses.
Reason The event that triggered the decision process to run.
Peer Phase 1 of the decision process can be triggered for a specific peer when a peer’s inbound routing policy
changes or the peer is reset.
Duration How long the decision process took, in milliseconds.
Adds The number of routes added. For phase 1, this is the number of prefixes that pass inbound policy and are
added to the Accept-RIB-In. For phase 3, this is the number of prefixes added to the update group’s Adj-RIB-
Out.
Mods The number of routes modified. This value is always 0 for phase 1.
Dels The number of routes deleted. This value is always 0 for phase 1.
Delta T Phase Upd Grp GenId Reason Peer Duration Adds Mods Dels
00:30:39 3 0 0 clear ip bgp 0 0 0 0
00:30:39 3 0 0 clear ip bgp 0 0 0 0
00:30:39 3 0 0 clear ip bgp 0 0 0 0
00:30:38 1 0 Adj-RIB-In+ 0 1 0 0
00:30:36 3 0 0 Phase 2 done 1 1 0 0
00:30:05 3 0 0 Phase 2 done 1 0 0 0
00:00:56 3 0 0 Phase 2 done 0 0 0 1
00:00:23 3 0 0 Phase 2 done 0 2 0 0
Example:
(Routing) #show bgp l2vpn evpn summary
Parameter Description
EVPN Control Plane Whether EVPN is globally enabled. BGP does not include the L2VPN EVPN AFI/SAFI capability
in OPEN messages it sends unless evpn is globally enabled.
BGP Admin Mode Whether BGP is globally enabled.
BGP Router ID The configured router ID
Local AS Number The router’s AS number
Number of Network Entries The number of distinct L2VPN prefixes in the local RIB
Number of AS Paths The number of AS paths in the local RIB
Dynamic Neighbors Shows current number of created dynamic IPv4 BGP neighbors, high water mark and a limit of
dynamic IPv4 BGP neighbors that can be created
L2VPN EVPN Config Peers The number of peers are activated for l2vpn.
L2VPN EVPN Capable peers The number of peers received L2VPN EVPN AFI/SAFI capability from the neighbors.
Neighbor The IP address of a neighbor. A neighbor, that is created with BGP dynamic neighbors feature,
will be marked with “*”.
ASN The neighbor’s ASN
MsgRcvd The number of BGP messages received from this neighbor
MsgSent The number of BGP messages sent to this neighbor
State The adjacency state. One of IDLE, CONNECT, ACTIVE, OPEN SENT, OPEN CNFRM, EST
Up/Down Time How long the adjacency has been in the ESTABLISHED state, or, if the adjacency is down, how
long it has been down. In days:hours:minutes:seconds
Pfx Rcvd The number of L2VPN prefixes received from the neighbor
Format show bgp l2vpn evpn [[route-type type-1 – type-5] prefix/len || [rd rd-value]]
Mode Privileged EXEC
Example:
(Routing) #show bgp l2vpn evpn
Parameter Description
Network Destination EVPN route. It is displayed in the respective formats for EVPN type-2 or type-3
prefixes, as mentioned in the header of the command output.
Next Hop The route’s BGP NEXT HOP.
Metric Multi Exit Discriminator
LocPref The local preference
Path The AS path
The value of the ORIGIN attribute follows immediately after the AS PATH.
Example:
(Routing) #show bgp l2vpn evpn route-type type-2
Best Path:
Best Path:
Generation ID ................................. 1
Forwarding .................................... No
Advertised to Update Groups ................... None
-----------------------------------------------------------------------------
Best Path:
Syntax Description
group-index (Optional) If specified, this option restricts the output to a single update group.
peer-address (Optional) If specified, this option restricts the output to the update group containing the peer
with the given IPv4 address.
Version Delta T Duration UPD Built UPD Sent Paths Sent Pfxs Adv Pfxs Wd
1 15:10:10 0 2 4 2 3 0
Example:
(localhost) #show bgp l2vpn evpn statistics
Delta T Phase Upd Grp GenId Reason Peer Duration Adds Mods Dels
15:10:35 1 0 Adj-RIB-In+ 0 3 0 0
15:10:33 2 1 Accept-RIB-In+ 0 3 0 0
15:10:18 3 0 1 New update grp 1 3 0 0
Parameter Description
vrf vrf-name (Optional) Display the IPv6 routes for a given VRF instance.
ipv6-prefix prefix-length (Optional) Limits the output to a specific prefix.
longer-prefixes (Optional) Display the specified prefix and any longer prefixes within the same range.
shorter-prefixes (Optional) Used with the ipv6-prefix|prefix-length option to show routes whose prefix length
is shorter than prefix-length and, optionally, longer than a specified length. This option may not
be given if the longer-prefixes option is given.
as-path-list (Optional) Filter the output to the set of routes that match a given AS Path list. This option may not be
given if an ipv6-prefix|prefix-length option is given.
Parameter Description
BGP table version Each time phase 2 of the BGP decision process runs to select new BGP routes, this number is incremented
Status codes s – The route is aggregated into an aggregate address configured with the summary-only option
* – EFOS BGP never displays invalid routes; so this code is always displayed
> – Indicates that BGP has selected this path as the best path to the destination
i – If the route is learned from an internal peer
Network IPv6 destination prefix
Next Hop The IPv6 route’s BGP NEXT HOP
Metric Multi Exit Discriminator
LocPrf The local preference
Path The AS path
Origin The value of the Origin attribute
Example: The following shows example CLI display output for the command.
(R1) # show bgp ipv6
BGP table version is 5, local router ID is 20.1.1.1
Status codes: s suppressed, * valid, > best, i - internal
Origin codes: i - IGP, e - EGP, ? - incomplete
Parameter Description
vrf vrf-name (Optional) Display the aggregate address information for a given VRF instance.
Prefix/Len Destination prefix and prefix length.
AS Set Indicates whether an empty AS path is advertised with the aggregate address (N) or an AS SET is advertised with
the set of AS numbers for the paths contributing to the aggregate (Y).
Summary Only Indicates whether the individual networks are suppressed (Y) or advertised (N).
Active Indicates whether the aggregate is currently being advertised.
Example: The following shows example CLI display output for the command.
(R1) # show bgp ipv6 aggregate-address
Parameter Description
vrf vrf-name (Optional) Display the IPv6 routes in a given VRF instance.
communities A string of zero or more community values, which may be in either format and may contain the well-known
community keywords no-advertise and no-export. The output displays routes that belong to every community
specified in the command.
exact-match (Optional) Only displays routes that are members of those and only those communities specified in the command.
Parameter Description
vrf vrf-name (Optional) Display the IPv6 routes in a given VRF instance.
name A standard community list name.
exact-match (Optional) Display only routes that are an exact match for the set of communities in the matching community list
statement.
Parameter Description
vrf vrf-name (Optional) Display the listen ranges in a given VRF instance.
listen range Displays all listen subnet ranges that have been created.
network/length Displays information about specified listen range.
Example:
(Routing) #show bgp ipv6 listen range
Format show bgp ipv6 [vrf vrf-name] neighbors {ipv4-address | ipv6-address [interface
interface-name] |autodetect interface interface-name} advertised-routes
Mode Privileged EXEC
Parameter Description
vrf vrf-name (Optional) Display the IPv6 routes advertised to a neighbor in a given VRF instance.
ipv4-address The IPv4 address of a BGP peer.
ipv6-address The IPv6 address of a BGP peer.
interface interface-name (Optional) If the peer address is an IPv6 link local address, the interface that defines the scope of the
link local address must be given.
autodetect interface interface- The routing interface on which the neighbor’s link local IPv6 address is auto detected.
name
Format show bgp ipv6 [vrf vrf-name] neighbors [ipv4-address | ipv6-address [interface
interface-name] | autodetect interface interface-name policy
Mode Privileged EXEC
Parameter Description
vrf vrf-name (Optional) Display the IPv6 policies configured for a peer in a given VRF instance.
ipv4-address (Optional) The IPv4 address of a neighbor may optionally be specified to limit the output to a single
neighbor.
ipv6-address The IPv6 address of a neighbor. If specified, the output shows only this neighbor.
interface interface-name (Optional) If the neighbor’s address is link local address, the interface must be specified.
autodetect interface interface- (Optional) The routing interface on which the neighbor’s link local IPv6 address is auto detected.
name
Example: The following shows example CLI display output for the command.
(Routing) #show bgp ipv6 neighbors fe80::1 interface 0/1 policy
Parameter Description
vrf vrf-name (Optional) Display the IPv6 routes for a given VRF instance.
Cluster ID The cluster ID used by this router. The value configured with the bgp cluster-id command is displayed.
If no cluster ID is configured, the local router ID is shown and tagged as default.
Client-to-client Reflection Displays Enabled when this router reflects routes received from its clients to its other clients;
otherwise Disabled displays.
Clients A list of this router’s internal peers that have been configured as route reflector clients.
Parameter Description
Non-client Internal Peers A list of this router’s internal peers that are not configured as route reflector clients. Routes from non-
client peers are reflected to clients and vice-versa.
Example: The following shows example CLI display output for the command.
(Routing) #show bgp ipv6 route-reflection
If the peer address (“Remote Address”) is a link local address, the next line of output indicates the scope of the address.
RFC 5549 Support is displayed only if the BGP neighbor is peered over IPv6 network.
If the peer is configured as “autodetect”, the “Remote Address” shows detected IPv6 address or “Unresolved” in case if
the peer is not detected by the autodetect feature.
Autodetect “status” is displayed only if the peer is configured as “autodetect”. The field shows one of the following
statuses: “Peer is detected”, “Peer is not detected” or “Multiple peers are detected”.
Format show bgp ipv6 [vrf vrf-name] neighbors [ipv4-address | ipv6-address [interface
interface-name] | autodetect interface interface-name {received-routes | routes |
rejected-routes}
Mode Privileged EXEC
Parameter Description
vrf vrf-name (Optional) Display the neighbors in a given VRF instance.
ipv4-address or ipv6- (Optional) If a peer address is specified, the output is limited to an individual peer.
address
interface interface-name (Optional) If the peer address is an IPv6 link local address, the interface that defines the scope of the link
local address must be given.
autodetect interface (Optional) The routing interface on which the neighbor’s link local IPv6 address is auto detected.
interface-name
Example: The following shows example CLI display output for the command.
Received UPDATE Queue Size: 0 bytes. High: 355. Limit 196096. Drops 0.
Format show bgp ipv6 [vrf vrf-name] update-group [group-index | ipv4-address | ipv6-address
[interface interface-name] autodetect interface interface-name
Mode Privileged EXEC
Parameter Description
vrf vrf-name (Optional) Display the status of outbound update groups in a VRF instance.
group-index (Optional) If specified, this option restricts the output to a single update group.
ipv4-address (Optional) The IPv4 address of a peer enabled for the exchange of IPv6 prefixes. If specified, this option restricts
the output to the update group containing the peer with the given address.
ipv6-address (Optional) The IPv6 address of a peer. If the peer address is a link local address, the interface that defines the
scope of the address must also be given. If a peer address is specified, this option restricts the output to the
update group containing the peer with the given address.
autodetect interface (Optional) The routing interface on which the neighbor’s link local IPv6 address is auto detected.
Parameter Description
all Displays the complete VPNv6 database.
rd <route-distinguisher> Displays NLRI prefixes that match the named route distinguisher.
vrf <vrf-name> Displays NLRI prefixes associated with the named VRF instance.
ipv6-prefix/length (Optional) The IPv6 address and the length of the mask (0 to 128). The slash (/) mark must be included.
Example: The following example shows all available VPNv6 information in a BGP routing table.
(Routing) # show bgp vpnv6 all
The following table describes the significant fields shown in the display.
Parameter Description
BGP table version This number is incremented each time phase 2 of the BGP decision process runs to select new BGP routes.
Status codes s – The route is aggregated into an aggregate address configured with the summary-only option.
* – Because EFOS BGP never displays invalid routes, this code is always displayed (to maintain
consistency with the industry standard).
> – Indicates that BGP has selected this path as the best path to the destination.
i – If the route is learned from an internal peer.
Route distinguisher The RD associated with the VRF.
Network The destination prefix.
Next hop The route’s BGP next hop.
Metric The BGP metric.
LocPrf The local preference.
Path The AS path per route.
Example: The following example shows VPNv6 routing entries for a VRF named red.
(Routing) # show bgp vpnv6 vrf red
Best Path:
Non-best Paths:
Local Preference........................... 200
AS Path.................................... 18 50 27
Origin..................................... Incomplete
Type....................................... External
IGP Cost................................... 10
Peer (Peer ID)............................. 3002::2 (18.24.1.3)
BGP Next Hop............................... 3002::2
Extended Community......................... RT:3:300
The following table describes the significant fields shown in the display.
Parameter Description
Prefix/Prefix length The destination prefix and prefix length.
Generation ID The version of the BGP routing table when this route last changed.
Forwarding Whether this BGP route is used for forwarding.
Advertised to Update The outbound update groups to which this route is advertised.
Groups
Local Preference The local preference, either as received from the peer or as set according to local policy.
AS Path The AS path. This form of show bgp vpnv6 displays AS paths as long as allowed by bgp maxas-limit.
Origin The value of the origin attribute.
Metric The value of the MED attribute, if included.
Type Indicates whether the path is received from an internal or external peer.
IGP Cost The interior gateway cost (such as, OSPF cost) to the BGP next hop.
Peer (Peer ID) The IP address of the peer that sent this route, and its router ID.
BGP Next Hop The BGP Next Hop attribute.
Atomic Aggregate If the Atomic Aggregate attribute is attached to the path.
Aggregator The AS number and router ID of the speaker that aggregated the route.
Communities The BGP communities attached to the path.
Originator If the Originator attribute is attached to the path, the value of this attribute.
Cluster List If the Cluster_List attribute is attached to the path, the sequence of cluster IDs in the cluster list.
Extended Community The route target value associated with the specified route.
Example: The following example shows the 20 most recent decision process runs, with the most recent information at
the end of the table.
(Routing)#show bgp vpnv6 statistics
Delta T Phase Upd Grp GenId Reason Peer Duration Adds Mods Dels
00:30:39 3 0 0 clear ip bgp 0 0 0 0
00:30:39 3 0 0 clear ip bgp 0 0 0 0
00:30:39 3 0 0 clear ip bgp 0 0 0 0
00:30:38 1 0 Adj-RIB-In+ 0 1 0 0
00:30:36 3 0 0 Phase 2 done 1 1 0 0
00:30:05 3 0 0 Phase 2 done 1 0 0 0
00:00:56 3 0 0 Phase 2 done 0 0 0 1
00:00:23 3 0 0 Phase 2 done 0 2 0 0
Parameter Description
Delta T How long since the decision process was run. hours:minutes:seconds if the elapsed time is less than 24
hours. Otherwise, days:hours.
Phase Which phase of the decision process was run.
Upd Grp Outbound update group ID. This only applies when phase 3 is run.
GenId Generation ID of the BGP routing table when the decision process was run. The generation ID is incremented
each time phase 2 of the decision process is run and when there is a change to the status of the aggregate
addresses.
Reason The event that triggered the decision process to run.
Peer Phase 1 of the decision process can be triggered for a specific peer when a peer’s inbound routing policy
changes or the peer is reset.
Duration How long the decision process took, in milliseconds.
Adds The number of routes added. For phase 1, this is the number of prefixes that pass inbound policy and are
added to the Accept-RIB-In. For phase 3, this is the number of prefixes added to the update group’s Adj-RIB-
Out.
Mods The number of routes modified. This value is always 0 for phase 1.
Dels The number of routes deleted. This value is always 0 for phase 1.
Use the Routing Policy commands to configure routing policies such as.
Matching on an AS Path
When you have created an AS path list, you cannot delete an individual statement. If you want to remove an individual
statement, you must delete the AS path list and recreate it without the statement to be deleted.
Statements are applied in the order in which they are created. New statements are added to the end of the list. The statement
with the first matching regular expression is applied.
EFOS allows configuration of up to 128 AS path access lists, with up to 64 statements each.
To enter the question mark within a regular expression, you must first enter Ctrl+V to prevent the CLI from interpreting the
question mark as a request for help.
Table 16, AS Path Regular Expression Syntax lists AS path list regular expression syntax.
Default No AS path lists are configured by default. There are no default values for any of the parameters of this
command.
Format ip as-path access-list as-path-list-number {permit|deny} regexp
Mode Global Configuration
Parameter Description
as-path-list-number A number from 1 to 500 uniquely identifying the list. All AS path access list commands with the same as-
path-list-number are considered part of the same list.
permit (Optional) Permit routes whose AS Path attribute matches the regular expression.
deny (Optional) Deny routes whose AS Path attribute matches the regular expression.
Parameter Description
regexp A regular expression used to match the AS path attribute of a BGP path where the AS path is treated as an
ASCII string.
Example: In the following example, the router is configured to reject routes received from neighbor 172.20.1.1 with an
AS path that indicates the route originates in, or passes through, AS 100.
(Routing)(Config)# ip as-path access-list 1 deny _100_
(Routing)(Config)# ip as-path access-list 1 deny ^100$
(Routing)(Config)# router bgp 1
(Routing)(Config-router)# neighbor 172.20.1.1 remote-as 200
(Routing)(Config-router)# neighbor 172.20.1.1 filter-list 1 in
11.2.3 ip community-list
To create or configure a BGP community list, use the ip community-list command in Global Configuration mode. A
community list statement with no community values is considered a match for all routes, regardless of their community
membership. So the statement ip community-list bullseye permit is a permit all statement.
A community number may be entered in either format, as a 32-bit integer or a pair of 16-bit integers separated by a colon,
regardless of whether the ip bgp-community new-format command is active. Up to 16 communities, including the well-known
communities, can be listed in a single command. Up to 32 statements may be configured with a given community list name.
Up to 128 unique community list names may be configured.
Parameter Description
standard list-name Identifies a named standard community list. The name may contain up to 32 characters.
permit Indicates that matching routes are permitted.
deny Indicates that matching routes are denied.
community-number From zero to 16 community numbers formatted as a 32-bit integers or in AA:NN format, where AA is a
2-byte autonomous system number and NN is a 16-bit integer. The range is 1 to 4,294,967,295 (any 32-
bit integer other than 0). Communities are separated by spaces.
no-advertise The well-known standard community, NO_ADVERTISE (0xFFFFFF02).
no-export The well-known standard community, NO_EXPORT, (0xFFFFFF01).
11.2.3.0.1 no ip community-list
To delete a community list, use the no form of the command.
11.2.4 ip prefix-list
To create a prefix list or add a prefix list entry, use the ip prefix-list command in Global Configuration mode. Prefix
lists allow matching of route prefixes with those specified in the prefix list. Each prefix list includes of a sequence of prefix
list entries ordered by their sequence numbers. A router sequentially examines each prefix list entry to determine if the
route’s prefix matches that of the entry. An empty or nonexistent prefix list permits all prefixes. An implicit deny is assume if
a given prefix does not match any entries of a prefix list. Once a match or deny occurs the router does not go through the
rest of the list. A prefix list may be used within a route map to match a route’s prefix using the match ip address command.
Up to 128 prefix lists may be configured. The maximum number of statements allowed in prefix list is 64.
Default No prefix lists are configured by default. When neither the ge nor the le option is configured, the destination prefix
must match the network/length exactly. If the ge option is configured without the le option, any prefix with a network
mask greater than or equal to the ge value is considered a match. Similarly, if the le option is configured without the
ge option, a prefix with a network mask less than or equal to the le value is considered a match.
Format ip prefix-list list-name {[seq number] {permit | deny} network/length [ge length]
[le length] | renumber renumber-interval first-statement-number}
Mode Global Configuration
Parameter Description
list-name The text name of the prefix list. Up to 32 characters.
seq number (Optional) The sequence number for this prefix list statement. Prefix list statements are ordered from lowest
sequence number to highest and applied in that order. If you do not specify a sequence number, the system will
automatically select a sequence number five larger than the last sequence number in the list. Two statements
may not be configured with the same sequence number. The value ranges from 1 to 4,294,967,294.
permit Permit routes whose destination prefix matches the statement.
deny Deny routes whose destination prefix matches the statement.
network/length Specifies the match criteria for routes being compared to the prefix list statement. The network can be any valid
IP prefix. The length is any IPv4 prefix length from 0 to 32.
ge length (Optional) If this option is configured, then a prefix is only considered a match if its network mask length is greater
than or equal to this value. This value must be longer than the network length and less than or equal to 32.
le length (Optional) If this option is configured, then a prefix is only considered a match if its network mask length is less
than or equal to this value. This value must be longer than the ge length and less than or equal to 32.
renumber (Optional) Provides the option to renumber the sequence numbers of the IP prefix list statements with a given
interval starting from a particular sequence number. The valid range for renumber-interval is 1 to 100, and
the valid range for first-statement-number is 1 to 1000.
Example: The following example configures a prefix list that allows routes with one of two specific destination prefixes,
172.20.0.0/16 and 192.168.1.0/24.
(Routing)(config)# ip prefix-list apple seq 10 permit 172.20.0.0/16
(Routing)(config)# ip prefix-list apple seq 20 permit 192.168.10/24
11.2.4.0.1 no ip prefix-list
To delete a prefix list or a statement in a prefix list, use the no form of this command. The command no ip prefix-list
list-name deletes the entire prefix list. To remove an individual statement from a prefix list, you must specify the statement
exactly, with all its options.
Format no ip prefix-list list-name [seq number] {permit | deny} network/length [ge length] [le
length]
Mode Global Configuration
Parameter Description
list-name The text name of the prefix list.
description text Text description of the prefix list. Up to 80 characters.
Up to 128 prefix lists may be configured. The maximum number of statements allowed in prefix list is 64. These numbers
indicate only IPv6 prefix lists. IPv4 prefix lists may be configured in appropriate numbers independently.
Default No prefix lists are configured by default. When neither the ge nor the le option is configured, the destination prefix
must match the network/length exactly. If the ge option is configured without the le option, any prefix with a network
mask greater than or equal to the ge value is considered a match. Similarly, if the le option is configured without the
ge option, a prefix with a network mask less than or equal to the le value is considered a match.
