Catalyst Supervisor Engine 32 PISA IOS Command Reference 12.2ZY

User Manual: Catalyst Supervisor Engine 32 PISA IOS Command Reference 12.2ZY

Open the PDF directly: View PDF PDF.
Page Count: 1396

DownloadCatalyst Supervisor Engine 32 PISA IOS Command Reference 12.2ZY
Open PDF In BrowserView PDF
Catalyst Supervisor Engine 32 PISA
Cisco IOS Software Command Reference
Release 12.2ZY

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of
Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo,
Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step,
Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study,
LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Packet, PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise,
The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other
countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0704R)
Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
Copyright ©2007 Cisco Systems, Inc. All rights reserved.

CONTENTS

Preface

xxv

Audience

xxv

Organization

xxv

Related Documentation
Conventions

xxvi

xxvi

Obtaining Documentation, Obtaining Support, and Security Guidelines

CHAPTER

1

Command-Line Interface for the Catalyst 6500 Series Switches with the
Supervisor Engine 32 PISA 1-1
Getting Help

1-1

How to Find Command Options

1-2

Understanding Command Modes

1-5

Using the No and Default Forms of Commands
Using the CLI String Search

2

1-7

1-7

Saving Configuration Changes

CHAPTER

xxvii

1-11

Cisco IOS Commands for the Catalyst 6500 Series Switches with the
Supervisor Engine 32 PISA 2-1
action
apply

2-2
2-4

arp access-list
attach

2-5

2-8

auto-sync

2-10

bgp regexp deterministic
boot config

2-13

boot system

2-15

bridge-domain
cd

2-11

2-18

2-20

channel-group
channel-protocol
class-map

2-22
2-25

2-26

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

iii

Contents

class-map type multicast-flows
class (policy-map)

2-28

2-30

clear cable-diagnostics tdr

2-33

clear catalyst6000 traffic-meter
clear counters

2-34

2-35

clear fm netflow counters

2-37

clear interface gigabitethernet
clear interface vlan

2-38

2-39

clear ip access-template

2-40

clear ip arp inspection log

2-41

clear ip arp inspection statistics
clear ip auth-proxy watch-list
clear ip cef epoch full

2-43

2-44

clear ip cef inconsistency
clear ip dhcp snooping
clear ip flow stats

2-42

2-46
2-47

2-48

clear ip igmp group

2-49

clear ip igmp snooping statistics
clear ip mroute

2-51

2-52

clear ip msdp peer

2-54

clear ip msdp sa-cache

2-55

clear ip msdp statistics

2-56

clear ip pim auto-rp

2-57

clear ip pim snooping statistics
clear ip pim snooping vlan
clear lacp counters

2-58

2-59

2-61

clear logging ip access-list cache

2-62

clear mac-address-table dynamic

2-63

clear mls acl counters

2-65

clear mls cef ip accounting per-prefix

2-67

clear mls cef ipv6 accounting per-prefix
clear mls ip multicast bidir-rpcache
clear mls ip multicast group

2-69

2-70

clear mls ip multicast statistics
clear mls nde flow counters

2-68

2-71

2-72

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

iv

OL-11437-01

Contents

clear mls netflow
clear mls qos

2-73

2-76

clear mls statistics
clear mls stats
clear pagp

2-78

2-79

2-80

clear platform netint

2-81

clear port-security

2-82

clear spanning-tree detected-protocol
clear top counters interface report
clear vlan counters
clock

2-86

2-87

2-88

collect top counters interface
control-plane
copy /noverify

2-94
2-97

diagnostic bootup level
diagnostic cns

2-90

2-92

define interface-range

2-99

2-101

diagnostic event-log size
diagnostic monitor

2-103

2-104

diagnostic ondemand

2-107

diagnostic schedule test
diagnostic start

2-111

diagnostic stop

2-113

disconnect qdm

2-114

do

2-84

2-108

2-115

dot1x default
dot1x max-req

2-116
2-117

dot1x multi-hosts

2-118

dot1x port-control

2-119

dot1x reauthentication

2-121

dot1x system-auth-control
dot1x timeout
duplex

2-122

2-123

2-125

eigrp event-log-size

2-127

encapsulation dot1q

2-128

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

v

Contents

encapsulation isl
erase

2-129

2-130

errdisable detect cause
errdisable recovery

2-132

2-134

error-detection packet-buffer action
file verify auto
flowcontrol
format
fsck

2-136

2-138
2-139

2-141
2-144

hold-queue

2-147

hw-module boot

2-149

hw-module fan-tray version

2-150

hw-module oversubscription
hw-module reset

2-151

2-152

hw-module shutdown

2-153

hw-module simulate link-up
instance

2-155

interface

2-157

interface port-channel
interface range
interface vlan

2-154

2-160

2-162
2-164

inter-packet gap 6502-mode

2-165

ip access-list hardware permit fragments
ip arp inspection filter vlan
ip arp inspection limit

2-167

2-169

ip arp inspection log-buffer
ip arp inspection trust

2-171

2-173

ip arp inspection validate
ip arp inspection vlan

2-174

2-176

ip arp inspection vlan logging

2-177

ip auth-proxy max-login-attempts
ip auth-proxy watch-list
ip casa

2-166

2-179

2-181

2-183

ip cef load-sharing algorithm
ip cef table consistency-check

2-184
2-185

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

vi

OL-11437-01

Contents

ip dhcp relay information option trust-all
ip dhcp relay information trust
ip dhcp route connected
ip dhcp snooping

2-188

2-189

2-190

ip dhcp snooping binding

2-191

ip dhcp snooping database

2-193

ip dhcp snooping information option
ip dhcp snooping limit rate

2-195

2-197

ip dhcp snooping packets

2-198

ip dhcp snooping verify mac-address
ip dhcp snooping vlan
ip flow-cache entries

2-202

2-204

2-206

ip flow-export destination

2-207

ip flow-export hardware version
ip flow-export interface

2-209

2-210

ip flow-export source

2-211

ip flow-export version

2-213

ip flow ingress

2-199

2-200

ip flow-aggregation cache
ip flow-export

2-215

ip flow layer2-switched

2-216

ip forward-protocol turbo-flood

2-217

ip igmp immediate-leave group-list

2-219

ip igmp last-member-query-interval

2-220

ip igmp snooping

2-187

2-222

ip igmp snooping explicit-tracking
ip igmp snooping fast-leave
ip igmp snooping flooding

2-224

2-226
2-228

ip igmp snooping l2-entry-limit

2-229

ip igmp snooping last-member-query-interval
ip igmp snooping limit track
ip igmp snooping mrouter
ip igmp snooping querier
ip igmp snooping rate

2-230

2-232
2-233
2-235

2-237

ip igmp snooping report-suppression

2-238

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

vii

Contents

ip igmp snooping source-only-learning age-timer
ip igmp ssm-map

2-240

ip local-proxy-arp

2-242

ip mroute

2-239

2-243

ip msdp border

2-245

ip msdp cache-sa-state

2-247

ip msdp default-peer

2-248

ip msdp description

2-250

ip msdp filter-sa-request

2-251

ip msdp mesh-group

2-253

ip msdp originator-id

2-254

ip msdp peer

2-255

ip msdp redistribute

2-257

ip msdp sa-filter in

2-259

ip msdp sa-filter out

2-261

ip msdp sa-request

2-263

ip msdp shutdown

2-265

ip msdp ttl-threshold

2-266

ip multicast boundary

2-267

ip multicast cache-headers

2-269

ip multicast helper-map

2-271

ip multicast mrinfo-filter

2-273

ip multicast multipath

2-274

ip multicast netflow

2-275

ip multicast route-limit
ip multicast-routing

2-276

2-277

ip multicast rpf backoff

2-278

ip multicast rpf interval

2-280

ip pim accept-register
ip pim accept-rp

2-281

2-282

ip pim bidir-enable

2-284

ip pim bsr-candidate

2-286

ip pim register-rate-limit
ip pim register-source
ip pim rp-announce-filter

2-288
2-289
2-290

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

viii

OL-11437-01

Contents

ip pim rp-candidate

2-291

ip pim send-rp-announce

2-293

ip pim send-rp-discovery

2-295

ip pim snooping (global configuration mode)

2-296

ip pim snooping (interface configuration mode)
ip pim snooping dr-flood
ip pim spt-threshold
ip pim ssm

2-298

2-299

2-300

ip pim state-refresh disable
ip rgmp

2-297

2-301

2-302

ip route-cache flow

2-304

ip sticky-arp (global configuration)

2-306

ip sticky-arp (interface configuration)
ip unnumbered

2-308

2-309

ipv6 mfib-cef

2-311

ipv6 mfib hardware-switching
ipv6 mld snooping

2-312

2-313

ipv6 mld snooping explicit-tracking

2-314

ipv6 mld snooping last-member-query-interval
ipv6 mld snooping limit

2-318

ipv6 mld snooping mrouter

2-320

ipv6 mld snooping querier

2-321

ipv6 mld snooping report-suppression
ip verify unicast reverse-path

ip wccp redirect

2-329
2-331

2-333

l2protocol-tunnel cos

2-335

l2protocol-tunnel drop-threshold

2-336

l2protocol-tunnel global drop-threshold
l2protocol-tunnel shutdown-threshold
l2 vfi manual

2-325

2-327

ip wccp web-cache accelerated
l2protocol-tunnel

2-322

2-323

ip verify unicast source reachable-via
ip wccp group-listen

2-316

2-338
2-339

2-341

lacp max-bundle

2-342

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

ix

Contents

lacp port-priority
lacp rate

2-343

2-344

lacp system-priority
line

2-345

2-346

link debounce

2-348

load-interval

2-350

logging event link-status (global configuration)

2-352

logging event link-status (interface configuration)
logging event subif-link-status

2-354

2-355

logging ip access-list cache (global configuration mode)
logging ip access-list cache (interface configuration mode)
mac access-list extended
mac-address-table learning

2-364
2-366

2-368

mac-address-table notification mac-move
mac-address-table notification threshold
mac-address-table static

2-371

2-376

2-377

mac packet-classify use vlan
match

2-370

2-373

mac-address-table synchronize
mac packet-classify

2-359

2-361

mac-address-table aging-time
mac-address-table limit

2-357

2-379

2-380

match protocol

2-382

maxconns (real server configuration submode)
maximum-paths
mdix auto
mdt data

2-383

2-385

2-386
2-388

mdt default
mdt log-reuse
media-type
mkdir disk0:

2-389
2-390
2-391
2-392

mls aclmerge algorithm

2-393

mls acl tcam default-result
mls acl tcam share-global
mls aging fast

2-395
2-396

2-397

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

x

OL-11437-01

Contents

mls aging long

2-398

mls aging normal

2-399

mls cef maximum-routes

2-400

mls cef tunnel fragment
mls erm priority

2-403

mls exclude protocol
mls flow
mls ip

2-402

2-405

2-407
2-408

mls ip acl port expand

2-409

mls ip cef accounting per-prefix
mls ip cef load-sharing
mls ip cef rate-limit

2-410

2-411

2-413

mls ip cef rpf hw-enable-rpf-acl
mls ip cef rpf interface-group

2-415

mls ip cef rpf multipath

2-416

mls ip delete-threshold

2-417

mls ip directed-broadcast
mls ip inspect

2-414

2-418

2-420

mls ip install-threshold

2-421

mls ip multicast (global configuration mode)
mls ip multicast (interface configuration mode)
mls ip multicast bidir gm-scan-interval
mls ip multicast connected

mls ip multicast flow-stat-timer

2-425

2-428
2-430

mls ip multicast replication-mode

2-431

2-432

mls ip multicast stub

2-433

mls ip multicast threshold

2-435

mls ip nat netflow-frag-l4-zero
mls ip pbr

2-424

2-426

mls ip multicast consistency-check

mls ip multicast sso

2-422

2-436

2-437

mls ip reflexive ndr-entry tcam

2-438

mls ipv6 acl compress address unicast
mls ipv6 acl source

2-439

2-441

mls mpls (recirculation)

2-442

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xi

Contents

mls mpls (guaranteed bandwidth traffic engineering)
mls nde flow

2-446

mls nde interface
mls nde sender
mls netflow

2-448
2-450

2-451

mls netflow maximum-flows
mls netflow sampling

2-452

2-453

mls netflow usage notify

2-454

mls qos (global configuration mode)

2-455

mls qos (interface configuration mode)
mls qos aggregate-policer
mls qos bridged

2-457

2-458

2-460

mls qos channel-consistency
mls qos cos

2-444

2-461

2-462

mls qos cos-mutation

2-463

mls qos dscp-mutation
mls qos exp-mutation
mls qos loopback

2-464
2-465

2-466

mls qos map cos-dscp

2-467

mls qos map cos-mutation

2-468

mls qos map dscp-cos

2-470

mls qos map dscp-exp

2-472

mls qos map dscp-mutation
mls qos map exp-dscp

2-473

2-475

mls qos map exp-mutation

2-476

mls qos map ip-prec-dscp

2-478

mls qos map policed-dscp

2-480

mls qos marking ignore port-trust
mls qos marking statistics
mls qos mpls trust exp
mls qos police redirected
mls qos protocol

2-482

2-483

2-484
2-485

2-486

mls qos queueing-only

2-488

mls qos queue-mode mode-dscp
mls qos rewrite ip dscp

2-489

2-490

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xii

OL-11437-01

Contents

mls qos statistics-export (global configuration mode)
mls qos statistics-export (interface configuration mode)
mls qos statistics-export aggregate-policer
mls qos statistics-export class-map

2-500

2-502

2-503

mls qos trust extend

2-505

mls qos vlan-based
mls rate-limit all

2-507
2-508

mls rate-limit layer2

2-509

mls rate-limit multicast ipv4

2-511

mls rate-limit multicast ipv6

2-513

mls rate-limit unicast acl

2-516

mls rate-limit unicast cef

2-518

mls rate-limit unicast ip

2-520

mls rate-limit unicast l3-features
mls rate-limit unicast vacl-log

2-523
2-524

mls rp ip (global configuration mode)

2-526

mls rp ip (interface configuration mode)
mls rp ipx (global configuration mode)
mls rp ipx (interface configuration mode)
mls rp management-interface
mls rp nde-address
mls rp vlan-id

2-529

2-530

2-533

2-534

mls switching

2-536

mls switching unicast

mode

2-528

2-531

mls sampling

mobility

2-527

2-532

mls rp vtp-domain

mls verify

2-495

2-499

mls qos statistics-export destination
mls qos trust

2-493

2-497

mls qos statistics-export delimiter
mls qos statistics-export interval

2-492

2-537

2-538
2-540

2-542

mode dot1q-in-dot1q access-gateway
monitor event-trace (EXEC)

2-544

2-547

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xiii

Contents

monitor event-trace (global configuration)
monitor permit-list
monitor session

2-553
2-555

monitor session type

2-560

mpls l2transport route

2-565

mpls load-balance per-label
mpls ttl-dec
mtu

2-550

2-567

2-568

2-569

name (MST configuration submode)
neighbor
net

2-574

nsf

2-576

2-571

2-573

pagp learn-method

2-579

pagp port-priority

2-580

platform ip features sequential

2-581

platform ipv6 acl icmp optimize neighbor-discovery
platform scp retry interval

2-585

platform vfi dot1q-transparency
police (policy map)
police rate

2-590

policy-map

2-592

port access-map

2-586

2-587

2-595

port-channel load-balance

2-597

port-channel load-balance mpls
port-channel min-links

2-599

2-601

port-channel per-module load-balance
power enable
power inline

2-602

2-603
2-604

power redundancy-mode
priority-queue cos-map

2-605
2-606

priority-queue queue-limit
private-vlan

2-583

2-608

2-609

private-vlan mapping

2-612

private-vlan synchronize
process-min-time percent

2-614
2-615

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xiv

OL-11437-01

Contents

rcv-queue bandwidth

2-617

rcv-queue cos-map

2-618

rcv-queue queue-limit

2-620

rcv-queue random-detect
rcv-queue threshold
reassign

2-621

2-623

2-625

redundancy

2-626

redundancy force-switchover
reload

2-629

remote command

2-631

remote login

2-632

remote-span

2-634

reset

2-635

retry

2-636

revision

2-637

rmon alarm

2-638

rmon event

2-640

route-converge-interval
router

2-628

2-642

2-644

scheduler allocate

2-645

service counters max age
service-policy

2-646

2-647

service-policy (control-plane)
session slot

2-648

2-650

set cos cos-inner (policy-map configuration)
set ip dscp (policy-map configuration)

2-653

set ip precedence (policy-map configuration)
set mpls experimental
set qos-group
show

2-651

2-655

2-657

2-658

2-659

show adjacency
show arp

2-661

2-664

show asic-version
show bootflash:
show bootvar

2-665
2-666

2-668

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xv

Contents

show cable-diagnostics tdr
show catalyst6000

2-671

2-673

show cdp neighbors

2-675

show cef interface policy-statistics
show class-map

2-679

show counters interface
show diagnostic

2-680

2-683

show diagnostic cns

2-688

show diagnostic sanity
show dot1q-tunnel
show dot1x

2-689

2-694

2-695

show dss log

2-698

show environment alarm

2-699

show environment cooling
show environment status

2-702
2-703

show environment temperature
show eobc

2-706

2-708

show erm statistics

2-711

show errdisable detect

2-712

show errdisable flap-value
show errdisable recovery
show etherchannel
show fm features
show fm insp

2-713
2-714

2-715
2-720

show fm inband-counters

2-722

2-723

show fm interface

2-724

show fm ipv6 traffic-filter

2-727

show fm nat netflow data

2-731

show fm reflexive

2-732

show fm summary

2-733

show fm vlan
show icc

2-678

2-734

2-736

show idprom
show interfaces

2-738
2-742

show interfaces accounting

2-745

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xvi

OL-11437-01

Contents

show interfaces capabilities
show interfaces counters

2-747
2-750

show interfaces debounce

2-753

show interfaces description

2-755

show interfaces flowcontrol

2-756

show interfaces private-vlan mapping
show interfaces status

2-759

2-760

show interfaces summary

2-762

show interfaces switchport

2-764

show interfaces switchport backup
show interfaces transceiver
show interfaces trunk

2-766

2-768

2-771

show interfaces unidirectional

2-774

show interfaces vlan mapping

2-776

show ip arp inspection

2-777

show ip arp inspection log

2-780

show ip auth-proxy watch-list
show ipc

2-782

2-783

show ip cache flow

2-785

show ip cache verbose flow
show ip cef epoch

2-793

show ip cef inconsistency
show ip cef summary
show ip cef vlan

2-789

2-795

2-797

2-798

show ip dhcp relay information trusted-sources
show ip dhcp snooping

2-800

show ip dhcp snooping binding
show ip dhcp snooping database
show ip flow-export
show ip igmp groups
show ip igmp interface

2-799

2-802
2-805

2-807
2-809
2-812

show ip igmp snooping explicit-tracking
show ip igmp snooping mrouter

2-814

2-815

show ip igmp snooping rate-limit

2-816

show ip igmp snooping statistics

2-817

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xvii

Contents

show ip igmp udlr

2-819

show ip interface

2-821

show ip mcache

2-824

show ip mds interface
show ip mpacket

2-826

2-827

show ip mroute

2-829

show ip mroute bidirectional
show ip msdp count

2-834

2-836

show ip msdp peer

2-838

show ip msdp sa-cache

2-840

show ip msdp summary

2-842

show ip nhrp

2-843

show ip pim bsr-router

2-846

show ip pim interface df
show ip pim mdt bgp

2-848

2-849

show ip pim mdt history

2-850

show ip pim mdt receive

2-851

show ip pim mdt send

2-853

show ip pim neighbor

2-854

show ip pim rp-hash

2-856

show ip pim rp mapping
show ip pim snooping
show ip rpf events
show ip wccp

2-858
2-860

2-864

2-865

show ipv6 mfib

2-867

show ipv6 mld snooping
show l2protocol-tunnel
show l3-mgr
show lacp

2-873
2-875

2-877
2-879

show logging ip access-list
show mac-address-table

2-882
2-884

show mac-address-table learning
show memory dead
show mls asic
show mls cef

2-890

2-894

2-896
2-897

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xviii

OL-11437-01

Contents

show mls cef adjacency

2-902

show mls cef exact-route

2-907

show mls cef exception

2-908

show mls cef hardware

2-910

show mls cef inconsistency
show mls cef ip

2-912

2-914

show mls cef ip multicast
show mls cef ipv6

2-918

2-925

show mls cef logging

2-928

show mls cef lookup

2-929

show mls cef maximum-routes
show mls cef mpls

2-932

show mls cef rpf

2-933

show mls cef statistics

2-934

show mls cef summary

2-935

show mls cef vrf

2-937

show mls df-table
show mls ip

2-930

2-939

2-940

show mls ip cef rpf-table
show mls ip multicast

2-943

2-944

show mls ip multicast bidir

2-947

show mls ip multicast rp-mapping
show mls ip multicast sso
show mls ip non-static
show mls ip routes
show mls ip static

2-949

2-951

2-952
2-954

show mls ip statistics
show mls nde

2-955

2-956

show mls netflow

2-957

show mls netflow ip

2-960

show mls netflow ip sw-installed
show mls netflow ipv6
show mls qos

2-948

2-965

2-967

2-970

show mls qos free-agram
show mls qos maps

2-974

2-975

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xix

Contents

show mls qos mpls

2-977

show mls qos protocol

2-979

show mls qos statistics-export info
show mls rate-limit

2-982

show mls sampling

2-985

show mls statistics

2-986

show mls table-contention

2-988

show mmls igmp explicit-tracking
show mmls msc

2-990

2-991

show mobility

2-996

show module

2-998

show monitor permit-list
show monitor session

2-1001
2-1002

show mpls l2transport vc
show mpls platform
show mpls ttfib
show pagp

2-980

2-1006

2-1010

2-1013

2-1014

show platform

2-1016

show platform hardware capacity
show platform pisa np

2-1020

2-1026

show platform software ipv6-multicast
show policy-map

2-1036

show policy-map control-plane
show policy-map interface
show port-security
show power

2-1040

2-1042

2-1048

show qm-sp port-data

2-1049

show queueing interface
show redundancy
show rom-monitor

2-1051

2-1053
2-1056

2-1057

show running-config
show scp

2-1038

2-1044

show qdm status

show rpc

2-1033

2-1059

2-1061

show snmp mib ifmib ifindex

2-1062

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xx

OL-11437-01

Contents

show spanning-tree

2-1064

show spanning-tree mst

2-1070

show standby delay

2-1074

show sup-bootflash

2-1075

show system jumbomtu
show tcam counts

2-1078

2-1079

show tcam interface

2-1081

show tech-support

2-1084

show top counters interface report
show udld

2-1089

show version
show vlan

2-1091
2-1093

show vlan access-log

2-1097

show vlan access-map
show vlan counters

2-1099

2-1100

show vlan dot1q tag native
show vlan filter

2-1101

2-1102

show vlan internal usage
show vlan mapping

2-1107

show vlan remote-span

2-1109

2-1110

show vlan virtual-port
show vtp

2-1104

2-1106

show vlan private-vlan
show vlans

2-1087

2-1112

2-1114

shutdown vlan

2-1117

snmp ifindex clear
snmp ifindex persist

2-1118
2-1120

snmp-server enable traps

2-1122

snmp-server enable traps transceiver type all
snmp-server ifindex persist

2-1124

2-1125

snmp-server source-interface

2-1127

snmp-server trap authentication unknown-context
snmp-server trap link switchover
spanning-tree backbonefast
spanning-tree bpdufilter

2-1129

2-1130

2-1131

2-1132

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xxi

Contents

spanning-tree bpduguard
spanning-tree cost

2-1134

2-1135

spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
spanning-tree guard

2-1138

2-1139

spanning-tree link-type

2-1140

spanning-tree loopguard default
spanning-tree mode
spanning-tree mst

2-1136

2-1141

2-1142
2-1143

spanning-tree mst configuration

2-1145

spanning-tree mst forward-time

2-1147

spanning-tree mst hello-time

2-1148

spanning-tree mst max-age

2-1149

spanning-tree mst max-hops

2-1150

spanning-tree mst pre-standard
spanning-tree mst root

2-1151

2-1153

spanning-tree pathcost method

2-1155

spanning-tree portfast (interface configuration mode)
spanning-tree portfast bpdufilter default
spanning-tree portfast bpduguard default
spanning-tree portfast default
spanning-tree port-priority

spanning-tree vlan
speed

2-1158
2-1160

2-1161

2-1162

spanning-tree transmit hold-count
spanning-tree uplinkfast

2-1156

2-1163

2-1164

2-1166

2-1168

squeeze

2-1171

stack-mib portname

2-1172

standby delay minimum reload
standby track

2-1175

standby use-bia

2-1177

storm-control level
switchport

2-1173

2-1178

2-1180

switchport access vlan

2-1182

switchport autostate exclude

2-1184

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xxii

OL-11437-01

Contents

switchport backup

2-1186

switchport block unicast
switchport capture

2-1188

2-1189

switchport capture allowed vlan
switchport dot1q ethertype
switchport mode

2-1191

2-1193

2-1195

switchport port-security

2-1197

switchport port-security aging

2-1198

switchport port-security mac-address
switchport port-security maximum
switchport port-security violation

2-1200
2-1202

2-1204

switchport private-vlan host-association
switchport private-vlan mapping
switchport trunk

2-1207

2-1209

switchport vlan mapping

2-1212

switchport vlan mapping enable
switchport voice vlan
sync-restart-delay

2-1215

2-1217

2-1219

system flowcontrol bus
system jumbomtu
tcam priority

2-1220

2-1221

2-1223

test cable-diagnostics
time-range

2-1225

2-1227

traceroute mac

2-1229

track interface

2-1233

transceiver type all monitoring

2-1235

tunnel udlr address-resolution

2-1236

tunnel udlr receive-only
tunnel udlr send-only
udld

2-1206

2-1238
2-1240

2-1242

udld port
udld reset

2-1244
2-1246

udp-port

2-1247

undelete

2-1248

unidirectional

2-1250

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xxiii

Contents

upgrade rom-monitor
username secret
verify

2-1252

2-1254

2-1255

vlan (config-VLAN submode)

2-1258

vlan (global configuration mode)
vlan access-log

2-1264

vlan access-map
vlan database

2-1266
2-1268

vlan dot1q tag native
vlan filter

2-1270

2-1272

vlan internal allocation policy
vlan mapping dot1q
vtp

2-1262

2-1274

2-1276

2-1278

wrr-queue

2-1281

wrr-queue cos-map
wrr-queue dscp-map
wrr-queue queue-limit

2-1285
2-1286
2-1287

wrr-queue random-detect

2-1289

wrr-queue shape

2-1291

wrr-queue threshold

2-1293

APPENDIX

A

Acronyms

APPENDIX

B

Acknowledgments for Open-Source Software

A-1

B-1

INDEX

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xxiv

OL-11437-01

Preface
This preface describes the audience, organization, and conventions of this publication, and provides
information on how to obtain related documentation.

Audience
This publication is for experienced network administrators who are responsible for configuring and
maintaining Catalyst 6500 series switches that are configured with the Supervisor Engine 32 and the
Programmable Intelligent Services Adapter (PISA).

Organization
This publication is organized as follows:
Chapter

Title

Description

Chapter 1

Command-Line Interface for the Describes the Catalyst 6500 series switch CLI.
Catalyst 6500 Series Switches
with the
Supervisor Engine 32 PISA

Chapter 2

Cisco IOS Commands for the
Catalyst 6500 Series Switches
with the
Supervisor Engine 32 PISA

Lists alphabetically and provides detailed
information for Cisco IOS commands specific to
the Catalyst 6500 series switches that are
configured with the Supervisor Engine 32 and
the PISA.

Appendix A

Acronyms

Defines the acronyms used in this publication.

Appendix B

Acknowledgments for
Open-Source Software

Provides acknowledgments for Cisco IOS
software.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xxv

Preface
Related Documentation

Related Documentation
The Catalyst 6500 series switch Cisco IOS documentation set includes these documents:
•

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Module Installation Guide

•

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide

•

Catalyst Supervisor Engine 32 PISA Cisco IOS Software System Message Guide

•

Release Notes for Cisco IOS Release 12.2ZY on the Supervisor Engine 32 PISA

The Cisco IOS documentation set includes these documents:
•

Configuration Fundamentals Configuration Guide

•

Command Reference

For information about MIBs, refer to this URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

Conventions
This document uses the following conventions:
Convention

Description

boldface font

Commands, command options, and keywords are in
boldface.

italic font

Arguments for which you supply values are in italics.

[ ]

Elements in square brackets are optional.

{x|y|z}

Alternative keywords are grouped in braces and separated by
vertical bars. Braces can also be used to group keywords
and/or aguments; for example, {interface interface type}.

[x|y|z]

Optional alternative keywords are grouped in brackets and
separated by vertical bars.

string

A nonquoted set of characters. Do not use quotation marks
around the string or the string will include the quotation
marks.

screen

font

Terminal sessions and information the system displays are in
font.

screen
boldface screen

Information you must enter is in boldface screen font.

font
italic screen font

Arguments for which you supply values are in italic screen
font.

^

The symbol ^ represents the key labeled Control—for
example, the key combination ^D in a screen display means
hold down the Control key while you press the D key.

< >

Nonprinting characters, such as passwords are in angle
brackets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xxvi

OL-11437-01

Preface
Obtaining Documentation, Obtaining Support, and Security Guidelines

Convention

Description

[ ]

Default responses to system prompts are in square brackets.

!, #

An exclamation point (!) or a pound sign (#) at the beginning
of a line of code indicates a comment line.

Notes use the following conventions:

Note

Means reader take note. Notes contain helpful suggestions or references to material not covered in
the publication.
Cautions use the following conventions:

Caution

Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.

Obtaining Documentation, Obtaining Support, and Security
Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback,
security guidelines, and also recommended aliases and general Cisco documents, see the monthly
What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical
documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

xxvii

Preface
Obtaining Documentation, Obtaining Support, and Security Guidelines

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

xxviii

OL-11437-01

C H A P T E R

1

Command-Line Interface for the Catalyst 6500
Series Switches with the
Supervisor Engine 32 PISA
This chapter provides information for understanding and using command-line interface (CLI) for the
Supervisor Engine 32 and the Programmable Intelligent Services Accelerator (PISA). This chapter
consists of these sections:
. This chapter includes the following sections:
•

Getting Help, page 1-1

•

How to Find Command Options, page 1-2

•

Understanding Command Modes, page 1-5

•

Using the No and Default Forms of Commands, page 1-7

•

Using the CLI String Search, page 1-7

•

Saving Configuration Changes, page 1-11

For an overview of the Catalyst 6500 series switch Cisco IOS software configuration, refer to the
Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide.

Getting Help
To obtain a list of commands that are available for each command mode, enter a question mark (?) at the
system prompt. You also can obtain a list of any command’s associated keywords and arguments with
the context-sensitive help feature.
Table 1-1 lists commands that you can enter to get help that is specific to a command mode, a command,
a keyword, or an argument.
Table 1-1

Getting Help

Command

Purpose

abbreviated-command-entry?

Obtain a list of commands that begin with a
particular character string. (Do not leave a space
between the command and question mark.)

abbreviated-command-entry

Complete a partial command name.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

1-1

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

How to Find Command Options

Table 1-1

Getting Help (continued)

Command

Purpose

?

List all commands available for a particular
command mode.

command ?

List a command’s associated keywords. Leave a
space between the command and question mark.

command keyword ?

List a keyword’s associated arguments. Leave a
space between the keyword and question mark.

How to Find Command Options
This section provides an example of how to display syntax for a command. The syntax can consist of
optional or required keywords. To display keywords for a command, enter a question mark (?) at the
configuration prompt or after entering part of a command followed by a space. The Catalyst 6500 series
switch software displays a list of available keywords along with a brief description of the keywords. For
example, if you are in global configuration mode and want to see all the keywords for the arap
command, you enter arap ?.
Table 1-2 shows examples of how you can use the question mark (?) to assist you in entering commands
and also guides you through entering the following commands:

Table 1-2

•

interface gigabitethernet 1/1

•

channel-group 1 mode auto

How to Find Command Options

Command

Comment

Router> enable
Password: 
Router#

Enter the enable command and
password to access privileged EXEC
commands.
You are in privileged EXEC mode
when the prompt changes to Router#.

Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#

Enter global configuration mode.
You are in global configuration mode
when the prompt changes to
Router(config)#.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

1-2

OL-11437-01

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
How to Find Command Options

Table 1-2

How to Find Command Options (continued)

Command

Comment

Router(config)# interface gigabitethernet ?
<1-9> GigabitEthernet interface number
Router(config)# interface gigabitethernet 1/1
Router(config-if)#

Enter interface configuration mode by
specifying the Gigabit Ethernet
interface that you want to configure
using the interface gigabitethernet
global configuration command.
Enter a ? to display what you must
enter next on the command line. In
this example, you must enter an
interface number from 1 to 9 in the
format module-number/port-number.
You are in interface configuration
mode when the prompt changes to
Router(config-if)#.

Router(config-if)#?
Interface configuration commands:
access-expression Build a bridge boolean access expression
apollo
Apollo interface subcommands
appletalk
Appletalk interface subcommands
arp
Set arp type (arpa, probe, snap) or timeout
backup
Modify backup parameters
bandwidth
Set bandwidth informational parameter
bgp-policy
Apply policy propogated by bgp community string
bridge-group
Transparent bridging interface parameters
carrier-delay
Specify delay for interface transitions
cdp
CDP interface subcommands
channel-group
Etherchannel/port bundling configuration
clns
CLNS interface subcommands
cmns
OSI CMNS
custom-queue-list Assign a custom queue list to an interface
decnet
Interface DECnet config commands
default
Set a command to its defaults
delay
Specify interface throughput delay
description
Interface specific description
dlsw
DLSw interface subcommands
dspu
Down Stream PU
exit
Exit from interface configuration mode
fair-queue
Enable Fair Queuing on an Interface
flowcontrol
Configure flow operation.
fras
DLC Switch Interface Command
help
Description of the interactive help system
hold-queue
Set hold queue depth
ip
Interface Internet Protocol config commands
ipx
Novell/IPX interface subcommands
isis
IS-IS commands
iso-igrp
ISO-IGRP interface subcommands

Enter a ? to display a list of all the
interface configuration commands
available for the Gigabit Ethernet
interface.

.
.
.
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

1-3

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

How to Find Command Options

Table 1-2

How to Find Command Options (continued)

Command

Comment

Router(config-if)# channel-group ?
group channel-group of the interface

Enter the command that you want to
configure for the controller. In this
example, the channel-group
command is used.

Router(config-if)#channel-group

Enter a ? to display what you must
enter next on the command line. In
this example, you must enter the
group keyword.
Because a  is not displayed, it
indicates that you must enter more
information to complete the
command.
Router(config-if)# channel-group ?
<1-256> Channel group number
Router(config-if)#channel-group

After you enter the group keyword,
enter a ? to display what you must
enter next on the command line. In
this example, you must enter a channel
group number from 1 to 256.
Because a  is not displayed, it
indicates that you must enter more
information to complete the
command.

Router(config-if)# channel-group 1 ?
mode Etherchannel Mode of the interface
Router(config-if)#

After you enter the channel group
number, enter a ? to display what you
must enter next on the command line.
In this example, you must enter the
mode keyword.
Because a  is not displayed, it
indicates that you must enter more
information to complete the
command.

Router(config-if)# channel-group 1 mode ?
auto
Enable PAgP only if a PAgP device is detected
desirable Enable PAgP unconditionally
on
Enable Etherchannel only
Router(config-if)#

After you enter the mode keyword,
enter a ? to display what you must
enter next on the command line. In
this example, you must enter the auto,
desirable, or on keyword.
Because a  is not displayed, it
indicates that you must enter more
information to complete the
command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

1-4

OL-11437-01

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
Understanding Command Modes

Table 1-2

How to Find Command Options (continued)

Command

Comment

Router(config-if)# channel-group 1 mode auto ?


In this example, the auto keyword is
entered. After you enter the auto
keyword, enter a ? to display what you
must enter next on the command line.

Router(config-if)#

Because a  is displayed, it
indicates that you can press Return to
complete the command. If additional
keywords are listed, you can enter
more keywords or press Return to
complete the command.
Router(config-if)# channel-group 1 mode auto
Router(config-if)#

In this example, press Return to
complete the command.

Understanding Command Modes
This section contains descriptions of the command modes for the Cisco IOS user interface.

Cisco IOS User Interface
The Cisco IOS user interface is divided into many different modes. The commands that are available to
you depend on which mode you are currently in. You can obtain a list of commands that are available
for each command mode by entering a question mark (?) at the system prompt.
When you start a session on the Catalyst 6500 series switch, you begin in user mode, often called EXEC
mode. Only a limited subset of the commands are available in EXEC mode. In order to have access to
all commands, you must enter privileged EXEC mode. Normally, you must enter a password to enter
privileged EXEC mode. From privileged EXEC mode, you can enter any EXEC command or enter global
configuration mode. Most EXEC commands are one-time commands, such as show commands, which
show the current status of a given item, and clear commands, which clear counters or interfaces. The
EXEC commands are not saved across reboots of the Catalyst 6500 series switch.
The configuration modes allow you to make changes to the running configuration. If you later save the
configuration, these commands are stored across Catalyst 6500 series switch reboots. In order to get to
the various configuration modes, you must start at global configuration mode where you can enter
interface configuration mode, subinterface configuration mode, and a variety of protocol-specific modes.
ROM-monitor mode is a separate mode that is used when the Catalyst 6500 series switch cannot boot
properly. If your Catalyst 6500 series switch or access server does not find a valid system image when
it is booting, or if its configuration file is corrupted at startup, the system might enter ROM-monitor
mode.
Table 1-3 provides a summary of the main command modes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

1-5

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

Understanding Command Modes

Table 1-3

Summary of Main Command Modes

Command
Mode

Access Method

Prompt

Exit Method

User EXEC

Log in.

Router>

Use the logout command.

Privileged
EXEC

From user EXEC mode,
enter the enable EXEC
command.

Router#

To exit to user EXEC mode, enter the disable
command.

From privileged EXEC
mode, enter the
configure terminal
privileged EXEC
command.

Router(config)#

From global
configuration mode,
enter by specifying an
interface with an
interface command.

Router(config-if)#

Global
configuration

Interface
configuration

To enter global configuration mode, enter the
configure terminal privileged EXEC command.
To exit to privileged EXEC mode, enter the exit or
end command or press Ctrl-Z.
To enter interface configuration mode, enter an
interface configuration command.
To exit to global configuration mode, enter the exit
command.
To exit to privileged EXEC mode, enter the exit
command or press Ctrl-Z.
To enter subinterface configuration mode, specify a
subinterface with the interface command.

Subinterface
configuration

From interface
configuration mode,
specify a subinterface
with an interface
command.

ROM monitor

Router(config-subif)#

Rommon>
From privileged EXEC
mode, enter the reload
EXEC command. Press
the Break key during the
first 60 seconds while the
system is booting.

To exit to global configuration mode, enter the exit
command.
To enter privileged EXEC mode, enter the end
command or press Ctrl-Z.
To exit ROM-monitor mode, you must reload the
image by entering the boot command. If you use
the boot command without specifying a file or any
other boot instructions, the system boots from the
default flash image (the first image in onboard
flash memory). Otherwise, you can instruct the
system to boot from a specific flash image (using
the boot system flash filename command).

For more information on command modes, refer to the “Using the Command Line Interface” chapter of
the Configuration Fundamentals Configuration Guide.

Note

You can issue EXEC-level Cisco IOS commands (such as show, clear, and debug commands) from
within global configuration mode or other modes by issuing the do command followed by the EXEC
command. See the do command for information on how to use this command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

1-6

OL-11437-01

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
Using the No and Default Forms of Commands

Using the No and Default Forms of Commands
Almost every configuration command has a no form. In general, enter the no form to disable a function.
Use the command without the keyword no to reenable a disabled function or to enable a function that is
disabled by default. For example, IP routing is enabled by default. To disable IP routing, specify the
no ip routing command and specify the ip routing command to reenable it. This publication provides
the complete syntax for the configuration commands and describes what the no form of a command does.
Configuration commands can have a default form. The default form of a command returns the command
setting to its default. Most commands are disabled by default, so the default form is the same as the no
form. However, some commands are enabled by default and have variables set to certain default values.
In these cases, the default form of the command enables the command and sets variables to their default
values. This publication describes what the default form of a command does if the command is not the
same as the no form.

Using the CLI String Search
The pattern in the command output is referred to as a string. The CLI string search feature allows you to
search or filter any show or more command output and allows you to search and filter at --More-prompts. This feature is useful when you need to sort though large amounts of output, or if you want to
exclude output that you do not need to see.
With the search function, you can begin unfiltered output at the first line that contains a regular
expression that you specify. You can then specify a maximum of one filter per command or start a new
search from the --More-- prompt.
A regular expression is a pattern (a phrase, number, or more complex pattern) that software uses to match
against show or more command output. Regular expressions are case sensitive and allow for complex
matching requirements. Examples of simple regular expressions are Serial, misses, and 138. Examples
of complex regular expressions are 00210..., ( is ), and [Oo]utput.
You can perform three types of filtering:
•

Use the begin keyword to begin output with the line that contains a specified regular expression.

•

Use the include keyword to include output lines that contain a specified regular expression.

•

Use the exclude keyword to exclude output lines that contain a specified regular expression.

You can then search this filtered output at the --More-- prompts.

Note

The CLI string search function does not allow you to search or filter backward through previous output;
filtering cannot be specified using HTTP access to the CLI.

Regular Expressions
A regular expression can be a single character that matches the same single character in the command
output or multiple characters that match the same multiple characters in the command output. This
section describes how to create both single-character patterns and multiple-character patterns and how
to create more complex regular expressions using multipliers, alternation, anchoring, and parentheses.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

1-7

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

Using the CLI String Search

Single-Character Patterns
The simplest regular expression is a single character that matches the same single character in the
command output. You can use any letter (A-Z, a-z) or digit (0-9) as a single-character pattern. You can
also use other keyboard characters (such as ! or ~) as single-character patterns, but certain keyboard
characters have special meaning when used in regular expressions. Table 1-4 lists the keyboard
characters with special meaning.
Table 1-4

Characters with Special Meaning

Character

Special Meaning

.

Matches any single character, including white space.

*

Matches 0 or more sequences of the pattern.

+

Matches 1 or more sequences of the pattern.

?

Matches 0 or 1 occurrences of the pattern.

^

Matches the beginning of the string.

$

Matches the end of the string.

_ (underscore)

Matches a comma (,), left brace ({), right brace (}), left parenthesis ( ( ),
right parenthesis ( ) ), the beginning of the string, the end of the string, or a
space.

To enter these special characters as single-character patterns, remove the special meaning by preceding
each character with a backslash (\). These examples are single-character patterns matching a dollar sign,
an underscore, and a plus sign, respectively.
\$ \_ \+
You can specify a range of single-character patterns to match against command output. For example, you
can create a regular expression that matches a string containing one of the following letters: a, e, i, o, or
u. One and only one of these characters must exist in the string for pattern matching to succeed. To
specify a range of single-character patterns, enclose the single-character patterns in square brackets
([ ]). For example,
[aeiou]
matches any one of the five vowels of the lowercase alphabet, while
[abcdABCD]
matches any one of the first four letters of the lower- or uppercase alphabet.
You can simplify ranges by entering only the end points of the range separated by a dash (-). Simplify
the previous range as follows:
[a-dA-D]
To add a dash as a single-character pattern in your range, include another dash and precede it with a
backslash:
[a-dA-D\-]
You can also include a right square bracket (]) as a single-character pattern in your range. To do so, enter
the following:
[a-dA-D\-\]]

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

1-8

OL-11437-01

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
Using the CLI String Search

The previous example matches any one of the first four letters of the lower- or uppercase alphabet, a
dash, or a right square bracket.
You can reverse the matching of the range by including a caret (^) at the start of the range. This example
matches any letter except the ones listed:
[^a-dqsv]
This example matches anything except a right square bracket (]) or the letter d:
[^\]d]

Multiple-Character Patterns
When creating regular expressions, you can also specify a pattern containing multiple characters. You
create multiple-character regular expressions by joining letters, digits, or keyboard characters that do not
have special meaning. For example, a4% is a multiple-character regular expression. Put a backslash in
front of the keyboard characters that have special meaning when you want to remove their special
meaning.
With multiple-character patterns, order is important. The regular expression a4% matches the character a
followed by a 4 followed by a % sign. If the string does not have a4%, in that order, pattern matching
fails. This multiple-character regular expression
a.
uses the special meaning of the period character to match the letter a followed by any single character.
With this example, the strings ab, a!, or a2 are all valid matches for the regular expression.
You can remove the special meaning of the period character by putting a backslash in front of it. In the
following expression
a\.
only the string a. matches this regular expression.
You can create a multiple-character regular expression containing all letters, all digits, all keyboard
characters, or a combination of letters, digits, and other keyboard characters. These examples are all
valid regular expressions:
telebit 3107 v32bis

Multipliers
You can create more complex regular expressions to match multiple occurrences of a specified regular
expression by using some special characters with your single- and multiple-character patterns. Table 1-5
lists the special characters that specify “multiples” of a regular expression.
Table 1-5

Special Characters Used as Multipliers

Character

Description

*

Matches 0 or more single- or multiple-character patterns.

+

Matches 1 or more single- or multiple-character patterns.

?

Matches 0 or 1 occurrences of the single- or multiple-character patterns.

This example matches any number of occurrences of the letter a, including none:
a*

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

1-9

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

Using the CLI String Search

This pattern requires that at least one letter a in the string is matched:
a+
This pattern matches the string bb or bab:
ba?b
This string matches any number of asterisks (*):
\**
To use multipliers with multiple-character patterns, you enclose the pattern in parentheses. In the
following example, the pattern matches any number of the multiple-character string ab:
(ab)*
As a more complex example, this pattern matches one or more instances of alphanumeric pairs (but not
none; that is, an empty string is not a match):
([A-Za-z][0-9])+
The order for matches using multipliers (*, +, or ?) is to put the longest construct first. Nested constructs
are matched from outside to inside. Concatenated constructs are matched beginning at the left side of the
construct. The regular expression matches A9b3, but not 9Ab3 because the letters are specified before
the numbers.

Alternation
Alternation allows you to specify alternative patterns to match against a string. You separate the
alternative patterns with a vertical bar (|). Exactly one of the alternatives can match the string. For
example, the regular expression
codex | telebit
matches the string codex or the string telebit, but not both codex and telebit.

Anchoring
You can match a regular expression pattern against the beginning or the end of the string. That is, you
can specify that the beginning or end of a string contains a specific pattern. You “anchor” these regular
expressions to a portion of the string using the special characters shown in Table 1-6.
Table 1-6

Special Characters Used for Anchoring

Character

Description

^

Matches the beginning of the string.

$

Matches the end of the string.

This regular expression matches a string only if the string starts with abcd:
^abcd
In contrast, this expression is in a range that matches any single letter, as long as it is not the letters a, b,
c, or d:
[^abcd]
With this example, the regular expression matches a string that ends with .12:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

1-10

OL-11437-01

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
Saving Configuration Changes

$\.12
Contrast these anchoring characters with the special character underscore (_). The underscore matches
the beginning of a string (^), the end of a string ($), parentheses ( ), space ( ), braces { }, comma (,), or
underscore (_). With the underscore character, you can specify that a pattern exist anywhere in the string.
For example,
_1300_
matches any string that has 1300 somewhere in the string. The string’s 1300 can be preceded by or end
with a space, brace, comma, or underscore. For example,
{1300_
matches the regular expression, but 21300 and 13000 do not.
Using the underscore character, you can replace long regular expression lists, such as the following:
^1300$ ^1300(space) (space)1300 {1300, ,1300, {1300} ,1300, (1300
with
_1300_

Parentheses for Recall
As shown in the “Multipliers” section on page 1-9, you use parentheses with multiple-character regular
expressions to multiply the occurrence of a pattern. You can also use parentheses around a single- or
multiple-character pattern to remember a pattern for use elsewhere in the regular expression.
To create a regular expression that recalls a previous pattern, you use parentheses to indicate a
remembered specific pattern and a backslash (\) followed by an integer to reuse the remembered pattern.
The integer specifies the occurrence of the parentheses in the regular expression pattern. If you have
more than one remembered pattern in your regular expression, then \1 indicates the first remembered
pattern, \2 indicates the second remembered pattern, and so on.
This regular expression uses parentheses for recall:
a(.)bc(.)\1\2
This regular expression matches an a followed by any character (call it character 1), followed by bc,
followed by any character (character 2), followed by character 1 again, and then followed by character 2
again. The regular expression can match aZbcTZT. The software remembers that character 1 is Z and
character 2 is T and then uses Z and T again later in the regular expression.

Saving Configuration Changes
To save your configuration changes to your startup configuration so that they will not be lost if there is
a system reload or power outage, enter the following command:
Router# copy system:running-config nvram:startup-config
Building configuration...

It might take a minute or two to save the configuration. After the configuration has been saved, the
following output appears:
[OK]
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

1-11

Chapter 1

Command-Line Interface for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

Saving Configuration Changes

On most platforms, this step saves the configuration to NVRAM. On the Class A flash file system
platforms, this step saves the configuration to the location that is specified by the CONFIG_FILE
environment variable. The CONFIG_FILE environment variable defaults to NVRAM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

1-12

OL-11437-01

C H A P T E R

2

Cisco IOS Commands for the Catalyst 6500
Series Switches with the
Supervisor Engine 32 PISA
This chapter contains an alphabetical listing of Cisco IOS commands that are unique to the Catalyst 6500
series switches that are configured with the Supervisor Engine 32 and the Programmable Intelligent
Services Accelerator (PISA). For information about Cisco IOS commands that are not contained in this
publication, refer to the current Cisco IOS documentation including:
•

Cisco IOS Release 12.2 Configuration Fundamentals Configuration Guide

•

Cisco IOS Release 12.2 Command Reference

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

action

action
To set the packet action clause, use the action command. To remove an action clause, use the no form
of this command.
action {{drop [log]} | {forward [capture]} | {redirect {interface interface-number}} |
{port-channel channel-id} {interface interface-number} | {port-channel channel-id} ...}
no action {{drop [log]} | {forward [capture]} | {redirect {interface interface-number}} |
{port-channel channel-id} {interface interface-number} | {port-channel channel-id} ...}

Syntax Description

drop

Drops the packets.

log

(Optional) Logs the dropped packets in the software.

forward

Forwards (switched by hardware) the packets to its destination.

capture

(Optional) Sets the capture bit for the forwarded packets so that ports with the
capture function enabled also receive the packets.

redirect interface

Redirects packets to the specified interfaces; possible valid values are
fastethernet, gigabitethernet, and tengigabitethernet. See the “Usage
Guidelines” section for additional valid values.

interface-number

Module and port number; see the “Usage Guidelines” section for valid values.

port-channel
channel-id

Specifies the port channel to redirect traffic; valid values are a maximum of
64 values ranging from 1 to 256.

Defaults

This command has no default settings.

Command Modes

VLAN access-map submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
Each redirect action allows you to specify a list of up to five destination interfaces. There is also a limit
of up to 255 different interface lists that can be used by redirect actions.
The redirect action supports interface lists instead of single interfaces as shown in the following
example:
[...] {redirect
channel-id}}

{{ethernet | gigabitethernet | tengigabitethernet} slot/port} | {port-channel

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-2

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
action

The action clause specifies the action to be taken when a match occurs.
The forwarded packets are subject to any applied Cisco IOS ACLs. The capture keyword sets the capture
bit in VACL-forwarded packets. Ports with the capture function enabled can receive VACL-forwarded
packets that have the capture bit set. Only VACL-forwarded packets that have the capture bit set can be
captured.
When the log keyword is specified, dropped packets are logged in the software. Only dropped IP packets
can be logged. The redirect keyword allows you to specify up to five interfaces, which can be physical
interfaces or EtherChannels. An EtherChannel member is not allowed to be a redirect interface.
VACLs on WAN interfaces support only the action forward capture command.
The action clause in a VACL can be forward, drop, capture, or redirect. Traffic can also be logged.
VACLs applied to WAN interfaces do not support the redirect or log actions.
The redirect interface must be in the VLAN for which the VACL map is configured.
In a VLAN access map, if at least one ACL is configured for a packet type (IP, IPX, or MAC), the default
action for the packet type is drop (deny).
If an ACL is not configured for a packet type, the default action for the packet type is forward (permit).
If an ACL for a packet type is configured and the ACL is empty or undefined, the configured action will
be applied to the packet type.

Examples

This example shows how to define a drop and log action:
Router(config-access-map)# action drop log
Router(config-access-map)#

This example shows how to define a forward action:
Router(config-access-map)# action forward
Router(config-access-map)#

Related Commands

Command

Description

match

Specifies the match clause by selecting one or more ACLs for a
VLAN access-map sequence.

show vlan access-map

Displays the contents of a VLAN-access map.

vlan access-map

Creates a VLAN access map or enters the VLAN access-map
command mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-3

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

apply

apply
To implement the proposed new VLAN database, increment the database configuration number, save it
in NVRAM, and propagate it throughout the administrative domain, use the apply command.
apply

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

VLAN configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The apply command implements the configuration changes that you made after you entered VLAN
database mode and uses them for the running configuration. This command keeps you in VLAN database
mode.
You cannot use this command when the Catalyst 6500 series switch is in the VTP client mode.
You can verify that VLAN database changes have occurred by entering the show vlan command in
privileged EXEC mode.

Examples

This example shows how to implement the proposed new VLAN database and recognize it as the current
database:
Router(config-if-vlan)# apply
Router(config-if-vlan)#

Related Commands

Command

Description

abort

Abandons the proposed new VLAN database.

exit

Implements the proposed new VLAN database.

reset

Leaves the proposed new VLAN database, remains in VLAN configuration mode,
and resets the new database so that it is identical to the current VLAN database.

show vlan

Displays VLAN information.

shutdown
vlan

Shuts down local traffic on a specified VLAN.

vtp

Configures the global VTP state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-4

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
arp access-list

arp access-list
To configure an ARP ACL for ARP inspection and QoS filtering and enter the ARP ACL configuration
submode, use the arp access-list command. To remove the ARP ACL, use the no form of this command.
arp access-list name
no arp access-list name

Syntax Description

name

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Name of the access list.

Once you are in the ARP ACL configuration submode, you can add permit or deny clauses to permit or
deny QoS to the flows. The following syntax is available in the ARP QoS ACL configuration submode
for QoS filtering; all other configurations will be rejected at the time of the policy-map attachment to
the interfaces:
{permit | deny} {ip {any | {host sender-ip [sender-ip-mask]}}} {mac any}
no {permit | deny} {ip {any | {host sender-ip [sender-ip-mask]}}} {mac any}
permit

Specifies to apply QoS to the flows.

deny

Skips the QoS action that is configured for traffic matching this ACE.

ip

Specifies the IP ARP packets.

any

Specifies any IP ARP packets.

host sender-ip

Specifies the IP address of the host sender.

sender-ip-mask

(Optional) Wildcard mask of the host sender.

mac any

Specifies MAC-layer ARP traffic.

no

Deletes an ACE from an ARP ACL.

Once you are in the ARP ACL configuration submode, the following configuration commands are
available for ARP inspection:
•

default—Sets a command to its defaults. You can use the deny and permit keywords and arguments
to configure the default settings.

•

deny—Specifies the packets to reject.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-5

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

arp access-list

•

exit—Exits the ACL configuration mode.

•

no—Negates a command or sets its defaults.

•

permit— Specifies the packets to forward.

You can enter the permit or deny keywords to configure the permit or deny clauses to forward or drop
ARP packets based on some matching criteria. The syntax for the permit and deny keywords are as
follows:
{permit | deny} ip {any | {host {sender-ip | {sender-ip sender-ip-mask}}}} mac {any | {host
{sender-mac | {sender-mac sender-mac-mask}}}} [log]
{permit | deny} request ip {any | {host {sender-ip | {sender-ip sender-ip-mask}}}} mac {any |
{host {sender-mac | {sender-mac sender-mac-mask}}}} [log]
{permit | deny} response ip {any | {host {sender-ip | {sender-ip sender-ip-mask}}}} [{any | {host
{target-ip | {target-ip target-ip-mask}}}}] mac {any | {host {sender-mac | {sender-mac
sender-mac-mask}}}} [any | {host {target-mac | {target-mac target-mac-mask}}]} [log]
permit

Specifies packets to forward.

deny

Specifies packets to reject.

ip

Specifies the sender IP address.

any

Specifies any sender IP address.

host

Specifies a single sender host.

sender-ip

IP address of the host sender.

sender-ip-mask

Wildcard mask of the host sender.

mac any

Specifies any MAC address.

mac host

Specifies a single sender host MAC address.

sender-mac

MAC address of the host sender.

sender-mac-mask

Wildcard mask of the host sender.

log

(Optional) Specifies log on match.

request

Specifies ARP requests.

response

Specifies ARP responses.

any

(Optional) Specifies any target address.

host

(Optional) Specifies a single target host.

target-mac

MAC address of the target host.

target-mac-mask

Subnet mask of the target host.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-6

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
arp access-list

If you enter the ip keyword without the request or response keywords, the configuration applies to both
requests and responses.
Once you define an ARP ACL, you can apply it to VLANs using the ip arp inspection filter command
for ARP inspection.
Incoming ARP packets are compared against the ARP access list, and packets are permitted only if the
access list permits them. If access lists deny packets because of explicit denies, they are dropped. If
packets get denied because of the implicit deny, they are matched against the list of DHCP bindings,
unless the access list is static or the packets are not compared against the bindings.
When an ARP access list is applied to a VLAN for dynamic ARP inspection, the ARP packets containing
only IP-to-Ethernet MAC bindings are compared against the ACLs. All other packet types are bridged
in the incoming VLAN without any validation.
ACL entries are scanned in the order that you enter them. The first matching entry is used. To improve
performance, place the most commonly used entries near the beginning of the ACL.
An implicit deny any ip mac any entry exists at the end of an ACL unless you include an explicit permit
ip any mac any entry at the end of the list.
All new entries to an existing list are placed at the end of the list. You cannot add entries to the middle
of a list.

Examples

This example shows how to create a new ARP ACL or enter the submode of an existing ARP ACL:
Router(config)# arp access-list arpacl22
Router(config-arp-nacl)#

This example shows how to create an ARP ACL named arp_filtering that denies QoS but permits
MAC-layer ARP traffic:
Router(config)# arp access-list arp_filtering
Router(config-arp-nacl)# permit ip host 1.1.1.1 mac any
Router(config-arp-nacl)# deny any ip mac any
Router(config-arp-nacl)#

Related Commands

Command

Description

show arp

Displays information about the ARP table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-7

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

attach

attach
To connect to a specific module from a remote location, use the attach command.
attach num

Syntax Description

num

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Module number; see the “Usage Guidelines” section for valid values.

Usage Guidelines
Caution

When you enter the attach or remote login command to access another console from your switch, if you
enter global or interface configuration mode commands, the switch might reset.
The valid values for num depend on the chassis that is used. For example, if you have a 13-slot chassis,
valid values for the module number are from 1 to 13.
This command is supported on the supervisor engine only.
When you execute the attach num command, the prompt changes to Switch-sp#.
The attach command is identical to the remote login module num command.
There are two ways to end this session:
•

You can enter the exit command as follows:
Switch-sp# exit
[Connection to Switch closed by foreign host]
Router#

•

You can press Ctrl-C three times as follows:
Switch-sp# ^C
Switch-sp# ^C
Switch-sp# ^C
Terminate remote login session? [confirm] y
[Connection to Switch closed by local host]
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-8

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
attach

Examples

This example shows how to log in remotely to the supervisor engine:
Router# attach 5
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session
Terminate remote login session? [confirm] yes
[Connection to Switch closed by local host]
Switch-sp#

Related Commands

Command

Description

remote login

Accesses the Catalyst 6500 series switch console or a specific module.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-9

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

auto-sync

auto-sync
To enable automatic synchronization of the configuration files in NVRAM, use the auto-sync command.
To disable automatic synchronization, use the no form of this command.
auto-sync {startup-config | config-register | bootvar | running-config | standard}
no auto-sync {startup-config | config-register | bootvar | standard}

Syntax Description

startup-config

Specifies the automatic synchronization of the startup configuration.

config-register

Specifies the automatic synchronization of the configuration register
configuration.

bootvar

Specifies the automatic synchronization of the BOOTVAR configuration.

running-config

Specifies the automatic synchronization of the running configuration.

standard

Specifies the automatic synchronization of the startup-config, BOOTVAR,
and configuration registers.

Defaults

Automatic synchronization of the running configuration.

Command Modes

Main-cpu redundancy

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the no auto-sync standard command, no automatic synchronizations occur. If you want to
enable any of the keywords, you have to enter the appropriate command for each keyword.

Examples

This example shows how (from the default configuration) to enable automatic synchronization of the
configuration register in the main CPU:
Router# configure terminal
Router (config)# redundancy
Router (config-r)# main-cpu
Router (config-r-mc)# no auto-sync standard
Router (config-r-mc)# auto-sync config-register
Router (config-r-mc)#

Related Commands

Command

Description

redundancy

Enters redundancy configuration mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-10

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
bgp regexp deterministic

bgp regexp deterministic
To configure Cisco IOS software to use the deterministic processing time regular expression engine, use
the bgp regexp deterministic command. To configure Cisco IOS software to use the default regular
expression engine, use the no form of this command.
bgp regexp deterministic
no bgp regexp deterministic

Syntax Description

This command has no keywords or arguments.

Defaults

The default regular expression engine is enabled.

Command Modes

Router configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The default Cisco IOS regular expression engine uses a recursive algorithm. This engine is effective but
uses more system resources as the complexity of regular expressions increases. The recursive algorithm
works well for simple regular expressions, but is less efficient when processing very complex regular
expressions because of the backtracking that is required by the default engine to process partial matches.
In some cases, CPU watchdog timeouts and stack overflow traces have occurred because of the length
of time that the default engine requires to process very complex regular expressions.
The deterministic processing time regular expression engine does not replace the default regular
expression engine. The new engine employs an improved algorithm that eliminates excessive
backtracking and greatly improves performance when processing complex regular expressions. When
the new engine is enabled, complex regular expressions are evaluated more quickly, and CPU watchdog
timeouts and stack overflow traces will not occur. However, the new regular expression engine takes
longer to process simple regular expressions than the default engine.
We recommend that you use the new regular expression engine if you need to evaluate complex regular
expressions or if you have observed problems related to evaluating regular expressions. We recommend
that you use the default regular expression engine if you use only simple regular expressions. The new
engine can be enabled by entering the bgp regexp deterministic command under a BGP routing process.
The default regular expression engine can be reenabled by entering the no form of this command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-11

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

bgp regexp deterministic

Examples

This example shows how to configure Cisco IOS software to use the deterministic processing time
regular expression engine:
Router(config)# router bgp 1
Router(config-router)# bgp regexp deterministic
Router(config-router)#

This example shows how to configure Cisco IOS software to use the default regular expression engine:
Router(config)# router bgp 1
Router(config-router)# no bgp regexp deterministic
Router(config-router)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-12

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
boot config

boot config
To specify the device and filename of the configuration file from which the system configures itself
during initialization (startup), use the boot config command. To remove the specification, use the no
form of this command.
boot config {device:file-name}
no boot config

Syntax Description

device:

Device identification; see the “Usage Guidelines” section for a list of the
valid values.

file-name

Configuration filename.

Defaults

The configuration file is located in NVRAM.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The valid values for device: are as follows:
•

disk0:
– One external CompactFlash Type II slot
– Supports CompactFlash Type II flash PC cards

•

sup-bootdisk:
– Supervisor Engine 32 256-MB internal CompactFlash flash memory
– From the Supervisor Engine 32 ROMMON, it is bootdisk:

•

bootdisk:
– PISA 256-MB internal CompactFlash flash memory
– Not accessible from the Supervisor Engine 32 ROMMON

When you use the boot config command, you affect only the running configuration. You must save the
environment variable setting to your startup configuration to place the information under ROM monitor
control and to have the environment variable function as expected. Use the copy system:running-config
nvram:startup-config command to save the environment variable from your running configuration to
your startup configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-13

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

boot config

The software displays an error message and does not update the CONFIG_FILE environment variable in
the following situations:
•

You specify nvram: as the file system, and it contains only a distilled version of the configuration.
(A distilled configuration does not contain access lists.)

•

You specify a configuration file in the filename argument that does not exist or is not valid.

During initialization, the NVRAM configuration is used when the CONFIG_FILE environment variable
does not exist or when it is null (such as at a first-time startup). If the software detects a problem with
NVRAM or the configuration it contains, the device enters setup mode.
When you use the no form of this command, the NVRAM configuration is used as the startup
configuration.
You can view the contents of the BOOT, BOOTLDR, and the CONFIG_FILE environment variables
using the show bootvar command. This command displays the settings for these variables as they exist
in the startup configuration as well as in the running configuration if a running configuration setting
differs from a startup configuration setting.

Examples

This example shows how to set the configuration file that is located in the internal flash memory to
configure itself during initialization. The third line copies the specification to the startup configuration,
ensuring that this specification takes effect upon the next reload.
Router (config)# boot config disk0:router-config
Router (config)# end
Router# copy system:running-config nvram:startup-config
Router#

Related Commands

Command

Description

copy
Saves the environment variable from the running configuration to the
system:running-config startup configuration.
nvram:startup-config
show bootvar

Displays information about the BOOT environment variable.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-14

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
boot system

boot system
To specify the system image that loads at startup, use the boot system command. To remove the startup
system image specification, use the no form of this command.
boot system filename
boot system flash [flash-fs:][partition-number:][filename]
no boot system [filename]
no boot system flash [flash-fs:][partition-number:][filename]

Syntax Description

filename

Specifies the configuration filename of the system image to load at
system startup.

flash

Boots from internal flash memory.

flash-fs:

(Optional) flash file system containing the system image to load at
startup; valid values are flash:, bootflash, slot0, and slot1.

partition-number:

(Optional) Number of the flash memory partition that contains the
system image to boot, specified by the optional filename argument.

filename

(Optional when used with the boot system flash command)
Case-senstive name of the system image to load at startup.

Defaults

If you configure the switch to boot from a network server but do not specify a system image file with the
boot system command, the switch uses the configuration register settings to determine the default
system image filename. The switch forms the default boot filename by starting with the word cisco and
then appending the octal equivalent of the boot field number in the configuration register, followed by a
hyphen (-) and the processor type name (cisconn-cpu). Refer to the appropriate hardware installation
guide for details on the configuration register and default filename. See also the config-register or
confreg command.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command will not work unless you set the config-register command properly.
TFTP boot is not supported on the Catalyst 6500 series switches.
If you do not enter the ip-address argument, this value defaults to the IP broadcast address of
255.255.255.255.
The colon is required when entering the flash-fs: argument.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-15

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

boot system

If you omit all arguments that follow the flash keyword, the system searches the internal flash memory
for the first bootable image.
When using the partition-number: argument, if you do not specify a filename, the route processor loads
the first valid file in the specified partition of flash memory. This argument is valid only on route
processors that can be partitioned.
The filename argument is case sensitive. If you do not specify a filename, the switch loads the first valid
file in the following:
•

The specified flash file system

•

The specified partition of flash memory

•

The default flash file system if you also omitted the flash-fs: argument

Enter several boot system commands to provide a fail-safe method for booting your route processor. The
route processor stores and executes the boot system commands in the order in which you enter them in
the configuration file. If you enter multiple boot commands of the same type (for example, if you enter
two commands that instruct the route processor to boot from different network servers), the route
processor tries them in the order in which they appear in the configuration file. If a boot system
command entry in the list specifies an invalid device, the route processor omits that entry. Use the boot
system rom command to specify use of the ROM system image as a backup to other boot commands in
the configuration.
For some platforms, you must load the boot image before you load the system image. However, on many
platforms, the boot image that you specify loads only if the route processor is booting from a network
server or if you do not specify the flash file system. If you specify the file system, the route processor
boots faster because it does not need to load the boot image first.
For detailed information, refer to the Cisco IOS Release 12.2 Command Reference.

Note

When you use the boot system command, you affect only the running configuration. You must save
the BOOT variable settings to your startup configuration to place the information under ROM
monitor control and to have the variable function as expected. Use the copy system:running-config
nvram:startup-config EXEC command to save the variable from your running configuration to your
startup configuration.
To view the contents of the BOOT variable, use the show bootenv EXEC command.

Examples

This example shows a system filename with the ROM software as a backup:
Router(config)# boot system flash config1
Router(config)# boot system rom

This example shows how to boot the system image filenamed igs-bpx-l from partition 2 of the flash
device:
Router(config)# boot system flash:2:igs-bpx-l
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-16

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
boot system

Related Commands

Command

Description

config-register

Changes the configuration register settings.

copy /noverify

Disables the automatic image verification for the current copy operation.

ip rcmd remote
username

Configures the remote username to be used when requesting a remote copy
using rcp.

show bootvar

Displays information about the BOOT environment variable.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-17

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

bridge-domain

bridge-domain
To enable BPDU translation, use the bridge-domain command.
bridge-domain {vlan | {PE-vlan dot1qtunnel}} [ignore-bpdu-pid] {pvst-tlv CE-vlan}

Syntax Description

vlan

VLAN number on a back-to back topology.

PE-vlan
dot1qtunnel

Specifies the provider-edge VLAN number on a Layer 2 topology.

ignore-bpdu-pid

(Optional) Sends out IEEE BPDUs using a PID of 0x00-07, which is
normally reserved for RFC 1483 data.

pvst-tlv

When transmitting, translates PVST+ BPDUs into IEEE BPDUs.
When receiving, translates IEEE BPDUs into PVST+ BPDUs.

CE-vlan

Customer-edge VLAN in the SSTP TLV to be inserted in an IEEE BPDU to
a PVST+ BPDU conversion.

Defaults

Disabled

Command Modes

VC or DLCI configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The CE-vlan argument does not have to be the same as the PE-vlan argument.
When connecting to a device that is completely RFC-1483 compliant, in which the IEEE BPDUs are sent
using a PID of 0x000E, you must use the ignore-bpdu-pid keywords in the bridge-domain command.
If you do not enter the ignore-bpdu-pid keyword, the PVC between the devices operates in an
RFC-1483 compliant topology, which is referred to as strict mode. Entering the ignore-bpdu-pid
keyword enters the loose mode. Both modes are described as follows:
•

Without the ignore-bpdu-pid keywords, in strict mode, IEEE BPDUs are sent out using a PID of
0x00-0E, which complies with RFC 1483.

•

With the ignore-bpdu-pid keywords, in loose mode, IEEE BPDUs are sent out using a PID of
0x00-07, which is normally reserved for RFC-1483 data.