Parameter Description
list-name The text name of the prefix list. Up to 32 characters.
seq number (Optional) The sequence number for this prefix list statement. Prefix list statements are ordered from
lowest sequence number to highest and applied in that order. If you do not specify a sequence number,
the system will automatically select a sequence number five larger than the last sequence number in the
list. Two statements may not be configured with the same sequence number. The value ranges from 1 to
4,294,967,294.
permit Permit routes whose destination prefix matches the statement.
deny Deny routes whose destination prefix matches the statement.
ipv6-prefix/prefix-length Specifies the match criteria for routes being compared to the prefix list statement. The ipv6-prefix can
be any valid IPv6 prefix where the address is specified in hexadecimal using 16-bit values between
colons. The prefix-length is the length of the IPv6 prefix, given as a decimal value that indicates how
many of the high-order contiguous bits of the address comprise the prefix (the network portion of the
address). A slash mark must precede the decimal value.
ge length (Optional) If this option is configured, specifies a prefix length greater than or equal to the ipv6-prefix/
prefix-length. It is the lowest value of a range of the length.
le length (Optional) If this option is configured, specifies a prefix length less than or equal to the ipv6-prefix/
prefix-length. It is the highest value of a range of the length.
Description A description of the prefix list. It can be up to 80 characters in length.
renumber (Optional) Provides the option to renumber the sequence numbers of the IPv6 prefix list statements with
a given interval starting from a particular sequence number.
Example: The following example configures a prefix list that allows routes with one of two specific destination prefixes,
2001::/64 and 5F00::/48.
NOTE: The description must be removed using the no ip prefix-list description before using this command to
delete an IPv6 Prefix List.
Parameter Description
as-path-list-number An integer from 1 to 500 identifying the AS path access list to use as match criteria.
Parameter Description
community-list The name of a standard community list. Up to eight names may be included in a single match term.
exact-match (Optional) When this option is given, a route is only considered a match if the set of communities on the route
is an exact match for the set of communities in one of the statements in the community list.
Parameter Description
prefix-list-name The name of a prefix list used to identify the set of matching routes. Up to eight prefix lists may be specified.
When prepending an inbound route, if the first segment in the AS_PATH of the received route is an AS_SEQUENCE,
as-path-string is inserted at the beginning of the sequence. If the first segment is an AS_SET, as-path-string is
added as a new segment with type AS_SEQUENCE at the beginning of the AS path. When prepending an outbound route
to an external peer, as-path-string follows the local AS number, which is always the first ASN.
Parameter Description
as-path-string A list of AS path numbers to insert at the beginning of the AS_PATH attribute of matching BGP routes. To
prepend more than one AS number, separate the ASNs with a space and enclose the string in quotes. Up to
ten AS numbers may be prepended.
Example: The following example prepends three instances an external peer’s AS number to paths received from that
peer, making routes learned from this peer less likely to be chosen as the best path.
(Routing)# config
(Routing)# route-map ppAsPath
(Routing)# set as-path prepend “2 2 2”
(Routing)# exit
(Routing)# router bgp 1
(Routing)# neighbor 172.20.1.2 remote-as 2
(Routing)# neighbor 172.20.1.2 route-map ppAsPath in
When a route map statement includes both set community and set comm-list delete terms, the set comm-list
delete term is processed first, and then the set community term (meaning that, communities are first removed, and then
communities are added).
Parameter Description
community-list-name A standard community list name.
Parameter Description
community-number One to 16 community numbers, either as a 32-bit integers or in AA:NN format. Communities are separated by
spaces. The well-known communities no advertise and no-export are also accepted.
additive (Optional) Communities are added to those already attached to the route.
none (Optional) Removes all communities from matching routes.
Parameter Description
value A local preference value, from 0 to 4,294,967,295 (any 32-bit integer).
This command sets the route metric if used in the OSPF context.
Parameter Description
value A metric value, from 0 to 4,294,967,295 (any 32-bit integer).
Parameter Description
value 1 or 2
When used in a route map applied to UPDATE messages sent to a neighbor, the command sets the next hop address for
matching IPv6 routes sent to the neighbor. If the address is a link local address, the address is assumed to be on the
interface where the UPDATE is sent or received. If the command specifies a global IPv6 address, the address is not required
to be on a local subnet.
Parameter Description
ipv6-address The IPv6 address set as the Network Address of Next Hop field in the MP_NLRI attribute of an UPDATE
message.
Parameter Description
as-path-list-number (Optional) When an AS path list number is specified, the output is limited to the single AS path list specified.
The number is an integer from 1 to 500.
Example: The following shows example CLI display output for the command.
(Routing)# show ip as-path-access-list
Parameter Description
community-list-name (Optional) A standard community list name. This option limits the output to a single list.
Example: The following shows example CLI display output for the command.
(Routing) #show ip community-list
permit 200:1
permit 200:2
permit 200:3
Parameter Description
community-list-name (Optional) A community list name.
Parameter Description
detail | summary (Optional) Displays detailed or summarized information about all prefix lists.
prefix-list-name (Optional) The name of a specific prefix list.
network/length (Optional) The network number and length (in bits) of the network mask.
seq (Optional) Applies the sequence number to the prefix list entry.
sequence-number (Optional) The sequence number of the prefix list entry.
longer (Optional) Displays all entries of a prefix list that are more specific than the given network/length.
first-match (Optional) Displays the entry of a prefix list that matches the given network/length.
ip prefix-list fred:
count: 3, range entries: 3, sequences: 5 - 15, refcount: 0
seq 5 permit 10.10.1.1/20 ge 22
ip prefix-list fred:
count: 3, range entries: 3, sequences: 5 - 15, refcount: 0
Example: The following shows example CLI display output for the command.
(Routing) #show ip prefix-list detail fred
ip prefix-list fred:
count: 3, range entries: 3, sequences: 5 - 15, refcount: 0
seq 5 permit 10.10.1.1/20 ge 22 (hitcount: 0)
seq 10 permit 10.10.1.2/20 le 30 (hitcount: 0)
seq 15 permit 10.10.1.2/20 ge 29 le 30 (hitcount: 0)
Parameter Description
prefix-list-name (Optional) Name of the prefix list from which the hit count is to be cleared.
network/length (Optional) Network number and length (in bits) of the network mask. If this option is specified, hit counters
are only cleared for the matching statement.
Parameter Description
detail | summary (Optional) Displays detailed or summarized information about all prefix lists.
list-name (Optional) The name of a specific prefix list.
ipv6-prefix/prefix-length (Optional) The network number and length (in bits) of the network mask.
seq (Optional) Applies the sequence number to the prefix list entry.
sequence-number (Optional) The sequence number of the prefix list entry. The range is 1 to 4,294,967,294.
longer (Optional) Displays all entries of a prefix list that are more specific than the given network/length.
Parameter Description
first-match (Optional) Displays the entry of a prefix list that matches the given network/length.
Parameter Description
count Number of entries in the prefix list.
range entries Number of entries that match the input range.
ref count Number of entries referencing the given prefix list.
seq Sequence number of the entry in the list.
permit/deny The action to take.
sequences Range of sequence numbers for the entries in the list
hit count Number of matches for the prefix entry
Example: The following shows example CLI display output for the command.
(Switch) #show ipv6 prefix-list apple
ipv6 prefix-list apple:
count: 6, range entries: 3, sequences: 5 - 30, refcount: 31
seq 5 deny 5F00::/8 le 128
seq 10 deny ::/0
seq 15 deny ::/1
seq 20 deny ::/2
seq 25 deny ::/3 ge 4
seq 30 permit ::/0 le 128
Parameter Description
list-name (Optional) Name of the prefix list from which the hit count is to be cleared.
ipv6-prefix/prefix-length (Optional) IPv6 prefix number and length (in bits) of the network mask. If this option is specified, hit
counters are only cleared for the matching statement.
NOTE: The commands in this chapter are in one of two functional groups.
Show commands display switch settings, statistics, and other information.
Configuration commands configure features and options of the switch. For every configuration command, there
is a show command that displays the configuration setting.
NOTE: Commands you issue in the Interface Config mode only affect a single interface. Commands you issue in the
Global Config mode affect all interfaces.
The trafficclass values can range from 0 to 6, although the actual number of available traffic classes depends on the
platform.
NOTE: The classofservice trust dot1p command will not be supported in future releases of the software because
Dot1p is the default value. Use the no classofservice trust command to set the mode to the default value.
Default dot1p
Format classofservice trust {dot1p | ip-dscp | untrusted}
Modes Global Config
Interface Config
When specified in Interface Config mode, this command affects a single interface only, whereas in Global Config mode, it
applies to all interfaces.
At least one, but no more than n queue-id values are specified with this command. Duplicate queue-id values are ignored.
Each queue-id value ranges from 0 to (n–1), where n is the total number of queues supported per interface. The number n
= 7 and corresponds to the number of supported queues (traffic classes).
12.1.7 random-detect
This command is used to enable WRED for the interface as a whole, and is only available when per-queue WRED activation
control is not supported by the device Specific WRED parameters are configured using the random-detect queue-parms and
the random-detect exponential weighting-constant commands.
Format random-detect
Modes Global Config
Interface Config
When specified in Interface Config mode, this command affects a single interface only, whereas in Global Config mode, it
applies to all interfaces. The Interface Config mode command is only available on platforms that support independent per-
port class of service queue configuration.
12.1.7.0.1 no random-detect
Use this command to disable WRED, thereby restoring the default tail drop operation for all queues on the interface.
Format no random-detect
Modes Global Config
Interface Config
Each parameter is specified for each possible drop precedence (color of TCP traffic). The last precedence applies to all
non-TCP traffic. For example, in a 3-color system, four of each parameter specified: green TCP, yellow TCP, red TCP, and
non-TCP, respectively.
Parameter Description
queue-id The internal class of service queue. Range 0 to 6.
This is the internal CoS queue number, which is not the same as the CoS or DSCP value received in the packet.
Use the show classofservice dot1p-mapping command to display the CoS value to CoS queue mapping.
units Minimum and maximum threshold values can be configured in KB or percentage.
min-thresh The minimum congestion threshold (in terms of percentage of queue depth) at which to begin dropping or ECN
marking packets at 1/8th of the configured drop probability.
At or below the minimum threshold, no packets are dropped. The range between the minimum and maximum
thresholds is divided equally into 8 increasing levels of drop probability.
max-thresh The maximum congestion threshold to end dropping at the configured maximum drop probability and to begin
dropping at 100%.
drop-probability The maximum drop probability. Range 0 to 100.
This is the drop probability for a packet when the maximum threshold is reached. Above the maximum threshold,
100% of matching packets are dropped.
ecn Enable ECN marking on the selected CoS queues. When EC N is enabled, packets not marked as ECN capable
are dropped when selected for discard by WRED.
Default Configuration
The following are the default WRED thresholds. By default, WRED is not enabled for any CoS queue and ECN is not enabled
for any CoS queue. By default, minimum and maximum threshold units are percentage. The thresholds for each color and
CoS queue are configured independently and may overlap.
ECN capability is an end-to-end feedback mechanism. Both ends of the TCP connection must participate. When ECN is
enabled, packets marked as ECN-capable and exceeding the upper WRED threshold are marked CE and are not dropped.
In cases of extreme congestion, ECN-capable packets may be dropped.
Use the show interfaces traffic command to see color aware drops, ECN Tx counts, and congestion levels.
ECN capability can be enabled in Windows Server 2008 and later releases using the following command.
netsh interface tcp set global ecncapability=enabled
Example: The following example configures simple meter and a trTCM meter.
! Define a class-map so that all traffic will be in the set of traffic cos-any
class-map match-all cos-any ipv4
match any
exit
! Define a class-map such that all traffic with a Cos value of 1
! will be in the set of traffic cos1.
! We will use this as a conform color class map. Conform-color class
! maps must be one of cos, secondary cos,
! dscp, or ip precedence.
class-map match-all cos1 ipv4
match cos 1
exit
! Define a class-map such that all ipv4 traffic with a Cos value of 0
! will be in the set of traffic cos0.
! We will use this as a conform color class map. Conform-color class
! maps must be one of cos, secondary cos, dscp, or ip precedence.
class-map match-all cos0 ipv4
match cos 0
exit
! Define a class-map such that all TCP will be in the set of traffic TCP.
! We will use this as a base color class for metering traffic.
class-map match-all tcp ipv4
match protocol tcp
exit
!
! Define a policy-map to include packets matching class cos-any (IPv4).
! Ingress IPv4 traffic arriving at a port participating this policy will
! be assigned red or green coloring based on the metering.
!
policy-map simple-policy in
class cos-any
!
! Create a simple policer in color blind mode. Packets below the committed information
! rate (CIR) or committed burst size (CBS) are assigned drop precedence green.
! Packets that exceed the CIR (in Kbps) or CBS (in Kbytes) are colored red.
! Both the conform and violate actions are set to transmit as WRED is
! used to drop packets when congested.
!
police-simple 10000000 64 conform-action transmit violate-action transmit
exit
exit
!
! Define a policy-map in color aware mode matching class cos-any (IPv4).
! Ingress IPv4 traffic arriving at a port participating in this policy will be
! assigned green, yellow or red coloring based on the meter.
!
policy-map two-rate-policy in
class tcp
!
! Create a two-rate policer per RFC 2698. The CIR value is 800 Kbps and
! the CBS is set to 96 Kbytes. The PIR is set to 950 Kbps and the PBS is
! set to 128 Kbytes. Color-aware processing is enabled using the conform-color
! command, that is, any packets not in cos 0 or 1 are pre-colored red. Packets in
! cos 0 are pre-colored yellow. Packets in cos 1 are pre-colored green.
! Pre-coloring gives greater bandwidth to CoS 1 as they are initially
! subject to the CIR/CBS limits. Packets in CoS 0 are subject to the PIR limits.
! Based on the CIR/CBD, the PIR/PBS, and the conform, exceed, and
! violate actions specified below:
!
! TCP packets with rates less than or equal to the CIR/CBS in class cos1
! are conforming to the rate (green).
! These packets will be dropped randomly at an increasing rate between 0-3%
! when the outgoing interface is congested between 80 and 100%.
!
! TCP packets with rates above the CIR/CBS and less than or equal to
! PIR/PBS in either class cos1 or class cos2 are policed as exceeding the
! CIR (yellow). These packets will be dropped randomly at an increasing rate
! between 0-5% when the outgoing interface is congested between 70 and 100%.
! TCP packets with rates higher than the PIR/PBS or which belong to neither
! class cos1 or class cos2 are violating the rate (red). These packets will be
! dropped randomly at an increasing rate between 0-10% when the outgoing
! interface is congested between 50 and 100%.
!
! Non TCP packets in CoS queue 0 or 1 will be dropped randomly at an increasing
! rate between 0-15% when the outgoing interface is congested between 50 and 100%.
!
police-two-rate 800 96 950 128 conform-action transmit exceed-action transmit violate-action transmit
conform-color cos1 exceed-color cos0
exit
exit
!
!Enable WRED drop on traffic classes 0 and 1
!
cos-queue random-detect 0 1
!
! Set the exponential-weighting-constant. The exponential weighting constant smooths
! the result of the average queue depth calculation by the function:
! average depth = (previous queue depth * (1-1/2^n)) + (current queue depth * 1/2^n).
! Because the instantaneous queue depth fluctuates rapidly, larger values will cause
! the average queue depth value to respond to changes more slowly than smaller values.
! The average depth is used in calcuating the amount of congestion on a queue.
!
random-detect exponential-weighting-constant 4
!
! Configure the queue parameters for traffic class 0 and 1. We set the minimum threshold and maximum
! thresholds to 80-100% for green traffic, 70-100% for yellow traffic and 50-100% for red traffic.
! Non-TCP traffic drops in the 50-100% congestion range. Green traffic is dropped
! at a very low rate to slowly close the TCP window. Yellow and red traffic
! are dropped more aggresively.
!
random-detect queue-parms 0 1 min-thresh 80 70 50 50 max-thresh 100 100 100 100 drop-prob-scale 3 5
10 15
!
! Assign the color policies to ports. The metering policies are applied on ingress ports.
!
interface 0/22
service-policy in simple-policy
exit
interface 0/23
service-policy in two-rate-policy
exit
Example: The following example enables WRED discard for non-color-aware traffic. Because a color-aware policer is
not enabled, the traffic is treated as if it were colored green. This means that only the green TCP and non-TCP WRED
thresholds are active.
!
! Configure the thresholds for TCP traffic on COS queue 1. The other thresholds are kept at their
default values.
! The minimum threshold of 50% and maximum threshold of 100% with
! a drop probability of 2% are a good starting point for tuning the WRED
! parameters for a particular network.
!
random-detect queue-parms 1 min-thresh 50 30 20 100 max-thresh 100 90 80 100 drop-prob-scale 2 10 10 10
!
! Enable WRED on cos-queue 1 (the default cos queue).
!
cos-queue random-detect 1
Example: This example globally configures the switch to utilize ECN marking of packets queued for egress on CoS
queues 0 and 1 using the DCTCP threshold as it appears in “DCTCP: Efficient Packet Transport for the Commoditized
Data Center.”
The first threshold parameter configures Congestion Enabled TCP packets in CoS queues 0 and 1 that exceed the WRED
threshold given below (13%) to be marked as Congestion Experienced with the first ECN parameter. TCP packets without
ECN capability bits are dropped according to the normal WRED processing. Packets on other CoS queues are handled in
the standard manner, that is, tail dropped when insufficient buffer is available. Yellow and red packet configuration (second
and third threshold parameters) is kept at the defaults as no metering to reclassify packets from green to yellow or red is
present. The last threshold parameter configures non-TCP packets in CoS queues 0 and 1 to be processed with the WRED
defaults. The ecn keyword configures CoS queues 0 and 1 for ECN marking. The weighting constant is set to 0 in the second
line of the configuration as described in the DCTCP paper cited above. Finally, CoS queues 0 and 1 are configured for WRED
as shown in the last line of the configuration.
Example: Enable WRED and ECN on queues 0 and 1, enable WRED on queues 2 and 3.
random-detect queue-parms 0 1 min-thresh 13 30 20 100 max-thresh 13 90 80 drop-prob-scale 100 10 10
10 ecn
random-detect queue-parms 2 3 min-thresh 13 30 20 100 max-thresh 13 90 80 drop-prob-scale 100 10 10 10
cos-queue random-detect 0 1 2 3
Example: Set the WRED parameters to their default values on queues 0 and 1.
no random-detect queue-parms 0 1
12.1.10 traffic-shape
This command specifies the maximum transmission bandwidth limit for the interface as a whole. You can also specify this
value for a range of interfaces or all interfaces. Also known as rate shaping, traffic shaping has the effect of smoothing
temporary traffic bursts over time so that the transmitted traffic rate is bounded.
Format traffic-shape bw
Modes Global Config
Interface Config
12.1.10.0.1 no traffic-shape
This command restores the interface shaping rate to the default value.
Format no traffic-shape
Modes Global Config
Interface Config
Parameter Description
User Priority The 802.1p user priority value.
Traffic Class The traffic class internal queue identifier to which the user priority value is mapped.
Parameter Description
IP Precedence The IP precedence value.
Traffic Class The traffic class internal queue identifier to which the IP Precedence value is mapped.
Parameter Description
IP DSCP The IP DSCP value.
Traffic Class The traffic class internal queue identifier to which the IP DSCP value is mapped.
Parameter Description
Non-IP Traffic Class The traffic class used for non-IP traffic. This is only displayed when the COS trust mode is set to trust IP
Precedence or IP DSCP (on platforms that support IP DSCP).
Untrusted Traffic Class The traffic class used for all untrusted traffic. This is only displayed when the COS trust mode is set to
'untrusted'.
Parameter Description
Queue Id An interface supports n queues numbered 0 to (n-1). The specific n value is platform dependent.
Minimum Bandwidth The minimum transmission bandwidth guarantee for the queue, expressed as a percentage. A
value of 0 means bandwidth is not guaranteed and the queue operates using best-effort. This is a
configured value.
Scheduler Type Indicates whether this queue is scheduled for transmission using a strict priority or a weighted
scheme. This is a configured value.
Queue Management Type The queue depth management technique used for this queue (tail drop).
If you specify the interface, the command also displays the following information.
Parameter Description
Interface The slot/port of the interface. If displaying the global configuration, this output line is replaced with a
Global Config indication.
Interface Shaping Rate The maximum transmission bandwidth limit for the interface as a whole. It is independent of any per-
queue maximum bandwidth values in effect for the interface. This is a configured value.
The per CoS queue display for an interface displays the threshold, drop probability, and ECN capability per color in the order,
green, yellow, red, and non-TCP.
Parameter Description
Queue ID An interface supports n queues numbered 0 to (n-1). The n value is platform dependent.
WRED Minimum Threshold The configured minimum threshold the queue depth (as a percentage) where WRED starts marking
and dropping traffic.
WRED Maximum Threshold The configured maximum threshold is the queue depth (as a percentage) above which WRED
marks/drops all traffic.
WRED Drop Probability The configured percentage probability that WRED will mark/drop a packet, when the queue depth is at
the maximum threshold. (The drop probability increases linearly from 0 just before the minimum
threshold, to this value at the maximum threshold, then goes to 100% for larger queue depths).
ECN Identifies whether ECN is enabled.
Example: This example shows ECN enabled on CoS queues 0 and 1 with a minimum threshold of 40% for green-colored
packets, 30% for yellow-colored packets, 20% for red-colored packets, and 100% for non-TCP packets.