Cisco-proprietary PVST+ BPDUs are always sent out on data frames using a PID of 0x00-07, regardless
of whether you enter the ignore-bpdu-pid keywords.
Use the ignore-bpdu-pid keywords when connecting to devices (such as ATM DSL modems) that send
PVST (or 802.1D) BPDUs with PID: 00-07.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-18

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
bridge-domain

The pvst-tlv keyword enables BPDU translation when interoperating with devices that understand only
PVST or IEEE Spanning Tree Protocol. Because the Catalyst 6500 series switch ATM modules support
PVST+ only, you must use the pvst-tlv keyword when connecting to a Catalyst 5000 family switch,
which only understands PVST on its ATM modules, or when connecting with other Cisco IOS route
processors, which understand IEEE format only.
When transmitting, the pvst-tlv keyword translates PVST+ BPDUs into IEEE BPDUs.
When receiving, the pvst-tlv keyword translates IEEE BPDUs into PVST+ BPDUs.

Examples

This example shows how to enable BPDU translation when a Catalyst 6500 series switch is connected
to a a device that only understand IEEE BPDUs in an RFC-1483 compliant topology:
Router(config-if-atm-vc)# bridge-domain 100 pvst-tlv 150
Router(config-if-atm-vc)#

The ignore-bpdu-pid keyword is not used because the device operates in an RFC-1483 compliant
topology for IEEE BPDUs.
This example shows how to enable BPDU translation when a Catalyst 5500 ATM module is a device that
only understands PVST BPDUs in a non-RFC1483 compliant topology. When a Catalyst 6500 series
switch is connected to a Catalyst 5500 ATM module, you must enter both keywords:
Router(config-if-atm-vc)# bridge-domain 100 ignore-bpdu-pid pvst-tlv 150
Router(config-if-atm-vc)#

To enable BPDU translation for the Layer 2 Protocol Tunneling (L2PT) topologies, use the following
command line:
Router(config-if-atm-vc)# bridge-domain 100 dot1qtunnel ignore-bpdu-pid pvst-tlv 150
Router(config-if-atm-vc)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-19

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

cd

cd
To change the default directory or file system, use the cd command.
cd [filesystem:][directory]

Syntax Description

filesystem:

(Optional) URL or alias of the directory or file system that is followed by a colon;
see the “Usage Guidelines” section for a list of the valid values.

directory

(Optional) Name of the directory.

Defaults

Initial default file system is disk0:

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The valid values for filesystem: are bootflash:, disk0: and disk1:.
For all EXEC commands that have an optional filesystem argument, the system uses the file system that
is specified by the cd command when you omit the optional filesystem argument. For example, the dir
command, which displays a list of files on a file system, contains an optional filesystem argument. When
you omit this argument, the system lists the files on the file system that is specified by the cd command.
If you do not specify a directory on a file system, the default is the root directory on that file system.

Examples

This example sets the default file system to the flash PC card that is inserted in disk 0:
Router# cd disk0:
Router# pwd
disk0:/

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-20

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
cd

Related Commands

Command

Description

dir

Displays a list of files on a file system.

mkdir disk0:

Creates a new directory in a flash file system.

pwd

Displays the current setting of the cd command.

show file system

Displays the available file systems.

undelete

Recovers a file that is marked “deleted” on a flash file system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-21

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

channel-group

channel-group
To assign and configure an EtherChannel interface to an EtherChannel group, use the channel-group
command. To remove the channel-group configuration from the interface, use the no form of this
command.
channel-group number mode {active | on | {auto [non-silent]} | {desirable [non-silent]} |
passive}
no channel-group number

Syntax Description

number

Channel-group number; valid values are a maximum of 64 values ranging from
1 to 256.

mode

Specifies the EtherChannel mode of the interface.

active

Enables LACP unconditionally.

on

Enables EtherChannel only.

auto

Places a port into a passive negotiating state in which the port responds to
PAgP packets that it receives but does not initiate PAgP packet negotiation.

non-silent

(Optional) Used with the auto or desirable mode when traffic is expected from
the other device.

desirable

Places a port into an active negotiating state in which the port initiates
negotiations with other ports by sending PAgP packets.

passive

Enables LACP only if an LACP device is detected.

Defaults

No channel groups are assigned.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

You cannot make any changes to the configuration of the Supervisor Engine 32 PISA EtherChannel.

Note

After the port becomes a member of the Supervisor Engine 32 PISA EtherChannel, only the no
channel-group 256 mode on command has any effect on the port until the port is no longer a member
of the PISA EtherChannel. While the port is a member of the PISA EtherChannel, all port configuration
commands except the no channel-group 256 mode on command are ignored.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-22

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
channel-group

By default, the Supervisor Engine 32 PISA EtherChannel (port channel interface 256, which is
automatically configured with the pisa-channel command) is a 1-Gps EtherChannel.

Note

The pisa-channel command is visible in the configuration file, but it is not user configurable.
The channel-group number is global and is shared between all the channeling protocols. If a specific
channel number is used for the PAgP-enabled interfaces of a channel group, that same channel number
cannot be used for configuring a channel that has LACP-enabled interfaces or vice versa.
Entering the auto or desirable keyword enables PAgP on the specified interface; the command will be
rejected if it is issued on an LACP-enabled interface.
The active and passive keywords are valid on PAgP-disabled interfaces only.
You can change the mode for an interface only if it is the only interface that is designated to the specified
channel group.
The on keyword forces the bundling of the interface on the channel without any negotiation.
You can manually configure a switch with PAgP on one side and LACP on the other side in the on mode.
With the on mode, a usable EtherChannel exists only when a port group in on mode is connected to
another port group in on mode.
If you enter the channel group command on an interface that is added to a channel with a different protocol
than the protocol you are entering, the command is rejected.
If the interface belongs to a channel, the no form of this command is rejected.
All ports in the same channel group must use the same protocol; you cannot run two protocols on one
channel group.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
You can change the protocol at any time, but this change causes all existing EtherChannels to reset to
the default channel mode for the new protocol.
Configure all ports in an EtherChannel to operate at the same speed and duplex mode (full duplex only
for LACP mode).
You do not have to create a port-channel interface before assigning a physical interface to a channel
group. A port-channel interface is created automatically when the channel group gets its first physical
interface, if it is not already created.
You do not have to disable the IP address that is assigned to a physical interface that is part of a channel
group, but it is highly recommended.
You can create both Layer 2 and Layer 3 port channels by entering the interface port-channel command
or when the channel group gets its first physical interface assignment. The port channels are not created
at runtime or dynamically.
Any configuration or attribute changes that you make to the port-channel interface are propagated to all
interfaces within the same channel group as the port channel (for example, configuration changes are
also propagated to the physical interfaces that are not part of the port channel but are part of the channel
group).
When configuring Layer 2 EtherChannels, you cannot put Layer 2 LAN ports into manually created
port-channel logical interfaces.
You cannot use the channel-group command on GE-WAN interfaces if MPLS is configured. You must
remove all IP, MPLS, and other Layer 3 configuration commands before using the channel-group
command with GE-WAN interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-23

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

channel-group

Note

You can enter the channel-group command again to delete the interface from the old group and move it
to the new group. For GE-WAN ports, however, you must manually remove the interface from the group
by entering the no channel-group command before assigning it to a new group.

Caution

Do not enable Layer 3 addresses on the physical EtherChannel interfaces. Assigning bridge groups on
the physical EtherChannel interfaces causes loops in your network.
For a complete list of guidelines, refer to the “Configuring EtherChannel” section of the Catalyst
Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Examples

This example shows how to add EtherChannel interface 1/0 to the EtherChannel group that is specified
by port-channel 1:
Router(config-if)# channel-group 1 mode on
Router(config-if)#

Related Commands

Command

Description

interface port-channel Creates a port-channel virtual interface and enters interface configuration
mode.
show etherchannel

Displays the EtherChannel information for a channel.

show interfaces
port-channel

Displays the traffic that is seen by a specific port channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-24

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
channel-protocol

channel-protocol
To set the protocol that is used on an interface to manage channeling, use the channel-protocol command.
To deselect the protocol, use the no form of this command.
channel-protocol {lacp | pagp}
no channel-protocol

Syntax Description

lacp

Specifies LACP to manage channeling.

pagp

Specifies PAgP to manage channeling.

Defaults

pagp

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can also select the protocol using the channel-group command.
If the interface belongs to a channel, the no form of this command is rejected.
All ports in an EtherChannel must use the same protocol.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
The channel-protocol command is performed on a channel-group basis and affects ports in the channel
group that is being reconfigured only. You can use the channel-protocol command to restrict anyone
from selecting a mode that is not applicable to the selected protocol.
Configure all ports in an EtherChannel to operate at the same speed and duplex mode (full duplex only
for LACP mode). For a complete list of guidelines, refer to the “Configuring EtherChannel” section of
the Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Examples

This example shows how to select LACP to manage channeling on the interface:
Router(config-if)# channel-protocol lacp
Router(config-if)#

Related Commands

Command

Description

channel-group

Assigns and configures an EtherChannel interface to an EtherChannel
group.

show etherchannel

Displays the EtherChannel information for a channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-25

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

class-map

class-map
To access the QoS class map configuration mode to configure QoS class maps, use the class-map
command. To delete a class map, use the no form of this command.
class-map name [match-all | match-any]
no class-map name [match-all | match-any]

Syntax Description

name

Class map name.

match-all

(Optional) Matches all match criteria in the class map.

match-any

(Optional) Matches one or more match criteria.

Defaults

When you do not specify the match-all or match-any keyword, the default is match-all.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You apply the class-map command and its subcommands on a per-interface basis to define packet
classification, marking, aggregate, and flow policing as part of a globally named service policy.
You can attach a service policy to an EtherChannel. Do not attach a service policy to a port that is a
member of an EtherChannel.
After you are in QoS class map configuration mode, these configuration commands are available:
•

exit—Used to exit from QoS class map configuration mode.

•

no—Used to remove a match statement from a class map.

•

match—Used to configure classification criteria. These optional match subcommands are
available:
– access-group {acl-index | acl-name}
– ip {dscp | precedence} value1 value2 ... value8

These subcommands appear in the CLI help but are not supported on LAN interfaces or WAN interfaces
on the OSMs:
•

input-interface {{interface interface-number} | {null number} | {vlan vlan-id}}

•

protocol linktype

•

destination-address mac mac-address

•

source-address mac mac-address

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-26

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
class-map

PFC QoS does not support these subcommands:
•

input-interface {{interface interface-number} | {null number} | {vlan vlan-id}}

•

protocol linktype

•

destination-address mac mac-address

•

source-address mac mac-address

•

qos-group group-value

If you enter these subcommands, PFC QoS does not detect the unsupported keywords until you attach a
policy map to an interface. When you try to attach the policy map to an interface, you get an error
message. For additional information, refer to the Catalyst Supervisor Engine 32 PISA Cisco IOS
Software Configuration Guide—Release 12.2ZY and the Cisco IOS Release 12.2 Command Reference
publications.
After you have configured the class-map name and are in class-map configuration mode, you can enter
the match subcommands. The syntax for these subcommands is as follows:
match {[{access-group acl-index} | acl-name] | [{ip dscp} | {precedence value}]}
See Table 2-1 for a syntax description of the match subcommands.
Table 2-1

match Syntax Description

Optional Subcommand

Description

access-group acl-index |
acl-name

Specifies the access list index or access list names; valid access list index values are from
1 to 2699.

access-group acl-name

Specifies the named access list.

ip dscp value1 value2 ...
value8

Specifies the IP DSCP values to match; valid values are from 0 to 63. You can enter up to
8 DSCP values, and separate each value with one white space.

ip precedence value1
value2 ... value8

Specifies the IP precedence values to match; valid values are from 0 to 7. You can enter up
to 8 precedence values, and separate each value with one white space.

Examples

This example shows how to access the class-map commands and subcommands, configure a class map
named ipp5, and enter a match statement for ip precedence 5:
Router(config)# class-map ipp5
Router(config-cmap)# match ip precedence 5
Router(config-cmap)#

This example shows how to configure the class map to match an already configured access list:
Router(config-cmap)# match access-group IPacl1
Router(config-cmap)#

Related Commands

Command

Description

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy map.

show class-map

Displays class-map information.

show policy-map
interface

Displays the statistics and the configurations of the input and output policies
that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-27

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

class-map type multicast-flows

class-map type multicast-flows
To create multicast class maps and enter the multicast class map configuration mode, use the class-map
type multicast-flows command. To delete a class map, use the no form of this command.
class-map type multicast-flows name
no class-map type multicast-flows name

Syntax Description

name

Defaults

No class is specified.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Class-map name.

After you are in the multicast class-map configuration mode, these configuration commands are
available:
•

exit—Used to exit from multicast class-map configuration mode.

•

group—Used to configure a multicast group range. The syntax for these subcommands is as
follows:
group group-addr [source addr | to addr]

See Table 2-2 for a syntax description of the group subcommands.
Table 2-2

group Syntax Description

Subcommand

Description

group-addr

Multicast group address.

source addr

(Optional) Specifies the channel-source address.

to addr

(Optional) Specifies the multicast group range end address.

•

no—Used to negate a command or set its defaults.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-28

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
class-map type multicast-flows

Examples

This example shows how to create a multicast class map:
Router(config)# class-map type multicast-flows static2
Router(config-mcast-flows-cmap)#

This example shows how to configure a multicast group range:
Router(config-mcast-flows-cmap)# group 192.0.2.0 source 192.0.2.10
Router(config-mcast-flows-cmap)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-29

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

class (policy-map)

class (policy-map)
To specify the name of the class that has a policy that you want to create or change or to specify the
default class (commonly known as the class-default class) before you configure its policy, use the class
command in QoS policy-map configuration mode. To remove a class from the policy map, use the no
form of this command.
class {class-name | class-default}
no class {class-name | class-default}

Syntax Description

class-name

Name of the class to configure or modify the policy.

class-default

Specifies the default class.

Defaults

No class is specified.

Command Modes

QoS policy-map configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can use the class (policy-map) command to specify the class name of the policy that you want to
create or change. You must first identify the policy map.
To identify the policy map (and enter the required QoS policy-map configuration mode), use the
policy-map command before you use the class (policy-map) command. After you specify a policy map,
you can configure the policy for new classes or modify the policy for any existing classes in that policy
map.
To define the class characteristics, use the following guidelines:
•

The class name that you specify in the policy map ties the characteristics for that class—that is, its
policy—to the class map and its match criteria, as configured using the class-map command.

•

When you configure a policy for a class, specify its bandwidth, and attach the policy map to an
interface, CBWFQ determines if the bandwidth requirement of the class can be satisfied. If so,
CBWFQ allocates a queue for the bandwidth requirement.

•

When a class is removed, available bandwidth for the interface is incremented by the amount that
was previously allocated to the class.

•

The maximum number of classes that you can configure within a policy map is 64.

The class-default keywords are used to specify the predefined default class called class-default. The
predefined default class called class-default is the class to which traffic is directed if that traffic does not
match any of the match criteria in the configured class maps.
You can define a class policy to use either tail drop by using the queue-limit command or WRED by
using the random-detect command. When using either tail drop or WRED, follow these guidelines:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-30

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
class (policy-map)

Examples

•

The queue-limit and random-detect commands cannot be used in the same class policy, but they
can be used in two class policies in the same policy map.

•

You can use the bandwidth command when either the queue-limit or the random-detect command
is configured in a class policy. The bandwidth command specifies the amount of bandwidth
allocated for the class.

•

For the predefined default class, you can use the fair-queue (class-default) command. The
fair-queue command specifies the number of dynamic queues for the default class. The fair-queue
command can be used in the same class policy as either the queue-limit or random-detect
command; it cannot be used with the bandwidth command.

This example shows how to configure three class policies included in the policy map called policy1.
Class1 specifies the policy for the traffic that matches access control list 136. Class2 specifies the policy
for the traffic on interface ethernet101. The third class is the default class to which packets that do not
satisfy configured match criteria are directed.
Router(config)# policy-map policy1
Router(config-pmap)# class-map class1
Router(config-pmap-c)# match access-group 136
Router(config-pmap)# class-map class2
Router(config-pmap-c)# match input-interface ethernet101

These examples show how to create the policy map that contains the policy specifications for class1,
class2, and the default class:
Router(config)# policy-map policy1
Router(config-pmap)# class-map class1
Router(config-pmap-c)# bandwidth 2000
Router(config-pmap-c)# queue-limit 40
Router(config-pmap)# class class2
Router(config-pmap-c)# bandwidth 3000
Router(config-pmap-c)# random-detect
Router(config-pmap-c)# random-detect exponential-weighting-constant 10
Router(config-pmap)# class class-default
Router(config-pmap-c)# fair-queue 16
Router(config-pmap-c)# queue-limit 20

Note

When the policy map containing these classes is attached to the interface to stipulate the service
policy for that interface, available bandwidth is assessed, including all class policies and the
Resource Reservation Protocol (RSVP), if configured.
This example shows how to configure the policy for the class-default default class included in the policy
map called policy8. The class-default default class has 20 hashed queues for the traffic that does not
meet the match criteria of the other classes that have policies that are defined by the policy map called
policy8 and a weight factor of 14 that is used to calculate the average queue size. For congestion
avoidance, WRED packet drop is used, not tail drop.
Router(config)# policy-map policy8
Router(config-pmap)# class class-default
Router(config-pmap-c)# fair-queue 20
Router(config-pmap-c)# random-detect exponential-weighting-constant 14

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-31

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

class (policy-map)

Related Commands

Command

Description

class-map

Accesses the QoS class map configuration mode to configure QoS
class maps.

fair-queue

Specifies the number of dynamic queues to be reserved for use by the
class-default class as part of the default class policy.

policy-map

Accesses the QoS policy-map configuration mode to configure the
QoS policy map.

queue-limit

Specifies or modifies the maximum number of packets that the queue
can hold for a class policy configured in a policy map.

random-detect (interface)

Enables WRED or DWRED.

random-detect exponential- Configures the WRED and DWRED exponential weight factor for the
weighting-constant
average queue size calculation for the queue.
random-detect precedence

Configures the WRED and DWRED parameters for a particular IP
precedence.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-32

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear cable-diagnostics tdr

clear cable-diagnostics tdr
To clear a specific interface or clear all interfaces that support time domain reflectometery (TDR), use
the clear cable-diagnostics tdr command.
clear cable-diagnostics tdr [interface interface interface-number]

Syntax Description

interface interface (Optional) Specifies the interface type; possible valid values are fastethernet,
gigabitethernet, and tengigabitethernet.
interface-number

Module and port number; see the “Usage Guidelines” section for valid values.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

See the Release Notes for Cisco IOS Release 12.2 SX on the Catalyst 6500 for the list of modules that
support TDR.

Examples

This example shows how to clear a specific interface:
Router# clear cable-diagnostics tdr interface gigabitethernet 4/1
Router#

Related Commands

Command

Description

show cable-diagnostics tdr

Displays the test results for the TDR cable diagnostics.

test cable-diagnostics

Tests the condition of 10-Gigabit Ethernet links or copper cables on
48-port 10/100/1000 BASE-T modules.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-33

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear catalyst6000 traffic-meter

clear catalyst6000 traffic-meter
To clear the traffic meter counters, use the clear catalyst6000 traffic-meter command.
clear catalyst6000 traffic-meter

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the traffic meter counters:
Router# clear catalyst6000 traffic-meter
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-34

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear counters

clear counters
To clear the interface counters, use the clear counters command.
clear counters [{interface interface-number} | {null interface-number} | {port-channel number}
| {vlan vlan-id}]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, and tengigabitethernet. See the “Usage Guidelines” section
for additional valid values.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 256.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

This command clears all the current interface counters from the interface unless you specify the
interface.

This command does not clear counters that are retrieved using SNMP but only those counters that appear
when you enter the show queueing interface command.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-35

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear counters

Examples

This example shows how to clear all interface counters:
Router# clear counters
Clear "show interface" counters on all interfaces [confirm]y
Router#

This example shows how to clear counters on a specific interface:
Router# clear counters vlan 200
Clear "show interface" counters on this interface [confirm]y
Router#

Related Commands

Command

Description

show queueing interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-36

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear fm netflow counters

clear fm netflow counters
To clear the NetFlow counters, use the clear fm netflow counters command.
clear fm netflow counters

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the NetFlow counters:
Router# clear fm netflow counters
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-37

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear interface gigabitethernet

clear interface gigabitethernet
To clear the hardware logic on a Gigabit Ethernet IEEE 802.3z interface, use the clear interface
gigabitethernet command.
clear interface gigabitethernet number

Syntax Description

number

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Gigabit Ethernet interface number; see the “Usage Guidelines”
section for valid values.

Usage Guidelines

The number argument designates the module and port number. Valid values for number depend on the
specified interface type and the chassis and module that are used. For example, if you specify a Gigabit
Ethernet interface and have a 48-port 10/100BASE-T Ethernet module that is installed in a 13-slot
chassis, valid values for the module number are from 1 to 13 and valid values for the port number are
from 1 to 48.

Examples

This example shows how to clear the hardware logic on a Gigabit Ethernet IEEE 802.3z interface:
Router# clear interface gigabitethernet 5
Router#

Related Commands

Command

Description

show interfaces status

Displays the interface status or a list of interfaces in an
error-disabled state on LAN ports only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-38

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear interface vlan

clear interface vlan
To clear the hardware logic on a VLAN, use the clear interface vlan command.
clear interface vlan vlan-id

Syntax Description

vlan-id

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

VLAN ID; valid values are from 1 to 4094.

This example shows how to clear the hardware logic on a specific VLAN:
Router# clear interface vlan 5
Router#

Related Commands

Command

Description

show interfaces status

Displays the interface status or a list of interfaces in an
error-disabled state on LAN ports only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-39

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip access-template

clear ip access-template
To clear statistical information on the access list, use the clear ip access-template command.
clear ip access-template access-list

Syntax Description

access-list

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Access list number; valid values are from 100 to 199 for an IP extended-access list
and from 2000 to 2699 for an expanded-range IP extended-access list.

This example shows how to clear statistical information on the access list:
Router# clear ip access-template 201
Router#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-40

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip arp inspection log

clear ip arp inspection log
To clear the status of the log buffer, use the clear ip arp inspection log command.
clear ip arp inspection log

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the contents of the log buffer:
Router# clear ip arp inspection log
Router#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and
enters the ARP ACL configuration submode.

show ip arp inspection log

Displays the status of the log buffer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-41

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip arp inspection statistics

clear ip arp inspection statistics
To clear the dynamic ARP inspection statistics, use the clear ip arp inspection statistics command.
clear ip arp inspection statistics [vlan vlan-range]

Syntax Description

vlan vlan-range

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Specifies the VLAN range.

This example shows how to clear the DAI statistics from VLAN 1:
Router# clear ip arp inspection statistics vlan 1
Router#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and
enters the ARP ACL configuration submode.

clear ip arp inspection log

Clears the status of the log buffer.

show ip arp inspection log

Displays the status of the log buffer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-42

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip auth-proxy watch-list

clear ip auth-proxy watch-list
To delete a single watch-list entry or all watch-list entries, use the clear ip auth-proxy watch-list
command.
clear ip auth-proxy watch-list {ip-addr | *}

Syntax Description

ip-addr

IP address to be deleted from the watch list.

*

All watch-list entries from the watch list.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC.

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you see entries in the watch list that you suspect are not valid, you can enter the clear ip auth-proxy
watch-list command to clear them manually instead of waiting for the watch list to expire.

Examples

This example shows how to delete a single watch-list entry:
Router# clear ip auth-proxy watch-list 12.0.0.2
Router#

This example shows how to delete all watch-list entries:
Router# clear ip auth-proxy watch-list *
Router#

Related Commands

Command

Description

ip auth-proxy
max-login-attempts

Limits the number of login attempts at a firewall interface and QoS
filtering and enters the ARP ACL configuration submode.

ip auth-proxy watch-list

Enables and configures an authentication proxy watch list.

show ip auth-proxy watch-list Displays the information about the authentication proxy watch list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-43

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip cef epoch full

clear ip cef epoch full
To begin a new epoch and increment the epoch number for all tables (including the adjacency table), use
the clear ip cef epoch full command.
clear ip cef epoch full

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the clear ip cef epoch full command when you want to rebuild a table. This command allows old
and new table entries to be distinguished within the same data structure and allows you to retain the old
CEF database table while constructing the new table.
These show commands display epoch information:

Examples

•

show ip cef summary—Displays the table epoch for a specific FIB table.

•

show ip cef detail—Displays the epoch value for each entry of a specific FIB table.

•

show adjacency summary—Displays the adjacency table epoch.

•

show adjacency detail—Displays the epoch value for each entry of the adjacency table.

This example shows the output before and after you clear the epoch table and increment the epoch
number:
Router# show ip cef epoch
CEF epoch information:
Table:Default-table
Table epoch:2 (164 entries at this epoch)
Adjacency table
Table epoch:1 (33 entries at this epoch)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-44

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip cef epoch full

Router# clear ip cef epoch full
Router# show ip cef epoch
CEF epoch information:
Table:Default-table
Table epoch:3 (164 entries at this epoch)
Adjacency table
Table epoch:2 (33 entries at this epoch)
Router#

Related Commands

Command

Description

show adjacency detail

Displays the information about the protocol detail and timer.

show adjacency
summary

Displays a summary of CEF-adjacency information.

show ip cef detail

Displays detailed FIB entry information.

show ip cef epoch

Displays the epoch information for the adjacency table and all FIB tables.

show ip cef summary

Displays a summary of the FIB.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-45

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip cef inconsistency

clear ip cef inconsistency
To clear the statistics and records for the CEF-consistency checker, use the clear ip cef inconsistency
command.
clear ip cef inconsistency

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command clears the statistics and records that accumulate when you enable the ip cef table
consistency-check command.

Examples

This example shows how to clear all statistics and records for the CEF-consistency checker:
Router# clear ip cef inconsistency
Router#

Related Commands

Command

Description

ip cef table
consistency-check

Enables the CEF-table consistency-checker types and parameters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-46

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip dhcp snooping

clear ip dhcp snooping
To clear the DHCP-snooping table without disabling DHCP snooping, use the clear ip dhcp snooping
command.
clear ip dhcp snooping {binding | database | statistics}

Syntax Description

binding

Clears the DHCP-snooping binding-entry table without disabling DHCP snooping.

database

Clears the DHCP-snooping database table without disabling DHCP snooping.

statistics

Clears the DHCP-snooping statistics table without disabling DHCP snooping.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the DHCP-snooping binding-entry table:
Router# clear ip dhcp snooping binding
Router#

This example shows how to clear the DHCP-snooping database table:
Router# clear ip dhcp snooping database
Router#

This example shows how to clear the DHCP-snooping statisics:
Router# clear ip dhcp snooping statistics
Router#

Related Commands

Command

Description

show ip dhcp snooping

Displays the DHCP snooping configuration.

show ip dhcp snooping binding

Displays the DHCP snooping binding entries.

show ip dhcp snooping database Displays the status of the DHCP snooping database agent.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-47

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip flow stats

clear ip flow stats
To clear the NetFlow-switching statistics, use the clear ip flow stats command.
clear ip flow stats

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show ip cache flow command displays the NetFlow-switching statistics.

Examples

This example shows how to clear the NetFlow-switching statistics:
Router# clear ip flow stats
Router#

Related Commands

Command

Description

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-48

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip igmp group

clear ip igmp group
To delete the entries for the IGMP-group cache, use the clear ip igmp group command.
clear ip igmp [vrf vrf-name] group [{interface interface-number} | {group-name | group-address}
{loopback interface-number} | {null interface-number} | {port-channel number} |
{vlan vlan-id}]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing and
forwarding (VRF) instance.

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, and tengigabitethernet.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

group-name

(Optional) Group name as defined in the DNS hosts table or with the ip host
command.

group-address

(Optional) Address of the multicast group in four-part, dotted notation.

loopback
interface-number

(Optional) Specifies the loopback interface; valid values are from 0 to
2147483647.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 256.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The IGMP cache contains a list of hosts on the directly connected LAN. If the switch has joined a group,
that group is also listed in the cache.
To delete all entries from the IGMP cache, specify the clear ip igmp group command with no
arguments.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-49

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip igmp group

Examples

This example shows how to clear the entries for a specific group from the IGMP cache:
Router# clear ip igmp group 224.0.255.1
Router#

This example shows how to clear the IGMP-group cache entries from a specific interface of the
IGMP-group cache:
Router# clear ip igmp group gigabitethernet 2/2
Router#

Related Commands

Command

Description

ip host

Defines a static host name-to-address mapping in the host cache.

show ip igmp groups

Displays the multicast groups with receivers that are directly connected to
the router and that were learned through IGMP.

show ip igmp interface Displays the information about the IGMP-interface status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-50

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip igmp snooping statistics

clear ip igmp snooping statistics
To clear the IGMP-snooping statistics, use the clear ip igmp snooping statistics command.
clear ip igmp snooping statistics [vlan vlan-id]

Syntax Description

vlan vlan-id

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Usage Guidelines

If you do not enter a VLAN, the IGMP-snooping statistics for all VLANs is cleared.

Examples

This example shows how to clear the IGMP-snooping statistics for all VLANs:
Router# clear ip igmp snooping statistics
Router#

This example shows how to clear the IGMP-snooping statistics for a specific VLAN:
Router# clear ip igmp snooping statistics vlan 300
Router#

Related Commands

Command

Description

show ip igmp snooping
statistics

Displays information about IGMPv3 statistics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-51

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip mroute

clear ip mroute
To delete entries from the IP multicast routing table, use the clear ip mroute command.
clear ip mroute [vrf vrf-name] {* | group} [source]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

*

Deletes all entries from the IP multicast routing table.

group

Name or IP address of the multicast group; see the “Usage Guidelines”
section for additional information.

source

(Optional) Name or address of a multicast source that is sending to the
group; see the “Usage Guidelines” section for additional information.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The group argument specifies one of the following:
•

Name of the multicast group as defined in the DNS hosts table or with the ip host command.

•

IP address of the multicast group in four-part, dotted notation.

If you specify a group name or address, you can also enter the source argument to specify a name or
address of a multicast source that is sending to the group. A source does not need to be a member of the
group.

Examples

This example shows how to delete all entries from the IP multicast routing table:
Router# clear ip mroute *
Router#

This example shows how to delete all sources on the 228.3.0.0 subnet that are sending to the multicast
group 224.2.205.42 from the IP multicast routing table. This example shows how to delete all sources
on network 228.3, not individual sources:
Router# clear ip mroute 224.2.205.42 228.3.0.0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-52

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip mroute

Related Commands

Command

Description

ip host

Defines a static host name-to-address mapping in the host cache.

show ip mroute

Displays the information about the IP-multicast routing table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-53

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip msdp peer

clear ip msdp peer
To clear the TCP connection to the specified MSDP peer, use the clear ip msdp peer command.
clear ip msdp [vrf vrf-name] peer {peer-address | peer-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or name of the MSDP peer to which the TCP connection is
cleared.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command closes the TCP connection to the peer, resets all the MSDP peer statistics, and clears the
input and output queues to and from the MSDP peer.

Examples

This example shows how to clear the TCP connection to the MSDP peer at 224.15.9.8:
Router# clear ip msdp peer 224.15.9.8
Router#

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-54

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip msdp sa-cache

clear ip msdp sa-cache
To clear MSDP source active cache entries, use the clear ip msdp sa-cache command.
clear ip msdp [vrf vrf-name] sa-cache [group-address | group-name]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

group-address | group-name

(Optional) Multicast group address or name for which source active
entries are cleared from the source active cache.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In order to have any source active entries in the cache to clear, you must enable source active caching
by entering the ip msdp cache-sa-state command.
If no multicast group is identified by group address or name, all source active cache entries are cleared.

Examples

This example shows how to clear the source active entries for the multicast group 224.5.6.7 from the
cache:
Router# clear ip msdp sa-cache 224.5.6.7
Router#

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

ip msdp cache-sa-state

Creates a source-active state on the router.

show ip msdp sa-cache

Displays (S, G) state learned from MSDP peers.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-55

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip msdp statistics

clear ip msdp statistics
To clear statistics counters for one or all of the MSDP peers without resetting the sessions, use the clear
ip msdp statistics command.
clear ip msdp [vrf vrf-name] statistics [peer-address | peer-name]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

(Optional) Address or name of the MSDP peers whose statistics
counters, reset count, and input/output count are cleared.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the counters for the peer named sanjose:
Router# clear ip msdp statistics sanjose
Router#

Related Commands

Command

Description

show ip msdp sa-cache

Displays (S, G) state learned from MSDP peers.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-56

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip pim auto-rp

clear ip pim auto-rp
To delete entries from the Auto-RP cache, use the clear ip pim auto-rp command.
clear ip pim [vrf vrf-name] auto-rp rp-address

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

rp-address

Rendevous-point address; see the “Usage Guidelines” section for additional
information.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enter the rp-address argument, only the entries related to the rendezvous point at this address
are cleared. If you omit this argument, the entire Auto-RP cache is cleared.

Examples

This example shows how to delete all entries from the Auto-RP cache:
Router# clear ip pim auto-rp 224.5.6.7
Router#

Related Commands

Command

Description

show ip pim rp mapping Displays the mappings for the PIM group to the active rendezvous
points.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-57

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip pim snooping statistics

clear ip pim snooping statistics
To delete the IP PIM-snooping global statistics, use the clear ip pim snooping statistics command.
clear ip pim snooping statistics

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the IP PIM statistics:
Router# clear ip pim snooping statistics
Router#

Related Commands

Command

Description

ip pim snooping (global
configuration mode)

Enables PIM snooping globally.

show ip pim snooping
statistics

Displays statistical information about IP PIM snooping.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-58

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear ip pim snooping vlan

clear ip pim snooping vlan
To delete the IP PIM-snooping entries on a specific VLAN, use the clear ip pim snooping vlan
command.
clear ip pim snooping vlan vlan-id mac-address gda-address
clear ip pim snooping vlan vlan-id mroute {* | {group-addr src-addr} {{downstream-neighbor
ip-addr} | {upstream-neighbor ip-addr}}}
clear ip pim snooping vlan vlan-id neighbor {* | ip-addr}

Syntax Description

vlan-id

VLAN ID; valid values are from 1 to 4094.

mac-address
gda-address

Specifies the multicast group MAC address to delete.

mroute *

Deletes all mroute entries.

mroute group-addr
src-addr

Deletes the mroute entries at the specified group and source IP address.

downstream-neighbor
ip-addr

Deletes the entries at the specified downstream neighbor originating the
join/prune message.

upstream-neighbor
ip-addr

Deletes the entries at the specified upstream neighbor receiving the
join/prune message.

neighbor *

Deletes all neighbors.

neighbor ip-addr

Deletes the neighbor at the specified IP address.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the IP PIM statistics on a specific VLAN:
Router# clear ip pim snooping vlan 25 statistics
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-59

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear ip pim snooping vlan

Related Commands

Command

Description

ip pim snooping (interface Enables PIM snooping on a specific interface.
configuration mode)
show ip pim snooping

Displays information about IP PIM snooping.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-60

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear lacp counters

clear lacp counters
To clear the statistics for all interfaces belonging to a specific channel group, use the clear lacp counters
command.
clear lacp [channel-group] counters

Syntax Description

channel-group

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Channel group number; valid values are from 1 to 256.

If you do not specify a channel-group, all channel groups are cleared.
If you enter this command for a channel group that contains members in PAgP mode, the command is ignored.

Examples

This example shows how to clear the statistics for a specific group:
Router# clear lacp 1 counters
Router#

Related Commands

Command

Description

show lacp

Displays LACP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-61

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear logging ip access-list cache

clear logging ip access-list cache
To clear all the entries from the OAL cache and send them to the syslog, use the clear logging ip
access-list cache command.
clear logging ip access-list cache

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear all the entries from the OAL cache and send them to the syslog:
Router# clear logging ip access-list cache
Router#

Related Commands

Command

Description

logging ip access-list cache
(global configuration mode)

Configures the OAL parameters globally.

logging ip access-list cache
(interface configuration mode)

Enables an OAL-logging cache on an interface that is based on
direction.

show logging ip access-list

Displays information about the logging IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-62

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mac-address-table dynamic

clear mac-address-table dynamic
To clear the dynamic address entries from the MAC-address table in Layer 2, use the clear
mac-address-table dynamic command.
clear mac-address-table dynamic [{address mac-addr} | {interface interface interface-number}
| {protocol {assigned | ip | ipx | other}}] [vlan vlan-id]

Syntax Description

address mac-addr

(Optional) Specifies the MAC address.

interface interface

(Optional) Specifies the interface type; possible valid values are
ethernet, fastethernet, gigabitethernet, and tengigabitethernet. See
the “Usage Guidelines” section for additional valid values.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section
for valid values.

protocol assigned

(Optional) Specifies the assigned protocol bucket accounts for such
protocols as DECnet, Banyan VINES, and AppleTalk.

protocol ip | ipx

(Optional) Specifies the protocol type of the entries to clear.

protocol other

(Optional) Specifies the protocol types (other than IP or IPX) of the
entries to clear.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Enter the clear mac-address-table dynamic command with no arguments to remove all dynamic entries
from the table.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-63

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mac-address-table dynamic

Examples

This example shows how to clear all dynamic Layer 2 entries for a specific interface (e2/1) and protocol
type (IPX):
Router# clear mac-address-table dynamic interface e2/1 protocol ipx
Router#

Related Commands

Command

Description

mac-address-table aging-time

Configures the aging time for entries in the Layer 2 table.

mac-address-table static

Adds static entries to the MAC-address table or configures a static
MAC address with IGMP snooping disabled for that address.

show mac-address-table

Displays the information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-64

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls acl counters

clear mls acl counters
To clear the MLS ACL counters, use the clear mls acl counters command.
clear mls acl counters {all | {interface interface interface-number} [{loopback interface-number}
| {null interface-number} | {port-channel number} | {vlan vlan-id}}]

Syntax Description

all

Clears all the MLS ACL counters for all interfaces.

interface interface

Clears counters that are associated with the specified interface; possible
valid values are ethernet, fastethernet, gigabitethernet, and
tengigabitethernet. See the “Usage Guidelines” section for additional
valid values.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

loopback
interface-number

(Optional) Specifies the loopback interface; valid values are from 0 to
2147483647.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 256.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the clear mls acl counters all, all the MLS ACL counters for all the modules and the
supervisor engines are cleared.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Examples

This example shows how to reset the MLS ACL counters in all interfaces:
Router# clear mls acl counters all
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-65

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls acl counters

Related Commands

Command

Description

show tcam interface

Displays information about the interface-based TCAM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-66

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls cef ip accounting per-prefix

clear mls cef ip accounting per-prefix
To clear information about the IP per-prefix accounting statistics, use the clear mls cef ip accounting
per-prefix command.
clear mls cef ip accounting per-prefix {all | {prefix mask [instance]}}

Syntax Description

all

Clears all per-prefix accounting statistics information.

prefix

Entry prefix in the format A.B.C.D.

mask

Entry prefix mask.

instance

(Optional) VPN Routing/Forwarding instance name.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear all information about the per-prefix accounting statistics:
Router# clear mls cef ip accounting per-prefix all
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-67

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls cef ipv6 accounting per-prefix

clear mls cef ipv6 accounting per-prefix
To clear information about the IPv6 per-prefix accounting statistics, use the clear mls cef ipv6
accounting per-prefix command.
clear mls cef ipv6 accounting per-prefix {all | {ipv6-address/mask [instance]}}

Syntax Description

all

Clears all per-prefix accounting statistics information.

ipv6-address

Entry IPv6 address; see the “Usage Guidelines” section for formatting
information.

mask

Entry prefix mask.

instance

(Optional) VPN Routing/Forwarding instance name.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When entering the ipv6-address/mask arguments, use this format, X:X:X:X::X/mask, where the valid
values for mask are from 0 to 128.

Examples

This example shows how to clear all information about the per-prefix accounting statistics:
Router# clear mls cef ipv6 accounting per-prefix all
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-68

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls ip multicast bidir-rpcache

clear mls ip multicast bidir-rpcache
To clear all bidirectional (Bider) rendezvous-point cache entries, use the clear mls ip multicast
bidir-rpcache command.
clear mls ip multicast bidir-rpcache

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to reset the Bidir counters:
Router# clear mls ip multicast bidir-rpcache
Router#

Related Commands

Command

Description

show mls ip multicast bidir Displays the Bidir hardware-switched entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-69

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls ip multicast group

clear mls ip multicast group
To delete an IP multicast group, use the clear mls ip multicast group command.
clear mls ip multicast group {ip-name | group-address}

Syntax Description

ip-name

Host IP name.

group-address

(Optional) Address of the multicast group in four-part, dotted notation.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to delete an IP multicast group:
Router# clear mls ip multicast group 224.0.255.1
Router#

Related Commands

Command

Description

show mls ip multicast group

Displays the entries for a specific multicast-group address.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-70

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls ip multicast statistics

clear mls ip multicast statistics
To reset the IP-multicast statistics counters, use the clear mls ip multicast statistics command.
clear mls ip multicast statistics

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to reset the IP-multicast statistics counters:
Router# clear mls ip multicast statistics
Router#

Related Commands

Command

Description

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-71

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls nde flow counters

clear mls nde flow counters
To clear the NDE counters, use the clear mls nde flow counters command.
clear mls nde flow counters

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to reset the NDE counters:
Router# clear mls nde flow counters
Router#

Related Commands

Command

Description

show mls nde

Displays information about the NDE hardware-switched flow.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-72

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls netflow

clear mls netflow
To clear the MLS NetFlow-shortcut entries, use the clear mls netflow command.
clear mls netflow ip [destination ip-addr [source ip-addr-spec]] [dynamic | {sw-installed
[non-static | static]}] [module mod]
clear mls netflow ipv6 [destination ipv6-addr[/ipv6-prefix] [source ipv6-addr[/ipv6-prefix]]]
[flow {tcp | udp}] [{destination | source} port-num] [dynamic | {sw-installed [non-static |
static]}] [module mod]
clear mls netflow mpls [top-label entry] [dynamic | {sw-installed [non-static | static]}]
[module mod]
clear mls ipx [[module mod] [destination ipx-network [ipx-node]] [source ipx-network]
[macs mac-addr] [macd mac-addr] [interface interface-num] | [all]]

Syntax Description

ip

Clears IP MLS entries.

destination
ip-addr

(Optional) Specifies a destination full IP address or a subnet address. See the
“Usage Guidelines” section for formatting guidelines.

source
ip-addr-spec

(Optional) Specifies a source full IP address or a subnet address. See the
“Usage Guidelines” section for formatting guidelines.

dynamic

(Optional) Clears NetFlow-statistics entries that are created in the hardware.

sw-installed
non-static

(Optional) Clears software-installed nonstatic entries.

sw-installed static (Optional) Clears software-installed static entries.
module mod

(Optional) Specifies a module number.

ipv6

Clears IP version 6 software-installed entries.

destination
ipv6-addr

(Optional) Specifies a destination full IPv6 address or a subnet address. See the
“Usage Guidelines” section for formatting guidelines.

/ipv6-prefix

(Optional) IPv6 prefix; valid values are from 0 to 128.

source iv6p-addr

(Optional) Specifies a source full IPv6 address or a subnet address. See the
“Usage Guidelines” section for formatting guidelines.

flow tcp

(Optional) Clears TCP flow information.

flow udp

(Optional) Clears UDP flow information.

destination
port-num

(Optional) Specifies a destination port number.

source port-num

(Optional) Specifies a source port number.

mpls

Clears MPLS software-installed entries.

top-label entry

(Optional) Clears top-label entries; valid values are from 1 to 4294967295.

ipx

Clears IPX MLS entries.

destination
ipx-network

(Optional) Specifies the destination IPX address. See the “Usage Guidelines”
section for formatting guidelines.

ipx-node

(Optional) IPX node address. See the “Usage Guidelines” section for
formatting guidelines.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-73

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls netflow

source
ipx-network

(Optional) Specifies the source IPX address. See the “Usage Guidelines”
section for formatting guidelines.

macs mac-addr

(Optional) Specifies the source MAC addresses to consider when searching for
entries to purge.

macd mac-addr

(Optional) Specifies the destination MAC addresses to consider when
searching for entries to purge.

interface
interface-num

(Optional) Clears entries that are associated with the specified VLAN or
interface.

all

(Optional) Clears all entries.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When entering the IPX address syntax, use the following format:
•

IPX network address—1..FFFFFFFE

•

IPX node address—x.x.x where x is 0..FFFF

•

IPX address—ipx_net.ipx_node (for example, 3.0034.1245.AB45, A43.0000.0000.0001)

Entering any combination of input parameters narrows the search of entries to be cleared. The
destination or source port-num keyword and argument should be specified as one of the following:
telnet, FTP, WWW, SMTP, X, or DNS.
Up to 16 routers can be included explicitly as MLS-RPs.
Use the following syntax to specify an IP subnet address:
•

ip-subnet-addr or ipv6-subnet-addr—Short subnet address format. The trailing decimal number 00
in an IP or IPv6 address YY.YY.YY.00 specifies the boundary for an IP or IPv6 subnet address. For
example, 172.22.36.00 indicates a 24-bit subnet address (subnet mask 172.22.36.00/255.255.255.0),
and 173.24.00.00 indicates a 16-bit subnet address (subnet mask 173.24.00.00/255.255.0.0).
However, this format can identify only a subnet address of 8, 16, or 24 bits.

•

ip-addr/subnet-mask or ipv6-addr/subnet-mask—Long subnet address format. For example,
172.22.252.00/255.255.252.00 indicates a 22-bit subnet address. This format can specify a subnet
address of any bit number. To provide more flexibility, the ip-addr or ipv6-addr is a full host
address, such as 172.22.253.1/255.255.252.00.

•

ip-addr/maskbits or ipv6-addr/maskbits—Simplified long subnet address format. The mask bits
specify the number of bits of the network masks. For example, 172.22.252.00/22 indicates a 22-bit
subnet address. The ip-addr or ipv6-addr is a full host address, such as 193.22.253.1/22, which has
the same subnet address as the ip-subnet-addr or ipv6-subnet-addr.

If you do not use the all keyword, you must specify at least one of the other four keywords (source,
destination, flow, or interface) and its arguments.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-74

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls netflow

A 0 value for the destination or source port-num keyword and argument clears all entries. Unspecified
options are treated as wildcards, and all entries are cleared.

Examples

This example shows how to clear all the entries that are associated with a specific module (2) and that
have a specific destination IP address (173.11.50.89):
Router# clear mls netflow ip destination 173.11.50.89 module 2
Router#

This example shows how to clear the IPv6 software-installed entries:
Router# clear mls netflow ipv6
Router#

This example shows how to clear the statistical information:
Router# clear mls netflow dynamic
Router#

Related Commands

Command

Description

show mls netflow ip

Displays information about the hardware NetFlow IP.

show mls netflow ipv6

Displays information about the hardware NetFlow IPv6 configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-75

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls qos

clear mls qos
To clear the MLS aggregate-QoS statistics, use the clear mls qos command.
clear mls qos [{ip | ipx | mac | mpls | ipv6 | arp} [{interface interface-number} |
{null interface-number} | {port-channel number} | {vlan vlan-id}]]

Syntax Description

ip

(Optional) Clears MLS IP aggregate-QoS statistics.

ipx

(Optional) Clears MLS IPX aggregate-QoS statistics.

mac

(Optional) Clears MLS MAC aggregate-QoS statistics.

mpls

(Optional) Clears MLS MPLS aggregate-QoS statistics.

ipv6

(Optional) Clears MLS IPv6 aggregate QoS statistics.

arp

(Optional) Clears MLS ARP aggregate QoS statistics.

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, and tengigabitethernet. See the “Usage Guidelines”
section for additional valid values.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 256.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

Entering the clear mls qos command affects the policing token bucket counters and might allow traffic
to be forwarded that would otherwise be policed.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-76

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls qos

If you enter the clear mls qos command with no arguments, the global and per-interface aggregate QoS
counters for all protocols are cleared.
If you do not enter an interface type, the protocol aggregate-QoS counters for all interfaces are cleared.

Examples

This example shows how to clear the global and per-interface aggregate-QoS counters for all protocols:
Router# clear mls qos
Router#

This example shows how to clear the specific protocol aggregate-QoS counters for all interfaces:
Router# clear mls qos ip
Router#

Related Commands

Command

Description

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-77

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear mls statistics

clear mls statistics
To reset the MLS statistics counters, use the clear mls statistics command.
clear mls statistics [module num]

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the module number.

Usage Guidelines

This command replaces the clear mls stats command.

Examples

This example shows how to reset the MLS statistics counters for all modules:
Router# clear mls statistics
Router#

This example shows how to reset the MLS statistics counters for a specific module:
Router# clear mls statistics module 5
Router#

Related Commands

Command

Description

show mls statistics

Displays the MLS statistics for the IP, IPX, multicast, Layer 2 protocol, and
QoS.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-78

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear mls stats

clear mls stats
To clear the MLS statistics, use the clear mls stats command.
clear mls stats

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the MLS statistics for all modules:
Router# clear mls stats
Router#

Related Commands

Command

Description

clear mls statistics

Resets the MLS statistics counters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-79

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear pagp

clear pagp
To clear the port-channel information, use the clear pagp command.
clear pagp {group-number | counters}

Syntax Description

group-number

Channel group number; valid values are a maximum of 64 values from
1 to 256.

counters

Clears traffic filters.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the port-channel information for a specific group:
Router# clear pagp 324
Router#

This example shows how to clear the port-channel traffic filters:
Router# clear pagp counters
Router#

Related Commands

Command

Description

show pagp

Displays port-channel information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-80

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear platform netint

clear platform netint
To clear the interrupt-throttling counters for the platform, use the clear platform netint command.
clear platform netint

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to clear the interrupt-throttling counters for the platform:
Router# clear platform netint
Router#

Related Commands

Command

Description

show platform netint

Displays the platform network-interrupt information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-81

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear port-security

clear port-security
To delete configured secure MAC addresses and sticky MAC addresses from the MAC address table,
use the clear port-security command.
clear port-security dynamic [{address mac-addr} | {interface interface-id}] [vlan vlan-id]

Syntax Description

address mac-addr

(Optional) Deletes the specified secure MAC address or sticky MAC
address.

interface interface-id

(Optional) Deletes all secure MAC addresses and sticky MAC addresses on
the specified physical port or port channel.

vlan vlan-id

(Optional) Deletes the specified secure MAC address or sticky MAC address
from the specified VLAN.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on negotiated trunks only.
If you enter the clear port-security command without adding any keywords or arguments, the switch
removes all the secure MAC addresses and sticky MAC addresses from the MAC address table.
If you enter the clear port-security dynamic interface interface-id command, all the secure MAC
addresses and sticky MAC addresses on an interface are removed from the MAC address table.
You can verify that the information was deleted by entering the show port-security command.

Examples

This example shows how to remove a specific secure address from the MAC address table:
Router# clear port-security dynamic address 0008.0070.0007
Router#

This example shows how to remove all the secure MAC addresses and sticky MAC addresses learned on
a specific interface:
Router# clear port-security dynamic interface gigabitethernet0/1
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-82

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear port-security

Related Commands

Command

Description

show port-security

Displays information about the port-security setting.

switchport port-security Adds a MAC address to the list of secure MAC addresses.
mac-address

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-83

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear spanning-tree detected-protocol

clear spanning-tree detected-protocol
To restart the protocol migration, use the clear spanning-tree detected-protocol command.
clear spanning-tree detected-protocol [interface interface interface-num]

Syntax Description

interface
interface

(Optional) Specifies the interface type and number; possible valid values for type
are ethernet, fastethernet, gigabitethernet, tengigabitethernet, port-channel,
and vlan. See the “Usage Guidelines” section for additional valid values.

interface-num Module and port number; see the “Usage Guidelines” section for valid values for
port-channel and vlan.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

RSTP and MST have built-in compatibility mechanisms that allow them to interact properly with other
versions of IEEE spanning tree or other regions. For example, a bridge running RSTP can send 802.1D
BPDUs on one of its ports when it is connected to a legacy bridge. An MST bridge can detect that a port
is at the boundary of a region when it receives a legacy BPDU or an MST BPDU that is associated with
a different region. These mechanisms are not always able to revert to the most efficient mode. For
example, an RSTP bridge that is designated for a legacy 802.1D stays in 802.1D mode even after the
legacy bridge has been removed from the link. Similarly, an MST port assumes that it is a boundary port
when the bridges to which it is connected have joined the same region. To force the MST port to
renegotiate with the neighbors, enter the clear spanning-tree detected-protocol command.
The valid values for interface-number depend on the specified interface type and the chassis and module
that are used. For example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T
Ethernet module that is installed in a 13-slot chassis, valid values for the module number are from 2 to 13
and valid values for the port number are 1 to 48.
The number of valid values for port-channel number are a maximum of 64 values ranging from 1 to 256.
If you enter the clear spanning-tree detected-protocol command with no arguments, the command is
applied to every port of the Catalyst 6500 series switch.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-84

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear spanning-tree detected-protocol

Examples

This example shows how to restart the protocol migration on a specific interface:
Router# clear spanning-tree detected-protocol fa1/1
Router#

Related Commands

Command

Description

show spanning-tree mst

Displays information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-85

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clear top counters interface report

clear top counters interface report
To clear the TopN reports, use the clear top counters interface report command.
clear top counters interface report number

Syntax Description

number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Number of ports to be displayed; valid values are from 1 to
5000 physical ports.

This command is supported on Ethernet, Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet ports
only. LAN ports on the OSMs are also supported.
The clear top interface report command clears all the completed reports. It does not clear the pending
TopN reports. When you specify a report number, the TopN task is cleared regardless of its status.

Examples

This example shows how to clear all TopN tasks:
Router# clear top counters interface report
04:00:06: %TOPN_COUNTERS-5-DELETED: TopN report
04:00:06: %TOPN_COUNTERS-5-DELETED: TopN report
04:00:06: %TOPN_COUNTERS-5-DELETED: TopN report
04:00:06: %TOPN_COUNTERS-5-DELETED: TopN report
Router#

1
2
3
4

deleted
deleted
deleted
deleted

by
by
by
by

the
the
the
the

console
console
console
console1/24/

This example shows the output if you attempt to clear a pending TopN task:
Router# clear top counters interface report 4
04:52:12: %TOPN_COUNTERS-5-KILLED: TopN report 4 killed by the sattili onvty0 (9.10.69.9)
Router#

Related Commands

Command

Description

collect top counters
interface

Lists the TopN processes and specific TopN reports.

show top counters
interface report

Displays TopN reports and information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-86

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clear vlan counters

clear vlan counters
To clear the software-cached counter values to start from zero again for a specified VLAN or all existing
VLANs, use the clear vlan counters command.
clear vlan [vlan-id] counters

Syntax Description

vlan-id

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) VLAN ID; see the “Usage Guidelines” section for valid
values.

Usage Guidelines

If you do not specify a vlan-id; the software-cached counter values for all existing VLANs are cleared.

Examples

This example shows how to clear the software-cached counter values for a specific VLAN:
Router# clear vlan 10 counters
Clear "show vlan" counters on this vlan [confirm]y
Router#

Related Commands

Command

Description

show vlan counters

Displays the software-cached counter values.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-87

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

clock

clock
To configure the port clocking mode for the 1000BASE-T transceivers, use the clock command. To
return to the default settings, use the no form of this command.
clock {auto | active [prefer] | passive [prefer]}
no clock

Syntax Description

auto

Enables the automatic clock configuration.

active

Enables the active operation.

prefer

(Optional) Negotiates the specified mode with the far end of the link.

passive

Enables the passive operation.

Defaults

auto

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the 1000BASE-T transceivers only.
If the clock mode of the near end of a link does not match the clock mode of the far end, the line protocol
does not come up.
The active and passive clock status is determined during autonegotiation before the transmission link is
established.
The clock command supports the following configurations:
•

auto—Autonegotiates with the far end of the link but gives preference to the active-clock switch.

•

active—Uses a local clock to determine transmitter-operation timing.

•

passive—Recovers the clock from the received signal and uses the recovered clock to determine
transmitter-operation timing.

•

active prefer—Autonegotiates with the far end of the link but gives preference to the active-clock
switch.

•

passive prefer—Autonegotiates with the far end of the link but gives preference to the
passive-clock switch.

Enter the show running-config interface command to display the current clock mode.
Enter the show interfaces command to display the clock mode that is negotiated by the firmware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-88

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
clock

Examples

This example shows how to enable the active-clock operation:
Router(config-if)# clock active
Router(config-if)#

Related Commands

Command

Description

show interfaces

Displays the traffic that is seen by a specific interface.

show running-config
interface

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-89

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

collect top counters interface

collect top counters interface
To list the TopN processes and specific TopN reports, use the collect top counters interface command.
collect top [number] counters interface interface-type [interval seconds] [sort-by sort-by-value]

Syntax Description

Defaults

number

(Optional) Number of ports to be displayed; valid values are from 1 to
5000 physical ports.

interface-type

Type of ports to be used in the TopN request; valid values are all, ethernet,
fastethernet, gigabitethernet, tengigabitethernet, layer-2 vlan-num, and
layer-3.

interval seconds

(Optional) Specifies the interval over which the statistics is gathered; valid
values are from 0 to 999 seconds.

sort-by sort-by-value

(Optional) Specifies the port statistic to generate the report on; valid values
are as follows:
•

broadcast—Sorts the report based on the receive and transmit
broadcast packets.

•

bytes—Sorts the report based on the receive and transmit bytes.

•

errors—Sorts the report based on the receive errors.

•

multicast—Sorts the report based on the receive and transmit multicast
packets.

•

overflow—Sorts the report based on the transmit overflow errors.

•

packets—Sorts the report based on the receive and transmit packets.

•

utilization—Sorts the report based on the port utilization.

The defaults are as follows:
•

number is 20 physical ports.

•

sort-by-value is util.

•

seconds is 30 seconds.

•

interface-type is all.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-90

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
collect top counters interface

Usage Guidelines

This command is supported on Ethernet, Fast Ethernet, Gigabit Ethernet and 10-Gigabit Ethernet ports
only. LAN ports on the OSMs are also supported.
If you specify an interval of 0 seconds, the TopN report is generated based on the absolute counters
value. You cannot specify the interval seconds keyword and argument when the sorting criteria is
utilization because utilization can only be computed over an interval.
When you specify the layer-2 vlan-num, valid values are from 1 to 4094 and indicates the number of the
Layer 2 interface.
Only a TopN task with a done status is allowed to display the report. If you try to view a report that is
incomplete (pending), an appropriate message is displayed.
The TopN utility collects the following port utilization data for each physical port over the seconds interval:
•

Total number of in and out bytes.

•

Total number of in and out packets.

•

Total number of in and out broadcast packets.

•

Total number of in and out multicast packets.

•

Total number of in errors (Ethernet ports such as CRC, undersize packets (+Runt), oversize packets,
fragmentation, and jabber).

•

Total number of buffer-overflow errors including outlost packets; for example, these errors include
transmit errors that are due to these buffer full and Ethernet ports: dmaTxOverflow and dmaTxFull.

After the collection of information, the ports are sorted according to the sort-by-value argument, and the top
number of ports are displayed.
When the TopN reports are ready, a syslog message is displayed that the TopN reports are available. You
can use the show top interface report command to view the reports. You can display the TopN reports
multiple times until you enter the clear top interface report command to clear the reports.
Use the clear top interface report command to clear the reports.

Examples

This example shows how to sort the TopN report based on the receive and transmit broadcast packets:
Router# collect top 40 counters interface all sort-by broadcast
Router#

This example shows how to sort the TopN report based on the receive and transmit broadcast packets
and specify the TopN sampling interval:
Router# collect top 40 counters interface all sort-by broadcast interval 500
Router#

Related Commands

Command

Description

clear top counters
interface report

Clears the TopN reports.

show top counters
interface report

Displays TopN reports and information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-91

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

control-plane

control-plane
To enter control-plane configuration mode, which allows users to associate or modify attributes or
parameters (such as a service policy) that are associated with the control plane of the device, use the
control-plane command.
control-plane

Syntax Description

This command has no arguments or keywords.

Defaults

No control plane service policies are defined.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

You must set a policy action for every class. If you do not set a policy action for every class, the traffic
skips the class that does not have a policy action and matches against the subsequent classes.
After you enter the control-plane command, you can define aggregate control plane services for your
route processor. For example, you can associate a service policy with the control plane to police all
traffic that is destined to the control plane.

Examples

These examples show how to configure trusted hosts with source addresses 10.1.1.1 and 10.1.1.2 to
forward Telnet packets to the control plane without constraint, while allowing all remaining Telnet
packets to be policed at the specified rate:
Router(config)# access-list 140 deny tcp host 10.1.1.1 any eq telnet
! Allow 10.1.1.2 trusted host traffic.
Router(config)# access-list 140 deny tcp host 10.1.1.2 any eq telnet
! Rate limit all other Telnet traffic.
Router(config)# access-list 140 permit tcp any any eq telnet
! Define class-map “telnet-class.”
Router(config)# class-map telnet-class
Router(config-cmap)# match access-group 140
Router(config-cmap)# exit
Router(config)# policy-map control-plane
Router(config-pmap)# class telnet-class

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-92

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
control-plane

Router(config-pmap-c)# police 80000 conform transmit exceed drop
Router(config-pmap-c)# exit
Router(config-pmap)# exit
! Define aggregate control plane service for the active Route Processor.
Router(config)# control-plane
Router(config-cp)# service-policy input control-plane-policy
Router(config-cp)# exit

Related Commands

Command

Description

class (policy-map)

Specifies the name of the class that has a policy that you want to create or
change or to specify the default class (commonly known as the class-default
class) before you configure its policy.

class-map

Accesses the QoS class-map configuration mode to configure QoS class
maps.

drop

Configures a traffic class to discard packets belonging to a specific class.

match access-group

Configures the match criteria for a class map on the basis of the specified
ACL.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

service-policy
(control-plane)

Attaches a policy map to a control plane for aggregate control plane
services.

show policy-map
control-plane

Displays the configuration either of a class or of all classes for the policy
map of a control plane.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-93

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

copy /noverify

copy /noverify
To disable the automatic image verification for the current copy operation, use the copy /noverify
command.
copy /noverify source-url destination-url

Syntax Description

source-url

Location URL or alias of the source file or directory to be copied; see
the “Usage Guidelines” section for additional information.

destination-url

Destination URL or alias of the copied file or directory; see the
“Usage Guidelines” section for additional information.

Defaults

Verification is done automatically after completion of a copy operation.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Timesaver

The exact format of the source and destination URLs varies according to the file or directory location.
You may enter either an alias keyword for a particular file or an alias keyword for a file system type (not
a file within a type).

Aliases are used to cut down on the amount of typing that you need to perform. For example, it is
easier to type copy run start (the abbreviated form of the copy running-config startup-config
command) than it is to type copy system:r nvram:s (the abbreviated form of the copy
system:running-config nvram:startup-config command). These aliases allow you to continue
using some of the common commands that are used in previous versions of Cisco IOS software.
Table 2-3 shows two keyword shortcuts to URLs.
Table 2-3

Common Keyword Aliases to URLs

Keyword

Source or Destination

running-config

(Optional) Specifies the alias for the system:running-config URL. This
keyword does not work in the more and show file command syntaxes.

startup-config

(Optional) Specifies the alias for the nvram:startup-config URL. The
nvram:startup-config keyword represents the configuration file that is used
during initialization (startup). This file is contained in NVRAM. This keyword
does not work in more and show file EXEC command syntaxes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-94

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
copy /noverify

Table 2-4 through Table 2-6 list aliases by file system type. If you do not specify an alias, the system
looks for a file in the current directory.
Table 2-4 lists the URL prefix aliases for special (opaque) file systems, Table 2-5 lists the URL prefix
aliases for network file systems, and Table 2-6 lists the URL prefix aliases for local writable storage file
systems.
Table 2-4

URL Prefix Aliases for Special File Systems

Alias

Source or Destination

flh:

Source URL for flash load helper log files.

nvram:

Router NVRAM. You can copy the startup configuration into or from NVRAM. You
can also display the size of a private configuration file.

null:

Null destination for copies or files. You can copy a remote file to null to determine its
size.

system:

Source or destination URL for system memory, which includes the running
configuration.

xmodem:

Source destination for the file from a network device that uses the Xmodem protocol.

ymodem:

Source destination for the file from a network device that uses the Ymodem protocol.

Table 2-5

URL Prefix Aliases for Network File Systems

Alias

Source or Destination

ftp:

Source or destination URL for an FTP network server. The syntax for this alias is as
follows:
ftp:[[[//username [:password]@]location]/directory]/filename.

rcp:

Source or destination URL for an rcp network server. The syntax for this alias is as
follows: rcp:[[[//username@]location]/directory]/filename.

tftp:

Source or destination URL for a TFTP network server. The syntax for this alias is
tftp:[[//location]/directory]/filename.

Table 2-6

URL Prefix Aliases for Local Writable Storage File Systems

Alias

Source or Destination

bootflash:

Source or destination URL for boot flash memory.

disk0: and
disk1:

Source or destination URL of rotating media.

flash:

Source or destination URL for flash memory. This alias is available on all
platforms.
For platforms that lack a flash device, note that flash: is aliased to slot0:, allowing
you to refer to the main flash memory storage area on all platforms.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-95

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

copy /noverify

Table 2-6

URL Prefix Aliases for Local Writable Storage File Systems (continued)

Alias

Source or Destination

slavebootflash:

Source or destination URL for internal flash memory on the slave RSP card of a
device that is configured for HSA.

slaveram:

NVRAM on a slave RSP card of a device that is configured for HSA.

slavedisk0:

Source or destination URL of the first PCMCIA card on a slave RSP card of a
device that is configured for HSA.

slavedisk1:

Source or destination URL of the second PCMCIA slot on a slave RSP card of a
device that is configured for HSA.

slaveslot0:

Source or destination URL of the first .PCMCIA card on a slave RSP card of a
router configured for HSA—Not supported

slaveslot1:

Source or destination URL of the second PCMCIA slot on a slave RSP card of a
router configured for HSA—Not supported.

slot0:

Source or destination URL of the first PCMCIA flash memory card—Not
supported.

slot1:

Source or destination URL of the second PCMCIA flash memory card—Not
supported.

You can enter on the command line all necessary source- and destination-URL information and the
username and password to use, or you can enter the copy command and have the switch prompt you for
any missing information.
If you enter information, choose one of the following three options: running-config, startup-config, or
a file system alias (see Table 2-3 through Table 2-6). The location of a file system dictates the format of
the source or destination URL.
The colon is required after the alias. However, earlier commands that do not require a colon remain
supported but are unavailable in context-sensitive help.
The entire copying process may take several minutes and differs from protocol to protocol and from
network to network.
In the alias syntax for ftp:, rcp:, and tftp:, the location is either an IP address or a hostname. The
filename is specified for the directory that is used for file transfers.
Enter the file verify auto command to set up verification globally.

Examples

This example shows how to disable the automatic image verification for the current copy operation:
Router# copy /noverify tftp: sup-bootflash:
.................................................
[OK - 24301348 bytes]
24301348 bytes copied in 157.328 secs (154463 bytes/sec)
Router#

Related Commands

Command

Description

file verify auto

Verifies the compressed Cisco IOS image checksum.

verify

Verifies the checksum of a file on a flash memory file system or computes
an MD5 signature for a file.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-96

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
define interface-range

define interface-range
To create an interface-range macro, use the define interface-range command.
define interface-range macro-name interface-range

Syntax Description

macro-name

Name of the interface range macro; the macro name can contain up to
32 characters.

interface-range

Interface range; for a list of valid values for interface ranges, see the
“Usage Guidelines” section.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The macro name is a 32-character maximum character string.
A macro can contain up to five ranges. An interface range cannot span slots. When entering the
interface-range, these formats can be used:
•

card-type {slot}/{first-interface} - {last-interface}

•

card-type {slot}/{first-interface} - {last-interface}

Valid values for card-type are as follows:
•

ethernet

•

fastethernet

•

gigabitethernet

•

loopback

•

tengigabitethernet

•

tunnel

•

vlan vlan-id (valid values are from 1 to 4094)

•

port-channel interface-number (valid values are from 1 to 256)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-97

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

define interface-range

Examples

This example shows how to create a multiple-interface macro:
Router(config)# define interface-range macro1 ethernet 1/2 - 5, fastethernet 5/5 - 10
Router(config)#

Related Commands

Command

Description

interface range

Executes a command on multiple ports at the same time.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-98

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic bootup level

diagnostic bootup level
To set the bootup diagnostic level, use the diagnostic bootup level command. To skip all diagnostic tests,
use the no form of this command.
diagnostic bootup level {minimal | complete}
default diagnostic bootup level
no diagnostic bootup level

Syntax Description

minimal

Specifies minimal diagnostics; see the “Usage Guidelines” section for
additional information.

complete

Specifies complete diagnostics; see the “Usage Guidelines” section for
additional information.

default

Returns to the default setting.

Defaults

minimal

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Setting the diagnostic level determines the level of testing that occurs when the system or module is
reset. The two levels are as follows:
•

Complete—Runs all tests.

•

Minimal—Runs only EARL tests for the supervisor engine and loopback tests for all ports in the
system.

Although the default is minimal, you can set the diagnostic level to complete for troubleshooting
hardware problems.
In certain circumstances, you might want to skip the bootup online diagnostics completely. For example,
you might skip the bootup online diagnostics to verify that a port is as bad as online diagnostics reports.
To skip online diagnostic testing completely, enter the no diagnostic bootup level command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-99

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic bootup level

For information on the diagnostic test types, see the show diagnostic command.
The new level takes effect at the next reload or the next time that an online insertion and removal is
performed.

Examples

This example shows how to set the bootup diagnostic level:
Router(config)# diagnostic bootup level complete
Router(config)#

Related Commands

Command

Description

show diagnostic
bootup level

Displays the coverage level for the configured boot-up diagnostics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-100

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic cns

diagnostic cns
To configure the CNS diagnostics, use the diagnostic cns command. To disable sending diagnostic
results to the CNS event bus, use the no form of this command.
diagnostic cns {publish | subscribe} [subject]
default diagnostic cns {publish | subscribe}
no diagnostic cns {publish | subscribe} [subject]

Syntax Description

publish

Sends diagnostic results to a remote network application to make decisions
and take corrective actions that are based on the diagnostic results.

subscribe

Receives messages from remote network applications to perform diagnostic
tests or retrieve diagnostic results.

subject

(Optional) Event subject name.

default

Sets the default.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The online diagnostics receive events by subscribing to an event subject name. The subject is the event
that you subscribe (receive) or publish (generate) through the CNS bus.
The diagnostic cns publish command sends diagnostic results to a remote network application to make
decisions and take corrective actions that are based on the diagnostic results.
The diagnostic cns subscribe command receives messages from remote network applications to
perform diagnostic tests or retrieve diagnostic results.

Examples

This example shows how to enable the publishing of diagnostic results:
Router(config)# diagnostic cns publish
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-101

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic cns

This example shows how to receive messages from remote network applications to perform diagnostic
tests or retrieve diagnostic results:
Router(config)# diagnostic cns subscribe
Router(config)#

This example shows how to set the default to publish:
Router(config)# default diagnostic cns publish
Router(config)#

Related Commands

Command

Description

show diagnostic cns

Displays the information about the CNS subject.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-102

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic event-log size

diagnostic event-log size
To modify the diagnostic event-log size dynamically, use the diagnostic event-log size command. To
return to the default settings, use the no form of this command.
diagnostic event-log size size
default diagnostic event-log size
no diagnostic event-log size

Syntax Description

size

Diagnostic event-log size; valid values are from 1 to 10000 entries.

default

Returns to the default setting.