Global Configuration
Queue ID....................................... 0
Threshold Units................................ Percentage
WRED Minimum Threshold
Precedence level 0........................... 40
Precedence level 1........................... 30
Precedence level 2........................... 20
Precedence level 3........................... 99
WRED Drop Probability
Precedence level 0........................... 10
Precedence level 1........................... 10
Precedence level 2........................... 10
Precedence level 3........................... 10
ECN Enabled.................................... No
Queue ID....................................... 1
Threshold Units................................ Percentage
WRED Minimum Threshold
Precedence level 0........................... 40
Precedence level 1........................... 30
Precedence level 2........................... 20
Precedence level 3........................... 99
WRED Drop Probability
Precedence level 0........................... 10
Precedence level 1........................... 10
Precedence level 2........................... 10
Precedence level 3........................... 10
ECN Enabled.................................... No
The DiffServ class defines the packet filtering criteria. The attributes of a DiffServ policy define the way the switch processes
packets. You can define policy attributes on a per-class instance basis. The switch applies these attributes when a match
occurs.
Packet processing begins when the switch tests the match criteria for a packet. The switch applies a policy to a packet when
it finds a class match within that policy.
A given class definition can contain a maximum of one reference to another class. You can combine the reference with other
match criteria. The referenced class is truly a reference and not a copy since additions to a referenced class affect all classes
that reference it. Changes to any class definition currently referenced by any other class must result in valid class definitions
for all derived classes, otherwise the switch rejects the change. You can remove a class reference from a class definition.
The only way to remove an individual match criterion from an existing class definition is to delete the class and recreate it.
NOTE: The mark possibilities for policing include CoS, IP DSCP, and IP Precedence. While the latter two are only
meaningful for IP packet types, CoS marking is allowed for both IP and non-IP packets, since it updates the 802.1p
user priority field contained in the VLAN tag of the Layer 2 packet header.
12.2.1 diffserv
This command sets the DiffServ operational mode to active. While disabled, the DiffServ configuration is retained and can
be changed, but it is not activated. When enabled, DiffServ services are activated.
Format diffserv
Mode Global Config
12.2.1.0.1 no diffserv
This command sets the DiffServ operational mode to inactive. While disabled, the DiffServ configuration is retained and can
be changed, but it is not activated. When enabled, DiffServ services are activated.
Format no diffserv
Mode Global Config
This set of commands consists of class creation/deletion and matching, with the class match commands specifying Layer 3,
Layer 2, and general match criteria. The class match criteria are also known as class rules, with a class definition consisting
of one or more rules to identify the traffic that belongs to the class.
NOTE: When you create a class match criterion for a class, you cannot change or delete the criterion. To change or delete
a class match criterion, you must delete and re-create the entire class.
12.3.1 class-map
This command defines a DiffServ class of type match-all or match-any. When used without any match condition, this
command enters the class-map mode. The class-map-name is a case sensitive alphanumeric string from 1 to 31 characters
uniquely identifying an existing DiffServ class.
For the match-all argument, a given packet needs to match all the rules configured in class-map to get classified as the
configured class-map.
For the match-any argument, a given packet can match at least one of the rules configured in the class-map to get classified
as the configured class-map.
This command may be used without specifying a class type to enter the Class-Map Config mode for an existing DiffServ
class.
NOTE:
The optional keywords [{ipv4 | ipv6}] specify the Layer 3 protocol for this class. If not specified, this
parameter defaults to ipv4. This maintains backward compatibility for configurations defined on systems before
IPv6 match items were supported. You can configure the protocol type using the match protocol
protocol-type command in the Class-map config mode.The optional keyword appiq creates a new
DiffServ appiq class. Regular expressions found in the traffic patterns in layer 7 applications can be matched
to the App-IQ class using a match signature command.
The CLI mode is changed to Class-Map Config when this command is successfully executed.
Parameter Description
match-all For the match-all argument, a given packet needs to match all the rules configured in class-map to get classified
as the configured class-map.
match-any For the match-any argument, a given packet can match at least one of the rules configured in the class-map to
get classified as the configured class-map.
class-map-name A case sensitive alphanumeric string from 1 to 31 characters uniquely identifying a DiffServ class.
Example: This example shows configuring a new class-map with the class-map name test-class-map.
(Switching) (Config)#class-map match-all test-class-map
(Switching) (Config-classmap)#
(Switching) (Config-classmap)#exit
(Switching) (Config)#class-map ?
12.3.1.0.1 no class-map
This command eliminates an existing DiffServ class. The class-map-name is the name of an existing DiffServ class. (The
class name default is reserved and is not allowed here.) This command may be issued at any time; if the class is currently
referenced by one or more policies or by any other class, the delete action fails.
Default none
The action (mirror, redirect, time-range, and so on) clauses in the access-lists referenced by a policy are ignored for the
purpose of policy application. The access-lists are used for matching the traffic only.
The no form does not exist for this command.
IPv4, IPv6, and MAC ACLs can be configured as match criteria using this command.
Default none
Format match [not] any
Mode Class-Map Config
Default none
Format match class-map refclassname
Mode Class-Map Config
NOTE:
Default none
Format match [not] cos 0-7
Mode Class-Map Config
Default none
Format match [not] secondary-cos 0-7
Mode Class-Map Config
Default none
Format match [not] destination-address mac macaddr macmask
Mode Class-Map Config
Default none
Format match [not] dstip ipaddr ipmask
Mode Class-Map Config
Default none
Format match [not] dstip6 destination-ipv6-prefix/prefix-length
Mode Ipv6-Class-Map Config
Default none
Format match [not] dstl4port {portkey | 0-65535}
Mode Class-Map Config
The dscpval value is specified as either an integer from 0 to 63, or symbolically through one of the following keywords:
af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6,
cs7, ef. Use the [not] option to negate the match condition.
NOTE: The ip dscp, ip precedence, and ip tos match conditions are alternative ways to specify a match criterion for the
same Service Type field in the IP header, but with a slightly different user notation.
Default none
Format match ip dscp dscpval
Mode Class-Map Config
NOTE: The IP DSCP, IP Precedence, and IP ToS match conditions are alternative ways to specify a match criterion for the
same Service Type field in the IP header, but with a slightly different user notation.
Default none
Format match [not] ip precedence 0-7
Mode Class-Map Config
NOTE:
The IP DSCP, IP Precedence, and I ToS match conditions are alternative ways to specify a match criterion for
the same Service Type field in the IP header, but with a slightly different user notation.
This “free form” version of the IP DSCP/Precedence/TOS match specification gives the user complete control
when specifying which bits of the IP Service Type field are checked.
Default none
Format match [not] ip tos tosbits tosmask
Mode Class-Map Config
Default none
Format match [not] ip6flowlbl label 0-1048575
Mode IPv6-Class-Map Config
To specify the match condition using a single keyword, use one of the following: icmp, igmp, ip, tcp, udp, ipv6, gre, or
icmpv6.
To specify the match condition using a numeric value notation, the protocol number is a standard value assigned by IANA
and is interpreted as an integer from 0 to 255. Use the [not] option to negate the match condition.
NOTE: This command does not validate the protocol number value against the current list defined by IANA.
Default none
Format match [not] protocol {0-255 | { icmp | igmp | ip | tcp | udp | ipv6 | gre | icmpv6} |
none}
Mode Class-Map Config
Example: This example shows the process of configuring the protocol type tcp for a given class-map test-class-map.
Default none
Format match [not] source-address mac address macmask
Mode Class-Map Config
Default none
Format match [not] srcip ipaddr ipmask
Mode Class-Map Config
Default none
Format match [not] srcip6 source-ipv6-prefix/prefix-length
Mode Ipv6-Class-Map Config
To specify the match condition as a numeric value, one layer 4 port number is required. The port number is an integer from
0 to 65535. Use the [not] option to negate the match condition.
Default none
Format match not srcl4port {portkey | 0-65535}
Mode Class-Map Config
Default none
Format match src port {portstart-portend | portvalue}
Mode Class-Map Config
Default none
Format match [not] vlan 0-4095
Mode Class-Map Config
Default none
Format match [not] secondary-vlan 0-4095
Mode Class-Map Config
Use the policy commands to associate a traffic class that you define by using the class command set with one or more QoS
policy attributes. Assign the class/policy association to an interface to form a service. Specify the policy name when you
create the policy.
Each traffic class defines a particular treatment for packets that match the class definition. You can associate multiple traffic
classes with a single policy. When a packet satisfies the conditions of more than one class, preference is based on the order
in which you add the classes to the policy. The first class you add has the highest precedence.
This set of commands consists of policy creation/deletion, class addition/removal, and individual policy attributes.
NOTE: The only way to remove an individual policy attribute from a class instance within a policy is to remove the class
instance and readd it to the policy. The values associated with an existing policy attribute can be changed without
removing the class instance.
12.4.1 assign-queue
This command modifies the queue id to which the associated traffic stream is assigned. The queueid is an integer from 0
to n-1, where n is the number of egress queues supported by the device.
12.4.2 drop
This command specifies that all packets for the associated traffic stream are to be dropped at ingress.
Format drop
Mode Policy-Class-Map Config
Incompatibilities Assign Queue, Mark (all forms), Mirror, Police, Redirect
12.4.3 mirror
This command specifies that all incoming packets for the associated traffic stream are copied to a specific egress interface
(physical port or LAG).
12.4.4 redirect
This command specifies that all incoming packets for the associated traffic stream are redirected to a specific egress
interface (physical port or port-channel).
12.4.5 conform-color
Use this command to enable color-aware traffic policing and define the conform-color class map. Used with the police
command where the fields for the conform level are specified. The class-map-name parameter is the name of an existing
DiffServ class map.
NOTE: This command may only be used after specifying a police command for the policy-class instance.
12.4.6 class
This command creates an instance of a class definition within the specified policy for the purpose of defining treatment of
the traffic class through subsequent policy attribute statements. The classname is the name of an existing DiffServ class.
NOTE:
This command causes the specified policy to create a reference to the class definition.
The CLI mode is changed to Policy-Class-Map Config when this command is successfully executed.
12.4.6.0.1 no class
This command deletes the instance of a particular class and its defined treatment from the specified policy. classname is
the name of an existing DiffServ class.
NOTE: This command removes the reference to the class definition for the specified policy.
Default 1
Format mark-cos 0-7
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police
Format mark-cos-as-sec-cos
Mode Policy-Class-Map Config
Incompatibilities Drop, Mark IP DSCP, IP Precedence, Police
The dscpval value is specified as either an integer from 0 to 63, or symbolically through one of the following keywords:
af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0, cs1, cs2, cs3, cs4, cs5, cs6,
cs7, ef.
12.4.13 police-simple
This command is used to establish the traffic policing style for the specified class. The command can take in values of the
data rate as a percentage with the addition of a new option node to specify the unit (either in Kb/s [rate-kbps] or as a
percentage of the maximum operating speed [rate-percent]). The percentage options makes it easier for the user to
configure with respect to the operating speed and assess the conform and violate actions for the data rate threshold given.
This command is used to establish the traffic policing style for the specified class. The simple form of the police command
uses a single data rate and burst size, resulting in two outcomes: conform and violate. The conforming data rate is specified
in kilobits-per-second (Kb/s) and is an integer from 1 to 4294967295. The conforming burst size is specified in kilobytes (KB)
and is an integer from 1 to 128.
For each outcome, the only possible actions are drop, set-cos-as-sec-cos, set-cos-transmit,
set-sec-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this simple form of the
police command, the conform action defaults to transmit and the violate action defaults to drop. These actions can be set
with this command when the style has been configured.
For set-dscp-transmit, a dscpval value is required and is specified as either an integer from 0 to 63, or symbolically through
one of the following keywords: af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, be, cs0,
cs1, cs2, cs3, cs4, cs5, cs6, cs7, ef.
For set-cos-transmit, an 802.1p priority value is required and is specified as an integer from 0 to 7.
Parameter Description
rate-kbps The data rate unit is specified in kilobits per second (Kb/s). The range is from 1-4,294,967,295.
rate-percent The data rate unit is specified as a percentage of the maximum operating speed in the data transfer. The
range is from 1 to 100.
Example: The following example shows a simple police configuration that transmits all the conformed packets below the
data rate 40000 Kb/s and drops all the violated packets that are above the data rate.
(Routing)(config-policy-classmap)#police-simple rate-kbps ?
12.4.14 police-single-rate
This command is the single-rate form of the police command and is used to establish the traffic policing style for the
specified class. For each outcome, the only possible actions are drop, set-cos-as-sec-cost, set-cos-transmit,
set-sec-cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this single-rate form of the
police command, the conform action defaults to send, the exceed action defaults to drop, and the violate action defaults
to drop. These actions can be set with this command once the style has been configured.
The command can take in values of the data rate as a percentage with the addition of a new option node to specify the unit
(either in Kb/s [rate-kbps] or as a percentage of the maximum operating speed [rate-percent]). The percentage options
makes it easier for the user to configure with respect to the operating speed and assess the conform, exceed, and violate
actions for the data rate threshold given.
Example: The following configuration example transmits all the conformed packets below the data rate 40000 Kb/s and
drops all the violated packets that are above the data rate.
(Routing)(config-policy-classmap)#police-single-rate rate-kbps ?
12.4.15 police-two-rate
This command is the two-rate form of the police command and is used to establish the traffic policing style for the specified
class. For each outcome, the only possible actions are drop, set-cos-as-sec-cos, set-cos-transmit, set-sec-
cos-transmit, set-dscp-transmit, set-prec-transmit, or transmit. In this two-rate form of the police
command, the conform action defaults to send, the exceed action defaults to drop, and the violate action defaults to drop.
These actions can be set with this command once the style has been configured.
The command can take in values of the data rate as a percentage with the addition of a new option node to specify the unit
(either in Kb/s [rate-kbps] or as a percentage of the maximum operating speed [rate-percent]). The percentage options
makes it easier for the user to configure with respect to the operating speed and assess the conform, exceed, and violate
actions for the data rate threshold given.
Parameter Description
rate-kbps The data rate unit is specified in kilobits per second (Kb/s). The range is from 1-4,294,967,295.
rate-percent The data rate unit is specified as a percentage of the maximum operating speed in the data transfer. The
range is from 1 to 100.
Example: The following configuration example transmits all the conformed packets below the data rate 40000 Kb/s and
less than the peak-data rate 8000 and drops all the violated packets that are above the data rate.
(Routing)(config-policy-classmap)#police-two-rate rate-kbps ?
Example: The following configuration transmits all the conformed packets below the data rate 50 percent of the operating
speed and less than the peak data rate 80%, allows the exceeded traffic, and drops all the violated packets that are above
the data rate speed.
(Routing)(config-policy-classmap)#police-two-rate rate-percent ?
<1-100> Enter an integer in the range of 1 to 100 specifying
conforming data rate in percentile (of max operating
speed).
12.4.16 policy-map
This command establishes a new DiffServ policy. The policyname parameter is a case-sensitive alphanumeric string from
1 to 31 characters uniquely identifying the policy. The type of policy is specific to the inbound traffic direction as indicated by
the in parameter.
NOTE: The CLI mode is changed to Policy-Map Config when this command is successfully executed.
12.4.16.0.1 no policy-map
This command eliminates an existing DiffServ policy. The policyname parameter is the name of an existing DiffServ policy.
This command may be issued at any time. If the policy is currently referenced by one or more interface service attachments,
this delete attempt fails.
The service commands attach a defined policy to a directional interface. You can assign only one policy at any one time to
an interface in the inbound direction. DiffServ is not used in the outbound direction.
12.5.1 service-policy
This command attaches a policy to an interface in the inbound direction. The policymapname parameter is the name of an
existing DiffServ policy. This command causes a service to create a reference to the policy.
NOTE:
This command effectively enables DiffServ on an interface in the inbound direction. There is no separate
interface administrative 'mode' command for DiffServ.
This command fails if any attributes within the policy definition exceed the capabilities of the interface. When a
policy is successfully attached to an interface, any attempt to change the policy definition, that would result in
a violation of the interface capabilities, causes the policy change attempt to fail.
12.5.1.0.1 no service-policy
This command detaches a policy from an interface in the inbound direction. The policymapname parameter is the name of
an existing DiffServ policy.
NOTE: This command causes a service to remove its reference to the policy. This command effectively disables DiffServ
on an interface in the inbound direction. There is no separate interface administrative 'mode' command for DiffServ.
Parameter Description
Class Map Name A case-sensitive alphanumeric string from 1 to 31 characters uniquely identifying a DiffServ class.
Class Type A class type of all means every match criterion defined for the class is evaluated simultaneously and must all be
true to indicate a class match.
Match Rule Count Number of match rules configured for the class-map.
Match Criteria The Match Criteria fields are only displayed if they have been configured. Not all platforms support all match
criteria values. They are displayed in the order entered by the user. The fields are evaluated in accordance with
the class type. The possible Match Criteria fields are: Destination IP Address, Destination Layer 4 Port,
Destination MAC Address, Ethertype, Source MAC Address, VLAN, Class of Service, Every, IP DSCP, IP
Precedence, IP TOS, Protocol Keyword, Reference Class, Source IP Address, and Source Layer 4 Port.
Values The values of the Match Criteria.
If you do not specify the Class Name, this command displays a list of all defined DiffServ classes. The following fields are
displayed.
Parameter Description
Class Name The name of this class. (Note that the order in which classes are displayed is not necessarily the same
order in which they were created.)
Class Type A class type of all means every match criterion defined for the class is evaluated simultaneously and
must all be true to indicate a class match.
ACL ID or Ref Class Name The name of an existing DiffServ class whose match conditions are being referenced by the specified
class definition or access-group name/ID.
Parameter Description
DiffServ Admin mode The current value of the DiffServ administrative mode.
Class Table Size The current number of entries (rows) in the Class Table.
Class Table Max The maximum allowed entries (rows) for the Class Table.
Class Rule Table Size The current number of entries (rows) in the Class Rule Table.
Class Rule Table Max The maximum allowed entries (rows) for the Class Rule Table.
Policy Table Size The current number of entries (rows) in the Policy Table.
Policy Table Max The maximum allowed entries (rows) for the Policy Table.
Policy Instance Table Size Current number of entries (rows) in the Policy Instance Table.
Policy Instance Table Max Maximum allowed entries (rows) for the Policy Instance Table.
Policy Attribute Table Size Current number of entries (rows) in the Policy Attribute Table.
Policy Attribute Table Max Maximum allowed entries (rows) for the Policy Attribute Table.
Service Table Size The current number of entries (rows) in the Service Table.
Service Table Max The maximum allowed entries (rows) for the Service Table.
Parameter Description
Policy Name The name of this policy.
Policy Type The policy type (only inbound policy definitions are supported for this platform).
The following information is repeated for each class associated with this policy (only those policy attributes actually
configured are displayed).
Parameter Description
Assign Queue Directs traffic stream to the specified QoS queue. This allows a traffic classifier to specify which one of
the supported hardware queues are used for handling packets belonging to the class.
Class Name The name of this class.
Committed Burst Size (KB) The committed burst size, used in simple policing.
Committed Rate (Kb/s) The committed rate, used in police simple, police single, and police two rate.
Conform Action The current setting for the action taken on a packet considered to conform to the policing parameters.
This is not displayed if policing is not in use for the class under this policy.
Conform Color Mode The current setting for the color mode. Policing uses either color blind or color aware mode. Color blind
mode ignores the coloration (marking) of the incoming packet. Color aware mode takes into
consideration the current packet marking when determining the policing outcome.
Conform COS The CoS mark value if the conform action is set-cos-transmit.
Parameter Description
Conform DSCP Value The DSCP mark value if the conform action is set-dscp-transmit.
Conform IP Precedence Value The IP Precedence mark value if the conform action is set-prec-transmit.
Drop Drop a packet upon arrival. This is useful for emulating access control list operation using DiffServ,
especially when DiffServ and ACL cannot co-exist on the same interface.
Exceed Action The action taken on traffic that exceeds settings that the network administrator specifies.
Exceed Color Mode The current setting for the color of exceeding traffic that the user may optionally specify.
Mark CoS The class of service value that is set in the 802.1p header of inbound packets. This is not displayed if
the mark cos was not specified.
Mark CoS as Secondary CoS The secondary 802.1p priority value (second/inner VLAN tag. Same as CoS (802.1p) marking, but the
dot1p value used for remarking is picked from the dot1p value in the secondary (that is, inner) tag of a
double-tagged packet.
Mark IP DSCP The mark/remark value used as the DSCP for traffic matching this class. This is not displayed if mark ip
description is not specified.
Mark IP Precedence The mark/remark value used as the IP Precedence for traffic matching this class. This is not displayed
if mark ip precedence is not specified.
Mirror Copies a classified traffic stream to a specified egress port (physical port or LAG). This can occur in
addition to any marking or policing action. It may also be specified along with a QoS queue assignment.
This field does not display on Broadcom 5630x platforms.
Non-Conform Action The current setting for the action taken on a packet considered to not conform to the policing parameters.
This is not displayed if policing not in use for the class under this policy.
Non-Conform COS The CoS mark value if the non-conform action is set-cos-transmit.
Non-Conform DSCP Value The DSCP mark value if the non-conform action is set-dscp-transmit.
Non-Conform IP Precedence The IP Precedence mark value if the non-conform action is set-prec-transmit.
Value
Peak Rate Guarantees a committed rate for transmission, but also transmits excess traffic bursts up to a user-
specified peak rate, with the understanding that a downstream network element (such as the next hop’s
policer) might drop this excess traffic. Traffic is held in queue until it is transmitted or dropped (per type
of queue depth management.) Peak rate shaping can be configured for the outgoing transmission
stream for an AF (Assured Forwarding) traffic class (although average rate shaping could also be used.)
Peak Burst Size (PBS). The network administrator can set the PBS as a means to limit the damage expedited forwarding
traffic could inflict on other traffic (for example, a token bucket rate limiter) Traffic that exceeds this limit
is discarded.
Policing Style The style of policing, if any, used (simple).
Redirect Forces a classified traffic stream to a specified egress port (physical port or LAG). This can occur in
addition to any marking or policing action. It may also be specified along with a QoS queue assignment.
This field does not display on Broadcom 5630x platforms.
If the policyname is not specified, this command displays a list of all defined DiffServ policies. The following fields are
displayed.
Parameter Description
Policy Name The name of this policy. (The order in which the policies are displayed is not necessarily the same order in which
they were created.)