Defaults

The size is 500 entries.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The events are dynamically allocated and stored in a circular queue.
You can enter either the default diagnostic event-log size command or the no diagnostic event-log size
command to return to the default settings.

Examples

This example shows how to set the diagnostic event-log size:
Router(config)# diagnostic event-log size 600
Router(config)#

Related Commands

Command

Description

show diagnostic events Displays the event log for the diagnostic events.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-103

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic monitor

diagnostic monitor
To configure the health-monitoring diagnostic testing, use the diagnostic monitor command. To disable
testing, use the no form of this command.
diagnostic monitor interval {module num} test {test-id | test-id-range | all} [hour hh] [min mm]
[second ss] [millisec ms] [day day]
diagnostic monitor syslog
diagnostic monitor {module num} test {test-id | test-id-range | all}
no diagnostic monitor {interval | syslog}

Syntax Description

Defaults

interval

Sets the interval between testing.

module num

Specifies the module number.

test

Specifies a test to run.

test-id

Identification number for the test to be run; see the “Usage Guidelines”
section for additional information.

test-id-range

Range of identification numbers for tests to be run; see the “Usage
Guidelines” section for additional information.

all

Runs all the diagnostic tests.

hour hh

(Optional) Specifies the number of hours between tests; see the “Usage
Guidelines” section for formatting guidelines.

min mm

(Optional) Specifies the number of minutes between tests; see the “Usage
Guidelines” section for formatting guidelines.

second ss

(Optional) Specifies the number of seconds between tests; see the “Usage
Guidelines” section for formatting guidelines.

millisec ms

(Optional) Specifies the number of milliseconds between tests; see the
“Usage Guidelines” section for formatting guidelines.

day day

(Optional) Specifies the number of days between tests; see the “Usage
Guidelines” section for formatting guidelines.

syslog

Enables the generation of a syslog message when a health-monitoring test
fails.

The defaults are as follows:

Command Modes

•

Depending on the test run, monitoring may be enabled or disabled.

•

Depending on the test run, the default monitoring interval varies.

•

syslog is enabled.

Global configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-104

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic monitor

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Use these guidelines when scheduling testing:
•

test-id—Enter the show diagnostic content command to display the test ID list.

•

test-id-range—Enter the show diagnostic content command to display the test ID list. Enter the
range as integers separated by a comma and a hyphen (for example, 1,3-6 specifies test IDs 1, 3, 4,
5, and 6).

•

hh—Enter the hours from 1 to 24.

•

mm—Enter the minutes from 1 to 60.

•

day—Enter the day of the week as a number from 1 to 7 (1 is Sunday).

•

ss—Enter the seconds from 1 to 60.

•

ms—Enter the milliseconds from 1 to 1000.

Enter the [no] diagnostic monitor test {test-id | test-id-range | all} command to enable or disable the
specified health monitoring test.
When entering the diagnostic monitor {module num} test {test-id | test-id-range | all} command,
observe the following:
•

Required
– Isolate network traffic by disabling all connected ports and do not pump test packets during the

test.
– Remove all modules for testing FIB TCAM and SSRAM memory on the PFC of the supervisor

engine.
– Reset the system or the test module before putting the system back into the normal operating

mode.
•

Recommended
– Turn off all background health-monitoring tests on the supervisor engine and the modules using

the no diagnostic monitor {module num} test {test-id | test-id-range | all} command.
The FIB TCAM test for central PFC3B (on the supervisor engine) takes approximately 4 hours and 30
minutes.
The FIB TCAM test takes approximately 16 hours.

Examples

This example shows how to run the specified test every 3 days, 10 hours, and 2 minutes:
Router(config)# diagnostic monitor interval module 1 test 1 day 3 hours 10 min 2
Router(config)#

This example shows how to enable the generation of a syslog message when any health-monitoring test
fails:
Router(config)# diagnostic monitor syslog
Router(config)#

Related Commands

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-105

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic monitor

Command

Description

show diagnostic content Displays test information including test ID, test attributes, and supported
coverage test levels for each test and for all modules.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-106

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic ondemand

diagnostic ondemand
To configure the ondemand diagnostics, use the diagnostic ondemand command.
diagnostic ondemand {iteration iteration-count} | {action-on-error {continue | stop}
[error-count]}

Syntax Description

Defaults

iteration
iteration-count

Sets the number of times that the same test will be rerun when the
command is issued.

action-on-error

Sets the execution action when an error is detected.

continue

Continues testing when a test failure is detected.

stop

Stops testing when a test failure is detected.

error-count

(Optional) Number of errors that are allowed before stopping; used with
the continue option.

The default settings are as follows:
•

iteration-count is 1.

•

action-on-error is continue.

•

error-count is 0.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Entering 0 for the error-count sets the number of errors that are allowed to unlimited.

Examples

This example shows how to set the on-demand testing iteration count:
Router# diagnostic ondemand iteration 4
Router#

This example shows how to set the execution action when an error is detected:
Router# diagnostic ondemand action-on-error continue 2
Router#

Related Commands

Command

Description

show diagnostic ondemand

Displays the settings for the on-demand diagnostics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-107

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic schedule test

diagnostic schedule test
To set the scheduling of test-based diagnostic testing for a specific module or schedule a supervisor engine
switchover, use the diagnostic schedule test command. To remove the scheduling, use the no form of this
command.
diagnostic schedule {module {num | active-sup-slot}} test {test-id | test-id-range | all} [port {num
| num-range | all}] {on mm dd yyyy hh:mm} | {daily hh:mm} | {weekly day-of-week hh:mm}
no diagnostic schedule test

Syntax Description

module num

Specifies the module number.

module
active-sup-slot

Specifies the slot number of the active supervisor engine.

test-id

Identification number for the test to be run; see the “Usage Guidelines”
section for additional information.

test-id-range

Range of identification numbers for tests to be run; see the “Usage
Guidelines” section for additional information.

all

Runs all diagnostic tests.

port

(Optional) Specifies the port to schedule testing.

num

Port number.

num-range

Range of port numbers, separated by a hyphen.

all

Specifies all ports.

on mm dd yyyy
hh:mm

Specifies the scheduling of a test-based diagnostic task; see the “Usage
Guidelines” section for formatting guidelines.

daily hh:mm

Specifies the daily scheduling of a test-based diagnostic task; see the
“Usage Guidelines” section for formatting guidelines.

weekly day-of-week
hh:mm

Specifies the weekly scheduling of a test-based diagnostic task; see the
“Usage Guidelines” section for formatting guidelines.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-108

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic schedule test

Usage Guidelines

Use these guidelines when scheduling testing:
•

test-id—Enter the show diagnostic content command to display the test ID list.

•

test-id-range—Enter the show diagnostic content command to display the test ID list. Enter the
range as integers separated by a comma and a hyphen (for example, 1,3-6 specifies test IDs 1, 3, 4,
5, and 6).

•

num-range—Enter the range as integers separated by a comma and a hyphen (for example, you can
enter 1,3-6 to specify ports 1, 3, 4, 5, and 6).

•

mm—Spell out the month such as january, february ... december (either uppercase or lowercase
characters).

•

dd—Enter the day as a 2-digit number.

•

yyyy—Enter the year as a 4-digit number.

•

hh:mm—Enter the time as a 2-digit number (for a 24-hour clock) for hours:minutes; the colon (:) is
required.

•

day-of-week—Spell out the day of the week, such as monday, tuesday... sunday (either uppercase or
lowercase characters).

•

port {num | num-range | all}—Is not supported when specifying a scheduled switchover.

Enter the show diagnostic content command to display the test ID list.
You can use the diagnostic schedule module active-sup-slot test test-id command to schedule a
switchover from the active supervisor engine to the standby supervisor engine.
Enter the show diagnostic content active-sup-slot command to display the test ID list and look for the
test ID in the ScheduleSwitchover field.
You can specify a periodic switchover (daily or weekly) or a single switchover occurrence at a specific
time using these commands:

Note

Examples

•

diagnostic schedule module active-sup-slot test test-id on mm dd yyyy hh:mm

•

diagnostic schedule module active-sup-slot test test-id daily hh:mm

•

diagnostic schedule module active-sup-slot test test-id weekly day-of-week hh:mm

To avoid system downtime if the standby supervisor engine cannot switch over the system, we
recommend that you schedule a switchover from the standby supervisor engine to the active supervisor
engine 10 minutes after the switchover occurs. See the “Examples” section for additional information.

This example shows how to schedule the diagnostic testing on a specific date and time for a specific module
and port:
Router(config)# diagnostic schedule module 1 test 1,2,5-9 port 3 on january 3 2003 23:32
Router(config)#

This example shows how to schedule the diagnostic testing to occur daily at a certain time for a specific port
and module:
Router(config)# diagnostic schedule module 1 test 1,2,5-9 port 3 daily 12:34
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-109

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic schedule test

This example shows how to schedule the diagnostic testing to occur weekly on a certain day for a specific
port and module:
Router(config)# diagnostic schedule module 1 test 1,2,5-9 port 3 weekly friday 09:23
Router(config)#

This example shows how to schedule a switchover for the active supervisor engine every Friday at
10:00 pm, and switch the standby supervisor engine back to the active supervisor engine 10 minutes after
the switchover occurs. For this example, these conditions apply:

Related Commands

•

test-id is 32.

•

The active supervisor engine is in slot 5.

•

The standby supervisor engine is in slot 6.

Command

Description

show diagnostic content

Displays test information including test ID, test attributes, and
supported coverage test levels for each test and for all modules.

show diagnostic schedule

Displays the current scheduled diagnostic tasks.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-110

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic start

diagnostic start
To run the specified diagnostic test, use the diagnostic start command.
diagnostic start {module num} test {test-id | test-id-range | minimal | complete | basic | per-port
| non-disruptive | all} [port {num | port#-range | all}]

Syntax Description

module num

Specifies the module number.

test

Specifies a test to run.

test-id

Identification number for the test to be run; see the “Usage Guidelines”
section for additional information.

test-id-range

Range of identification numbers for tests to be run; see the “Usage
Guidelines” section for additional information.

minimal

Runs minimal bootup diagnostic tests.

complete

Runs complete bootup diagnostic tests.

basic

Runs basic on-demand diagnostic tests.

per-port

Runs per-port level tests.

non-disruptive

Runs the nondisruptive health-monitoring tests.

all

Runs all diagnostic tests.

port num

(Optional) Specifies the interface port number.

port port#-range Specifies the interface port number range; see the “Usage Guidelines”
section for additional information.
port all

Specifies all ports.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

We recommend that before you enable any online diagnostics tests that you enable the logging
console/monitor to see all warning messages.

Note

We recommend that when you are running disruptive tests that you only run the tests when connected
through console. When disruptive tests are complete a warning message on the console recommends that
that you reload the system to return to normal operation. Note: Strictly follow this warning.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-111

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

diagnostic start

Note

While this test is running, all ports are shut down as a stress test is being performed with looping ports
internally and external traffic might skew the test results. The entire switch must be rebooted to bring
the switch to normal operation. When you issue the command to reload the switch, the system will ask
you if the configuration should be saved. Note: Do not save the configuration.

Note

If you are running the tests on a module that is not the supervisor engine, after the test is initiated and
complete, you must reset the module.

Note

Do not enter the diagnostic start module x test all command on systems that are configured with a
DFC3A because this command causes the TCAM test to fail.
Enter the show diagnostic content command to display the test ID list.
Enter the test-id-range or port#-range as integers separated by a comma and a hyphen (for example,
1,3-6 specifies test IDs 1, 3, 4, 5, and 6).
Use the diagnostic stop command to stop the testing process.

Examples

This example shows how to run the specified diagnostic test at the specified slot:
Router# diagnostic start module 1 test 5
Module 1:Running test(s) 5 may disrupt normal system operation
Do you want to run disruptive tests? [no]yes
00:48:14:Running OnDemand Diagnostics [Iteration #1] ...
00:48:14:%DIAG-SP-6-TEST_RUNNING:Module 1:Running TestNewLearn{ID=5} ...
00:48:14:%DIAG-SP-6-TEST_OK:Module 1:TestNewLearn{ID=5} has completed successfully
00:48:14:Running OnDemand Diagnostics [Iteration #2] ...
00:48:14:%DIAG-SP-6-TEST_RUNNING:Module 1:Running TestNewLearn{ID=5} ...
00:48:14:%DIAG-SP-6-TEST_OK:Module 1:TestNewLearn{ID=5} has completed successfully
Router#

Related Commands

Command

Description

diagnostic stop

Stops the testing process.

show diagnostic

Displays the test results of the online diagnostics and lists the
supported test suites.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-112

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
diagnostic stop

diagnostic stop
To stop the testing process, use the diagnostic stop command.
diagnostic stop {module num}

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Module number.

Usage Guidelines

Use the diagnostic start command to start the testing process.

Examples

This example shows how to stop the diagnostic test process:
Router# diagnostic stop module 3
Router#

Related Commands

Command

Description

diagnostic start

Runs the testing process.

show diagnostic

Displays the test results of the online diagnostics and lists the
supported test suites.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-113

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

disconnect qdm

disconnect qdm
To disconnect a QDM session, use the disconnect qdm command.
disconnect qdm [{client client-id}]

Syntax Description

client client-id

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Specifies a client to disconnect.

QDM is not supported on OSM interfaces.
If you enter the disconnect qdm command without any arguments, all QDM sessions are disconnected.
You can obtain the client-id by entering the show qdm status command.

Examples

This example shows how to disconnect a QDM session:
Router# disconnect qdm client 1
Router#

Related Commands

Command

Description

show qdm status

Displays information about the status for the currently active QDM clients
who are connected to the Catalyst 6500 series switch.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-114

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
do

do
To execute the EXEC-level commands from global configuration mode or other configuration modes or
submodes, use the do command.
do command

Syntax Description

command

Defaults

This command has no default settings.

Command Modes

Global configuration or any other configuration mode or submode from which you are executing the
EXEC-level command.

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

EXEC-level command to be executed.

Usage Guidelines
Caution

Do not enter the do command in EXEC mode. Interruption of service may occur.
You cannot use the do command to execute the configure terminal command because entering the
configure terminal command changes the mode to configuration mode.
You cannot use the do command to execute the copy or write command in the global configuration or
any other configuration mode or submode.

Examples

This example shows how to execute the EXEC-level show interfaces command from within global
configuration mode:
Router(config)# do show interfaces serial 3/0
Serial3/0 is up, line protocol is up
Hardware is M8T-RS232
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation HDLC, loopback not set, keepalive set (10 sec)
Last input never, output 1d17h, output hang never
Last clearing of "show interface" counters never
.
.
.
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-115

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

dot1x default

dot1x default
To reset the configurable 802.1X parameters to the default settings, use the dot1x default command.
dot1x default

Syntax Description

This command has no arguments or keywords.

Defaults

The default values are as follows:
•

The per-interface 802.1X protocol enable state is disabled (force-authorized).

•

The number of seconds between reauthentication attempts is 3600 seconds.

•

The quiet period is 60 seconds.

•

The retransmission time is 30 seconds.

•

The maximum retransmission number is 2 times.

•

The multiple host support is disabled.

•

The client timeout period is 30 seconds.

•

The authentication server timeout period is 30 seconds.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to reset the configurable 802.1X parameters to the default values:
Router(config-if)# dot1x default
Setting the Default Configuration for Dot1x on this interface
Router(config-if)#

Related Commands

Command

Description

show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-116

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
dot1x max-req

dot1x max-req
To set the number of times that the switch sends an EAP-request/identity frame to the client before
restarting the authentication process, use the dot1x max-req command. To return to the default settings,
use the no form of this command.
dot1x max-req count
no dot1x max-req

Syntax Description

count

Defaults

The count is 2.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Number of times that the switch sends an EAP-request/identity frame to the
client before restarting the authentication process; valid values are from 1 to 10.

Usage Guidelines

You should change the default value only to adjust for unusual circumstances such as unreliable links
or specific behavioral problems with certain clients and authentication servers.

Examples

This example shows how to set 5 as the number of times that the switch sends an EAP-request/identity
request before restarting the authentication process:
Router(config-if)# dot1x max-req 5
Router(config-if)#

Related Commands

Command

Description

show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-117

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

dot1x multi-hosts

dot1x multi-hosts
To allow multiple hosts (clients) on an 802.1X-authorized port, use the dot1x multi-hosts command. To
disallow multiple hosts, use the no form of this command.
dot1x multi-hosts
no dot1x multi-hosts

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Before entering this command, ensure that the dot1x port-control command is set to auto for the
specified interface.

Examples

This example shows how to allow multiple hosts:
Router(config-if)# dot1x multi-hosts
Router(config-if)#

This example shows how to disallow multiple hosts:
Router(config-if)# no dot1x multi-hosts
Router(config-if)#

Related Commands

Command

Description

dot1x port-control

Sets the port control value.

show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-118

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
dot1x port-control

dot1x port-control
To set the port control value, use the dot1x port-control command. To return to the default settings, use
the no form of this command.
dot1x port-control value
no dot1x port-control

Syntax Description

value

Defaults

force-authorized

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Port-control value; valid values are auto, force-authorized, and
force-unauthorized; see the “Usage Guidelines” section for more information.

The port-control value definitions are as follows:
•

force-authorized—Disables 802.1X port-based authentication and causes the port to transition to
the authorized state without any authentication exchange required. The port transmits and receives
normal traffic without 802.1X-based authentication of the client.

•

force-unauthorized—Causes the port to remain in the unauthorized state, ignoring all attempts by
the client to authenticate. Authentication services are not provided to the client through the
interface.

•

auto—Enables 802.1X port-based authentication and causes the port to begin in the unauthorized
state, allowing only EAPOL frames to be sent and received through the port. The authentication
process begins when the link state of the port transitions from down to up or when an EAPOL-start
frame is received. The system requests the identity of the client and begins relaying authentication
messages between the client and the authentication server. Each client attempting to access the
network is uniquely identified by the system by using the client’s MAC address.

To check the port-control configuration, enter the show dot1x command and check the Status column in
the 802.1X Port Summary section. An enabled status means that the port-control value is set either to
auto or to force-unauthorized.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-119

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

dot1x port-control

Examples

This example shows how to set the port control to auto:
Router(config-if)# dot1x port-control auto
Router(config-if)#

Related Commands

Command

Description

show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-120

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
dot1x reauthentication

dot1x reauthentication
To enable periodic reauthentication of the client, use the dot1x reauthentication command. To return
to the default settings, use the no form of this command.
dot1x reauthentication
no dot1x reauthentication

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Reauthentication does not disturb the status of an already authorized port.

Examples

This example shows how to enable periodic reauthentication of the client:
Router(config-if)# dot1x reauthentication
Router(config-if)#

This example shows how to disable periodic reauthentication of the client:
Router(config-if)# no dot1x reauthentication
Router(config-if)#

Related Commands

Command

Description

dot1x timeout

Sets the reauthentication timer.

show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-121

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

dot1x system-auth-control

dot1x system-auth-control
To enable 802.1X globally, use the dot1x system-auth-control command. To disable 802.1X globally,
use the no form of this command.
dot1x system-auth-control
no dot1x system-auth-control

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enable AAA and specify the authentication method list before enabling 802.1X. A method list
describes the sequence and authentication methods to be queried to authenticate a user.

Examples

This example shows how to enable 802.1X globally:
Router(config)# dot1x system-auth-control
Router(config)#

This example shows how to disable 802.1X globally:
Router(config)# no dot1x system-auth-control
Router(config)#

Related Commands

Command

Description

aaa authentication
dot1x

Specifies one or more AAA methods for use on interfaces running
IEEE 802.1X.

aaa new-model

Enables the AAA access-control model.

show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-122

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
dot1x timeout

dot1x timeout
To set the reauthentication timer, use the dot1x timeout command. To return to the default settings, use
the no form of this command.
dot1x timeout {{reauth-period seconds} | {quiet-period seconds} | {tx-period seconds} |
{supp-timeout seconds} | {server-timeout seconds}}
no dot1x timeout {reauth-period | quiet-period | tx-period | supp-timeout | server-timeout}

Syntax Description

Defaults

reauth-period seconds

Specifies the number of seconds between reauthentication attempts;
valid values are from 1 to 65535. See the “Usage Guidelines” section for
additional information.

quiet-period seconds

Specifies the number of seconds that the system remains in the quiet
state following a failed authentication exchange with the client; valid
values are from 0 to 65535 seconds.

tx-period seconds

Specifies the number of seconds that the system waits for a response to
an EAP-request/identity frame from the client before retransmitting the
request; valid values are from 30 to 65535 seconds.

supp-timeout seconds

Specifies the number of seconds that the system waits for the
retransmission of EAP-request packets; valid values are from 30 to
65535 seconds.

server-timeout seconds

Specifies the number of seconds that the system waits for the
retransmission of packets by the back-end authenticator to the
authentication server; valid values are from 30 to 65535 seconds.

The defaults are as follows:
•

reauth-period is 3600 seconds.

•

quiet-period is 60 seconds.

•

tx-period is 30 seconds.

•

supp-timeout is 30 seconds.

•

server-timeout is 30 seconds.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-123

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

dot1x timeout

Usage Guidelines

You must enable periodic reauthentication before you enter the dot1x timeout reauth-period
command. Enter the dot1x reauthentication command to enable periodic reauthentication. The dot1x
timeout reauth-period command affects the behavior of the system only if periodic reauthentication is
enabled.

Examples

This example shows how to set the number of seconds between reauthentication attempts to 4000:
Router(config-if)# dot1x timeout reauth-period 4000
Router(config-if)#

This example shows how to set the quiet time on the system to 30 seconds:
Router(config-if)# dot1x timeout quiet-period 30
Router(config-if)#

This example shows how to set 60 as the number of seconds to wait for a response to an
EAP-request/identity frame from the client before retransmitting the request:
Router(config-if)# dot1x timeout tx-period 60
Router(config-if)#

This example shows how to set the system-to-client retransmission time for the EAP-request frame to
25 seconds:
Router(config-if)# dot1x timeout supp-timeout 25
Router(config-if)#

This example shows how to set the system-to-authentication-server retransmission time for transport
layer packets to 25 seconds:
Router(config-if)# dot1x timeout server-timeout 25
Router(config-if)#

This example shows how to return to the default reauthorization period:
Router(config-if)# no dot1x timeout reauth-period
Router(config-if)#

Related Commands

Command

Description

dot1x reauthentication Enables periodic reauthentication of the client.
show dot1x

Displays 802.1X information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-124

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
duplex

duplex
To configure the duplex operation on an interface, use the duplex command. To return the system to
half-duplex mode, use the no form of this command.
duplex {full | half}
no duplex

Syntax Description

full

Specifies full-duplex operation.

half

Specifies half-duplex operation.

Defaults

half

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Table 2-7 lists the supported command options by interface.
Table 2-7

Supported duplex Command Options

Supported
Syntax

Interface Type
10/100-Mbps module

duplex [half |
full]

Default Setting

Usage Guidelines

See the “Usage
Guidelines”
section.

If the speed is set to auto, you will
not be able to set duplex.
If the speed is set to 10 or 100, and
you do not configure the duplex
setting, the duplex is set to half.

100-Mbps fiber
modules

duplex [half |
full]

half

—

Gigabit Ethernet
Interfaces

duplex full

full

—

10-Mbps ports

duplex [half |
full]

half

—

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-125

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

duplex

If the transmission speed on a 16-port RJ-45 Gigabit Ethernet port is set to 1000, the duplex mode is set
to full. If the transmission speed is changed to 10 or 100, the duplex mode stays at half duplex. You must
configure the correct duplex mode when the transmission speed is changed to 10 or 100 from 1000.
Gigabit Ethernet is full duplex only. You cannot change the duplex mode on Gigabit Ethernet ports or
on a 10/100/1000-Mps port that is configured for Gigabit Ethernet.
When manually configuring the interface speed to either 10 or 100 Mbps, you should also configure the
duplex mode on the interface.

Note

Caution

Catalyst 6500 series switches cannot automatically negotiate the interface speed and duplex mode if
either connecting interface is configured to a value other than auto.

Changing the interface speed and duplex mode configuration might shut down and reenable the interface
during the reconfiguration.
Table 2-8 describes the relationship and the results for the different combinations of the duplex and
speed commands.
Table 2-8

Examples

Relationship Between duplex and speed Commands

duplex Command

speed Command

Resulting System Action

duplex half or duplex full

speed auto

Autonegotiates both speed and
duplex modes

duplex half

speed 10

Forces 10 Mbps and half duplex

duplex full

speed 10

Forces 10 Mbps and full duplex

duplex half

speed 100

Forces 100 Mbps and half
duplex

duplex full

speed 100

Forces 100 Mbps and full
duplex

This example shows how to configure the interface for full-duplex operation:
Router(config-if)# duplex full
Router(config-if)#

Related Commands

Command

Description

interface

Selects an interface to configure and enters interface configuration mode.

show controllers

Displays information that is specific to the hardware on a module.

show interfaces

Displays the traffic that is seen by a specific interface.

speed

Sets the port speed for an Ethernet interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-126

OL-11437-01

2
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
eigrp event-log-size

eigrp event-log-size
To set the size of the IP-EIGRP event log, use the eigrp event-log-size command.
eigrp event-log-size size

Syntax Description

size

Defaults

This command has no default settings.

Command Modes

Router configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

IP-EIGRP event log size; valid values are from 0 to 4294967295.

Usage Guidelines

Once the configured event log size has been exceeded, the last configured (event-log-size) number of
lines of log is retained.

Examples

This example shows how to set the size of the IP-EIGRP event log:
Router (config-router)# eigrp event-log-size 5000010
Router (config-router)#

Related Commands

Command

Description

clear ip eigrp event

Clears the IP-EIGRP event log.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-127

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

encapsulation dot1q

encapsulation dot1q
To enable the IEEE 802.1Q encapsulation of traffic on a specified subinterface in the VLANs, use the
encapsulation dot1q command.
encapsulation dot1q vlan-id [native]

Syntax Description

vlan-id

Virtual LAN identifier; valid values are from 1 to 4094.

native

(Optional) Sets the PVID value of the port to the vlan-id value.

Defaults

This command has no default settings.

Command Modes

Subinterface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Always use the native keyword when the vlan-id is the ID of the 802.1Q native VLAN. Do not configure
encapsulation on the native VLAN of an 802.1Q trunk without the native keyword.
To enter the subinterface configuration mode, you must enter the interface configuration mode first and
then enter the interface command to specify a subinterface.

Examples

This example shows how to set encapsulation for VLAN traffic using the 802.1Q protocol for
VLAN 100:
Router(config-subif)# encapsulation dot1q 100
Router(config-subif)#

Related Commands

Command

Description

encapsulation isl

Enables ISL.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-128

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
encapsulation isl

encapsulation isl
To enable ISL, use the encapsulation isl command.
encapsulation isl vlan-identifier

Syntax Description

vlan-identifier

Defaults

This command has no default settings.

Command Modes

Subinterface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

VLAN identifier; valid values are from 1 to 4094.

ISL is a Cisco protocol that is used for interconnecting multiple switches and routers and for defining
VLAN topologies.
ISL encapsulation adds a 26-byte header to the beginning of the Ethernet frame. The header contains a
10-bit VLAN identifier that conveys VLAN membership identities between the switches.
To enter the subinterface configuration mode, you must enter the interface configuration mode first and
then enter the interface command to specify a subinterface.

Examples

This example shows how to enable ISL on Fast Ethernet subinterface 2/1.20:
Router(config-subif)# encapsulation isl 400
Router(config-subif)#

Related Commands

Command

Description

bridge-group

Assigns each network interface to a bridge group.

show bridge vlan

Displays virtual LAN subinterfaces.

show interfaces

Displays the traffic that is seen by a specific interface.

show vlans

Displays information about the Cisco IOS VLAN subinterfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-129

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

erase

erase
To erase a file system, use the erase command.
erase {const_nvram: | nvram: | startup-config:}

Syntax Description

const_nvram:

Erases all files under the const_nvram: partition.

nvram:

Erases NVRAM.

startup-config:

Erases the contents of the configuration memory.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

When you use the erase command to erase a file system, you cannot recover the files in the file system.
The erase nvram: command replaces the write erase command and the erase startup-config
command.
You can use the erase command on both Class B and Class C flash file systems only. To reclaim space
on flash file systems after deleting files using the delete command, you must use the erase command.
The erase command erases all of the files in the flash file system.
Class A flash file systems cannot be erased. You can delete individual files using the delete command
and then reclaim the space using the squeeze command. You can also use the format command to format
the flash file system.
On Class C flash file systems, space is dynamically reclaimed when you use the delete command. You
can also use either the format or erase command to reinitialize a Class C flash file system.
The erase nvram: command erases NVRAM. On Class A file system platforms, if the CONFIG_FILE
variable specifies a file in flash memory, the specified file is marked “deleted.”
You can enter the erase const_nvram command to erase the VLAN database configuration file.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-130

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
erase

Examples

This example shows how to erase the NVRAM and the startup configuration in the NVRAM:
Router# erase nvram:
Router#

Related Commands

Command

Description

boot config

Specifies the device and filename of the configuration file from which the
system configures itself during initialization (startup).

delete

Deletes a file from a flash memory device or NVRAM.

more
Displays the startup configuration file contained in NVRAM or specified by
nvram:startup-config: the CONFIG-FILE environment variable.
show bootvar

Displays information about the BOOT environment variable.

undelete

Recovers a file that is marked “deleted” on a flash file system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-131

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

errdisable detect cause

errdisable detect cause
To enable the error-disable detection, use the errdisable detect cause command. To disable the
error-disable detection, use the no form of this command.
errdisable detect cause {all | dtp-flap | l2ptguard | link-flap | packet-buffer-error | pagp-flap |
udld}
no errdisable detect cause {all | dtp-flap | l2ptguard | link-flap | pagp-flap | udld}

Syntax Description

all

Specifies error-disable detection for all error-disable causes.

dtp-flap

Specifies detection for the DTP flap error-disable cause.

l2ptguard

Specifies detection for the Layer 2 protocol-tunnel error-disable cause.

link-flap

Specifies detection for the link flap error-disable cause.

packet-buffer-error Causes the packet buffer error to error-disable the affected port.
pagp-flap

Specifies detection for the PAgP flap error-disable cause.

udld

Specifies detection for the UDLD error-disable cause.

Defaults

Enabled for all causes.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

Entering the no errdisable detect cause packet-buffer-error command allows you to detect the fault
that triggers a power cycle of the affected module.
A cause (bpduguard, dtp-flap, link-flap, pagp-flap, root-guard, udld) is defined as the reason why the
error-disabled state occurred. When a cause is detected on an interface, the interface is placed in an
error-disabled state (an operational state that is similiar to the link-down state).
You must enter the shutdown and then the no shutdown commands to recover an interface manually
from the error-disable state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-132

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
errdisable detect cause

Examples

This example shows how to enable the error-disable detection for the Layer 2 protocol-tunnel guard
error-disable cause:
Router(config)# errdisable detect cause l2ptguard
Router(config)#

Related Commands

Command

Description

show errdisable detect Displays the error-disable detection status.
show interfaces status

Displays the interface status or a list of interfaces in an error-disabled state
on LAN ports only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-133

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

errdisable recovery

errdisable recovery
To configure the recovery mechanism variables, use the errdisable recovery command. To return to the
default state, use the no form of this command.
errdisable recovery cause {all | arp-inspection | bpduguard | channel-misconfig |
dhcp-rate-limit | dtp-flap | gbic-invalid | l2ptguard | link-flap | pagp-flap |
pesecure-violation | security-violation | udld | unicast-flood}
errdisable recovery {interval interval}
no errdisable recovery cause {all | {arp-inspection | bpduguard | channel-misconfig |
dhcp-rate-limit | dtp-flap | gbic-invalid | l2ptguard | link-flap | pagp-flap |
pesecure-violation | security-violation | udld | unicast-flood}
no errdisable recovery {interval interval}

Syntax Description

Defaults

cause

Enables error-disable recovery to recover from a specific cause.

all

Enables the recovery timers for all error-disable causes.

arp-inspection

Enables error-disable recovery to recover from an ARP inspection cause.

bpduguard

Enables the recovery timer for the BPDU-guard error-disable cause.

channel-misconfig

Enables the recovery timer for the channel-misconfig error-disable cause.

dhcp-rate-limit

Enables the recovery timer for the DHCP rate-limit error-disable cause.

dtp-flap

Enables the recovery timer for the DTP-flap error-disable cause.

gbic-invalid

Enables the recovery timer for the GBIC invalid error-disable cause.

l2ptguard

Enables the recovery timer for the Layer 2 protocol-tunnel error-disable cause.

link-flap

Enables the recovery timer for the link-flap error-disable cause.

pagp-flap

Enables the recovery timer for the PAgP-flap error-disable cause.

pesecure-violation

Enables the recovery timer for the pesecure-violation error-disable cause.

security-violation

Enables the automatic recovery of ports that were disabled due to 802.1X
security violations.

udld

Enables the recovery timer for the UDLD error-disable cause.

unicast-flood

Enables the recovery timer for the unicast-flood error-disable cause.

interval interval

Specifies the time to recover from a specified error-disable cause; valid values
are from 30 to 86400 seconds.

The defaults are as follows:

Command Modes

•

Disabled for all causes.

•

If enabled, the interval is 300 seconds.

Global configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-134

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
errdisable recovery

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

The secure-violation option is not supported.
A cause (bpduguard, dhcp-rate-limit, dtp-flap, l2ptguard, link-flap, pagp-flap, security-violation,
channel-misconfig, psecure-violation, udld, or unicast-flood) is defined as the reason why the
error-disabled state occurred. When a cause is detected on an interface, the interface is placed in an
error-disabled state (an operational state that is similiar to the link-down state). If you do not enable
errdisable recovery for the cause, the interface stays in the error-disabled state until a shutdown and
no shutdown occurs. If you enable recovery for a cause, the interface is brought out of the error-disabled
state and allowed to retry operation once all the causes have timed out.
You must enter the shutdown and then the no shutdown commands to recover an interface manually
from the error-disabled state.

Examples

This example shows how to enable the recovery timer for the BPDU-guard error-disable cause:
Router(config)# errdisable recovery cause bpduguard
Router(config)#

This example shows how to set the timer to 300 seconds:
Router(config)# errdisable recovery interval 300
Router(config)#

Related Commands

Command

Description

show errdisable
recovery

Displays the information about the error-disable recovery timer.

show interfaces status

Displays the interface status or a list of interfaces in an error-disabled state
on LAN ports only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-135

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

error-detection packet-buffer action

error-detection packet-buffer action
To specify the action that a module takes after packet buffer memory failures, use the error-detection
packet-buffer action command. To return to the default settings, use the no form of this command.
error-detection packet-buffer action {module num} {error-disable | power-down | reset}

Syntax Description

module num

Specifies the module number.

error-disable

Error disables the module.

power-down

Powers down the module.

reset

Resets the module.

Defaults

Error-disable port group

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the following modules only:
•

WS-X6348-RJ-45

•

WS-X6348-RJ-21V

•

WS-X6248-RJ-45

•

WS-X6248-TEL

•

WS-X6148-RJ-45

•

WS-X6148-RJ-21

When you specify the reset keyword, a rapid reboot (approximately 10 seconds) and not a normal reboot
(approximately 45 to 50 seconds) is performed. Prior to this release, the module always went through a
non-rapid reboot.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-136

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
error-detection packet-buffer action

Examples

This example shows how to set the module to error disable after packet buffer memory failures:
Router(config)# error-detection packet-buffer action module 2 error-disable
Router(config)#

This example shows how to set the module to power down after packet buffer memory failures:
Router(config)# error-detection packet-buffer action module 2 power-down
Router(config)#

This example shows how to set the module to reset after packet buffer memory failures:
Router(config)# error-detection packet-buffer action module 2 reset
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-137

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

file verify auto

file verify auto
To verify the compressed Cisco IOS image checksum, use the file verify auto command. To turn off
automatic verification after a copy operation, use the no form of this command.
file verify auto
no file verify auto

Syntax Description

This command has no arguments or keywords.

Defaults

Verification is done automatically after completion of a copy operation.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Enter the copy /noverify command to override the default behavior for a single copy operation.

Examples

This example shows how to verify the compressed Cisco IOS image checksum:
Router(config)# file verify auto
Router(config)#

Related Commands

Command

Description

copy /noverify

Disables the automatic image verification for the current copy operation.

verify

Verifies the checksum of a file on a flash memory file system or computes
an MD5 signature for a file.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-138

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
flowcontrol

flowcontrol
To configure a port to send or receive pause frames, use the flowcontrol command.
flowcontrol {send | receive} {desired | off | on}

Syntax Description

Defaults

send

Specifies that a port sends pause frames.

receive

Specifies that a port processes pause frames.

desired

Obtains predictable results regardless of whether a remote port is set to on, off,
or desired.

off

Prevents a local port from receiving and processing pause frames from remote
ports or from sending pause frames to remote ports.

on

Enables a local port to receive and process pause frames from remote ports or
send pause frames to remote ports.

Flow-control defaults depend upon port speed. The defaults are as follows:
•

Gigabit Ethernet ports default to off for receive and desired for send.

•

Fast Ethernet ports default to off for receive and on for send.

•

On the 24-port 100BASE-FX and 48-port 10/100 BASE-TX RJ-45 modules, the default is off for
receive and off for send.

•

10-Gigabit Ethernet ports are permanently configured to respond to pause frames, and the default
for send is off.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The send and desired keywords are supported on Gigabit Ethernet ports only.
Pause frames are special packets that signal a source to stop sending frames for a specific period of time
because the buffers are full.
Gigabit Ethernet ports on the Catalyst 6500 series switches use flow control to inhibit the transmission
of packets to the port for a period of time; other Ethernet ports use flow control to respond to
flow-control requests.
If a Gigabit Ethernet port receive buffer becomes full, the port transmits a “pause” packet that tells
remote ports to delay sending more packets for a specified period of time. All Ethernet ports
(1000 Mbps, 100 Mbps, and 10 Mbps) can receive and act upon “pause” packets from other devices.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-139

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

flowcontrol

You can configure non-Gigabit Ethernet ports to ignore received pause frames (disable) or to react to
them (enable).
When used with receive, the on and desired keywords have the same result.
All Catalyst 6500 series switch Gigabit Ethernet ports can receive and process pause frames from remote
devices.
To obtain predictable results, follow these guidelines:

Examples

•

Use send on only when remote ports are set to receive on or receive desired.

•

Use send off only when remote ports are set to receive off or receive desired.

•

Use receive on only when remote ports are set to send on or send desired.

•

Use send off only when remote ports are set to receive off or receive desired.

These examples show how to configure the local port to not support any level of flow control by the
remote port:
Router(config-if)# flowcontrol receive off
Router(config-if)#
Router(config-if)# flowcontrol send off
Router(config-if)#

Related Commands

Command

Description

show interfaces
flowcontrol

Displays flow-control information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-140

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
format

format
To format a Class A or Class C flash file system, use the format command.
Class A flash file system:
format bootflash: [spare spare-number] filesystem1: [[filesystem2:][monlib-filename]]
Class C flash file system:
format filesystem1:

Caution

Syntax Description

Defaults

Reserve a certain number of memory sectors as spares, so that if some sectors fail, most of the flash PC
card can still be used. Otherwise, you must reformat the flash PC card when some of the sectors fail.

spare spare-number

(Optional) Specifies the number of the spare sectors to reserve on
formatted flash memory; valid values are from 0 to 16.

filesystem1:

File system to format; valid values are disk0:, bootdisk:, and
sup-bootdisk:; see the “Usage Guidelines” section for additional
information.

filesystem2:

(Optional) File system containing the monlib file to use for formatting
filesystem1 followed by a colon.

monlib-filename

(Optional) Name of the ROM monitor library file (monlib file) to use for
formatting the filesystem1 argument.

The defaults are as follows:
•

monlib-filename is the one bundled with the system software.

•

spare-number is zero (0).

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-141

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

format

Usage Guidelines

Use this command to format Class A or C flash memory file systems.
The Supervisor Engine 32 PISA has these flash memory devices:
•

disk0:
– One external CompactFlash Type II slot
– Supports CompactFlash Type II Flash PC cards

•

sup-bootdisk:
– Supervisor Engine 32 PISA 256-MB internal CompactFlash flash memory
– From the Supervisor Engine 32 PISA ROMMON, it is bootdisk:

•

bootdisk:
– PISA 256-MB internal CompactFlash flash memory
– Not accessible from the Supervisor Engine 32 PISA ROMMON

In some cases, you might need to insert a new flash PC card and load images or back up configuration
files onto it. Before you can use a new flash PC card, you must format it.
Sectors in flash PC cards can fail. Reserve certain flash PC sectors as “spares” by using the optional
spare argument on the format command to specify between 0 and 16 sectors as spares. If you reserve a
small number of spare sectors for emergencies, you can still use most of the flash PC card. If you specify
0 spare sectors and some sectors fail, you must reformat the flash PC card, which erases all existing data.
The monlib file is the ROM monitor library. The ROM monitor uses this file to access files in the flash
file system. The Cisco IOS system software contains a monlib file.
When used with HSA and you do not specify the monlib-filename argument, the system takes the ROM
monitor library file from the slave image bundle. If you specify the monlib-filename argument, the
system assumes that the files reside on the slave devices.
In the command syntax, filesystem1: specifies the device to format, and filesystem2: specifies the
optional device containing the monlib file, used to format filesystem1:. If you omit the optional
filesystem2: and monlib-filename arguments, the system formats filesystem1:, using the monlib file that
is already bundled with the system software. If you omit only the optional filesystem2: argument, the
system formats filesystem1:, using the monlib file from the device that you specified with the cd
command. If you omit only the optional monlib-filename argument, the system formats filesystem1:
using filesystem2:’s monlib file. When you specify both arguments—filesystem2: and
monlib-filename—the system formats filesystem1:, using the monlib file from the specified device. You
can specify filesystem1:’s own monlib file in this argument. If the system cannot find a monlib file, it
terminates its formatting.

Examples

This example shows how to format a CompactFlash PC card that is inserted in slot 0:
Router# format disk0:
Running config file on this device, proceed? [confirm]y
All sectors will be erased, proceed? [confirm]y
Enter volume id (up to 31 characters): 
Formatting sector 1 (erasing)
Format device disk0 completed

When the console returns to the EXEC prompt, the new CompactFlash PC card is successfully formatted
and ready for use.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-142

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
format

Related Commands

Command

Description

cd

Changes the default directory or file system.

copy

Copies any file from a source to a destination.

delete

Deletes a file from a flash memory device or NVRAM.

show file systems

Lists available file systems.

undelete

Recovers a file that is marked as “deleted” on a flash file system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-143

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

fsck

fsck
To check a flash file system for damage and to repair any problems, use the fsck command.
fsck [/automatic | disk0:]

Syntax Description

/automatic

(Optional) Specifies automatic mode; see the “Usage Guidelines” section for
additional information.

disk0:

(Optional) Specifies the file system to check.

Defaults

The current file system is checked if disk0: is not specified.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is valid only on Class C flash file systems and on PCMCIA ATA flash disks and
CompactFlash disks.
If you do not enter any arguments, the current file system is used. Use the pwd command to display the
current file system.
If you enter the disk0: keyword, the fsck utility checks the selected file system for problems. If a
problem is detected, a prompt is displayed asking if you want the problem fixed.
If you enter the /automatic keyword, you are prompted to confirm that you want the automatic mode.
In automatic mode, problems are fixed automatically and you are not prompted to confirm.
Table 2-9 lists the checks and actions that are performed by the fsck utility.

Table 2-9

fsck Utility Checks and Actions

Checks

Actions

Checks the boot sector and the partition table and reports No action.
the errors.
Validates the media with the signature in the last 2 bytes No action.
of the first sector (0x55 and 0xaa, respectively).
Checks the os_id to find whether this is a FAT-12 or
FAT-16 file system (valid values include 0, 1, 4, and 6).

No action.

Checks the number of FAT’s field (correct values are 1
and 2).

No action.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-144

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
fsck

Table 2-9

fsck Utility Checks and Actions (continued)

Checks

Actions

Checks these values:

No action.

•

n_fat_sectors cannot be less than 1.

•

n_root_entries cannot be less than 16.

•

n_root_sectors cannot be less than 2.

•

base_fat_sector, n_sectors_per_cluster, n_heads,
n_sectors_per_track is not 0.

Checks the files and FAT for these errors:
Checks the FAT for invalid cluster numbers.

If the cluster is a part of a file chain, the cluster is changed to
end of file (EOF). If the cluster is not part of a file chain, it is
added to the free list and unused cluster chain. Table 2-10 lists
valid cluster numbers; numbers other than those listed in
Table 2-10 are invalid numbers.

Checks the file’s cluster chain for loops.

If the loop is broken, the file is truncated at the cluster where the
looping occurred.

Checks the directories for nonzero size fields.

If directories are found with nonzero size fields, the size is reset
to zero.

Checks for invalid start cluster file numbers.

If the start cluster number of a file is invalid, the file is deleted.

Checks files for bad or free clusters.

If the file contains bad or free clusters, the file is truncated at the
last good cluster; an example is the cluster that points to this
bad/free cluster.

Checks to see if the file’s cluster chain is longer than
indicated by the size fields.

If the file’s cluster chain is longer than indicated by the size
fields, the file size is recalculated and the directory entry is
updated.

Checks to see if two or more files share the same cluster
(crosslinked).

If two or more files are crosslinked, you are prompted to accept
the repair, and one of the files is truncated.

Checks to see if the file’s cluster chain is shorter than is
indicated by the size fields.

If the file’s cluster chain is shorter than is indicated by the size
fields, the file size is recalculated and the directory entry is
updated.

Checks to see if there are any unused cluster chains.

If unused cluster chains are found, new files are created and
linked to that file with the name fsck-start cluster.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-145

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

fsck

Table 2-10 Valid Cluster Numbers

Examples

Cluster

FAT-12

FAT-16

Next entry in the chain

2-FEF

2-FFEF

Last entry in chain

FF8-FFF

FFF8-FFFF

Available cluster

0

0

Bad cluster

FF7

FFF7

This example shows how to run a check of the current file system:
Router# fsck
Checking the boot sector and partition table...
Checking FAT, Files and Directories...
Files
1) disk0:/FILE3 and
2) disk0:/FILE2
have a common cluster.
Press 1/2 to truncate or any other character to ignore[confirm] q
Ignoring this error and continuing with the rest of the check...
Files
1) disk0:/FILE5 and
2) disk0:/FILE4
have a common cluster.
Press 1/2 to truncate or any other character to ignore[confirm] 1
File disk0:/FILE5 truncated.
Files
1) disk0:/FILE7 and
2) disk0:/FILE6
have a common cluster.
.
.
.
1) disk0:/FILE15 and
2) disk0:/FILE13
have a common cluster.
Press 1/2 to truncate or any other character to ignore[confirm] i
Ignoring this error and continuing with the rest of the check...
Reclaiming unused space...
Created file disk0:/fsck-11 for an unused cluster chain
Created file disk0:/fsck-20 for an unused cluster chain
Created file disk0:/fsck-30 for an unused cluster chain
Created file disk0:/fsck-35 for an unused cluster chain
Created file disk0:/fsck-40 for an unused cluster chain
Created file disk0:/fsck-46 for an unused cluster chain
Created file disk0:/fsck-55 for an unused cluster chain
Created file disk0:/fsck-62 for an unused cluster chain
Created file disk0:/fsck-90 for an unused cluster chain
Updating FAT...
fsck of disk0: complete
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-146

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
hold-queue

hold-queue
To limit the size of the IP output queue on an interface, use the hold-queue command. To return to the
default settings, use the no form of this command.
hold-queue length {in | out}
no hold-queue {in | out}

Syntax Description

Defaults

length

Maximum number of packets in the queue; valid values are from 0 to 65535.

in

Specifies the input queue.

out

Specifies the output queue.

The defaults are as follows:
•

The input hold-queue limit is 75 packets.

•

The default output hold-queue limit is 40 packets.

•

The default is 10 packets for asynchronous interfaces.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is not supported on the OSM.
The default limits prevent a malfunctioning interface from consuming an excessive amount of memory.
There is no fixed upper limit to a queue size.
The default of ten packets allows the Cisco IOS software to queue a number of back-to-back routing
updates. The default is for asynchronous interfaces only; other media types have different defaults.
The guidelines for hold queues and priority queueing are as follows:
•

The hold queue stores packets that are received from the network and are waiting to be sent to the
client. We recommend that the queue size does not exceed ten packets on asynchronous interfaces.
For most other interfaces, the queue length should not exceed 100 packets.

•

The input hold queue prevents a single interface from flooding the network server with too many
input packets. Additional input packets are discarded if the interface has too many outstanding input
packets in the system.

•

If you use priority output queueing, you can set the length of the four output queues using the
priority-list global configuration command.You cannot use the hold-queue command to set an
output hold-queue length in this situation.

•

For slow links, use a small output hold-queue limit to prevent storing packets at a rate that exceeds
the transmission capability of the link.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-147

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

hold-queue

Caution

Examples

•

For fast links, use a large output hold-queue limit. A fast link may be busy for a short time (and
require the hold queue) but can empty the output hold queue quickly when capacity returns.

•

You can display the current hold-queue setting and the number of packets that are discarded because
of hold-queue overflows by using the show interfaces command in EXEC mode.

Increasing the hold queue can cause negative effects to network routing and response times. If you
use protocols that have sequence/acknowledge packets to determine round-trip times, do not increase
the output queue. Instead, we recommend that you program the Catalyst 6500 series switch to drop
packets and inform the hosts to slow down transmissions to match the available bandwidth. We do
not recommend that you make duplicate copies of the same packet within the network.

This example sets a small input queue on a slow serial line:
Router(config)# interface serial 0
Router(config-if)# hold-queue 30 i

Related Commands

Command

Description

priority-list

Establishes queueing priorities based on the protocol type.

show interfaces

Displays the traffic that is seen by a specific interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-148

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
hw-module boot

hw-module boot
To specify the boot options for the module through the power management bus control register, use the
hw-module boot command.
hw-module {module num} {boot [value] {config-register | eobc | {flash image} | rom-monitor}}

Syntax Description

module num

Specifies the number of the module to apply the command.

value

(Optional) Literal value for the module's boot option; valid values are from
0 to 15. See the “Usage Guidelines” section for additional information.

config-register

Boots using the module’s config-register value.

eobc

Boots using an image downloaded through EOBC.

flash image

Specifies the image number in the module’s internal flash memory for the
module’s boot option; valid values are 1 and 2.

rom-monitor

Stays in ROM-monitor mode after the module resets.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the CMM only.
The valid values for the boot value argument are as follows:

Examples

•

0—Specifies the module’s config-register value.

•

1—Specifies the first image in the flash memory.

•

2—Specifies the second image in the flash memory.

•

3—Stays in ROM-monitor mode after the module reset.

•

4—Specifies the download image through EOBC.

This example shows how to reload the module in slot 6 using the module’s config-register value:
Router# hw-module slot 1/6 boot config-register
Router#

This example shows how to reload the module in slot 3 using an image downloaded through EOBC:
Router# hw-module slot 1/3 boot eobc
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-149

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

hw-module fan-tray version

hw-module fan-tray version
To set the fan-type (high or low power) version, use the hw-module fan-tray version command.
hw-module fan-tray version [1 | 2]

Syntax Description

1|2

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Specifies the version number; see the “Usage Guidelines” section for
additional information.

Before you install a high-capacity fan tray, enter the hw-module fan-tray version 2 command to check
for configuration problems, such as power-supply compatibility and power sufficiency. If there are no
problems, a message is displayed to change the fan tray from version 1 to version 2. At this point, you
can remove the old fan tray and quickly insert the new high-capacity fan tray.
This command is supported on the following chassis:
•

WS-C6506

•

WS-C6509

•

WS-C6509-NEB/OSR7609

Set the version to 2 before installing higher power fan trays. Set the version to 1 before downgrading to
lower power fan trays.
Command confirmation does not change the fan power consumption or cooling capacity. It updates the
backplane IDPROM. The new values take effect the next time that you insert a fan.
When you execute the command, the software checks the configurations and prompts for confirmation. Any
illegal configurations (such as power-supply incompatibility) result in a warning being displayed and a
command failure.

Examples

This example shows how to set the fan type for lower power fan trays:
Router # hw-module fan-tray version 1
Router #

Related Commands

Command

Description

show environment cooling

Displays information about the cooling parameter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-150

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
hw-module oversubscription

hw-module oversubscription
To administratively disable the oversubscribed ports (3, 4, 7, and 8) on a module, use the hw-module
oversubscription command. Use the no form of this command to enable the oversubscribed ports.
hw-module {module num} oversubscription
no hw-module {module num} oversubscription

Syntax Description

module num

Defaults

Enabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Applies the command to a specific module.

This command is supported on the WS-X6708-10G-3C and the WS-X6708-10G-3CXL modules only.
When you disable the oversubscribed ports, the port is put into shutdown mode. In this mode, you cannot
enter the no shut command on the disabled ports. If you attempt to enter the no shut command on the
disabled ports, this message appears:
The current module is operating in non-oversubscription mode. To utilise this interface,
enable oversubscription mode for the module.

The num argument designates the module number. Valid values depend on the chassis that is used. For
example, if you have a 13-slot chassis, valid values for the module number are from 1 to 13.
When you enter the show interfaces command on the disabled ports, the output displays “disabled for
performance” to distinguish between the normal port shutdown and the shutdown for performance.

Examples

This example shows how to administratively disable the oversubscribed ports on a module:
Router # hw-module module 3 oversubscription
Router #

This example shows how to administratively enable the oversubscribed ports on a module:
Router # no hw-module module 3 oversubscription
Router #

Related Commands

Command

Description

show interfaces

Displays traffic that is seen by a specific interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-151

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

hw-module reset

hw-module reset
To reset a module by turning the power off and then on, use the hw-module reset command.
hw-module {module num} reset

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Applies the command to a specific module; see the “Usage Guidelines”
section for valid values.

Usage Guidelines

The num argument designates the module number. Valid values depend on the chassis that is used. For
example, if you have a 13-slot chassis, valid values for the module number are from 1 to 13.

Examples

This example shows how to reload a specific module:
Router # hw-module module 3 reset
Router #

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-152

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
hw-module shutdown

hw-module shutdown
To shut down the module, use the hw-module shutdown command.
hw-module {module num} shutdown

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Applies the command to a specific module; see the “Usage Guidelines”
section for valid values.

This command is supported on the SSL Services Module and the NAM.
If you enter the hw-module shutdown command to shut down the module, you will have to enter the no
power enable module command and the power enable module command to restart (power down and
then power up) the module.

Examples

This example shows how to shut down and restart the module:
Router# hw-module module 3 shutdown
Router# no power enable module 3
Router# power enable module 3

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-153

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

hw-module simulate link-up

hw-module simulate link-up
To enable a software link on a specified module, use the hw-module simulate link-up command. For
information on disabling a software link, refer to the “Usage Guidelines” section.
hw-module {module num} simulate link-up

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Applies the command to a specific module; see the “Usage Guidelines”
section for valid values.

This command is supported on Ethernet modules only.
To disable a software link on a module, you must perform one of the following procedures:
•

Enter the shutdown and then the no shutdown commands on all the ports on the module.

•

Enter the hw-module reset command.

When you apply this command to a module, the port LEDs on the module will glow green and simulate
a link-up condition. This command can be used for testing interface configurations without cabling to
the interface.
The num argument designates the module number. Valid values depend on the chassis that is used. For
example, if you have a 13-slot chassis, valid values for the module number are from 1 to 13.

Examples

This example shows how to enable softlink on a module:
Router# hw-module module 3 simulate link-up
Router#

Related Commands

Command

Description

hw-module reset

Resets a module by turning the power off and then on.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-154

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
instance

instance
To map a VLAN or a set of VLANs to an MST instance, use the instance command. To return the
VLANs to the default instance (CIST), use the no form of this command.
instance instance-id {vlans vlan-range}
no instance instance-id

Syntax Description

instance-id

Instance to which the specified VLANs are mapped; valid values are from
0 to 4094.

vlans vlan-range

Specifies the number of the VLANs to be mapped to the specified instance;
valid values are from 1 to 4094.

Defaults

No VLANs are mapped to any MST instance (all VLANs are mapped to the CIST instance).

Command Modes

MST configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The vlans vlan-range is entered as a single value or a range.
The mapping is incremental, not absolute. When you enter a range of VLANs, this range is added or
removed to the existing instances.
Any unmapped VLAN is mapped to the CIST instance.
You can configure up to 65 interfaces

Examples

This example shows how to map a range of VLANs to instance 2:
Router(config-mst)# instance 2 vlans 1-100
Router(config-mst)#

This example shows how to map a VLAN to instance 5:
Router(config-mst)# instance 5 vlans 1100
Router(config-mst)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-155

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

instance

This example shows how to move a range of VLANs from instance 2 to the CIST instance:
Router(config-mst)# no instance 2 vlans 40-60
Router(config-mst)#

This example shows how to move all the VLANs that are mapped to instance 2 back to the CIST
instance:
Router(config-mst)# no instance 2
Router(config-mst)#

Related Commands

Command

Description

name (MST
configuration
submode)

Sets the name of an MST region.

revision

Sets the revision number for the MST configuration.

show

Verifies the MST configuration.

show spanning-tree
mst

Displays the information about the MST protocol.

spanning-tree mst
configuration

Enters MST-configuration submode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-156

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
interface

interface
To select an interface to configure and enter interface configuration mode, use the interface command.
interface {type module} [.subinterface]

Syntax Description

type

Type of interface to be configured; see Table 2-11 for valid values.

module

Module and port number or port-subinterface number; see the “Usage
Guidelines” section for additional information.

.subinterface

(Optional) Subinterface number to be configured; valid values are from
0 to 4294967295.

Defaults

No interface types are configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Table 2-11 lists the valid values for type.
Table 2-11 Valid type Values

Keyword

Definition

fastethernet

100-Mbps Ethernet interface.

gigabitethernet

Gigabit Ethernet IEEE 802.3z interface.

tengigabitethernet

10-Gigabit Ethernet IEEE 802.3ae interface.

ge-wan

Gigabit Ethernet WAN IEEE 802.3z interface.

pos

Packet OC-3 interface on the Packet over SONET Interface Processor.

atm

ATM interface.

vlan

VLAN interface; see the interface vlan command.

port-channel

Port channel interface; see the interface port-channel command.

null

Null interface; the valid value is 0.

tunnel

Tunnel interface.

By default, the Supervisor Engine 32 PISA EtherChannel (port channel interface 256, which is
automatically configured with the pisa-channel command) is a 1-Gps EtherChannel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-157

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

interface

Note

The pisa-channel command is visible in the configuration file, but it is not user configurable.
You can enter the number of a port subinterface in the following format:
interface {{type module/port.subinterface}}
The Supervisor Engine 32 PISA ports are as follows:
•

Supervisor Engine 32 PISA Management Ports—The console port for the Supervisor Engine 32
PISA port is an EIA/TIA-232 (RS-232) port. The Supervisor Engine 32 PISA also has two Universal
Serial Bus (USB) 2.0 ports that currently are not enabled.

•

Supervisor Engine 32 PISA Data Ports for the WS-S32-10GE-PISA has the following ports:
– Ports 1 and 2: XENPAK 10 Gigabit Ethernet
– Port 3: 10/100/1000 Mbps RJ-45

Note

•

You can disable Port 3 and reallocate its port ASIC capacity to the PISA EtherChannel (see the
“Configuring Full PISA EtherChannel Bandwidth” section in the Catalyst Supervisor Engine 32
PISA Cisco IOS Software Configuration Guide—Release 12.2ZY}.
Supervisor Engine 32 PISA Data Ports for the WS-S32-GE-PISA has these ports:
– Ports 1 through 8: Small form-factor pluggable (SFP) Gigabit Ethernet
– Port 9: 10/100/1000 Mbps RJ-45 port

Note

Note

You can disable port 9 and reallocate its port ASIC capacity to the PISA EtherChannel (see the
“Configuring Full PISA EtherChannel Bandwidth” section in the Catalyst Supervisor Engine 32
PISA Cisco IOS Software Configuration Guide—Release 12.2ZY).

After the port becomes a member of the PISA EtherChannel, only the no channel-group 256 mode on
command has any effect on the port until the port is no longer a member of the PISA EtherChannel.
While the port is a member of the PISA EtherChannel, all port configuration commands except the no
channel-group 256 mode on command are ignored.
On a WS-S32-GE-PISA, you can allocate both ports 8 and 9 to the PISA EtherChannel.
You cannot enter any configuration under port channel interface 256.
The PISA EtherChannel MTU size is 4,096 bytes.

Examples

This example shows how to allocate the port ASIC capacity of port 3 to the PISA EtherChannel on a
WS-S32-10GE-PISA that is installed in slot 5:
Router(config)# interface gigabitethernet 5/3
Router(config-if)# channel-group 256 mode on
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-158

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
interface

This example shows how to allocate the port ASIC capacity of port 9 to the PISA EtherChannel on a
WS-S32-GE-PISA that is installed in slot 5:
Router(config)# interface gigabitethernet 5/9
Router(config-if)# channel-group 256 mode on
Router(config-if)#

This example shows how to revert to the default port ASIC capacity allocation.
Router(config)# interface gigabitethernet 5/9
Router(config-if)# no channel-group 256 mode on
Router(config-if)#

Related Commands

Command

Description

show interfaces

Displays the traffic that is seen by a specific interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-159

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

interface port-channel

interface port-channel
To create a port-channel virtual interface and enter interface configuration mode, use the interface
port-channel command. To remove a virtual interface or subinterface, use the no form of this command.
interface port-channel channel-number[.subinterface]
no interface port-channel channel-number[.subinterface]

Syntax Description

channel-number

Channel number assigned to this port-channel interface; valid values are from 1
to 256.

.subinterface

(Optional) Subinterface number to be configured; valid values are from 0 to
4294967295.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is not supported on the IDSM and NAM.
This command is supported on EtherChannel, Fast EtherChannel, Gigabit EtherChannel, and 10-Gigabit
EtherChannel interfaces.
The channel-number argument can be from 1 to 256, with a maximum of 128 port-channel interfaces.
You can create Layer 2 port channels dynamically or by entering the interface port-channel command;
you can create Layer 3 port channels by entering the interface port-channel command only. You cannot
create Layer 3 port channels dynamically.
Only one port channel in a channel group is allowed.
Ports can be bundled across any module.

Caution

The Layer 3 port-channel interface is the routed interface. Do not enable Layer 3 addresses on the
physical Fast Ethernet interfaces.
When you use the interface port-channel command, follow these guidelines:
•

If you configure ISL, you must assign the IP address to the SVI.

•

If you want to use CDP, you must configure it only on the physical Fast Ethernet interface and not
on the port-channel interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-160

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
interface port-channel

•

Examples

If you do not assign a static MAC address on the port-channel interface, a MAC address is
automatically assigned. If you assign a static MAC address and then later remove it, the MAC
address is automatically assigned.

This example shows how to create a port-channel interface with a channel-group number of 256:
Router(config)# interface port-channel 256
Creating a switch port Po256. channel-group 256 is L2
Router(config-if)#

Note

Related Commands

The port-channel interface counters that are shown by the show counters interface port-channel and
show interface port-channel counters commands are not supported for channel groups that are using
GE-WAN interfaces for QinQ link bundling. The show interface port-channel {number |
number.subif} command (without the counters keyword) is supported, however.

Command

Description

channel-group

Assigns and configures an EtherChannel interface to an EtherChannel
group.

show etherchannel

Displays the EtherChannel information for a channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-161

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

interface range

interface range
To execute a command on multiple ports at the same time, use the interface range command.
interface range {port-range | {macro name}}

Syntax Description

port-range

Port range; for a list of valid values for port-range, see the “Usage
Guidelines” section for additional information.

macro name

Specifies the macro name.

Defaults

This command has no default settings.

Command Modes

Global or interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The values that you entered with the interface range vlan command are applied to all existing VLAN
SVIs.
Before you can use a macro, you must define a range using the define interface-range command.
All configuration changes that are made to a port range are saved to NVRAM, but port ranges that are
created with the interface range command are not saved to NVRAM.
You can enter the port range in two ways:
•

Specifying up to five port ranges

•

Specifying a previously defined macro

You can either specify the ports or the name of a port-range macro. A port range must consist of the same
port type, and the ports within a range cannot span slots.
You can define up to five port ranges on a single command with each range separated by a comma.
You can enter the range with or without white spaces. For example, you can enter the range as
gigabitethernet 7/1 -7 or gigabitethernet 7/1-7.
When you enter a range of VLANs, any SVIs that do not exist within that range are created.
When entering the port-range, use this format: card-type {slot}/{first-port} - {last-port}.
Valid values for card-type are as follows:
•

ethernet

•

fastethernet

•

gigabitethernet

•

loopback

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-162

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
interface range

•

tengigabitethernet

•

tunnel

•

ge-wan

•

pos

•

atm

•

vlan vlan-id (valid values are from 1 to 4094)

•

port-channel interface-number (valid values are from 1 to 256)

You cannot specify both a macro and an interface range in the same command. After creating a macro,
the CLI does not allow you to enter additional ranges. If you have already entered an interface range, the
CLI does not allow you to enter a macro.
In addition, you can specify a single interface in port-range.

Examples

This example shows how to execute a command on two port ranges:
Router(config)# interface range fastethernet 5/18 -20, ethernet 3/1 -24
Router(config-if-range)#

This command shows how to execute a port-range macro:
Router(config)# interface range macro macro1
Router(config-if-range)#

Related Commands

Command

Description

define interface-range

Creates an interface-range macro.

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-163

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

interface vlan

interface vlan
To create or access a dynamic SVI, use the interface vlan command. To delete an SVI, use the no form
of this command.
interface vlan vlan-id
no interface vlan vlan-id

Syntax Description

vlan-id

Defaults

Fast EtherChannel is not specified.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Number of the VLAN; valid values are from 1 to 4094.

SVIs are created the first time that you enter the interface vlan vlan-id command for a particular VLAN.
The vlan-id value corresponds to the VLAN tag that is associated with the data frames on an ISL, the
802.1Q-encapsulated trunk, or the VLAN ID that is configured for an access port. A message displays
whenever you create a new VLAN interface, so that you can check if you entered the correct VLAN
number.
If you delete an SVI by entering the no interface vlan vlan-id command, the associated IDB pair is
forced into an administrative down state and is marked as deleted. The deleted interface will not be
visible in the show interface command.
You can reinstate a deleted SVI by entering the interface vlan vlan-id command for the deleted
interface. The interface comes back up, but much of the previous configuration is gone.
VLANs 1006 to 1014 are internal VLANs on the Catalyst 6500 series switch and cannot be used for
creating new VLANs.

Examples

This example shows the output when you enter the interface vlan vlan-id command for a new VLAN
number:
Router(config)# interface vlan 23
% Creating new VLAN interface.
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-164

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
inter-packet gap 6502-mode

inter-packet gap 6502-mode
To set the IPG value, use the inter-packet gap 6502-mode command. To return to the default settings,
use the no form of this command.
inter-packet gap 6502-mode
no inter-packet gap 6502-mode

Syntax Description

This command has no keywords or arguments.

Defaults

All fragments from flows that are received from an ACE with Layer 4 ports and permit action are
permitted. All other fragments are dropped in the hardware. This action also applies to flows that are
handled in the software regardless of this command setting.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on situations where a WS-X6704-10GE is connected to a WS-X6502-10GE
only. You enter this command to change the IPG value of the WS-X6704-10GE to match the
WS-X6502-10GE.
The default 6704 mode sets the IPG value to average 12. Based on packet size, the IPG between
successive packets range from 9 to 15.
The 6502 mode sets the IPG value to average 16. Based on packet size, the IPG between successive
packets range from 13 to 19.

Examples

This example shows how to set the IPG to 6502 mode:
Router(config-if)# inter-packet gap 6502-mode
Router(config-if)#

This example shows how to set the IPG to the default mode:
Router(config-if)# no inter-packet gap 6502-mode
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-165

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip access-list hardware permit fragments

ip access-list hardware permit fragments
To permit all noninitial fragments in the hardware, use the ip access-list hardware permit fragments
command. To return to the default settings, use the no form of this command.
ip access-list hardware permit fragments
no ip access-list hardware permit fragments

Syntax Description

This command has no keywords or arguments.

Defaults

All fragments from flows that are received from an ACE with Layer 4 ports and permit action are
permitted. All other fragments are dropped in the hardware. This action also applies to flows that are
handled in the software regardless of this command setting.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Flow fragments that match ACEs with Layer 4 ports and permit results are permitted in the hardware,
and all other fragments are dropped. An entry is added in the TCAM for each ACE with Layer 4 ports
and permit action. This action could cause large ACLs to not fit in the TCAM. If this situation occurs,
use the ip access-list hardware permit fragments command to permit all noninitial fragments in the
hardware.
This command affects all ACLs that are currently applied to interfaces and not only newly-applied
ACLs.
The initial flow fragments that match the ACEs with Layer 4 ports and permit results are permitted in
the hardware. All other initial fragments are dropped in the hardware.

Examples

This example shows how to permit all noninitial fragments in the hardware:
Router(config)# ip access-list hardware permit fragments
Router(config)#

This example shows how to return to the default settings:
Router(config)# no ip access-list hardware permit fragments
Router(config)#

Related Commands

Command

Description

show ip interface

Displays the usability status of interfaces that are configured for IP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-166

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip arp inspection filter vlan

ip arp inspection filter vlan
To permit ARPs from hosts that are configured for static IP when DAI is enabled and to define an ARP
access list and apply it to a VLAN, use the ip arp inspection filter vlan command. To disable this
application, use the no form of this command.
ip arp inspection filter arp-acl-name {vlan vlan-range} [static]
no ip arp inspection filter arp-acl-name {vlan vlan-range} [static]

Syntax Description

arp-acl-name

Access control list name.

vlan-range

VLAN number or range; valid values are from 1 to 4094.

static

(Optional) Treats implicit denies in the ARP ACL as explicit denies and drops
packets that do not match any previous clauses in the ACL.

Defaults

No defined ARP ACLs are applied to any VLAN.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

For vlan-range, you can specify the VLAN to which the switches and hosts belong. You can specify a
single VLAN identified by a VLAN ID number, a range of VLANs separated by a hyphen, or a series of
VLANs separated by a comma.
When an ARP access control list is applied to a VLAN for dynamic ARP inspection, the ARP packets
containing only the IP-to-Ethernet MAC bindings are compared against the ACLs. All other packet types
are bridged in the incoming VLAN without validation.
This command specifies that the incoming ARP packets are compared against the ARP access control
list, and the packets are permitted only if the access control list permits them.
If the access control lists deny the packets because of explicit denies, the packets are dropped. If the
packets are denied because of an implicit deny, they are then matched against the list of DHCP bindings
if the ACL is not applied statically.
If you do not specify the static keyword, it means that there is no explicit deny in the ACL that denies
the packet, and DHCP bindings determine whether a packet is permitted or denied if the packet does not
match any clauses in the ACL.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-167

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip arp inspection filter vlan

Examples

This example shows how to apply the ARP ACL static hosts to VLAN 1 for DAI:
Switch# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# ip arp inspection filter static-hosts vlan 1
Router(config)#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and enters
the ARP ACL configuration submode.

show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-168

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip arp inspection limit

ip arp inspection limit
To limit the rate of incoming ARP requests and responses on an interface and prevent DAI from
consuming all of the system’s resources in the event of a DoS attack, use the ip arp inspection limit
command. To return to the default settings, use the no form of this command.
ip arp inspection limit {rate pps [{burstintervalseconds}]} |none
no ip arp inspection limit

Syntax Description

Defaults

rate pps

Specifies the upper limit on the number of incoming packets processed per
second; valid values are from 1 to 2048 pps.

burst interval seconds

(Optional) Specifies the consecutive interval in seconds over which the
interface is monitored for the high rate of the ARP packets; valid values
are from 1 to 15 seconds.

none

Specifies that there is no upper limit on the rate of the incoming ARP
packets that can be processed.

The default settings are as follows:
•

The rate pps is set to 15 packets per second on the untrusted interfaces, assuming that the network
is a switched network with a host connecting to as many as 15 new hosts per second.

•

The rate is unlimited on all the trusted interfaces.

•

The burst interval seconds is set to 1 second.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You should configure the trunk ports with higher rates to reflect their aggregation. When the rate of the
incoming packets exceeds the user-configured rate, the interface is placed into an error-disabled state.
You can use the error-disable timeout feature to remove the port from the error-disabled state. The rate
applies to both the trusted and nontrusted interfaces. Configure appropriate rates on trunks to handle the
packets across multiple DAI-enabled VLANs, or use the none keyword to make the rate unlimited.
The rate of the incoming ARP packets on the channel ports is equal to the sum of the incoming rate of
packets from all the channel members. Configure the rate limit for the channel ports only after examining
the rate of the incoming ARP packets on the channel members.
After a switch receives more than the configured rate of packets every second consecutively over a
period of burst seconds, the interface is placed into an error-disabled state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-169

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip arp inspection limit

Examples

This example shows how to limit the rate of the incoming ARP requests to 25 packets per second:
Router# config terminal
Router(config)# interface fa6/3
Router(config-if)# ip arp inspection limit rate 25
Router(config-if)#

This example shows how to limit the rate of the incoming ARP requests to 20 packets per second and to
set the interface monitoring interval to 5 consecutive seconds:
Router# config terminal
Router(config)# interface fa6/1
Router(config-if)# ip arp inspection limit rate 20 burst interval 5
Router(config-if)#

Related Commands

Command

Description

show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-170

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip arp inspection log-buffer

ip arp inspection log-buffer
To configure the parameters that are associated with the logging buffer, use the ip arp inspection
log-buffer command. To disable the parameters, use the no form of this command.
ip arp inspection log-buffer {{entries number} | {logs number} {interval seconds}}
no ip arp inspection log-buffer {entries | logs}

Syntax Description

Defaults

entries number

Specifies the number of entries from the logging buffer; valid values are from
0 to 1024.

logs number

Specifies the number of entries to be logged in an interval; valid values are
from 0 to 1024.

interval seconds

Specifies the logging rate; valid values are from 0 to 86400 (1 day).

The default settings are as follows:
•

When dynamic ARP inspection is enabled, denied, or dropped, the ARP packets are logged.

•

The entries number is 32.

•

The logs number is 5 per second.

•

The interval seconds is 1 second.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

A 0 value for the logs number indicates that the entries should not be logged out of this buffer.
A 0 value for the interval seconds keyword and argument indicates an immediate log.
You cannot enter a 0 for both the logs number and the interval seconds keywords and arguments.
The first dropped packet of a given flow is logged immediately. The subsequent packets for the same
flow are registered but are not logged immediately. Registration for these packets occurs in a log buffer
that is shared by all the VLANs. Entries from this buffer are logged on a rate-controlled basis.

Examples

This example shows how to configure the logging buffer to hold up to 45 entries:
Router# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# ip arp inspection log-buffer entries 45
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-171

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip arp inspection log-buffer

This example shows how to configure the logging rate for 10 logs per 3 seconds:
Router(config)# ip arp inspection log-buffer logs 10 interval 3
Router(config)#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and enters
the ARP ACL configuration submode.

clear ip arp inspection Clears the status of the log buffer.
log
show ip arp inspection Shows the status of the log buffer.
log

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-172

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip arp inspection trust

ip arp inspection trust
To set a per-port configurable trust state that determines the set of interfaces where incoming ARP
packets are inspected, use the ip arp inspection trust command. To make the interfaces untrusted, use
the no form of this command.
ip arp inspection trust
no ip arp inspection trust

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to configure an interface to be trusted:
Router# config terminal
Router(config)# interface fastEthernet 6/3
Router(config-if)# ip arp inspection trust
Router(config-if)#

Related Commands

Command

Description

show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-173

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip arp inspection validate

ip arp inspection validate
To perform specific checks for an ARP inspection, use the ip arp inspection validate command. To
disable ARP inspection checks, use the no form of this command.
ip arp inspection validate [src-mac] [dst-mac] [ip]
no ip arp inspection validate [src-mac] [dst-mac] [ip]

Syntax Description

src-mac

(Optional) Checks the source MAC address in the Ethernet header against the sender’s
MAC address in the ARP body.

dst-mac

(Optional) Checks the destination MAC address in the Ethernet header against the
target MAC address in the ARP body.

ip

(Optional) Checks the ARP body for invalid and unexpected IP addresses.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The sender IP addresses are checked in all ARP requests and responses, and target IP addresses are
checked only in ARP responses. Addresses include 0.0.0.0, 255.255.255.255, and all IP multicast
addresses.
The src-mac checks are issued against both ARP requests and responses. The dst-mac checks are issued
for ARP responses.

Note

When enabled, packets with different MAC addresses are classified as invalid and are dropped.
When enabling the checks, specify at least one of the keywords (src-mac, dst-mac, and ip) on the
command line. Each command overrides the configuration of the previous command. If a command
enables src and dst mac validations, and a second command enables IP validation only, the src and dst
mac validations are disabled as a result of the second command.
The no form of this command disables only the specified checks. If no check options are enabled, all the
checks are disabled.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-174

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip arp inspection validate

Examples

This example shows how to enable the source MAC validation:
Router(config)# ip arp inspection validate src-mac
Router(config)#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and enters
the ARP ACL configuration submode.

show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-175

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip arp inspection vlan

ip arp inspection vlan
To enable DAI on a per-VLAN basis, use the ip arp inspection vlan command. To disable DAI, use the
no form of this command.
ip arp inspection vlan vlan-range
no ip arp inspection vlan vlan-range

Syntax Description

vlan-range

Defaults

ARP inspection is disabled on all VLANs.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

VLAN number or range; valid values are from 1 to 4094.

For vlan-range, you can specify a single VLAN identified by a VLAN ID number, a range of VLANs
separated by a hyphen, or a series of VLANs separated by a comma.
You must specify on which VLANs to enable DAI. DAI may not function on the configured VLANs if
the VLAN has not been created or is a private VLAN.

Examples

This example shows how to enable DAI on VLAN 1:
Router(config)# ip arp inspection vlan 1
Router(config)#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and enters
the ARP ACL configuration submode.

show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-176

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip arp inspection vlan logging

ip arp inspection vlan logging
To control the type of packets that are logged, use the ip arp inspection vlan logging command. To
disable this logging control, use the no form of this command.
ip arp inspection vlan vlan-range logging {acl-match {matchlog | none} | dhcp-bindings
{permit | all | none}}
no ip arp inspection vlan vlan-range logging {acl-match | dhcp-bindings}

Syntax Description

vlan-range

Number of the VLANs to be mapped to the specified instance. The number is
entered as a single value or a range; valid values are from 1 to 4094.

acl-match

Specifies the logging criteria for packets that are dropped or permitted based on
ACL matches.

matchlog

Specifies that logging of packets matched against ACLs is controlled by the
matchlog keyword in the permit and deny access control entries of the ACL.

none

Specifies that ACL-matched packets are not logged.

dhcp-bindings

Specifies the logging criteria for packets dropped or permitted based on matches
against the DHCP bindings.

permit

Specifies logging when permitted by DHCP bindings.

all

Specifies logging when permitted or denied by DHCP bindings.

none

Prevents all logging of packets permitted or denied by DHCP bindings.

Defaults

All denied or dropped packets are logged.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

By default, the matchlog keyword is not available on the ACEs. When you enter the matchlog keyword,
denied packets are not logged. Packets are logged only when they match against an ACE that has the
matchlog keyword.
The acl-match and dhcp-bindings keywords merge with each other. When you set an ACL match
configuration, the DHCP bindings configuration is not disabled. You can use the no form of this
command to reset some of the logging criteria to their defaults. If you do not specify either option, all
the logging types are reset to log on when the ARP packets are denied. The two options that are available
are as follows:
•

acl-match—Logging on ACL matches is reset to log on deny

•

dhcp-bindings—Logging on DHCP bindings is reset to log on deny

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-177

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip arp inspection vlan logging

Examples

This example shows how to configure an ARP inspection on VLAN 1 to add packets to a log that
matches the ACLs:
Router# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# ip arp inspection vlan 1 logging acl-match matchlog
Router(config)#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and enters
the ARP ACL configuration submode.

show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-178

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip auth-proxy max-login-attempts

ip auth-proxy max-login-attempts
To limit the number of login attempts at a firewall interface, use the ip auth-proxy max-login-attempts
command. To return to the default settings, use the no form of this command.
ip auth-proxy max-login-attempts 1-maxint
no ip auth-proxy max-login-attempts

Syntax Description

1-maxint

Defaults

1-maxint is 5.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Maximum number of login attempts: valid values are from 1 to
2147483647 attempts.

This command is supported on the firewall interfaces only.
The maximum login attempt functionality is independent of the watch-list feature. If you do not
configure a watch list (using the ip access-list hardware permit fragments command) and you
configure a maximum login attempt, the existing authentication proxy behavior occurs but displays the
new number for retries. If you configure a watch list, the IP address is put in the watch list, once the
configured number of attempts has been reached.

Examples

This example shows how to set a limit to the number of login attempts at a firewall interface:
Router(config-if)# ip auth-proxy max-login-attempts 4
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-179

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip auth-proxy max-login-attempts

Related Commands

Command

Description

clear ip auth-proxy
watch-list

Deletes a single watch-list entry or all watch-list entries.

ip auth-proxy
watch-list

Enables and configures an authentication proxy watch list.

show ip auth-proxy
watch-list

Displays the information about the authentication proxy watch list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-180

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip auth-proxy watch-list

ip auth-proxy watch-list
To enable and configure an authentication proxy watch list, use the ip auth-proxy watch-list command.
See the “Usage Guidelines” section for the no form of this command usage.
ip auth-proxy watch-list {{add-item ip-addr} | enable | {expiry-time minutes}}
no ip auth-proxy watch-list [{add-item ip-addr} | expiry-time]

Syntax Description

Defaults

add-item ip-addr

Adds an IP address to the watch list.

enable

Enables a watch list.

expiry-time minutes

Specifies the duration of time that an entry is in the watch list; see the
“Usage Guidelines” section for valid values.

The defaults are as follows:
•

minutes is 30 minutes.

•

The watch-list functionality is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The valid values for minutes are from 0 to the largest 32-bit positive number (0x7FFFFFFF or
2147483647 in decimal). Setting the minutes to 0 (zero) places the entries in the list permanently.
This command is supported on the firewall interfaces only.
Use the no form of this command to do the following:
•

no ip auth-proxy watch-list—Disables the watch-list functionality.

•

no ip auth-proxy watch-list add-item ip-addr—Removes the IP address from the watch list.

•

no ip auth-proxy watch-list expiry-time—Returns to the default setting.

A watch list consists of IP addresses that have opened TCP connections to port 80 and have not sent any
data. No new connections are accepted from this type of IP address (to port 80) and the packet is
dropped.
An entry remains in the watch list for the time that is specified by expiry-time minutes.
When you disable a watch list, no new entries are put into the watch list, but the sessions are put in
SERVICE_DENIED state. The timer deletes sessions after 2 minutes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-181

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip auth-proxy watch-list

Examples

This example shows how to enable an authentication proxy watch list:
Router(config-if)# ip auth-proxy watch-list enable
Router(config-if)#

This example shows how to disable an authentication proxy watch list:
Router(config-if)# no ip auth-proxy watch-list
Router(config-if)#

This example shows how to add an IP address to a watch list:
Router(config-if)# ip auth-proxy watch-list add-item 12.0.0.2
Router(config-if)#

This example shows how to set the duration of time that an entry is in a watch list:
Router(config-if)# ip auth-proxy watch-list expiry-time 29
Router(config-if)#

Related Commands

Command

Description

clear ip auth-proxy
watch-list

Deletes a single watch-list entry or all watch-list entries.

ip auth-proxy
max-login-attempts

Limits the number of login attempts at a firewall interface.

show ip auth-proxy
watch-list

Displays the information about the authentication proxy watch list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-182

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip casa

ip casa
To configure the router to function as a forwarding agent, use the ip casa command. To disable the
forwarding agent, use the no form of this command.
ip casa [control-address igmp-address [udp-limit]]
no ip casa

Syntax Description

control-address

(Optional) IP address of the forwarding agent side of the services manager and
forwarding agent tunnel used for sending signals.

igmp-address

IGMP address on which the forwarding agent will listen for wildcard and fixed
affinities.

udp-limit

(Optional) Maximum UDP queue length; valid values are from 50 to 65535.

Defaults

The default udp-limit value is 256.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If more than the maximum udp-limit value arrives in a burst, the CASA wildcard updates from the
service manager might get dropped.
The control-address value is unique for each forwarding agent.

Examples

This example shows how to specify the IP address (10.10.4.1) and IGMP address (224.0.1.2) for the
forwarding agent and set the UDP queue length to 300:
Router(config)# ip-casa 10.10.4.1 224.0.1.2 300
Router(config)#

Related Commands

Command

Description

forwarding-agent

Specifies the port on which the forwarding agent listens for the wildcard and
the fixed affinities.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-183

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip cef load-sharing algorithm

ip cef load-sharing algorithm
To select a CEF load-balancing algorithm, use the ip cef load-sharing algorithm command. To return
to the default universal load-balancing algorithm, use the no form of this command.
ip cef load-sharing algorithm {original | tunnel [id] | universal [id]}
no ip cef load-sharing algorithm {original | tunnel [id] | universal [id]}

Syntax Description

original

Sets the load-balancing algorithm to the original based on a source and destination
hash.

tunnel

Sets the load-balancing algorithm for use in tunnel environments or in environments
where there are only a few IP source and destination address pairs.

universal

Sets the load-balancing algorithm to the universal algorithm that uses a source,
destination, and ID hash.

id

(Optional) Fixed identifier.

Defaults

The universal load-balancing is selected.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The original CEF load-sharing algorithm produced distortions in load-balancing across multiple routers
due to the use of the same algorithm on every router. When the load-balancing algorithm is set to
universal mode, each router on the network can make a different load-balancing decision for each
source-destination address pair which resolves load-balancing distortions.
Use the tunnel algorithm to share the load more fairly when only a few source-destination pairs are
involved.

Examples

This example shows how to enable the CEF load-balancing algorithm for universal environments:
Router(config)# ip cef load-sharing algorithm universal 1
Router(config)#

Related Commands

Command

Description

ip load-sharing

Enables load balancing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-184

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip cef table consistency-check

ip cef table consistency-check
To enable the CEF-table consistency-checker types and parameters, use the ip cef table
consistency-check command. To disable consistency checkers, use the no form of this command.
ip cef table consistency-check [type {lc-detect | scan-lc | scan-rib | scan-rp}] [count
count-number] [period seconds]
ip cef table consistency-check [settle-time seconds]
no ip cef table consistency-check [type {lc-detect | scan-lc | scan-rib | scan-rp}] [count
count-number] [period seconds]
no ip cef table consistency-check [settle-time seconds]

Syntax Description

type

(Optional) Specifies the type of consistency check to configure.

lc-detect

(Optional) Specifies that the module detects a missing prefix.

scan-lc

(Optional) Specifies a passive scan check of tables on the module.

scan-rib

(Optional) Specifies a passive scan check of tables on the
rendezvous point against RIB.

scan-rp

(Optional) Specifies a passive scan check of tables on the
rendezvous point.

count count-number

(Optional) Specifies the maximum number of prefixes to check per
scan; valid values are from 1 to 225.

period seconds

(Optional) Specifies the period between scans; valid values are from
30 to 3600 seconds.

settle-time seconds

(Optional) Specifies the time that elapsed during which updates for
a candidate prefix are ignored as inconsistencies; valid values are
from 1 to 3600 seconds.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-185

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip cef table consistency-check

Usage Guidelines

This command configures CEF-table consistency checkers and parameters for the detection mechanism
types that are listed in Table 2-12.
Table 2-12 Detection Mechanism Types

Examples

Mechanism

Operates On

Description

Lc-detect

Module

Operates on the module by retrieving IP prefixes found missing
from its FIB table. If IP prefixes are missing, the module cannot
forward packets for these addresses. Lc-detect sends IP prefixes
to the rendezvous point for confirmation. If the rendezvous
point detects that it has the relevant entry, an inconsistency is
detected and a system message is displayed. Also, the
rendezvous point sends a signal back to the module confirming
that the IP prefix is an inconsistency.

Scan-lc

Module

Operates on the module by looking through the FIB table for a
configurable time period and sending the next n prefixes to the
rendezvous point. The rendezvous point does an exact lookup.
If it finds the prefix missing, the rendezvous point reports an
inconsistency. Finally, the rendezvous point sends a signal back
to the module for confirmation.

Scan-rp

Route Processor

Operates on the rendezvous point (opposite of the scan-lc) by
looking through the FIB table for a configurable time period
and sending the next n prefixes to the module. The module does
an exact lookup. If it finds the prefix missing, the module
reports an inconsistency and finally signals the rendezvous
point for confirmation.

Scan-rib

Route Processor

Operates on all RPs (even nondistributed) and scans the RIB to
ensure that prefix entries are present in the rendezvous point
FIB table.

This example shows how to enable the CEF-table consistency checkers:
Router(config)# ip cef table consistency-check
Router(config)#

Related Commands

Command

Description

clear ip cef
inconsistency

Clears the statistics and records for the CEF-consistency checker.

show ip cef
inconsistency

Displays the IP CEF inconsistencies.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-186

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp relay information option trust-all

ip dhcp relay information option trust-all
To enable all the interfaces as trusted sources of the DHCP relay-agent information option, use the ip
dhcp relay information option trust-all command. To return to the default settings, use the no form of
this command.
ip dhcp relay information option trust-all
no ip dhcp relay information option trust-all

Syntax Description

This command has no arguments or keywords.

Defaults

The DHCP server does not insert relay information.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is used by cable access router termination systems. This functionality enables a DHCP
server to identify the user (cable access router) sending the request and initiate appropriate action that
is based on this information.

Examples

This example shows how to specify that all interfaces on the router are trusted:
Router(config)# ip dhcp relay information option trust-all
Router(config)#

Related Commands

Command

Description

show ip dhcp relay
information
trusted-sources

Lists all the configured trusted interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-187

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp relay information trust

ip dhcp relay information trust
To enable an interface as a trusted source of the DHCP relay-agent information, use the ip dhcp relay
information trust command. To return to the default settings, use the no form of this command.
ip dhcp relay information trust
no ip dhcp relay information trust

Syntax Description

This command has no arguments or keywords.

Defaults

All interfaces on the router are untrusted.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Configuring an interface as a trusted source of relay-agent information allows the interface to receive
DHCP discover or request packets. DHCP discover or request packets contain the relay-agent
information option.

Examples

This example shows how to specify that the interface is trusted:
Router(config)# ip dhcp relay information trust
Router(config)#

Related Commands

Command

Description

show ip dhcp relay
information
trusted-sources

Lists all the configured trusted interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-188

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp route connected

ip dhcp route connected
To specify routes as connected routes, use the ip dhcp route connected command. To return to the
default settings, use the no form of this command.
ip dhcp route connected
no ip dhcp route connected

Syntax Description

This command has no arguments or keywords.

Defaults

All interfaces on the router are untrusted.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enable the ip dhcp route connected command, DHCP downloads the route database from a
database agent and adds the routes as connected routes, even though they may have been added as static
routes previously.

Examples

This example shows how to specify routes as connected routes:
Router(config)# ip dhcp route connected
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-189

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp snooping

ip dhcp snooping
To globally enable DHCP snooping, use the ip dhcp snooping command. To disable DHCP snooping,
use the no form of this command.
ip dhcp snooping
no ip dhcp snooping

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Wireless clients, or mobile nodes, gain access to an untrusted wireless network only if there is a
corresponding entry in the DHCP snooping database. Enable DHCP snooping globally by entering the
ip dhcp snooping command, and enable DHCP snooping on the tunnel interface by entering the ip dhcp
snooping packets command. After you enable DHCP snooping, the process snoops DHCP packets to
and from the mobile nodes and populates the DHCP snooping database.

Examples

This example shows how to enable DHCP snooping:
Router(config) # ip dhcp snooping
Router(config) #

This example shows how to disable DHCP snooping:
Router(config) # no ip dhcp snooping
Router(config) #

Related Commands

Command

Description

ip dhcp snooping
packets

Enables DHCP snooping on the tunnel interface.

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-190

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp snooping binding

ip dhcp snooping binding
To set up and generate a DHCP binding configuration to restore bindings across reboots, use the ip dhcp
snooping binding command. To disable the binding configuration, use the no form of this command.
ip dhcp snooping binding mac-address {vlan vlan} ip-address {interface interface
interface-number} {expiry seconds}
no ip dhcp snooping binding mac-address vlan vlan-# ip-address interface interface

Syntax Description

mac-address

MAC address.

vlan vlan

Specifies a valid VLAN number; valid values are from 1 to 4094.

ip-address

IP address.

interface interface

Specifies the interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet.

interface-number

Module and port number.

expiry seconds

Specifies the interval after which binding is no longer valid; valid values are
from 1 to 4294967295 seconds.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you add or remove a binding using this command, the binding database is marked as changed and
a write is initiated.
A maximum of 512 bindings are allowed in the DHCP snooping database.

Examples

This example shows how to generate a DHCP binding configuration on interface gigabitethernet1/1 in
VLAN 1 with an expiration time of 1000 seconds:

Router# ip dhcp snooping binding 0000.0c00.40af vlan 1 10.42.0.6 interface gi1/1 expiry 1000
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-191

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp snooping binding

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-192

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp snooping database

ip dhcp snooping database
To configure the DHCP-snooping database, use the ip dhcp snooping database command.
ip dhcp snooping database {bootflash:url | ftp:url | rcp:url | scp:url | sup-bootflash: | tftp:url}
ip dhcp snooping database {timeout timeout | write-delay time}

Syntax Description

bootflash:url

Specifies the database URL for storing entries using the bootflash.

ftp:url

Specifies the database URL for storing entries using FTP.

rcp:url

Specifies the database URL for storing entries using RCP.

scp:url

Specifies the database URL for storing entries using SCP.

sup-bootflash:

Specifies the database URL for storing entries using the supervisor engine
bootflash.

tftp:url

Specifies the database URL for storing entries using TFTP.

timeout timeout

Specifies the abort timeout interval; valid values are from 0 to 86400 seconds.

write-delay time

Specifies the amount of time before writing the DHCP-snooping entries to an
external server after a change is seen in the local DHCP-snooping database;
valid values are from 15 to 86400 seconds.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enable DHCP snooping on the interface before entering this command. Use the ip dhcp
snooping command to enable DHCP snooping.

Examples

This example shows how to specify the database URL using TFTP:
Router(config)# ip dhcp snooping database tftp://90.90.90.90/snooping-rp2
Router(config)#

This example shows how to specify the amount of time before writing DHCP snooping entries to an
external server:
Router(config)# ip dhcp snooping database write-delay 15
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-193

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp snooping database

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-194

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp snooping information option

ip dhcp snooping information option
To enable DHCP option 82 data insertion, use the ip dhcp snooping information option command. To
disable DHCP option 82 data insertion, use the no form of this command.
ip dhcp snooping information option [allow-untrusted]
no ip dhcp snooping information option

Syntax Description

allow-untrusted

Defaults

The defaults are as follows:

(Optional) Enables the switch to accept incoming DHCP snooping packets
with option 82 information from the edge switch.

•

ip dhcp snooping information option—Enabled

•

ip dhcp snooping information option allow-untrusted—Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

DHCP option 82 is part of RFC 3046. DHCP is an application-layer protocol that is used for the dynamic
configuration of TCP/IP networks. The protocol allows for a relay agent to pass DHCP messages
between the DHCP clients and DHCP servers. By using a relay agent, servers do not have to be on the
same network as the clients. Option 82 (82 is the option’s code) addresses the security and scalability
issues. Option 82 resides in the relay agent when DHCP packets that originate from the forwarding client
are sent to the server. Servers that recognize option 82 may use the information to implement the IP
address or other parameter assignment policies. The DHCP server echoes the option back to the relay
agent in its replies. The relay agent strips out the option from the relay agent before forwarding the reply
to the client.
When you enter the ip dhcp snooping information option allow-untrusted on an aggregation switch
that is connected to an edge switch through an untrusted interface, the aggregation switch accepts
packets with option 82 information from the edge switch. The aggregation switch learns the bindings for
hosts connected through an untrusted switch interface. You can enable the DHCP security features, such
as dynamic ARP inspection or IP source guard, on the aggregation switch while the switch receives
packets with option 82 information on untrusted input interfaces to which hosts are connected. You must
configure the port on the edge switch that connects to the aggregation switch as a trusted interface.

Caution

Do not enter the ip dhcp snooping information option allow-untrusted command on an aggregation
switch that is connected to an untrusted device. If you enter this command, an untrusted device might
spoof the option 82 information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-195

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp snooping information option

Examples

This example shows how to enable DHCP option 82 data insertion:
Router(config)# ip dhcp snooping information option
Router(config)#

This example shows how to disable DHCP option 82 data insertion:
Router(config)# no ip dhcp snooping information option
Router(config)#

This example shows how to enable the switch to accept incoming DHCP snooping packets with
option 82 information from the edge switch:
Router(config)# ip dhcp snooping information option allow-trusted
Router(config)#

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-196

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp snooping limit rate

ip dhcp snooping limit rate
To configure the number of the DHCP messages that an interface can receive per second, use the ip dhcp
snooping limit rate command. To disable the DHCP message rate limiting, use the no form of this
command.
ip dhcp snooping limit rate rate
no ip dhcp snooping limit rate

Syntax Description

rate

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Number of DHCP messages that a switch can receive per second; valid values are from
1 to 4294967294 seconds.

This command is supported on Layer 2 switch-port and port-channel interfaces only.
Typically, the rate limit applies to the untrusted interfaces. If you want to set up rate limiting for the
trusted interfaces, note that the trusted interfaces aggregate all DHCP traffic in the switch, and you will
need to adjust the rate limit of the interfaces to a higher value.

Examples

This example shows how to specify the number of DHCP messages that a switch can receive per second:
Router(config-if)# ip dhcp snooping limit rate 150
Router(config)#

This example shows how to disable the DHCP message rate limiting:
Router(config-if)# no ip dhcp snooping limit rate
Router(config)#

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-197

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp snooping packets

ip dhcp snooping packets
To enable DHCP snooping on the tunnel interface, use the ip dhcp snooping packets command. To
disable DHCP snooping, use the no form of this command.
ip dhcp snooping packets
no ip dhcp snooping packets

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on Layer 2 switch-port and port-channel interfaces only.
This command is supported on Catalyst 6500 series switches that are configured with a WLSM only.
Wireless clients, or mobile nodes, gain access to an untrusted wireless network only if there is a
corresponding entry in the DHCP snooping database. Enable DHCP snooping globally by entering the
ip dhcp snooping command, and enable DHCP snooping on the tunnel interface by entering the ip dhcp
snooping packets command. After you enable DHCP snooping, the process snoops DHCP packets to
and from the mobile nodes and populates the DHCP snooping database.

Examples

This example shows how to enable DHCP snooping:
Router(config)# ip dhcp snooping packets
Router(config)#

This example shows how to disable DHCP snooping:
Router(config)# no ip dhcp snooping packets
Router(config)#

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-198

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp snooping verify mac-address

ip dhcp snooping verify mac-address
To verify that the source MAC address in a DHCP packet matches the client hardware address on an untrusted
port, use the ip dhcp snooping verify mac-address command. To disable verification, use the no form of
this command.
ip dhcp snooping verify mac-address
no ip dhcp snooping verify mac-address

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

For untrusted DHCP snooping ports, DHCP snooping verifies the MAC address on the client hardware
address field to ensure that a client is requesting multiple addresses from a single MAC address. You
can use the ip dhcp snooping verify mac-address command to trust the ports or you can use the no ip
dhcp snooping verify mac-address command to leave the ports untrusted by disabling the MAC
address verification on the client hardware address field.

Examples

This example shows how to verify that the source MAC address in a DHCP packet matches the client
hardware address on an untrusted port:
Router(config)# ip dhcp snooping verify mac-address
Router(config)#

This example shows how to turn off the verification of the MAC address on the client hardware address
field:
Router(config)# no ip dhcp snooping verify mac-address
Router(config)#

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-199

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip dhcp snooping vlan

ip dhcp snooping vlan
To enable DHCP snooping on a VLAN or a group of VLANs, use the ip dhcp snooping vlan command.
To disable DHCP snooping on a VLAN or a group of VLANs, use the no form of this command.
ip dhcp snooping vlan {number | vlanlist}
no ip dhcp snooping vlan {number | vlanlist}

Syntax Description

number |
vlanlist

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

VLAN number or a group of VLANs; valid values are from 1 to 4094. See the “Usage
Guidelines” section for additional information.

DHCP snooping is enabled on a VLAN only if both the global snooping and the VLAN snooping are
enabled.
Enter the range of VLANs using this format: 1,3-5,7,9-11.

Examples

This example shows how to enable DHCP snooping on a VLAN:
Router(config)# ip dhcp snooping vlan 10
Router(config)#

This example shows how to disable DHCP snooping on a VLAN:
Router(config)# no ip dhcp snooping vlan 10
Router(config)#

This example shows how to enable DHCP snooping on a group of VLANs:
Router(config)# ip dhcp snooping vlan 10,4-8,55
Router(config)#

This example shows how to disable DHCP snooping on a group of VLANs:
Router(config)# no ip dhcp snooping vlan 10,4-8,55
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-200

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip dhcp snooping vlan

Related Commands

Command

Description

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-201

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-aggregation cache

ip flow-aggregation cache
To create a flow-aggregation cache and enter the aggregation cache configuration mode, use the
ip flow-aggregation cache command. To negate a command or return to its default settings, use the no
form of this command.
ip flow-aggregation cache {as | destination-prefix | prefix | protocol-port | source-prefix}
no ip flow-aggregation cache {as | destination-prefix | prefix | protocol-port | source-prefix}

Syntax Description

Defaults

as

Configures the autonomous-system aggregation-cache scheme.

destination-prefix

Configures the destination-prefix aggregation-cache scheme.

prefix

Configures the prefix aggregation-cache scheme.

protocol-port

Configures the protocol-port aggregation-cache scheme.

source-prefix

Configures the source-prefix aggregation-cache scheme.

The defaults are as follows:
•

entries num is 4096 entries.

•

active time is 30 minutes.

•

inactive time is 15 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In source-prefix aggregation mode, only the source mask is configurable. In destination-prefix
aggregation mode, only the destination mask is configurable.
Once you enter the flow aggregation cache configuration mode, these commands are available:
•

cache {entries num} | {timeout {active time} | {inactive time}}

•

default {cache {entries | timeout}} | enabled | {export destination}

•

enabled

•

export destination ip-addr udp-port-num

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-202

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow-aggregation cache

The syntax descriptions are as follows:

Examples

cache

Configures the NetFlow cache parameters.

entries num

Specifies the number of entries in the flow cache; valid values are from
1024 to 524288 flow entries.

timeout

Specifies the timeout parameters for the flow cache.

active time

Specifies the active flow timeout; valid values are from 1 to 60 minutes.

inactive time

Specifies the inactive flow timeout; valid values are from 10 to 600 seconds.

default

Sets a command to its default.

enabled

Enables the aggregation cache.

export destination

Specifies the host or port to send flow statistics.

ip-addr

Destination IP address or hostname.

udp-port-num

UDP port number; valid values are from 1 to 65535.

This example shows how to enable an autonomous-system aggregation-cache scheme:
Router(config)# ip flow-aggregation cache as
Router(config-flow-cache)# enable
Router(config-flow-cache)#

Related Commands

Command

Description

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-203

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-cache entries

ip flow-cache entries
To change the number of entries that are maintained in the NetFlow cache, use the ip flow-cache entries
command. To return to the default number of entries, use the no form of this command.
ip flow-cache entries number
no ip flow-cache entries

Syntax Description

number

Defaults

65536 entries

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Number of entries to maintain in the NetFlow cache; valid values are
from 1024 to 524288 entries.

Typically, the default size of the NetFlow cache will meet your needs. However, you can increase or
decrease the number of entries that are maintained in the cache to meet the needs of your flow traffic
rates. For environments with a high amount of flow traffic (such as an Internet core router), we
recommend that you maintain a larger value such as 131072. To obtain information on your flow traffic,
use the show ip cache flow command.
Each cache entry is approximately 64 bytes of storage. Assuming a cache with the default number of
entries, approximately 4 MB of DRAM would be required. Each time that a new flow is taken from the
free-flow queue, the number of free flows is checked. If there are only a few free flows remaining,
NetFlow attempts to age 30 flows using an accelerated timeout. If there is only one free flow remaining,
NetFlow automatically ages 30 flows regardless of their age. This action ensures that free flow entries
are always available.

Caution

We recommend that you do not change the number of entries in the NetFlow cache. Improper use of this
feature could cause network problems. To return to the default number of entries in the NetFlow cache,
use the no ip flow-cache entries command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-204

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow-cache entries

Examples

This example shows how to increase the number of entries in the NetFlow cache to 131072:
Router(config)# ip flow-cache entries 131072
Router(config)# exit

Related Commands

Command

Description

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-205

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-export

ip flow-export
To globally enable NDE for the hardware-switched flows, use the ip flow-export command. To disable
NDE for the hardware-switched flows, use the no form of this command.
ip flow-export
no ip flow-export

Syntax Description

This command has no arguments or keywords.

Defaults

The defaults are as follows:
•

Disabled

•

Version 7

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To change the default NDE version, use the ip flow-export hardware version command.

Examples

This example shows how to enable NDE for the hardware-switched flows:
Router(config)# ip flow-export
Router(config)#

This example shows how to disable NDE for the hardware-switched flows:
Router(config)# no ip flow-export
Router(config)#

Related Commands

Command

Description

ip flow-export
hardware version

Specifies the NDE version for hardware-switched flows.

show mls nde

Displays information about the NDE hardware-switched flow.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-206

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow-export destination

ip flow-export destination
To export the NetFlow cache entries to a specific destination, use the ip flow-export destination
command. To disable information exporting, use the no form of this command.
ip flow-export destination {hostname | ip-address} udp-port
no ip flow-export destination

Syntax Description

hostname

IP hostname of the workstation to which you want to export the
NetFlow information.

ip-address

IP address of the workstation to which you want to export the NetFlow
information.

udp-port

UDP protocol-specific port number.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter two destination IP addresses to improve the probability of receiving complete NetFlow
data by providing redundant data streams.
To configure multiple NetFlow export destinations to a router, enter the ip flow-export destination
command twice, once for each destination. Do not enter the same IP address twice. However, entering
two different IP addresses with the same UDP port number is configurable.
A NetFlow cache entry contains a lot of information. When flow switching is enabled with the ip
route-cache flow command, you can use the ip flow-export destination command to configure the
router to export the flow cache entry to a workstation when a flow expires. This feature can be useful
for statistics, billing, and security, for example.
When entering the ip-address value, follow these guidelines:
•

You cannot enter the IP address of the interface that you are currently on; you must use an address
from the subnet of any interface that is not being used.

•

You cannot use an address from a loopback interface; loopback interfaces do not have internal
VLAN IDs or MAC addresses.

To specify the source IP address of the data, use the ip flow-export source command. To specify the
version that is used on the workstation that receives the NetFlow data, use the ip flow-export version
command.
For more information on NDE, refer to the “Configuring NDE” chapter in the Catalyst Supervisor
Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-207

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-export destination

Examples

This example shows how to export a NetFlow cache entry to UDP port 125 using the version 1 format
on the workstation that has an IP address of 10.42.42.1 99917:
Router# configure terminal
Router(config)# ip flow-export destination 10.42.42.1 9991 125
Router(config)# exit

Related Commands

Command

Description

ip flow-export source

Specifies the source interface IP address that is used in the NDE datagram.

ip flow-export version

Specifies the version for the export of information in NetFlow cache entries.

ip route-cache flow

Enables NetFlow switching for IP routing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-208

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow-export hardware version

ip flow-export hardware version
To specify the NDE version for hardware-switched flows, use the ip flow-export hardware version
command. To return to the default settings, use the no form of this command.
ip flow-export hardware version [5 | 7]
no ip flow-export hardware version

Syntax Description

5

Specifies that the export packet uses the version 5 format; see the “Usage Guidelines”
section for additional information.

7

Specifies that the export packet uses the version 7 format; see the “Usage Guidelines”
section for additional information.

Defaults

Version 7

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to specify the NDE version for hardware-switched flows:
Router(config)# ip flow-export hardware version 5
Router(config)#

Related Commands

Command

Description

ip flow-export
interface

Enables the interface-based ingress NDE for hardware-switched flows.

show mls nde

Displays information about the NDE hardware-switched flow.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-209

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-export interface

ip flow-export interface
To enable the interface-based ingress NDE for hardware-switched flows, use the ip flow-export
interface command. To disable interface-based NDE for hardware-switched flows, use the no form of
this command.
ip flow-export interface
no ip flow-export interface

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the ip flow-export interface command with the ip flow ingress command to enable or disable NDE
on a specific interface.

Examples

This example shows how to enable interface-based NDE for hardware-switched flows:
Router(config)# ip flow-export interface
Router(config)#

This example shows how to disable interface-based NDE for hardware-switched flows:
Router(config)# no ip flow-export interface
Router(config)#

Related Commands

Command

Description

ip flow-export
hardware version

Specifies the NDE version for hardware-switched flows.

show ip flow-export

Displays the information about the hardware-switched and
software-switched flows for the data export, including the main cache and
all other enabled caches.

show mls nde

Displays information about the NDE hardware-switched flow.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-210

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow-export source

ip flow-export source
To specify the source interface IP address that is used in the NDE datagram, use the ip flow-export
source command. To remove the source address, use the no form of this command.
ip flow-export source [{interface interface-number} | {null interface-number} | {port-channel
number} | {vlan vlan-id}]
no ip flow-export source [{interface interface-number} | {null interface-number} | {port-channel
number} | {vlan vlan-id}]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, ge-wan, and atm.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 256.

vlan vlan-id

(Optional) Specifies the VLAN; valid values are from 1 to 4094.

Defaults

No source interface is specified.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-211

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-export source

After you configure NDE, you can specify the source interface that is used in the UDP datagram
containing the export data. The NetFlow Collector on the workstation uses the IP address of the source
interface to determine which router sent the information. The NetFlow Collector performs SNMP
queries to the router using the IP address of the source interface. Because the IP address of the source
interface can change (for example, the interface might flap so a different interface is used to send the
data), we recommend that you configure a loopback source interface. A loopback interface is always up
and can respond to SNMP queries from the NetFlow Collector on the workstation.
For more information on NDE, refer to the “Configuring NDE” chapter in the Catalyst Supervisor
Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Examples

This example shows the configuration for a loopback source interface. The loopback interface has the
IP address as 4.0.0.1 and is used by the serial interface in slot 5, port 0:
Router# configure terminal
Router(config)# interface loopback0
Router(config-if)# ip address 4.0.0.1 255.0.0.0
Router(config-if)# exit
Router(config)# interface serial 5/0:0
Router(config-if)# ip unnumbered loopback0
Router(config-if)# no ip mroute-cache
Router(config-if)# encapsulation ppp
Router(config-if)# ip route-cache flow
Router(config-if)# exit
Router(config)# ip flow-export source loopback0
Router(config)# exit

Related Commands

Command

Description

ip flow-export
destination

Exports the NetFlow cache entries to a specific destination.

ip flow-export version

Specifies the version for the export of information in NetFlow cache entries.

ip route-cache flow

Enables NetFlow switching for IP routing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-212

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow-export version

ip flow-export version
To specify the version for the export of information in NetFlow cache entries, use the ip flow-export
version command. To return to the default settings, use the no form of this command.
ip flow-export version {1 | {5 [origin-as | peer-as]} | {9 [bgp-nexthop | origin-as | peer-as]}}
no ip flow-export version

Syntax Description

1

Specifies that the export packet use the version 1 format; see the “Usage
Guidelines” section for additional information.

5

Specifies that the export packet use the version 5 format; see the “Usage
Guidelines” section for additional information.

origin-as

(Optional) Specifies that export statistics include the origin autonomous
system for the source and destination.

peer-as

(Optional) Specifies that export statistics include the peer autonomous
system for the source and destination.

9

Specifies that the export packet uses the version 9 format; see the “Usage
Guidelines” section for additional information.

bgp-nexthop

(Optional) Specifies that export statistics include the BGP next hop for
the source and destination.

Defaults

Export of information in NetFlow cache entries is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Version 5 and version 9 formats include the source and destination autonomous-system addresses and
source and destination prefix masks. Also, version 9 includes BGP next-hop information.
The number of records stored in the datagram is a variable from 1 to 24 for version 1. The number of
records stored in the datagram is a variable between 1 and 30 for version 5.
For more information on NDE, refer to the “Configuring NDE” chapter in the Catalyst Supervisor
Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-213

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow-export version

Examples

This example shows how to export the data using the version 5 format:
Router(config)# ip flow-export version 5
Router(config)#

Related Commands

Command

Description

show mls nde

Displays information about the NDE hardware-switched flow.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-214

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip flow ingress

ip flow ingress
To enable the software-switched flow creation in Layer 3, use the ip flow ingress command. To return
to the default settings, use the no form of this command.
ip flow ingress
no ip flow ingress

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To create a NetFlow entry, you need to enter the ip flow ingress command.
Follow these guidelines to display multicast entries:

Examples

•

Enter the show mls netflow ip command.

•

Enter the ip flow ingress command on an interface.

•

Make sure that you have not entered the no ip multicast netflow ingress command.

This example shows how to enable inbound NDE for IPv4-bridged flows and NetFlow entry creation:
Router(config-if)# ip flow ingress
Router(config-if)#

This example shows how to disable inbound NDE for IPv4-bridged flows:
Router(config-if)# no ip flow ingress
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-215

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip flow layer2-switched

ip flow layer2-switched
To enable the creation of switched, bridged, and Layer 2 IP flows for a specific VLAN, use the ip flow
layer2-switched command. To return to the default settings, use the no form of this command.
ip flow {ingress | export} layer2-switched {vlan {num | vlanlist}}
no ip flow {ingress | export} layer2-switched {vlan {num | vlanlist}}

Syntax Description

Defaults

ingress

Enables the collection of switched, bridged, and IP flows in Layer 2.

export

Enables the export of switched, bridged, and IP flows in Layer 2.

vlan num |
vlanlist

Specifies the VLAN or range of VLANs; valid values are from 1 to 4094. See the
“Usage Guidelines” section for additional information.

The defaults are as follows:
•

ip flow ingress layer2switch is disabled.

•

ip flow export layer2switched is enabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Before using this command, you must ensure that a corresponding VLAN interface is available and has
a valid IP address.
You can enter one or multiple VLANs. The following examples are samples of valid VLAN lists:
1; 1,2,3; 1-3,7.

Examples

This example shows how to enable the collection of Layer 2-switched flows on a specific VLAN:
Router(config)# ip flow ingress layer2-switched vlan 2
Router(config)#

This example shows how to enable export of Layer 2-switched flows on a range of VLANs:
Router(config)# ip flow export layer2-switched vlan 1-3,7
Router(config)#

This example shows how to disable the collection of Layer 2-switched flows on a specific VLAN:
Router(config)# no ip flow ingress layer2-switched vlan 2
Router(config#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-216

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip forward-protocol turbo-flood

ip forward-protocol turbo-flood
To speed up the flooding of UDP packets using the spanning-tree algorithm, use the ip
forward-protocol turbo-flood command. To return to the default settings, use the no form of this
command.
ip forward-protocol turbo-flood [udp-checksum]
no ip forward-protocol turbo-flood [udp-checksum]

Syntax Description

udp-checksum

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the UDP checksum.

Usage Guidelines

When you enter the ip forward-protocol turbo-flood command, the outgoing UDP packets have a
NULL checksum. If you want to have UDP checksums on all outgoing packets, you must enter the ip
forward-protocol turbo-flood udp-checksum command.

Examples

This example shows how to speed up the flooding of UDP packets using the spanning-tree algorithm:
Router(config)# ip forward-protocol turbo-flood
Router(config)#

This example shows how to speed up the flooding of UDP packets using the spanning-tree algorithm and
have the UDP checksums on all outgoing packets:
Router(config)# ip forward-protocol turbo-flood udp-checksum
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-217

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip forward-protocol turbo-flood

This example shows how to turn off the udp-checksum keyword and the ip forward-protocol
turbo-flood command:
Router(config)# no ip forward-protocol turbo-flood udp-checksum
Router(config)#

This example shows how to reinstate the ip forward-protocol turbo-flood command without the
udp-checksum keyword:
Router(config)# ip forward-protocol turbo-flood
Router(config)#

Related Commands

Command

Description

ip forward-protocol

Specifies that protocols and ports that the router forwards when forwarding
broadcast packets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-218

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp immediate-leave group-list

ip igmp immediate-leave group-list
To enable the immediate processing of the IGMP leave-group messages, use the ip igmp
immediate-leave group-list command. To return to the default settings, use the no form of this
command.
ip igmp immediate-leave group-list acl
no ip igmp immediate-leave group-list acl

Syntax Description

acl

Defaults

Disabled

Command Modes

Global or interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Group ACL number; see the “Usage Guidelines” section for valid
values.

If you enter the ip igmp immediate-leave group-list command, you must enter this command in VLAN
interface configuration mode only.
Valid values for the acl argument are as follows:
•

Access-list number—1 to 99

•

Expanded range access-list number—1300 to 1999

•

Name of the standard IP access list

You can configure one or the other but not both configuration modes at the same time.
You can enter the acl value to restrict the immediate-leave behavior to a simple access list for multicast
groups. The IGMP leave-group messages for multicast groups that are not permitted by the acl value has
the standard inquiry mechanism/leave latency.

Examples

This example shows how to enable the immediate processing of the IGMP leave-group messages:
Router(config)# ip igmp immediate-leave group-list 3
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-219

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp last-member-query-interval

ip igmp last-member-query-interval
To configure the last-member query interval for the IGMP, use the ip igmp
last-member-query-interval command. To return to the default settings, use the no form of this
command.
ip igmp last-member-query-interval interval
no ip igmp last-member-query-interval

Syntax Description

interval

Defaults

1000 milliseconds (1 second); see the “Usage Guidelines” section for additional information.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interval for the last-member query; valid values are from 100 to
65535 milliseconds in multiples of 100 milliseconds.

When a multicast host leaves a group, the host sends an IGMP leave. To check if this host is the last to
leave the group, an IGMP query is sent out when the leave is seen and a timer is started. If no reports
are received before the timer expires, the group record is deleted.
The interval is the actual time that the Catalyst 6500 series switch waits for a response for the
group-specific query.
If you enter an interval that is not a multiple of 100, the interval is rounded to the next lowest multiple
of 100. For example, if you enter 999, the interval is rounded down to 900 milliseconds.
If IGMP fast-leave processing is enabled and you enter the no igmp last-member-query-interval
command, the interval is set to 0 seconds; immediate leave always assumes higher priority.

Examples

This example shows how to configure the last-member query interval to 200 milliseconds:
Router(config-if)# ip igmp last-member-query-interval 200
Router(config-if)#

Related Commands

Command

Description

ip igmp immediate-leave
group-list

Enables the immediate processing of the IGMP leave-group messages.

show ip igmp interface

Displays the information about the IGMP-interface status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-220

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp last-member-query-interval

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-221

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping

ip igmp snooping
To enable IGMP snooping, use the ip igmp snooping command. To disable IGMP snooping, use the no
form of this command.
ip igmp snooping
no ip igmp snooping

Syntax Description

This command has no arguments or keywords.

Defaults

The defaults are as follows:
•

IGMP snooping is enabled on the Catalyst 6500 series switch.

•

IGMP snooping is not configured on multicast routers.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Before you can enable IGMP snooping on the Catalyst 6500 series switches, you must configure the
VLAN interface for multicast routing.
Enter this command in VLAN interface configuration mode only.

Examples

This example shows how to enable IGMP snooping:
Router(config-if)# ip igmp snooping
Router(config-if)#

This example shows how to disable IGMP snooping:
Router(config-if)# no ip igmp snooping
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-222

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping

Related Commands

Command

Description

ip igmp snooping
fast-leave

Enables the IGMPv3-snooping fast-leave processing.

ip igmp snooping
mrouter

Configures a Layer 2 port as a multicast router port.

show ip igmp snooping Displays the information about the explicit host-tracking status for IGMPv3
explicit-tracking
hosts.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-223

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping explicit-tracking

ip igmp snooping explicit-tracking
To enable explicit host tracking, use the ip igmp snooping explicit-tracking command. To disable the
explicit host tracking, use the no form of this command.
ip igmp snooping explicit-tracking
no ip igmp snooping explicit-tracking

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Explicit host tracking is supported only with IGMPv3 hosts.
When you enable explicit host tracking and the Catalyst 6500 series switch is working in
proxy-reporting mode, the router may not be able to track all the hosts that are behind a VLAN interface.
In proxy-reporting mode, the Catalyst 6500 series switch forwards only the first report for a channel to
the router and suppresses all other reports for the same channel.
With IGMPv3 proxy reporting, the Catalyst 6500 series switch does proxy reporting for unsolicited
reports and reports that are received in the general query interval.
Proxy reporting is turned on by default. When you disable proxy reporting, the Catalyst 6500 series
switch works in transparent mode and updates the IGMP snooping database as it receives reports and
forwards this information to the upstream router. The router can then explicitly track all reporting hosts.
Disabling explicit tracking disables fast-leave processing and proxy reporting.
IGMPv3 supports explicit host tracking of membership information on any port. The explicit
host-tracking database is used for fast-leave processing for IGMPv3 hosts, proxy reporting, and statistics
collection. When you enable explicit host tracking on a VLAN, the IGMP snooping software processes
the IGMPv3 report that it receives from a host and builds an explicit host-tracking database that contains
the following information:
•

The port that is connected to the host.

•

The channels that are reported by the host.

•

The filter mode for each group that is reported by the host.

•

The list of sources for each group that is reported by the hosts.

•

The router filter mode of each group.

•

For each group, the list of hosts that request the source.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-224

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping explicit-tracking

Examples

This example shows how to enable IGMPv3-explicit host tracking:
Router(config-if)# ip igmp snooping explicit-tracking
Router(config-if)#

This example shows how to disable IGMPv3-explicit host tracking:
Router(config-if)# no ip igmp snooping explicit-tracking
Router(config-if)#

Related Commands

Command

Description

ip igmp snooping limit Limits the size of the explicit-tracking database.
track
show ip igmp snooping Displays the information about the explicit host-tracking status for IGMPv3
explicit-tracking
hosts.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-225

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping fast-leave

ip igmp snooping fast-leave
To enable the IGMPv3-snooping fast-leave processing, use the ip igmp snooping fast-leave command.
To disable fast-leave processing, use the no form of this command.
ip igmp snooping fast-leave
no ip igmp snooping fast-leave

Syntax Description

This command has no arguments or keywords.

Defaults

The defaults are as follows:
•

IGMP version 2—Disabled

•

IGMP version 3—Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Enter this command in VLAN interface configuration mode only.

Fast-leave processing is enabled by default. To disable fast-leave processing, you must enter the no ip
igmp snooping fast-leave command to disable fast-leave processing.
You should use the IGMPv3-snooping fast-leave processing when there is a single receiver for the MAC
group for a specific VLAN.

Examples

This example shows how to enable IGMPv3-snooping fast-leave processing:
Router(config-if)# ip igmp snooping fast-leave
Router(config-if)#

This example shows how to disable IGMPv3-snooping fast-leave processing:
Router(config-if)# no ip igmp snooping fast-leave
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-226

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping fast-leave

Related Commands

Command

Description

ip igmp snooping

Enables IGMP snooping.

ip igmp snooping
explicit-tracking

Enables explicit host tracking.

show ip igmp interface Displays the information about the IGMP-interface status and
configuration.
show
mac-address-table

Displays the information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-227

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping flooding

ip igmp snooping flooding
To configure periodic flooding of multicast packets, use the ip igmp snooping flooding command. To
disable periodic flooding, use the no form of this command.
ip igmp snooping flooding [timer seconds]
no ip igmp snooping flooding

Syntax Description

timer seconds

Defaults

The defaults are as follows:

(Optional) Specifies the interval between flooding in a 24-hour period for
source-only entries; valid values are from 0 to 86400 seconds.

•

Disabled.

•

If enabled, seconds is 600 seconds (10 minutes).

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on source-only VLANs.
You can enter 0 seconds to disable flooding. If you enter a maximum of 86400 seconds, flooding would
occur once every 24 hours.

Examples

This example shows how to specify the interval between flooding in a 24-hour period:
Router(config-if)# ip igmp snooping flooding timer 300
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-228

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping l2-entry-limit

ip igmp snooping l2-entry-limit
To configure the maximum number of Layer 2 entries that can be created by the Catalyst 6500 series
switch, use the ip igmp snooping l2-entry-limit command.
ip igmp snooping l2-entry-limit max-entries

Syntax Description

max-entries

Defaults

15488 Layer 2 entries

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Maximum number of Layer 2 entries that can be created by the Catalyst 6500
series switch; valid values are from 1 to 100000.

When entering max-entries, do not enter a comma (,).
Enter this command in VLAN interface configuration mode only.

Examples

This example shows how to configure the maximum number of Layer 2 entries that can be created by
the Catalyst 6500 series switch:
Router(config-if)# ip igmp snooping l2-entry-limit 25000
Router(config-if)#

Related Commands

Command

Description

show ip igmp interface Displays the information about the IGMP-interface status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-229

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping last-member-query-interval

ip igmp snooping last-member-query-interval
To configure the last member query interval for IGMP snooping, use the ip igmp snooping
last-member-query-interval command. To return to the default settings, use the no form of this
command.
ip igmp snooping last-member-query-interval interval
no ip igmp snooping last-member-query-interval

Syntax Description

interval

Defaults

1000 milliseconds (1 second); see the “Usage Guidelines” section for additional information.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interval for the last member query; valid values are from 100 to
900 milliseconds in multiples of 100 milliseconds.

When a multicast host leaves a group, the host sends an IGMP leave. To check if this host is the last to
leave the group, an IGMP query is sent out when the leave is seen and a timer is started. If no reports
are received before the timer expires, the group record is deleted.
The interval is the actual time that the Catalyst 6500 series switch waits for a response for the
group-specific query.
If you enter an interval that is not a multiple of 100, the interval is rounded to the next lowest multiple
of 100. For example, if you enter 999, the interval is rounded down to 900 milliseconds.
If you enable IGMP fast-leave processing and you enter the no igmp snooping
last-member-query-interval command, the interval is set to 0 seconds; fast-leave processing always
assumes higher priority.
Even though the valid interval range is 100 to 1000 milliseconds, you cannot enter a value of 1000. If
you want this value, you must enter the no ip igmp snooping last-member-query-interval command
and return to the default value (1000 milliseconds).

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-230

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping last-member-query-interval

Examples

This example shows how to configure the last-member-query-interval to 200 milliseconds:
Router(config-if)# ip igmp snooping last-member-query-interval 200
Router(config-if)#

Related Commands

Command

Description

ip igmp snooping
fast-leave

Enables the IGMP v3-snooping fast-leave processing.

show ip igmp interface Displays the information about the IGMP-interface status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-231

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping limit track

ip igmp snooping limit track
To limit the size of the explicit-tracking database, use the ip igmp snooping limit track command. To
return to the default settings, use the no form of this command.
ip igmp snooping limit track max-entries
no ip igmp snooping limit track

Syntax Description

max-entries

Defaults

max-entries is 32000.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Maximum number of entries in the explicit-tracking database; valid values
are from 0 to 128000 entries.

Each entry in the explicit-tracking database is identified by the source IP, group IP, port, VLAN, and
reporter IP.
When you set the max-entries to 0, explicit tracking is disabled.
When the explicit-tracking database exceeds the configured max-entries, a syslog message is generated.
When you reduce the max-entries, the explicit-tracking database does not decrease in size immediately.
The explicit-tracking database gradually shrinks as reporters time out.

Examples

This example shows how to configure the maximum number of entries in the explicit-tracking database:
Router(config)# ip igmp snooping limit track 20000
Router(config)#

Related Commands

Command

Description

ip igmp snooping
explicit-tracking

Enables explicit host tracking.

show ip igmp snooping Displays information about the explicit host tracking for IGMPv3 hosts.
explicit-tracking vlan

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-232

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping mrouter

ip igmp snooping mrouter
To configure a Layer 2 port as a multicast router port, use the ip igmp snooping mrouter command. To
remove the configuration., use the no form of this command
ip igmp snooping mrouter {interface {interface interface-number} |
{port-channel number}} | {learn {cgmp | pim-dvmrp}}
no ip igmp snooping mrouter {interface {interface interface-number} |
{port-channel number}} | {learn {cgmp | pim-dvmrp}}

Syntax Description

interface

Specifies the next-hop interface to the multicast router.

interface

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, and tengigabitethernet. See the “Usage Guidelines”
section for additional valid values.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

port-channel
number

Specifies the port-channel number; valid values are a maximum of
64 values ranging from 1 to 256.

learn

Specifies the learning method for the multicast router.

cgmp

Specifies the snooping CGMP packets for the multicast router.

pim-dvmrp

Specifies the snooping PIM-DVMRP packets for the multicast router.

Defaults

pim-dvmrp

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Enter this command in VLAN interface configuration mode only.
The interface to the router must be in the VLAN where you are entering the command, the interface must
be administratively up, and the line protocol must be up.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The CGMP learning method can decrease control traffic.
The learning method that you configure is saved in NVRAM.
Static connections to multicast routers are supported only on switch ports.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-233

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping mrouter

Examples

This example shows how to specify the next-hop interface to the multicast router:
Router(config-if)# ip igmp snooping mrouter interface fastethernet 5/6
Router(config-if)#

This example shows how to specify the learning method for the multicast router:
Router(config-if)# ip igmp snooping mrouter learn cgmp
Router(config-if)#

Related Commands

Command

Description

ip igmp snooping

Enables IGMP snooping.

ip igmp snooping
fast-leave

Enables the IGMPv3-snooping fast-leave processing.

show ip igmp snooping Displays the information about the dynamically learned and manually
mrouter
configured multicast router interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-234

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping querier

ip igmp snooping querier
To enable multicast support within a subnet when no multicast routing protocol is configured in the
VLAN or subnet, use the ip igmp snooping querier command. To disable multicast support within a
subnet when no multicast routing protocol is configured, use the no form of this command.
ip igmp snooping querier
no ip igmp snooping querier

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Enter this command in VLAN interface configuration mode only.
You enable IGMP snooping on the Catalyst 6500 series switch, and disable PIM on the VLAN.
Configure the VLAN in global configuration mode.
Configure an IP address on the VLAN interface. When enabled, the IGMP-snooping querier uses the IP
address as the query source address. If no IP address is configured on the VLAN interface, the
IGMP-snooping querier does not start. The IGMP-snooping querier disables itself if you clear the IP
address. When enabled, the IGMP-snooping querier restarts if you configure an IP address.
The IGMP-snooping querier supports IGMPv2.
When enabled, the IGMP-snooping querier does the following:
•

Does not start if it detects IGMP traffic from a multicast router.

•

Starts after 60 seconds when no IGMP traffic is detected from a multicast router.

•

Disables itself if it detects IGMP traffic from a multicast router.

QoS does not support IGMP packets when IGMP snooping is enabled.
You can enable the IGMP-snooping querier on all the Catalyst 6500 series switches in the VLAN. One
Catalyst 6500 series switch is elected as the querier.
If multicast routers are not present on the VLAN or subnet, the Catalyst 6500 series switch becomes the
IGMP querier for the VLAN when you enable the IGMP-snooping querier.
If you disable the IGMP-snooping querier, IGMP snooping functions only when you configure PIM in
the subnet.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-235

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping querier

You can enter the ip igmp snooping querier command at any time, but the IGMP-snooping querier
starts only when no other multicast routers are present in the VLAN or subnet.
You can use this command as an alternative to configuring PIM in a subnet; use this command when the
multicast traffic does not need to be routed but you would like support for IGMP snooping on Layer 2
interfaces in your network.

Examples

This example shows how to enable the IGMP-snooping querier on the VLAN:
Router(config-if)# ip igmp snooping querier
Router(config-if)#

Related Commands

Command

Description

show ip igmp snooping Displays the information about the dynamically learned and manually
mrouter
configured multicast router interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-236

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping rate

ip igmp snooping rate
To set the rate limit for IGMP-snooping packets, use the ip igmp snooping rate command. To disable
the software rate limiting, use the no form of this command.
ip igmp snooping rate pps
no ip igmp snooping rate

Syntax Description

pps

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Rate limit of incoming IGMP messages; valid values are from 100 to
6000 packets per second.

This example shows how to enable software rate limiting:
Router(config)# ip igmp snooping rate
Router(config)#

This example shows how to disable software rate limiting:
Router(config)# no ip igmp snooping rate
Router(config)#

Related Commands

Command

Description

show ip igmp snooping Displays the information about the IGMP snooping rate limit.
rate-limit

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-237

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp snooping report-suppression

ip igmp snooping report-suppression
To turn on IP IGMP snooping report suppression, use the ip igmp snooping report-suppression
command. To turn off report suppression, use the no form of this command.
ip igmp snooping report-suppression
no ip igmp snooping report-suppression

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enable report suppression for all host reports responding to a general query, IP IGMP
snooping forwards the first report only and suppresses the remaining reports to constrain IGMP traffic
to the multicast router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-238

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp snooping source-only-learning age-timer

ip igmp snooping source-only-learning age-timer
To flood multicast packets periodically to a Layer 2 segment that has only multicast sources and no
receivers connected to it, use the ip igmp snooping source-only-learning age-timer command. To
return to the default settings, use the no form of this command.
ip igmp snooping source-only-learning age-timer seconds
no ip igmp snooping source-only-learning age-timer

Syntax Description

seconds

Defaults

seconds is 600 seconds (10 minutes).

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Source-only entries age timer value in seconds; valid values are from 0 to
86400 seconds.

There are two source-only timers that run in an alternating fashion; the source_only_age_timer and the
source_only_delete_timer. The value that you configure by entering the ip igmp snooping
source-only-learning age-timer command sets the source_only_age_timer. The
source_only_delete_timer has a fixed, nonconfigurable value of 5 minutes (300 seconds).
The expiration of one timer starts the other timer. At any time, only one timer is running.
Setting the age timer to 0 stops the flooding in the source-only VLAN.

Note

Examples

Setting the age timer to a nonzero value causes flooding to occur every x (configured value) + 5 minutes
(source_only_delete_timer) interval.

This example shows how to flood multicast packets periodically:
Router(config)# ip igmp snooping source-only-learning age-timer 300
Router(config)#

This example shows how to return to the default settings:
Router(config)# no ip igmp snooping source-only-learning age-timer
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-239

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip igmp ssm-map

ip igmp ssm-map
To enable and configure SSM mapping, use the ip igmp ssm-map command. To disable SSM mapping,
use the no form of this command.
ip igmp ssm-map {enable | {query dns} | {static {group-access-list | group-access-list-name}
source-address}}
no ip igmp ssm-map {enable | {query dns}

Syntax Description

enable

Enables SSM group to the source mapping.

query dns

Enables the DNS lookup.

static

Specifies an SSM static group to the source mapping.

group-access-list

Group access list to map to the source address.

group-access-listname

Name of the group access list to map to the source address.

source-address

Source address.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

By default, the locally configured static SSM mappings and the DNS server are queried. Local
configured mappings have priority over dynamic mappings. If a DNS server is not available, you may
want to disable DNS server lookups. To disable DNS lookups, use the no ip igmp ssm-map query dns
command.
If a DNS server is not available, a locally configured static SSM mapping database is used to query. A
database query uses the group address and receives the source list in return. As soon as the static SSM
mappings are configured, the maps are used for the lookups. To build a static SSM mappings database,
use the following commands:
ip igmp ssm-map static acl-1 source-1-ip-address
ip igmp ssm-map static acl-2 source-2-ip-address
The ACL specifies the group or groups that have to be mapped to the listed source. Because the content
servers may send out more then one stream with the same source address, the access list is used to group
the multicast destination addresses together. You can use wildcards if the addresses are contiguous.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-240

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip igmp ssm-map

If multiple sources have to be joined for a multicast group address, you must place the group in all ACLs
that are associated with the source address. In the example above, if group G must join sources 1 and 2,
the group address must be placed in both acl-1 and acl-2.
When you enable SSM mapping using the ip igmp ssm-map enable command, but the source mapping
list is empty for the group, enter the no ip igmp ssm-map query dns command. The ip igmp ssm-map
enable command is supported on statically configured SSM-mapped source entries only.

Examples

This example shows how to enable an SSM group to the source mapping:
Router(config)# ip igmp ssm-map enable
Router(config)#

This example shows how to enable DNS lookups:
Router(config)# ip igmp ssm-map query dns
Router(config)#

This example shows how to build a static SSM mapping database:
Router(config)# ip igmp ssm-map static acl1 255.255.255.0
Router(config)# ip igmp ssm-map static acl2 255.255.255.0
Router(config)#

This example shows how to disable an SSM group to the source mapping:
Router(config)# no ip igmp ssm-map enable
Router(config)#

This example shows how to disable DNS lookups:
Router(config)# no ip igmp ssm-map query dns
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-241

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip local-proxy-arp

ip local-proxy-arp
To enable local-proxy ARP, use the ip local-proxy-arp command. To disable local-proxy ARP, use the
no form of this command.
ip local-proxy-arp
no ip local-proxy-arp

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use local-proxy ARP on subnets where the hosts are intentionally prevented from communicating
directly with each other; for example, you can use local-proxy ARP in private VLAN environments.
Local-proxy ARP allows the PISA to respond to ARP requests for IP addresses within a subnet where
normally no routing is required. When you enable local-proxy ARP, the PISA can respond to ARP
requests for IP addresses within a common subnet where traffic is not normally routed. This situation
happens only when two hosts on the same subnet cannot directly ARP for each other.
ICMP redirects are disabled on interfaces where local-proxy ARP is enabled.

Examples

This example shows how to enable local-proxy ARP:
Router(config-if)# ip local-proxy-arp
Router(config-if)#s

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-242

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip mroute

ip mroute
To configure a multicast static route (mroute), use the ip mroute command. To remove the route, use
the no form of this command.
ip mroute [vrf vrf-name] source-address mask [protocol as-number] {rpf-address | interface-type
interface-number} [distance]
no ip mroute [vrf vrf-name] source-address mask [protocol as-number] {rpf-address |
interface-type interface-number} [distance]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

source-address

IP address of the multicast source.

mask

Mask on the IP address of the multicast source.

protocol

(Optional) Unicast routing protocol that you are using.

as-number

(Optional) Autonomous system number of the routing protocol that you are
using, if applicable.

rpf-address

Incoming interface for the mroute.

interface-type
interface-number

Interface type and number for the mroute.

distance

(Optional) Administrative distance; valid values are from 0 to 255.

Defaults

distance is 0.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command allows you to statically configure where multicast sources are located (even though the
unicast routing table shows something different).
When a source range is specified, the rpf-address argument applies only to those sources.
If the rpf-address is a PIM neighbor, PIM join, graft, and prune messages are sent to it. The rpf-address
argument can be a host IP address of a directly connected system or a network/subnet number. When it
is a route, a recursive lookup is done from the unicast routing table to find a directly connected system.
If the rpf-address argument is not specified, the interface interface-type interface-number value is used
as the incoming interface.
The distance argument determines whether a unicast route, a DVMRP route, or a static mroute is used
for the RPF lookup. The lower distances have a higher priority. If the static mroute has the same distance
as the other two RPF sources, the static mroute will take precedence.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-243

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip mroute

Examples

This example shows how to configure all sources from a single interface (in this case, a tunnel):
Router(config)# ip mroute 224.0.0.0 255.255.255.255 tunnel0
Router(config)#

This example shows how to configure all specific sources within a network number to be reachable
through 172.30.10.13:
Router(config)# ip mroute 172.16.0.0 255.255.0.0 172.30.10.13
Router(config)#

This example shows how to cause this multicast static route to take effect if the unicast routes for any
given destination is deleted:
Router(config)# ip mroute 224.0.0.0 255.255.255.255 serial0 200
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-244

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp border

ip msdp border
To configure a router that borders a PIM sparse-mode region and dense-mode region to use MSDP, use
the ip msdp border command. To prevent this action, use the no form of this command.
ip msdp [vrf vrf-name] border sa-address internet-type internet-number
no ip msdp [vrf vrf-name] border sa-address internet-type internet-number

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

sa-address

Specifies an active source IP address.

internet-type internet-number

Interface type and number from which the IP address is derived and
used as the rendezvous-point address in source-active messages.

Defaults

The active sources in the dense-mode region will not participate in MSDP.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command if you want the router to send source-active messages for sources active in the PIM
dense-mode region to MSDP peers.
Specifying the internet-type internet-number allows the MSDP peers to forward source-active messages
away from this border. The IP address of the interface is used as the originator ID, which is the
rendezvous point field in the MSDP source-active message.

Note

We recommend that you configure the border router in the sparse-mode domain to proxy-register
sources in the dense-mode domain and configure the sparse-mode domain to use standard MSDP
procedures to advertise these sources.

Note

If you use this command, you must limit the sources advertised by using the ip msdp redistribute
command. Configure the ip msdp redistribute command to apply to only local sources. Be aware
that this configuration can result in an (S,G) state that remains long after a source in the dense-mode
domain has stopped sending.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-245

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp border

Note

Examples

The ip msdp originator-id command identifies an interface type and number to be used as the
rendezvous-point address. If both the ip msdp border and ip msdp originator-id commands are
configured, the ip msdp originator-id command prevails. The address derived from the ip msdp
originator-id command determines the address of the rendezvous point.