Policy Type The policy type (only inbound is supported).
Class Members List of all class names associated with this policy.
Example: The following shows example command output, showing Committed Rate and Peak Rate in Kb/s.
(Routing)#show policy-map p3
Policy Name.................................... p3
Policy Type.................................... In
Class Name..................................... c1
Redirect....................................... Te2/0/20
Policing Style................................. Police Two Rate
Committed Rate (Kbps).......................... 50000
Committed Burst Size........................... 128
Peak Rate (Kbps)............................... 80000
Peak Burst Size................................ 128
Conform Action................................. Mark IP DSCP
Conform DSCP Value............................. 56(cs7)
Exceed Action.................................. Drop
Non-Conform Action............................. Drop
Conform Color Mode............................. Blind
Exceed Color Mode.............................. Blind
Example: The following shows a second example of command output, showing Committed Rate and Peak Rate as
percentages.
(Routing)#show policy-map p6
Policy Name.................................... p6
Policy Type.................................... In
Class Name..................................... c1
Redirect....................................... Te2/0/20
Policing Style................................. Police Two Rate
Committed Rate (%)............................. 50
Committed Burst Size........................... 128
Peak Rate (%).................................. 80
Peak Burst Size................................ 128
Conform Action................................. Mark IP DSCP
Conform DSCP Value............................. 56(cs7)
Exceed Action.................................. Drop
Non-Conform Action............................. Drop
Conform Color Mode............................. Blind
Exceed Color Mode.............................. Blind
Example: The following shows example CLI display output including the mark-cos-as-sec-cos option specified in
the policy action.
(Routing) #show policy-map p1
Policy Name.................................... p1
Policy Type.................................... In
Class Name..................................... c1
Mark CoS as Secondary CoS...................... Yes
Example: The following shows example CLI display output including the mark-cos-as-sec-cos action used in the policing
(simple-police, police-single-rate, police two-rate) command.
(Routing) #show policy-map p2
Policy Name....................... p2
Policy Type....................... In
Class Name........................ c2
Policing Style.................... Police Two Rate
Committed Rate.................... 1
Committed Burst Size.............. 1
Peak Rate......................... 1
Peak Burst Size................... 1
Parameter Description
DiffServ Admin Mode The current setting of the DiffServ administrative mode. An attached policy is only in effect on an interface
while DiffServ is in an enabled mode.
Interface slot/port
Direction The traffic direction of this interface service.
Operational Status The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface in the indicated direction.
Policy Details Attached policy details, whose content is identical to that described for the show policy-map
policymapname command (content not repeated here for brevity).
Parameter Description
DiffServ Mode The current setting of the DiffServ administrative mode. An attached policy is only active on an interface while
DiffServ is in an enabled mode.
The following information is repeated for interface and direction (only those interfaces configured with an attached policy are
shown).
Parameter Description
Interface slot/port
Direction The traffic direction of this interface service.
OperStatus The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface in the indicated direction.
NOTE: This command is only allowed while the DiffServ administrative mode is enabled.
Parameter Description
Interface The port or LAG associated with the policy.
Direction The traffic direction of this interface service.
Operational Status The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface in the indicated direction.
The following information is repeated for each class instance within this policy.
Parameter Description
Class Name The name of this class instance.
In Discarded Packets A count of the packets discarded for this class instance for any reason due to DiffServ treatment of the
traffic class.
In Offered Packets A count of the inbound offered packets for the specified policy class instance.
The following information is repeated for each interface and direction (only those interfaces configured with an attached
policy are shown).
Parameter Description
Interface The interface associated with the service policy.
Operational Status The current operational status of this DiffServ service interface.
Policy Name The name of the policy attached to the interface.
For the Broadcom 5630x platform, if you configure an IP ACL on an interface, you cannot configure a MAC ACL on the
same interface.
NOTE: EFOS supports ACL counters for MAC, IPv4, and IPv6 access lists. For information about how to enable the
counters, see the access-list counters enable command.
If a MAC ACL by this name already exists, this command enters Mac-Access-List config mode to allow updating the existing
MAC ACL.
NOTE: The CLI mode changes to Mac-Access-List Config mode when you successfully execute this command.
This command fails if a MAC ACL by the name newname already exists.
NOTE: If the generated sequence number exceeds the maximum sequence number, the ACL rule creation fails and an
informational message is displayed.
Default 10
Format mac access-list resequence {name|id} starting-sequence-number increment
Mode Global Config
Parameter Description
starting-sequence-number The sequence number from which to start. The range is 1 to 2,147,483,647. The default is 10.
increment The amount to increment. The range is 1 to 2,147,483,647. The default is 10.
NOTE:
An implicit deny all MAC rule always terminates the access list.
For BCM5630x and BCM5650x based systems, assign-queue, redirect, and mirror attributes are configurable
for a deny rule, but they have no operational effect.
The sequence-number specifies the sequence number for the ACL rule. The sequence number is specified by the user or
is generated by device.
If a sequence number is not specified for the rule, a sequence number that is 10 greater than the last sequence number in
ACL is used and this rule is placed in the end of the list. If this is the first ACL rule in the given ACL, a sequence number of
10 is assigned. If the calculated sequence number exceeds the maximum sequence number value, the ACL rule creation
fails. A rule cannot be created that duplicates an already existing one and a rule cannot be configured with a sequence
number that is already used for another rule.
For example, if user adds new ACL rule to ACL without specifying a sequence number, it is placed at the bottom of the list.
By changing the sequence number, the user can move the ACL rule to a different position in the ACL.
The Ethertype may be specified as either a keyword or a 4-digit hexadecimal value from 0x0600-0xFFFF. The currently
supported ethertypekey values are: appletalk, arp, ibmsna, ipv4, ipv6, ipx, mplsmcast, mplsucast, netbios, novell,
pppoe, rarp. Each of these translates into its equivalent Ethertype values.
The vlan and cos parameters refer to the VLAN identifier and 802.1p user priority fields, respectively, of the VLAN tag. For
packets containing a double VLAN tag, this is the first (or outer) tag.
The time-range parameter allows imposing time limitation on the MAC ACL rule as defined by the parameter
time-range-name. If a time range with the specified name does not exist and the MAC ACL containing this ACL rule is
applied to an interface or bound to a VLAN, then the ACL rule is applied immediately. If a time range with specified name
exists and the MAC ACL containing this ACL rule is applied to an interface or bound to a VLAN, the ACL rule is applied when
the time-range with specified name becomes active. The ACL rule is removed when the time-range with specified name
becomes inactive. For information about configuring time ranges, see Section 12.11, Time Range Commands for Time-
Based ACLs.
The assign-queue parameter allows specification of a particular hardware queue for handling traffic that matches this rule.
The allowed queue-id value is 0-(n-1), where n is the number of user configurable queues available for the hardware
platform. The assign-queue parameter is valid only for a permit rule.
For the Broadcom 5650x platform, the mirror parameter allows the traffic matching this rule to be copied to the specified
slot/port, while the redirect parameter allows the traffic matching this rule to be forwarded to the specified slot/port.
The assign-queue and redirect parameters are only valid for a permit rule.
NOTE:
The mirror and redirect parameters are not available on the Broadcom 5630x platform.
The special command form {deny | permit} any any is used to match all Ethernet Layer 2 packets, and is
the equivalent of the IP access list “match every” rule.
The permit command’s optional attribute rate-limit allows you to permit only the allowed rate of traffic as per the
configured rate in Kb/s, and burst-size in kilobytes.
The sflow-remote-agent parameter configures the sFlow sampling action. This action, if configured, copies the packet
matching the rule to the remote sFlow agent.
12.7.4.0.1 no sequence-number
Use this command to remove the ACL rule with the specified sequence number from the ACL.
Format no sequence-number
Mode MAC-Access-List Config
An optional sequence number may be specified to indicate the order of this mac access list relative to other mac access lists
already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number
is already in use for this interface and direction, the specified mac access list replaces the currently attached mac access
list using that sequence number. If the sequence number is not specified for this command, a sequence number that is one
greater than the highest sequence number currently in use for this interface and direction is used.
This command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is
applied to all interfaces. The VLAN keyword is only valid in the Global Config mode. The Interface Config mode command
is only available on platforms that support independent per-port class of service queue configuration.
An optional control-plane is specified to apply the MAC ACL on CPU port. The control packets like BPDU are also dropped
because of the implicit deny all rule added to the end of the list. To overcome this, permit rules must be added to allow the
control packets.
NOTE:
The keyword control-plane is only available in Global Config mode.
The availability of the out option is platform-dependent.
Parameter Description
name The name of the Access Control List.
sequence A optional sequence number that indicates the order of this IP access list relative to the other IP access lists
already assigned to this interface and direction. The range is 1 to 4,294,967,295.
vlan-id A VLAN ID associated with a specific IP ACL in a given direction.
12.7.6 remark
This command adds a new comment to the ACL rule.
Use the remark keyword to add comments (remarks) to ACL rule entries belonging to an IPv4, IPv6, MAC, or ARP ACL.
Up to L7_ACL_MAX_RULES_PER_LIST*10 remarks per ACL and up to 10 remarks per ACL rule can be configured. Also,
up to L7_ACL_MAX_RULES*2 remarks for all QOS ACLs(IPv4/IPv6/MAC) for device can be configured. The total length of
the remark cannot exceed 100 characters. A remark can contain characters in the range A-Z, a-z, 0-9, and special characters
like space, hyphen, underscore. Remarks are associated to the ACL rule that is immediately created after the remarks are
created. If the ACL rule is removed, the associated remarks are also deleted. Remarks are shown only in show running-
config and are not displayed in show ip access-lists.
Remarks can only be added before creating the rule. If a user creates up to 10 remarks, each of them is linked to the next
created rule.
Default none
Format remark comment
Mode IPv4-Access-List Config
IPv6-Access-List-Config
MAC-Access-List Config
ARP-Access-List Config
Example:
(Config)#arp access-list new
(Config-arp-access-list)#remark “test1”
(Config-arp-access-list)#permit ip host 1.1.1.1 mac host 00:01:02:03:04:05
(Config-arp-access-list)#remark “test1”
(Config-arp-access-list)#remark “test2”
(Config-arp-access-list)#remark “test3”
(Config-arp-access-list)#permit ip host 1.1.1.2 mac host 00:03:04:05:06:07
(Config-arp-access-list)#permit ip host 2.1.1.2 mac host 00:03:04:05:06:08
(Config-arp-access-list)#remark “test4”
(Config-arp-access-list)#remark “test5”
(Config-arp-access-list)#permit ip host 2.1.1.3 mac host 00:03:04:05:06:01
12.7.6.0.1 no remark
Use this command to remove a remark from an ACL access-list.
When the first occurrence of the remark in ACL is found, the remark is deleted. Repeated execution of this command with
the same remark removes the remark from the next ACL rule that has the remark associated with it (if there is any rule
configured with the same remark). If there are no more rules with this remark, an error message is displayed
If there is no such remark associated with any rule and such remark is among not associated remarks, it is removed.
Default none
Format no remark comment
Mode IPv4-Access-List Config
IPv6-Access-List-Config
MAC-Access-List Config
ARP-Access-List Config
For ACL with multiple rules, when a match occurs at any one specific rule, counters associated with this rule only get
incremented (for example, consider an ACL with three rules, after matching rule two, counters for rule three would not be
incremented).
For ACL counters, If an ACL rule is configured without RATE-LIMIT, the counter value is count of forwarded/discarded
packets. (For example: For a burst of 100 packets, the Counter value is 100).
If the ACL rule is configured with RATE LIMIT, the counter value is the MATCHED packet count. If the sent traffic rate
exceeds the configured limit, the counters still display matched packet count (despite getting dropped beyond the configured
limit since match criteria is met) which would equal the sent rate. For example, if rate limit is set to 10 kb/s and ‘matching’
traffic is sent at 100 kb/s, counters reflect a 100 kb/s value. If the sent traffic rate is less than the configured limit, counters
display only the matched packet count. Either way, only the matched packet count is reflected in the counters, irrespective
of whether they get dropped or forwarded. ACL counters do not interact with diffserv policies.
Use the access list name to display detailed information of a specific MAC ACL.
NOTE: The command output varies based on the match criteria configured within the rules of an ACL.
The command displays downloadable MAC ACLs. When access-list is configured as downloadable ACL, the show mac
access-lists command displays an additional tag (#d) next to the original ACL name. The downloadable MAC ACLs are
shown only in the show mac access-lists command and are not displayed in the show running-config command.
For example, if the ACL is created with the name dynacl, this command displays the ACL name as dynacl#d.
The output of the show mac access-lists command is enhanced to display up to 255-length character ACL names.
Parameter Description
ACL Name The user-configured name of the ACL.
ACL Counters Identifies whether the ACL counters are enabled or disabled.
Interfaces The inbound or outbound interfaces to which the ACL is applied.
Sequence Number The ordered rule number identifier defined within the MAC ACL.
Action The action associated with each rule. The possible values are Permit or Deny.
Parameter Description
Source MAC Address The source MAC address for this rule.
Source MAC Mask The source MAC mask for this rule.
Destination MAC Address The destination MAC address for this rule.
Ethertype The Ethertype keyword or custom value for this rule.
VLAN ID The VLAN identifier value or range for this rule.
COS The COS (802.1p) value for this rule.
Log Displays when you enable logging for the rule.
Assign Queue The queue identifier to which packets matching this rule are assigned.
Mirror Interface On Broadcom 5650x platforms, the unit/slot/port to which packets matching this rule are copied.
Redirect Interface On Broadcom 5650x platforms, the slot/port to which packets matching this rule are forwarded.
sFlow Remote Agent Indicates whether the sFlow sampling action is configured.
This action, if configured, copies the packet matching the rule to the remote sFlow agent.
Time Range Name Displays the name of the time-range if the MAC ACL rule has referenced a time range.
Rule Status Status (Active/Inactive) of the MAC ACL rule.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
ACL Hit Count The ACL rule hit count of packets matching the configured ACL rule within an ACL.
Example: The following shows example CLI display output for the command.
(Routing) #show mac access-lists mac1
Sequence Number: 10
Action.............................permit
Source MAC Address................ 00:00:00:00:AA:BB
Source MAC Mask....................FF:FF:FF:FF:00:00
Committed Rate.....................32
Committed Burst Size...............16
ACL hit count .....................0
Sequence Number: 25
Action.............................permit
Source MAC Address................ 00:00:00:00:AA:BB
Source MAC Mask....................FF:FF:FF:FF:00:00
Destination MAC Address........... 01:80:C2:00:00:00
Destination MAC Mask...............00:00:00:FF:FF:FF
Ethertype..........................ipv6
VLAN...............................36
CoS Value..........................7
Assign Queue.......................4
Redirect Interface.................0/34
sflow-remote-agent.................TRUE
Committed Rate.....................32
Committed Burst Size...............16
ACL hit count .....................0
Example: The following example shows sample output of a 255-length-character ACL name.
The maximum number of ACLs you can create is hardware dependent. The limit applies to all ACLs, regardless of type.
The maximum number of rules per IP ACL is hardware dependent.
On Broadcom 5630x platforms, if you configure a MAC ACL on an interface, you cannot configure an IP ACL on the
same interface.
Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a
subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are used for the network address,
and has zeros (0's) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in a bit position that
must be checked. A 1 in a bit position of the ACL mask indicates the corresponding bit can be ignored.
12.8.1 access-list
This command creates an IP Access Control List (ACL) that is identified by the access list number, which is 1-99 for standard
ACLs or 100-199 for extended ACLs. Table 18, ACL Command Parameters describes the parameters for the access-list
command.
IP Standard ACL.
Format access-list 1-99 {remark comment} | {[sequence-number]} [rule 1-1023] {deny | permit}
{every | srcip srcmask } [log] [time-range time-range-name][assign-queue queue-id]
[{mirror | redirect} slot/port] [redirectExtAgent agent-id] [rate-limit rate
burst-size]
Mode Global Config
IP Extended ACL.
NOTE: IPv4 extended ACLs have the following limitations for egress ACLs.
Match on port ranges is not supported.
The rate-limit command is not supported.
Parameter Description
remark comment Use the remark keyword to add a comment (remark) to an IP standard or IP extended
ACL. The remarks make the ACL easier to understand and scan. Each remark is limited
to 100 characters. A remark can consist of characters in the range A to Z, a to z, 0 to 9,
and special characters: space, hyphen, underscore. Remarks are displayed only in
show running configuration. One remark per rule can be added for IP standard or IP
extended ACL. User can remove only remarks that are not associated with a rule.
Remarks associated with a rule are removed when the rule is removed
sequence-number Specifies a sequence number for the ACL rule. Every rule receives a sequence number.
A sequence number is specified by the user or is generated by the device.
If a sequence number is not specified for the rule, a sequence number that is 10 greater
than the last sequence number in the ACL is used and this rule is located in the end of
the list. If this is the first ACL rule in the given ACL, a sequence number of 10 is
assigned. If the calculated sequence number exceeds the maximum sequence number
value, the ACL rule creation fails.
It is not allowed to create a rule that duplicates an already existing one and a rule cannot
be configured with a sequence number that is already used for another rule.
For example, if user adds new ACL rule to ACL without specifying a sequence number,
it is placed at the bottom of the list. By changing the sequence number, user can move
the ACL rule to a different position in the ACL.
1-99 or 100-199 Range 1 to 99 is the access list number for an IP standard ACL. Range 100 to 199 is
the access list number for an IP extended ACL.
[rule 1-1023] Specifies the IP access list rule.
{deny | permit} Specifies whether the IP ACL rule permits or denies an action.
NOTE: For 5630x and 5650x-based systems, assign-queue, redirect, and
mirror attributes are configurable for a deny rule, but they have no operational effect.
every Match every packet.
{eigrp | gre | icmp | igmp | ip | Specifies the protocol to filter for an extended IP ACL rule.
ipinip | ospf | pim | tcp | udp | 0
-255}
srcip srcmask|any|host scrip Specifies a source IP address and source netmask for match condition of the IP ACL
rule.
Specifying any specifies srcip as 0.0.0.0 and srcmask as 255.255.255.255.
Specifying host A.B.C.D specifies srcip as A.B.C.D and srcmask as 0.0.0.0.
Parameter Description
{{range{portkey|startport}{portkey| NOTE: This option is available only if the protocol is TCP or UDP.
endport}|{eq|neq|lt|gt} {portkey | Specifies the source layer 4 port match condition for the IP ACL rule. You can use the
0-65535}] port number, which ranges from 0 to 65535, or you specify the portkey, which can be
one of the following keywords.
For TCP: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet, www, pop2,
pop3.
For UDP: domain, echo, ntp, rip, snmp, tftp, time, and who.
For both TCP and UDP, each of these keywords translates into its equivalent port
number, which is used as both the start and end of a port range.
If range is specified, the IP ACL rule matches only if the layer 4 port number falls within
the specified portrange. The startport and endport parameters identify the first
and last ports that are part of the port range. They have values from 0 to 65535. The
ending port must have a value equal or greater than the starting port. The starting port,
ending port, and all ports in between will be part of the layer 4 port range.
When eq is specified, the IP ACL rule matches only if the layer 4 port number is equal
to the specified port number or portkey.
When lt is specified, IP ACL rule matches if the layer 4 port number is less than the
specified port number or portkey. It is equivalent to specifying the range as 0 to
<specified port number – 1>.
When gt is specified, the IP ACL rule matches if the layer 4 port number is greater than
the specified port number or portkey. It is equivalent to specifying the range as
<specified port number + 1> to 65535.
When neq is specified, IP ACL rule matches only if the layer 4 port number is not equal
to the specified port number or portkey.
Two rules are added in the hardware one with range equal to 0 to <specified port
number _- 1> and one with range equal to <<specified port number _+ 1 to 65535>>
NOTE: Port number matches only apply to unfragmented or first fragments.
dstip dstmask|any|host dstip Specifies a destination IP address and netmask for match condition of the IP ACL rule.
Specifying any implies specifying dstip as 0.0.0.0 and dstmask as 255.255.255.255.
Specifying host A.B.C.D implies dstip as A.B.C.D and dstmask as 0.0.0.0.
[precedence precedence | tos tos Specifies the TOS for an IP ACL rule depending on a match of precedence or DSCP
[tosmask] | dscp dscp] values using the parameters dscp, precedence, tos/tosmask.
NOTE: tosmask is an optional parameter.
flag [+fin | -fin] [+syn | -syn] NOTE: This option is available only if the protocol is tcp.
[+rst | -rst] [+psh | -psh] [+ack | Specifies that the IP ACL rule matches on the TCP flags.
-ack] [+urg | -urg] [established] When +<tcpflagname> is specified, a match occurs if the specified <tcpflagname>
flag is set in the TCP header.
When -<tcpflagname> is specified, a match occurs if the specified <tcpflagname>
flag is not set in the TCP header.
When established is specified, a match occurs if the specified RST or ACK bits are set
in the TCP header. Two rules are installed in the hardware when the established option
is specified.
Parameter Description
[icmp-type icmp-type [icmp-code NOTE: This option is available only if the protocol is icmp.
icmp-code] | icmp-message Specifies a match condition for ICMP packets.
icmp-message] When icmp-type is specified, the IP ACL rule matches on the specified ICMP
message type, a number from 0 to 255.
When icmp-code is specified, the IP ACL rule matches on the specified ICMP
message code, a number from 0 to 255.
Specifying icmp-message implies that both icmp-type and icmp-code are
specified. The following icmp-messages are supported: echo, echo-reply,
host-redirect, mobile-redirect, net-redirect, net-unreachable,
redirect, packet-too-big, port-unreachable, source-quench,
router-solicitation, router-advertisement, time-exceeded,
ttl-exceeded, and unreachable.
igmp-type igmp-type This option is available only if the protocol is igmp.
When igmp-type is specified, the IP ACL rule matches on the specified IGMP message
type, a number from 0 to 255.
fragments Specifies that the IP ACL rule matches on fragmented IP packets.
[log] Specifies that this rule is to be logged.
[time-range time-range-name] Allows imposing time limitation on the ACL rule as defined by the parameter
time-range-name. If a time range with the specified name does not exist and the ACL
containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL
rule is applied immediately. If a time range with specified name exists and the ACL
containing this ACL rule is applied to an interface or bound to a VLAN, the ACL rule is
applied when the time-range with specified name becomes active. The ACL rule is
removed when the time-range with specified name becomes inactive. For information
about configuring time ranges, see Section 12.11, Time Range Commands for Time-
Based ACLs.
[assign-queue queue-id] Specifies the assign-queue, which is the queue identifier to which packets matching this
rule are assigned.
[{mirror | redirect} slot/port] For Broadcom 5650x platforms, specifies the mirror or redirect interface which is the
slot/port to which packets matching this rule are copied or forwarded, respectively.
The mirror and redirect parameters are not available on the Broadcom 5630x
platform.
[rate-limit rate burst-size] Specifies the allowed rate of traffic as per the configured rate in Kb/s, and burst-size in
kilobytes.
[sflow-remote-agent] Configures the sFlow sampling action.
This action, if configured, copies the packet matching the rule to the remote sFlow
agent.
12.8.1.0.1 no access-list
This command deletes an IP ACL that is identified by the parameter accesslistnumber from the system. The range for
accesslistnumber is 1–99 for standard access lists and 100–199 for extended access lists.
Default enabled
Format access-list counters enable
Mode Global Config
12.8.3 ip access-list
This command creates an extended IP Access Control List (ACL) identified by name, consisting of classification fields
defined for the IP header of an IPv4 frame. The name parameter is a case-sensitive alphanumeric string from 1 to 255
characters uniquely identifying the IP access list.
If an IP ACL by this name already exists, this command enters IPv4-Access-List Config mode to allow updating the existing
IP ACL.
NOTE: The CLI mode changes to IPv4-Access-List Config mode when you successfully execute this command.
12.8.3.0.1 no ip access-list
This command deletes the IP ACL identified by name from the system.
NOTE: If the generated sequence number exceeds the maximum sequence number, the ACL rule creation fails and an
informational message is displayed.
Default 10
Format ip access-list resequence {name| id } starting-sequence-number increment
Mode Global Config
Parameter Description
starting-sequence-number The sequence number from which to start. The range is 1 to 2,147,483,647. The default is 10.
increment The amount to increment. The range is 1 to 2,147,483,647. The default is 10.
Format [sequence-number] {deny | permit} {every | {{eigrp | gre | icmp | igmp | ip | ipinip |
ospf | pim | tcp | udp | 0-255} {srcip srcmask | any | host srcip} [{range {portkey |
startport} {portkey | endport} | {eq | neq | lt | gt} {portkey | 0-65535} ] {dstip
dstmask | any | host dstip} [{range {portkey | startport} {portkey | endport} | {eq |
neq | lt | gt} {portkey | 0-65535} ] [flag [+fin | -fin] [+syn | -syn] [+rst | -rst]
[+psh | -psh] [+ack | -ack] [+urg | -urg] [established]] [icmp-type icmp-type [icmp-code
icmp-code] | icmp-message icmp-message] [igmp-type igmp-type] [fragments] [precedence
precedence | tos tos [ tosmask] | dscp dscp] | [ttl eq 0-255]}} [time-range
time-range-name] [log] [assign-queue queue-id] [{mirror | redirect} slot/port]
[rate-limit rate burst-size] [sflow-remote-agent]
Mode Ipv4-Access-List Config
NOTE:
An implicit deny all IP rule always terminates the access list.
For BCM5630x-based systems, the mirror and redirect parameters are not available.
For BCM5650x-based systems, the mirror parameter allows the traffic matching this rule to be copied to the
specified slot/port, while the redirect parameter allows the traffic matching this rule to be forwarded to the
specified slot/port. The assign-queue and redirect parameters are only valid for a permit rule.
For IPv4, the following are not supported for egress ACLs: a match on port ranges, the rate-limit
command.
The time-range parameter allows imposing time limitation on the IP ACL rule as defined by the specified time range. If a
time range with the specified name does not exist and the ACL containing this ACL rule is applied to an interface or bound
to a VLAN, then the ACL rule is applied immediately. If a time range with specified name exists and the ACL containing this
ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied when the time-range with specified name
becomes active. The ACL rule is removed when the time-range with specified name becomes inactive. For information about
configuring time ranges, see Section 12.11, Time Range Commands for Time-Based ACLs.
The assign-queue parameter allows specification of a particular hardware queue for handling traffic that matches this rule.
The allowed queue-id value is 0-(n-1), where n is the number of user configurable queues available for the hardware
platform. The assign-queue parameter is valid only for a permit rule.
The permit command’s optional attribute rate-limit allows you to permit only the allowed rate of traffic as per the
configured rate in kb/s, and burst-size in kbytes.
Parameter Description
sequence-number The sequence-number specifies the sequence number for the ACL rule.
The sequence number is specified by the user or is generated by device.
If a sequence number is not specified for the rule, a sequence number that
is 10 greater than the last sequence number in ACL is used and this rule
is placed at the end of the list. If this is the first ACL rule in the given ACL,
a sequence number of 10 is assigned. If the calculated sequence number
exceeds the maximum sequence number value, the ACL rule creation
fails. A rule cannot be created that duplicates an already existing one and
a rule cannot be configured with a sequence number that is already used
for another rule.
For example, if user adds new ACL rule to ACL without specifying a
sequence number, it is placed at the bottom of the list. By changing the
sequence number, the user can move the ACL rule to a different position
in the ACL.
{deny | permit} Specifies whether the IP ACL rule permits or denies the matching traffic.
Every Match every packet.
{eigrp | gre | icmp | igmp | ip | ipinip | ospf | pim | tcp | udp | 0 Specifies the protocol to match for the IP ACL rule.
-255}
srcip srcmask | any | host srcip Specifies a source IP address and source netmask to match for the IP ACL
rule.
Specifying any implies specifying srcip as 0.0.0.0 and srcmask as
255.255.255.255.
Specifying host A.B.C.D implies srcip as A.B.C.D and srcmask as
0.0.0.0.
Parameter Description
[{range {portkey | startport} {portkey | endport} | {eq | neq | lt | NOTE: This option is available only if the protocol is tcp or udp.
gt} {portkey | 0-65535} ] Specifies the layer 4 port match condition for the IP ACL rule. Port number
can be used, which ranges from 0-65535, or the portkey, which can be one
of the following keywords:
For tcp protocol: bgp, domain, echo, ftp, ftp-data, http, smtp, telnet,
www, pop2, pop3
For udp protocol: domain, echo, ntp, rip, snmp, tftp, time, who
Each of these keywords translates into its equivalent port number.
When range is specified, the IP ACL rule matches only if the layer 4 port
number falls within the specified port range. The startport and endport
parameters identify the first and last ports that are part of the port range.
They have values from 0 to 65535. The ending port must have a value
equal to or greater than the starting port. The starting port, ending port, and
all ports in between will be part of the layer 4 port range.
When eq is specified, IP ACL rule matches only if the layer 4 port number
is equal to the specified port number or portkey.
When lt is specified, IP ACL rule matches if the layer 4 port number is less
than the specified port number or portkey. It is equivalent to specifying the
range as 0 to <specified port number – 1>.
When gt is specified, IP ACL rule matches if the layer 4 port number is
greater than the specified port number or portkey. It is equivalent to
specifying the range as <specified port number + 1> to 65535.
When neq is specified, IP ACL rule matches only if the layer 4 port number
is not equal to the specified port number or port key. Two rules are added
in the hardware one with range equal to 0 to <specified port number _- 1>
and one with range equal to <<specified port number _+ 1 to 65535>>.
NOTE: Port number matches only apply to unfragmented or first
fragments.
dstip dstmask | any | host dstip Specifies a destination IP address and netmask for match condition of the
IP ACL rule.
Specifying any implies specifying dstip as 0.0.0.0 and dstmask as
255.255.255.255.
Specifying host A.B.C.D implies dstip as A.B.C.D and dstmask as 0.0.0.0.
[precedence precedence | tos tos [tosmask] | dscp dscp] Specifies the TOS for an IP ACL rule depending on a match of precedence
or DSCP values using the parameters dscp, precedence, tos/
tosmask.
tosmask is an optional parameter.
flag [+fin | -fin] [+syn | -syn] [+rst | -rst] [+psh | -psh] [+ack | - Specifies that the IP ACL rule matches on the tcp flags.
ack] [+urg | -urg] [established] When +<tcpflagname> is specified, a match occurs if specified
<tcpflagname> flag is set in the TCP header.
When -<tcpflagname> is specified, a match occurs if specified
<tcpflagname> flag is NOT set in the TCP header.
When established is specified, a match occurs if either the specified RST
or ACK bits are set in the TCP header. Two rules are installed in hardware
to when the established option is specified.
This option is available only if protocol is tcp.
Parameter Description
[icmp-type icmp-type [icmp-code icmp-code] | icmp-message NOTE: This option is available only if the protocol is ICMP.
icmp-message] Specifies a match condition for ICMP packets.
When icmp-type is specified, IP ACL rule matches on the specified ICMP
message type, a number from 0 to 255.
When icmp-code is specified, IP ACL rule matches on the specified ICMP
message code, a number from 0 to 255.
Specifying icmp-message implies both icmp-type and icmp-code are
specified. The following icmp-messages are supported: echo, echo-reply,
host-redirect, mobile-redirect, net-redirect, net-unreachable, redirect,
packet-too-big, port-unreachable, source-quench, router-solicitation,
router-advertisement, time-exceeded, ttl-exceeded and unreachable.
The ICMP message is decoded into corresponding ICMP type and ICMP
code within that ICMP type.
igmp-type igmp-type NOTE: This option is visible only if the protocol is IGMP.
When igmp-type is specified, the IP ACL rule matches on the specified
IGMP message type, a number from 0 to 255.
fragments Specifies that IP ACL rule matches on fragmented IP packets.
ttl eq Specifies that the IP ACL rule matches on packets with the specified Time
To Live (TTL) value.
log Specifies that this rule is to be logged.
time-range time-range-name Allows imposing a time limitation on the ACL rule as defined by the
parameter time-range-name. If a time range with the specified name does
not exist and the ACL containing this ACL rule is applied to an interface or
bound to a VLAN, the ACL rule is applied immediately. If a time range with
specified name exists and the ACL containing this ACL rule is applied to
an interface or bound to a VLAN, the ACL rule is applied when the time-
range with specified name becomes active. The ACL rule is removed
when the time-range with specified name becomes inactive.
assign-queue queue-id Specifies the assign-queue, which is the queue identifier to which packets
matching this rule are assigned.
{mirror | redirect} unit/slot/ port Specifies the mirror or redirect interface which is the unit/slot/port to which
packets matching this rule are copied or forwarded, respectively.
rate-limit rate burst-size Specifies the allowed rate of traffic as per the configured rate in Kb/s, and
burst-size in kilobytes.
sflow-remote-agent Configures the sFlow sampling action.
This action, if configured, copies the packet matching the rule to the
remote sFlow agent.
12.8.6.0.1 no sequence-number
Use this command to remove the ACL rule with the specified sequence number from the ACL.
Format no sequence-number
Mode Ipv4-Access-List Config
12.8.7 ip access-group
This command either attaches a specific IP ACL identified by accesslistnumber to an interface (including VLAN routing
interfaces), range of interfaces, or all interfaces; or associates it with a VLAN ID in a given direction. The parameter name is
the name of the Access Control List.
An optional sequence number may be specified to indicate the order of this IP access list relative to other IP access lists
already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number
is already in use for this interface and direction, the specified access list replaces the currently attached IP access list using
that sequence number. If the sequence number is not specified for this command, a sequence number that is one greater
than the highest sequence number currently in use for this interface and direction is used.
An optional control-plane is specified to apply the ACL on CPU port. The IPv4 control packets like RADIUS and
TACACS+ are also dropped because of the implicit deny all rule added at the end of the list. To overcome this, permit rules
must be added to allow the IPv4 control packets.
NOTE:
The keyword control-plane is only available in Global Config mode.
The out option may or may not be available, depending on the platform.
Default none
Format ip access-group {accesslistnumber|name} {{control-plane|in|out}|vlan vlan-id {in|out}}
[sequence 1-4294967295]
Modes Interface Config
Global Config
Parameter Description
accesslistnumber Identifies a specific IP ACL. The range is 1 to 199.
sequence A optional sequence number that indicates the order of this IP access list relative to the other IP access lists
already assigned to this interface and direction. The range is 1 to 4,294,967,295.
vlan-id A VLAN ID associated with a specific IP ACL in a given direction.
name The name of the Access Control List.
12.8.7.0.1 no ip access-group
This command removes a specified IP ACL from an interface.
Default none
Format no ip access-group {accesslistnumber|name} {{control-plane|in|out}|vlan vlan-id
{in|out}}
Mode Interface Config
Global Config
12.8.8 acl-trapflags
This command enables the ACL trap mode.
Default disabled
Format acl-trapflags
Mode Global Config
12.8.8.0.1 no acl-trapflags
This command disables the ACL trap mode.
Format no acl-trapflags
Mode Global Config
For ACL counters, if an ACL rule is configured without RATE-LIMIT, the counter value is count of forwarded/discarded
packets (for example, If burst of 100 packets sent from IXIA, the Counter value is 100).
If an ACL rule is configured with RATE LIMIT, the counter value will be the MATCHED packet count. If the sent traffic rate
exceeds the configured limit, counters will still display matched packet count (despite getting dropped beyond the configured
limit since match criteria is met) that would equal the sent rate. For example, if rate limit is set to 10 Kb/s and ‘matching’
traffic is sent at 100 Kb/s, counters would reflect 100 Kb/s value. If the sent traffic rate is less than the configured limit,
counters would display only matched packet count. Either way, only matched packet count is reflected in the counters,
irrespective of whether they get dropped or forwarded. ACL counters do not interact with DiffServ policies.
The command displays downloadable ACLs. When access-list is configured as downloadable ACL, the show ip
access-lists command displays an additional tag (#d) next to the original ACL name. The downloadable IPv4 ACLs are
shown only in the show ip access-lists command, and is not displayed in the show running-config command.
For example, if the ACL is created with the name dynacl, this command displays the ACL name as dynacl#d.
The output of the show ip access-lists command is enhanced to display up to 255-length-character ACL names.
Parameter Description
ACL Counters Shows whether ACL counters are enabled or disabled.
Current number of ACLs The number of ACLs of any type currently configured on the system.
Maximum number of ACLs The maximum number of ACLs of any type that can be configured on the system.
ACL ID/Name Identifies the configured ACL number or name.
Rules Identifies the number of rules configured for the ACL.
Parameter Description
Direction Shows whether the ACL is applied to traffic coming into the interface (ingress) or leaving the
interface (egress).
Interfaces Identifies the interfaces to which the ACL is applied (ACL interface bindings).
VLANs Identifies the VLANs to which the ACL is applied (ACL VLAN bindings).
redirectExtAgent Indicates whether matching flow packets are allowed to be sent to external applications running
alongside EFOS on a control CPU. agent-id is a unique identifier for the external receive client
application. agent-id is an integer in the range 1 to 100. The redirectExtAgent action is
mutually exclusive with the redirect and mirror actions.
NOTE: Only the access list fields that you configure are displayed.
Parameter Description
ACL ID The user-configured ACL identifier.
ACL Counters Identifies whether the ACL counters are enabled or disabled.
Interfaces The inbound or outbound interfaces to which the ACL is applied.
Sequence Number The number identifier for each rule that is defined for the IP ACL.
Action The action associated with each rule. The possible values are Permit or Deny.
Match All Indicates whether this access list applies to every packet. Possible values are True or False.
Protocol The protocol to filter for this rule.
Source IP Address The source IP address for this rule.
Source IP Mask The source IP Mask for this rule.
Source L4 Port Keyword The source port for this rule.
Destination IP Address The destination IP address for this rule.
Destination IP Mask The destination IP Mask for this rule.
Destination L4 Port Keyword The destination port for this rule.
IP DSCP The value specified for IP DSCP.
IP Precedence The value specified IP Precedence.
IP TOS The value specified for IP TOS.
Fragments Specifies whether the IP ACL rule matches on fragmented IP packets is enabled.
sFlow Remote Agent Indicates whether the sFlow sampling action is configured.
This action, if configured, copies the packet matching the rule to the remote sFlow agent.
TTL Field Value The value specified for the TTL.
Log Displays when you enable logging for the rule.
Assign Queue The queue identifier to which packets matching this rule are assigned.
Mirror Interface The slot/port to which packets matching this rule are copied.
Redirect Interface The slot/port to which packets matching this rule are forwarded.
Time Range Name Displays the name of the time-range if the IP ACL rule has referenced a time range.
redirectExtAgent Indicates whether matching flow packets are allowed to be sent to external applications running
alongside EFOS on a control CPU. agent-id is a unique identifier for the external receive client
application. agent-id is an integer in the range 1 to 100. The redirectExtAgent action is
mutually exclusive with the redirect and mirror actions.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
Rule Status Status (Active/Inactive) of the IP ACL rule.
Parameter Description
ACL Hit Count The ACL rule hit count of packets matching the configured ACL rule within an ACL.
Example: The following shows example CLI display output for the command.
(Routing) #show ip access-lists ip1
Sequence Number: 1
Action......................................... permit
Match All...................................... FALSE
Protocol....................................... 1(icmp)
ICMP Type.......................................3(Destination Unreachable)
Starting Source L4 port.........................80
Ending Source L4 port...........................85
Starting Destination L4 port....................180
Ending Destination L4 port......................185
ICMP Code.......................................0
Fragments.......................................FALSE
sflow-remote- agent............................ TRUE
Committed Rate................................. 32
Committed Burst Size........................... 16
ACL hit count ..................................0
Example: The following is an example show command for downloadable ACL.
(Routing) #show ip access-lists
Example: The following example shows sample output of 255 length character ACL name.
(dhcp-10-52-142-182)#show ip access-lists
ACL Counters: Enabled
Current number of ACLs: 19 Maximum number of ACLs: 100
Example: The following examples show the static and redirect ACL names reflected with the actual ACL name.
(Routing)#show ip access-lists
(Routing)#show ip access-lists
Parameter Description
ACL Type Type of access list (IP, IPv6 or MAC).
ACL ID Access List name for a MAC or IPv6 access list or the numeric identifier for an IP access list.
Sequence Number An optional sequence number may be specified to indicate the order of this access list relative to other access
lists already assigned to this interface and direction. A lower number indicates higher precedence order. If a
sequence number is already in use for this interface and direction, the specified access list replaces the currently
attached access list using that sequence number. If the sequence number is not specified by the user, a sequence
number that is one greater than the highest sequence number currently in use for this interface and direction is
used. Valid range is (1 to 4,294,967,295).
in|out in – Display Access List information for a particular interface and the in direction.
out – Display Access List information for a particular interface and the out direction.
Parameter Description
vlan-id A VLAN ID.
Parameter Description
in|out in – Display Access List information for a particular VLAN ID and the in direction.
out – Display Access List information for a particular VLAN ID and the out direction.
NOTE: EFOS supports ACL counters for MAC, IPv4, and IPv6 access lists. For information about how to enable the
counters, see the access-list counters enable command.
If an IPv6 ACL by this name already exists, this command enters IPv6-Access-List config mode to allow updating the existing
IPv6 ACL.
NOTE: The CLI mode changes to IPv6-Access-List Config mode when you successfully execute this command.
This command fails is an IPv6 ACL by the name newname already exists.
NOTE: If the generated sequence number exceeds the maximum sequence number, the ACL rule creation fails and an
informational message is displayed.
Default 10
Format ipv6 access-list resequence {name| id } starting-sequence-number increment
Mode Global Config
Parameter Description
starting-sequence-number The sequence number from which to start. The range is 1 to 2,147,483,647. The default is 10.
increment The amount to increment. The range is 1 to 2,147,483,647. The default is 10.
Format {deny | permit} {every | {{icmpv6 | ipv6 | tcp | udp | 0-255} {source-ipv6-prefix/
prefix-length | any | host source-ipv6-address} [{range {portkey | startport} {portkey
| endport} | {eq | neq | lt | gt} {portkey | 0-65535} ] {destination-ipv6-prefix/
prefix-length | any | host destination-ipv6-address} [{range {portkey | startport}
{portkey | endport} | {eq | neq | lt | gt} {portkey | 0-65535}] [flag [+fin | -fin]
[+syn | -syn] [+rst | -rst] [+psh | -psh] [+ack | -ack] [+urg | -urg] [established]]
[flow-label value] [icmp-type icmp-type [icmp-code icmp-code] | icmp-message
icmp-message] [routing] [fragments] [sequence sequence-number] [dscp dscp]}} [log]
[assign-queue queue-id] [{mirror | redirect} slot/port] [rate-limit rate burst-size]
[sflow-remote-agent]
Mode IPv6-Access-List Config
NOTE: An implicit deny all IPv6 rule always terminates the access list.
The time-range parameter allows imposing time limitation on the IPv6 ACL rule as defined by the parameter
time-range-name. If a time range with the specified name does not exist and the IPv6 ACL containing this ACL rule is
applied to an interface or bound to a VLAN, the ACL rule is applied immediately. If a time range with specified name exists
and the IPv6 ACL containing this ACL rule is applied to an interface or bound to a VLAN, the ACL rule is applied when the
time-range with specified name becomes active. The ACL rule is removed when the time-range with specified name
becomes inactive. For information about configuring time ranges, see Section 12.11, Time Range Commands for Time-
Based ACLs.
The assign-queue parameter allows specification of a particular hardware queue for handling traffic that matches this rule.
The allowed queue-id value is 0-(n-1), where n is the number of user configurable queues available for the hardware
platform. The assign-queue parameter is valid only for a permit rule.
For the Broadcom 5650x platform, the mirror parameter allows the traffic matching this rule to be copied to the specified
slot/port, while the redirect parameter allows the traffic matching this rule to be forwarded to the specified slot/port.