In this example, the local router is not a rendezvous point; it borders a PIM sparse-mode region with a
dense-mode region and uses the IP address of Ethernet interface 0 as the rendezvous point address in
source-active messages.
Router(config)# ip msdp border sa-address ethernet0
Router(config)#

Related Commands

Command

Description

ip msdp originator-id

Allows an MSDP speaker that originates a source-active message to use the
IP address of the interface as the rendezvous-point address in the
source-active message.

ip msdp redistribute

Configures which (S,G) entries from the multicast routing table are
advertised in source-active messages originated to MSDP peers.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-246

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp cache-sa-state

ip msdp cache-sa-state
To create a source-active state on the router, use the ip msdp cache-sa-state command.
ip msdp cache-sa-state [vrf vrf-name]

Syntax Description

vrf vrf-name

Defaults

The router creates the source-active state for all MSDP source-active messages that it receives.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

Usage Guidelines

This command is automatically configured if at least one MSDP peer is configured. It cannot be
disabled.

Examples

This example shows how the ip msdp cache-sa-state command is enabled when an MSDP peer is
configured. For more MSDP configuration examples, refer to the “Configuring Multicast Source
Discovery Protocol” chapter in the Cisco IOS Release 12.2 Cisco IOS IP Configuration Guide.
.
.
.
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
.
.
.

Related Commands

ip
ip
ip
ip
ip
ip

classless
msdp peer 192.168.1.2 connect-source Loopback0
msdp peer 192.169.1.7
msdp mesh-group outside-test 192.168.1.2
msdp cache-sa-state
msdp originator-id Loopback0

Command

Description

clear ip msdp sa-cache

Configures an MSDP peer.

ip msdp filter-sa-request Creates a source-active state on the router.
show ip msdp sa-cache

Displays (S, G) state learned from MSDP peers.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-247

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp default-peer

ip msdp default-peer
To define a default peer from which to accept all MSDP source-active messages, use the ip msdp
default-peer command. To remove the default peer, use the no form of this command.
ip msdp [vrf vrf-name] default-peer {peer-address | peer-name} [prefix-list list]
no ipip msdp [vrf vrf-name] default-peer

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or DNS name of the MSDP default peer.

prefix-list list

(Optional) Specifies the BGP prefix list.

Defaults

No default MSDP peer exists.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the ip msdp default-peer command if you do not want to configure your MSDP peer to be a BGP
peer also.
If only one MSDP peer is configured (with the ip msdp peer command), it will be used as a default peer.
You do not need to configure a default peer with this command.
If you do not specify the prefix-list list keyword and argument, all source-active messages that are
received from the configured default peer are accepted.
The prefix-list list keyword and argument specifies that the peer will be a default peer only for the
prefixes listed in the list specified by the list argument. You must configure a BGP prefix list for this
prefix-list list keyword and argument to have any effect.
You should configure a BGP prefix list if you intend to configure the prefix-list list keyword and
argument with the ip msdp default-peer command.
If you specify the prefix-list list keyword and argument, the source-active messages that originated from
the rendezvous points that are covered by the prefix-list list keyword and argument are accepted from
the configured default peer. If you specify the prefix-list list keyword and argument but do not configure
a prefix list, the default peer is used for all prefixes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-248

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp default-peer

You can enter multiple ip msdp default-peer commands, with or without the prefix-list keyword.
However, all commands must either have the keyword or all must not have the keyword.

Examples

•

When you use multiple ip msdp default-peer commands with the prefix-list keyword, you use all
the default peers at the same time for different rendezvous-point prefixes. This syntax is typically
used in a service provider cloud that connects stub site clouds.

•

When you use multiple ip msdp default-peer commands without the prefix-list keyword, you use
a single active peer to accept all source-active messages. If that peer goes down, then you move to
the next configured default peer to accept all source-active messages. This syntax is typically used
at a stub site.

This example shows how to configure the router named router.cisco.com as the default peer to the local
router:
Router(config)# ip msdp peer 192.168.1.2
Router(config)# ip msdp peer 192.168.1.3
Router(config)# ip msdp default-peer router.cisco.com

!At a stub site

This example shows how to configure the router at IP address 192.168.1.3 as the default peer to the local
router:
Router(config)# ip msdp peer 192.168.1.3
Router(config)# ip msdp peer 192.168.3.5
Router(config)# ip msdp default-peer 192.168.1.3

This example shows how to configure two default peers:
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#

Related Commands

ip
ip
ip
ip
ip
ip

msdp peer 172.18.2.3
msdp peer 172.19.3.5
msdp default-peer 172.18.2.3 prefix-list site-c
prefix-list site-a permit 172.18.0.0/16
msdp default-peer 172.19.3.5 prefix-list site-a
prefix-list site-c permit 172.19.0.0/16

Command

Description

ip msdp peer

Configures an MSDP peer.

ip prefix-list

Creates an entry in a prefix list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-249

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp description

ip msdp description
To add descriptive text to the configuration for an MSDP peer, use the ip msdp description command.
To remove the description, use the no form of this command.
ip msdp [vrf vrf-name] description {peer-name | peer-address} text
no ip msdp [vrf vrf-name] description {peer-name | peer-address}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-name | peer-address

Peer name or address to which this description applies.

text

Description of the MSDP peer.

Defaults

No description is associated with an MSDP peer.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Configure a description to make the MSDP peer easier to identify. This description is displayed in the
output of the show ip msdp peer command.

Examples

This example shows how to configure the router at the IP address 224.107.5.4 with a description
indicating it is a router at customer A:
Router(config)# ip msdp description 224.107.5.4 router at customer a
Router(config)#

Related Commands

Command

Description

show ip msdp peer

Displays detailed information about the MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-250

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp filter-sa-request

ip msdp filter-sa-request
To configure the router to send source-active request messages to the MSDP peer when a new joiner
from a group becomes active, use the ip msdp filter-sa-request command. To prevent this action, use
the no form of this command.
ip msdp [vrf vrf-name] filter-sa-request {peer-address | peer-name} [list access-list]
no ip msdp [vrf vrf-name] filter-sa-request {peer-address | peer-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address

IP address of the MSDP peer from which the local router requests
source-active messages when a new joiner for the group becomes
active.

peer-name

Name of the MSDP peer from which the local router requests
source-active messages when a new joiner for the group becomes
active.

list access-list

(Optional) Specifies the standard IP access-list number or name that
describes a multicast group address.

Defaults

If this command is not configured, all source-active request messages are recognized. If this command
is configured but no access list is specified, all source-active request messages are ignored.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

By default, the router recognizes all source-active request messages from peers. Use this command if
you want to control exactly which source-active request messages that the router will recognize.
If no access list is specified, all source-active request messages are ignored. If an access list is specified,
only source-active request messages from those permitted groups will be recognized, and all others will
be ignored.

Examples

This example shows how to configure the router to filter source-active request messages from the MSDP
peer at 172.16.2.2. This example also shows that the source-active request messages from sources on the
network 192.168.22.0 pass access list 1 and will be recognized; all others will be ignored.
Router(config)# ip msdp filter sa-request 224.69.2.2 list 1
access-list 1 permit 228.4.22.0 0.0.0.255

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-251

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp filter-sa-request

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-252

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp mesh-group

ip msdp mesh-group
To configure an MSDP peer to be a member of a mesh group, use the ip msdp mesh-group command.
To remove an MSDP peer from a mesh group, use the no form of this command.
ip msdp [vrf vrf-name] mesh-group mesh-name {peer-address | peer-name}
no ip msdp [vrf vrf-name] mesh-group mesh-name {peer-address | peer-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

mesh-name

Name of the mesh group.

peer-address | peer-name

IP address or name of the MSDP peer to be a member of the mesh
group.

Defaults

The MSDP peers do not belong to a mesh group.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

A mesh group is a group of MSDP speakers that have fully meshed MSDP connectivity among
themselves. The source-active messages received from a peer in a mesh group are not forwarded to the
other peers in the same mesh group.
The mesh groups can be used to achieve two goals:

Examples

•

Reduce source-active message flooding

•

Simplify peer-RPF flooding (you do not need to run BGP or multiprotocol BGP among MSDP
peers)

This example shows how to configure the MSDP peer at address 224.1.1.1 to be a member of the mesh
group named internal:
Router(config)# ip msdp mesh-group internal 224.1.1.1
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-253

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp originator-id

ip msdp originator-id
To allow an MSDP speaker that originates a source-active message to use the IP address of the interface
as the rendezvous-point address in the source-active message, use the ip msdp originator-id command.
To prevent the rendezvous-point address from being derived in this way, use the no form of this command.
ip msdp [vrf vrf-name] originator-id interface-type interface-number
no ip msdp [vrf vrf-name] originator-id interface-type interface-number

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

interface-type
interface-number

Interface type and number on the local router whose IP address is
used as the rendezvous-point address in source-active messages.

Defaults

The rendezvous-point address is used as the originator ID.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The ip msdp originator-id command identifies an interface type and number to be used as the
rendezvous-point address in a source-active message.
Use this command if you want to configure a logical rendezvous point. Because only rendezvous points
and MSDP border routers originate source-active messages, you might need to change the ID used for
this purpose.
If both the ip msdp border sa-address and ip msdp originator-id commands are configured, the ip
msdp originator-id command prevails. The address derived from the ip msdp originator-id command
determines the address of the rendezvous point to be used in the source-active message.

Examples

This example shows how to configure the IP address of Ethernet interface 1 as the rendezvous-point
address in source-active messages:
Router(config)# ip msdp originator-id ethernet1
Router(config)#

Related Commands

Command

Description

ip msdp border

Configures a router that borders a PIM sparse-mode region and dense-mode
region to use MSDP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-254

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp peer

ip msdp peer
To configure an MSDP peer, use the ip msdp peer command. To remove the peer relationship, use the
no form of this command.
ip msdp [vrf vrf-name] peer {peer-name | peer-address} [connect-source interface-type
interface-number] [remote-as as-number]
no ip msdp [vrf vrf-name] peer {peer-name | peer-address}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-name | peer-address

DNS name or IP address of the router that is to be the MSDP peer.

connect-source interface-type (Optional) Specifies the interface type and number whose primary
interface-number
address becomes the source IP address for the TCP connection.
remote-as as-number

(Optional) Specifies the autonomous system number of the MSDP
peer.

Defaults

No MSDP peer is configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The router specified should also be configured as a BGP neighbor.
The interface-type is on the router being configured.
If you are also using BGP peering with this MSDP peer, you should use the same IP address for MSDP
that you used for BGP. However, you are not required to run BGP or multiprotocol BGP with the MSDP
peer if there is a BGP or MBGP path between the MSDP peers. If there is no path, you must configure
the ip msdp default-peer command.
The remote-as as-number keyword and argument is used for display purposes only.
A peer might appear to be in another autonomous system (other than the one it really resides in) when
you have an MSDP peering session but do not have a BGP peer session with that peer. In this case, if
the prefix of the peer is injected by another autonomous system, it displays as the autonomous system
number of the peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-255

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp peer

Examples

This example shows how to configure the router at the IP address 224.108.1.2 as an MSDP peer to the
local router. The neighbor belongs to autonomous system 109.
Router(config)# ip msdp peer 224.108.1.2 connect-source ethernet 0
router bgp 110
network 224.108.0.0
neighbor 224.108.1.2 remote-as 109
neighbor 224.108.1.2 update-source ethernet 0

This example shows how to configure the router named router.cisco.com as an MSDP peer to the local
router:
Router(config)# ip msdp peer router.cisco.com
Router(config)#

This example shows how to configure the router named router.cisco.com to be an MSDP peer in
autonomous system 109. The primary address of Ethernet interface 0 is used as the source address for
the TCP connection.
Router(config)# ip msdp peer router.cisco.com connect-source ethernet0 remote-as 109
Router(config)#

Related Commands

Command

Description

neighbor remote-as

Adds an entry to the BGP or multiprotocol BGP neighbor table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-256

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp redistribute

ip msdp redistribute
To configure which (S,G) entries from the multicast routing table are advertised in source-active
messages originated to MSDP peers, use the ip msdp redistribute command. To remove the filter, use
the no form of this command.
ip msdp [vrf vrf-name] redistribute [list access-list-name] [asn as-access-list-number]
[route-map map-name]
no ip msdp [vrf vrf-name] redistribute

Syntax Description

Defaults

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

list access-list-name

(Optional) Specifies the standard or extended IP access-list number
or name that controls which local sources are advertised and to which
groups they send.

asn as-access-list-number

(Optional) Specifies the standard or extended IP access-list number;
valid values are from 1 to 199.

route-map map-name

(Optional) Specifies the route-map name.

The default settings are as follows:
•

If no portion of this command is configured, only local sources are advertised, provided that they
send to groups for which the router is a rendezvous point.

•

If no portion of this command is configured and if the ip msdp border sa-address command is
configured, all local sources are advertised.

•

If the ip msdp redistribute command is configured with no keywords, no multicast sources are
advertised.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must configure the as-access-list-number argument in the ip as-path command.
This command affects source-active message origination, not source-active message forwarding. If you
want to filter which source-active messages are forwarded to MSDP peers, use the ip msdp sa-filter in
or ip msdp sa-filter out command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-257

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp redistribute

The ip msdp redistribute command controls which (S,G) pairs the router advertises from the multicast
routing table. By default, only sources within the local domain are advertised. Use the following
guidelines for the ip msdp redistribute command:

Examples

•

If you specify the list access-list-name keyword and argument only, you filter which local sources
are advertised and to which groups are sent advertisements. The access list specifies a source
address, source mask, group address, and group mask.

•

If you specify the asn as-access-list-number keyword and argument only, you advertise all sources
sending to any group that pass through the autonomous system path access list. The autonomous
system path access-list number refers to the ip as-path command, which specifies an access list. If
you specify the asn 0 keywords, sources from all autonomous systems are advertised. The asn 0
keywords are useful when connecting dense-mode domains to a sparse-mode domain running
MSDP, or when using MSDP in a router that is not configured with BGP. In these cases, you do not
know if a source is local.

•

If you specify the route-map map-name keyword and argument only, you advertise all sources that
satisfy the match criteria in the route map map-name argument.

•

If you specify all three keywords (list, asn, and route-map), all conditions must be true before any
multicast source is advertised in a source-active message.

•

If you specify the ip multicast redistribute command with no other keywords or arguments, no
multicast sources are advertised.

This example shows how to configure which (S,G) entries from the multicast routing table are advertised
in source-active messages originated to MSDP peers:
Router(config)# ip msdp redistribute route-map customer-sources
route-map customer-sources permit
match as-path customer-as
Router(config)# ip as-path access-list ^109$

Related Commands

Command

Description

ip as-path

Defines a BGP autonomous system path access list.

ip msdp border

Configures a router that borders a PIM sparse-mode region and dense-mode
region to use MSDP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-258

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp sa-filter in

ip msdp sa-filter in
To configure an incoming filter list for source-active messages received from the specified MSDP peer,
use the ip msdp sa-filter in command. To remove the filter, use the no form of this command.
ip msdp [vrf vrf-name] sa-filter in {peer-address | peer-name} [list access-list-name] [route-map
map-name]
no ip msdp [vrf vrf-name] sa-filter in {peer-address | peer-name} [list access-list-name]
[route-map map-name]

Syntax Description

Defaults

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or name of the MSDP peer from which the source-active
messages are filtered.

list access-list-name

(Optional) Specifies the IP access-list number or name.

route-map map-name

(Optional) Specifies the route-map name.

The default settings are as follows:
•

If this command is not configured, no incoming messages are filtered; all source-active messages
are accepted from the peer.

•

If the command is configured, but no access list or route map is specified, all source/group pairs
from the peer are filtered.

•

If both the list and route-map keywords are used, all conditions must be true to pass any (S,G) pair
in incoming source-active messages.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify an access-list-name, all source/group pairs from the peer are filtered.
The specified MSDP peer passes only those source-active messages that meet the match criteria in the
route map map-name argument.
If all match criteria are true, a permit keyword from the route map passes the routes through the filter.
Use the deny keyword to filter the routes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-259

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp sa-filter in

Examples

This example shows how to configure the router to filter all source-active messages from the peer named
router.cisco.com:
Router(config)# ip msdp peer router.cisco.com connect-source ethernet 0
Router(config)# ip msdp sa-filter in router.cisco.com
Router(config)#

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

ip msdp sa-filter out

Configures an outgoing filter list for source-active messages sent to the
specified MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-260

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp sa-filter out

ip msdp sa-filter out
To configure an outgoing filter list for source-active messages sent to the specified MSDP peer, use the
ip msdp sa-filter out command. To remove the filter, use the no form of this command.
ip msdp [vrf vrf-name] sa-filter out {peer-address | peer-name} [list access-list-name]
[route-map map-name]
no ip msdp [vrf vrf-name] sa-filter out {peer-address | peer-name} [list access-list-name]
[route-map map-name]

Syntax Description

Defaults

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or DNS name of the MSDP peer to which the source-active
messages are filtered.

list access-list

(Optional) Specifies the extended IP access-list number or name.

route-map map-name

(Optional) Specifies the route map name.

The default settings are as follows:
•

If this command is not configured, no outgoing messages are filtered; all source-active messages
received are forwarded to the peer.

•

If the command is configured, but no access list or route map is specified, all source/group pairs are
filtered.

•

If both the list and route-map keywords are used, all conditions must be true to pass any (S,G) pairs
in outgoing source-active messages.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify an access-list, all source/group pairs are filtered. The specified MSDP peer passes
only those source-active messages that pass the extended access list.
If both the list and route-map keywords are used, all conditions must be true to pass any (S,G) pairs in
outgoing source-active messages.
To the specified MSDP peer, only those source-active messages that meet the match criteria in the route
map map-name argument are passed.
If all match criteria are true, a permit keyword from the route map passes routes through the filter. Use
the deny keyword to filter the routes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-261

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp sa-filter out

Examples

This example shows how to allow only (S,G) pairs that pass access list 100 to be forwarded in a
source-active message to the peer named router.cisco.com:
Router(config)# ip msdp peer router.cisco.com connect-source ethernet 0
Router(config)# ip msdp sa-filter out router.cisco.com list 100
access-list 100 permit ip 224.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

ip msdp sa-filter in

Configures an incoming filter list for source-active messages received from
the specified MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-262

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp sa-request

ip msdp sa-request
To configure the router to send source active request messages to the MSDP peer when a new joiner from
the group becomes active, use the ip msdp sa-request command. To prevent this action, use the no form
of this command.
ip msdp [vrf vrf-name] sa-request {peer-address | peer-name}
no ip msdp [vrf vrf-name] sa-request {peer-address | peer-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or name of the MSDP peer from which the local router
requests source-active messages when a new joiner for the group
becomes active.

Defaults

The router does not send source-active request messages to the MSDP peer.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

By default, the router does not send any source-active request messages to its MSDP peers when a new
member joins a group and wants to receive multicast traffic. The new member waits to receive any
source-active messages that eventually arrive.
Use this command if you want a new member of a group to learn the current, active multicast sources in
a connected PIM-SM domain that are sending to a group. The router sends source-active request
messages to the specified MSDP peer when a new member joins a group. The peer replies with the
information in its source-active cache. If the peer does not have a cache configured, this command does
not work.
You can also use the ip msdp cache-sa-state command to have the router cache messages.

Examples

This example shows how to configure the router to send source-active request messages to the MSDP
peer at 224.69.1.1:
Router(config)# ip msdp sa-request 224.69.1.1
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-263

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp sa-request

Related Commands

Command

Description

ip msdp cache-sa-state Creates a source-active state on the router.
ip msdp peer

Configures an MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-264

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip msdp shutdown

ip msdp shutdown
To administratively shut down a configured MSDP peer, use the ip msdp shutdown command. To bring
the peer back up, use the no form of this command.
ip msdp [vrf vrf-name] shutdown {peer-address | peer-name}
no ip msdp [vrf vrf-name] shutdown {peer-address | peer-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or name of the MSDP peer to shut down.

Defaults

No action is taken to shut down an MSDP peer.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to shut down the MSDP peer at the IP address 224.5.7.20:
Router(config)# ip msdp shutdown 224.5.7.20
Router(config)#

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-265

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip msdp ttl-threshold

ip msdp ttl-threshold
To limit which multicast data packets are sent in source-active messages to an MSDP peer, use the ip
msdp ttl-threshold command. To restore the default value, use the no form of this command.
ip msdp [vrf vrf-name] ttl-threshold {peer-address | peer-name} ttl-value
no ip msdp [vrf vrf-name] ttl-threshold {peer-address | peer-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

IP address or name of the MSDP peer to which the ttl-value argument
applies.

ttl-value

Time-to-live (TTL) value; valid values are from 0 to 255.

Defaults

ttl-value is 0.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command limits which multicast data packets are sent in data-encapsulated source-active messages.
Only multicast packets with an IP header TTL greater than or equal to the ttl-value argument are sent to
the MSDP peer that is specified by the IP address or name.
Use this command if you want to use TTL to limit your multicast data traffic. For example, you could
limit internal traffic to a TTL of 8. If you want other groups to go to external locations, you need to send
those packets with a TTL greater than 8.
The default value of the ttl-value argument is 0, which means that all multicast data packets are
forwarded to the peer until the TTL is exhausted.

Examples

This example shows how to configure a TTL threshold of eight hops:
Router(config)# ip msdp ttl-threshold 224.5.7.20 8
Router(config)#

Related Commands

Command

Description

ip msdp peer

Configures an MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-266

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast boundary

ip multicast boundary
To configure an administratively scoped boundary, use the ip multicast boundary command. To
remove the boundary, use the no form of this command.
ip multicast boundary access-list [filter-autorp]
no ip multicast boundary access-list [filter-autorp]

Syntax Description

access-list

Number or name that identifies an access list that controls the range of group
addresses affected by the boundary.

filter-autorp

(Optional) Filters auto RP messages denied by the boundary ACL.

Defaults

There is no boundary.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Use this command to configure an administratively scoped boundary on an interface to filter the
multicast group addresses in the range that is defined by the access-list argument. A standard access list
defines the range of addresses affected. When you configure this command, multicast data packets are
not allowed to flow across an interface from either direction. Restricting the multicast data packet flow
enables reuse of the same multicast group address in different administrative domains.

Extended access lists are not allowed with the filter-autorp keyword or the use of no keywords.
If you configure the filter-autorp keyword, the administratively scoped boundary also examines
Auto-RP discovery and announcement messages and removes any Auto-RP group range announcements
from the Auto-RP packets that are denied by the boundary ACL. An Auto-RP group range announcement
is permitted and passed by the boundary only if all addresses in the Auto-RP group range are permitted
by the boundary ACL. If any address is not permitted, the entire group range is filtered and removed
from the Auto-RP message before the Auto-RP message is forwarded.
Use the following guidelines when you enter the ip multicast boundary command:
•

Only standard access lists are permitted with the use of the filter-autorp keyword or no keyword.

•

All instances of the command apply to both control and data plane traffic.

•

Protocol information on the extended access list is parsed to allow reuse and filtering for IOS
consistency. An (S,G) operation will be filtered by an extended access list under all conditions stated
above for keywords if the access list filters (S,G) traffic for all protocols.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-267

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast boundary

Examples

This example shows how to set up a boundary for all administratively scoped addresses:
Router(config-if)# ip multicast boundary 1
Router(config-if)#

This example shows how to set up a boundary for an extended ACL:
Router(config-if)# ip multicast boundary 101
Router(config-if)#

This example shows how to filter auto RP messages denied by the boundary ACL.
Router(config-if)# ip multicast boundary acc_grp10 filter-autorp
Router(config-if)#

Related Commands

Command

Description

access-list (IP standard)

Defines a standard IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-268

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast cache-headers

ip multicast cache-headers
To allocate a circular buffer to store IP multicast packet headers that the router receives, use the
ip multicast cache-headers command. To remove the buffer, use the no form of this command.
ip multicast [vrf vrf-name] cache-headers [rtp]
no ip multicast [vrf vrf-name] cache-headers

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

rtp

(Optional) Caches RTP headers.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

You can store IP multicast packet headers in a cache and then display them to determine the following
information:
•

Who is sending IP multicast packets to which groups

•

Interpacket delay

•

Duplicate IP multicast packets (if any)

•

Multicast forwarding loops in your network (if any)

•

Size of the group

•

UDP port numbers

•

Packet length

This command allocates a circular buffer of approximately 32 KB. Do not configure this command if
you are low on memory.
Use the show ip mpacket command to display the buffer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-269

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast cache-headers

Examples

This example shows how to allocate a buffer to store IP multicast packet headers:
Router(config)# ip multicast cache-headers
Router(config)#

Related Commands

Command

Description

show ip mpacket

Displays the contents of the circular cache-header buffer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-270

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast helper-map

ip multicast helper-map
To allow IP multicast routing in a multicast-capable internetwork between two broadcast-only
internetworks, use the ip multicast helper-map command. To disable this function, use the no form of
this command.
ip multicast helper-map broadcast multicast-address access-list [ttl x]
no ip multicast helper-map broadcast multicast-address access-list

Syntax Description

broadcast

Specifies that the traffic is being converted from broadcast to multicast.
Use this keyword with the multicast-address argument.

multicast-address

IP multicast address to which the converted traffic is directed. Use this
argument with the broadcast keyword.

access-list

IP-extended access-list number or name that controls which broadcast
packets are translated, based on the UDP port number.

ttl x

(Optional) Translates packets with a TTL of 1 and resets the TTL; valid
values are from 1 to 50.

Defaults

No conversion between broadcast and multicast occurs.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When a multicast-capable internetwork is between two broadcast-only internetworks, you can convert
the broadcast traffic to multicast at the first-hop router, and convert it back to broadcast at the last-hop
router before delivering the packets to the broadcast clients. However, broadcast packets with the IP
source address of 0.0.0.0 (such as a DHCP request) are not translated to any multicast group.
If you send a directed broadcast to the subnet, the outgoing interface of the last-hop router can be
configured with an IP broadcast address of x.x.x.255, where x.x.x.0 is the subnet that you are trying to
reach; otherwise, the packet is converted to 255.255.255.255.
Broadcast packets with a TTL of 1 are not translated by the ip multicast helper-map command unless
you use the ttl keyword with the command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-271

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast helper-map

Examples

This example shows how to allow IP multicast routing in a multicast-capable internetwork between two
broadcast-only internetworks:
Router(config-if)# ip multicast helper-map broadcast 224.5.5.5 120 ttl 2
Router(config-if)#

Related Commands

Command

Description

ip directed-broadcast

Enables the translation of a directed broadcast to physical broadcasts.

ip forward-protocol
turbo-flood

Speeds up the flooding of UDP packets using the spanning-tree algorithm.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-272

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast mrinfo-filter

ip multicast mrinfo-filter
To filter multicast router information (mrinfo) request packets, use the ip multicast mrinfo-filter
command. To disable this configuration, use the no form of this command.
ip multicast mrinfo-filter access-list
no ip multicast mrinfo-filter access-list

Syntax Description

access-list

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Access list of the source IP address to be filtered.

Usage Guidelines

The ip multicast mrinfo-filter command filters the mrinfo request packets for all of the sources listed
in the specified access list.

Examples

This example shows how to specify that mrinfo request packets are filtered for all sources that are listed
in access-list number 4:
Router(config)# ip multicast mrinfo-filter 4
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-273

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast multipath

ip multicast multipath
To split the load of IP multicast traffic across multiple equal-cost paths, use the ip multicast multipath
command. To disable this configuration, use the no form of this command.
ip multicast [vrf vrf-name] multipath
no ip multicast [vrf vrf-name] multipath

Syntax Description

vrf vrf-name

Defaults

If multiple equal-cost paths exist, multicast traffic will not be split across these paths.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

Usage Guidelines

If you enter the ip multicast multipath command and multiple equal-cost paths exist in your network,
load splitting will occur across the equal-cost paths for multicast traffic from different sources to the
same multicast group, but not for traffic from the same source to different multicast groups. Because this
command changes the way a RPF neighbor is selected, you must split the load of IP multicast traffic
across equal-cost paths consistently on all routers in a redundant topology to avoid looping.

Examples

This example shows how to split the load of IP multicast traffic across multiple equal-cost paths:
Router(config)# ip multicast multipath
Router(config)#

Related Commands

Command

Description

show ip rpf

Displays the triggered RPF statistics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-274

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast netflow

ip multicast netflow
To enable multicast egress or ingress NetFlow accounting on an interface, use the ip multicast netflow
command. To disable multicast NetFlow accounting, use the no form of this command.
ip multicast netflow {egress | ingress}
no ip multicast netflow {egress | ingress}

Syntax Description

Defaults

egress

Specifies multicast egress NetFlow accounting.

ingress

Specifies multicast ingress NetFlow accounting.

The defaults are as follows:
•

Multicast egress NetFlow accounting is disabled.

•

Multicast ingress NetFlow accounting is enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The output of the show running-config command does not indicate when multicast ingress accounting
is enabled (but it does indicate when multicast ingress NetFlow accounting is disabled).
You must enable multicast egress NetFlow accounting on all interfaces for which you want to count
outgoing multicast stream.
To display the multicast entries, enter the show mls netflow ip command.

Examples

This example shows how to enable multicast ingress NetFlow accounting on the ingress Ethernet 1/0
interface:
Router# configure terminal
Router(config)# interface ethernet 1/0
Router(config-if)# ip multicast netflow ingress
Router(config-if)# end

Related Commands

Command

Description

ip multicast netflow
rpf-failure

Enables NetFlow accounting for multicast data that fails the RPF check.

show ip flow interfaces Displays NetFlow accounting configuration on interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-275

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast route-limit

ip multicast route-limit
To limit the number of multicast routes (mroutes) that can be added to a multicast routing table, use the
ip multicast route-limit command. To disable this configuration, use the no form of this command.
ip multicast [vrf vrf-name] route-limit limit [threshold]
no ip multicast [vrf vrf-name] route-limit limit [threshold]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

limit

Number of mroutes that can be added; valid values are from 1 to 2147483647.

threshold

(Optional) Number of mroutes that cause a warning message to occur; valid
values are from 1 to 2147483647.

Defaults

limit is 2147483647.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The ip multicast route-limit command limits the number of multicast routes that can be added to a
router and generates an error message when the limit is exceeded. If you set the threshold argument, a
threshold error message is generated when the threshold is exceeded, and the message continues to occur
until the number of mroutes reaches the limit set by the limit argument.
The mroute warning threshold must not exceed the mroute limit.

Examples

This example shows how to set the mroute limit at 200,000 and the threshold at 20,000 for a VRF
instance named cisco:
Router(config)# ip multicast vrf cisco route-limit 200000 20000
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-276

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast-routing

ip multicast-routing
To enable IP multicast routing, use the ip multicast-routing command. To disable IP multicast routing,
use the no form of this command.
ip multicast-routing [vrf vrf-name] [distributed]
no ip multicast-routing [vrf vrf-name]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

distributed

(Optional) Enables MDS.

Defaults

This command is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When IP multicast routing is disabled, no multicast packets are forwarded.

Examples

This example shows how to enable IP multicast routing:
Router(config)# ip multicast-routing
Router(config)#

This example shows how to enable IP multicast routing on a specific VRF:
Router(config)# ip multicast-routing vrf vrf1
Router(config)#

This example shows how to disable IP multicast routing:
Router(config)# no ip multicast-routing
Router(config)#

Related Commands

Command

Description

ip pim

Enables PIM on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-277

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast rpf backoff

ip multicast rpf backoff
To set the PIM-backoff interval, use the ip multicast rpf backoff command. To return to the default
settings, use the no form of this command.
ip multicast rpf backoff {{min max} | disable}
no ip multicast rpf backoff

Syntax Description

Defaults

min

Initial RPF-backoff delay in milliseconds; valid values are from 1 to
65535 milliseconds.

max

Maximum RPF-backoff delay in milliseconds; valid values are from 1 to
65535 milliseconds.

disable

Disables the triggered RPF check.

If you enable the triggered RPF check, the defaults are as follows:
•

min is 500 milliseconds.

•

max is 5000 milliseconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enable the triggered RPF check, PIM periodically polls the routing tables for changes (set
using the ip multicast rpf interval command). When you enable the triggered RPF check, PIM polls the
routing tables when a change in the routing tables occurs. The min argument sets the initial backoff time.
Once triggered, PIM waits for additional routing table changes. If the min period expires without further
routing table changes, PIM scans for routing changes. If additional routing changes occur during the
backoff period, PIM doubles the length of the backoff period. You can set the maximum interval for the
doubled backoff period with the max argument.
Use this command in the following situation:
•

You have frequent route changes in your device (for example, on a dial-in router).

•

You want to either reduce the maximum RPF-check interval for faster availability of IP multicast
on newly established routes, or you want to increase the RPF-check interval to reduce the CPU load
that is introduced by the RPF check.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-278

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip multicast rpf backoff

Examples

This example shows how to set the PIM-backoff interval in milliseconds:
Router(config)# ip multicast rpf backoff 100
Router(config)#

Related Commands

Command

Description

ip multicast rpf
interval

Sets the RPF consistency-check interval.

show ip rpf events

Displays the triggered RPF statistics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-279

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip multicast rpf interval

ip multicast rpf interval
To set the RPF consistency-check interval, use the ip multicast rpf interval command. To return to the
default settings, use the no form of this command.
ip multicast rpf interval interval
no ip multicast rpf interval

Syntax Description

interval

Defaults

10 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Interval in seconds between RPF checks; valid values are from 1 to
10 seconds.

Usage Guidelines

The ip multicast rfp interval command sets the interval PIM and polls the routing tables for changes.

Examples

This example shows how to set the RPF consistency-check interval in seconds:
Router(config)# ip multicast rpf interval 5
Router(config)#

Related Commands

Command

Description

ip multicast rpf
backoff

Sets the PIM-backoff interval.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-280

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim accept-register

ip pim accept-register
To configure a candidate rendezvous-point router to filter PIM register messages, use the ip pim
accept-register command. To disable this function, use the no form of this command.
ip pim [vrf vrf-name] accept-register {list access-list | route-map map-name}
no ip pim [vrf vrf-name] accept-register {list access-list | route-map map-name}

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

list access-list

Specifies the extended access-list number or name.

route-map map-name

Specifies the route-map name.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command to prevent unauthorized sources from registering with the rendezvous point. If an
unauthorized source sends a register message to the rendezvous point, the rendezvous point immediately
sends a register-stop message.

Examples

This example shows how to restrict the rendezvous point from allowing sources in the SSM range of
addresses to register with the rendezvous point. These statements need to be configured only on the
rendezvous point.
Router(config)# ip pim accept-register list no-ssm-range
Router(config)# ip access-list extended no-ssm-range
deny ip any 232.0.0.0 0.255.255.255
permit ip any any
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-281

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim accept-rp

ip pim accept-rp
To configure a router to accept join or prune messages that are destined for a specified rendezvous point
and for a specific list of groups, use the ip pim accept-rp command. To remove the check, use the no
form of this command.
ip pim [vrf vrf-name] accept-rp {rp-address | auto-rp} [access-list]
no ip pim [vrf vrf-name] accept-rp {rp-address | auto-rp} [access-list]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

rp-address

Address of the rendezvous point that is allowed to send join messages
to groups in the range specified by the group access list.

auto-rp

Specifies that join and register messages are accepted only for
rendezvous points that are in the Auto-RP cache.

access-list

(Optional) Access-list number or name that defines which groups are
subject to the check.

Defaults

Disabled—All join messages and prune messages are processed.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command causes the router to accept only (*, G) join messages that are destined for the specified
rendezvous-point address. Additionally, the group address must be in the range specified by the access
list.
When the rp-address argument is one of the addresses of the system, the system is the rendezvous point
only for the specified group range specified by the access list. When the group address is not in the group
range, the rendezvous point does not accept join or register messages and responds immediately to
register messages with register-stop messages.

Examples

This example shows how to configure the router to accept join or prune messages that are destined for
the rendezvous point at address 172.17.1.1 for the multicast group 224.2.2.2:
Router(config)# ip pim accept-rp 172.17.1.1 3
access-list 3 permit 224.2.2.2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-282

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim accept-rp

Related Commands

Command

Description

access-list (IP
standard)

Defines a standard IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-283

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim bidir-enable

ip pim bidir-enable
To enable bidir-PIM, use the ip pim bidir-enable command. To disable bidir-PIM, use the no form of
this command.
ip pim [vrf vrf-name] bidir-enable
no ip pim [vrf vrf-name] bidir-enable

Syntax Description

vrf vrf-name

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

When bidir-PIM is disabled, the switch operates similarly to a router without bidir-PIM support. The
following conditions apply:
•

PIM hello messages that are sent by the router do not contain the bidirectional mode option.

•

The router does not send designated forwarder election messages and ignores designated forwarder
election messages that are received.

•

The ip pim rp-address, ip pim send-rp-announce, and ip pim rp-candidate commands are treated
as follows:
– If these commands are configured when bidir-PIM is disabled, bidirectional mode is not a

configuration option.
– If these commands are configured with the bidirectional mode option when bidir-PIM is enabled

and then bidir-PIM is disabled, these commands are removed from the CLI. You must enter
these commands again with the bidirectional-mode option when you reenable bidir-PIM.
•

Examples

The df keyword for the show ip pim interface command is not supported.

This example shows how to enable bidir-PIM:
Router(config)# ip pim bidir-enable
Router(config)#

This example shows how to disable bidir-PIM:
Router(config)# no ip pim bidir-enable
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-284

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim bidir-enable

Related Commands

Command

Description

ip pim rp-address

Configures the address of a PIM rendezvous point for a particular group.

ip pim rp-candidate

Configures the router to advertise itself as a PIM Version 2
rendezvous-point candidate to the BSR.

ip pim
send-rp-announce

Uses Auto-RP to configure groups for which the router acts as a rendezvous
point.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-285

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim bsr-candidate

ip pim bsr-candidate
To configure the router to announce its candidacy as a BSR, use the ip pim bsr-candidate command.
To remove this router as a candidate bootstrap router, use the no form of this command.
ip pim [vrf vrf-name] bsr-candidate interface-type interface-number [hash-mask-length] [priority]
no ip pim [vrf vrf-name] bsr-candidate

Syntax Description

Defaults

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

interface-type
interface-number

Interface type and number on this router from which the BSR address is
derived to make it a candidate.

hash-mask-length

(Optional) Length of a mask (32 bits maximum) that is to be ANDed with
the group address before the hash function is called.

priority

(Optional) BSR priority; valid values are from 0 to 255.

The default settings are as follows:
•

Disabled.

•

If enabled, the priority is 0.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command causes the router to send bootstrap messages to all its PIM neighbors with the address of
the designated interface as the BSR address. Each neighbor compares the BSR address with the address
it had from previous bootstrap messages (not necessarily received on the same interface). If the current
address is the same or higher address, it caches the current address and forwards the bootstrap message.
Otherwise, the router drops the bootstrap message.
This router continues to be the BSR until it receives a bootstrap message from another candidate BSR
saying that it has a higher priority (or if the same priority, a higher IP address).
Use this command only in backbone routers that have good connectivity to all parts of the PIM domain.
A stub router that relies on an on-demand dialup link to connect to the rest of the PIM domain is not a
good BSR candidate.
You must enable the interface-type with PIM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-286

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim bsr-candidate

When setting the hash-mask-length argument, all groups with the same seed hash correspond to the same
rendezvous point. For example, if this value is 24, only the first 24 bits of the group addresses are
applicable; using this setting allows you to get one rendezvous point for multiple groups.
When setting the priority, the BSR with the larger priority is preferred. If the priority values are the
same, the router with the larger IP address is the BSR.

Examples

This example shows how to configure the IP address of the router on Ethernet interface 0 to be a
candidate BSR with a priority of 10:
Router(config)# ip pim bsr-candidate ethernet 0 10
Router(config)#

Related Commands

Command

Description

ip pim bsr border

Prevents BSR messages from being sent or received through an interface.

ip pim rp-candidate

Configures the router to advertise itself as a PIM Version 2
rendezvous-point candidate to the BSR.

ip pim
send-rp-discovery

Configures the router as a rendezvous-point mapping agent.

show ip pim bsr

Displays the BSR information.

show ip pim rp

Displays active rendezvous points that are cached with associated multicast
routing entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-287

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim register-rate-limit

ip pim register-rate-limit
To set a limit on the maximum number of PIM-SM register messages that are sent per second for each
(S,G) routing entry, use the ip pim register-rate-limit command. To disable this limit, use the no form
of this command.
ip pim [vrf vrf-name] register-rate-limit rate
no ip pim [vrf vrf-name] register-rate-limit

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

rate

Maximum number of register messages that are sent per second by the
router; valid values are from 1 to 65535 messages per second.

Defaults

No limit is defined.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command to limit the number of register messages that the designated router allows for each
(S,G) entry. Enabling this command limits the load on the designated router and rendezvous point but
drops those register messages that exceed the set limit. Receivers may experience data packet loss within
the first second in which register messages are sent from bursty sources.
If you enter the ip pim dense-mode proxy-register command, then you must enter the ip pim
register-rate-limit command because of the potentially large number of sources from the dense-mode
area that may send data into the sparse-mode region (and need registering in the border router).
This command applies only to sparse mode (S,G) multicast routing entries.

Examples

This example shows how to set a limit on PIM-SM register messages with a maximum rate of two
register messages per second:
Router(config)# ip pim register-rate-limit 2
Router(config)#

Related Commands

Command

Description

ip pim

Enables PIM on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-288

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim register-source

ip pim register-source
To configure the IP source address of a register message to an interface address other than the outgoing
interface address of the designated router leading toward the rendezvous point, use the ip pim
register-source command. To disable this configuration, use the no form of this command.
ip pim [vrf vrf-name] register-source interface-type interface-number
no ip pim [vrf vrf-name] register-source

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

interface-type
interface-number

Interface type and interface number that identify the IP source address of a
register message.

Defaults

The IP address of the outgoing interface of the designated router leading toward the rendezvous point is
used as the IP source address of a register message.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is required only when the IP source address of a register message is not a uniquely routed
address to which the rendezvous point can send packets. This situation may occur if the source address
is filtered so that packets sent to it are not forwarded or if the source address is not unique to the network.
In these cases, the replies sent from the rendezvous point to the source address fail to reach the
designated router and result in PIM-SM protocol failures.
If you do not configure an IP source address or if the configured source address is not in service, the IP
address of the outgoing interface of the designated router leading to the rendezvous point is used as the
IP source address of the register message. We recommend that you use a loopback interface with an IP
address that is uniquely routed throughout the PIM-SM domain.

Examples

This example shows how to configure the IP source address of the register message to the loopback 3
interface of a designated router:
Router(config)# ip pim register-source loopback 3
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-289

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim rp-announce-filter

ip pim rp-announce-filter
To filter incoming Auto-RP announcement messages coming from the rendezvous point, use the ip pim
rp-announce-filter command. To remove the filter, use the no form of this command.
ip pim [vrf vrf-name] rp-announce-filter rp-list access-list group-list access-list
no ip pim [vrf vrf-name] rp-announce-filter rp-list access-list group-list access-list

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

rp-list access-list

Specifies the number or name of a standard access list of
rendezvous-point addresses that are allowable for the group ranges
supplied in the group-list access-list combination.

group-list access-list

Specifies the number or name of a standard access list that describes
the multicast groups that the RPs serve.

Defaults

All rendezvous-point announcements are accepted.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Configure this command on the PIM rendezvous-point mapping agent. We recommend that if you use
more than one rendezvous-point mapping agent, make the filters among them consistent so that there are
no conflicts in the mapping state when the announcing agent is removed.

Examples

This example shows how to configure the router to accept rendezvous-point announcements from
rendezvous points in access list 1 for group ranges that are described in access list 2:
Router(config)# ip pim rp-announce-filter rp-list 1 group-list 2
Router(config)#

Related Commands

Command

Description

access-list (IP
standard)

Defines a standard IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-290

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim rp-candidate

ip pim rp-candidate
To configure the router to advertise itself as a PIM Version 2 rendezvous-point candidate to the BSR,
use the ip pim rp-candidate command. To remove this router as a rendezvous-point candidate, use the
no form of this command.
ip pim [vrf vrf-name] rp-candidate interface-type interface-number [group-list access-list]
[bidir]
no ip pim [vrf vrf-name] rp-candidate

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

interface-type
interface-number

IP address associated with this interface type and number is advertised as a
candidate rendezvous-point address.

group-list access-list

(Optional) Specifies the standard IP access-list number or name that defines
the group prefixes that are advertised with the rendezvous-point address.

bidir

(Optional) Indicates that the multicast groups that are specified by the
access-list argument operate in bidirectional mode.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command causes the router to send a PIM Version 2 message advertising itself as a
rendezvous-point candidate to the BSR. The addresses allowed by the access list, together with the router
identified by the type and number, constitute the rendezvous point and its range of addresses for which
it is responsible.
Use this command only in backbone routers that have good connectivity to all parts of the PIM domain.
A stub router that relies on an on-demand dialup link to connect to the rest of the PIM domain is not a
good rendezvous-point candidate.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-291

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim rp-candidate

Use this command with the bidir keyword when you want bidirectional forwarding and you are using
the PIM Version 2 BSR mechanism to distribute group-to-rendezvous point mappings. Other options are
as follows:
•

If you are using Auto-RP to distribute group-to-rendezvous point mappings, use the bidir keyword
with the ip pim send-rp-announce command.

•

If you are not distributing group-to-rendezvous point mappings using either Auto-RP or the PIM
Version 2 BSR mechanism, use the bidir keyword with the ip pim rp-address command.

The access-list name cannot contain a space or quotation mark and must begin with an alphabetic
character to avoid confusion with numbered access lists.
If you enter this command without the bidir keyword, the groups that are specified operate in PIM sparse
mode.

Examples

This example shows how to configure the router to advertise itself as a rendezvous-point candidate to
the BSR in its PIM domain. Standard access-list number 4 specifies the group prefix that is associated
with the rendezvous point that has the address identified by Ethernet interface 2. That rendezvous point
is responsible for the groups with the prefix 239.
Router(config)# ip pim rp-candidate 192.168.37.33 ethernet 2 group-list 4
access-list 4 permit 239.0.0.0 0.255.255.255
Router(config)#

Related Commands

Command

Description

ip pim bsr-candidate

Configures the router to announce its candidacy as a BSR.

ip pim
rp-announce-filter

Filters incoming Auto-RP announcement messages coming from the
rendezvous point.

ip pim
send-rp-announce

Uses Auto-RP to configure groups for which the router acts as a rendezvous
point.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-292

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim send-rp-announce

ip pim send-rp-announce
To use Auto-RP to configure groups for which the router will act as a rendezvous point, use the ip pim
send-rp-announce command. To deconfigure this router as a rendezvous point, use the no form of this
command.
ip pim [vrf vrf-name] send-rp-announce interface-type interface-number scope ttl-value
[group-list access-list] [interval seconds] [bidir]
no ip pim [vrf vrf-name] send-rp-announce

Syntax Description

Defaults

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

interface-type
interface-number

Interface type and number that is used to define the rendezvous-point
address.

scope ttl-value

Time-to-live (TTL) value that limits the number of Auto-RP
announcements; valid values are from 1 to 255.

group-list access-list

(Optional) Specifies the standard IP access-list number or name that
defines the group prefixes that are advertised in association with the
rendezvous-point address.

interval seconds

(Optional) Specifies the interval between rendezvous-point
announcements in seconds; valid values are from 1 to 16383 seconds.

bidir

(Optional) Indicates that the multicast groups that are specified by the
access-list argument operate in bidirectional mode.

The default settings are as follows:
•

Auto-RP is disabled.

•

If enabled, the seconds is 60 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command in the router that you want as a rendezvous point. When you are using Auto-RP to
distribute group-to-rendezvous point mappings, this command causes the router to send an Auto-RP
announcement message to the well-known group CISCO-RP-ANNOUNCE (224.0.1.39). This message
announces the router as a rendezvous-point candidate for the groups in the range that are described by
the access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-293

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim send-rp-announce

Use this command with the bidir keyword when you want bidirectional forwarding and you are using
Auto-RP to distribute group-to-rendezvous point mappings. Other options are as follows:
•

If you are using the PIM Version 2 bootstrap router (PIMv2 BSR) mechanism to distribute
group-to-rendezvous point mappings, use the bidir keyword with the ip pim rp-candidate
command.

•

If you are not distributing group-to-rendezvous point mappings using either Auto-RP or the PIMv2
BSR mechanism, use the bidir keyword with the ip pim rp-address command.

If you enter this command without the bidir keyword, the specified groups operate in PIM-SM.
The access-list name cannot contain a space or quotation mark and must begin with an alphabetic
character to avoid confusion with numbered access lists.
The total holdtime of the rendezvous-point announcements is automatically set to three times the value
of the interval.

Examples

This example shows how to send rendezvous-point announcements out all PIM-enabled interfaces for a
maximum of 31 hops. The IP address by which the router wants to be identified as a rendezvous point
is the IP address that is associated with Ethernet interface 0. Access list 5 describes the groups for which
this router serves as a rendezvous point.
Router(config)# ip pim send-rp-announce ethernet0 scope 31 group-list 5
access-list 5 permit 224.0.0.0 15.255.255.255

Related Commands

Command

Description

access-list (IP
standard)

Defines a standard IP access list.

ip pim rp-address

Configures the address of a PIM rendezvous point for a particular group.

ip pim rp-candidate

Configures the router to advertise itself as a PIM Version 2
rendezvous-point candidate to the BSR.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-294

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim send-rp-discovery

ip pim send-rp-discovery
To configure the router as a rendezvous-point mapping agent, use the ip pim send-rp-discovery
command. To restore the default value, use the no form of this command.
ip pim [vrf vrf-name] send-rp-discovery [interface-type interface-number] scope ttl-value
no ip pim [vrf vrf-name] send-rp-discovery

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing and
forwarding (VRF) instance.

interface-type
interface-number

(Optional) Interface type and number that is used to define the rendezvous-point
mapping agent address.

scope ttl-value

Specifies the time-to-live (TTL) value in the IP header that keeps the discovery
messages within this number of hops; valid values are from 1 to 255.

Defaults

The router is not a rendezvous-point mapping agent.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Configure this command on the router that is designated as a rendezvous-point mapping agent. Specify
a TTL large enough to cover your PIM domain.
When Auto-RP is used, the following occurs:

Examples

1.

The rendezvous-point mapping agent listens on well-known group address
CISCO-RP-ANNOUNCE (224.0.1.39), to which rendezvous-point candidates send.

2.

The rendezvous-point mapping agent sends rendezvous point-to-group mappings in an Auto-RP
rendezvous point discovery message to the well-known group CISCO-RP-DISCOVERY
(224.0.1.40). The TTL value limits how many hops that the message can take.

3.

PIM-designated routers listen to this group and use the rendezvous points that they learn about from
the discovery message.

This example shows how to limit Auto-RP rendezvous-point discovery messages to 20 hops:
Router(config)# ip pim send-rp-discovery scope 20
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-295

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim snooping (global configuration mode)

ip pim snooping (global configuration mode)
To enable PIM snooping globally, use the ip pim snooping command. To disable PIM snooping
globally, use the no form of this command.
ip pim snooping
no ip pim snooping

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

PIM snooping is not supported on groups that are connected to the reserved MAC address range (for
example, 0100.5e00.00xx).
When you disable PIM snooping globally, PIM snooping is disabled on all VLANs.

Examples

This example shows how to enable PIM snooping globally:
Router(config)# ip pim snooping
Router(config)#

This example shows how to disable PIM snooping globally:
Router(config)# no ip pim snooping
Router(config)#

Related Commands

Command

Description

show ip pim snooping

Displays the information about IP PIM snooping.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-296

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim snooping (interface configuration mode)

ip pim snooping (interface configuration mode)
To enable PIM snooping on an interface, use the ip pim snooping command. To disable PIM snooping
on an interface, use the no form of this command.
ip pim snooping
no ip pim snooping

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

PIM snooping is not supported on groups that are connected to the reserved MAC address range (for
example, 0100.5e00.00xx).
You must enable PIM snooping globally before enabling PIM snooping on an interface. When you
disable PIM snooping globally, PIM snooping is disabled on all VLANs.
You can enable PIM snooping on VLAN interfaces only.

Examples

This example shows how to enable PIM snooping on a VLAN interface:
Router(config)# interface vlan 101
Router(config-if)# ip pim snooping
Router(config-f)#

This example shows how to disable PIM snooping on a VLAN interface:
Router(config-if)# no ip pim snooping
Router(config-f)#

Related Commands

Command

Description

show ip pim snooping

Displays information about IP PIM snooping.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-297

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim snooping dr-flood

ip pim snooping dr-flood
To enable flooding of the packets to the designated router, use the ip pim snooping dr-flood command.
To disable the flooding of the packets to the designated router, use the no form of this command.
ip pim snooping dr-flood
no ip pim snooping dr-flood

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

PIM snooping is not supported on groups that are connected to the reserved MAC address range (for
example, 0100.5e00.00xx).
Enter the no ip pim snooping dr-flood command only on switches that have no designated routers
attached.
The designated router is programmed automatically in the (S,G) O-list.

Examples

This example shows how to enable flooding of the packets to the designated router:
Router(config)# ip pim snooping dr-flood
Router(config)#

This example shows how to disable flooding of the packets to the designated router:
Router(config)# no ip pim snooping dr-flood
Router(config)#

Related Commands

Command

Description

show ip pim snooping

Displays information about IP PIM snooping.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-298

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim spt-threshold

ip pim spt-threshold
To configure when a PIM leaf router should join the shortest path source tree for the specified group,
use the ip pim spt-threshold command. To restore the default value, use the no form of this command.
ip pim [vrf vrf-name] spt-threshold {kbps | infinity} [group-list access-list]
no ip pim [vrf vrf-name] spt-threshold

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

kbps

Traffic rate; valid values are from 0 to 4294967 kbps.

infinity

Causes all sources for the specified group to use the shared tree.

group-list access-list

(Optional) Specifies the groups to which the threshold applies.

Defaults

When this command is not used, the PIM leaf router joins the shortest path tree immediately after the
first packet arrives from a new source.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If a source sends at a rate greater than or equal to the traffic rate (the kbps value), a PIM join message is
triggered to construct a source tree.
The group-list access-list must be an IP standard access-list number or name. If the value is 0 or is
omitted, the threshold applies to all groups.
If you specify the infinity keyword, all sources for the specified group use the shared tree. Specifying a
group list access list indicates the groups to which the threshold applies.
If the traffic rate from the source drops below the threshold traffic rate, the leaf router will, after some
amount of time, switch back to the shared tree and send a prune message to the source.

Examples

This example shows how to set a threshold of 4 kbps. If the traffic rate goes above this threshold, the
traffic to a group from a source causes the router to switch to the shortest path tree to that source:
Router(config)# ip pim spt-threshold 4
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-299

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip pim ssm

ip pim ssm
To define the SSM range of IP multicast addresses, use the ip pim ssm command. To disable the SSM
range, use the no form of this command.
ip pim [vrf vrf-name] ssm {default | range access-list}
no ip pim [vrf vrf-name] ssm

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

default

Defines the SSM range access list as 232/8.

range access-list

Specifies the standard IP access-list number or name defining the SSM
range.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When an SSM range of IP multicast addresses is defined by the ip pim ssm command, no MSDP
source-active messages are accepted or originated in the SSM range.

Examples

This example shows how to configure the SSM service for the IP address range that is defined by access
list 4:
access-list 4 permit 224.2.151.141
Router(config)# ip pim ssm range 4

Related Commands

Command

Description

ip igmp v3lite

Enables acceptance and processing of IGMP v3lite membership reports on
an interface.

ip urd

Enables interception of TCP packets sent to the reserved URD port 465 on
an interface and processing of URD channel subscription reports.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-300

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip pim state-refresh disable

ip pim state-refresh disable
To disable the processing and forwarding of PIM dense-mode refresh-control messages on a PIM router,
use the ip pim state-refresh disable command. To reenable the processing and forwarding of PIM
dense-mode refresh-control messages, use the no form of this command.
ip pim [vrf vrf-name] state-refresh disable
no ip pim [vrf vrf-name] state-refresh disable

Syntax Description

vrf vrf-name

Defaults

The processing and forwarding of PIM dense-mode refresh-control messages is enabled on PIM routers
that are running a Cisco IOS software release that supports the PIM dense-mode refresh-control feature.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

Usage Guidelines

Configuring this command removes PIM dense-mode refresh-control information from PIM hello
messages.

Examples

This example shows how to disable the periodic forwarding of the PIM dense-mode refresh-control
message down a source-based IP multicast distribution tree:
Router(config)# ip pim state-refresh disable
Router(config)#

Related Commands

Command

Description

ip pim state-refresh
origination-interval

Configures the origination of and the interval for PIM dense-mode state
refresh-control messages on a PIM router.

show ip pim interface

Displays information about interfaces configured for PIM.

show ip pim neighbor

Displays the list that the PIM neighbors discovered.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-301

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip rgmp

ip rgmp
To enable RGMP on an interface, use the ip rgmp command. To disable RGMP, use the no form of this
command.
ip rgmp
no ip rgmp

Syntax Description

This command has no arguments or keywords.

Defaults

The defaults are as follows:
•

Enabled on Layer 2 interfaces (not configurable)

•

Disabled on Layer 3 interfaces

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

These restrictions apply to RGMP on the PISA:
•

You can enable RGMP on interfaces that are configured to support multicast routing.

•

You must enable IGMP snooping on the Catalyst 6500 series switch.

•

You must enable PIM on the Catalyst 6500 series switch.

•

RGMP supports PIM sparse mode only. RGMP does not support PIM dense mode. RGMP explicitly
supports the two AutoRP groups in dense mode by not restricting traffic to those groups but by
flooding it to all router ports. For this reason, you should configure PIM sparse-dense mode. If you
configure groups other than the AutoRP groups for dense mode, their traffic will not be correctly
forwarded through router ports that have been enabled for RGMP.

•

To effectively constrain multicast traffic with RGMP, connect RGMP-enabled routers to separate
ports on RGMP-enabled Catalyst 6500 series switches.

•

RGMP constrains only the traffic that exits through ports on which it detects an RGMP-enabled
router. If a non-RGMP enabled router is detected on a port, that port receives all multicast traffic.

•

RGMP does not support directly connected sources in the network. A directly connected source
sends traffic into the network without signaling this information through RGMP or PIM. This traffic
is not received by an RGMP-enabled router unless the router already requested receipt of that group
through RGMP. This restriction applies to hosts and to functions in routers that source multicast
traffic, such as the ping and mtrace commands, and multicast applications that source multicast
traffic such as UDPTN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-302

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip rgmp

Examples

•

RGMP supports directly connected receivers in the network. Traffic to these receivers is restricted
by IGMP snooping, or if the receiver is a router itself, by PIM and RGMP. CGMP is not supported
in networks where RGMP is enabled on routers.

•

Enabling RGMP and CGMP on a router interface is mutually exclusive. If RGMP is enabled on an
interface, CGMP is silently disabled or vice versa.

This example shows how to enable RGMP:
Router(config-if)# ip rgmp
Router(config-if)#

This example shows how to disable RGMP:
Router(config-if)# no ip rgmp
Router(config-if)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-303

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip route-cache flow

ip route-cache flow
To enable NetFlow switching for IP routing, use the ip route-cache flow command. To disable NetFlow
switching, use the no form of this command.
ip route-cache flow
no ip route-cache flow

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

NetFlow switching captures a set of traffic statistics as part of its switching function. These traffic
statistics include user, protocol, port, and type of service information that can be used for network
analysis and planning, accounting, and billing. To export NetFlow data, use the ip flow-export
destination or the ip flow-export source command in the global configuration mode.
NetFlow switching is supported on IP and IP-encapsulated traffic over all interface types and
encapsulations except for ISL/VLAN, ATM, Frame Relay interfaces when more than one input access
control list is used on the interface, and ATM LANE.
For additional information on NetFlow switching, refer to the Catalyst Supervisor Engine 32 PISA Cisco
IOS Software Configuration Guide—Release 12.2ZY.

Note

Examples

NetFlow does consume additional memory and CPU resources compared to other switching modes; we
recommend that you understand the resources that are required on your router before you enable
NetFlow.

This example shows how to enable NetFlow switching on the interface:
Router(config-if)# ip route-cache flow
Router(config-if)#

This example shows how to return the interface to its defaults (fast switching enabled; autonomous
switching disabled):
Router(config-if)# no ip route-cache flow
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-304

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip route-cache flow

Related Commands

Command

Description

ip flow-export
destination

Exports the NetFlow cache entries to a specific destination.

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-305

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip sticky-arp (global configuration)

ip sticky-arp (global configuration)
To enable sticky ARP, use the ip sticky-arp command. To disable sticky ARP, use the no form of this
command.
ip sticky-arp
no ip sticky-arp

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter the ip sticky-arp (interface configuration) command to disable sticky ARP on a specific
interface.
ARP entries that are learned on Layer 3 interfaces are sticky ARP entries. We recommend that you
display and verify ARP entries on the Layer 3 interface using the show arp command.
For security reasons, sticky ARP entries on the Layer 3 interface do not age out. Connecting new
equipment with the same IP address generates a message and the ARP entry is not created.
Because the ARP entries on the Layer 3 interface do not age out, you must manually remove ARP entries
on the Layer 3 interface if a MAC address changes.
Unlike static entries, sticky-ARP entries are not stored and restored when you enter the reboot and
restart commands.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-306

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip sticky-arp (global configuration)

Examples

This example shows how to enable sticky ARP:
Router(config) ip sticky-arp
Router(config)

This example shows how to disable sticky ARP:
Router(config) no ip sticky-arp
Router(config)

Related Commands

Command

Description

arp

Enables ARP entries for static routing over the SMDS network.

ip sticky-arp
(interface
configuration)

Enables sticky ARP on an interface.

show arp

Displays the ARP table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-307

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip sticky-arp (interface configuration)

ip sticky-arp (interface configuration)
To enable sticky ARP on an interface, use the ip sticky-arp command. To remove the command, use the
no form of this command.
ip sticky-arp [ignore]
no ip sticky-arp [ignore]

Syntax Description

ignore

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Overwrites the ip sticky-arp (global configuration) command.

You can enter this command on any Layer 3 interface.
You can enter the ip sticky-arp ignore command to overwrite the PVLAN sticky-ARP global
configuration on a specific interface.

Examples

This example shows how to enable sticky ARP on an interface:
Router(config-if) ip sticky-arp
Router(config-if)

This example shows how to remove the previously configured command on an interface:
Router(config-if) no ip sticky-arp
Router(config-if)

This example shows how to disable sticky ARP on an interface:
Router(config-if) ip sticky-arp ignore
Router(config-if)

Related Commands

Command

Description

arp

Enables ARP entries for static routing over the SMDS network.

ip sticky-arp (global
configuration)

Enables sticky ARP.

show arp

Displays the ARP table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-308

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip unnumbered

ip unnumbered
To enable IP processing on a serial interface without assigning an explicit IP address to the interface,
use the ip unnumbered command. To disable IP processing on the interface, use the no form of this
command.
ip unnumbered interface-type number
no ip unnumbered interface-type number

Syntax Description

interface-type number

Defaults

Disabled

Command Modes

Interface configuration or Ethernet VLAN subinterface

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Type and number of another interface on which the router has an assigned
IP address; the interface cannot be another unnumbered interface.

The interface that you specify by the interface-type number arguments must be enabled (listed as “up”
in the show interfaces command display).
The unnumbered interfaces and subinterfaces support peer IP address allocation through DHCP and have
DHCP option 82 support.
The following restrictions apply when using IP unnumbering:

Examples

•

You cannot enable IP unnumbering for a range of interfaces or subinterfaces that are configured
through an interface or a subinterface range configuration.

•

You cannot use the ping EXEC command to determine whether the interface is up, because the
interface has no address. You can use SNMP to monitor the interface status remotely.

•

You cannot boot a runnable image over an unnumbered serial interface.

•

You cannot support IP security options on an unnumbered interface.

This example shows how to enable the IP unnumbered feature in the subinterface mode for Ethernet
VLAN subinterfaces:
Router (config)# interface fastethernet1/0.1
Router (config-subif)# encapsulation dot1q 10
Router (config-subif)# ip unnumbered ethernet 3/0

This example shows how to disable the IP unnumbered feature for Ethernet physical interfaces:
Router (config)# interface fastethernet 1
Router (config-if)# no ip unnumbered loopback 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-309

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip unnumbered

Router (config-if)#

Related Commands

Command

Description

show ipv6 mld
snooping
explicit-tracking vlan

Displays MLDv2 snooping information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-310

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ipv6 mfib-cef

ipv6 mfib-cef
To enable CEF-based (interrupt level) IPv6 multicast forwarding for outgoing packets on a specific
interface, use the ipv6 mfib-cef command. To disable CEF-based IPv6 multicast forwarding, use the no
form of this command.
ipv6 mfib-cef
no ipv6 mfib-cef

Syntax Description

This command has no keywords or arguments.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

CEF-based (interrupt level) IPv6 multicast forwarding is enabled by default when you enable CEF-based
IPv6 multicast routing.
Use the show ipv6 mfib interface command to display the multicast forwarding interface status.

Examples

This example shows how to enable CEF-based IPv6 multicast forwarding:
Router(config-if) ipv6 mfib-cef
Router(config-if)

This example shows how to disable CEF-based IPv6 multicast forwarding:
Router(config-if) no ipv6 mfib-cef
Router(config-if)

Related Commands

Command

Description

show ipv6 mfib
interface

Displays information about IPv6 multicast-enabled interfaces and their
forwarding status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-311

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ipv6 mfib hardware-switching

ipv6 mfib hardware-switching
To configure hardware switching for IPv6 multicast packets on a global basis, use the ipv6 mfib
hardware-switching command. To return to the default settings, use the no form of this command.
ipv6 mfib hardware-switching [connected | {replication-mode ingress}]
no ipv6 mfib hardware-switching [connected | {replication-mode ingress}]

Syntax Description

Defaults

connected

(Optional) Allows you to download the interface and mask entry.

replication-mode
ingress

(Optional) Sets the hardware replication mode to ingress.

The defaults are as follows:
•

connected—Enabled; installs subnet entries in the ACL-TCAM.

•

replication-mode—Automatically detected; but can be forced to ingress.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can use the ipv6 mfib hardware-switching command for PIM SSM and PIM Bidir to prevent
installation of the subnet entries on a global basis.

Examples

This example shows how to prevent the installation of the subnet entries on a global basis:
Router(config) ipv6 mfib hardware-switching
Router(config)

This example shows how to set the hardware replication mode to ingress:
Router(config) ipv6 mfib hardware-switching replication-mode
Router(config)

Related Commands

Command

Description

show platform
software
ipv6-multicast

Displays information about the platform software IPv6 multicast.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-312

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ipv6 mld snooping

ipv6 mld snooping
To enable the MLDv2 snooping globally, use the ipv6 mld snooping command. To disable the MLDv2
snooping globally, use the no form of this command.
ipv6 mld snooping
no ipv6 mld snooping

Syntax Description

This command has no keywords or arguments.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To use MLDv2 snooping, configure a Layer 3 interface in the subnet for IPv6 multicast routing or enable
the MLDv2 snooping querier in the subnet.

Examples

This example shows how to enable MLDv2 snooping globally:
Router(config)# ipv6 mld snooping
Router(config)#

Related Commands

Command

Description

show ipv6 mld
snooping

Displays MLDv2 snooping information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-313

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ipv6 mld snooping explicit-tracking

ipv6 mld snooping explicit-tracking
To enable explicit host tracking, use the ipv6 mld snooping explicit-tracking command. To disable the
explicit host tracking, use the no form of this command.
ipv6 mld snooping explicit-tracking
no ipv6 mld snooping explicit-tracking

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Explicit host tracking is supported only with MLDv2 hosts.
When you enable explicit host tracking and the Catalyst 6500 series switch is working in
proxy-reporting mode, the router may not be able to track all the hosts that are behind a VLAN interface.
In proxy-reporting mode, the Catalyst 6500 series switch forwards only the first report for a channel to
the router and suppresses all other reports for the same channel.
With MLDv2 proxy reporting, the Catalyst 6500 series switch does proxy reporting for unsolicited
reports and reports that are received in the general query interval.
Proxy reporting is turned on by default. When you disable proxy reporting, the Catalyst 6500 series
switch works in transparent mode and updates the MLDv2 snooping database as it receives reports and
forwards this information to the upstream router. The router can then explicitly track all reporting hosts.
Disabling explicit tracking disables fast-leave processing and proxy reporting.
MLDv2 supports explicit host tracking of membership information on any port. The explicit
host-tracking database is used for fast-leave processing for MLDv2 hosts, proxy reporting, and statistics
collection. When you enable explicit host tracking on a VLAN, the MLDv2 snooping software processes
the MLDv2 report that it receives from a host and builds an explicit host-tracking database that contains
the following information:
•

The port that is connected to the host.

•

The channels that are reported by the host.

•

The filter mode for each group that are reported by the host.

•

The list of sources for each group that are reported by the hosts.

•

The router filter mode of each group.

•

The list of hosts for each group that request the source.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-314

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ipv6 mld snooping explicit-tracking

Examples

This example shows how to enable explicit host tracking:
Router(config-if)# ipv6 mld snooping explicit-tracking
Router(config-if)#

Related Commands

Command

Description

ipv6 mld snooping
limit

Configures the MLDv2 limits.

show ipv6 mld
snooping
explicit-tracking

Displays MLDv2 snooping information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-315

Chapter 2
ipv6 mld snooping last-member-query-interval

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ipv6 mld snooping last-member-query-interval
To configure the last member query interval for MLDv2 snooping, use the ipv6 mld snooping
last-member-query-interval command. To return to the default settings, use the no form of this
command.
ipv6 mld snooping last-member-query-interval interval
no ipv6 mld snooping last-member-query-interval

Syntax Description

interval

Defaults

1000 milliseconds (1 second); see the “Usage Guidelines” section for additional information.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interval for the last member query; valid values are from 100 to
900 milliseconds in multiples of 100 milliseconds.

When a multicast host leaves a group, the host sends an MLDv2 leave. To check if this host is the last
to leave the group, an MLDv2 query is sent out when the leave is seen and a timer is started. If no reports
are received before the timer expires, the group record is deleted.
The interval is the actual time that the Catalyst 6500 series switch waits for a response for the
group-specific query.
If you enter an interval that is not a multiple of 100, the interval is rounded to the next lowest multiple
of 100. For example, if you enter 999, the interval is rounded down to 900 milliseconds.
If you enable MLDv2 fast-leave processing and you enter the no ipv6 mld snooping
last-member-query-interval command, the interval is set to 0 seconds; fast-leave processing always
assumes a higher priority.
Even though the valid interval range is 100 to 1000 milliseconds, you cannot enter a value of 1000. If
you want this value, you must enter the no ipv6 mld snooping last-member-query-interval command
and return to the default value (1000 milliseconds).