The assign-queue and redirect parameters are only valid for a permit rule.
NOTE: The mirror and redirect parameters are not available on the Broadcom 5630x platform.
The permit command’s optional attribute rate-limit allows you to permit only the allowed rate of traffic as per the
configured rate in Kb/s, and burst-size in KB.
The IPv6 access lists cannot be created with names reserved for dynamic ACLs (for example, IP-DACL-IN-,
IPv6-DACL-IN-).
Parameter Description
{deny | permit} Specifies whether the IPv6 ACL rule permits or denies the matching
traffic.
Every Specifies to match every packet.
{protocolkey | number} Specifies the protocol to match for the IPv6 ACL rule. The current
list is: icmpv6, ipv6, tcp, and udp.
source-ipv6-prefix/prefix-length | any | host Specifies a source IPv6 source address and prefix length to match
source-ipv6-address for the IPv6 ACL rule.
Specifying any implies specifying “::/0 “
Specifying host source-ipv6-address implies matching the
specified IPv6 address.
This source-ipv6-address argument must be in the form
documented in RFC 2373 where the address is specified in
hexadecimal using 16-bit values between colons.
Parameter Description
[{range {portkey | startport} {portkey | endport} NOTE: This option is available only if the protocol is TCP or UDP.
| {eq | neq | lt | gt} {portkey | 0-65535} ] Specifies the layer 4 port match condition for the IPv6 ACL rule. A
port number can be used, in the range 0 to 65535, or the portkey,
which can be one of the following keywords:
For TCP: bgp, domain, echo, ftp, ftp-data, http, smtp,
telnet, www, pop2, pop3
For UDP: domain, echo, ntp, rip, snmp, tftp, time, who.
Each of these keywords translates into its equivalent port number.
When range is specified, IPv6 ACL rule matches only if the layer 4
port number falls within the specified portrange. The startport
and endport parameters identify the first and last ports that are
part of the port range. They have values from 0 to 65535. The
ending port must have a value equal or greater than the starting
port. The starting port, ending port, and all ports in between are part
of the layer 4 port range.
When eq is specified, IPv6 ACL rule matches only if the layer 4 port
number is equal to the specified port number or portkey.
When lt is specified, IPv6 ACL rule matches if the layer 4 port
number is less than the specified port number or portkey. It is
equivalent to specifying the range as 0 to <specified port number –
1>.
When gt is specified, IPv6 ACL rule matches if the layer 4 port
number is greater than the specified port number or portkey. It is
equivalent to specifying the range as <specified port number + 1> to
65535.
When neq is specified, IPv6 ACL rule matches only if the layer 4
port number is not equal to the specified port number or portkey.
Two rules are added in the hardware one with range equal to 0 to
<specified port number - 1> and one with range equal to <<specified
port number + 1 to 65535>>
destination-ipv6-prefix/prefix-length | any | host Specifies a destination IPv6 source address and prefix length to
destination-ipv6-address match for the IPv6 ACL rule.
Specifying any implies specifying “::/0 “
Specifying host destination-ipv6-address implies
matching the specified IPv6 address.
This destination-ipv6-address argument must be in the form
documented in RFC 2373 where the address is specified in
hexadecimal using 16-bit values between colons.
Parameter Description
sequence sequence-number Specifies a sequence number for the ACL rule. Every rule receives
a sequence number. The sequence number is specified by the user
or is generated by the device.
If a sequence number is not specified for the rule, a sequence
number that is 10 greater than the last sequence number in ACL is
used and this rule is placed at the end of the list. If this is the first
ACL rule in the given ACL, a sequence number of 10 is assigned. If
the calculated sequence number exceeds the maximum sequence
number value, the ACL rule creation fails. It is not allowed to create
a rule that duplicates an already existing one. A rule cannot be
configured with a sequence number that is already used for another
rule.
For example, if a user adds new ACL rule to ACL without specifying
a sequence number, it is placed at the bottom of the list. By
changing the sequence number, user can move the ACL rule to a
different position in the ACL
[dscp dscp] Specifies the dscp value to match for for the IPv6 rule.
flag [+fin | -fin] [+syn | -syn] [+rst | -rst] Specifies that the IPv6 ACL rule matches on the tcp flags.
[+psh | -psh] [+ack | -ack] [+urg | -urg] When +<tcpflagname> is specified, a match occurs if specified
[established] <tcpflagname> flag is set in the TCP header.
When “-<tcpflagname>” is specified, a match occurs if specified
<tcpflagname> flag is *NOT* set in the TCP header.
When established is specified, a match occurs if specified either
RST or ACK bits are set in the TCP header.
Two rules are installed in hardware to when “established” option is
specified.
This option is visible only if protocol is tcp.
[icmp-type icmp-type [icmp-code icmp-code] | icmp- NOTE: This option is available only if the protocol is icmpv6.
message icmp-message] Specifies a match condition for ICMP packets.
When icmp-type is specified, IPv6 ACL rule matches on the
specified ICMP message type, a number from 0 to 255.
When icmp-code is specified, IPv6 ACL rule matches on the
specified ICMP message code, a number from 0 to 255.
Specifying icmp-message implies both icmp-type and
icmp-code are specified. The following icmp-messages are
supported: destination-unreachable, echo-reply,
echo-request, header, hop-limit, mld-query,
mld-reduction, mld-report, nd-na, nd-ns, next-header,
no-admin, no-route, packet-too-big, port-unreachable,
router-solicitation, router-advertisement,
router-renumbering, time-exceeded, and unreachable.
The ICMP message is decoded into the corresponding ICMP type
and ICMP code within that ICMP type.
Fragments Specifies that IPv6 ACL rule matches on fragmented IPv6 packets
(packets that have the next header field set to 44).
Routing Specifies that IPv6 ACL rule matches on IPv6 packets that have the
routing extension header (the next header field is set to 43).
Log Specifies that this rule is to be logged.
Parameter Description
time-range time-range-name Allows imposing a time limitation on the ACL rule as defined by the
parameter time-range-name. If a time range with the specified
name does not exist and the ACL containing this ACL rule is applied
to an interface or bound to a VLAN, the ACL rule is applied
immediately. If a time range with the specified name exists and the
ACL containing this ACL rule is applied to an interface or bound to
a VLAN, the ACL rule is applied when the time-range with the
specified name becomes active. The ACL rule is removed when the
time-range with specified name becomes inactive.
assign-queue queue-id Specifies the assign-queue, which is the queue identifier to which
packets matching this rule are assigned.
{mirror | redirect} unit/slot/ port Specifies the mirror or redirect interface which is the unit/slot/port to
which packets matching this rule are copied or forwarded,
respectively.
rate-limit rate burst-size Specifies the allowed rate of traffic as per the configured rate in kb/
s, and burst-size in kbytes.
sflow-remote-agent Configures the sFlow sampling action.
This action, if configured, copies the packet matching the rule to the
remote sFlow agent.
12.9.4.0.1 no sequence-number
Use this command to remove the ACL rule with the specified sequence number from the ACL.
Format no sequence-number
Mode Ipv6-Access-List Config
An optional sequence number may be specified to indicate the order of this mac access list relative to other IPv6 access lists
already assigned to this interface and direction. A lower number indicates higher precedence order. If a sequence number
is already in use for this interface and direction, the specified IPv6 access list replaces the currently attached IPv6 access
list using that sequence number. If the sequence number is not specified for this command, a sequence number that is one
greater than the highest sequence number currently in use for this interface and direction is used.
This command specified in Interface Config mode only affects a single interface, whereas the Global Config mode setting is
applied to all interfaces. The vlan keyword is only valid in the Global Config mode. The Interface Config mode command is
only available on platforms that support independent per-port class of service queue configuration.
An optional control-plane is specified to apply the ACL on CPU port. The IPv6 control packets like IGMPv6 are also
dropped because of the implicit deny all rule added at the end of the list. To overcome this, permit rules must be added
to allow the IPv6 control packets.
NOTE:
The keyword control-plane is only available in Global Config mode.
The out option may or may not be available, depending on the platform.
Parameter Description
name The ACL name of the existing IPv6 ACL.
in|out The type of direction: inbound or outbound.
sequence-number The order of the access list relative to the other access list already assigned to this interface and direction.
This command displays information about the attributes icmp-type, icmp-code, fragments, routing, tcp flags, and source and
destination L4 port ranges. It displays committed rate, committed burst size and ACL rule hit count of packets matching the
configured ACL rule within an ACL. This counter value rolls-over on reaching the maximum value. There is a dedicated
counter for each ACL rule. ACL counters do not interact with PBR counters.
For ACLs with multiple rules, when a match occurs at any one specific rule, counters associated with this rule only get
incremented (for example, consider an ACL with three rules, after matching rule two, counters for rule three would not be
incremented).
For ACL counters, If an ACL rule is configured without RATE-LIMIT, the counter value is a count of the forwarded and
discarded packets. (For example, for a burst of 100 packets, the Counter value is 100.)
If an ACL rule is configured with RATE LIMIT, the counter value is that of the MATCHED packet count. If the sent traffic rate
exceeds the configured limit, the counters still display matched packet count (despite getting dropped beyond the configured
limit since match criteria is met) that equals the sent rate. For example, if the rate limit is set to 10 Kb/s and ‘matching’ traffic
is sent at 100 Kb/s, counters would reflect 100 Kb/s value. If the sent traffic rate is less than the configured limit, the counters
display only the matched packet count. Either way, only the matched packet count is reflected in the counters, irrespective
of whether they get dropped or forwarded. ACL counters do not interact with DiffServ policies.
The command displays downloadable IPv6 ACLs. When access-list is configured as downloadable ACL, the show ipv6
access-lists command displays an additional tag (#d) next to the original ACL name. The downloadable IPv6 ACLs are
shown only in the show ipv6 access-lists command, and are not displayed in the show running-config command.
For example, if the ACL is created with the name ipv6acl, this command displays the ACL name as ipv6acl#d.
The output of the show ipv6 access-lists command is enhanced to display up to 255-length-character ACL names.
Parameter Description
ACL Counters Shows whether ACL counters are enabled or disabled.
Current number of all ACLs The number of ACLs of any type currently configured on the system.
Maximum number of all ACLs The number of ACLs of any type that can be configured on the system.
IPv6 ACL Name The configured ACL name.
Rules The number of rules configured for the ACL.
Direction Shows whether the ACL is applied to traffic coming into the interface (inbound/ingress) or leaving
the interface (outbound/egress).
Interfaces Identifies the interfaces to which the ACL is applied (ACL interface bindings).
VLANs Identifies the VLANs to which the ACL is applied (ACL VLAN bindings).
NOTE: Only the access list fields that you configure are displayed. Thus, the command output varies based on the match
criteria configured within the rules of an ACL.
Parameter Description
ACL Name The user-configured name of the ACL.
ACL Counters Identifies whether the ACL counters are enabled or disabled.
Interfaces The inbound and/or outbound interfaces to which the ACL is applied.
Sequence Number The ordered rule number identifier defined within the IPv6 ACL.
Action The action associated with each rule. The possible values are Permit or Deny.
Match All Indicates whether this access list applies to every packet. Possible values are True or False.
Protocol The protocol to filter for this rule.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
Source IP Address The source IP address for this rule.
Source L4 Port Keyword The source port for this rule.
Destination IP Address The destination IP address for this rule.
Parameter Description
Destination L4 Port Keyword The destination port for this rule.
IP DSCP The value specified for IP DSCP.
Flow Label The value specified for IPv6 Flow Label.
Log Displays when you enable logging for the rule.
Assign Queue The queue identifier to which packets matching this rule are assigned.
Mirror Interface The slot/port to which packets matching this rule are copied.
Redirect Interface The slot/port to which packets matching this rule are forwarded.
Time Range Name Displays the name of the time-range if the IPv6 ACL rule has referenced a time range.
redirectExtAgent Indicates whether matching flow packets are allowed to be sent to external applications running
alongside EFOS on a control CPU. agent-id is a unique identifier for the external receive client
application. agent-id is an integer in the range 1 to 100. The redirectExtAgent action is mutually
exclusive with the redirect and mirror actions.
Committed Rate The committed rate defined by the rate-limit attribute.
Committed Burst Size The committed burst size defined by the rate-limit attribute.
Rule Status Status (Active/Inactive) of the IPv6 ACL rule.
sFlow Remote Agent Indicates whether the sFlow sampling action is configured.
This action, if configured, copies the packet matching the rule to the remote sFlow agent.
ACL Hit Count The ACL rule hit count of packets matching the configured ACL rule within an ACL.
Example: The following shows example CLI display output for the command.
(Routing) #show ipv6 access-lists ip61
Sequence Number: 1
Action......................................... deny
Match All...................................... FALSE
Protocol....................................... 6(tcp)
TCP Flags...................................... FIN (Ignore)
SYN (Set)
RST (Ignore)
PSH (Set)
ACK (Ignore)
URG (Ignore)
Log............................................ TRUE
Assign Queue................................... 2
sflow-remote-agent............................. TRUE
ACL hit count ............................0
Example: The following example shows sample output of 255-length-character ACL name.
3456789123456789123456789123456
7891234567891234567891234567891
2345678912345678912345678912345
6789123456789123456789123456789
1234567891234567891234567891234
5678912345678912345678912345678
9123456789123456789123456789123
4567891 0
MACALs can be applied only to in-band ports and cannot be applied to the service port.
Use the optional vrf parameter to associate the management access-list to a non-default VRF. The vrf-name can be up to
15 characters in length. Without the vrf parameter, the management access-list is associated to the default VRF.
Example: The following example shows how to configure two management interfaces: ethernet 0/1 and ethernet 0/9.
(Routing) (Config)#management access-list mlist
(Routing) (config-macal)#exit
(Routing) (Config)#
Example: The following example shows how to configure all the interfaces to be management interfaces except for two
interfaces: ethernet 0/1 and ethernet 0/9.
(Routing) (Config)#management access-list mlist
(Routing) (config-macal)#exit
Parameter Description
ethernet Ethernet port number.
ip-source Source IP address
port-channel Port-channel number.
priority Priority for rule.
service Service type condition, which can be one of the following keywords.
java
tftp
telnet
ssh
http
https
snmp
sntp
any
Example: The following example shows how to configure two management interfaces.
ethernet 0/1 and ethernet 0/9.
(Routing) (Config)#management access-list mlist
(Routing) (config-macal)#permit ethernet 0/1 priority 63
Example: The following shows example CLI display output for the command.
(Routing) #show management access-list
Rules:
Example: The following shows example CLI display output for the command.
(Routing) # show management access-class
12.11.1 time-range
Use this command to create a time range identified by name, consisting of one absolute time entry and one or more periodic
time entries. The name parameter is a case-sensitive, alphanumeric string from 1 to 31 characters that uniquely identifies
the time range. An alphanumeric string is defined as consisting of only alphabetic, numeric, dash, underscore, or space
characters.
If a time range by this name already exists, this command enters Time-Range config mode to allow updating the time range
entries.
NOTE: When you successfully execute this command, the CLI mode changes to Time-Range Config mode.
12.11.1.0.1 no time-range
This command deletes a time-range identified by name.
12.11.2 absolute
Use this command to add an absolute time entry to a time range. Only one absolute time entry is allowed per time-range.
The time parameter is based on the currently configured time zone.
The [start time date] parameters indicate the time and date at which the configuration that referenced the time range
starts going into effect. The time is expressed in a 24-hour clock, in the form of hours:minutes. For example, 8:00 is 8:00 am
and 20:00 is 8:00 pm. The date is expressed in the format day month year. If no start time and date are specified, the
configuration statement is in effect immediately.
The [end time date] parameters indicate the time and date at which the configuration that referenced the time range is
no longer in effect. The end time and date must be after the start time and date. If no end time and date are specified, the
configuration statement is in effect indefinitely.
12.11.2.0.1 no absolute
This command deletes the absolute time entry in the time range.
Format no absolute
Mode Time-Range Config
12.11.3 periodic
Use this command to add a periodic time entry to a time range. The time parameter is based off of the currently configured
time zone.
The first occurrence of the days-of-the-week argument is the starting days from which the configuration that referenced
the time range starts going into effect. The second occurrence is the ending day or days from which the configuration that
referenced the time range is no longer in effect. If the end days-of-the-week are the same as the start, they can be omitted
This argument can be any single day or combinations of days: Monday, Tuesday, Wednesday, Thursday, Friday, Saturday,
Sunday. Other possible values are:
daily—Monday through Sunday
If the ending days of the week are the same as the starting days of the week, they can be omitted.
The first occurrence of the time argument is the starting hours:minutes which the configuration that referenced the time
range starts going into effect. The second occurrence is the ending hours:minutes at which the configuration that referenced
the time range is no longer in effect.
The hours:minutes are expressed in a 24-hour clock. For example, 8:00 is 8:00 am and 20:00 is 8:00 pm.
12.11.3.0.1 no periodic
This command deletes a periodic time entry from a time range.
Parameter Description
Number of Time Ranges Number of time ranges configured in the system.
Time Range Name Name of the time range.
Time Range Status Status of the time range (active/inactive)
Absolute start Start time and day for absolute time entry.
Absolute end End time and day for absolute time entry.
Periodic Entries Number of periodic entries in a time-range.
Periodic start Start time and day for periodic entry.
Periodic end End time and day for periodic entry.
H.323
When a call-control protocol is detected, the switch assigns the traffic in that session to the highest CoS queue, which is
generally used for time-sensitive traffic.
The tc value is the traffic class used for protocol-based VoIP traffic. If the interface detects a call-control protocol, the device
assigns the traffic in that session to the configured Class of Service (CoS) queue. Traffic classes with a higher value are
generally used for time-sensitive traffic. The CoS queue associated with the specified traffic class should be configured with
the appropriate bandwidth allocation to allow priority treatment for VoIP traffic.
NOTE: You must enable tagging on auto VoIP enabled ports to remark the voice data upon egress.
Default none
Format auto-voip vlan vlan-id
Parameter Description
VoIP VLAN ID The global VoIP VLAN ID.
Prioritization Type The type of prioritization used on voice traffic.
Class Value If the Prioritization Type is configured as traffic-class, this value is the queue value.
If the Prioritization Type is configured as remark, then this value is IEEE 802.1p priority used to
remark the voice traffic.
Priority The IEEE 802.1p priority. This field is valid for OUI auto VoIP.
AutoVoIP Mode The Auto VoIP mode on the interface.
Example: The following shows example CLI display output for the command.
(Routing)# show auto-voip protocol-based interface all
13.1 Core
Table 19: BSP Log Messages
13.2 Utilities
Table 23: Trap Mgr Log Message
13.3 Management
Table 32: SNMP Log Message
13.4 Switching
Table 38: Protected Ports Log Messages
13.5 QoS
Table 49: ACL Log Messages
13.7 Multicast
Table 58: IGMP/MLD Log Messages
13.8 Technologies
Table 63: Broadcom Error Messages
Related Documents
The references in the following table may be used with this document.
NOTE: Broadcom provides customer access to technical documentation and software through its Customer Support Portal
(CSP) and Downloads and Support site.
For Broadcom documents, replace the “xx” in the document number with the largest number available in the repository to
ensure that you have the most current version of the document.
E H
eapol announcement 203 hardware profile portmode 436
efos-show 119 hardware-address 296
enable (BGP) 1109 host 297
enable (OSPF) 860 hostname 201
enable (OSPFv3) 968
show interfaces switchport 476, 477, 483 show ip dvmrp route 1040
show interfaces traffic-class-group 714 show ip extcommunity-list 1141
show ip access-lists 1245 show ip helper statistics 858
show ip address-conflict 321 show ip helper-address 857
show ip anycast 802 show ip http 117
show ip arp inspection 608 show ip igmp 1058
show ip arp inspection interfaces 610 show ip igmp groups 1059
show ip arp inspection statistics 609 show ip igmp interface 1059
show ip as-path-access-list 1187 show ip igmp interface membership 1060
show ip bgp 1138 show ip igmp interface stats 1061
show ip bgp aggregate-address 1140 show ip igmp-proxy 1063
show ip bgp community 1140 show ip igmp-proxy groups 1064
show ip bgp community-list 1141 show ip igmp-proxy groups detail 1065
show ip bgp listen range 1142 show ip igmp-proxy interface 1063
show ip bgp neighbors 1143 show ip interface 783
show ip bgp neighbors {received-routes | routes | rejected- show ip interface brief 785
routes} 1149 show ip irdp 821
show ip bgp neighbors advertised-routes 1147 show ip load-sharing 785
show ip bgp neighbors policy 1142, 1148 show ip mcast 1029
show ip bgp route-reflection 1150 show ip mcast boundary 1030
show ip bgp statistics 1151 show ip mcast interface 1030
show ip bgp summary 1152 show ip mcast mroute group 1034
show ip bgp template 1153 show ip mcast mroute source 1035
show ip bgp traffic 1154 show ip mcast mroute static 1035
show ip bgp update-group 1155 show ip mfc 1047
show ip bgp vpnv4 1157 show ip mroute 1030
show ip bgp vpnv4 statistics 1159 show ip ospf 886
show ip brief 780 show ip ospf abr 889
show ip community-list 1187 show ip ospf area 889
show ip device tracking all 683 show ip ospf asbr 891
show ip device tracking all count 684 show ip ospf database 891
show ip device tracking interface 684 show ip ospf database database-summary 892
show ip device tracking ip 685 show ip ospf interface 892
show ip device tracking mac 686 show ip ospf interface brief 894
show ip dhcp binding 308, 308 show ip ospf interface stats 894
show ip dhcp binding all 310 show ip ospf lsa-group 896
show ip dhcp binding vrf 309, 310 show ip ospf neighbor 896
show ip dhcp class configuration 315 show ip ospf range 898
show ip dhcp client statistics 781 show ip ospf statistics 899
show ip dhcp conflict 315 show ip ospf stub table 900
show ip dhcp global configuration 311 show ip ospf traffic 900
show ip dhcp pool configuration 311 show ip ospf virtual-link 901
show ip dhcp server statistics 313 show ip ospf virtual-link brief 902
show ip dhcp snooping 599 show ip pim 1048
show ip dhcp snooping binding 600 show ip pim bsr-router 1051
show ip dhcp snooping database 601 show ip pim interface 1049
show ip dhcp snooping interfaces 601 show ip pim neighbor 1050
show ip dhcp snooping statistics 601 show ip pim rp mapping 1052
show ip dvmrp 1038 show ip pim rp-hash 1051
show ip dvmrp interface 1038 show ip pim ssm 1048
show ip dvmrp neighbor 1039 show ip pim statistics 1053
show ip dvmrp nexthop 1040 show ip policy 816
show ip dvmrp prune 1040 show ip prefix-list 1188
W
watchdog clear 367
watchdog disable 367
watchdog enable 367
write core 358
write memory 279
Revision History
Section 3.7.8, ip http secure-protocol by modifying the command options, adding an example, and adding the no form
of the command.
Section 3.7.17, show ip http by adding parameters and example command output. Also modified the description of the
Secure Protocol Levels parameter.
Section 3.10.28, show passwords configuration. Modified by the Unlock a Locked Out User feature, which added two
parameters: Unlock Timer Mode, and Unlock Time (mins).
The DHCP Relay Option 82 feature modified the following commands:
EFOS 3.10 introduces support for deny lease and boot file name options for a DHCP class. The feature modifies the
following commands:
– Section 4.11.25, relay agent information remote-id circuit-id. Modified the command so that the Circuit-ID
configuration is optional.
– Section 4.11.42, show ip dhcp pool configuration. Modified the command to display the Deny Lease and Bootfile
configuration information.
– Section 4.11.43, show ip dhcp server statistics. Modified the command to add the DHCP DISCOVER packets denied
lease field to display the number of denied leases for a DHCP class. Also added an example of the command
output.
Section 4.19.10, sflow sampler rate by adding the option both, used to configure the sampling type as ingress and
egress.
Section 4.19.12, sflow source-interface by adding the parameters {serviceport} and {network}.
Section 4.19.19, show sflow source-interface by adding example CLI display output for the command.
Section 5.20.7, remote-span by modifying the command description for the ERSPAN enhancements feature.
Section 5.21, ERSPAN Source Switch Configuration Commands renamed section heading from ERSPAN Destination
Configuration Commands and updated the section description.
Section 5.21.3, ip address. Updated the note in the command description.
Section 5.21.11, reflector-port. Added a note that the command is only available in builds with the switching-only
package.
Section 5.31.9, show port-security. The Secure MAC Address Aging feature modified the command to display the aging
time configured on the port.
Section 5.34.4, dos-control tcpfrag. Modified the command description.
Section 7.10.1, vlan routing. Updated the Current System Time in the command example.
Section 7.14, IP Helper Commands. Support is added to configure IP Helper on an IP unnumbered interface.
Support is added for route-maps in OSPFv2 and modifies the following commands:
– Section 7.15.1.40, redistribute (OSPF) in Router OSPF Config mode to take the optional route-map parameter to
set OSPF attributes on a matching set of redistributed routes from other protocols.
– Section 7.15.5.1, show ip ospf to display the route-map information if configured for redistributing other protocol
routes into OSPF. The route-map name is displayed in the command output.
– Section 11.2.14, set metric (BGP) to set the route metric if used in the OSPF context.
Section 11.1.2, address-family. Removed the sentence “The activate command is not available in Address-family
IPv4 mode.” in the command description.
Updated the command mode of the following commands because, as part of the BGP CLI command tree
reorganization, the commands exist only in IPv4 Address Family Config and IPv6 Address Family Config modes:
– Section 11.1.8, bgp aggregate-different-meds.
– Section 11.1.9, bgp always-compare-med.
– Section 11.1.10, bgp bestpath as-path ignore.
– Section 11.1.11, bgp client-to-client reflection.
– Section 11.1.20, default-information originate.
– Section 11.1.21, default-metric.
– Section 11.1.22, neighbor default-originate.
– Section 11.1.24, distance bgp.
– Section 11.1.25, distribute-list prefix in.
– Section 11.1.26, distribute-list prefix out.
– Section 11.1.32, maximum-paths.
– Section 11.1.33, maximum-paths ibgp.
– Section 11.1.34, neighbor activate.
– Section 11.1.35, neighbor advertisement-interval.
– Section 11.1.40, neighbor filter-list.
– Section 11.1.43, neighbor maximum-prefix.
– Section 11.1.44, neighbor next-hop-self
– Section 11.1.48, neighbor remove-private-as.
– Section 11.1.50, neighbor route-map.
– Section 11.1.51, neighbor route-reflector-client.
– Section 11.1.53, neighbor send-community.
– Section 11.1.60, redistribute.
Added:
Section , ip ssh server algorithm hostkeyUse this command to specify the host key algorithms used to establish the
SSH connection. This command also defines the order of host key algorithms.. Use this command to specify the host
key algorithms used to establish the SSH connection.
Section 3.5.9, netconf ssh. Enables the Network Configuration Protocol (NETCONF) server over SSH.
Section 3.5.16, show netconf. Displays the NETCONF server status.
The Unlock a Locked Out User feature added the following commands:
– Section 3.10.25, passwords unlock timer. Use this command to configure the password unlock time.
– Section 3.10.26, passwords unlock timer mode. Use this command to configure the password unlock timer mode.
– Section 3.10.27, users passwd. Use this command to change a password.
Section 4.6.14, logging usb. Added by the USB Logging feature. Use this command to enable logging mode into the
USB flash drive for all log types and to change USB logging severity.
Section 4.9, Network Time Protocol Commands.
The ERSPAN enhancements feature added the following ERSPAN Source Switch Configuration commands:
– Section 5.21.9, nexthop mac. Use this command to configure the nexthop mac address.
– Section 5.21.10, nexthop vlan. Use this command to configure the nexthop VLAN ID.
Section 5.23.8, dhcp l2relay trust no-option-82 update. Added by the DHCP Relay Option 82 feature. Use this
command to configure an update action on trusted ports.
Section 5.31.2, port-security aging time. Added by the Secure MAC Address Aging feature. Configures aging time that
defines the inactive duration of the dynamically-locked MAC addresses on an interface.
Section 5.34.20, dos-control vlan0tagged-snap. Enables Vlan0 tagged and snap mode to forward or drop Vlan0-tagged
packets and snap packets for security measures.
Support is added for route-maps in OSPFv2 and adds the following commands:
– Section 7.7.6, match metric.
– Section 7.7.7, match metric-type.
– Section 7.7.8, match tag.
– Section 7.7.13, set tag.
– Section 7.15.1.32, distribute-list route-map in (OSPF).
– Section 11.2.15, set metric-type.
Removed:
Section 4.9 Simple Network Time Protocol Commands to reflect that SNTP is removed and replaced with NTP. See
Section 4.9, Network Time Protocol Commands.
The following Section 5.20, Port Mirroring command is deprecated in the EFOS 8.10 release:
– Section 5.21.11 monitor session type erspan-destination. This command configures an ERSPAN destination session
number and enters ERSPAN Destination Session Configuration mode for the session.
Section 5.21.4, erspan-id. Removed this note: The same ERSPAN flow ID must also be configured in the ERSPAN
destination session configuration.
Section 5.22.2 The ERSPAN Source Configuration Commands are deprecated in the EFOS 8.10 release and include
the following commands:
– Section 5.22.2.1 destination interface. This command configures the destination interface (probe port) for the
selected ERSPAN monitor session.
– Section 5.22.2.2 source. This command enters the ERSPAN Destination Session Source Configuration Mode.
– Section 5.22.2.3 ip address. This command configures the ERSPAN destination IP address.
– Section 5.22.2.4 erspan-id. This command configures the ERSPAN flow ID number used by the source and
destination sessions to identify the ERSPAN traffic.
The following Section 11.1, BGP Commands are deprecated in this release:
– Section 11.1.58, neighbor filter-list command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.61, neighbor inherit peer command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.63, neighbor local-as command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.64, neighbor maximum-prefix command in BGP Router Config mode.
– Section 11.1.65, neighbor maximum-prefix command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.67, neighbor next-hop-self command in BGP Router Config mode.
– Section 11.1.68, neighbor next-hop-self command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.71, neighbor password command in IPv4 VRF Address Family Config.
– Section 11.1.72, neighbor prefix-list command in IPv4 VRF Address Family Config and IPv6 Address Family Config
modes.
– Section 11.1.74, neighbor remove-private-as command in BGP Router Config mode.
– Section 11.1.75, neighbor remove-private-as command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.78, neighbor route-map command in BGP Router Config mode.
– Section 11.1.79, neighbor route-map command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.81, neighbor route-reflector-client command in BGP Router Config mode.
– Section 11.1.82, neighbor route-reflector-client command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.85, neighbor send-community command in BGP Router Config mode.
– Section 11.1.86, neighbor send-community command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.88, neighbor shutdown command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.90, neighbor timers command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.92, neighbor update-source command in IPv4/IPv6 VRF Address Family Config modes.
– Section 11.1.94, network command in IPv6 Address Family Config mode.
Removed Table 29: SNTP Log Message.
Section 3.5.11, show ip ssh, updated the command output and parameter descriptions.
RSA and DSA key lengths can be configured. See the following modified commands:
– Section 3.10.1, username (Global Config), updated the encryption-type parameter description.
– Section 3.10.9, password (Line Configuration).
– Section 3.10.11, enable password.
Section 3.10.13, passwords history, added a note about password encryption type.
Section 3.12.19, radius server host, updated the command by adding the usage parameter.
Section 3.12.19, radius server host, added the usage parameter.
Static and redirect ACL names are reflected with the actual ACL name. See the following modified commands:
The feature to support port-channels/LAG interface as a reflector port on an RSPAN source switch modifies the
Section 5.22.1.9, reflector-port command.
Section 7.12.4, preempt. Corrected the command format and parameter description by replacing centiseconds with
seconds.
The feature to support DHCPv6 Server to function in a VRF environment modifies the following commands:
– Section 3.2.18, ipv6 dhcp relay.
– Section 8.5.1, service dhcpv6.
– Section 8.5.3, ipv6 dhcp conflict logging.
– Section 8.5.4, ipv6 dhcp server. Added support to have a dedicated automatic pool per VRF.
– Section 8.5.12, show ipv6 dhcp
– Section 8.5.13, show ipv6 dhcp statistics.
– Section 8.5.15, show ipv6 dhcp binding.
– Section 8.5.16, show ipv6 dhcp conflict.
– Section 8.5.21, clear ipv6 dhcp binding.
– Section 8.5.22, clear ipv6 dhcp conflict.
Added:
The disabling ciphers to allow for security scans feature adds the following commands:
Section 3.6.4, crypto key encrypt write command to encrypt key files with a user-provided passphrase.
Section 3.6.5, crypto key decrypt write command to decrypt key files with the user-provided passphrase.
Section 3.7.6, ip http secure-ciphersuite.
The link down event logging feature adds Section 4.5.17, show interfaces diag. The command enhances debugging
capabilities of the system to give more information for Link Down or Link Flap scenarios.
The feature to support DHCPv6 client to operate in a VRF domain adds the Section 4.14.48, debug ipv6 dhcp packet
command.
The feature to support DHCPv6 server to function in a VRF environment adds the following commands:
Removed:
The command username <name> password <password> level <level> encrypted [override-
complexity-check] is deprecated in EFOS release 8.9. This command displays the password in running-
configuration in encrypted mode for the default encryption type. For more information, see Section 3.10.1, username
(Global Config).
The command password <password> encrypted is deprecated in EFOS release 8.9. This command displays the
password in running-configuration in encrypted mode for the default encryption type. For more information, see
Section 3.10.9, password (Line Configuration).
The command enable password <password> encrypted is deprecated in EFOS release 8.9. This command
displays the password in running-configuration in encrypted mode for the default encryption type. For more information,
see Section 3.10.11, enable password.
The clear pass command which resets all user passwords to the factory defaults without powering off the switch.
– Modified the command username username password to no longer accept plain text format and added an
example.
– Added a note to the level parameter description that, if Privilege level = 1 (Read-Only), users will not be able to
enter Privilege Exec mode.
– Modified the command description to state that script files or config files that have username commands with a plain
text password in the command line will fail. Added examples for configuring users with encrypted passwords, and
with plain text passwords.
Section 3.10.9, password (Line Configuration). Modified the command to no longer accept plain text format. Added
examples for configuring users with encrypted passwords, and with plain text passwords.
Section 3.10.11, enable password. Modified the command to no longer accept plain text format. Added examples for
configuring users with encrypted passwords, and with plain text passwords.
The MAC Notification feature modifies the following commands:
– Section 3.11.16, snmp-server user, modified the command format and mode, adding the keyword noauth for SNMP
users without authentication and encryption.
– Section 4.5.18, show mac-addr-table, modified the command description and format.
The VRF Support for Management Services feature for SNMP Traps modified the Section 3.11.23, show snmp, adding
an example configuring the management VRF for SNMP-traps as VRF red.
Section 4.5.13, show interface. Modified the command by adding the keyword all and added an example.
Section 4.5.27, show sysinfo. Added the noMibs option to show system information without MIBs information.
The VRF Support for Management Services feature for Syslog Server Communication modified the
Section 4.6.14, show logging command, adding the Syslog Logging VRF Name field to the display:
Modified the following commands to specify the time period for which the logs are to be displayed:
– Section 4.11.10, ntp. Modified this command to configure two NTP servers in a DHCP pool in the boot process of a
DHCP client.
– Section 4.11.42, show ip dhcp pool configuration. Modified this command by adding information about the configured
Class and NTP servers. Added class, IP Range From, and IP Range To parameters and descriptions. Also added
a command example.
The VRF Support for Management Services feature for DNS Client modified the following commands:
– Section 4.12.1, ip domain lookup. Added the optional vrf argument to enable the lookup within a VRF.
– Section 4.12.2, ip domain name. Added the optional vrf argument to define a default domain name within a VRF.
– Section 4.12.3, ip domain list. Added the optional vrf argument to define a list of default domain names in a VRF.
– Section 4.12.4, ip name-server. Added the optional vrf argument to configure a set of name servers within a VRF.
– Section 4.12.5, ip name source-interface. Added the optional vrf argument to set the source-interface for DNS
queries within a VRF.
– Section 4.12.6, ip host. Added the optional vrf argument to configure a static host name to address mapping within
a VRF.
– Section 4.12.9, clear host. Added the optional vrf argument to clear the host entries within a VRF.
– Section 4.12.10, show hosts. Added the optional vrf argument to display the host entries within a VRF.
Section 5.33.3, lldp timers. Corrected the range for reinit-seconds to 1 to 10 seconds, and the range for
interval-seconds to 5 to 32768 seconds.
Section 5.37, ISDP Commands. Modified the section description with “The Address TLV in ISDP sends and interprets
IPv6 addresses.”
Section 8.4, OSPFv3 Commands Effective with EFOS release 8.8, OSPFv3 is enhanced to be VRF aware.
The IPv6 VRF Support feature for OSPFv3 modifies the following commands:
– Section 4.14.50, debug ipv6 ospfv3 packet is modified by adding the optional vrf argument to enable tracing of
OSPFv3 packets received and transmitted in the specified virtual router instance.
– Section 7.2.33, show ip route summary is modified to display the route table summary for a virtual router instance.
Also added an example of the display output.
– Section 8.3.7, ipv6 route is modified to configure an IPv6 static route in a default or non-default VRF instance.
– Section 8.3.8, ipv6 route distance is modified to set the default distance (preference) for IPv6 static routes in a
default or non-default VRF instance.
– Section 8.3.24, ipv6 neighbor is modified by adding the optional argument vrf which creates the neighbor in the
VRF instance.
– Section 8.3.31, show ipv6 brief is modified by adding the optional vrf argument to display the IPv6 status summary
belonging to a virtual router.
– Section 8.3.32, show ipv6 interface is modified by adding the optional argument vrf to display the IPv6 interfaces
belonging to a virtual router.
– Section 8.3.35, show ipv6 neighbors is modified by adding the optional argument vrf to display the neighbor
information of IPv6 interfaces belonging to a virtual router.
– Section 8.3.36, clear ipv6 neighbors is modified by adding the optional vrf argument to clear all the IPv6 neighbors
for a virtual router.
– Section 8.3.38, show ipv6 route is modified by adding the optional argument vrf to display the IPv6 routing table for
a virtual router instance.
– Section 8.3.44, show ipv6 route summary is modified by adding the optional argument vrf to display the routing
table summary for a virtual router instance. Also added an example of the display output.
– Section 8.3.45, clear ipv6 route counters is modified by adding the optional vrf argument to clear the route counter
debug statistics for a virtual router.
– Section 8.4.1.1, ipv6 router ospf is modified by adding the optional vrf argument to enter the OSPFv3 Config mode
in a VRF.
– Section 8.4.1.18, clear ipv6 ospf is modified by adding the optional vrf argument to disable and reenable OSPFv3
for a virtual router.
– Section 8.4.1.19, clear ipv6 ospf configuration is modified by adding the optional vrf argument to reset the OSPFv3
configuration to the factory defaults for a virtual router.
– Section 8.4.1.20, clear ipv6 ospf counters is modified by adding the optional vrf argument to reset the global and
interface statistics of OSPFv3 for a virtual router.
– Section 8.4.1.21, clear ipv6 ospf neighbor is modified by adding the optional vrf argument to drop the adjacency
with all OSPFv3 neighbors for a virtual router.
– Section 8.4.1.23, clear ipv6 ospf redistribution is modified by adding the optional vrf argument to flush all OSPFv3
self-originated external LSAs and reoriginate them in a virtual router.
– Section 8.4.4.2, clear ipv6 ospf stub-router is modified by adding the optional vrf argument to exit the OSPFv3 stub
router mode in a virtual router.
– Section 8.4.5.1, show ipv6 ospf is modified by adding the optional vrf argument to display the OSPFv3 global
configuration for a virtual router.
– Section 8.4.5.2, show ipv6 ospf abr is modified by adding the optional vrf argument to display the OSPFv3 routing
table entries to ABRs for a virtual router.
– Section 8.4.5.3, show ipv6 ospf area is modified by adding the optional vrf argument to display information about an
OSPFv3 area for a virtual router.
– Section 8.4.5.4, show ipv6 ospf asbr is modified by adding the optional vrf argument to display the internal OSPFv3
routing table entries to ASBRs for a virtual router.
– Section 8.4.5.5, show ipv6 ospf database is modified by adding the optional vrf argument to display the OSPFv3
link state database for a virtual router.
– Section 8.4.5.8, show ipv6 ospf interface brief is modified by adding the optional vrf argument to display the
OSPFv3 information on interfaces assigned to a virtual router.
– Section 8.4.5.10, show ipv6 ospf lsa-group is modified by adding the optional vrf argument to display the OSPFv3
lsa-group information for a virtual router.
– Section 8.4.5.12, show ipv6 ospf neighbor is modified by adding the optional vrf argument to display the OSPFv3
neighbor information for a virtual router.
– Section 8.4.5.13, show ipv6 ospf range is modified by adding the optional vrf argument to display the OSPFv3 area
range information for a virtual router.
– Section 8.4.5.14, show ipv6 ospf statistics is modified by adding the optional vrf argument to display the OSPFv3
statistics information for a virtual router.
– Section 8.4.5.15, show ipv6 ospf stub table is modified by adding the optional vrf argument to display the OSPFv3
stub table information for a virtual router.
– Section 8.4.5.16, show ipv6 ospf virtual-link is modified by adding the optional vrf argument to display the OSPFv3
virtual link information for a virtual router.
Modified the Section 8.4.5.6, show ipv6 ospf database database-summary command by adding the vrf argument to
display the database summary for a virtual router instance.
Modified the Section 8.4.5.17, show ipv6 ospf virtual-link brief command by adding the vrf argument to display the
virtual interface information in a virtual router instance.
Modified the following BGP Router Configuration commands to also be given in IPv6 Address Family Configuration
mode. Unless otherwise stated, the syntax, defaults, and user guidelines for these commands are exactly as for IPv4
except that they apply to IPv6:
– Section 11.1.14, bgp client-to-client reflection.
– Section 11.1.31, distribute-list prefix in
– Section 11.1.32, distribute-list prefix out
– Section 11.1.72, neighbor prefix-list
Combined the neighbor activate (IPv6) command description, mode, and example with the
Section 11.1.44, neighbor activate (IPv4 VRF/IPv6 VRF/VPNv4/VPNv6/L2VPN Address Family Config) command.
Modified the following BGP Router Configuration commands to also be given in IPv4 VRF Address Family
Configuration mode:
The IPv6 VRF Support feature for BGPv6 modifies the following commands to display the IPv6 routes for a given VRF
instance:
– Section 11.1.124, show ip bgp template added the optional parameter vrf vrf-name to list the templates configured
for a VRF instance.
– Section 11.1.134, show bgp ipv6 added the optional parameter vrf vrf-name to display the IPv6 routes for a given
VRF instance.
– Section 11.1.135, show bgp ipv6 aggregate-address added the optional parameter vrf vrf-name to display the
aggregate address information for a given VRF instance.
– Section 11.1.136, show bgp ipv6 community added the optional parameter vrf vrf-name to display the IPv6 routes
in a given VRF instance.
– Section 11.1.137, show bgp ipv6 community-list added the optional parameter vrf vrf-name to display the IPv6
routes in a given VRF instance.
– Section 11.1.138, show bgp ipv6 listen range added the optional parameter vrf vrf-name to display the listen
ranges in a given VRF instance.
– Section 11.1.139, show bgp ipv6 neighbors advertised-routes added the optional parameter vrf vrf-name to
display the IPv6 routes advertised to a neighbor in a given VRF instance.
– Section 11.1.141, show bgp ipv6 neighbors policy added the optional parameter vrf vrf-name to display the IPv6
policies configured for a peer in a given VRF instance.