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-316

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ipv6 mld snooping last-member-query-interval

Examples

This example shows how to configure the last-member-query-interval to 200 milliseconds:
Router(config-if)# ipv6 mld snooping last-member-query-interval 200
Router(config-if)#

Related Commands

Command

Description

show ipv6 mld
snooping

Displays MLDv2 snooping information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-317

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ipv6 mld snooping limit

ipv6 mld snooping limit
To configure the MLDv2 limits, use the ipv6 mld snooping limit command. To return to the default
settings, use the no form of this command.
ipv6 mld snooping limit {{l2-entry-limit max-entries} | {rate pps} | {track max-entries}}
no ipv6 mld snooping limit {l2-entry-limit | rate | track}

Syntax Description

l2-entry-limit
max-entries

Specifies the maximum number of Layer 2 entries that can be installed by
MLD snooping; valid values are from 1 to 100000 entries.

rate pps

Specifies the rate limit of incoming MLDv2 messages; valid values are from
100 to 6000 packets per second.

track
max-entries

Specifies the maximum number of entries in the explicit-tracking database;
valid values are from 0 to 128000 entries.

Defaults

max-entries is 32000.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Each entry in the explicit-tracking database is identified by the source IP, group IP, port, VLAN, and
reporter IP.
When you set the max-entries to 0, explicit-tracking is disabled.
When the explicit-tracking database exceeds the configured max-entries, a syslog message is generated.
When you reduce the max-entries, the explicit-tracking database does not decrease in size immediately.
The explicit-tracking database gradually shrinks as reporters time out.

Examples

This example shows how to set the maximum number of Layer 2 entries that can be installed by MLD
snooping:
Router(config)# ipv6 mld snooping limit l2-entry-limit 20000
Router(config)#

This example shows how to set the rate limit for incoming MLDv2-snooping packets:
Router(config)# ipv6 mld snooping limit rate 200
Router(config)#

This example shows how to configure the maximum number of entries in the explicit-tracking database:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-318

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ipv6 mld snooping limit

Router(config)# ipv6 mld snooping limit track 20000
Router(config)#

This example shows how to disable software rate limiting:
Router(config)# no ipv6 mld snooping limit rate
Router(config)#

Related Commands

Command

Description

ipv6 mld snooping
explicit-tracking

Enables explicit host tracking.

show ipv6 mld
snooping

Displays the information about the snooping status for MLDv2 hosts.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-319

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ipv6 mld snooping mrouter

ipv6 mld snooping mrouter
To configure a Layer 2 port as a multicast router port, use the ipv6 mld snooping mrouter command.
ipv6 mld snooping mrouter {interface type slot/port}

Syntax Description

interface type

Specifies the interface type: valid values are ethernet, fastethernet,
gigabitethernet, or tengigabitethernet.

slot/ports

Module and port number.

Defaults

None configured

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To configure a static connection to a multicast router, use the mac-address-table static command.

Examples

This example shows how to configure a Layer 2 port as a multicast router port:
Router(config-if)# ipv6 mld snooping mrouter interface fastethernet 5/6
Router(config-if)#

Related Commands

Command

Description

show ipv6 mld
snooping

Displays MLDv2 snooping information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-320

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ipv6 mld snooping querier

ipv6 mld snooping querier
To enable the MLDv2 snooping querier, use the ipv6 mld snooping querier command. To disable the
MLDv2 snooping querier, use the no form of this command.
ipv6 mld snooping querier
no ipv6 mld snooping querier

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Configure an IPv6 address on the VLAN interface. When enabled, the MLDv2 snooping querier uses the
IPv6 address as the query source address.
If there is no IPv6 address configured on the VLAN interface, the MLDv2 snooping querier does not
start. The MLDv2 snooping querier disables itself if the IPv6 address is cleared. When enabled, the
MLDv2 snooping querier restarts if you configure an IPv6 address.
When enabled, the MLDv2 snooping querier does not start if it detects MLDv2 traffic from an
IPv6 multicast router.
When enabled, the MLDv2 snooping querier starts after 60 seconds if it detects no MLDv2 traffic from
an IPv6 multicast router.
When enabled, the MLDv2 snooping querier disables itself if it detects MLDv2 traffic from an
IPv6 multicast router.
You can enable the MLDv2 snooping querier on all the Catalyst 6500 series switches in the VLAN that
support it. One switch is elected as the querier.

Examples

This example shows how to enable the MLDv2 snooping querier on VLAN 200:
Router# interface vlan 200
Router(config-if)# ipv6 mld snooping querier

Related Commands

Command

Description

show ipv6 mld
snooping

Displays MLDv2 snooping information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-321

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ipv6 mld snooping report-suppression

ipv6 mld snooping report-suppression
To enable report suppression on a VLAN, use the ipv6 mld snooping report-suppression command.
To disable report suppression on a VLAN, use the no form of this command.
ipv6 mld snooping report-suppression
no ipv6 mld snooping report-suppression

Syntax Description

This command has no keywords or arguments.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enable explicit tracking before enabling report suppression.
This command is supported on VLAN interfaces only.

Examples

This example shows how to enable explicit host tracking:
Router(config-if)# ipv6 mld snooping report-suppression
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-322

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip verify unicast reverse-path

ip verify unicast reverse-path
To enable unicast RPF, use the ip verify unicast reverse-path command. To disable unicast RPF, use
the no form of this command.
ip verify unicast reverse-path [allow-self-ping] [list]
no ip verify unicast reverse-path [allow-self-ping] [list]

Syntax Description

allow-self-ping

(Optional) Allows the Catalyst 6500 series switch to ping itself.

list

(Optional) Access-list number; valid values are from 1 to 199 for a standard
or extended IP access-list number and from 1300 to 2699 for a standard or
extended IP expanded access-list number.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Use the ip verify unicast reverse-path command to mitigate problems that are caused by malformed or
forged (spoofed) IP source addresses that pass through a Catalyst 6500 series switch. Malformed or
forged source addresses can indicate DoS attacks that are based on source IP address spoofing.

Unicast RPF is an input function and is applied only on the input interface of a Catalyst 6500 series
switch at the upstream end of a connection.
If you do not specify an ACL in the ip verify unicast reverse-path command, the Catalyst 6500 series
switch drops the forged or malformed packet immediately and no ACL logging occurs. The
Catalyst 6500 series switch and interface unicast RPF counters are updated.
You can log unicast RPF events by specifying the logging option for the ACL entries that are used by
the ip verify unicast reverse-path command. You can use the logging option to gather information
about the attack, such as the source address, time, and so on.

Note

With unicast RPF, all equal-cost “best” return paths are considered valid. Unicast RPF works when
multiple return paths exist, if each path is equal to the others in the routing cost (such as the number
of hops, weights, and so on), and the route is in the FIB. Unicast RPF also functions where EIGRP
variants are used and unequal candidate paths that go back to the source IP address exist.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-323

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip verify unicast reverse-path

Do not use unicast RPF on interfaces that are internal to the network. Internal interfaces might have
routing asymmetry, which means that there are multiple routes to the source of a packet. You should
apply unicast RPF only where there is natural or configured symmetry.
Routers at the edge of a service-provider network are more likely to have symmetrical reverse paths than
routers that are in the core of the network. Routers that are in the core of the service-provider network
have no guarantee that the best forwarding path out of the router is the path that is selected for packets
returning to the router.
We do not recommend that you apply unicast RPF where there is a chance of asymmetric routing. You
should place unicast RPF only at the edge of a network. In a service-provider network, you should place
the unicast RPF at the customer edge of the network.

Examples

This example shows how to enable unicast RPF on a serial interface:
Router(config-if)# ip verify unicast reverse-path
Router(config-if)#

Related Commands

Command

Description

ip cef

Enables CEF on the route processor.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-324

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip verify unicast source reachable-via

ip verify unicast source reachable-via
To enable and configure RPF checks, use the ip verify unicast source reachable-via command. To
disable RPF, use the no form of this command.
ip verify unicast source reachable-via {rx | any} [allow-default] [allow-self-ping] [list]
no ip verify unicast source reachable-via

Syntax Description

rx

Checks that the source address is reachable on the interface where the
packet was received.

any

Checks that the source address is reachable on any path.

allow-default

(Optional) Checks that the default route matches the source address.

allow-self-ping

(Optional) Allows the router to ping itself.

list

(Optional) Access-list number; valid values are from 1 to 199 for a
standard IP access-list number and from 1300 to 2699 for a standard IP
expanded access-list number.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Unicast RPF is not supported on PVLAN host ports.
Unicast RPF provides three basic modes:

Note

•

Exists-only mode—A source address needs to be present only in the FIB and reachable through a
“real” interface; this situation also applies to the ip verify unicast source reachable-via any
allow-default command. The exists-only mode requires that a resolved and reachable source
address is present in the FIB table. The source address must be reachable through a configured
interface.

•

Any mode—The source must be reachable through any of the paths. For example, the source has
per-destination load balancing.

•

Rx mode—A source address must be reachable on the arrived interface. For example, the source
must be reachable without load balancing.

Unicast RPF is an input function and is applied only on the input interface of a router at the upstream
end of a connection.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-325

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip verify unicast source reachable-via

When configuring uRPF check, use the following guidelines and restrictions:
•

If you configure uRPF check to filter with an ACL, the PFC determines whether or not traffic
matches the ACL. The PFC sends the traffic denied by the RPF ACL to the PISA for the uRPF
check. Packets permitted by the ACL are forwarded in hardware without a uRPF check. You can
enter the mls ip cef rpf hw-enable-rpf-acl command to subject to RPF check and forwarding in
hardware and the Packets that are denied by the uRPF ACL are forwarded in hardware and the
packets that are permitted by ACL are sent to software.

•

Because the packets in a DoS attack typically match the deny ACE and are sent to the PISA for the
uRPF check, they can overload the PISA. You can enter the mls ip cef rpf hw-enable-rpf-acl
command in these cases since DOS packets matching the deny ACE are processed in hardware.

Do not use unicast RPF on interfaces that are internal to the network. Internal interfaces might have
routing asymmetry, which means that there are multiple routes to the source of a packet. You should
apply unicast RPF only where there is natural or configured symmetry.

Examples

This example shows how to enable unicast RPF exist-only checking mode:
Router(config-if)# ip verify unicast source reachable-via any
Router(config-if)#

Related Commands

Command

Description

ip cef

Enables CEF on the route processor.

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-326

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip wccp group-listen

ip wccp group-listen
To enable the reception of IP multicast packets for WCCP, use the ip wccp group-listen command
mode. To disable the reception of IP multicast packets for WCCP, use the no form of this command.
ip wccp {web-cache | {service-number | service-name}} group-listen
no ip wccp {web-cache | {service-number | service-name}} group-listen

Syntax Description

web-cache

Directs the router to send packets to the web cache service.

service-number

WCCP service number; valid values are from 0 to 99.

service-name

WCCP service name; the valid value is web-cache.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

To ensure that the command operates correctly, you must enter the ip pim mode command in addition
to the ip wccp group-listen command.
The service-number may be either web-cache or a number representing a cache engine dynamically
defined definition. Once the service is enabled, the Catalyst 6500 series switch can participate in the
establishment of a service group.
On Catalyst 6500 series switches that are to be members of a service group when IP multicast is used,
the following configuration is required:

Examples

•

You must configure the IP multicast address for use by the WCCP service group.

•

You must configure the ip wccp {web-cache | service-number} group-listen command on the
interfaces that are to receive the IP multicast address.

This example shows how to enable the multicast packets for a web cache with a multicast address of
224.1.1.100:
router# configure terminal
router(config)# ip wccp web-cache group-address 244.1.1.100
router(config)# interface ethernet 0
router(config-if)# ip wccp web-cache group-listen

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-327

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip wccp group-listen

Related Commands

Command

Description

ip wccp

Directs a router to enable or disable the support for a cache engine service
group.

ip wccp redirect

Enables packet redirection on an outbound or inbound interface using
WCCP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-328

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip wccp redirect

ip wccp redirect
To enable packet redirection on an outbound or inbound interface using WCCP, use the
ip wccp redirect command. To disable WCCP redirection, use the no form of this command
ip wccp {web-cache | service-number} redirect {in | out}
no ip wccp {web-cache | service-number} redirect {in | out}

Syntax Description

web-cache

Enables the web-cache service.

service-number

Identification number of the cache engine service group controlled by a
router; valid values are from 0 to 99. If Cisco cache engines are used in the
cache cluster, the reverse proxy service is indicated by a value of 99.

redirect

Enables packet redirection checking on an outbound or inbound interface.

in

Specifies packet redirection on an inbound interface.

out

Specifies packet redirection on an outbound interface.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The ip wccp redirect in command allows you to configure WCCP redirection on an interface that
receives inbound network traffic. When the command is applied to an interface, all packets that arrive
at that interface are compared with the criteria that is defined by the specified WCCP service. If the
packets match the criteria, they are redirected.
The ip wccp redirect out command allows you to configure the WCCP redirection check at an outbound
interface.

Note

This command can affect the ip wccp redirect exclude in command. If you have the ip wccp redirect
exclude in command set on an interface and you configure the ip wccp redirect in command, the ip
wccp redirect exclude in command is overridden. The opposite is also true: configuring the ip wccp
redirect exclude in command overrides the ip wccp redirect in command.
For a complete description of the WCCP configuration commands, including a list of commands that
have changed since Cisco IOS Release 12.0, refer to the “WCCP Commands” chapter in the “Cisco IOS
System Management Commands” part of the Cisco IOS Release 12.2 Command Reference.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-329

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip wccp redirect

Examples

This example shows how to configure a session in which the reverse proxy packets on the Ethernet
interface 0 are checked for redirection and are redirected to a Cisco cache engine:
Router# configure terminal
Router(config)# ip wccp 99
Router(config)# interface ethernet 0
Router(config-if)# ip wccp 99 redirect out

This example shows how to configure a session in which the HTTP traffic that arrives on interface 0/1
is redirected to a Cisco cache engine:
Router# configure terminal
Router(config)# ip wccp web-cache
Router(config)# interface ethernet 0/1
Router(config-if)# ip wccp web-cache redirect in

Related Commands

Command

Description

show ip interface

Displays the usability status of interfaces that are configured for IP.

show ip wccp

Displays the WCCP statistics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-330

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
ip wccp web-cache accelerated

ip wccp web-cache accelerated
To enable the hardware acceleration for WCCP version 1, use the ip wccp web-cache accelerated
command. To disable hardware acceleration, use the no form of this command.
ip wccp web-cache accelerated {[group-address groupaddress] [redirect-list access-list]
[group-list access-list] [password password]}
no ip wccp web-cache accelerated

Syntax Description

group-address
groupaddress

(Optional) Directs the router to use a specified multicast IP address for
communication with the WCCP service group. See the “Usage Guidelines”
section for additional information.

redirect-list
access-list

(Optional) Directs the router to use an access list to control traffic that is
redirected to this service group. See the “Usage Guidelines” section for
additional information.

group-list
access-list

(Optional) Directs the router to use an access list to determine which cache
engines are allowed to participate in the service group. See the “Usage
Guidelines” section for additional information.

password
password

(Optional) Specifies a string that directs the router to apply MD5 authentication
to messages received from the service group specified by the service name given.
See the “Usage Guidelines” section for additional information.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on software releases later than cache engine software Release ACNS 4.2.1.
The group-address groupaddress option requires a multicast address that is used by the router to
determine which cache engine should receive redirected messages. This option instructs the router to use
the specified multicast IP address to coalesce the “I See You” responses for the “Here I Am” messages
that it has received on this group address. In addition, the response is sent to the group address. The
default is for no group-address to be configured, so that all “Here I Am” messages are responded to
with a unicast reply.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-331

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

ip wccp web-cache accelerated

The redirect-list access-list option instructs the router to use an access list to control the traffic that is
redirected to the cache engines of the service group that is specified by the service-name given. The
access-list argument specifies either a number from 1 to 99 to represent a standard or extended
access-list number or a name to represent a named standard or extended access list. The access list
specifies the traffic that is permitted to be redirected. The default is for no redirect-list to be configured
(all traffic is redirected).
The group-list access-list option instructs the router to use an access list to control the cache engines
that are allowed to participate in the specified service group. The access-list argument specifies either a
number from 1 to 99 to represent a standard access-list number or a name to represent a named standard
access list. The access list specifies which cache engines are permitted to participate in the service group.
The default is for no group-list to be configured, so that all cache engines may participate in the service
group.
The password can be up to seven characters. When you designate a password, the messages that are not
accepted by the authentication are discarded. The password name is combined with the HMAC MD5
value to create security for the connection between the router and the cache engine.

Examples

This example shows how to enable the hardware acceleration for WCCP version 1:
Router(config)# ip wccp web-cache accelerated
Router(config)#

Related Commands

Command

Description

ip wccp version

Specifies which version of WCCP to configure on your router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-332

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
l2protocol-tunnel

l2protocol-tunnel
To enable the protocol tunneling on an interface and specify the type of protocol to be tunneled, use the
l2protocol-tunnel command. To disable protocol tunneling, use the no form of this command.
l2protocol-tunnel [{cdp | stp | vtp}]
no l2protocol-tunnel [{cdp | stp | vtp}]

Syntax Description

cdp

(Optional) Enables CDP tunneling.

stp

(Optional) Enables STP tunneling.

vtp

(Optional) Enables VTP tunneling.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

On all the service provider edge switches, you must enable PortFast BPDU filtering on the 802.1Q tunnel
ports by entering these commands:
Router(config-if)# spanning-tree bpdufilter enable
Router(config-if)# spanning-tree portfast

Note

PortFast BPDU filtering is enabled automatically on tunnel ports.
If you do not specify a protocol, all protocols are tunneled.
You can configure protocol tunneling on VLAN and trunk interfaces.
You must enter the switchport command once without any keywords to configure the LAN port as a
Layer 2 interface before you can enter additional switchport commands with keywords. This action is
required only if you have not entered the switchport command for the interface.

Examples

This example shows how to enable a tunneling protocol on an interface:
Router(config-if)# l2protocol-tunnel cdp
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-333

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

l2protocol-tunnel

This example shows how to disable a tunneling protocol on an interface:
Router(config-if)# no l2protocol-tunnel
Protocol tunneling disabled on interface fastEthernet 4/1
Router(config-if)#

Related Commands

Command

Description

show
l2protocol-tunnel

Displays the protocols that are tunneled on an interface or on all interfaces.

switchport

Modifies the switching characteristics of the Layer 2-switched interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-334

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
l2protocol-tunnel cos

l2protocol-tunnel cos
To specify a CoS value globally on all ingress Layer-2 protocol tunneling ports, use the
l2protocol-tunnel cos command. To return to the default settings, use the no form of this command.
l2protocol-tunnel cos cos-value
no l2protocol-tunnel cos

Syntax Description

cos-value

Defaults

The cos-value is 5.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

CoS value; valid values are from 0 to 7.

The cos-value is the CoS value that you assign to the PDUs on a Layer 2-protocol tunnel port before
tunneling the PDUs through the service-provider network.
You can specify a CoS value globally on all ingress Layer 2-protocol tunneling ports. Because the CoS
value applies to all ingress tunneling ports, all encapsulated PDUs that are sent out by the Catalyst 6500
series switch have the same CoS value.
On all the service-provider edge switches, you must enable PortFast BPDU filtering on the 802.1Q
tunnel ports by entering these commands:
Router(config-if)# spanning-tree bpdufilter enable
Router(config-if)# spanning-tree portfast

Note

Examples

PortFast BPDU filtering is enabled automatically on tunnel ports.

This example shows how to specify a CoS value on all ingress Layer 2-protocol tunneling ports:
Router(config)# l2protocol-tunnel cos 6
Router(config)#

Related Commands

Command

Description

show
l2protocol-tunnel

Displays the protocols that are tunneled on an interface or on all interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-335

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

l2protocol-tunnel drop-threshold

l2protocol-tunnel drop-threshold
To specify the maximum number of packets that can be processed for the specified protocol on that
interface before being dropped, use the l2protocol-tunnel drop-threshold command. To reset all the
threshold values to 0 and disable the drop threshold, use the no form of this command.
l2protocol-tunnel drop-threshold [cdp | stp | vtp] packets
no l2protocol-tunnel drop-threshold [cdp | stp | vtp]

Syntax Description

cdp

(Optional) Specifies CDP packets.

stp

(Optional) Specifies STP packets.

vtp

(Optional) Specifies VTP packets.

packets

Maximum number of packets; valid values are from 1 to 4096 packets.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

On all the service-provider edge switches, you must enable PortFast BPDU filtering on the 802.1Q
tunnel ports by entering these commands:
Router(config-if)# spanning-tree bpdufilter enable
Router(config-if)# spanning-tree portfast

Note

PortFast BPDU filtering is enabled automatically on tunnel ports.
If you do not specify a protocol, the threshold applies to all protocols.
You can configure protocol tunneling on switch ports only. You must enter the switchport command
once without any keywords to configure the LAN port as a Layer 2 interface before you can enter
additional switchport commands with keywords. This action is required only if you have not entered
the switchport command for the interface.
Refer to the “Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling” chapter of the
Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for
additional information on setting the drop threshold value.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-336

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
l2protocol-tunnel drop-threshold

Examples

This example shows how to set the drop threshold:
Router(config-if)# switchport
Router(config-if)# l2protocol-tunnel drop-threshold 3000
Router(config-if)#

Related Commands

Command

Description

l2protocol-tunnel

Enables the protocol tunneling on an interface and specifies the type of
protocol to be tunneled.

l2protocol-tunnel cos

Specifies a CoS value globally on all ingress Layer-2 protocol tunneling
ports.

l2protocol-tunnel
global drop-threshold

Enables rate limiting at the software level.

l2protocol-tunnel
shutdown-threshold

Specifies the maximum number of packets that can be processed for the
specified protocol on that interface in 1 second.

show
l2protocol-tunnel

Displays the protocols that are tunneled on an interface or on all interfaces.

switchport

Modifies the switching characteristics of the Layer 2-switched interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-337

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

l2protocol-tunnel global drop-threshold

l2protocol-tunnel global drop-threshold
To enable rate limiting at the software level, use the l2protocol-tunnel global drop-threshold
command. To disable the software rate limiter on the Catalyst 6500 series switch, use the no form of this
command.
l2protocol-tunnel global drop-threshold threshold
no l2protocol-tunnel global drop-threshold

Syntax Description

threshold

Defaults

Global thresholds are not configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Maximum rate of incoming PDUs before excessive PDUs are
dropped; valid values are from 100 to 20000 PDUs.

Usage Guidelines

All three PDUs (normal BPDU, CDP, and VTP packets) that arrive on Layer 2-protocol tunnel-enabled
ports are rate limited. Rate limiting occurs in the ingress direction in Layer 2-protocol tunneling. If the
rate of the incoming PDUs exceeds the configured threshold, the excessive PDUs are dropped.

Examples

This example shows how to enable rate limiting globally:
Router(config)# l2protocol-tunnel global drop-threshold 3000
Router(config)#

Related Commands

Command

Description

l2protocol-tunnel

Enables the protocol tunneling on an interface and specifies the type of
protocol to be tunneled.

l2protocol-tunnel cos

Specifies a CoS value globally on all ingress Layer-2 protocol tunneling
ports.

l2protocol-tunnel
drop-threshold

Specifies the maximum number of packets that can be processed for the
specified protocol on that interface before being dropped.

l2protocol-tunnel
shutdown-threshold

Specifies the maximum number of packets that can be processed for the
specified protocol on that interface in 1 second.

show
l2protocol-tunnel

Displays the protocols that are tunneled on an interface or on all interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-338

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
l2protocol-tunnel shutdown-threshold

l2protocol-tunnel shutdown-threshold
To specify the maximum number of packets that can be processed for the specified protocol on that
interface in 1 second, use the l2protocol-tunnel shutdown-threshold command. To reset all the
threshold values to 0 and disable the shutdown threshold, use the no form of this command.
l2protocol-tunnel shutdown-threshold [cdp | stp | vtp] packets
no l2protocol-tunnel shutdown-threshold [cdp | stp | vtp] packets

Syntax Description

cdp

(Optional) Specifies CDP tunneling.

stp

(Optional) Specifies STP tunneling.

vtp

(Optional) Specifies VTP tunneling.

packets

Shutdown threshold; valid values are from 1 to 4096.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When the number of packets is exceeded, the port is put in error-disabled state.
On all the service-provider edge switches, you must enable PortFast BPDU filtering on the 802.1Q
tunnel ports by entering these commands:
Router(config-if)# spanning-tree bpdufilter enable
Router(config-if)# spanning-tree portfast

Note

PortFast BPDU filtering is enabled automatically on tunnel ports.
If you do not specify a protocol, the packets value applies to all protocols.
You can configure protocol tunneling on switch ports only. You must enter the switchport command
once without any keywords to configure the LAN port as a Layer 2 interface before you can enter
additional switchport commands with keywords. This action is required only if you have not entered
the switchport command for the interface.
Refer to the “Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling” chapter of the
Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for
additional information on setting the drop threshold value.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-339

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

l2protocol-tunnel shutdown-threshold

Examples

This example shows how to specify the maximum number of CDP packets that can be processed on that
interface in 1 second:
Router(config-if)# switchport
Router(config-if)# l2protocol-tunnel shutdown-threshold cdp 200
Router(config-if)#

Related Commands

Command

Description

l2protocol-tunnel

Enables the protocol tunneling on an interface and specifies the type of
protocol to be tunneled.

show
l2protocol-tunnel

Displays the protocols that are tunneled on an interface or on all interfaces.

switchport

Modifies the switching characteristics of the Layer 2-switched interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-340

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
l2 vfi manual

l2 vfi manual
To create a Layer 2 VFI and enter the Layer 2 VFI manual configuration submode, use the l2 vfi manual
command. To remove the Layer 2 VFI, use the no form of this command.
l2 vfi name manual
no l2 vfi name manual

Syntax Description

name

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Name of a new or existing Layer 2 VFI.

A VFI is a collection of data structures used by the data plane, software-based or hardware-based, to
forward packets to one or more VCs. It is populated and updated by both the control plane and the data
plane and also serves as the data structure interface between the control plane and the data plane.
Within the Layer 2 VFI manual configuration submode, you can configure the following parameters:
•

VPN ID of a VPLS domain

•

Addresses of other PE routers in this domain

•

Type of tunnel signaling and encapsulation mechanism for each peer

Within the Layer 2 VFI manual configuration submode, the following commands are available:

Examples

•

[no] vpn id vpn-id—Configures a VPN ID in RFC 2685 format. To remove the VPN ID from the
configuration, use the no form of this command.

•

[no] neighbor remote-router-id {encapsulation {l2tpv3 | mpls} | {pw-class pw-name} |
no-split-horizon}—Specifies the type of tunnel signaling and encapsulation mechanism for each
peer. See the neighbor command.

This example shows how to create a Layer 2 VFI, enter the Layer 2 VFI manual configuration submode,
and configure a VPN ID:
Router(config)# l2 vfi vfitest1 manual
Router(config-vfi)# vpn id 303

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-341

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

lacp max-bundle

lacp max-bundle
To define the maximum number of bundled LACP ports allowed in this port channel, use the lacp
max-bundle command. To return to the default settings, use the no form of this command.
lacp max-bundle max-bundles
no lacp max-bundle

Syntax Description

max-bundles

Defaults

The default settings are as follows:

Maximum number of bundled ports allowed in this port channel; valid
values are from 1 to 8.

•

Maximum of eight bundled ports.

•

Maximum of eight bundled ports and eight hot-standby ports per port channel; this setting applies
if the port channel on both sides of the LACP bundle are configured the same.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the maximum number of ports to bundle in this port channel:
Router(config-if)# lacp max-bundle 4
Router(config-if)#

Related Commands

Command

Description

show lacp

Displays LACP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-342

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
lacp port-priority

lacp port-priority
To set the priority for the physical interfaces, use the lacp port-priority command.
lacp port-priority priority

Syntax Description

priority

Defaults

32768

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Priority for the physical interfaces; valid values are from 1 to 65535.

You must assign a port priority to each port in the Catalyst 6500 series switch. You can specify the port
priority automatically or by entering the lacp port-priority command. The port priority is used with the
port number to form the port identifier. The port priority is used to decide which ports should be put in
standby mode when there is a hardware limitation that prevents all compatible ports from aggregating.
Although this command is a global configuration command, priority is supported only on port channels
with LACP-enabled physical interfaces.
This command is supported on LACP-enabled interfaces.
When setting the priority, note that a higher number means a lower priority.

Examples

This example shows how to set the priority for the interface:
Router(config-if)# lacp port-priority 23748
Router(config-if)#

Related Commands

Command

Description

channel-group

Assigns and configures an EtherChannel interface to an EtherChannel
group.

channel-protocol

Sets the protocol that is used on an interface to manage channeling.

lacp system-priority

Sets the priority of the system.

show lacp

Displays LACP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-343

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

lacp rate

lacp rate
To set the rate at which the LACP packets are ingressed to an interface, use the lacp rate command. To
return to the default settings, use the no form of this command.
lacp rate {normal | fast}
no lacp rate

Syntax Description

normal

Specifies that the LACP packets are ingressed at the normal rate of
30-seconds rate.

fast

Specifies that the LACP packets are ingressed at the fast rate of 1-second
rate once the link is established.

Defaults

90 seconds

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on LACP-enabled interfaces.

Examples

This example shows how to specify that the LACP packets are ingressed at the one-second rate:
Router(config-if)# lacp rate fast
Router(config-if)#

Related Commands

Command

Description

show lacp

Displays LACP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-344

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
lacp system-priority

lacp system-priority
To set the priority of the system, use the lacp system-priority command.
lacp system-priority priority

Syntax Description

priority

Defaults

32768

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Priority of the system; valid values are from 1 to 65535.

You must assign a system priority to each Catalyst 6500 series switch running LACP. You can specify
the system priority automatically or by entering the lacp system-priority command. The system priority
is used with the Catalyst 6500 series switch MAC address to form the system ID and is also used during
negotiation with other systems.
Although this command is a global configuration command, priority is supported on port channels with
LACP-enabled physical interfaces.
When setting the priority, note that a higher number means a lower priority.
You can also enter the lacp system-priority command. Once you enter the command, the system
defaults to global configuration mode.

Examples

This example shows how to set the system priority:
Router(config)# lacp system-priority 23748
Router(config)#

Related Commands

Command

Description

channel-group

Assigns and configures an EtherChannel interface to an EtherChannel
group.

channel-protocol

Sets the protocol that is used on an interface to manage channeling.

lacp port-priority

Sets the priority for the physical interfaces.

show lacp

Displays LACP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-345

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

line

line
To identify a specific line for configuration and enter line configuration collection mode, use the line
command.
line {{first-line-number [ending-line-number]} | {console first-line-number} | {vty
{first-line-number [ending-line-number]}}}

Syntax Description

first-line-number

Relative number of the terminal line (or the first line in a contiguous
group) that you want to configure when the line type is specified;
valid values are from 0 to 1510.

ending-line-number

(Optional) Relative number of the last line in a contiguous group
that you want to configure; valid values are from 101 to 1510.

console first-line-number

Specifies the console terminal line; the valid value is 0.

vty

Specifies the virtual terminal line for remote console access.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The console port is DCE.
If you do not specify console or vty, the first-line-number and ending-line-number are absolute rather
than relative line numbers.
You can address a single line or a consecutive range of lines with the line command. A line number is
necessary, though, and you will receive an error message if you forget to include it.
Entering the line command with the optional line type (console or vty) designates the line number as a
relative line number. For example, to configure line parameters for line 7 (a TTY line), you could enter
the line tty 7 command.
You also can use the line command without specifying a line type. In this case, the line number is treated
as an absolute line number. For example, to configure line parameters for line 5, which can be of any
type, you could enter the line 5 command.
Absolute line numbers increment consecutively and can be difficult to manage on large systems.
Relative line numbers are a shorthand notation used in configurations. Internally, the Cisco IOS software
uses absolute line numbers. You cannot use relative line numbers everywhere, but you can use absolute
line numbers everywhere.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-346

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
line

You can enter the show users all command to display a table of absolute and relative line numbers. The
absolute line numbers are listed at the far left, followed by the line type, and then the relative line
number. Relative line numbers always begin at zero and define the type of line. Addressing the second
virtual terminal line as line VTY 1, for example, is easier than remembering it as line 143—its absolute
line number.
The terminal from which you locally configure the router is attached to the console port. To configure
line parameters for the console port, enter the line console 0 command. The console relative line number
must be 0.
Once you enter the line console configuration mode, you can set the transmit and receive speeds; valid
values are from 0 to 9600. The default rate is 9600.
Virtual terminal lines are used to allow remote access to the router. A virtual terminal line is not
associated with either the auxiliary or console port. The router has five virtual terminal lines by default.
However, you can create additional virtual terminal lines as described in the chapter “Configuring
Protocol Translation and Virtual Asynchronous Devices” in the Cisco IOS Terminal Services
Configuration Guide.
Configuring the console port or virtual terminal lines allows you to perform such tasks as setting
communication parameters, specifying autobaud connections, and configuring terminal operating
parameters for the terminal that you are using.

Examples

This example shows how to start the configuration for virtual terminal lines 0 to 4:
Router(config)# line vty 0 4
Router(config-line)#

This example shows how to create and configure the maximum 100 virtual terminal lines with the no
login command:
Router(config)# line vty 0 99
Router(config-line)# no login
Router(config-line)#

This example shows how to eliminate the virtual terminal line number 5 and all higher-numbered virtual
terminal lines. Only virtual terminal lines 0 to 4 will remain.
Router(config-line)# no line vty 5
Router(config)#

This example shows how to set the transmit and receive speeds for the console port:
Router(config)# line console 0
Router(config-line)# speed 9600
Router(config-line)#

Related Commands

Command

Description

show line

Displays parameters of a terminal line.

show users

Displays information about the active lines on the router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-347

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

link debounce

link debounce
To enable the debounce timer on an interface, use the link debounce command. To disable the timer,
use the no form of this command.
link debounce [time time]
no link debounce

Syntax Description

time time

Defaults

Table 2-13 lists the debounce timer defaults.

(Optional) Specifies the extended debounce timer; valid values are from
100 to 5000 milliseconds.

Table 2-13 Port Debounce Timer Delay Time

Port Type

Debounce Timer Disabled

Debounce Timer Enabled

10BASE-FL ports

300 milliseconds

3100 milliseconds

10/100BASE-TX ports

300 milliseconds

3100 milliseconds

100BASE-FX ports

300 milliseconds

3100 milliseconds

10/100/1000BASE-TX ports

300 milliseconds

3100 milliseconds

1000BASE-TX ports

300 milliseconds

3100 milliseconds

Fiber Gigabit ports

10 milliseconds

100 milliseconds

10-Gigabit ports except
WS-X6501-10GEX4 and
WS-X6502-10GE

10 milliseconds

100 milliseconds

1000 milliseconds
WS-X6501-10GEX4 and
WS-X6502-10GE 10-Gigabit ports

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

3100 milliseconds

The time time keyword and argument are supported on Gigabit Ethernet and 10-Gigabit Ethernet
interfaces only.
The time time keyword and argument are not supported on copper media.
The debounce timer sets the amount of time that the firmware waits before it notifies the software that
the link is down. The debounce timer does not apply to linkup because the linkup is immediately notified
by the firmware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-348

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
link debounce

The default debounce time applies when you enter the link debounce command with no arguments. For
example, when you enter the link debounce time 100 command, it is equivalent to entering the link
debounce command with no arguments. You will see the following link debounce entry in the
configuration:
interface GigabitEthernet1/1
no ip address
link debounce

Enter the show interfaces debounce command to display the debounce configuration of an interface.

Examples

This example shows how to configure the debounce timer on a Gigabit Ethernet fiber interface:
Router (config-if)# link debounce time 100
Router (config-if)#

Related Commands

Command

Description

show interfaces
debounce

Displays the status and configuration for the debounce timer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-349

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

load-interval

load-interval
To specify the length of time to be used to calculate the average load for an interface, use the
load-interval command. To return to the default settings, use the no form of this command.
load-interval seconds
no load-interval

Syntax Description

seconds

Defaults

300 seconds (5 minutes)

Command Modes

Interface configuration
Frame Relay DLCI configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Length of time that is used to compute load statistics; valid values are from
30 to 600 seconds in 30-second increments.

By default, the load data is gathered every 5 minutes or 300 seconds. You can use this data to compute
load statistics, including the input rate in bits and packets per second, and the output rate in bits and
packets per second, load, and reliability. Load data is computed using a weighted-average calculation
where recent load data has more weight than older load data.
If you want the load computations to be more reactive to short bursts of traffic, rather than being
averaged over 5-minute periods, you can shorten the length of time over which load averages are
computed. For example, you can set the load interval to 30 seconds to reflect the weighted-average load
for the last 30-second period.
Enter the load-interval command to change the calculation interval from the default value of 5 minutes
(300 seconds) to a shorter or longer period of time. If you change it to a shorter period of time, the input
and output statistics that are displayed when you use the show interface or show frame-relay pvc
command will be more current, rather than reflecting a more average load over a longer period of time.
Enter the load-interval command to increase or decrease the likelihood of activating a backup interface;
for example, a backup dial interface may be triggered by a sudden spike in the load on an active interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-350

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
load-interval

Examples

This example shows how to set the load interval for the serial interface 0 so that the average is computed
over 30-second intervals:
Router(config)# interface serial 0
Router(config-if)# load-interval 30

This example shows how to set the load interval to 60 seconds for a Frame Relay PVC with the
DLCI 100:
Router(config)# interface serial 1/1
Router(config-if# encapsulation frame-relay ietf
Router(config-if)# frame-relay interface-dlci 100
Router(config-fr-dlci)# load-interval 60

Related Commands

Command

Description

show frame-relay pvc

Displays statistics about PVCs for Frame Relay interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-351

Chapter 2
logging event link-status (global configuration)

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

logging event link-status (global configuration)
To change the default or set the link-status event messaging during system initialization, use the logging
event link-status command. To disable the link-status event messaging, use the no form of this
command.
logging event link-status {default | boot}
no logging event link-status {default | boot}

Syntax Description

default

Enables system logging of interface state-change events on all interfaces in
the system.

boot

Enables system logging of interface state-change events on all interfaces in
the system during system initialization.

Defaults

Interface state-change messages are not sent.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You do not have to enter the logging event link-status boot command to enable link-status messaging
during system initialization. The logging event link-status default command logs system messages
even during system initialization.
If you enter both the logging event link-status default and the no logging event link-status boot
commands, the interface state-change events are logged after all modules in the Catalyst 6500 series
switch come online after system initialization. The logging event link-status default and the no logging
event link-status boot commands are saved and retained in the running configuration of the system.
When both the logging event link-status default and the no logging event link-status boot commands
are present in the running configuration and you want to display the interface state-change messages
during system initialization, enter the logging event link-status boot command.

Examples

This example shows how to enable the system logging of the interface state-change events on all
interfaces in the system:
Router(config)# logging event link-status default
Router(config)#

This example shows how to enable the system logging of interface state-change events on all interfaces
during system initialization:
Router(config)# logging event link-status boot
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-352

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
logging event link-status (global configuration)

This example shows how to disable the system logging of interface state-change events on all interfaces:
Router(config)# no logging event link-status default
Router(config)#

This example shows how to disable the system logging of interface state-change events during system
initialization:
Router(config)# no logging event link-status boot
Router(config)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-353

Chapter 2
logging event link-status (interface configuration)

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

logging event link-status (interface configuration)
To enable the link-status event messaging on an interface, use the logging event link-status command.
To disable the link-status event messaging, use the no form of this command.
logging event link-status
no logging event link-status

Syntax Description

This command has no arguments or keywords.

Defaults

Interface state-change messages are not sent.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To enable system logging of interface state-change events on a specific interface, enter the logging event
link-status command.
To enable system logging of interface state-change events on all interfaces in the system, enter the
logging event link-status command.

Examples

This example shows how to enable the system logging of the interface state-change events on an
interface:
Router(config-if)# logging event link-status
Router(config-if)#

This example shows how to disable the system logging of the interface state-change events on an
interface:
Router(config-if)# no logging event link-status default
Router(config-if)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-354

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
logging event subif-link-status

logging event subif-link-status
To enable the link-status event messaging on a subinterface, use the logging event subif-link-status
command. To disable the link-status event messaging on a subinterface, use the no form of this
command.
logging event subif-link-status
no logging event subif-link-status

Syntax Description

This command has no arguments or keywords.

Defaults

Subinterface state-change messages are not sent.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the following subinterfaces:
•

Frame Relay subinterfaces

•

OSM-GE-WAN subinterfaces

•

SIP subinterfaces

•

LAN subinterfaces

To enable system logging of interface state-change events on a specific subinterface, enter the logging
event subif-link-status command.
To enable system logging of interface state-change events on a specific interface, enter the logging event
link-status command.
To enable system logging of interface state-change events on all interfaces in the system, enter the
logging event link-status command.

Examples

This example shows how to enable the system logging of the interface state-change events on a
subinterface:
Router(config-if)# logging event subif-link-status
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-355

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

logging event subif-link-status

This example shows how to disable the system logging of the interface state-change events on a
subinterface:
Router(config-if)# no logging event subif-link-status
Router(config-if)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-356

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
logging ip access-list cache (global configuration mode)

logging ip access-list cache (global configuration mode)
To configure the OAL parameters, use the logging ip access-list cache command. To return to the
default settings, use the no form of this command.
logging ip access-list cache {{entries entries} | {interval seconds} | {rate-limit pps} |
{threshold packets}}
no logging ip access-list cache [entries | interval | rate-limit | threshold]

Syntax Description

Defaults

entries entries

Specifies the maximum number of log entries that are cached in the
software; valid values are from 0 to 1048576 entries.

interval seconds

Specifies the maximum time interval before an entry is sent to syslog; valid
values are from 5 to 86400 seconds.

rate-limit pps

Specifies the number of packets that are logged per second in the software;
valid values are from 10 to 1000000 pps.

threshold packets

Specifies the number of packet matches before an entry is sent to syslog;
valid values are from 1 to 1000000 packets.

The defaults are as follows:
•

entries—8000 entries.

•

seconds—300 seconds (5 minutes).

•

rate-limit pps—0 (rate limiting is off) and all packets are logged.

•

threshold packets—0 (rate limiting is off) and the system log is not triggered by the number of
packet matches.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

OAL is supported on IPv4 unicast traffic only.
You cannot configure OAL and VACL capture on the same chassis. OAL and VACL capture are
incompatible. With OAL configured, use SPAN to capture traffic.
If the entry is inactive for the duration that is specified in the update-interval seconds command, the
entry is removed from the cache.
If you enter the no logging ip access-list cache command without keywords, all the parameters are
returned to the default values.
You must set ICMP unreachable rate limiting to 0 if the OAL is configured to log denied packets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-357

Chapter 2 Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
logging ip access-list cache (global configuration mode)

Examples

This example shows how to specify the maximum number of log entries that are cached in the software:
Router(config)# logging ip access-list cache entries 200
Router(config)#

This example shows how to specify the maximum time interval before an entry is sent to the system log:
Router(config)# logging ip access-list cache interval 350
Router(config)#

This example shows how to specify the number of packets that are logged per second in the software:
Router(config)# logging ip access-list cache rate-limit 100
Router(config)#

This example shows how to specify the number of packet matches before an entry is sent to the system
log:
Router(config)# logging ip access-list cache threshold 125
Router(config)#

Related Commands

Command

Description

clear logging ip
access-list cache

Clears all the entries from the OAL cache and sends them to the syslog.

logging ip access-list
cache (interface
configuration mode)

Enables an OAL-logging cache on an interface that is based on direction.

show logging ip
access-list

Displays information about the logging IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-358

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
logging ip access-list cache (interface configuration mode)

logging ip access-list cache (interface configuration mode)
To enable an OAL-logging cache on an interface that is based on direction, use the logging ip access-list
cache command. To disable OAL, use the no form of this command.
logging ip access-list cache [in | out]
no logging ip access-list cache

Syntax Description

in

(Optional) Enables OAL on ingress packets.

out

(Optional) Enables OAL on egress packets.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on traffic that matches the log keyword in the applied ACL. You must set
ICMP unreachable rate limiting to 0 if the OAL is configured to log denied packets.
On systems that are configured with a PFC3A, support for the egress direction on tunnel interfaces is
not supported.
OAL is supported on IPv4 unicast traffic only.
You cannot configure OAL and VACL capture on the same chassis. OAL and VACL capture are
incompatible. With OAL configured, use SPAN to capture traffic.
If the entry is inactive for the duration that is specified in the update-interval seconds command, the
entry is removed from the cache.
If you enter the no logging ip access-list cache command without keywords, all the parameters are
returned to the default values.

Examples

This example shows how to enable OAL on ingress packets:
Router(config-if)# logging ip access-list cache in
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-359

Chapter 2 Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
logging ip access-list cache (interface configuration mode)

This example shows how to enable OAL on egress packets:
Router(config-if)# logging ip access-list cache out
Router(config-if)#

Related Commands

Command

Description

clear logging ip
access-list cache

Clears all the entries from the OAL cache and sends them to the syslog.

logging ip access-list
cache (global
configuration mode)

Configures the OAL parameters.

show logging ip
access-list

Displays information about the logging IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-360

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac access-list extended

mac access-list extended
To access a subcommand to define extended MAC-access lists, use the mac access-list extended
command. To remove MAC-access lists, use the no form of this command.
mac access-list extended name
no mac access-list extended name

Syntax Description

name

Defaults

No default ACL

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Name of the ACL to which the entry belongs.

When you enter the ACL name, follow these naming conventions:
•

Maximum of 31 characters and may include a-z, A-Z, 0-9, the dash character (-), the underscore
character (_), and the period character (.)

•

Must start with an alpha character and must be unique across all ACLs of all types

•

Case sensitive

•

Cannot be a number

•

Must not be a keyword; keywords to avoid are all, default-action, map, help, and editbuffer

You can configure named ACLs that filter IPX, DECnet, AppleTalk, VINES, or XNS traffic based on
MAC addresses (IPX filtering with a MAC ACL is supported only with a PFC3).
In systems that are configured with PFC3, if you want to classify all IPX traffic by using a MAC-access
list that matches on EtherType 0x8137, use the ipx-arpa or ipx-non-arpa protocol.
Once you enter the mac access-list extended name command, use the following subset to create or
delete entries in a MAC-access list:
[no] {permit | deny} {{src-mac mask | any} {dest-mac mask} | any} [protocol [vlan vlan]
[cos value]]
The vlan vlan and cos value keywords and arguments are supported in PFC3BXL or PFC3B mode.
The vlan vlan and cos value keywords and arguments are not supported on the MAC VACLs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-361

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac access-list extended

Table 2-14 describes the syntax of the mac access-list extended subcommands.
Table 2-14 mac access-list extended Subcommands

Subcommand

Description

no

(Optional) Deletes a statement from an access list.

permit

Permits access if the conditions are matched.

deny

Denies access if the conditions are matched.

src-mac mask

Source MAC address in the form:
source-mac-address source-mac-address-mask.

any

Specifies any protocol type.

dest-mac mask

(Optional) Destination MAC address in the form:
dest-mac-address dest-mac-address-mask.

protocol

(Optional) Name or number of the protocol; see below for a list of valid
values.

vlan vlan

(Optional) Specifies a VLAN ID; valid values are from 0 to 4095.

cos value

(Optional) Specifies a CoS value; valid values are from 0 to 7.

Valid protocol names are as follows:
•

0x0-0xFFFF—Arbitrary EtherType in hex

•

aarp—EtherType: AppleTalk ARP

•

amber—EtherType: DEC-Amber

•

appletalk—EtherType: AppleTalk/EtherTalk

•

dec-spanning—EtherType: DEC-Spanning-Tree

•

decnet-iv—EtherType: DECnet Phase IV

•

diagnostic—EtherType: DEC-Diagnostic

•

dsm—EtherType: DEC-DSM

•

etype-6000—EtherType: 0x6000

•

etype-8042—EtherType: 0x8042

•

ip—EtherType: 0x0800

•

ipx-arpa—IPX arpa

•

ipx-non-arpa—IPX non arpa

•

lat—EtherType: DEC-LAT

•

lavc-sca—EtherType: DEC-LAVC-SCA

•

mop-console—EtherType: DEC-MOP Remote Console

•

mop-dump—EtherType: DEC-MOP Dump

•

msdos—EtherType: DEC-MSDOS

•

mumps—EtherType: DEC-MUMPS

•

netbios—EtherType: DEC-NETBIOS

•

vines-echo—EtherType: VINES Echo

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-362

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac access-list extended

•

vines-ip—EtherType: VINES IP

•

xns-idp—EtherType: XNS IDP

When you enter the src-mac mask or dest-mac mask value, note these guidelines and restrictions:
•

Enter MAC addresses as three 4-byte values in dotted hexadecimal format (for example,
0030.9629.9f84).

•

Enter MAC-address masks as three 4-byte values in dotted hexadecimal format. Use 1 bit as a
wildcard. For example, to match an address exactly, use 0000.0000.0000 (can be entered as 0.0.0).

•

For the optional protocol, you can enter either the EtherType or the keyword.

•

Entries without a protocol match any protocol.

•

Access lists entries are scanned in the order that you enter them. The first matching entry is used.
To improve performance, place the most commonly used entries near the beginning of the access
list.

•

An implicit deny any any entry exists at the end of an access list unless you include an explicit
permit any any entry at the end of the list.

•

All new entries to an existing list are placed at the end of the list. You cannot add entries to the
middle of a list.

Malformed, invalid, deliberately corrupt EtherType 0x800 IP frames are not recognized as IP traffic and
are not filtered by IP ACLs.
An ACE created with the mac access-list extended command with the ip keyword filters malformed,
invalid, deliberately corrupt EtherType 0x800 IP frames only; it does not filter any other IP traffic.

Examples

This example shows how to create a MAC-access list named mac_layer that denies traffic from
0000.4700.0001, which is going to 0000.4700.0009, and permits all other traffic:
Router(config)# mac access-list extended mac_layer
Router(config-ext-macl)# deny 0000.4700.0001 0.0.0 0000.4700.0009 0.0.0 dsm
Router(config-ext-macl)# permit any any

Related Commands

Command

Description

show
mac-address-table

Displays information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-363

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table aging-time

mac-address-table aging-time
To configure the aging time for entries in the Layer 2 table, use the mac-address-table aging-time
command. To return to the default settings, use the no form of this command.
mac-address-table aging-time seconds [routed-mac | vlan vlan-id]
no mac-address-table aging-time seconds [routed-mac | vlan vlan-id]

Syntax Description

seconds

Aging time; valid values are 0 and from 5 to 1000000 seconds.

routed-mac

(Optional) Specifies the routed MAC aging interval.

vlan vlan-id

(Optional) Specifies the VLAN to apply the changed aging time; valid values are
from 1 to 4094.

Defaults

300 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enter a VLAN, the change is applied to all routed-port VLANs.
Enter 0 seconds to disable aging.
You can enter the routed-mac keyword to configure the MAC address aging time for traffic that has the
routed MAC (RM) bit set.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-364

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac-address-table aging-time

Examples

This example shows how to configure the aging time:
Router(config)# mac-address-table aging-time 400
Router(config)#

This example shows how to change the RM aging time:
Router(config)# mac-address-table aging-time 500 routed-mac
Router(config)#

This example shows how to disable aging:
Router(config)# mac-address-table aging-time 0
Router(config)

Related Commands

Command

Description

show
mac-address-table

Displays information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-365

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table learning

mac-address-table learning
To enable MAC-address learning, use the mac-address-table learning command. To disable learning,
use the no form of this command.
[default] mac-address-table learning {{vlan vlan-id} | {vlans vlan-range} | {interface interface
slot/port}} [module num]
no mac-address-table learning {{vlan vlan-id} | {vlans vlan-range} | {interface interface
slot/port}} [module num]

Syntax Description

default

(Optional) Returns to the default settings.

vlan vlan-id

Specifies the VLAN to apply the per-VLAN learning of all MAC addresses; valid
values are from 1 to 4094.

vlans
vlan-range

Specifies the number of the VLANs to be mapped to the specified instance; valid
values are from 1 to 4094.

interface

Specifies per-interface based learning of all MAC addresses.

interface
slot/port

Interface type, the slot number, and the port number.

module num

(Optional) Specifies the module number.

Defaults

If you configure a VLAN on a port in a module, all the supervisor engines and DFCs in the Catalyst 6500
series switch are enabled to learn all the MAC addresses on the specified VLAN.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

12.(23)SXH

This command was changed to allow you to enter a range of VLANs.

Usage Guidelines

You can use the module num keyword and argument to specify supervisor engines or DFCs only.
You can use the vlan vlan-id keyword and argument on switch-port VLANs only. You cannot use the
vlan vlan-id keyword and argument to configure learning on routed interfaces.
You can use the interface interface slot/port keyword and arguments on routed interfaces and supervisor
engines only. You cannot use the interface interface slot/port keyword and arguments to configure
learning on switch-port interfaces.
In releases after Cisco IOS Release 12.(23)SXH, you can enter a range of VLANS separated by a
hyphen.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-366

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac-address-table learning

Examples

This example shows how to enable MAC-address learning on a switch-port interface on all modules:
Router (config)# mac-address-table learning vlan 100
Router (config)#

This example shows how to enable MAC-address learning on a range of VLANs on all modules:
Router (config)# mac-address-table learning vlan 100-115,125
Router (config)#

This example shows how to enable MAC-address learning on a switch-port interface on a specified
module:
Router (config)# mac-address-table learning vlan 100 module 4
Router (config)#

This example shows how to disable MAC-address learning on a specified switch-port interface for all
modules:
Router (config)# no mac-address-table learning vlan 100
Router (config)#

This example shows how to enable MAC-address learning on a routed interface on all modules:
Router (config)# mac-address-table learning vlan 100
Router (config)#

This example shows how to enable MAC-address learning on a routed interface for a specific module:
Router (config)# mac-address-table learning interface FastEthernet 3/48 module 4
Router (config)#

This example shows how to disable MAC-address learning for all modules on a specific routed interface:
Router (config)# no mac-address-table learning interface FastEthernet 3/48
Router (config)#

Related Commands

Command

Description

show
mac-address-table
learning

Displays the MAC-address learning state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-367

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table limit

mac-address-table limit
To enable MAC limiting, use the mac-address-table limit command. To disable MAC limiting, use the
no form of this command.
mac-address-table limit [maximum num] [action {warning | limit | shutdown}]
[notification {syslog | trap | both}]
mac-address-table limit [{vlan vlan} | {interface type mod/port}] [maximum num] [action
{warning | limit | shutdown}] [flood]
no mac-address-table limit [vlan vlan] [maximum | action]

Syntax Description

Defaults

maximum num (Optional) Specifies the maximum number of MAC entries per VLAN per EARL
allowed; valid values are from 5 to 32000 MAC-address entries.
action

(Optional) Specifies the type of action to be taken when the action is violated.

warning

Specifies that the one syslog message will be sent and no further action will be
taken when the action is violated.

limit

Specifies that the one syslog message will be sent and/or a corresponding trap will
be generated with the MAC limit when the action is violated.

shutdown

Specifies that the one syslog message will be sent and/or the VLAN is moved to the
blocked state when the action is violated.

notification

(Optional) Specifies the type of notification to be sent when the action is violated.

syslog

Sends a syslog message when the action is violated.

trap

Sends trap notifications when the action is violated.

both

Sends syslog and trap notifications when the action is violated.

vlan vlan

(Optional) Enables MAC limiting on a per-VLAN basis.

interface type
mod/port

(Optional) Enables MAC limiting on a per-port basis.

flood

(Optional) Enables unknown unicast flooding on a VLAN.

The defaults are as follows:
•

maximum num is 500 MAC address entries.

•

action is warning.

•

notification is syslog.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-368

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac-address-table limit

Usage Guidelines

Use this syntax for enabling MAC limiting globally:
mac-address-table limit [maximum num] [action {warning | limit | shutdown}]
[notification {syslog | trap | both}]
Use this syntax for enabling per-VLAN MAC limiting:
mac-address-table limit [vlan vlan] [maximum num] [action {warning | limit | shutdown}]
[flood]
Use this syntax for enabling per-port MAC limiting:
mac-address-table limit [interface type mod/port] [maximum num] [action {warning | limit |
shutdown}] [flood]
If you enable per-VLAN MAC limiting, the per-VLAN MAC limiting supersedes the
mac-address-table limit command that globally enables MAC limiting.
The maximum number of MAC entries is based per VLAN and per EARL.
If you do not specify a maximum, an action, or a notification, the default settings are used.
If you enable per-VLAN MAC limiting, MAC limiting is enabled on the VLAN specified only.
The flood keyword is supported on VLAN interfaces only.
The flood action occurs only if the limit action is configured and is violated.
In the shutdown state, the VLAN remains in the blocked state until you reenable it through the CLI.

Examples

This example shows how to enable the MAC limit globally:
Router(config)# mac-address-table limit
Router(config)#

This example shows how to enable per-VLAN MAC limiting:
Router(config)# mac-address-table limit vlan 501 maximum 50 action shutdown
Router(config)#

Related Commands

Command

Description

show mac-address-table limit

Displays the information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-369

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table notification mac-move

mac-address-table notification mac-move
To enable MAC-move notification, use the mac-address-table notification mac-move command. To
disable MAC-move notification, use the no form of this command.
mac-address-table notification mac-move
no mac-address-table notification mac-move

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

MAC-move notification generates a syslog message whenever a MAC address or host moves between
different switch ports.
MAC-move notification does not generate a notification when a new MAC address is added to the CAM
or when a MAC address is removed from the CAM.
MAC-move notification is supported on switch ports only.

Examples

This example shows how to enable MAC-move notification:
Router(config)# mac-address-table notification mac-move
Router(config)#

This example shows how to disable MAC-move notification:
Router(config)# no mac-address-table notification mac-move
Router(config)#

Related Commands

Command

Description

show
Displays the information about the MAC-address table.
mac-address-table
notification mac-move

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-370

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac-address-table notification threshold

mac-address-table notification threshold
To enable CAM table usage monitoring notification, use the mac-address-table notification threshold
command. To disable CAM table usage monitoring notification, use the no form of this command.
mac-address-table notification threshold {limit percentage} {interval time}
no mac-address-table notification threshold

Syntax Description

Defaults

limit percentage

Specifies the percentage of the CAM utilization; valid values are from 1 to
100 percent.

interval time

Specifies the time between notifications; valid values are greater than or
equal to 120 seconds.

The defaults are as follows:
•

Disabled.

•

percentage is 50 percent.

•

time is 120 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enable CAM table usage monitoring, the number of valid entries in the CAM table are counted
and if the percentage of the CAM utilization is higher or equal to the specified threshold, a message is
displayed.

Examples

This example shows how to enable CAM table usage monitoring notification and use the default settings:
Router(config)# mac-address-table notification threshold
Router(config)#

This example shows how to enable CAM table usage monitoring notification and set the threshold and
interval:
Router(config)# mac-address-table notification threshold limit 20 interval 200
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-371

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table notification threshold

This example shows how to disable CAM table usage monitoring notification:
Router(config)# no mac-address-table notification threshold
Router(config)#

Related Commands

Command

Description

show
mac-address-table
notification threshold

Displays information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-372

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac-address-table static

mac-address-table static
To add static entries to the MAC-address table or configure a static MAC address with IGMP snooping
disabled for that address, use the mac-address-table static command. See the “Usage Guidelines”
section for information about the no form of this command.
mac-address-table static mac-addr vlan vlan-id {interface type | drop [disable-snooping]}
[dlci dlci | pvc vpi/vci] [auto-learn | disable-snooping] [protocol {ip | ipv6 | ipx | assigned}]
no mac-address-table static mac-addr {vlan vlan-id} {interface type} [disable-snooping] [dlci
dlci | pvc vpi/vci]

Syntax Description

mac-addr

Address to add to the MAC-address table.

vlan vlan-id

Specifies the VLAN to apply the changed aging time; valid values are
from 1 to 4094.

interface type

Specifies the interface type and module/port number.

drop

Drops all traffic that is received from and going to the configured MAC
address in the specified VLAN.

disable-snooping

(Optional) Disables IGMP snooping on the multicast MAC address.

dlci dlci

(Optional) Specifies mapping the DLCI to this MAC address; valid
values are from 16 to 1007.

pvc vpi/vci

(Optional) Specifies mapping the PVC to this MAC address.

auto-learn

(Optional) Updates the entry with the new port; see the “Usage
Guidelines” section for additional information.

protocol

(Optional) Specifies the protocol that is associated with the entry.

ip

Specifies the IP protocol.

ipv6

Specifies the IPv6 protocol.

ipx

Specifies the IPX protocol.

assigned

Specifies assigned protocol bucket accounts for such protocols as
DECnet, Banyan VINES, and AppleTalk.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the no form of this command to do the following:
•

Remove entries that are profiled by the combination of specified entry information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-373

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table static

•

Note that IGMP snooping is not disabled for the specified address.

•

Remove the MAC address to a Frame Relay DLCI or ATM PVC mapping.

The dlci dlci keyword and argument are valid only if Frame Relay encapsulation has been enabled on
the specified interface.
The pvc vpi/vci keyword and arguments are supported on ATM interfaces only.
When specifying the pvc vpi/vci, you must specify both a VPI and a VCI, separated by a slash.
When you install a static MAC address, it is associated with a port. If the same MAC address is seen on
a different port, the entry is updated with the new port if you enter the auto-learn keyword.
The output interface specified must be a Layer 2 IDB and not an SVI.
The ipx keyword is not supported.
You can enter up to 15 interfaces per command entered, but you can enter more interfaces by repeating
the command.
If you do not enter a protocol type, an entry is automatically created for each of the four protocol types.
Entering the no form of this command does not remove system MAC addresses.
When removing a MAC address, entering interface type is optional. For unicast entries, the entry is
removed automatically. For multicast entries, if you do not specify an interface, the entire entry is
removed. You can specify the selected ports to be removed by specifying the interface.
The mac-address-table static mac-addr {vlan vlan-id} {interface type} disable-snooping command
disables snooping on the specified static MAC entry/VLAN pair only. To reenable snooping, you must
first delete the MAC address and then reinstall it using the mac-address-table static mac-addr {vlan
vlan-id} {interface type} command without entering the disable-snooping keyword.
The mac-address-table static mac-addr {vlan vlan-id} drop command cannot be applied to a multicast
MAC address.
To support multipoint bridging and other features, you must also specify the dlci dlci keyword and
argument for Frame Relay interfaces or the pvc vpi/vci keyword and arguments for ATM interfaces as
follows:
Router(config)# mac-address-table static 000C.0203.0405 vlan 101 interface ATM6/1 pvc6/101
Router(config)#

Note

Examples

If you omit the dlci dlci keyword and argument for Frame Relay interfaces, the MAC address is mapped
to the first DLCI circuit that is configured for the specified VLAN on that interface. If you omit the pvc
vpi/vci keyword and arguments for ATM interfaces, the MAC address is mapped to the first PVC circuit
that is configured for the specified VLAN on that interface. To ensure that the MAC address is
configured correctly, we recommend that you always use the dlci dlci and pvc vpi/vci keywords and
arguments on the appropriate interfaces.

This example shows how to add static entries to the MAC-address table:

Router(config)# mac-address-table static 0050.3e8d.6400 vlan 100 interface fastethernet5/7
Router(config)#

This example shows how to configure a static MAC address with IGMP snooping disabled for a
specified address:
Router(config)# mac-address-table static 0050.3e8d.6400 vlan 100 interface fastethernet5/7 disable-snooping
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-374

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac-address-table static

This example shows how to add static entries to the MAC address table for an ATM PVC circuit and for
a Frame Relay DLCI circuit:
Router(config)# mac-address-table static 0C01.0203.0405 vlan 101 interface ATM6/1 pvc 6/101
Router(config)# mac-address-table static 0C01.0203.0406 vlan 202 interface POS4/2 dlci 200
Router(config)#

Related Commands

Command

Description

show
mac-address-table

Displays information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-375

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac-address-table synchronize

mac-address-table synchronize
To synchronize the Layer 2 MAC address table entries across the PFC and all the DFCs, use the
mac-address-table synchronize command. To disable MAC address table synchronization or reset the
activity timer, use the no form of this command.
mac-address-table synchronize [activity-time seconds]
no mac-address-table synchronize [activity-time seconds]

Syntax Description

activity-time seconds

Defaults

The default settings are as follows:

(Optional) Specifies the activity timer interval: valid values are 160, 320,
and 640 seconds.

•

Disabled.

•

Enabled for WS-X6708-10GE.

•

activity-time is 160 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

We recommend that you configure the activity time so that at least two activity times exist within the
regular Layer 2 aging time (or within the aging time used for VLANs in distributed EtherChannels if this
feature is used only for distributed EtherChannels). If at least two activity times do not exist within the
aging time, then an error message is displayed.

Examples

This example shows how to specify the activity timer interval:
Router(config)# mac-address-table synchronize activity-time 320
Router(config)#

Related Commands

Command

Description

show
mac-address-table
synchronize statistics

Displays information about the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-376

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac packet-classify

mac packet-classify
To classify Layer 3 packets as Layer 2 packets, use the mac packet-classify command. To return to the
default settings, use the no form of this command.
mac packet-classify
no mac packet-classify

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

PFC3BXL and PFC3B modes support protocol-independent MAC ACL filtering. Protocol-independent
MAC ACL filtering applies MAC ACLs to all ingress traffic types (for example, IPv4 traffic, IPv6
traffic, and MPLS traffic, in addition to MAC-layer traffic).
You can configure these interface types for multilayer MAC ACL QoS filtering:
•

VLAN interfaces without Layer 3 addresses

•

Physical LAN ports that are configured to support EoMPLS

•

Logical LAN subinterfaces that are configured to support EoMPLS

The ingress traffic that is permitted or denied by a MAC ACL on an interface configured for multilayer
MAC ACL QoS filtering is processed by egress interfaces as MAC-layer traffic. You cannot apply
egress IP ACLs to traffic that was permitted or denied by a MAC ACL on an interface configured for
multilayer MAC ACL QoS filtering.
Microflow policing does not work on interfaces that have the mac packet-classify command enabled.
The mac packet-classify command causes the Layer 3 packets to be classified as Layer 2 packets and
disables IP classification.
Traffic is classified based on 802.1Q CoS, trunk VLAN, EtherType, and MAC addresses.

Examples

This example shows how to classify incoming and outgoing Layer 3 packets as Layer 2 packets:
Router(config-if)# mac packet-classify
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-377

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mac packet-classify

This example shows how to disable the classification of incoming and outgoing Layer 3 packets as
Layer 2 packets:
Router(config-if)# no mac packet-classify
Router(config-if)#

Related Commands

Command

Description

mac packet-classify
use vlan

Enables VLAN-based QoS filtering in the MAC ACLs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-378

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mac packet-classify use vlan

mac packet-classify use vlan
To enable VLAN-based QoS filtering in the MAC ACLs, use the mac packet-classify use vlan
command. To return to the default settings, use the no form of this command.
mac packet-classify use vlan
no mac packet-classify use vlan

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

PFC3BXL and PFC3B modes support protocol-independent MAC ACL filtering. Protocol-independent
MAC ACL filtering applies MAC ACLs to all ingress traffic types (for example, IPv4 traffic, IPv6
traffic, and MPLS traffic, in addition to MAC-layer traffic).
You must use the no mac packet-classify use vlan command to disable the VLAN field in the Layer 2
key if you want to apply QoS to the Layer 2 SAP-encoded packets (for example, IS-IS and IPX).
QoS does not allow policing of non-ARPA Layer 2 packets (for example, IS-IS and IPX) if the VLAN
field is enabled.

Examples

This example shows how to enable VLAN-based QoS filtering in the MAC ACLs:
Router(config)# mac packet-classify use vlan
Router(config)

This example shows how to disable VLAN-based QoS filtering in the MAC ACLs:
Router(config)# no mac packet-classify use vlan
Router(config)

Related Commands

Command

Description

mac packet-classify

Classifies Layer 3 packets as Layer 2 packets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-379

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

match

match
To specify the match clause by selecting one or more ACLs for a VLAN access-map sequence, use the
match subcommand. The match clause specifies the IP, IPX, or MAC ACLs for traffic filtering. To
remove the match clause, use the no form of this command.
match {ip address {acl-number | acl-name}} | {ipx address {acl-number | acl-name} | {mac
address acl-name}}
no match {ip address {acl-number | acl-name}} | {ipx address {acl-number | acl-name} | {mac
address acl-name}}

Syntax Description

ip address acl-number

Selects one or more IP ACLs for a VLAN access-map sequence;
valid values are from 1 to 199 and from 1300 to 2699.

ip address acl-name

Selects an IP ACL by name.

ipx address acl-number Selects one or more IPX ACLs for a VLAN access-map sequence;
valid values are from 800 to 999.
ipx address acl-name

Selects an IPX ACL by name.

mac address acl-name

Selects one or more MAC ACLs for a VLAN access-map sequence.

Defaults

This command has no default settings.

Command Modes

VLAN access-map submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The match ipx address and match mac address commands are not supported for VACLs on WAN
interfaces.
IPX ACLs that are used in VACLs can only specify the IPX protocol type, the source network, the
destination network, and the destination host address.
The MAC sequence is not effective for IP or IPX packets. IP packets and IPX packets should be access
controlled by IP and IPX match clauses.
You cannot configure VACLs on secondary VLANs. The secondary VLAN inherits all features that are
configured on the primary VLAN.
These subcommands appear in the CLI help but are not supported by the PFC QoS:
•

match cos

•

match any

•

match class-map

•

match destination-address

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-380

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
match

•

match input-interface

•

match qos-group

•

match source-address

Refer to the Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release
12.2ZY for additional configuration guidelines and restrictions.
Refer to the Cisco IOS Release 12.2 Command Reference publication for additional match command
information.

Examples

This example shows how to define a match clause for a VLAN access map:
Router(config)# vlan access-map ganymede 10
Router(config-access-map)# match ip address 13
Router(config-access-map)#

Related Commands

Command

Description

action

Sets the packet action clause.

port access-map

Creates a port access map or enters port access-map command mode.

show vlan access-map

Displays the contents of a VLAN-access map.

vlan access-map

Creates a VLAN access map or enters VLAN access-map command mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-381

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

match protocol

match protocol
To configure the match criteria for a class map on the basis of the specified protocol, use the match
protocol command. To remove the protocol-based match criteria from a class map, use the no form of
this command.
match protocol {ip | ipv6}
no match protocol {ip | ipv6}

Syntax Description

ip

Specifies protocol matching on IP packets.

ipv6

Specifies protocol matching on IPv6 packets.

Defaults

This command has no default settings.

Command Modes

Class-map submode

Command History

12.2(18)ZY

Usage Guidelines

The match protocol class-map subcommand configures NBAR and sends all traffic on the port, both
ingress and egress, to be processed in the software on the PISA.

Support for this command was introduced.

For class-based weighted fair queueing, you define traffic classes based on match criteria including
protocols, ACLs, input interfaces, QoS labels, and EXP field values. Packets satisfying the match
criteria for a class constitute the traffic for that class.
The match protocol command specifies the name of a protocol to be used as the match criteria against
which packets are checked to determine if they belong to the class specified by the class map.
To use the match protocol command, you must first enter the class-map command to specify the name
of the class to which you want to establish the match criteria.
If you specify more than one command in a class map, only the last command entered applies. The last
command overrides the previously entered commands.
This command can be used to match protocols that are known to the NBAR feature. For a list of protocols
currently supported by NBAR, see the “Classification” section of the Cisco IOS Quality of Service
Solutions Configuration Guide.

Examples

This example shows how to specify a class map called ip and configure the IP as a match criterion for it:
Router(config)# class-map ip
Router(config-cmap)# match protocol ip

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-382

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
maxconns (real server configuration submode)

maxconns (real server configuration submode)
To limit the number of active connections to the real server, use the maxconns command. To change the
maximum number of connections to the default settings, use the no form of this command.
maxconns number-conns
no maxconns

Syntax Description

number-conns

Defaults

0

Command Modes

Real server configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Maximum number of active connections on the real server at any one point
in time; valid values are from 0 to 4294967295.

Usage Guidelines

If you do not specify the number-conns value, the default value is 0, which means that the maximum
number of connections to the real server are not monitored.

Examples

This example shows how to limit the number of active connections to the real server:
Router(config-if)# maxconns 49672
Router(config-if)#

This example shows how to revert to the default settings:
Router(config-if)# no maxconns
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-383

Chapter 2
maxconns (real server configuration submode)

Related Commands

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

Command

Description

faildetect numconns

Specifies the conditions that indicate a server failure.

inservice (real server)

Enables the real server for use by the Cisco IOS SLB feature.

reassign

Defines the number of consecutive number of SYNs for a new connection
that will go unanswered before the connection is attempted to a different
real server.

retry

Defines the amount of time that must elapse before a connection is
attempted to a failed server.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-384

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
maximum-paths

maximum-paths
To control the maximum number of parallel routes that an IP routing protocol can support, use the
maximum-paths command. To restore the default settings, use the no form of this command.
maximum-paths maximum
no maximum-paths

Syntax Description

maximum

Defaults

The defaults are as follows:

Maximum number of parallel routes that an IP routing protocol installs in a
routing table; valid values are from 1 to 8.

•

BGP has one path.

•

All other IP routing protocols have four paths.

Command Modes

Routing protocol configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to allow a maximum of two paths to a destination:
Router(config-router)# maximum-paths 2
Router(config-router)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-385

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mdix auto

mdix auto
To enable automatic media-dependent interface with crossover detection, use the mdix auto command.
To turn automatic detection off, use the no form of this command.
mdix auto
no mdix auto

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the following modules only:
•

WS-X6748-GE-TX

•

WS-SUP720 (copper ports only)

•

WS-SUP720-10G (copper ports only)

•

WS-SUP32 (copper ports only)

•

WS-X6148A-RJ45

•

WS-X6148A-GE-TX

•

WS-X6548-RJ45

•

WS-X6548-RJ21

•

WS-X6548-GE-TX

•

WS-X6516-GE-TX

•

WS-X6148-GE-TX

•

WS-X6148X2-RJ45

•

WS-X6196-RJ21

•

The copper SFP (GLC-T) and the copper GBIC (WS-G5483) also support automatic MDIX when
used in one of the modules that support these tranceivers.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-386

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mdix auto

Examples

This example shows how to enable automatic media-dependent interface with crossover detection:
Router# mdix auto
Router#

This example shows how to disable automatic media-dependent interface with crossover detection:
Router# no mdix auto
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-387

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mdt data

mdt data
To configure the multicast group address range for data MDT groups, use the mdt data command. To
disable this function, use the no form of this command.
mdt data group-address-range wildcard-bits [threshold threshold-value] [list access-list]
no mdt data group-address-range wildcard-bits [threshold threshold-value] [list access-list]

Syntax Description

group-address-range

Multicast group address range; valid values are from 224.0.0.1 to
239.255.255.255.

wildcard-bits

Wildcard bits to be applied to the multicast group address range.

threshold threshold-value

(Optional) Defines the bandwidth threshold value; valid values are from
1 through 4294967.

list access-list

(Optional) Defines the access-list name or number.

Defaults

Disabled

Command Modes

VRF configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

A data MDT group can include a maximum of 256 multicast groups per VPN. Multicast groups that are
used to create the data MDT group are dynamically chosen from a pool of configured IP addresses.
This command configures a range of alternative multicast destination addresses for the tunnel header.
The destination address chosen depends on the traffic profile (the source and destination match the
specified access list and the rate of the traffic has exceeded the bandwidth threshold value).

Examples

This example shows how to configure the multicast group address range for data MDT groups:
Router(config-vrf)# mdt data 232.0.1.0 0.0.0.255 threshold 500 list 101
Router(config-vrf)#

Related Commands

Command

Description

mdt default

Configures a default MDT group for a VRF instance.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-388

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mdt default

mdt default
To configure a default MDT group for a VRF instance, use the mdt default command in VRF
configuration mode. To disable this function, use the no form of this command.
mdt default group-address
no mdt default group-address

Syntax Description

group-address

Defaults

Disabled

Command Modes

VRF configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

IP address of the default MDT group.

The default MDT group must be the same group that is configured on all provider-edge routers that
belong to the same VPN.
The group-address serves as an identifier for the community because provider-edge routers that are
configured with the same group address become members of the group, allowing them to receive packets
that are sent by each other.
If you use the SSM protocol for the default MDT, the source IP address is used to source the BGP
sessions.
A tunnel interface is created when you enter this command. By default, the destination address of the
tunnel header is the group-address argument.

Examples

This example shows how to configure a default MDT group for a VRF instance:
Router(config-vrf)# mdt default 232.0.0.1
Router(config-vrf)#

Related Commands

Command

Description

mdt data

Configures the multicast group address range for data MDT groups.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-389

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mdt log-reuse

mdt log-reuse
To enable the recording of data MDT reuse, use the mdt log-reuse command in VRF configuration
mode. To disable this function, use the no form of this command.
mdt log-reuse
no mdt log-reuse

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

VRF configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mdt log-reuse command generates a syslog message whenever a data MDT is reused.

Examples

This example shows how to enable the MDT log reuse function:
Router(config-vrf)# mdt log-reuse
Router(config-vrf)#

Related Commands

Command

Description

mdt data

Configures the multicast group address range for data MDT groups.

mdt default

Configures a default MDT group for a VRF instance.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-390

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
media-type

media-type
To select the connector to use for the dual-mode uplink port, use the media-type command. To return
to the default settings, use the no form of this command.
media-type {rj45 | sfp}
no media-type

Syntax Description

rj45

Uses an RJ-45 connector.

sfp

Uses an SFP connector.

Defaults

sfp

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Port 1 has a small form-factor pluggable (SFP) connector.
Port 2 has an RJ-45 connector and an SFP connector. You must configure the port to use one connector
or the other.

Examples

This example shows how to configure port 2 in slot 5 to use the RJ-45 connector:
Router(config)# interface gigabitethernet 5/2
Router(config-if)# media-type rj45

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-391

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mkdir disk0:

mkdir disk0:
To create a new directory in a flash file system, use the mkdir disk0: command.
mkdir disk0:

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is valid only on flash file systems.
After you enter the mkdir disk0: command, you are prompted to enter the new directory filename.
To check your entry, enter the dir command.
To remove a directory, enter the rmdir command.

Examples

This example shows how to create a directory named newdir:
Router# mkdir disk0:
Create directory filename [ ]? newdir
Created dir disk0: newdir
Router#

Related Commands

Command

Description

cd

Changes the default directory or file system.

dir

Displays a list of files on a file system.

rmdir

Removes an existing directory in a Class C flash file system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-392

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls aclmerge algorithm

mls aclmerge algorithm
To select the type of ACL merge method to use, use the mls aclmerge algorithm command.
mls aclmerge algorithm {bdd | odm}

Syntax Description

bdd

Specifies the BDD-based algorithm.

odm

Specifies the ODM-based algorithm.

Defaults

bdd

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The BDD-based ACL merge uses Boolean functions to condense entries into a single merged list of
TCAM entries that can be programmed into the TCAM.
You cannot disable the ODM-based ACL merge on Catalyst 6500 series switches.
The ODM-based ACL merge uses an order-dependent merge algorithm to process entries that can be
programmed into the TCAM.

Note

The ODM-based ACL merge supports both security ACLs and ACLs that are used for QoS filtering.
If you change the algorithm method, the change is not retroactive. For example, ACLs that have had the
merge applied are not affected. The merge change applies to future merges only.
Use the show fm summary command to see the status of the current merge method.

Examples

This example shows how to select the BDD-based ACL to process ACLs:
Router(config)# mls aclmerge algorithm bdd
The algorithm chosen will take effect for new ACLs which are being applied, not
for already applied ACLs.
Router(config)

This example shows how to select the ODM-based ACL merge to process ACLs:
Router(config)# mls aclmerge algorithm odm
The algorithm chosen will take effect for new ACLs which are being applied, not
for already applied ACLs.
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-393

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls aclmerge algorithm

Related Commands

Command

Description

show fm summary

Displays a summary of feature manager information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-394

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls acl tcam default-result

mls acl tcam default-result
To set the default action during the ACL TCAM update, use the mls acl tcam default-result command.
To return to the default settings, use the no form of this command.
mls acl tcam default-result {permit | deny | bridge}
no mls acl tcam default-result

Syntax Description

permit

Permits all traffic.

deny

Denies all traffic.

bridge

Bridges all Layer 3 traffic up to the rendezvous point.

Defaults

deny

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In the transition time between when an existing ACL is removed and a new ACL is applied, a default
deny is programmed in the hardware. Once the new ACL has been applied completely in the hardware,
the default deny is removed.
Use the mls acl tcam default-result permit command to permit all traffic in the hardware or bridge all
traffic to the software during the transition time.

Examples

This example shows how to permit all traffic to pass during the ACL TCAM update:
Router(config)# mls acl tcam default-result permit
Router(config)#

This example shows how to deny all traffic during the ACL TCAM update:
Router(config)# mls acl tcam default-result deny
Router(config)#

This example shows how to bridge all Layer 3 traffic up to the rendezvous point during the ACL TCAM
update:
Router(config)# mls acl tcam default-result bridge
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-395

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls acl tcam share-global

mls acl tcam share-global
To enable sharing of the global default ACLs, use the mls acl tcam share-global command. To turn off
sharing of the global defaults, use the no form of this command.
mls acl tcam share-global
no mls acl tcam share-global

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable sharing of the global default ACLs:
Router(config)# mls acl tcam share-global
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-396

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls aging fast

mls aging fast
To configure the fast-aging time for unicast entries in the Layer 3 table, use the mls aging fast command.
To restore the MLS fast-aging time to the default settings, use the no form of this command.
mls aging fast [{threshold packet-count} [{time seconds}]]
mls aging fast [{time seconds} [{threshold packet-count}]]
no mls aging fast

Syntax Description

Defaults

threshold
packet-count

(Optional) Specifies the packet count of the fast-aging threshold for
Layer 3 fast aging; valid values are from 1 to 128.

time seconds

(Optional) Specifies how often entries are checked; valid values are
from 1 to 128 seconds.

The defaults are as follows:
•

Fast aging is disabled.

•

If fast aging is enabled, the default packet-count value is 100 packets and the seconds default is
32 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command has no effect when you configure sampled NetFlow. You must disable sampled NetFlow
to allow this command to take effect.

Examples

This example shows how to configure the MLS fast-aging threshold:
Router(config)# mls aging fast threshold 50
Router(config)#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-397

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls aging long

mls aging long
To configure the long-aging time for unicast entries in the Layer 3 table, use the mls aging long
command. To restore the MLS long-aging time to the default settings, use the no form of this command.
mls aging long seconds
no mls aging long

Syntax Description

seconds

Defaults

1920 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Layer 3 long-aging timeout; valid values are from 64 to 1920 seconds.

Usage Guidelines

This command has no effect when you configure sampled NetFlow. You must disable sampled NetFlow
to allow this command to take effect.

Examples

This example shows how to configure the MLS long-aging threshold:
Router(config)# mls aging long 800
Router(config)#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-398

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls aging normal

mls aging normal
To configure the normal-aging time for unicast entries in the Layer 3 table, use the mls aging normal
command. To restore the MLS normal-aging time to the default settings, use the no form of this
command.
mls aging normal seconds
no mls aging normal

Syntax Description

seconds

Defaults

300 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Normal aging timeout for Layer 3; valid values are from 32 to 4092 seconds.

Usage Guidelines

This command has no effect when you configure sampled NetFlow. You must disable sampled NetFlow
to allow this command to take effect.

Examples

This example shows how to configure the MLS normal-aging threshold:
Router(config)# mls aging normal 200
Router(config)#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-399

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls cef maximum-routes

mls cef maximum-routes
To limit the maximum number of the routes that can be programmed in the hardware allowed per
protocol, use the mls cef maximum-routes command. To return to the default settings, use the no form
of this command.
mls cef maximum-routes {ip maximum-routes} | {ip-multicast maximum-routes} |
{ipv6 maximum-routes} | {mpls maximum-routes}
no mls cef maximum-routes {ip | ip-multicast | ipv6 | mpls}

Syntax Description

Defaults

ip

Specifies the maximum number of IP routes.

maximum-routes

Maximum number of the routes that can be programmed in the hardware
allowed per protocol; see the “Usage Guidelines” section for valid values.

ip-multicast

Specifies the maximum number of multicast routes.

ipv6

Specifies the maximum number of IPv6 routes.

mpls

Specifies the maximum number of MPLS labels.

The defaults are as follows:
•

For XL-mode systems:
– IPv4 unicast and MPLS—512,000 routes
– IPv6 multicast/unicast and IPv4 multicast—256,000 routes

•

For non-XL mode systems:
– IPv4 unicast and MPLS—192,000 routes
– IPv6 multicast/unicast and IPv4 multicast—32,000 routes

Note

The size of the global Internet routing table plus any local routes might exceed the non-XL mode default
partition sizes. See the “Usage Guidelines” section for additional information.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-400

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls cef maximum-routes

Usage Guidelines
Note

If you copy a configuration file that contains the MLS CEF maximum routes into the startup-config file
and reload the Catalyst 6500 series switch, the Catalyst 6500 series switch reloads after it reboots.
The mls cef maximum-routes command limits the maximum number of the routes that can be
programmed in the hardware. If routes are detected that exceed the limit for that protocol, an exception
condition is generated.
The XL and non-XL modes are based on the type of PFC module that is installed in your system. You
cannot configure the mode except by the installed hardware. The Supervisor Engine 32 PISA contains a
PFC3B and is considered a non-XL mode system.
The valid values for max-routes are as follows:

Note

•

IP and MPLS— Up to 239,000 routes

•

IP-multicast and IPv6 multicast/unicast—Up to 119,000 routes

The maximum values that you are permitted to configure is not fixed but varies depending on the values
that are allocated for other protocols.
An example of how to enter the maximum routes argument is as follows:
Router(config)# mls cef maximum-routes ip 4

where 4 is 4096 IP routes (1024 x4 = 4096).
The new configurations are applied after a system reload only and do not take effect if a switchover
occurs.
In RPR mode, if you change and save the maximum-routes configuration, the redundant supervisor
engine reloads when it becomes active from either a switchover or a system reload. The reload occurs
5 minutes after the supervisor engine becomes active.
Use the show mls cef maximum-routes command to view the current maximum routes system
configuration.

Examples

This example shows how to set the maximum number of routes that are allowed per protocol:
Router(config)# mls cef maximum-routes ip 100
Router(config)#

This example shows how to return to the default setting for a specific protocol:
Router(config)# no mls cef maximum-routes ip
Router(config)#

Related Commands

Command

Description

show mls cef
maximum-routes

Displays the current maximum-route system configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-401

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls cef tunnel fragment

mls cef tunnel fragment
To allow tunnel fragmentation, use the mls cef tunnel fragment command. To return to the default
settings, use the no form of this command.
mls cef tunnel fragment
no mls cef tunnel fragment

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enable tunnel fragmentation, if the size of the packets that are going into a tunnel interface
exceed the MTU, the packet is fragmented. The packets that are fragmented are reassembled at the
destination point.

Examples

This example shows how to allow tunnel fragmentation:
Router(config)# mls cef tunnel fragment
Router(config)#

This example shows how to return to the default setting:
Router(config)# no mls cef tunnel fragment
Router(config)#

Related Commands

Command

Description

show mls cef tunnel
fragment

Displays the operational status of tunnel fragmentation.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-402

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls erm priority

mls erm priority
To assign the priorities to define an order in which protocols attempt to recover from the exception
status, use the mls erm priority command. To return to the default settings, use the no form of this
command.
mls erm priority {ipv4 value} {ipv6 value} {mpls value}
no mls erm priority {ipv4} {ipv6} {mpls}

Syntax Description

Defaults

ipv4

Prioritizes the IPv4 protocol.

value

Priority value; valid values are from 1 to 3.

ipv6

Prioritizes the IPv6 protocol.

mpls

Prioritizes the MPLS protocol.

The default settings are as follows:
•

ipv4 is 1.

•

ipv6 is 2.

•

mpls is 3.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

A lower value indicates a higher priority.
When a protocol sees a FIB table exception, the protocol notifies the FIB ERM manager. The FIB ERM
manager periodically polls the FIB table exception status and decides which protocol gets priority over
another protocol when multiple protocols are running under the exception. Only one protocol can
attempt to recover from an exception at any time.
If there is sufficient FIB space, the protocol with the highest priority tries to recover first. Other
protocols under the exception do not start to recover until the previous protocol completes the recovery
process by reloading the appropriate FIB table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-403

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls erm priority

Examples

This example shows how to set the ERM exception-recovery priority:
Router(config)# mls erm priority ipv4 1 ipv6 2 mpls 3
Router(config)#

This example shows how to return to the default setting:
Router(config)# no mls erm priority ipv4 ipv6 mpls
Router(config)#

Related Commands

Command

Description

show mls cef exception Displays information about the CEF exception.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-404

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls exclude protocol

mls exclude protocol
To specify the interface protocol to exclude from shortcutting, use the mls exclude protocol command.
To remove a prior entry, use the no form of this command.
mls exclude protocol {{both | tcp | udp}{port port-number}}
no mls exclude

Syntax Description

both

Specifies both UDP and TCP.

tcp

Excludes TCP interfaces from shortcutting.

udp

Specifies UDP interfaces from shortcutting.

port
port-number

Specifies the port number; valid values are from 1 to 65535.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to configure MLS to exclude UDP on port 69:
Router(config)# mls exclude protocol udp port 69
Router(config)#

Related Commands

Command

Description

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-405

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls exclude protocol

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-406

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls flow

mls flow
To configure the flow mask for NDE, use the mls flow command. To restore the flow mask to the default,
use the no form of this command.
mls flow {{ip | ipv6} {destination | destination-source | full | interface-destination-source |
interface-full | source}}
no mls flow {ip | ipv6}

Syntax Description

ip

Enables the flow mask for MLS IP packets.

ipv6

Enables the flow mask for MLS IPv6 packets.

destination

Uses the destination IP address as the key to the Layer 3 table.

destination-source

Uses the destination and the source IP address as the key to the Layer 3
table.

full

Uses the source and destination IP address, the IP protocol (UDP or
TCP), and the source and destination port numbers as the keys to the
Layer 3 table.

interface-destination- Uses all the information in the destination and source flow mask and the
source
source VLAN number as the keys to the Layer 3 table.
interface-full

Uses all the information in the full flow mask and the source VLAN
number as the keys to the Layer 3 table.

source

Uses all the information in the source flow mask only.

Defaults

The NDE flow mask is null.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command collects statistics for the supervisor engine.

Examples

This example shows how to set the minimum flow mask for an extended access list for MLS IP:
Router(config)# mls flow ip full
Router(config)#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-407

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip

mls ip
To enable MLS IP for the internal router on the interface, use the mls ip command. To disable MLS IP
on the interface, use the no form of this command.
mls ip
no mls ip

Syntax Description

This command has no arguments or keywords.

Defaults

Multicast is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable shortcuts for MLS IP:
Router(config-if)# mls ip
Router(config-if)#

Related Commands

Command

Description

mls rp ip (interface
configuration mode)

Allows the external systems to enable MLS IP on a specified interface.

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-408

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip acl port expand

mls ip acl port expand
To enable ACL-specific features for Layer 4, use the mls ip acl port expand command. To disable the
ACL-specific Layer 4 features, use the no form of this command.
mls ip acl port expand
no mls ip acl port expand

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable the expansion of ACL logical operations on Layer 4 ports:
Router(config)# mls ip acl port expand
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-409

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip cef accounting per-prefix

mls ip cef accounting per-prefix
To enable MLS per-prefix accounting, use the mls ip cef accounting per-prefix command. To disable
MLS per-prefix accounting, use the no form of this command
mls ip cef accounting per-prefix prefix-entry prefix-entry-mask [instance-name]
no mls ip cef accounting per-prefix

Syntax Description

prefix

Prefix entry in the format A.B.C.D.

prefix-entry-mask

Prefix entry mask in the format A.B.C.D.

instance-name

(Optional) VPN routing and forwarding instance name.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Per-prefix accounting collects the adjacency counters used by the prefix. When the prefix is used for
accounting, the adjacency cannot be shared with other prefixes. You can use per-prefix accounting to
account for the packets sent to a specific destination.

Examples

This example shows how to enable MLS per-prefix accounting:
Router(config)# mls ip cef accounting per-prefix 172.20.52.18 255.255.255.255
Router(config)#

This example shows how to disable MLS per-prefix accounting:
Router(config)# no mls ip cef accounting per-prefix
Router(config)#

Related Commands

Command

Description

show mls cef ip
accounting per-prefix

Displays all the prefixes that are configured for the statistic collection.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-410

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip cef load-sharing

mls ip cef load-sharing
To configure the CEF load balancing, use the mls ip cef load-sharing command. To return to the default
settings, use the no form of this command.
mls ip cef load-sharing [full [exclude-port {destination | source}]] [simple]
no mls ip cef load-sharing

Syntax Description

full

(Optional) Sets the CEF load balancing to include source and destination
Layer 4 ports and source and destination IP addresses (Layer 3).

exclude-port
destination

(Optional) Excludes the destination Layer 4 ports and source and destination
IP addresses (Layer 3) from the load-balancing algorithm.

exclude-port
source

(Optional) Excludes the source Layer 4 ports and source and destination IP
addresses (Layer 3) from the load-balancing algorithm.

simple

(Optional) Sets the CEF load balancing for single-stage load sharing.

Defaults

Source and destination IP address and universal identification

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mls ip cef load-sharing command affects the IPv4, the IPv6, and the MPLS forwardings.
The mls ip cef load-sharing command is structured as follows:
•

mls ip cef load-sharing full—Uses Layer 3 and Layer 4 information with multiple adjacencies.

•

mls ip cef load-sharing full simple—Uses Layer 3 and Layer 4 information without multiple
adjacencies.

•

mls ip cef load-sharing simple—Uses Layer 3 information without multiple adjacencies.

For additional guidelines, refer to the Catalyst Supervisor Engine 32 PISA Cisco IOS Software
Configuration Guide—Release 12.2ZY.

Examples

This example shows how to set load balancing to include Layer 3 and Layer 4 ports with multiple
adjacencies:
Router(config)# mls ip cef load-sharing full
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-411

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip cef load-sharing

This example shows how to set load balancing to exclude the destination Layer 4 ports and source and
destination IP addresses (Layer 3) from the load-balancing algorithm:
Router(config)# mls ip cef load-sharing full exclude-port destination
Router(config)#

This example shows how to set load balancing to exclude the source Layer 4 ports and source and
destination IP addresses (Layer 3) from the load-balancing algorithm:
Router(config)# mls ip cef load-sharing full exclude-port source
Router(config)#

This example shows how to return to the default setting:
Router(config)# no mls ip cef load-sharing
Router(config)#

Related Commands

Command

Description

show mls cef ip

Displays the IP entries in the MLS-hardware Layer 3-switching table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-412

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip cef rate-limit

mls ip cef rate-limit
To rate-limit CEF-punted data packets, use the mls ip cef rate-limit command. To disable the
rate-limited CEF-punted data packets, use the no form of this command.
mls ip cef rate-limit pps
no mls ip cef rate-limit

Syntax Description

pps

Defaults

No rate limit is configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Number of data packets; valid values are from 0 to 1000000.

Certain denial-of-service attacks target the route processing engines of routers. Certain packets that
cannot be forwarded by the PFC are directed to the PISA for processing. Denial-of-service attacks can
overload the route processing engine and cause routing instability when running dynamic routing
protocols. You can use the mls ip cef rate-limit command to limit the amount of traffic that is sent to
the PISA to prevent denial-of-service attacks against the route processing engine.
This command rate limits all CEF-punted data packets including the following:
•

Data packets going to the local interface IP address

•

Data packets requiring ARP

Setting the rate to a low value could impact the packets that are destined to the IP addresses of the local
interfaces and the packets that require ARP. You should use this command to limit these packets to a
normal rate and to avoid abnormal incoming rates.
For additional guidelines, refer to the Catalyst Supervisor Engine 32 PISA Cisco IOS Software
Configuration Guide—Release 12.2ZY.

Examples

This example shows how to enable and set rate limiting:
Router(config)# mls ip cef rate-limit 50000
Router(config)#

Related Commands

Command

Description

show mls cef ip

Displays the IP entries in the MLS-hardware Layer 3-switching table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-413

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip cef rpf hw-enable-rpf-acl

mls ip cef rpf hw-enable-rpf-acl
To enable hardware uRPF for packets matching the deny ace when uRPF with ACL is enabled, use the
mls ip cef rpf hw-enable-rpf-acl command. To disable hardware uRPF when RPF and ACL are
enabled, use the no form of this command.
mls ip cef rpf hw-enable-rpf-acl
no mls ip cef rpf hw-enable-rpf-acl

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enter the mls ip cef rpf hw-enable-rpf-acl command, when the uRPF with ACL is
specified, packets that are permitted by the uRPF ACL are forwarded in hardware and the denied packets
are sent to the PISA for the uRPF check. This command enables hardware forwarding with the uRPF
check for the packets that are denied by the uRPF ACL. However in this case packets permitted by uRPF
ACL are sent to the PISA for forwarding.
uRPF is not supported on PVLAN host ports.

Examples

This example shows how to enable hardware uRPF when RPF and ACL are enabled:
Router(config)# mls ip cef rpf hw-enable-rpf-acl
Router(config)#

This example shows how to disable hardware uRPF when RPF and ACL are enabled:
Router(config)# no mls ip cef rpf hw-enable-rpf-acl
Router(config)#

Related Commands

Command

Description

ip verify unicast
source reachable-via
{any | rx}

Enables and configures RPF checks with ACL.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-414

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip cef rpf interface-group

mls ip cef rpf interface-group
To define an interface group in the RPF-VLAN table, use the mls ip cef rpf interface-group command.
To delete the interface group, use the no form of this command.
mls ip cef rpf interface-group group-number interface1 interface2 interface3 [...]
no mls ip cef rpf interface-group group-number interface1 interface2 interface3 [...]

Syntax Description

group-number

Interface group number; valid values are from 1 to 4.

interface

Interface number; see the “Usage Guidelines” section for formatting
guidelines.

...

(Optional) Additional interface numbers; see the “Usage Guidelines”
section for additional information.

Defaults

No groups are configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

A single interface group contains three to six interfaces. You can configure up to four interface groups.
For each interface group, the first four entries are installed in the hardware RPF-VLAN table.
Enter the interface as interface-typemod/port.
Separate each interface entry with a space. You do not have to include a space between the interface-type
and the mod/port arguments. See the “Examples” section for a sample entry.

Examples

This example shows how to define an interface group:
Router(config)# mls ip cef rpf interface-group 0 F2/1 F2/2 F2/3 F2/4 F2/5 F2/6
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-415

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip cef rpf multipath

mls ip cef rpf multipath
To configure the RPF modes, use the mls ip cef rpf multipath command. To return to the default
settings, use the no form of this command.
mls ip cef rpf multipath {interface-group | punt | pass}

Syntax Description

interface-group

Disables the RPF check for packets coming from multiple path routes;
see the “Usage Guidelines” section for additional information.

punt

Redirects the RPF-failed packets to the route processor for multiple
path prefix support.

pass

Disables the RPF check for packets coming from multiple path routes.

Defaults

punt

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-group mode is similar to the pass mode but utilizes the RPF_VLAN global table for the
RPF check. Packets from other multiple path prefixes always pass the RPF check.
You enter the mls ip cef rpf multipath interface-group command to define an RPF_VLAN table
interface group. One interface group contains from three to six interfaces, and you can configure up to
four interface groups. For each interface group, the first four entries are installed in the hardware
RPF_VLAN table. For the prefix that has more than three multiple paths, and all paths except two are
part of that interface group, the FIB entry of that prefix uses this RPF_VLAN entry.

Examples

This example shows how to redirect the RPF-failed packets to the route processor for multiple path
prefix support:
Router(config)# mls ip cef rpf multipath interface-group
Router(config)#

Related Commands

Command

Description

show mls cef ip

Displays the IP entries in the MLS-hardware Layer 3-switching table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-416

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip delete-threshold

mls ip delete-threshold
To delete the configured ACL thresholds, use the mls ip delete-threshold command.
mls ip delete-threshold acl-num

Syntax Description

acl-num

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Reflective ACL number; valid values are from 1 to 10000.

Usage Guidelines

The mls ip delete-threshold command is active only when you enable the mls ip reflexive ndr-entry
tcam command.

Examples

This example shows how to delete an ACL threshold:
Router(config)# mls ip delete-threshold 223
Router(config)#

Related Commands

Command

Description

mls ip
install-threshold

Installs the configured ACL thresholds.

mls ip reflexive
ndr-entry tcam

Enables the shortcuts in TCAM for the reflexive TCP/UDP entries when
installed by the NDR.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-417

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip directed-broadcast

mls ip directed-broadcast
To enable the hardware switching of the IP-directed broadcasts, use the mls ip directed-broadcast
command. To return to the default settings, use the no form of this command.
mls ip directed-broadcast {exclude-router | include-router}
no mls ip directed-broadcast

Syntax Description

exclude-router

Forwards the IP-directed broadcast packet in the hardware to all hosts in
the VLAN except the router.

include-router

Forwards the IP-directed broadcast packet in the hardware to all hosts in
the VLAN including the router.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The exclude-router and include-router keywords both support hardware switching, but
exclude-router does not send a copy of the hardware-switched packets to the router. If you enter the
include-router keyword, the router does not forward the IP-directed broadcast packet again.
In the default mode, IP-directed broadcast packets are not forwarded in the hardware; they are handled
at the process level by the PISA. The PISA decision to forward or not forward the packet is dependent
on the ip directed-broadcast command configuration.
There is no interaction between the ip directed-broadcast command and the mls ip directed-broadcast
command. The ip directed-broadcast command involves software forwarding, and the mls ip
directed-broadcast command involves hardware forwarding.
MLS IP-directed broadcast supports a secondary interface address.
Any packets that hit the CPU are not forwarded unless you add the ip directed-broadcast command to
the same interface.
You can configure the MLS IP-directed broadcasts on a port-channel interface but not on the physical
interfaces on the port-channel interface. If you want to add a physical interface to a port-channel group,
the physical interface cannot have the MLS IP-directed broadcast configuration. You have to first
remove the configuration manually and then add the physical interface to the channel group. If a physical
interface is already part of a channel group, the CLI will not accept the mls ip directed-broadcast
configuration command on that physical interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-418

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip directed-broadcast

Examples

This example shows how to forward the IP-directed broadcast packet in the hardware to all hosts in the
VLAN with the exception of the router:
Router(config-if)# mls ip directed-broadcast exclude-router
Router(config-if)#

This example shows how to forward the IP-directed broadcast packet in the hardware to all hosts in the
VLAN:
Router(config-if)# mls ip directed-broadcast include-router
Router(config-if)#

Related Commands

Command

Description

show mls cef
adjacency

Displays hardware-switched IP-directed broadcast information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-419

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip inspect

mls ip inspect
To permit traffic through any ACLs that would deny the traffic through other interfaces, use the mls ip
inspect command. To return to the default settings, use the no form of this command.
mls ip inspect acl-name
no mls ip inspect acl-name

Syntax Description

acl-name

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

ACL name.

Usage Guidelines

On a Catalyst 6500 series switch, when interfaces are configured to deny traffic, the CBAC permits
traffic to flow bidirectionally only through the interface that is configured with the ip inspect command.

Examples

This example shows how to permit the traffic through a specific ACL (named deny_ftp_c):
Router(config)# mls ip inspect deny_ftp_c
Router(config)#

Related Commands

Command

Description

ip inspect

Applies a set of inspection rules to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-420

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip install-threshold

mls ip install-threshold
To install the configured ACL thresholds, use the mls ip install-threshold command.
mls ip install-threshold acl-num

Syntax Description

acl-num

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Reflective ACL number; valid values are from 1 to 10000.

Usage Guidelines

The mls ip install-threshold command is active only when you enable the mls ip reflexive ndr-entry
tcam command.

Examples

This example shows how to install an ACL threshold:
Router(config)# mls ip install-threshold 123
Router(config)#

Related Commands

Command

Description

mls ip delete-threshold Deletes configured ACL thresholds.
mls ip reflexive
ndr-entry tcam

Enables the shortcuts in TCAM for the reflexive TCP/UDP entries when
installed by the NDR.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-421

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast (global configuration mode)

mls ip multicast (global configuration mode)
To enable MLS IP and configure the hardware switching globally, use the mls ip multicast command.
To disable MLS IP, use the no form of this command.
mls ip multicast [capability]
mls ip multicast [vrf name] [connected | egress local | mfd | refresh-state | shared-tree-mfd |
threshold ppsec]
no mls ip multicast [vrf]

Syntax Description

capability

(Optional) Exports the information about the egress capability from the
switch processor to the route processor.

vrf name

(Optional) Specifies the VRF name.

connected

(Optional) Installs the interface/mask entries for bridging directly connected
sources to the internal router.

egress local

(Optional) Populates the multicast expansion table with local Layer 3-routed
interfaces.

mfd

(Optional) Enables complete hardware switching.

refresh-state

(Optional) Refreshes the expiration time of the (S,G) entry or the (*,G) entry
with NULL OIF.

shared-tree-mfd (Optional) Enables the complete shortcut for (*,G) flows.
threshold ppsec

Defaults

(Optional) Sets the minimum traffic rate; below this rate, the flow is switched
in the software instead of in the hardware. Valid values are from 10 to
10000 seconds.

The defaults are as follows:

Command Modes

•

Multicast is disabled.

•

Hardware switching is allowed for all eligible multicast routes.

•

connected is enabled.

•

egress local is disabled.

•

mfd is enabled.

•

refresh-state is enabled.

•

shared-tree-mfd is enabled.

Global configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-422

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast (global configuration mode)

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

After you enter the mls ip multicast egress local command, you must perform a system reset for the
configuration to take effect.
When entering the mls ip multicast egress local command, ensure that IPv6 multicast is not enabled.
Since the egress multicast replication performance enhancement feature cannot separately turn on or turn
off IPv4 and IPv6, you cannot have IPv4 and IPv6 multicast enabled when this feature is turned on.
These optional keywords are supported:
•

threshold

•

connected

•

refresh-state

•

shared-tree-mfd

•

mfd

The threshold ppsec optional keyword and argument do not impact flows that are already populated in
the hardware cache.
The expiration time refresh is updated when flow statistics are received from the Catalyst 6500 series
switch (indicating that the traffic is received from the RPF interface).

Examples

This example shows how to enable the MLS IP shortcuts:
Router(config)# mls ip multicast
Router(config)#

This example shows how to enable the hardware switching on a specific multicast route:
Router(config)# mls ip multicast vrf test1
Router(config)#

This example shows how to export the information about egress capability from the switch processor to
the route processor:
Router(config)# mls ip multicast capability
Router(config)#

This example shows how to populate the multicast expansion table with local Layer 3-routed interfaces:
Router(config)# mls ip multicast egress local
Router(config)#

Related Commands

Command

Description

mls rp ip (global
configuration mode)

Enables external systems to establish IP shortcuts to the PISA.

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-423

Chapter 2
mls ip multicast (interface configuration mode)

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast (interface configuration mode)
To enable MLS IP shortcuts on the interface, use the mls ip multicast command. To disable MLS IP
shortcuts on the interface, use the no form of this command.
mls ip multicast
no mls ip multicast

Syntax Description

This command has no arguments or keywords.

Defaults

Multicast is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable the MLS IP shortcuts:
Router(config-if)# mls ip multicast
Router(config-if)#

Related Commands

Command

Description

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-424

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast bidir gm-scan-interval

mls ip multicast bidir gm-scan-interval
To set the RPF scan interval for the Bidir rendezvous point, use the mls ip multicast bidir
gm-scan-interval command. To disable the RPF scan interval for the Bidir rendezvous point, use the no
form of this command.
mls ip multicast bidir gm-scan-interval interval
no mls ip multicast bidir gm-scan-interval

Syntax Description

interval

Defaults

10 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

RPF scan interval for the Bidir rendezvous point; valid values are from
1 to 1000 seconds.

Usage Guidelines

When you set the RPF scan interval for the Bidir rendezvous point, you set the time that the periodic
scan timer updates the RPF in the DF table for all Bidir rendezvous points in the hardware.

Examples

This example shows how to set the RPF scan interval for the Bidir rendezvous point:
Router(config)# mls ip multicast bidir gm-scan-interval 30
Router(config)#

Related Commands

Command

Description

show mls ip multicast
bidir

Displays the Bidir hardware-switched entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-425

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast connected

mls ip multicast connected
To enable the downloading of directly connected subnets globally, use the mls ip multicast connected
command. To disable the downloading of directly connected subnets globally, use the no form of this
command.
mls ip multicast connected
no mls ip multicast connected

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Do not create directly connected subnets for the following cases:
•

To make more room available in the FIB TCAM

•

The switch is the first-hop router for a source

•

The entries are for Bidir, SSM, and DM mode groups

In these cases, if you enable the downloading of directly connected subnets, the directly connected
source hits the MMLS (*,G) entry and is switched using the MMLS (*,G) entry. The registers are not
sent to the route processor (in the case of PIM-SM), and the (S,G) state is not created on the first hop (in
the case of PIM-DM).
The subnet entry is installed in the TCAM entries with a shorter mask to catch directly connected sources
before they hit such entries. You can punt traffic from directly connected sources to the PISA. Once the
PISA sees this traffic, it can install an MMLS (S,G) entry for this source, which gets installed before the
subnet entry in the TCAM. New packets from this source are now switched with the (S,G) entry.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-426

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast connected

Examples

This example shows how to enable the downloading of directly connected subnets:
Router(config)# mls ip multicast connected
Router(config)#

Related Commands

Command

Description

mls ip multicast
(global configuration
mode)

Enables MLS IP and configures the hardware switching globally.

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-427

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast consistency-check

mls ip multicast consistency-check
To enable and configure the hardware-shortcut consistency checker, use the mls ip multicast
consistency-check command. To disable the consistency checkers, use the no form of this command.
mls ip multicast consistency-check [{settle-time seconds} | {type scan-mroute
[count count-number] | {settle-time seconds}} | {period seconds}]
no mls ip multicast consistency-check

Syntax Description

Defaults

settle-time
seconds

(Optional) Specifies the settle time for entry/oif for the consistency
checker; valid values are from 2 to 3600 seconds.

type
scan-mroute

(Optional) Specifies the type of consistency check as a scan check of the
mroute table.

count
count-number

(Optional) Specifies the maximum number of prefixes to check per
scan; valid values are from 2 to 500.

period seconds

(Optional) Specifies the period between scans; valid values are from 2
to 3600 seconds.

The defaults are as follows:
•

Consistency check is enabled.

•

count count-number is 20.

•

period seconds is 2 seconds.

•

settle-time seconds is 60 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The oif entry is the outgoing interface of a multicast {*,G} or {source, group} flow.
The consistency checker scans the mroute table and assures that the multicast-hardware entries are
consistent with the mroute table. Whenever an inconsistency is detected, the inconsistency is
automatically corrected.
To display the inconsistency error, use the show mls ip multicast consistency-check command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-428

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast consistency-check

Examples

This example shows how to enable the hardware-shortcut consistency checker:
Router (config)# mls ip multicast consistency-check
Router (config)#

This example shows how to enable the hardware-shortcut consistency checker and configure the scan
check of the mroute table:
Router (config)# mls ip multicast consistency-check type scan-mroute count 20 period 35
Router (config)#

This example shows how to enable the hardware-shortcut consistency checker and specify the period
between scans:
Router (config)# mls ip multicast consistency-check type scan-mroute period 35
Router (config)#

Related Commands

Command

Description

show mls ip multicast
consistency-check

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-429

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast flow-stat-timer

mls ip multicast flow-stat-timer
To set the time interval between two consecutive batches of flow-statistics messages from the switch
processor to the route processor, use the mls ip multicast flow-stat-timer command. To return to the
default settings, use the no form of this command.
mls ip multicast flow-stat-timer num
no mls ip multicast flow-stat-timer

Syntax Description

num

Defaults

25 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Time interval between two consecutive batches of flow-statistics
messages from the switch processor to the route processor.

This example shows how to configure the time interval between two consecutive batches of flow-statistics
messages from the switch processor to the route processor:
Router (config)# mls ip multicast flow-stat-timer 10
Router (config)#

Related Commands

Command

Description

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-430

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast replication-mode

mls ip multicast replication-mode
To enable and specify the replication mode, use the mls ip multicast replication-mode command. To
restore the system to automatic detection mode, use the no form of this command.
mls ip multicast replication-mode {egress | ingress}
no mls ip multicast replication-mode {egress | ingress}

Syntax Description

egress

Forces the system to the egress mode of replication.

ingress

Forces the system to the ingress mode of replication.

Defaults

ingress

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

The Supervisor Engine 32 PISA does not support the egress keyword.

During the change from egress- to ingress-replication mode, traffic interruptions may occur because the
shortcuts are purged and reinstalled. To avoid interruptions in traffic forwarding, enter the mls ip
multicast replication-mode ingress command.
If you enter the no mls ip multicast replication-mode ingress command, only the forced-ingress mode
resets

Examples

This example shows how to enable the ingress-replication mode:
Router (config)# mls ip multicast replication-mode ingress
Router (config)#

Related Commands

Command

Description

show mls ip multicast
capability

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-431

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast sso

mls ip multicast sso
To configure the SSO parameters, use the mls ip multicast sso command. To return to the default
settings, use the no form of this command.
mls ip multicast sso {{convergence-time time} | {leak interval} | {leak percentage}}

Syntax Description

Defaults

convergence-time
time

Specifies the maximum time to wait for protocol convergence; valid values
are from 0 to 3600 seconds.

leak interval

Specifies the packet-leak interval; valid values are from 0 to 3600 seconds.

leak percentage

Specifies the percentage of multicast packets leaked to the router during
switchover so that protocol convergence can take place; valid values are
from 1 to 100 percent.

The defaults are as follows:
•

convergence-time time—20 seconds

•

leak interval—60 seconds

•

leak percentage—10 percent

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the maximum time to wait for protocol convergence:
Router (config)# mls ip multicast sso convergence-time 300
Router (config)#

This example shows how to set the packet-leak interval:
Router (config)# mls ip multicast sso leak 200
Router (config)#

This example shows how to set the packet-leak percentage:
Router (config)# mls ip multicast sso leak 55
Router (config)#

Related Commands

Command

Description

show mls ip multicast
sso

Displays information about multicast high-availability SSO.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-432

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast stub

mls ip multicast stub
To enable the support for non-RPF traffic drops for PIM sparse-mode stub networks, use the mls ip
multicast stub command. To disable support for non-RPF traffic drops for PIM sparse-mode stub
networks, use the no form of this command.
mls ip multicast stub
no mls ip multicast stub

Syntax Description

This command has no arguments or keywords.

Defaults

Multicast is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mls ip multicast stub command, creates the following filters on a routed interface or a VLAN:
•

Permits IP packets from all addresses that are connected to the interface to any IP destination. An
address is connected to the interface if it is within the IP address prefixes configured through the ip
address addr mask [secondary] command.
This filter is meant to permit unicast and multicast packets from directly connected sources.

•

Permits IP multicast packets from any source address to multicast group prefixes 224.0.0.0/24 and
224.0.1.0/24.
This filter allows packets to be sent from any source address to well-known multicast addresses;
224.0.0.0/24 is used by protocols such as PIM, OSPF, EIGRP, or NTP. Addresses in 224.0.1.0/24
are used by protocols such as AutoRP (224.0.1.39, 224.0.1.40).

•

Denies any other IP multicast packets.
This deny filter is meant to inhibit any multicast packets from nondirectly connected sources and is
applied to the packets received on this interface or VLAN.

The permit IP multicast packets and the deny any other IP multicast packets filters are the same for all
interface or VLANs to which you configure the mls ip multicast stub command. The permit IP packets
from all addresses that are connected to the interface to any IP destination filter is different for each
interface or VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-433

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip multicast stub

Examples

This example shows how to enable the support for the non-RPF traffic drops for the PIM sparse-mode
stub networks:
Router(config-if)# mls ip multicast stub
Router(config-if)#

Related Commands

Command

Description

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-434

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip multicast threshold

mls ip multicast threshold
To configure a threshold rate for installing hardware shortcuts, use the mls ip multicast threshold
command. To deconfigure the threshold, use the no form of this command.
mls ip multicast threshold ppsec
no mls ip multicast threshold

Syntax Description

ppsec

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Threshold in packets per seconds; valid values are from 10 to
10000 packets per second.

Use this command to prevent creation of MLS entries for short-lived multicast flows such as join
requests.
If multicast traffic drops below the configured multicast rate threshold, all multicast traffic is routed by
the PISA.
This command does not affect already installed routes. For example, if you enter this command and the
shortcuts are already installed, the shortcuts are not removed if they are disqualified. To apply the
threshold to existing routes, clear the route and let it reestablish.

Examples

This example shows how to configure the IP MLS threshold to 10 packets per second:
Router (config)# mls ip multicast threshold 10
Router (config)#

Related Commands

Command

Description

mls rp ip (global
configuration mode)

Enables external systems to establish IP shortcuts to the PISA.

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-435

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip nat netflow-frag-l4-zero

mls ip nat netflow-frag-l4-zero
To zero out the Layer 4 information in the NetFlow lookup table for fragmented packets, use the mls ip
nat netflow-frag-l4-zero command.
mls ip nat netflow-frag-l4-zero

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported in PFC3BXL or PFC3B mode only.
U se the mls ip nat netflow-frag-l4-zero command to prevent matching the first fragment to the NetFlow
shortcut (normal operation) that is sent to the software. The next fragments that are sent to the software
are translated based on the Layer 4 port information from the first fragment. The translation based on
the Layer 4 port information from the first fragment occurs because there are no fragment bits for
matching in the NetFlow key.
When there is a large feature configuration on an interface that requires a large number of ACL TCAM
entries/masks that are programmed in TCAM, if the interface is configured as a NAT-inside interface,
the feature configuration may not fit in the ACL TCAM and the traffic on the interface may get switched
in the software.

Examples

This example shows how to zero out the Layer 4 information in the NetFlow lookup table for fragmented
packets:
Router (config)# mls ip nat netflow-frag-l4-zero
Router (config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-436

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ip pbr

mls ip pbr
To enable the MLS support for policy-routed packets, use the mls ip pbr command. To disable the MLS
support for policy-routed packets, use the no form of this command.
mls ip pbr [null0]
no mls ip pbr

Syntax Description

null0

Defaults

MLS support for policy-routed packets is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Enables the hardware support for the interface null0 in the route
maps.

Usage Guidelines
Note

Do not enable PBR and SLB on the same interface; PBR-based packets are not forwarded correctly.
When you enable the hardware-policy routing by entering the mls ip pbr command, all policy routing
occurs in the hardware and is applied to all interfaces, regardless of which interface was configured for
policy routing.
Use the null0 keyword when you have routed traffic only to enable the hardware support for the set
interface null0 in the route maps.

Examples

This example shows how to enable the MLS support for policy-routed packets:
Router(config)# mls ip pbr
Router(config)#

Related Commands

Command

Description

show tcam interface
vlan acl

Displays information about the interface-based TCAM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-437

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ip reflexive ndr-entry tcam

mls ip reflexive ndr-entry tcam
To enable the shortcuts in TCAM for the reflexive TCP/UDP entries when installed by the NDR, use the
mls ip reflexive ndr-entry tcam command. To disable the shortcuts in TCAM for the reflexive
TCP/UDP entries when installed by the NDR, use the no form of this command.
mls ip reflexive ndr-entry tcam
no mls ip reflexive ndr-entry tcam

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enter the mls ip reflexive ndr-entry tcam command, the reflexive ACL dynamic entries are
installed in TCAM instead of in NetFlow.

Examples

This example shows how to enable the shortcuts in TCAM for the reflexive TCP/UDP entries when
installed by the NDR:
Router(config)# mls ip reflexive ndr-entry tcam
Router(config)#

This example shows how to disable the shortcuts in TCAM for the reflexive TCP/UDP entries when
installed by the NDR:
Router(config)# no mls ip reflexive ndr-entry tcam
Router(config)#

Related Commands

Command

Description

mls ip delete-threshold Deletes the configured ACL thresholds.
mls ip
install-threshold

Installs the configured ACL thresholds.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-438

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ipv6 acl compress address unicast

mls ipv6 acl compress address unicast
To turn on the compression of IPv6 addresses, use the mls ipv6 acl compress address unicast
command. To turn off the compression of IPv6 addresses, use the no form of this command.
mls ipv6 acl compress address unicast
no mls ipv6 acl compress address unicast

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

Do not enable the compression mode if you have noncompressible address types in your network. A list
of compressible address types and the address compression methosd are listed in Table 2-15.
Table 2-15 Compressible Address Types and Methods

Address Type

Compression Method

EUI-64 based on MAC address

This address is compressed by removing 16 bits from bit
locations [39:24]. No information is lost when the hardware
compresses these addresses.

Embedded IPv4 address

This address is compressed by removing the upper 16 bits. No
information is lost when the hardware compresses these
addresses.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-439

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls ipv6 acl compress address unicast

Table 2-15 Compressible Address Types and Methods (continued)

Examples

Address Type

Compression Method

Link Local

These addresses are compressed by removing the zeros in bits
[95:80] and are identified using the same packet type as the
embedded IPv4 address. No information is lost when the
hardware compresses these addresses.

Others

If the IPv6 address does not fall into any of the above
categories, it is classified as other. If the IPv6 address is
classified as other, the following occurs:
•

If the compress mode is on, the IPv6 address is compressed
similarly to the EUI-64 compression method (removal of
bits [39:24]) to allow for the Layer 4 port information to be
used as part of the key used to look up the QoS TCAM, but
Layer 3 information is lost.

•

If the global compression mode is off, the entire 128 bits of
the IPv6 address are used. The Layer 4 port information
cannot be included in the key to look up the QoS TCAM
because of the size constraints on the IPv6 lookup key.

This example shows how to turn on the compression of the noncompressible IPv6 addresses:
Router(config)# mls ipv6 acl compress address unicast
Router(config)#

This example shows how to turn off the compression of the noncompressible IPv6 addresses:
Router(config)# no mls ipv6 acl compress address unicast
Router(config)#

Related Commands

Command

Description

show fm ipv6
traffic-filter

Displays the IPv6 information.

show mls netflow ipv6

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-440

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls ipv6 acl source

mls ipv6 acl source
To deny all IPv6 packets from a source-specific address, use the mls ipv6 acl source command. To
accept all IPv6 packets from a source-specific address, use the no form of this command.
mls ipv6 acl source {loopback | multicast}
no mls ipv6 acl source {loopback | multicast}

Syntax Description

loopback

Denies all IPv6 packets with a source loopback address.

multicast

Denies all IPv6 packets with a source multicast address.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to deny all IPv6 packets with a source loopback address:
Router(config)# mls ipv6 acl source loopback
Router(config)#

This example shows how to deny all IPv6 packets with a source multicast address:
Router(config)# no mls ipv6 acl source multicast
Router(config)#

Related Commands

Command

Description

show mls netflow ipv6

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-441

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls mpls (recirculation)

mls mpls (recirculation)
To enable MPLS recirculation, use the mls mpls command. To disable MPLS recirculation, use the no
form of this command.
mls mpls {recir-agg | tunnel-recir}
no mls mpls {recir-agg | tunnel-recir}

Syntax Description

recir-agg

Recirculates the MPLS aggregated-label packets (new aggregated labels are
impacted only).

tunnel-recir

Recirculates the tunnel-MPLS packets.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enable tunnel-MPLS recirculation, the IPv4 and IPv4-tunneled packets that need to be
labeled (for example, the packets that are encapsulated with an MPLS header) will be corrupted when
they are transmitted from the Catalyst 6500 series switch.
Use the show erm statistics command to display the FIB TCAM exception status for IPv4, IPv6, and
MPLS protocols.

Examples

This example shows how to enable the aggregated-label MPLS recirculation:
Router(config)# mls mpls recir-agg
Router(config)#

This example shows how to enable the tunnel-MPLS recirculation:
Router(config)# mls mpls tunnel-recir
Router(config)#

This example shows how to disable the aggregated-label MPLS recirculation:
Router(config)# no mls mpls recir-agg
Router(config)#

This example shows how to disable the tunnel-MPLS recirculation:
Router(config)# no mls mpls tunnel-recir
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-442

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls mpls (recirculation)

Related Commands

Command

Description

show erm statistics

Displays the FIB TCAM exception status for IPv4, IPv6, and MPLS
protocols.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-443

Chapter 2
mls mpls (guaranteed bandwidth traffic engineering)

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls mpls (guaranteed bandwidth traffic engineering)
To configure the guaranteed bandwidth traffic engineering flow parameters globally, use the mls mpls
command. To return to the default settings, use the no form of this command.
mls mpls {{gb-te-burst burst} | {gb-te-cir-ratio ratio} | {gb-te-dscp dscp-value [markdown]} |
{gb-te-enable [global-pool]}}
no mls mpls {{gb-te-burst burst} | {gb-te-cir-ratio ratio} | {gb-te-dscp dscp-value [markdown]}
| {gb-te-enable [global-pool]}}

Syntax Description

Defaults

gb-te-burst burst

Specifies the burst duration for the guaranteed bandwidth traffic
engineering flows; valid values are from 100 to 30000 milliseconds.

gb-te-cir-ratio ratio

Specifies the ratio for the committed information rate policing; valid values
are from 1 to 100 percent.

gb-te-dscp dscp-value

Specifies the DSCP map for the guaranteed bandwidth traffic engineering
flows; valid values are from 0 to 63.

markdown

(Optional) Marks down or drops the nonconforming flows.

gb-te-enable

Enables the guaranteed bandwidth traffic engineering flow policing.

global-pool

(Optional) Specifies using resources allocated from the global pool to the
police traffic engineering flows.

The default settings are as follows:
•

burst is 1000 milliseconds.

•

ratio is 1 percent.

•

dscp-value is 40.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the mls qos map dscp-exp command to reset the Exp value of the MPLS packet when the out-label
gets swapped.
If you do not enable tunnel-MPLS recirculation, the IPv4 and IPv4-tunneled packets that need to be
labeled (for example, the packets that are encapsulated with an MPLS header) will be corrupted when
they are transmitted from the Catalyst 6500 series switch.
Use the show erm statistics command to display the FIB TCAM exception status for IPv4, IPv6, and
MPLS protocols.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-444

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls mpls (guaranteed bandwidth traffic engineering)

Examples

This example shows how to specify the burst duration for the guaranteed bandwidth traffic engineering
flows:
Router(config)# mls mpls gb-te-burst 2000
Router(config)#

This example shows how to specify the ratio for CIR policing:
Router(config)# mls mpls gb-te-ratio 30
Router(config)#

This example shows how to specify the DSCP map for the guaranteed bandwidth traffic engineering
flows and to drop the nonconforming flows:
Router(config)# mls mpls gb-te-dscp 25 markdown
Router(config)#

This example shows how to enable the guaranteed bandwidth traffic engineering flow policing:
Router(config)# mls mpls gb-te-enable
Router(config)#

Related Commands

Command

Description

show erm statistics

Displays the FIB TCAM exception status for IPv4, IPv6, and MPLS
protocols.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-445

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls nde flow

mls nde flow
To specify the filter options for NDE, use the mls nde flow command. To clear the NDE flow filter and
reset the filter to the default settings, use the no form of this command.
mls nde flow {include | exclude} {{dest-port port-num} | {destination ip-addr ip-mask} |
{protocol {tcp | udp}} | {source ip-addr ip-mask} | {src-port port-num}}
no mls nde flow {include | exclude}

Syntax Description

Defaults

include

Allows importing of all flows except the flows matching the
given filter.

exclude

Allows exporting of all flows matching the given filter.

dest-port port-num

Specifies the destination port to filter; valid values are from 1
to 100.

destination ip-addr
ip-mask

Specifies a destination IP address and mask to filter.

protocol

Specifies the protocol to include or exclude.

tcp

Includes or excludes TCP.

udp

Includes or excludes UDP.

source ip-addr ip-mask

Specifies a source IP address and subnet mask bit to filter.

src-port port-num

Specifies the source port to filter.

The defaults are as follows:
•

All expired flows are imported.

•

Interface export is disabled (no mls nde interface).

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mls nde flow command adds filtering to the NDE. The expired flows matching the specified criteria
are exported. These values are stored in NVRAM and do not clear when NDE is disabled. If any option
is not specified in this command, it is treated as a wildcard. The NDE filter in NVRAM does not clear
when you disable NDE.
Only one filter can be active at a time. If you do not enter the exclude or include keyword, the filter is
assumed to be an inclusion filter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-446

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls nde flow

The include and exclude filters are stored in NVRAM and are not removed if you disable NDE.
ip-addr maskbits is the simplified long subnet address format. The mask bits specify the number of bits
of the network masks. For example, 172.25.2.1/22 indicates a 22-bit subnet address. The ip-addr is a full
host address, such as 193.22.253.1/22.

Examples

This example shows how to specify an interface flow filter so that only expired flows to destination
port 23 are exported (assuming that the flow mask is set to ip-flow):
Router(config)# mls nde flow include dest-port 23
Router(config)#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-447

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls nde interface

mls nde interface
To populate the additional fields in the NDE packets, use the mls nde interface command. To disable
the population of the additional fields, use the no form of this command.
mls nde interface
no mls nde interface

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can configure NDE to populate the following additional fields in the NDE packets:
•

Egress interface SNMP index

•

Source-autonomous system number

•

Destination-autonomous system number

•

IP address of the next-hop router

The ingress-interface SNMP index is always populated if the flow mask is interface-full or
interface-src-dst.
For detailed information, refer to the “Configuring NDE” chapter of the Catalyst Supervisor Engine 32
PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-448

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls nde interface

Examples

This example shows how to populate the additional fields in the NDE packets:
Router(config)# mls nde interface
Router(config)#

This example shows how to disable the population of the additional fields:
Router(config)# no mls nde interface
Router(config)#

Related Commands

Command

Description

mls netflow

Enables NetFlow to gather statistics.

mls netflow sampling

Enables the sampled NetFlow on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-449

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls nde sender

mls nde sender
To enable MLS NDE export, use the mls nde sender command. To disable MLS NDE export, use the
no form of this command.
mls nde sender [version version]
no mls nde sender

Syntax Description

version version

Defaults

The defaults are as follows:

(Optional) Specifies the NDE version; valid values are 5 and 7.

•

MLS NDE export is disabled.

•

version is 7.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable MLS NDE export:
Router(config)# mls nde sender
Router(config)#

This example shows how to disable MLS NDE export:
Router(config)# no mls nde sender
Router(config)#

Related Commands

Command

Description

show mls nde

Displays information about the NDE hardware-switched flow.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-450

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls netflow

mls netflow
To enable NetFlow to gather the statistics, use the mls netflow command. To disable NetFlow from
gathering the statistics, use the no form of this command.
mls netflow
no mls netflow

Syntax Description

interface

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Specifies statistics gathering per interface.

NetFlow gathers the statistics from traffic that flows through the Catalyst 6500 series switch and stores
the statistics in the NetFlow table. You can gather the statistics globally based on a protocol or optionally
per interface.
If you are not using NDE or the Cisco IOS features that use the hardware NetFlow table (micro-flow
QoS, WCCP, TCP Intercept, or Reflexive ACLs), you may safely disable the use and maintenance of the
hardware NetFlow table using the no mls netflow command in global configuration mode.

Examples

This example shows how to gather the statistics:
Router(config)# mls netflow
Router(config)#

This example shows how to disable NetFlow from gathering the statistics:
Router(config)# no mls netflow
Disabling MLS netflow entry creation.
Router(config)#

Related Commands

Command

Description

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-451

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls netflow maximum-flows

mls netflow maximum-flows
To configure the maximum flow allocation in the NetFlow table, use the mls netflow maximum-flows
command. To return to the default settings, use the no form of this command.
mls netflow maximum-flows [maximum-flows]
no mls netflow maximum-flows

Syntax Description

maximum-flows

Defaults

128

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Maximum number of flows; valid values are 16, 32, 64, 80, 96,
and 128. See the “Usage Guidelines” section for additional information.

Usage Guidelines

The value that you specify for the maximum number of flows is that value times 1000. For example, if
you enter 32, you specify that 32,000 is the maximum number of permitted flows.

Examples

This example shows how to configure the maximum flow allocation in the NetFlow table:
Router(config)# mls netflow maximum-flows 96
Router(config)#

This example shows how to return to the default setting:
Router(config)# no mls netflow maximum-flows
Router(config)#

Related Commands

Command

Description

show mls netflow
table-contention

Displays configuration information at the table contention level for the
NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-452

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls netflow sampling

mls netflow sampling
To enable the sampled NetFlow on an interface, use the mls netflow sampling command. To disable the
sampled NetFlow, use the no form of this command.
mls netflow sampling
no mls netflow sampling

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To enable sampling, you must enter the mls sampling command and the mls netflow sampling
command on the appropriate interfaces. If you do not enter the mls netflow sampling command, NDE
will not export flows.
Depending on the current flow mask, the sampled NetFlow can be global or per interface. For
Interface-Full and Interface-Src-Dest flow masks, the sampled NetFlow is enabled on a per-interface
basis. For all the other flow masks, the sampled NetFlow is always global and turned on/off for all
interfaces.
Enter the mls sampling command to enable the sampled NetFlow globally.

Examples

This example shows how to enable the sampled NetFlow on an interface:
Router(config-if)# mls netflow sampling
Router(config-if)#

This example shows how to disable the sampled NetFlow on an interface:
Router(config-if)# no mls netflow sampling
Router(config-if)#

Related Commands

Command

Description

mls sampling

Enables the sampled NetFlow and specifies the sampling method.

show mls sampling

Displays information about the sampled NDE status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-453

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls netflow usage notify

mls netflow usage notify
To monitor the NetFlow table usage on the switch processor, use the mls netflow usage notify
command. To return to the default settings, use the no form of this command.
mls netflow usage notify {threshold interval}
no mls netflow usage notify

Syntax Description

threshold

Percentage threshold that, if exceeded, displays a warning message; valid
values are from 20 to 100 percent.

interval

Frequency that the NetFlow table usage is checked; valid values are from
120 to 1000000 seconds.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If the NetFlow table usage monitoring is enabled and the NetFlow table usage exceeds the percentage
threshold, a warning message is displayed.
NetFlow gathers statistics from traffic that flows through the Catalyst 6500 series switch and stores the
statistics in the NetFlow table. You can gather statistics globally based on a protocol or optionally per
interface.
If you are not using NDE or the Cisco IOS features that use the hardware NetFlow table (micro-flow
QoS, WCCP, TCP Intercept, or Reflexive ACLs), you may safely disable the use and maintenance of the
hardware NetFlow table using the no mls netflow command in global configuration mode.

Examples

This example shows how to configure the monitoring of the NetFlow table usage on the switch
processor:
Router(config)# mls netflow usage notify 80 300
Router(config)#

Related Commands

Command

Description

show mls netflow
usage

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-454

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos (global configuration mode)

mls qos (global configuration mode)
To enable the QoS functionality globally, use the mls qos command. To disable the QoS functionality
globally, use the no form of this command.
mls qos
no mls qos

Syntax Description

This command has no arguments or keywords.

Defaults

QoS is globally disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enable QoS globally, QoS is enabled on all interfaces with the exception of the interfaces where
you disabled QoS. If you disable QoS globally, all traffic is passed in QoS pass-through mode.
In port-queueing mode, PFC QoS (marking and policing) is disabled, and packet ToS and CoS are not
changed by the PFC. All queueing on rcv and xmt is based on a QoS tag in the incoming packet, which
is based on the incoming CoS.
For 802.1Q or ISL-encapsulated port links, queueing is based on the packet 802.1Q or ISL CoS.
For the router main interfaces or access ports, queueing is based on the configured per-port CoS (the
default CoS is 0).
This command enables or disables TCAM QoS on all interfaces that are set in the OFF state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-455

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos (global configuration mode)

Examples

This example shows how to enable QoS globally:
Router(config)# mls qos
Router(config)#

This example shows how to disable QoS globally on the Catalyst 6500 series switch:
Router(config)# no mls qos
Router(config)#

Related Commands

Command

Description

mls qos (interface
configuration mode)

Enables the QoS functionality on an interface.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-456

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos (interface configuration mode)

mls qos (interface configuration mode)
To enable the QoS functionality on an interface, use the mls qos command. To disable QoS functionality
on an interface, use the no form of this command.
mls qos
no mls qos

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Although the CLI allows you to configure PFC-based QoS on the WAN ports on the OC-12 ATM OSMs
and on the WAN ports on the channelized OSMs, PFC-based QoS is not supported on the WAN ports
on these OSMs.
If you disable QoS globally, it is also disabled on all interfaces.
This command enables or disables TCAM QoS (classification, marking, and policing) for the interface.

Examples

This example shows how to enable QoS on an interface:
Router(config-if)# mls qos
Router(config-if)#

Related Commands

Command

Description

mls qos (global
configuration mode)

Enables the QoS functionality globally.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-457

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos aggregate-policer

mls qos aggregate-policer
To define a named aggregate policer for use in policy maps, use the mls qos aggregate-policer
command. This policer can be shared by different policy map classes and on different interfaces. To
delete a named aggregate policer, use the no form of this command.
mls qos aggregate-policer name rate-bps
mls qos aggregate-policer name rate-bps burst-bytes maximum-burst-bytes
mls qos aggregate-policer name rate-bps [{conform-action {drop [exceed-action action]}} |
{set-dscp-transmit [new-dscp]} | {set-prec-transmit [new-precedence]} | {transmit
[{exceed-action action} | {violate-action action]}}
mls qos aggregate-policer aggregate-name rate-bps {pir peak-rate-bps [{conform-action {drop
[exceed-action action]}} | {set-dscp-transmit [new-dscp]} | {set-prec-transmit
[new-precedence]} | {transmit [{exceed-action action}} | {violate-action action}]]}
no mls qos aggregate-policer name

Syntax Description

Defaults

name

Name of the aggregate policer.

rate-bps

Maximum bits per second; valid values are from 32000 to 10000000000.

burst-bytes

Burst bytes; valid values are from 1000 to 31250000.

maximum-burst-bytes

Maximum burst bytes; valid values are from 1000 to 31250000 (if entered,
must be set equal to normal-burst-bytes).

conform-action

(Optional) Specifies the action to be taken when the rate is not exceeded.

drop

(Optional) Drops the packet.

exceed-action action

(Optional) Specifies the action to be taken when QoS values are exceeded;
see the “Usage Guidelines” section for valid values.

set-dscp-transmit

Sets the DSCP value and sends the packet.

new-dscp

(Optional) New DSCP value; valid values are from 0 to 63.

set-prec-transmit

Rewrites packet precedence and sends the packet.

new-precedence

(Optional) New precedence value; valid values are from 0 to 7.

violate-action action

(Optional) Specifies the action to be taken when QoS values are violated;
see the “Usage Guidelines” section for valid values.

pir peak-rate-bps

Sets the PIR peak rate; valid values are from 32000 to 10000000000.

The defaults are as follows:
•

extended-burst-bytes is equal to burst-bytes.

•

conform-action is transmit.

•

exceed-action is drop.

•

violate-action is equal to the exceed-action.

•

pir peak-rate-bps is equal to the normal (cir) rate.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-458

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos aggregate-policer

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Valid values for action are as follows:
•

drop—Drops the packet

•

policed-dscp-transmit—Changes the DSCP per the policed-DSCP map and sends it

•

transmit—Transmits the package

The Catalyst 6500 series switch supports up to 1023 aggregates and 1023 policing rules.
The mls qos aggregate-policer command allows you to configure an aggregate flow and a policing rule
for that aggregate. When you enter the rate and burst parameters, the range for the average rate is
32 Kbps to 4 Gbps (entered as 32000 and 4000000000) and the range for the burst size is 1 KB (entered
as 1000) to 512 MB (entered as 512000000). Modifying an existing aggregate rate limit entry causes that
entry to be modified in NVRAM and in the Catalyst 6500 series switch if that entry is currently being
used.

Note

Due to hardware granularity, the rate value is limited so the burst that you configure may not be the value
that is used.
Modifying an existing microflow or aggregate rate limit modifies that entry in NVRAM and in the
Catalyst 6500 series switch if it is currently being used.
When you enter the aggregate policer name, follow these naming conventions:

Examples

•

Maximum of 31 characters and may include a-z, A-Z, 0-9, the dash character (-), the underscore
character (_), and the period character (.)

•

Must start with an alphabetic character and must be unique across all ACLs of all types

•

Case sensitive

•

Cannot be a number

•

Must not be a keyword; keywords to avoid are all, default-action, map, help, and editbuffer

This example shows how to configure a QoS aggregate policer to allow a maximum of 100000 bits per
second with a normal burst byte size of 10000, set DSCP to 48 when these rates are not exceeded, and
drop packets when these rates are exceeded:
Router(config)# mls qos aggregate-policer micro-one 100000 10000 conform-action set-dscp
48 exceed action drop
Router(config)#

Related Commands

Command

Description

set ip dscp (policy-map Marks a packet by setting the IP DSCP in the ToS byte.
configuration)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-459

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos bridged

mls qos bridged
To enable the microflow policing for bridged traffic on Layer 3 LAN interfaces, use the mls qos bridged
command. To disable microflow policing for bridged traffic, use the no form of this command.
mls qos bridged
no mls qos bridged

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on SVIs only.

Examples

This example shows how to enable the microflow policing for bridged traffic on a VLAN interface:
Router(config-if)# mls qos bridged
Router(config-if)#

Related Commands

Command

Description

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-460

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos channel-consistency

mls qos channel-consistency
To enable the QoS-port attribute checks on EtherChannel bundling, use the mls qos
channel-consistency command. To disable the QoS-port attribute checks on EtherChannel bundling,
use the no form of this command.
mls qos channel-consistency
no mls qos channel-consistency

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mls qos channel-consistency command is supported on port channels only.