– Section 11.1.142, show bgp ipv6 route-reflection added the optional parameter vrf vrf-name to display the
configuration for the VRF instance.
– Section 11.1.143, show bgp ipv6 neighbors added the optional parameter vrf vrf-name to display the neighbors in
a given VRF instance.
– Section 11.1.144, show bgp ipv6 statistics added the optional parameter vrf vrf-name to display the statistics for
the VRF instance.
– Section 11.1.145, show bgp ipv6 summary added the optional parameter vrf vrf-name to display the summary for
the VRF instance.
– Section 11.1.146, show bgp ipv6 update-group added the optional parameter vrf vrf-name to display the status of
outbound update groups in a VRF instance.
Section 12.1.1.0.1, no classofservice dot1p-mapping. Updated the no form of the command by adding the 802.1p
priority option.
Modified the command syntax, description, and examples for the following commands:
– Section 12.4.13, police-simple.
– Section 12.4.14, police-single-rate.
– Section 12.4.15, police-two-rate.
– Section 12.6.3, show policy-map. Added the parameters displayed for the show command for committed rate and
peak data rate in police simple, police single, and police two rate. The parameters are available in two units: Kb/s
and percentile of maximum operating speed.
The VRF Support for Management Services feature for Management ACLs modified the following commands:
– Section 12.10.1, management access-list, adding the optional vrf parameter to associate the management
access-list to a non-default VRF.
– Section 12.10.4, show management access-list, adding VRF to example command output.
Added:
The Diffie-Hellman 2048-bit Key Support feature adds the following commands:
– Section 3.6.10, crypto dhparam size. The command makes the Diffie Hellman parameter support configurable and
adds support for the 2048 Diffie Hellman parameter.
– Section 3.6.14, show crypto dhparam. This command displays the Diffie Hellman parameter size used by the SSL
tunnel.
The VRF Support for Management Services feature for SNMP Traps added the Section 3.11.18, snmp-server vrf
command. This command associates a VRF as Management VRF for SNMP traps.
The VRF Support for Management Services feature for RADIUS Server Communication adds the following commands:
– Section 3.12.31, radius vrf. This command associates a VRF name for all the RADIUS servers.
– Section 3.12.42, show radius vrf. This command displays the VRF name configured for the RADIUS client
communication with the RADIUS server.
The VRF Support for Management Services feature for DAS adds the following commands:
– Section 3.12.32, vrf <vrf-name>. This command associates a VRF name for the Dynamic Authorization Server
(DAS).
– Section 3.12.35, show radius server dynamic-author. This command displays the dynamic authorization server
parameters.
– Section 3.12.36, show radius server dynamic-author statistics. This command displays the dynamic authorization
server parameters.
The VRF Support for Management Services feature for TACACS Server adds the following commands:
– Section 3.13.6, tacacs-server vrf. This command associates a VRF name for all the TACACS servers.
– Section 3.13.13, show tacacs. This command is modified to display the VRF name that is configured.
Section 3.18, Port Profile Commands.
The MAC Notification feature adds the following commands:
– Section 4.5.34, clear mac-address-table notification. This command clears the counters used in the MAC notification
feature.
– Section 4.5.35, mac-address-table notification change. This command enables the MAC notification feature and its
parameters history-size and interval.
– Section 4.5.39, show mac-address-table notification change interface. This command displays the MAC notification
configuration and contents of the MAC notification history table.
The VRF Support for Management Services feature for Syslog Server Communication adds the Section 4.6.13, logging
syslog vrf command. This command associates a VRF name for all the Syslog servers.
The VRF Support for Management Services feature for SNTP Server Communication adds the Section 4.9.9, sntp vrf
command. This command associates a VRF name for all the SNTP servers.
The DHCP Enhancements (L2 Relay and Server) feature adds the following commands:
– Section 4.11.24, ip dhcp class. This command defines DHCP classes with Option-82 through Circuit-ID and Remote-
ID sub-options.
– Section 4.11.25, relay agent information remote-id circuit-id. This command defines DHCP classes with Option-82
through Circuit-ID and Remote-ID sub-options.
– Section 4.11.26, class (DHCP Pool Config). This command binds the DHCP class to the DHCP pool. This command
in DHCP Pool Config mode changes the mode to Pool Class Config mode.
– Section 4.11.27, address range. Use this command to configure the address range for a DHCP class.
– Section 4.11.44, show ip dhcp class configuration. Use this command to display the DHCP class configuration.
The IPv6 VRF Support feature for OSPFv3 adds the following commands:
– Section 4.14.53, debug ipv6 ping packet. This command enables tracing of the ICMPv6 Echo request and response
packets transmitted and received.
– Section 8.8.1, ipv6 hop-limit (Virtual Router Config). This command defines the hop count used in IPv6 packets
originated in the VRF.
– Section 8.8.2, ipv6 maximum routes. This command reserves the number of IPv6 routes allowed, as well to set the
maximum limit on the number of routes for a virtual router instance in the total routing table space for the router.
– Section 8.8.3, ipv6 neighbors dynamicrenew (Virtual Router Config). This command enables the periodic neighbor
unreachability detection (NUD) to be run on the existing IPv6 neighbor entries in the VRF, based on the activity of the
entries in the hardware.
– Section 8.8.4, ipv6 nud backoff-multiple (Virtual Router Config). This command configures the exponential backoff
multiple to be used in the calculation of the next timeout value for neighbor solicitation transmission during NUD
following the exponential backoff algorithm in the VRF.
– Section 8.8.5, ipv6 nud max-multicast-solicits (Virtual Router Config). This command configures the maximum
number of multicast neighbor solicitations sent during neighbor resolution or during NUD in the VRF.
– Section 8.8.6, ipv6 nud max-unicast-solicits (Virtual Router Config). This command configures the maximum number
of unicast neighbor solicitations sent during neighbor resolution or during NUD in the VRF.
– Section 8.8.7, ipv6 unicast-routing (Virtual Router Config). This command enables IPv6 forwarding in a virtual router.
– Section 8.8.8, show ipv6 vrf interfaces. This command displays the list of IPv6 interfaces and the virtual routers to
which they belong.
– Section 8.8.9, show ipv6 vrf. This command displays the IPv6 information for a VRF instance.
The IPv6 VRF Support feature for BGPv6 adds the following BGPv6 commands:
– Section 11.1.5, address-family ipv6 vrf. This command takes the user into the IPv6 VRF configuration mode of a
particular VRF instance for configuring the BGP VRF parameters.
– Section 11.1.7, address-family vpnv6 unicast. This command takes the user into the VPNv6 Address Family
Configuration mode.
– Section 11.1.128, show ip bgp vpnv4 statistics. This command displays VPNv4 recent decision process history.
– Section 11.1.147, show bgp vpnv6. This command displays the VPNv6 address information for the BGP table.
– Section 11.1.148, show bgp vpnv6 statistics. This command displays VPNv6 recent decision process history.
Removed:
ping ipv6 command from Section 3.2, IPv6 Management Commands because it is covered by the
Section 4.8.13, ping command.
In Section 3.12.34, show radius servers command, removed the Change of Authorization (CoA) parameters information
displayed by the command because the information is now displayed in the new command Section 3.12.36, show
radius server dynamic-author statistics.
The IPv6 VRF Support feature for OSPFv3 deletes the following:
– The vrf vrf-name option from Section 7.2.36, show ip stats. The IP statistics are displayed system-wide and not
per VRF.
– The memory option from Section 7.9.5, show ip vrf.
– The Virtual Router Configuration mode from Section 7.16.4, ip icmp echo-reply.
– The Virtual Router Configuration mode from Section 7.16.5, ip icmp error-interval.
Added:
Section 3.6.4, crypto key encrypt write command to encrypt key files with a user-provided passphrase.
Section 3.6.5, crypto key decrypt write command to decrypt key files with the user-provided passphrase.
Section 3.6.13, fips self-tests command to execute the on-demand FIPS self-test suite.
Section 3.6.14, show fips status command to display the FIPS status of the switch.
Section 4.5.34, show eula offer command to display the end-user license agreement offer.
Section 4.5.35, show gpl command to display the contents of the GPL license file.
Section 4.5.36, show lgpl command to display the contents of the LGPL license file.
Section 4.11.18, vrf <vrf-name> command to associate a DHCP address with a VRF.
Section 4.11.20, ip dhcp excluded-address vrf command to exclude the given address or range of addresses during
address allocation from the given VRF instance.
Section 4.11.28, clear ip dhcp binding vrf <vrf-name> <address> command to delete the binding entry matching the
given IP address and given VRF instance name.
Section 4.11.29, clear ip dhcp binding vrf <vrf-name> command to delete all the binding entries matching the given VRF
instance name.
Section 4.11.34, show ip dhcp binding vrf <vrf-name> <address> command to display the binding entry matching the
given IP address and given VRF instance name.
Section 4.11.35, show ip dhcp binding vrf <vrf-name> command to display all the binding entries matching the given
VRF instance name.
Section 4.11.36, show ip dhcp binding all command to display the binding entries for all VRF instances.
Section 4.14.93, clear mbuf stats command to delete the MBUF stats.
Section 4.27.2, ptp clock e2e-transparent (Interface Config) command to enable the PTP E2E transparent clock
functionality on an interface.
– Section 3.6.1, crypto certificate generate. Updated command description, format, and added example.
Section 3.7.16, show ip http. Management Security feature update added the Active Security field to the display
output.
Section 3.8.4, show loginsession command updated to show all remote connections (including ssh).
Section 3.10.1, username (Global Config). Updated command description. Added three examples.
Section 3.10.3, username unlock. Corrected the command description to say that only a user with read/write access
(not Level 1 access) can reactivate a locked user account.
Section 3.10.17, passwords strength maximum consecutive-characters. Updated command description and added the
no version of the command.
Section 3.10.18, passwords strength maximum repeated-characters. Updated command description and added the no
version of the command.
Section 3.10.25, show passwords configuration. Added example command display output to the command description.
Section 3.10.26, show passwords result. Added example command display output to the command description.
Changed the show snmptrap source-interface command to the Section 3.11.30, show snmp source-interface
command, and updated the example.
Effective with EFOS 3.6, Memory Management Unit (MMU) configurability support is extended to manage the egress
resources, that is, Unicast Queues, to allow customers to make per-deployment optimizations for their use-case and
traffic patterns. See Section 4.26, User Configurable Memory Management Unit Commands and updates to the
following commands:
– Section 4.26.2, mmu config apply
– Section 4.26.9.0.1, no mmu ingress priority-group pg-min bytes (Profile Config)
– Section 4.26.10, mmu ingress priority-group pg-shared (Profile Config)
– Section 4.26.11.0.1, no mmu ingress priority-group pg-headroom-buffer bytes (Profile Config)
– Section 4.26.12.0.1, no mmu ingress service-pool-id port-min bytes (Profile Config)
– Section 4.26.13, mmu ingress service-pool-id port-shared-buffer bytes (Profile Config)
– Section 4.26.20.0.1, no mmu ingress priority-group pg-min bytes (Interface Config)
– Section 4.26.21, mmu ingress priority-group pg-shared (Interface Config)
– Section 4.26.22.0.1, no mmu ingress priority-group pg-headroom-buffer bytes (Interface Config)
– Section 4.26.23.0.1, no mmu ingress service-pool-id port-min bytes (Interface Config)
– Section 4.26.24.0.1, no mmu ingress service-pool-id port-shared-buffer bytes (Interface Config)
– Section 4.26.25, show mmu config. Updated the MMU service pool configuration in the example.
– Section 4.26.26, show mmu config profiles. Updated the example.
– Section 4.26.27, show mmu config interface. Updated the example.
– Section 4.26.28, show mmu buffer interface. Updated the example.
Section 5.18.5, lacp admin key updated default from 0x8000 to 0
Section 5.18.6, lacp collector max-delay updated default from 0x8000 to 0
Section 7.13.6, show bootpdhcprelay is modified to display information about the configured server-override mode and
source information. The inner/sub configuration option is named interface under this command tree. The sub
configuration interface shows the server-override mode and the configured source interface for the specified
interface.
Changed ip igmp router-alert-check command to Section 9.4.2, ip igmp header-validation and updated the
command description
Changed show ip bgp extcommunity-list command to Section 11.1.113, show ip extcommunity-list
Section 12.6.6, show policy-map interface, added In Offered Packets to the parameter table
Added:
The following Section 3.5, Secure Shell Commands:
– Section 3.5.3, ip ssh pubkey-auth. Use this command to enable or disable public key authentication for incoming
SSH sessions.
– Section 3.5.8, ssh. Use this command to establish an outbound SSH session for the DUT to a remote host.
– Section 3.5.9, ssh session-limit. Use this command to specify the maximum number of outbound SSH sessions that
can be established simultaneously.
– Section 3.5.10, ssh timeout. Use this command to set the outbound SSH session timeout value, in minutes.
– Section 3.5.11, show ssh. Use this command to display the current outbound SSH settings.
The following Section 3.6, Management Security Commands:
– Section 3.6.2, crypto certificate import. Use this command to import a signed certificate provided by Certification
Authority (CA).
– Section 3.6.3, crypto certificate request. Use this command to generate and display a certificate request for HTTPS.
– Section 3.6.7, crypto key pubkey-chain ssh. Use this command to enter the Public Key Configuration mode in order
to manually specify public keys for SSH clients or an individual user.
– Section 3.6.8, show crypto certificate mycertificate. Use this command to display the SSH certificates present on the
switch.
– Section 3.6.9, show crypto key mypubkey. Use this command to display the SSH certificates present on the switch.
– Section 3.6.10, show crypto key pubkey-chain ssh. Use this command to display the SSH client’s public keys stored
on the switch.
The following Section 3.7, Hypertext Transfer Protocol Commands:
– Section 3.7.1, ip http accounting exec, ip https accounting exec. This command applies user exec (start-stop/stop-
only) accounting list to the line methods HTTP and HTTPS.
– Section 3.7.2, ip http authentication. Use this command to specify authentication methods for http server users.
– Section 3.7.3, ip https authentication. Use this command to specify authentication methods for https server users.
– Section 3.7.4, ip http port. Use this command to configure the HTTP server listen port number.
– Section 3.7.5, ip http secure-certificate. Use this command to configure the active certificate for HTTPS.
– Section 3.7.6, ip http secure-port. Use this command to configure the secure HTTP port.
– Section 3.7.7, ip http secure-protocol. Use this command to set the secure HTTP protocol levels.
– Section 3.7.8, ip http secure-server. Use this command to enable the secure HTTP mode.
– Section 3.7.9, ip http secure-session hard-timeout. Use this command to configure the secure HTTP session hard
timeout parameter for secure HTTP sessions in hours.
– Section 3.7.10, ip http secure-session maxsessions. Use this command to limit the number of secure HTTP
sessions.
– Section 3.7.11, ip http secure-session soft-timeout. Use this command to configure the soft timeout for secure HTTP
sessions in minutes.
– Section 3.7.12, ip http server. This command enables access to the switch through the Web interface.
– Section 3.7.13, ip http session hard-timeout. Use this command to configure the hard timeout for unsecure HTTP
sessions in hours.
– Section 3.7.14, ip http session maxsessions. Use this command to limit the number of allowable unsecure HTTP
sessions
– Section 3.7.15, ip http session soft-timeout. Use this command to configure the soft timeout for unsecure HTTP
sessions in minutes.
The following Section 3.9, AAA Commands:
– Section 3.9.17, clear accounting statistics. Use this command to clear the accounting statistics.
The following Section 3.11, SNMP Commands:
– Section 3.11.19, snmp trap link-status. This command enables link status traps on an interface or range of
interfaces.
– Section 3.11.20, snmp trap link-status all. This command enables link status traps for all interfaces.
The following Section 4.3, CLI Output Filtering Commands:
– Section 4.3.8, show xxx|count “string”. The command xxx is executed and the output is filtered to only count lines
containing the “string” match.
The following Section 4.8, System Utility and Clear Commands:
– Section 4.8.4, clear igmpsnooping. This command clears the tables managed by the IGMP Snooping function and
attempts to delete these entries from the Multicast Forwarding Database.
The following Section 4.11, DHCP Server Commands:
– Section 4.11.10, ntp. Use this command to configure the NTP server in the boot process of a DHCP client.
The following Section 4.14, Serviceability Packet Tracing Commands:
– Section 4.14.24, debug authentication. This command displays either the debug trace for either a single event or all
events for an interface.
– Section 4.14.35, debug dynamic ports. Use this command to enable dynamic port debug messages.
– Section 4.14.36, debug fip-snooping packet. Use this command to enable FIP packet debug trace on transmit or
receive path with different filter options configured.
– Section 4.14.42, debug ip dvmrp packet. Use this command to trace DVMRP packet reception and transmission.
– Section 4.14.43, debug ip igmp packet. Use this command to trace IGMP packet reception and transmission.
– Section 4.14.44, debug ip mcache packet. Use this command for tracing MDATA packet reception and transmission.
– Section 4.14.45, debug ip pimdm packet. Use this command to trace PIMDM packet reception and transmission.
– Section 4.14.46, debug ip pimsm packet. Use this command to trace PIMSM packet reception and transmission.
– Section 4.14.48, debug ipv6 mcache packet. Use this command for tracing MDATAv6 packet reception and
transmission.
– Section 4.14.49, debug ipv6 mld packet. Use this command to trace MLDv6 packet reception and transmission.
– Section 4.14.51, debug ipv6 pimdm packet. Use this command to trace PIMDMv6 packet reception and
transmission.
– Section 4.14.52, debug ipv6 pimsm packet. Use this command to trace PIMSMv6 packet reception and
transmission.
The User Configurable MMU feature, to extend MMU configuration for egress unicast queues, added the following
commands:
– Section 4.26.6, mmu buffer egress service-pool-id shared-pool bytes
– Section 4.26.14, mmu egress uc-queue-id queue-min bytes
– Section 4.26.15, mmu egress uc-queue-id queue-shared
– Section 4.26.16, mmu egress uc-qgroup-id queue-min bytes
– Section 4.26.17, mmu egress uc-qgroup-id queue-shared
– Section 4.26.18, mmu egress service-pool-id port-shared-buffer bytes
The following Section 5.32, LLDP (802.1AB) Commands:
– Section 5.32.8, lldp portid-subtype. Use this command to set the Port ID Subtype of the Section 5.32.17, show lldp
local-device detail command as interface-name or mac-address.
The following Section 5.34, Denial of Service Commands:
– Section 5.34.8, dos-control port-ddisable. Use this command to enable moving an interface that is under DoS attack
to the D-Disable state.
Section 5.38, Link-Flap Feature on the DUT.
The DHCP Relay Enhancements feature adds support for DHCP Option 82, Suboption 5, adding the following
commands.
– Section 7.13.4, bootpdhcprelay server-override. Use this command to enable the addition of sub-option 5 (link
selection) and sub-option 11 (server ID override) in option 82 of the DHCP packet received from the DHCP Client.
– Section 7.13.5, bootpdhcprelay source-interface. Use this command to set the source interface value for any given
routing interface.
The following Section 7.8, Router Discovery Protocol Commands:
– Section 7.8.6, ip irdp multicast. This command configures the destination IP address for router advertisements as
224.0.0.1, which is the default address.
The following Section 7.10, Virtual LAN Routing Commands:
– Section 7.10.3, autostate. Autostate is enabled on all VLAN routing interfaces by default.
– Section 7.10.4, switchport mapping vlan. This command creates a mapping between the VLAN on the wire and the
VLAN on the device.
– Section 7.10.5, show interfaces vlan mapping.This command displays the configured VLAN mapping entries.
The following Section 7.11, Virtual Router Redundancy Protocol Commands:
– Section 7.11.12, clear ip vrrp interface stats. Use this command to clear VRRP statistical information for a given
interface of the device within a Virtual Router Redundancy Protocol (VRRP) group.
The following Section 8.4.2, OSPFv3 Interface Commands:
– Section 8.4.2.2, ipv6 ospf bfd. Use this command to enable BFD on an interface associated with the OSPFv3
process.
The following Section 9.3, PIM Commands:
– Section 9.3.13, clear ip pim statistics. Use this command to clear all the IP PIM statistics.
The following Section 10.2, IPv6 PIM Commands:
– Section 10.2.12, clear ipv6 pim statistics. Use this command to clear all the IPv6 PIM statistics.
The following Section 10.3, IPv6 MLD Commands:
– Section 10.3.6, ipv6 mld startup-query-count. Use this command to configure the startup-query-count
parameter.
– Section 10.3.7, ipv6 mld startup-query-interval. Use this command to set the startup-query-interval
parameter of the interface.
The following Section 11.1, BGP Commands:
– Section 11.1.35, ip extcommunity-list. Use this command to import or export filtering in BGP using route maps with
the filtering criteria of extcommunity.
– Section 11.1.108, clear ip extcommunity-list. Use this command to clear the provisioned extcommunity-list.
The following Section 12.12, Auto-Voice over IP Commands:
– Section 12.12.1, auto-voip protocol-based. Use this command to configure the global protocol-based auto VoIP
remarking priority or traffic-class.
– Section 12.12.2, auto-voip vlan. Use this command to configure the global Auto VoIP VLAN ID.
– Section 12.12.3, show auto-voip. Use this command to display the auto VoIP settings on the interface or interfaces
of the switch.
Removed:
snmp-server proxy command
show switch command
Added:
Ctrl-C Cancel input and go to next line to Table 8, CLI Editing Conventions
4.5.7 show switch, including Debian Rootfs parameters and example command output
4.27 User Configurable Memory Management Unit Commands which allow customers to make per-deployment
optimizations for their use-case and traffic patterns
4.28 Precision Time Protocol End-to-End Transparent Clock Commands
5.10.8 authentication event fail retry
5.40 IPv4 Device Tracking Commands commands which enable the network administrator to track IPv4 hosts that are
attached to physical ports or LAGs on an L2 or L3 switch
7.4 Anycast IP Resilient Hashing Commands which enable the customer to define sixteen IPv4 and sixteen IPv6 ECMP
routes to always be modified in a resilient fashion.