Examples

This example shows how to enable the QoS-port attribute checks on the EtherChannel bundling:
Router(config-if)# mls qos channel-consistency
Router(config-if)#

This example shows how to disable the QoS-port attribute checks on the EtherChannel bundling:
Router(config-if)# no mls qos channel-consistency
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-461

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos cos

mls qos cos
To define the default CoS value for an interface, use the mls qos cos command. To remove a prior entry,
use the no form of this command.
mls qos cos cos-value
no mls qos cos cos-value

Syntax Description

cos-value

Defaults

The defaults are as follows:

Default CoS value for the interface; valid values are from 0 to 7.

•

cos-value is 0.

•

CoS override is not configured.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

CoS values are configurable on physical LAN ports only.

Examples

This example shows how to configure the default QoS CoS value as 6:
Router(config-if)# mls qos cos 6
Router(config-if)#

Related Commands

Command

Description

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-462

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos cos-mutation

mls qos cos-mutation
To attach an ingress-CoS mutation map to the interface, use the mls qos cos-mutation command. To
remove the ingress-CoS mutation map from the interface, use the no form of this command.
mls qos cos-mutation cos-mutation-table-name
no mls qos cos-mutation

Syntax Description

cos-mutation-table-name

Defaults

No table is defined.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Name of the ingress-CoS mutation table.

This example shows how to attach the ingress-CoS mutation map named mutemap2:
Router(config-if)# mls qos cos-mutation mutemap2
Router(config-if)#

Related Commands

Command

Description

mls qos map
cos-mutation

Maps a packet’s CoS to a new CoS value.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-463

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos dscp-mutation

mls qos dscp-mutation
To attach an egress-DSCP mutation map to the interface, use the mls qos dscp-mutation command. To
remove the egress-DSCP mutation map from the interface, use the no form of this command.
mls qos dscp-mutation dscp-mutation-table-name
no mls qos dscp-mutation

Syntax Description

dscp-mutation-table-name

Defaults

No table is defined.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Name of the egress-DSCP mutation table.

This example shows how to attach the egress-DSCP mutation map named mutemap1:
Router(config-if)# mls qos dscp-mutation mutemap1
Router(config-if)#

Related Commands

Command

Description

mls qos map
dscp-mutation

Defines a named DSCP mutation map.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-464

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos exp-mutation

mls qos exp-mutation
To attach an egress-EXP mutation map to the interface, use the mls qos exp-mutation command. To
remove the egress-EXP mutation map from the interface, use the no form of this command.
mls qos exp-mutation exp-mutation-table-name
no mls qos exp-mutation

Syntax Description

exp-mutation-table-name

Defaults

No table is defined.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Name of the egress-EXP mutation table.

This example shows how to attach the egress-exp mutation map named mutemap2:
Router(config-if)# mls qos exp-mutation mutemap2
Router(config-if)#

Related Commands

Command

Description

mls qos map
dscp-mutation

Defines a named DSCP mutation map.

show mls qos mpls

Displays an interface summary for MPLS QoS classes in the policy maps.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-465

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos loopback

mls qos loopback
To remove a router port from the SVI flood for VLANs that are carried through by the loopback cable,
use the mls qos loopback command. To return to the default settings, use the no form of this command.
mls qos loopback
no mls qos loopback

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

With mls qos loopback applied at the interface, the packets are not forwarded to the destination.
Before you enter the mls qos loopback command, you must specify a MAC address for the OSM
interface. The MAC address must be different from the LAN router MAC address that is used in PFC2
hardware switching.

Examples

This example shows how to prevent packets from being forwarded to the destination:
Router (config-if)# mls qos loopback
Router (config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-466

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map cos-dscp

mls qos map cos-dscp
To define the ingress CoS-to-DSCP map for trusted interfaces, use the mls qos map cos-dscp command.
To remove a prior entry, use the no form of this command.
mls qos map cos-dscp values
no mls qos map cos-dscp

Syntax Description

values

Defaults

The default CoS-to-DSCP configuration is listed in Table 2-16.

Eight DSCP values, separated by spaces, corresponding to the CoS
values; valid values are from 0 to 63.

Table 2-16 CoS-to-DSCP Default Map
CoS

0

1

2

3

4

5

6

7

DSCP

0

8

16

24

32

40

48

56

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The CoS-to-DSCP map is used to map the CoS of packets arriving on trusted interfaces (or flows) to a
DSCP where the trust type is trust-cos. This map is a table of eight CoS values (0 through 7) and their
corresponding DSCP values. The Catalyst 6500 series switch has one map.

Examples

This example shows how to configure the ingress CoS-to-DSCP map for trusted interfaces:
Router(config)# mls qos map cos-dscp 20 30 1 43 63 12 13 8
Router(config)#

Related Commands

Command

Description

mls qos map dscp-cos

Defines an egress DSCP-to-CoS map.

mls qos map
ip-prec-dscp

Defines an ingress-IP precedence-to-DSCP map for trusted interfaces.

mls qos map
policed-dscp

Sets the mapping of policed DSCP values to marked-down DSCP values.

show mls qos maps

Displays information about the QoS map configuration and run-time
version.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-467

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map cos-mutation

mls qos map cos-mutation
To map a packet’s CoS to a new CoS value, use the mls qos map cos-mutation command. To remove
the map, use the no form of this command.
mls qos map cos-mutation name mutated_cos1 mutated_cos2 mutated_cos3 mutated_cos4
mutated_cos5 mutated_cos6 mutated_cos7 mutated_cos8
no mls qos map cos-mutation name

Syntax Description

Defaults

name

Name of the CoS map.

mutated_cos1
...
mutated_cos8

Eight CoS out values, separated by spaces; valid values are from 0 to 7.
See the “Usage Guidelines” section for additional information.

If the CoS-to-CoS mutation map is not configured, the default CoS-to-CoS mutation mapping is listed
in Table 2-17.
Table 2-17 CoS-to-CoS Default Map
CoS-in

0

1

2

3

4

5

6

7

CoS-out

0

1

2

3

4

5

6

7

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on Catalyst 6500 series switches that are configured with the following
modules only:
•

WS-X6704-10GE

•

WS-X6724-SFP

•

WS-X6748-GE-TX

CoS mutation is not supported on non-802.1Q tunnel ports.
When you enter the mls qos map cos-mutation command, you are configuring the mutated-CoS values
map to sequential ingress-CoS numbers. For example, by entering the mls qos map cos-mutation 2 3 4
5 6 7 0 1 command, you configure this map:
CoS-in

0

1

2

3

4

5

6

7

CoS-out

2

3

4

5

6

7

0

1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-468

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map cos-mutation

Separate the eight CoS values by a space.
After you define the map in global configuration mode, you can attach the map to a port.
If QoS is disabled, the port is not in a trust CoS mode, and the port is not in 802.1Q tunneling mode. The
changes appear once you put the port into trust CoS mode and the port is configured as an 802.1Q tunnel
port.
Support for ingress-CoS mutation on 802.1Q tunnel ports and is on a per-port group basis only.
To avoid ingress-CoS mutation configuration failures, only create EtherChannels where all member
ports support ingress-CoS mutation or where no member ports support ingress-CoS mutation. Do not
create EtherChannels with mixed support for ingress-CoS mutation.
If you configure ingress-CoS mutation on a port that is a member of an EtherChannel, the ingress-CoS
mutation is applied to the port-channel interface.
You can configure ingress-CoS mutation on port-channel interfaces.

Examples

This example shows how to define a CoS-to-CoS map:
Router(config)# mls qos map cos-mutation test-map 5 4 3 to 1
Router(config)#

Related Commands

Command

Description

show mls qos maps

Displays information about the QoS map configuration and run-time
version.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-469

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map dscp-cos

mls qos map dscp-cos
To define an egress DSCP-to-CoS map, use the mls qos map dscp-cos command. To remove a prior
entry, use the no form of this command.
mls qos map dscp-cos dscp-values to cos-values
no mls qos map dscp-cos

Syntax Description

Defaults

dscp-values

DSCP values; valid values are from 0 to 63.

to

Defines mapping.

cos-values

CoS values; valid values are from 0 to 63.

The default DSCP-to-CoS map is listed in Table 2-18.
Table 2-18 DSCP-to-CoS Default Map
DSCP

0-7

8-15

16-23 24-31 32-39 40-47 48-55 56-63

CoS

0

1

2

3

4

5

6

7

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The DSCP-to-CoS map is used to map the final DSCP classification to a final CoS. This final map
determines the output queue and threshold to which the packet is assigned. The CoS map is written into
the ISL header or 802.1Q tag of the transmitted packet on trunk interfaces and contains a table of
64 DSCP values and the corresponding CoS values. The Catalyst 6500 series switch has one map.
You can enter up to eight DSCP values separated by a space. You can enter up to eight CoS values
separated by a space.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-470

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map dscp-cos

Examples

This example shows how to configure the egress DSCP-to-CoS map for trusted interfaces:
Router(config)# mls qos map dscp-cos 20 25 to 3
Router(config)#

Related Commands

Command

Description

mls qos map cos-dscp

Defines the ingress CoS-to-DSCP map for trusted interfaces.

show mls qos maps

Displays information about the QoS map configuration and run-time
version.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-471

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map dscp-exp

mls qos map dscp-exp
To define the final DSCP classification to the final EXP value, use the mls qos map dscp-exp command.
To remove a prior entry, use the no form of this command.
mls qos map dscp-exp dscp-values to exp-values
no mls qos map dscp-exp

Syntax Description

Defaults

dscp-values

DSCP values; valid values are from 0 to 63.

to

Defines mapping.

exp-values

EXP values; valid values are from 0 to 7.

The default DSCP-to-EXP map is listed in Table 2-19.
Table 2-19 DSCP-to-EXP Default Map
DSCP

0-7

8-15

16-23 24-31 32-39 40-47 48-55 56-63

EXP

0

1

2

3

4

5

6

7

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The DSCP-to-EXP map is used to map the final DSCP classification to a final EXP. This final map
determines the output queue and threshold to which the packet is assigned. The EXP map contains a table
of 64 DSCP values and the corresponding EXP values. The Catalyst 6500 series switch has one map.
You can enter up to eight DSCP values separated by a space. You can enter up to eight EXP values
separated by a space.

Examples

This example shows how to configure the final DSCP classification to a final EXP value:
Router(config)# mls qos map dscp-exp 20 25 to 3
Router(config)#

Related Commands

Command

Description

show mls qos maps

Displays information about the QoS map configuration and run-time
version.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-472

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map dscp-mutation

mls qos map dscp-mutation
To define a named DSCP mutation map, use the mls qos map dscp-mutation command. To return to
the default mapping, use the no form of this command.
mls qos map dscp-mutation map-name input-dscp1 [input-dscp2 [input-dscp3 [input-dscp4
[input-dscp5 [input-dscp6 [input-dscp7 [input-dscp8]]]]]]] to output-dscp
no mls qos map dscp-mutation map-name

Syntax Description

map-name

Name of the DSCP mutation map.

input-dscp#

Internal DSCP value; valid values are from 0 to 63. See the “Usage
Guidelines” section for additional information.

to

Defines mapping.

output-dscp

Egress DSCP value; valid values are from 0 to 63.

Defaults

output-dscp equals input-dscp.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When configuring a named DSCP mutation map, note the following:
•

You can enter up to eight input DSCP values that map to a mutated DSCP value.

•

You can enter multiple commands to map additional DSCP values to a mutated DSCP value.

•

You can enter a separate command for each mutated DSCP value.

You can configure 15 egress-DSCP mutation maps to mutate the internal DSCP value before it is written
as the egress-DSCP value. You can attach egress-DSCP mutation maps to any interface that PFC QoS
supports.
PFC QoS derives the egress-CoS value from the internal DSCP value. If you configure egress-DSCP
mutation, PFC QoS does not derive the egress-CoS value from the mutated DSCP value.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-473

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map dscp-mutation

Examples

This example shows how to map DSCP 30 to mutated DSCP value 8:
Router(config)# mls qos map dscp-mutation mutemap1 30 to 8
Router(config)#

Related Commands

Command

Description

show mls qos maps

Displays information about the QoS map configuration and run-time
version.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-474

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map exp-dscp

mls qos map exp-dscp
To define the ingress EXP value to the internal DSCP map, use the mls qos map exp-dscp command.
To return to the default mappings, use the no form of this command.
mls qos map exp-dscp dscp-values
no mls qos map exp-dscp

Syntax Description

dscp-values

Defaults

The default EXP-to-DSCP map is listed in Table 2-20.

Interval DSCP values; valid values are from 0 to 63.

Table 2-20 EXP-to-DSCP Default Map
EXP

0

1

2

3

4

5

6

7

DSCP

0

8

16

24

32

40

48

56

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The DSCP in these maps refers to the internal DSCP, not the packet DSCP.
The EXP-to-DSCP map is used to map the received EXP value to the internal DSCP map. This final map
determines the output queue and threshold to which the packet is assigned. The EXP map contains a table
of 64 DSCP values and the corresponding EXP values. The Catalyst 6500 series switch has one map.
You can enter up to eight DSCP values separated by a space.

Examples

This example shows how to configure the received EXP value to an internal DSCP value:
Router(config)# mls qos map exp-dscp 20 25 30 31 32 32 33 34
Router(config)#

Related Commands

Command

Description

mls qos map
exp-mutation

Maps a packet’s EXP to a new EXP value.

show mls qos mpls

Displays an interface summary for MPLS QoS classes in the policy maps.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-475

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map exp-mutation

mls qos map exp-mutation
To map a packet’s EXP to a new EXP value, use the mls qos map exp-mutation command. To return
to the default mappings, use the no form of this command.
mls qos map exp-mutation map-name mutated-exp1 mutated-exp2 mutated-exp3 mutated-exp4
mutated-exp5 mutated-exp6 mutated-exp7 mutated-exp8
no mls qos map exp-mutation map-name

Syntax Description

Defaults

map-name

Name of the EXP-mutation map.

mutated-exp#

Eight EXP values, separated by spaces; valid values are from 0 to 7. See the
“Usage Guidelines” section for additional information.

If the EXP-to-EXP mutation map is not configured, the default EXP-to-EXP mutation mapping is listed
in Table 2-21.
Table 2-21 EXP-to-EXP Mutation Default Map
EXP-in

0

1

2

3

4

5

6

7

EXP-out

0

1

2

3

4

5

6

7

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enter the mls qos map exp-mutation command, you are configuring the mutated-EXP values
map to the sequential EXP numbers. For example, by entering the mls qos map exp-mutation 2 3 4 5
6 7 0 1 command, you configure this map:
EXP-in

0

1

2

3

4

5

6

7

EXP-out

2

3

4

5

6

7

0

1

Separate the eight EXP values by a space.
After you define the map in global configuration mode, you can attach the map to a port.
You can configure 15 ingress-EXP mutation maps to mutate the internal EXP value before it is written
as the ingress-EXP value. You can attach ingress-EXP mutation maps to any interface that PFC QoS
supports.
The PFC QoS derives the egress EXP value from the internal DSCP value. If you configure ingress-EXP
mutation, PFC QoS does not derive the ingress-EXP value from the mutated EXP value.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-476

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map exp-mutation

Examples

This example shows how to map a packet’s EXP to a new EXP value:
Router(config)# mls qos map exp-mutation mutemap1 1 2 3 4 5 6 7 0
Router(config)#

Related Commands

Command

Description

mls qos map exp-dscp

Defines the ingress EXP value to the internal DSCP map.

show mls qos mpls

Displays an interface summary for MPLS QoS classes in the policy maps.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-477

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map ip-prec-dscp

mls qos map ip-prec-dscp
To define an ingress-IP precedence-to-DSCP map for trusted interfaces, use the mls qos map
ip-prec-dscp command. To remove a prior entry, use the no form of this command.
mls qos map ip-prec-dscp dscp-values
no mls qos map ip-prec-dscp

Syntax Description

dscp-values

Defaults

The default IP precedence-to-DSCP configuration is listed in Table 2-22.

DSCP values corresponding to IP precedence values 0 to 7; valid values
are from 0 to 63.

Table 2-22 IP Precedence-to-DSCP Default Map
IP-Precedence

0

1

2

3

4

5

6

7

DSCP

0

8

16

24

32

40

48

56

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command to map the IP precedence of IP packets arriving on trusted interfaces (or flows) to a
DSCP when the trust type is trust-ipprec.
You can enter up to eight DSCP values separated by a space.
This map is a table of eight precedence values (0 through 7) and their corresponding DSCP values. The
Catalyst 6500 series switch has one map. The IP precedence values are as follows:
•

network 7

•

internet 6

•

critical 5

•

flash-override 4

•

flash 3

•

immediate 2

•

priority 1

•

routine 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-478

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map ip-prec-dscp

Examples

This example shows how to configure the ingress-IP precedence-to-DSCP mapping for trusted
interfaces:
Router(config)# mls qos map ip-prec-dscp 20 30 1 43 63 12 13 8
Router(config)#

Related Commands

Command

Description

mls qos map cos-dscp

Defines the ingress CoS-to-DSCP map for trusted interfaces.

mls qos map dscp-cos

Defines an egress DSCP-to-CoS map.

mls qos map
policed-dscp

Sets the mapping of policed DSCP values to marked-down DSCP values.

show mls qos maps

Displays information about the QoS map configuration and run-time
version.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-479

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos map policed-dscp

mls qos map policed-dscp
To configure the DSCP markdown map, use the mls qos map policed-dscp command. To remove a prior
entry, use the no form of this command.
mls qos map policed-dscp {normal-burst | max-burst} dscp1 [dscp2 [dscp3 [dscp4 [dscp5 [dscp6
[dscp7 [dscp8]]]]]]] to policed-dscp
no mls qos map policed-dscp

Syntax Description

normal-burst

Configures the markdown map used by the exceed-action
policed-dscp-transmit keywords.

max-burst

Configures the markdown map used by the violate-action
policed-dscp-transmit keywords.

dscp1

DSCP value; valid values are from 0 to 63.

dscp2 through
dscp8

(Optional) DSCP values; valid values are from 0 to 63.

to

Defines mapping.

policed-dscp

Policed-to-DSCP values; valid values are from 0 to 63.

Defaults

No marked-down values are configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The DSCP-to-policed-DSCP map determines the marked-down DSCP value that is applied to
out-of-profile flows. The Catalyst 6500 series switch has one map.
You can enter up to eight DSCP values separated by a space.
You can enter up to eight policed DSCP values separated by a space.

Note

To avoid out-of-sequence packets, configure the DSCP-to-policed-DSCP map so that marked-down
packets remain in the same queue as the in-profile traffic.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-480

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos map policed-dscp

Examples

This example shows how to map multiple DSCPs to a single policed-DSCP value:
Router(config)# mls qos map policed-dscp normal-burst 20 25 43 to 4
Router(config)#

Related Commands

Command

Description

mls qos map cos-dscp

Defines the ingress CoS-to-DSCP map for trusted interfaces.

mls qos map dscp-cos

Defines an egress DSCP-to-CoS map.

mls qos map
ip-prec-dscp

Defines an ingress-IP precedence-to-DSCP map for trusted interfaces.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-481

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos marking ignore port-trust

mls qos marking ignore port-trust
To mark packets even if the interface is trusted, use the mls qos marking ignore port-trust command.
To return to the default settings, use the no form of this command.
mls qos marking ignore port-trust
no mls qos marking ignore port-trust

Syntax Description

This command has no arguments or keywords.

Defaults

Port trust is enabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the mls qos marking ignore port-trust command to mark packets even if the interface is trusted.

Examples

This example shows how to mark packets even if the interface is trusted:
Router(config)# mls qos marking ignore port-trust
Router(config)#

This example shows how to enable port trust:
Router(config)# no mls qos marking ignore port-trust
Router(config)#

Related Commands

mls qos trust

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-482

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos marking statistics

mls qos marking statistics
To disable allocation of the policer-traffic class identification with set actions, use the mls qos marking
statistics command. To return to the default settings, use the no form of this command.
mls qos marking statistics
no mls qos marking statistics

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the show policy-map interface command to display policy-map statistics.

Examples

This example shows how to disable the allocation of the policer-traffic class identification with set
actions:
Router(config)# mls qos marking statistics
Router(config)#

This example shows how to allow the allocation of the policer-traffic class identification with set
actions:
Router(config)# no mls qos marking statistics
Router(config)#

Related Commands

Command

Description

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-483

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos mpls trust exp

mls qos mpls trust exp
To set the trusted state of MPLS packets only, use the mls qos mpls trust exp command. To set the
trusted state of MPLS packets to untrusted, use the no form of this command.
mls qos mpls trust exp
no qos mpls trust exp

Syntax Description

This command has no arguments or keywords.

Defaults

With the trusted state enabled, the defaults are as follows:
•

Untrusted—The packets are marked to 0 or by policy.

•

trust-cos.

With the trusted state disabled, the defaults are as follows:
•

trust-exp—The port/policy trust state is ignored.

•

The packets are marked by policy.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter the mls qos mpls trust exp command to treat MPLS packets as other Layer 2 packets for
CoS and egress queueing purposes (for example, to apply port or policy trust). All trusted cases (trust
CoS/IP/DSCP) are treated as trust-cos.

Examples

This example shows how to set the trusted state of MPLS packets to trust-cos:
Router(config-if)# mls qos mpls trust exp
Router(config-if)#

This example shows how to set the trusted state of MPLS packets to untrusted:
Router(config-if)# no mls qos mpls trust exp
Router(config-if)#

Related Commands

Command

Description

show mls qos mpls

Displays an interface summary for MPLS QoS classes in the policy maps.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-484

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos police redirected

mls qos police redirected
To turn on ACL-redirected packet policing, use the mls qos police redirected command. To turn off
policing of ACL-redirected packets, use the no form of this command.
mls qos police redirected
no mls qos police redirected

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the no mls qos police redirected command whenever you require NDE accuracy (if you do not
require QoS-redirected packets).

Examples

This example shows how to turn on the ACL-redirected packet policing:
Router(config)# mls qos police redirected
Router(config)#

This example shows how to turn off the ACL-redirected packet policing:
Router(config)# no mls qos police redirected
Router(config)#

Related Commands

Command

Description

show platform
earl-mode

Displays platform information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-485

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos protocol

mls qos protocol
To define the routing-protocol packet policing, use the mls qos protocol command. To return to the
default settings, use the no form of this command.
mls qos protocol protocol-name {pass-through | {police rate burst} | {precedence value
[police rate burst]}}
no mls qos protocol

Syntax Description

Defaults

protocol-name

Protocol name; valid values are arp, bgp, eigrp, igrp, isis, ldp, nd, ospf,
and rip.

pass-through

Specifies pass-through mode.

police rate

Specifies the maximum bits per second to be policed; valid values are from
32000 to 10000000000 bits per second.

burst

Normal burst bytes; valid values are from 1000 to 31250000 bytes.

precedence value

Specifies the IP-precedence value of the protocol packets to rewrite; valid
values are from 0 to 7.

The defaults are as follows:
•

burst is 1000 bits per second.

•

If QoS is enabled, DSCP is rewritten to zero.

•

If QoS is disabled, the port is in a pass-through mode (no marking or policing is applied).

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the precedence value keyword and arguments without entering the police rate burst
keyword and arguments, only the packets from an untrusted port are marked.
You can make the protocol packets avoid the per-interface policy maps by entering the police rate,
pass-through, or precedence value keywords and arguments.
The mls qos protocol command allows you to define the routing-protocol packet policing as follows:
•

When you specify the pass-through mode, the DSCP value does not change and is not policed.

•

When you set the police rate, the DSCP value does not change and is policed.

•

When you specify the precedence value, the DSCP value changes for the packets that come from
an untrusted port, the CoS value that is based on DSCP-to-CoS map changes, and the traffic is not
policed.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-486

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos protocol

•

When you specify the precedence value and the police rate, the DSCP value changes, the CoS value
that is based on DSCP-to-CoS map changes, and the DSCP value is policed. In this case, the DSCP
value changes are based on the trust state of the port; the DSCP value is changed only for the packets
that come from an untrusted port.

•

If you do not enter a precedence value, the DSCP value is based on whether or not you have enabled
MLS QoS as follows:
– If you enabled MLS QoS and the port is untrusted, the internal DSCP value is overwritten to

zero.
– If you enabled MLS QoS and the port is trusted, then the incoming DSCP value is maintained.

You can make the protocol packets avoid policing completely if you choose the pass-through mode. If
the police mode is chosen, the CIR specified is the rate that is used to police all the specified protocol’s
packets, both entering or leaving the Catalyst 6500 series switch.
To protect the system by ARP broadcast, you can enter the mls qos protocol arp police bps command.

Examples

This example shows how to define the routing-protocol packet policing:
Router(config)# mls qos protocol arp police 43000
Router(config)#

This example shows how to avoid policing completely:
Router(config)# mls qos protocol arp pass-through 43000
Router(config)#

This example shows how to define the IP-precedence value of the protocol packets to rewrite:
Router(config)# mls qos protocol bgp precedence 4
Router(config)#

This example shows how to define the IP-precedence value of the protocol packets to rewrite and police
the DSCP value:
Router(config)# mls qos protocol bgp precedence 4 police 32000
Router(config)#

Related Commands

Command

Description

show mls qos protocol

Displays the protocol pass-through information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-487

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos queueing-only

mls qos queueing-only
To enable port-queueing mode, use the mls qos queueing-only command. To disable the port-queueing
mode, use the no form of this command.
mls qos queueing-only
no mls qos queueing-only

Syntax Description

This command has no arguments or keywords.

Defaults

QoS is globally disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In port-queueing mode, PFC QoS (marking and policing) is disabled, and packet ToS and CoS are not
changed by the PFC. All queueing on rcv and xmt is based on a QoS tag in the incoming packet, which
is based on the incoming CoS.
For 802.1Q or ISL-encapsulated port links, queueing is based on the packet 802.1Q or ISL CoS.
For router main interfaces or access ports, queueing is based on the configured per-port CoS (the default
CoS is 0).

Examples

This example shows how to enable the port-queueing mode globally:
Router(config)# mls qos queueing-only
Router(config)#

This example shows how to disable the port-queueing mode globally:
Router(config)# no mls qos queueing-only
Router(config)#

Related Commands

Command

Description

mls qos (global
configuration mode)

Enables the QoS functionality globally.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-488

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos queue-mode mode-dscp

mls qos queue-mode mode-dscp
To set the queueing mode to DSCP on an interface, use the mls qos queue-mode mode-dscp command.
To return to the default settings, use the no form of this command.
mls qos queue-mode mode-dscp
no mls qos queue-mode mode-dscp

Syntax Description

This command has no arguments or keywords.

Defaults

CoS mode.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on 10-Gigabit Ethernet ports only.
You should configure ports to trust DSCP only if they receive traffic that carries valid Layer 3 DSCP.
You can enable DSCP-based ingress queues and thresholds on WS-X6708-10GE ports to provide
congestion avoidance.
For traffic from trust DSCP ports, PFC QoS uses the received DSCP value as the initial internal DSCP
value. PFC QoS does not mark any traffic on ingress ports configured to trust received DSCP.

Examples

This example shows how to set the queueing mode to DSCP on an interface:
Router(config-if)# mls qos queue-mode mode-dscp
Router(config-if)#

Related Commands

Command

Description

priority-queue
queue-limit

Allocates the available buffer space to a queue.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-489

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos rewrite ip dscp

mls qos rewrite ip dscp
To enable ToS-to-DSCP rewrite, use the mls qos rewrite ip dscp command. To disable ToS-to-DSCP
rewrite, use the no form of this command.
mls qos rewrite ip dscp
no mls qos rewrite ip dscp

Syntax Description

This command has no arguments or keywords.

Defaults

QoS is globally disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you disable ToS-to-DSCP rewrite, and QoS is enabled globally, the following occurs:
•

Final ToS-to-DSCP rewrite is disabled, and the ToS-to-DSCP packet is preserved.

•

Policing and marking function according to the QoS configuration.

•

Marked and marked-down CoS is used for queueing.

•

In QoS disabled mode, both ToS and CoS are preserved.

The no mls qos rewrite ip dscp command is incompatible with MPLS. The default mls qos rewrite ip
dscp command must remain enabled in order for the PFC3BXL or PFC3B to assign the correct EXP
value for the labels that it imposes.

Examples

This example shows how to disable ToS-to-DSCP rewrite:
Router(config)# mls qos rewrite ip dscp
Router(config)#

This example shows how to disable port-queueing mode globally:
Router(config)# no mls qos rewrite ip dscp
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-490

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos rewrite ip dscp

Related Commands

Command

Description

mls qos (global
configuration mode)

Enables the QoS functionality globally.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-491

Chapter 2
mls qos statistics-export (global configuration mode)

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos statistics-export (global configuration mode)
To enable QoS-statistics data export globally, use the mls qos statistics-export command. To disable
QoS-statistics data export globally, use the no form of this command.
mls qos statistics-export
no mls qos statistics-export

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enable data export globally to set up data export on your Catalyst 6500 series switch.
QoS-statistics data export is not supported on OSM interfaces.
For QoS-statistics data export to perform correctly, you should set the export-destination hostname or
IP address and the UDP port number.

Examples

This example shows how to enable data export globally:
Router(config)# mls qos statistics-export
Router(config)#

This example shows how to disable data export globally:
Router(config)# no mls qos statistics-export
Router(config)#

Related Commands

Command

Description

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-492

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos statistics-export (interface configuration mode)

mls qos statistics-export (interface configuration mode)
To enable per-port QoS-statistics data export, use the mls qos statistics-export command. To disable
per-port QoS-statistics data export, use the no form of this command.
mls qos statistics-export
no mls qos statistics-export

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

QoS-statistics data export is not supported on OSM interfaces.
You must enable data export on the port and globally to set up data export on your Catalyst 6500 series
switch.
For QoS-statistics data export to perform correctly, you should set the export-destination hostname or
IP address and the UDP port number.
QoS-statistics data is exported using delimiter-separated fields. You can set the delimiter by entering the
mls qos statistics-export delimiter command.
Port statistics are exported; port QoS statistics are not exported. For each data export-enabled port, the
following information is exported:
•

Type (1 denotes the type of port)

•

Module/port

•

In packets (cumulated hardware-counter values)

•

In bytes (cumulated hardware-counter values)

•

Out packets (cumulated hardware-counter values)

•

Out bytes (cumulated hardware-counter values)

•

Time stamp (time in seconds since January 1, 1970 UTC relative)

For example, if you have QoS-statistics data export that is enabled on FastEthernet4/5, the exported
records could be (in this example, the delimiter is a | [pipe]) as follows:
|1|4/5|123|80|12500|6800|982361894|

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-493

Chapter 2
mls qos statistics-export (interface configuration mode)

Examples

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

This example shows how to enable QoS-statistics data export:
Router(config-if)# mls qos statistics-export
Router(config-if)#

This example shows how to disable QoS-statistics data export:
Router(config-if)# no mls qos statistics-export
Router(config-if)#

Related Commands

Command

Description

mls qos
statistics-export
delimiter

Sets the QoS-statistics data-export field delimiter.

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-494

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos statistics-export aggregate-policer

mls qos statistics-export aggregate-policer
To enable QoS-statistics data export on the named aggregate policer, use the mls qos statistics-export
aggregate-policer command. To disable QoS-statistics data export on the named aggregate policer, use
the no form of this command.
mls qos statistics-export aggregate-policer policer-name
no mls qos statistics-export aggregate-policer policer-name

Syntax Description

policer-name

Defaults

Disabled for all shared aggregate policers

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Name of the policer.

QoS-statistics data export is not supported on OSM interfaces.
You must enable data export on the shared aggregate policer and globally to set up data export on your
Catalyst 6500 series switch.
QoS-statistics data is exported using delimiter-separated fields. You can set the delimiter by entering the
mls qos statistics-export delimiter command.
For each data export-enabled shared aggregate or named policer, statistics data per policer per EARL is
exported. For each data export-enabled shared aggregate or named policer, the following information is
exported:
•

Type (3 denotes aggregate policer export type)

•

Aggregate name

•

Direction (in or out)

•

EARL identification

•

Accepted packets (cumulated hardware-counter values)

•

Exceeded normal-rate packets (cumulated hardware-counter values)

•

Exceeded excess-rate packets (cumulated hardware-counter values)

•

Time stamp (time in seconds since January 1, 1970 UTC relative)

If a shared aggregate policer is attached to policies in both directions, two records are exported (one in
each direction). Each record will contain the same counter values for accepted packets, exceeded normal
packet rates, and exceeded excess packet rates.
For example, the exported records could be as follows (in this example, the delimiter is a | [pipe]):

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-495

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos statistics-export aggregate-policer

|3|agg_1|in|1|45543|2345|982361894|
|3|agg_1|in|3|45543|2345|982361894|

This example indicates the following information:

Examples

•

QoS-statistics data export that is enabled on the shared aggregate policer named “aggr_1”

•

An EARL in the supervisor engine that is installed in slot 1

•

An EARL that is installed in slot 3

This example shows how to enable per-shared aggregate or named-policer data export:
Router(config)# mls qos statistics-export aggregate-policer aggr1M
Router(config)#

Related Commands

Command

Description

mls qos
statistics-export
delimiter

Sets the QoS-statistics data-export field delimiter.

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-496

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos statistics-export class-map

mls qos statistics-export class-map
To enable QoS-statistics data export for a class map, use the mls qos statistics-export class-map
command. To disable QoS-statistics data export for a class map, use the no form of this command.
mls qos statistics-export class-map classmap-name
no mls qos statistics-export class-map classmap-name

Syntax Description

classmap-name

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Name of the class map.

QoS-statistics data export is not supported on OSM interfaces.
You must enable data export on the class map and globally to set up data export on your Catalyst 6500
series switch.
QoS-statistics data is exported using delimiter-separated fields. You can set the delimiter by entering the
mls qos statistics-export delimiter command.
For each data export-enabled class map, the statistics data per policer per interface is exported. If the
interface is a physical interface, the following information is exported:
•

Type (4 denotes a class map physical export)

•

Class map name

•

Direction (in or out)

•

Module/port

•

Accepted packets (cumulated hardware-counter values)

•

Exceeded normal-rate packets (cumulated hardware-counter values)

•

Exceeded excess-rate packets (cumulated hardware-ounter values)

•

Time stamp (time in seconds since January 1, 1970 UTC relative)

If the interface is a Catalyst 6500 series switch VLAN, the following information is exported:
•

Type (5 denotes class-map VLAN export)

•

Class-map name

•

Direction (in or out)

•

EARL identification (slot number in which the EARL is installed)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-497

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos statistics-export class-map

•

VLAN number

•

Accepted packets (cumulated hardware-counter values)

•

Exceeded normal-rate packets (cumulated hardware-counter values)

•

Exceeded excess-rate packets (cumulated hardware-counter values)

•

Time stamp (time in seconds since January 1, 1970 UTC relative)

If the interface is a Catalyst 6500 series switch port channel, the following information is exported:
•

Type (6 denotes class-map port-channel export)

•

Class-map name

•

Direction (in or out)

•

EARL identification (slot number in which the EARL is installed)

•

Port-channel number

•

Accepted packets (cumulated hardware-counter values)

•

Exceeded normal-rate packets (cumulated hardware-counter values)

•

Exceeded excess-rate packets (cumulated hardware-counter values)

•

Time stamp (time in seconds since January 1, 1970 UTC relative)

For example, if you have the following configuration:
•

QoS-statistics data export enabled on the class map named “class_1”

•

An EARL in the supervisor engine that is installed in slot 1

•

An EARL that is installed in slot 3

•

The Catalyst 6500 series switch is in the policy map named “policy_1”

•

policy_1 is attached to the following interfaces in the ingress direction:
– FastEthernet4/5
– VLAN 100
– Port-channel 24

The exported records could be (in this example, the delimiter is a | [pipe]) as follows:
|4|class_1|in|4/5|45543|2345|2345|982361894|
|5|class_1|in|1|100|44000|3554|36678|982361894|
|5|class_1|in|3|100|30234|1575|1575|982361894|

Examples

This example shows how to enable QoS-statistics data export for a class map:
Router(config)# mls qos statistics-export class-map class3
Router(config)#

Related Commands

Command

Description

mls qos statistics-export
delimiter

Sets the QoS-statistics data-export field delimiter.

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status
and configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-498

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos statistics-export delimiter

mls qos statistics-export delimiter
To set the QoS-statistics data-export field delimiter, use the mls qos statistics-export delimiter
command. To return to the default settings, use the no form of this command.
mls qos statistics-export delimiter
no mls qos statistics-export delimiter

Syntax Description

This command has no arguments or keywords.

Defaults

The default delimiter is the pipe character (|).

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

QoS-statistics data export is not supported on OSM interfaces.
You must enable data export globally to set up data export on your Catalyst 6500 series switch.

Examples

This example shows how to set the QoS-statistics data-export field delimiter (a comma) and verify the
configuration:
Router(config)# mls qos statistics-export delimiter ,
Router(config)#

Related Commands

Command

Description

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-499

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos statistics-export destination

mls qos statistics-export destination
To configure the QoS-statistics data-export destination host and UDP port number, use the mls qos
statistics-export destination command. To return to the default settings, use the no form of this
command.
mls qos statistics-export destination {host-name | host-ip-address} {{port port-number} | syslog}
[facility facility-name] [severity severity-value]

Syntax Description

Defaults

host-name

Hostname.

host-ip-address

Host IP address.

port
port-number

Specifies the UDP port number.

syslog

Specifies the syslog port.

facility
facility-name

(Optional) Specifies the type of facility to export; see the “Usage Guidelines”
section for a list of valid values.

severity
severity-value

(Optional) Specifies the severity level to export; see the “Usage Guidelines”
section for a list of valid values.

The default is none unless syslog is specified. If syslog is specified, the defaults are as follows:
•

port is 514.

•

facility is local6.

•

severity is debug.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

QoS-statistics data export is not supported on OSM interfaces.
Valid facility values are as follows:
•

authorization—Security/authorization messages

•

cron—Clock daemon

•

daemon—System daemon

•

kernel—Kernel messages

•

local0—Local use 0

•

local1—Local use 1

•

local2—Local use 2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-500

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos statistics-export destination

•

local3—Local use 3

•

local4—Local use 4

•

local5—Local use 5

•

local6—Local use 6

•

local7—Local use 7

•

lpr—Line printer subsystem

•

mail—Mail system

•

news—Network news subsystem

•

syslog—Messages that are generated internally by syslogd

•

user—User-level messages

•

uucp—UUCP subsystem

Valid severity levels are as follows:

Examples

•

alert—Action must be taken immediately

•

critical—Critical conditions

•

debug—Debug-level messages

•

emergency—System is unusable

•

error—Error conditions

•

informational—Informational

•

notice—Normal but significant conditions

•

warning—Warning conditions

This example shows how to specify the destination host address and syslog as the UDP port number:
Router(config)# mls qos statistics-export destination 172.20.52.3 syslog
Router(config)#

Related Commands

Command

Description

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-501

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos statistics-export interval

mls qos statistics-export interval
To specify how often a port and/or aggregate-policer QoS-statistics data is read and exported, use the mls
qos statistics-export interval command. To return to the default settings, use the no form of this
command.
mls qos statistics-export interval interval
no mls qos statistics-export interval

Syntax Description

interval

Defaults

300 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Export time; valid values are from 30 to 65535 seconds.

QoS-statistics data export is not supported on OSM interfaces.
The interval needs to be short enough to avoid counter wraparound with the activity in your
configuration.

Caution

Examples

Be careful when decreasing the interval because exporting QoS statistics increases the traffic on the
Catalyst 6500 series switch.

This example shows how to set the QoS-statistics data-export interval:
Router(config)# mls qos statistics-export interval 250
Router(config)#

Related Commands

Command

Description

show mls qos
statistics-export info

Displays information about the MLS-statistics data-export status and
configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-502

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos trust

mls qos trust
To set the trusted state of an interface, use the mls qos trust command. To set an interface to the
untrusted state, use the no form of this command.
mls qos trust [cos | dscp | ip-precedence]
no mls qos trust

Syntax Description

Defaults

cos

(Optional) Specifies that the CoS bits in incoming frames are trusted and
derives the internal DSCP value from the CoS bits.

dscp

(Optional) Specifies that the ToS bits in the incoming packets contain a
DSCP value.

ip-precedence

(Optional) Specifies that the ToS bits in the incoming packets contain an
IP precedence value and derives the internal DSCP value from the
IP-precedence bits.

The defaults for LAN interfaces and WAN interfaces on the OSMs are as follows:
•

If you enable global QoS, the port is untrusted.

•

If you disable global QoS, the default is dscp.

•

If you do not enter an argument, trust dscp is assumed.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter the mls qos trust command to set the trusted state of an interface. For example, you can
set whether the packets arriving at an interface are trusted to carry the correct CoS, ToS, and DSCP
classifications.
The cos keyword is not supported for pos or atm interface types.
You cannot configure the trust state on FlexWAN modules.
You cannot configure the trust state on 1q4t LAN ports except for Gigabit Ethernet ports.
Ingress-queue drop thresholds are not implemented when you enter the mls qos trust cos command on
4-port Gigabit Ethernet WAN modules.
Use the set qos-group command to set the trust state on Layer 2 WAN interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-503

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos trust

Examples

This example shows how to set the trusted state of an interface to IP precedence:
Router(config-if)# mls qos trust ip-precedence
Router(config-if)#

Related Commands

Command

Description

mls qos bridged

Enables the microflow policing for bridged traffic on Layer 3 LAN
interfaces.

mls qos cos

Defines the default CoS value for an interface.

mls qos vlan-based

Defines the default CoS value for a VLAN.

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-504

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos trust extend

mls qos trust extend
To configure the trust mode of the phone, use the mls qos trust extend command. To return to the default
settings, use the no form of this command.
mls qos trust extend [cos value]
no mls qos trust extend

Syntax Description

cos value

Defaults

The default settings are as follows:

(Optional) Specifies the CoS value that is used to remark the packets from
the PC; valid values are from 0 to 7.

•

Mode is untrusted.

•

cos value is 0.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is not supported on WAN modules.
If you set the phone to trusted mode, all the packets from the PC are sent untouched directly through the
phone to the Catalyst 6500 series switch. If you set the phone to untrusted mode, all the traffic coming
from the PC are remarked with the configured CoS value before being sent to the Catalyst 6500 series
switch.
Each time that you enter the mls qos trust extend command, the mode is changed. For example, if the
mode was previously set to trusted, if you enter the command, the mode changes to untrusted. Enter the
show queueing interface command to display the current trust mode.

Examples

This example shows how to set the phone that is attached to the switch port in trust mode:
Router(config-if)# interface fastethernet5/1
Router(config-if)# mls qos trust extend
Router(config-if)#

This example shows how to change the mode to untrusted and set the remark CoS value to 3:
Router(config-if)# interface fastethernet5/1
Router(config-if)# mls qos trust extend cos 3
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-505

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls qos trust extend

This example shows how to set the configuration to the default mode:
Router(config-if)# interface fastethernet5/1
Router(config-if)# no mls qos trust extend
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-506

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls qos vlan-based

mls qos vlan-based
To enable per-VLAN QoS for a Layer 2 interface, use the mls qos vlan-based command. To disable
per-VLAN QoS for a Layer 2 interface, use the no form of this command.
mls qos vlan-based
no mls qos vlan-based

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on switch-port and port-channel interfaces only.
In VLAN-based mode, the policy map that is attached to the Layer 2 interface is ignored, and QoS is
driven by the policy map that is attached to the corresponding VLAN interface.
You can configure per-VLAN QoS only on Layer 2 interfaces.

Note

Examples

Layer 3 interfaces are always in interface-based mode. Layer 3 VLAN interfaces are always in
VLAN-based mode.

This example shows how to enable per-VLAN QoS for a Layer 2 interface:
Router(config-if)# mls qos vlan-based
Router(config-if)#

Related Commands

Command

Description

mls qos bridged

Enables the microflow policing for bridged traffic on Layer 3 LAN
interfaces.

mls qos cos

Defines the default CoS value for an interface.

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-507

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit all

mls rate-limit all
To enable and set the rate limiters common to unicast and multicast packets, use the mls rate-limit all
command. To disable the rate limiters, use the no form of this command.
mls rate-limit all {mtu-failure | ttl-failure} pps [packets-in-burst]
no mls rate-limit all {mtu-failure | ttl-failure}

Syntax Description

all

Specifies rate limiting for unicast and multicast packets.

mtu-failure

Enables and sets the rate limiters for MTU-failed packets.

ttl-failure

Enables and sets the rate limiters for TTL-failed packets.

pps

Packets per second; valid values are from 10 to 1000000 packets per second.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

Defaults

The Layer 2 rate limiters are off by default. If you enable and set the rate limiters, the default
packets-in-burst is 10.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Rate limiters can rate limit packets that are punted from the data path in the hardware up to the data path
in the software. Rate limiters protect the control path in the software from congestion by dropping the
traffic that exceeds the configured rate.

Examples

This example shows how to set the TTL-failure limiter for unicast and multicast packets:
Router(config)# mls rate-limit all ttl-failure 15
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-508

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit layer2

mls rate-limit layer2
To enable and rate limit the control packets in Layer 2, use the mls rate-limit layer2 command. To disable
the rate limiter in the hardware, use the no form of this command.
mls rate-limit layer2 {pdu | l2pt | port-security} pps [packets-in-burst]
no mls rate-limit layer2 [pdu | l2pt | port-security]

Syntax Description

Defaults

pdu pps

Specifies the rate limit for BPDU, CDP, PDU, and VTP PDU Layer 2 control
packets; valid values are from 10 to 1000000 packets per second.

l2pt pps

Specifies the rate limit for control packets in Layer 2 with a protocol-tunneling
multicast-MAC address in Layer 2; valid values are from 10 to 1000000 packets
per second.

port-security pps

Specifies the rate limit for port security traffic; valid values are from 10 to
1000000 packets per second.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

The default settings are as follows:
•

Layer 2 rate limiters are off by default.

•

If you enable and set the rate limiters, the default setting for packets-in-burst is 10 and pps has no
default setting.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You cannot configure the Layer 2 rate limiters if the global switching mode is set to truncated mode.
For the port-security pps keywords and argument, use the following guidelines:
•

The PFC2 does not support the port-security rate limiter.

•

The truncated switching mode does not support the port-security rate limiter.

•

The lower the value, the more the CPU is protected.

Rate limiters control packets as follows:
•

The frames are classified as Layer 2 control frames by the destination MAC address. The destination
MAC address used are as follows:
– 0180.C200.0000 for IEEE BPDU
– 0100.0CCC.CCCC for CDP
– 0100.0CCC.CCCD for PVST/SSTP BPDU

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-509

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit layer2

•

The software allocates an LTL index for the frames.

•

The LTL index is submitted to the forwarding engine for aggregate rate limiting of all the associated
frames.

The Layer2 controlpackets are as follow s:
•

GVRP

•

BPDUs

•

CDP/DTP/PAgP/UDLD/LACP/VTP PDUs

•

PVST/SSTP PDUs

If the rate of the traffic exceeds the configured rate, the excessive packets are dropped at the hardware.
The pdu and l2pt rate limiters use specific hardware rate-limiter numbers only, such as 9 through 12.
Enter the show mls rate-limit usage command to display the available rate-limiter numbers. The
available numbers are displayed as “Free” in the output field. If all four rate limiters are in use by other
features, a system message is displayed telling you to turn off a feature to rate limit the control packets
in Layer 2.
When a MAC move occurs and a packet is seen on two ports, the packet is redirected to the software. If
one of those ports has the violation mode set to restrict or protect, the packet is dropped in software. You
can use the port-security rate limiter to throttle the amount of such packets redirected to software . This
helps in protecting the software from high traffic rates.

Examples

This example shows how to enable and set the rate limiters for the protocol-tunneling packets in Layer 2:
Router(config)# mls rate-limit layer2 l2pt 3000
Router(config)#

This example shows how to configure the port-security rate limiter:
Router(config)# mls rate-limit layer2 port-security 500
Router(config)# end

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-510

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit multicast ipv4

mls rate-limit multicast ipv4
To enable and set the rate limiters for the IPv4 multicast packets, use the mls rate-limit multicast ipv4
command. To disable the rate limiters, use the no form of this command.
mls rate-limit multicast ipv4 {connected | fib-miss | igmp | ip-option | partial | non-rpf} pps
[packets-in-burst]
no mls rate-limit multicast ipv4 {connected | fib-miss | igmp | ip-option | partial | non-rpf}

Syntax Description

Defaults

connected

Enables and sets the rate limiters for multicast packets from directly connected
sources.

fib-miss

Enables and sets the rate limiters for the FIB-missed multicast packets.

igmp

Enables and sets the rate limiters for the IGMP packets.

ip-option

Enables and sets the rate limiters for the multicast packets with IP options.

partial

Enables and sets the rate limiters for the multicast packets during a partial SC
state.

non-rpf

Enables and sets the rate limiters for the multicast packets failing the RPF
check.

pps

Packets per second; valid values are from 10 to 1000000 packets per second.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

The defaults are as follows:
•

If the packets-in-burst is not set, a default of 100 is programmed for multicast cases.

•

fib-miss—Enabled at 100000 pps and packet-in-burst is set to 100.

•

ip-option—Disabled.

•

partial—Enabled at 100000 pps and packet-in-burst is set to 100.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You cannot configure the IPv4 rate limiters if the global switching mode is set to truncated mode.
The rate limiters can rate limit the packets that are punted from the data path in the hardware up to the
data path in the software. The rate limiters protect the control path in the software from congestion and
drop the traffic that exceeds the configured rate.
The ip-option keyword is supported in PFC3BXL or PFC3B mode only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-511

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit multicast ipv4

Examples

This example shows how to set the rate limiters for the multicast packets failing the RPF check:
Router(config)# mls rate-limit multicast ipv4 non-rpf 100
Router(config)#

This example shows how to set the rate limiters for the multicast packets during a partial SC state:
Router(config)# mls rate-limit multicast ipv4 partial 250
Router(config)#

This example shows how to set the rate limiters for the FIB-missed multicast packets:
Router(config)# mls rate-limit multicast ipv4 fib-miss 15
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-512

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit multicast ipv6

mls rate-limit multicast ipv6
To configure the IPv6 multicast rate limiters, use the mls rate-limit multicast ipv6 command. To
disable the rate limiters, use the no form of this command.
mls rate-limit multicast ipv6 {connected pps [packets-in-burst]} | {rate-limiter-name {share
{auto | target-rate-limiter}}}
no mls rate-limit multicast ipv6 {connected | rate-limiter-type}

Syntax Description

connected pps

Enables and sets the rate limiters for the IPv6 multicast packets from a
directly connected source; valid values are from 10 to 1000000 packets per
second.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

rate-limiter-name

Rate-limiter name; valid values are default-drop, route-cntl,
secondary-drop, sg, starg-bridge, and starg-m-bridge. See the “Usage
Guidelines” section for additional information.

share

Specifies the sharing policy for IPv6 rate limiters; see the “Usage
Guidelines” section for additional information.

auto

Decides the sharing policy automatically.

target-rate-limiter

Rate-limiter name that was the first rate-limiter name programmed in the
hardware for the group; valid values are default-drop, route-cntl,
secondary-drop, sg, starg-bridge, and starg-m-bridge. See the “Usage
Guidelines” section for additional information.

Defaults

If the burst is not set, a default of 100 is programmed for multicast cases.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The rate-limiter-name argument must be a rate limiter that is not currently programmed.
The target-rate-limiter argument must be a rate limiter that is programmed in the hardware and must be
the first rate limiter programmed for its group.
Table 2-23 lists the IPv6 rate limiters and the class of traffic that each rate limiter serves.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-513

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit multicast ipv6

Table 2-23 IPv6 Rate Limiters

Rate-Limiter ID

Traffic Classes to be Rate Limited

Connected

Directly connected source traffic

Default-drop

* (*, G/m)SSM
* (*, G/m)SSM non-rpf

Route-control

* (*, FF02::X/128)

Secondary-drop

* (*, G/128) SPT threshold is infinity

SG

* (S, G) RP-RPF post-switchover
* (*, FFx2/16)

Starg-bridge

* (*, G/128) SM
* SM non-rpf traffic when (*, G) exists

Starg-M-bridge

* (*, G/m) SM
* (*, FF/8)
* SM non-rpf traffic when (*, G) does not exist

You can configure rate limiters for IPv6 multicast traffic using one of the following methods:
•

Direct association of the rate limiters for a traffic class—Select a rate and associate the rate with a
rate limiter. This example shows how to pick a rate of 1000 pps and 20 packets per burst and
associate the rate with the default-drop rate limiter:
Router(config)# mls rate-limit multicast ipv6 default-drop 1000 20

•

Static sharing of a rate limiter with another preconfigured rate limiter—When there are not enough
adjacency-based rate limiters available, you can share a rate limiter with an already configured rate
limiter (target rate limiter). This example shows how to share the route-cntl rate limiter with the
default-drop target rate limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share default-drop

If the target rate limiter is not configured, a message displays that the target rate limiter must be
configured for it to be shared with other rate limiters.
•

Dynamic sharing of rate limiters—If you are not sure about which rate limiter to share with, use the
share auto keywords to enable dynamic sharing. When you enable dynamic sharing, the system
picks a preconfigured rate limiter and shares the given rate limiter with the preconfigured rate
limiter. This example shows how to choose dynamic sharing for the route-cntrl rate limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share auto

Examples

This example shows how to set the rate limiters for the IPv6 multicast packets from a directly connected
source:
Router(config)# mls rate-limit multicast ipv6 connected 1500 20
Router(config)#

This example shows shows how to configure a direct association of the rate limiters for a traffic class:
Router(config)# mls rate-limit multicast ipv6 default-drop 1000 20
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-514

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit multicast ipv6

This example shows how to configure the static sharing of a rate limiter with another preconfigured rate
limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share default-drop
Router(config)#

This example shows how to enable dynamic sharing for the route-cntrl rate limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share auto
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-515

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit unicast acl

mls rate-limit unicast acl
To enable and set the ACL-bridged rate limiters, use the mls rate-limit unicast acl command. To disable
the rate limiters, use the no form of this command.
mls rate-limit unicast acl {input | output | vacl-log} {pps [packets-in-burst]}
no mls rate-limit unicast acl {input | output | vacl-log}

Syntax Description

Defaults

input

Specifies the rate limiters for the input ACL-bridged unicast packets.

output

Specifies the rate limiters for the output ACL-bridged unicast packets.

vacl-log

Specifies the rate limiters for the VACL log cases.

pps

Packets per second; see the “Usage Guidelines” section for valid values.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

The defaults are as follows:
•

input—Disabled.

•

output—Disabled.

•

vacl-log—Enabled at 2000 pps and packets-in-burst is set to 1.

•

If the packets-in-burst is not set, 10 is programmed for unicast cases.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The rate limiters can rate limit the packets that are punted from the data path in the hardware up to the
data path in the software. The rate limiters protect the control path in the software from congestion and
drop the traffic that exceeds the configured rate.
When setting the pps, valid values are as follows:
•

ACL input and output cases—10 to 1000000 pps

•

VACL log cases—10 to 5000 pps

You cannot change the vacl-log packets-in-burst keyword and argument; it is set to 1 by default.
Some cases (or scenarios) share the same hardware register. These cases are divided into the following
two groups:
•

Group1:
– Egress ACL-bridged packets
– Ingress ACL-bridged packets

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-516

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit unicast acl

•

Group 2:
– RPF failure
– ICMP unreachable for ACL drop
– ICMP unreachable for no-route
– IP errors

All the components of each group use or share the same hardware register. For example, ACL-bridged
ingress and egress packets use register A. ICMP-unreachable, no-route, and RPF failures use register B.
In most cases, when you change a component of a group, all the components in the group are overwritten
to use the same hardware register as the first component changed. A warning message is printed out each
time that an overwriting operation occurs, but only if you enable the service internal mode. The
overwriting operation does not occur in these situations:

Examples

•

The pps value is set to 0 (zero) for a particular case.

•

When the ingress or egress ACL-bridged packet cases are disabled, overwriting does not occur until
the cases are enabled again. If either case is disabled, the other is not affected if the remaining case
is enabled. For example, if you program the ingress ACL-bridged packets with a 100-pps rate, and
then you configure the egress ACL-bridged packets with a 200-pps rate, the ingress ACL-bridged
packet value is overwritten to 200 pps and both the ingress and the egress ACL-bridged packets have
a 200-pps rate.

This example shows how to set the input ACL-bridged packet limiter for unicast packets:
Router(config)# mls rate-limit unicast acl ingress 100
Router(config)#

This example shows how to disable the input ACL-bridged packet limiter for unicast packets:
Router(config)# no mls rate-limit unicast acl ingress
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-517

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit unicast cef

mls rate-limit unicast cef
To enable and set the CEF rate limiters, use the mls rate-limit unicast cef command. To disable the rate
limiters, use the no form of this command.
mls rate-limit unicast cef {receive | glean} pps [packets-in-burst]
no mls rate-limit unicast cef {receive | glean}

Syntax Description

Defaults

receive

Enables and sets the rate limiters for receive packets.

glean

Enables and sets the rate limiters for ARP-resolution packets.

pps

Packets per second; valid values are from 10 to 1000000 packets per second.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

The defaults are as follows:
•

receive—Disabled.

•

glean—Disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enable the CEF rate limiters, the following situations occur (if the situation that is listed is
unacceptable, disable the CEF rate limiters):
•

If a packet hits a glean/receive adjacency, the packet may be dropped instead of being sent to the
software if there is an output ACL on the input VLAN and the matched entry result is deny.

•

If the matched ACL entry result is bridge, the packet is subject to egress ACL bridge rate limiting
(if turned ON) instead of glean/receive rate limiting.

•

The glean/receive adjacency rate limiting is applied only if the output ACL lookup result is permit
or there is no output ACLs on the input VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-518

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit unicast cef

Examples

This example shows how to set the CEF-glean limiter for the unicast packets:
Router(config)# mls rate-limit unicast cef glean 5000
Router(config)#

This example shows disable the CEF-glean limiter for the unicast packets:
Router(config)# no mls rate-limit unicast cef glean
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-519

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit unicast ip

mls rate-limit unicast ip
To enable and set the rate limiters for the unicast packets, use the mls rate-limit unicast ip command.
To disable the rate limiters, use the no form of this command.
mls rate-limit unicast ip {errors | features | options | rpf-failure} pps [packets-in-burst]
mls rate-limit unicast ip icmp {redirect | unreachable {acl-drop pps} | no-route pps}
[packets-in-burst]
no mls rate-limit unicast ip {errors | features | {icmp {redirect | unreachable {acl-drop |
no-route}}} | options | rpf-failure} pps [packets-in-burst]

Syntax Description

Defaults

errors

Specifies rate limiting for unicast packets with IP checksum and length errors.

features

Specifies rate limiting for unicast packets with software-security features in
Layer 3 (for example, authorization proxy, IPsec, and inspection).

options

Specifies rate limiting for unicast IPv4 packets with options.

rpf-failure

Specifies rate limiting for unicast packets with RPF failures.

pps

Packets per second; see the “Usage Guidelines” section for valid values.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

icmp redirect

Specifies rate limiting for unicast packets requiring ICMP redirect.

icmp unreachable
acl-drop pps

Enables and sets the rate limiters for the ICMP unreachables for the
ACL-dropped packets.

icmp unreachable
no-route pps

Enables and sets the rate limiters for the ICMP unreachables for the FIB-miss
packets.

The defaults are as follows:
•

If the packets-in-burst is not set, a default of 10 is programmed as the burst for unicast cases.

•

errors—Enabled at 100 pps and packets-in-burst set to 10.

•

rpf-failure—Enabled at 100 pps and packets-in-burst set to 10.

•

icmp unreachable acl-drop—Enabled at 100 pps and packets-in-burst set to 10.

•

icmp unreachable no-route—Enabled at 100 pps and packets-in-burst set to 10.

•

icmp redirect—Disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-520

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit unicast ip

Usage Guidelines

To provide OAL support for denied packets, enter the mls rate-limit unicast ip icmp unreachable
acl-drop 0 command.
OAL and VACL capture are incompatible. Do not configure both features on the switch. With OAL
configured, use SPAN to capture traffic.
The rate limiters can rate limit the packets that are punted from the data path in the hardware up to the
data path in the software. The rate limiters protect the control path in the software from congestion and
drop the traffic that exceeds the configured rate.

Note

When you configure an ICMP rate limiter, and an ICMP redirect occurs, exiting data traffic is dropped
while the remaining traffic on the same interface is forwarded.
When setting the pps, the valid values are 0 and from 10 to 1000000. Setting the pps to 0 globally
disables the redirection of the packets to the route processor. The 0 value is supported for these rate
limiters:
•

ICMP unreachable ACL-drop

•

ICMP unreachable no-route

•

ICMP redirect

•

IP rpf failure

Some cases (or scenarios) share the same hardware register. These cases are divided into the following
two groups:
•

Group1:
– Egress ACL-bridged packets
– Ingress ACL-bridged packets

•

Group 2:
– RPF failure
– ICMP unreachable for ACL drop
– ICMP unreachable for no-route
– IP errors

All the components of each group use or share the same hardware register. For example, ACL-bridged
ingress and egress packets use register A. ICMP-unreachable, no-route, and RPF failures use register B.
In most cases, when you change a component of a group, all the components in the group are overwritten
to use the same hardware register as the first component changed. A warning message is printed out each
time that an overwriting operation occurs, but only if you enable the service internal mode. The
overwriting operation does not occur in these situations:
•

The pps value is set to 0 (zero) for a particular case.

•

When the ingress or egress ACL-bridged packet cases are disabled, overwriting does not occur until
the cases are enabled again. If either case is disabled, the other is not affected as long as the
remaining case is enabled. For example, if you program the ingress ACL-bridged packets with a
100-pps rate, and then you configure the egress ACL-bridged packets with a 200-pps rate, the
ingress ACL-bridged packet value is overwritten to 200 pps and both the ingress and the egress
ACL-bridged packets have a 200-pps rate.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-521

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit unicast ip

Examples

This example shows how to set the ICMP-redirect limiter for unicast packets:
Router(config)# mls rate-limit unicast ip icmp redirect 250
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-522

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit unicast l3-features

mls rate-limit unicast l3-features
To enable and set the Layer 3 security rate limiters for the unicast packets, use the mls rate-limit unicast
l3-features command. To disable the rate limiters, use the no form of this command.
mls rate-limit unicast l3-features pps [packets-in-burst]
no mls rate-limit unicast l3-features pps [packets-in-burst]

Syntax Description

Defaults

pps

Packets per second; see the “Usage Guidelines” section for valid values.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

The defaults are as follows:
•

Enabled at 2000 pps and packets-in-burst is set to 1.

•

If the packets-in-burst is not set, 10 is programmed for unicast cases.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the Layer 3 security rate limiters for the unicast packets:
Router(config)# mls rate-limit unicast l3-features 5000
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-523

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rate-limit unicast vacl-log

mls rate-limit unicast vacl-log
To enable and set the VACL-log case rate limiters, use the mls rate-limit unicast vacl-log command.
To disable the rate limiters, use the no form of this command.
mls rate-limit unicast vacl-log {pps [packets-in-burst]}
no mls rate-limit unicast vacl-log

Syntax Description

Defaults

pps

Packets per second; see the “Usage Guidelines” section for valid values.

packets-in-burst

(Optional) Packets in burst; valid values are from 1 to 255.

The defaults are as follows:
•

Enabled at 2000 pps and packets-in-burst is set to 1.

•

If the packets-in-burst is not set, 10 is programmed for unicast cases.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The rate limiters can rate limit the packets that are punted from the data path in the hardware up to the
data path in the software. The rate limiters protect the control path in the software from congestion and
drop the traffic that exceeds the configured rate.
When setting the pps, valid values are as follows:
•

ACL input and output cases—10 to 1000000 pps

•

VACL log cases—10 to 5000 pps

Setting the pps to 0 globally disables the redirection of the packets to the route processor.
You cannot change the vacl-log packets-in-burst keyword and argument; it is set to 1 by default.
Some cases (or scenarios) share the same hardware register. These cases are divided into the following
two groups:
•

Group1:
– Egress ACL-bridged packets
– Ingress ACL-bridged packets

•

Group 2:
– RPF failure
– ICMP unreachable for ACL drop
– ICMP unreachable for no-route

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-524

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rate-limit unicast vacl-log

– IP errors

All the components of each group use or share the same hardware register. For example, ACL-bridged
ingress and egress packets use register A. ICMP-unreachable, no-route, and RPF failures use register B.
In most cases, when you change a component of a group, all the components in the group are overwritten
to use the same hardware register as the first component changed. A warning message is printed out each
time that an overwriting operation occurs, but only if you enable the service internal mode. The
overwriting operation does not occur in these situations:

Examples

•

The pps value is set to 0 (zero) for a particular case.

•

When the ingress or egress ACL-bridged packet cases are disabled, overwriting does not occur until
the cases are enabled again. If either case is disabled, the other is not affected if the remaining case
is enabled. For example, if you program the ingress ACL-bridged packets with a 100-pps rate, and
then you configure the egress ACL-bridged packets with a 200-pps rate, the ingress ACL-bridged
packet value is overwritten to 200 pps and both the ingress and the egress ACL-bridged packets have
a 200-pps rate.

This example shows how to set the VACL-log case packet limiter for unicast packets:
Router(config)# mls rate-limit unicast vacl-log 100
Router(config)#

This example shows how to disable the rate limiters:
Router(config)# no mls rate-limit unicast vacl-log 100
Router(config)#

Related Commands

Command

Description

show mls rate-limit

Displays information about the MLS rate limiter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-525

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rp ip (global configuration mode)

mls rp ip (global configuration mode)
To enable external systems to establish IP shortcuts to the PISA, use the mls rp ip command. To remove
a prior entry, use the no form of this command.
mls rp ip [input-acl | route-map]
no mls rp ip

Syntax Description

input-acl

(Optional) Enables the IP-input access list.

route-map

(Optional) Enables the IP-route map.

Defaults

No shortcuts are configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to allow the external systems to establish IP shortcuts with IP-input access
lists:
Router(config)# mls rp ip input-acl
Router(config)#

Related Commands

Command

Description

mls ip

Enables MLS IP for the internal router on the interface.

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-526

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rp ip (interface configuration mode)

mls rp ip (interface configuration mode)
To enable the external systems to enable MLS IP on a specified interface, use the mls rp ip command.
To disable MLS IP, use the no form of this command.
mls rp ip
no mls rp ip

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable the external systems to enable MLS IP on an interface:
Router(config-if)# mls rp ip
Router(config-if)

Related Commands

Command

Description

mls rp ip (global
configuration mode)

Enables external systems to establish IP shortcuts to the PISA.

show mls ip multicast

Displays the MLS IP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-527

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rp ipx (global configuration mode)

mls rp ipx (global configuration mode)
To allow the external systems to enable MLS IPX to the PISA, use the mls rp ipx command. To remove
a prior entry, use the no form of this command.
mls rp ipx [input-acl]
no mls rp ipx

Syntax Description

input-acl

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Enables MLS IPX and overrides ACLs.

This example shows how to allow the external systems to enable MLS IPX to the PISA and override
ACLs:
Router(config)# mls rp ipx input-acl
Router(config)#

Related Commands

Command

Description

mls rp ipx (interface
configuration mode)

Allows the external systems to enable MLS IPX on the interface.

show mls rp ipx

Displays details for all IPX MLS interfaces on the IPX MLS router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-528

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rp ipx (interface configuration mode)

mls rp ipx (interface configuration mode)
To allow the external systems to enable MLS IPX on the interface, use the mls rp ipx command. To
disable MLS IPX on the interface, use the no form of this command.
mls rp ipx
no mls rp ipx

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to allow the external systems to enable MLS IPX on an interface:
Router(config-if)# mls rp ipx
Router(config-if)#

Related Commands

Command

Description

mls rp ipx (global
configuration mode)

Allows the external systems to enable MLS IPX to the PISA.

show mls rp ipx

Displays details for all IPX MLS interfaces on the IPX MLS router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-529

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rp management-interface

mls rp management-interface
To enable the interface as a management interface, use the mls rp management-interface command.
To remove a prior entry, use the no form of this command.
mls rp management-interface
no mls rp management-interface

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable an interface as a management interface:
Router(config-if)# mls rp management-interface
Router(config-if)#

Related Commands

Command

Description

show mls rp

Displays MLS details.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-530

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rp nde-address

mls rp nde-address
To specify the NDE address, use the mls rp nde-address command. To remove a prior entry, use the no
form of this command.
mls rp nde-address ip-address
no mls rp nde-address ip-address

Syntax Description

ip-address

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

NDE IP address.

Use the following syntax to specify an IP subnet address:
•

ip-subnet-addr—Short subnet address format. The trailing decimal number 00 in an IP address
YY.YY.YY.00 specifies the boundary for an IP-subnet address. For example, 172.22.36.00
indicates a 24-bit subnet address (subnet mask 172.22.36.00/255.255.255.0), and 173.24.00.00
indicates a 16-bit subnet address (subnet mask 173.24.00.00/255.255.0.0). However, this format can
identify only a subnet address of 8, 16, or 24 bits.

•

ip-addr/subnet-mask—Long subnet address format. For example, 172.22.252.00/255.255.252.00
indicates a 22-bit subnet address. This format can specify a subnet address of any bit number. To
provide more flexibility, the ip-addr is a full host address, such as 172.22.253.1/255.255.252.00.

•

ip-addr/maskbits—Simplified long subnet address format. The mask bits specify the number of bits
of the network masks. For example, 172.22.252.00/22 indicates a 22-bit subnet address. The ip-addr
is a full host address, such as 193.22.253.1/22, which has the same subnet address as the
ip-subnet-addr.

This example shows how to set the NDE address to 170.25.2.1:
Router(config)# mls rp nde-address 170.25.2.1
Router(config)#

Related Commands

Command

Description

show mls rp

Displays MLS details.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-531

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls rp vlan-id

mls rp vlan-id
To assign a VLAN ID to the interface, use the mls rp vlan-id command. To remove a prior entry, use
the no form of this command.
mls rp vlan-id {vlan-id}
no mls rp vlan-id

Syntax Description

vlan-id

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

VLAN ID number; valid values are from 1 to 4094.

This example shows how to assign a VLAN ID to the interface:
Router(config-if)# mls rp vlan-id 4
Router(config-if)#

Related Commands

Command

Description

show mls rp

Displays MLS details.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-532

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls rp vtp-domain

mls rp vtp-domain
To link the interface to a VTP domain, use the mls rp vtp-domain command. To remove a prior entry,
use the no form of this command.
mls rp vtp-domain name
no mls rp vtp-domain name

Syntax Description

name

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

VLAN domain name.

This example shows how to link the interface to a VTP domain:
Router(config-if)# mls rp vtp-domain EverQuest
Router(config-if)#

Related Commands

Command

Description

show mls rp

Displays MLS details.

vtp

Configures the global VTP state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-533

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls sampling

mls sampling
To enable the sampled NetFlow and specify the sampling method, use the mls sampling command. To
disable the sampled NetFlow, use the no form of this command.
mls sampling {{time-based rate} | {packet-based rate [interval]}}
no mls sampling

Syntax Description

time-based
rate

Specifies the time-based sampling rate; valid values are 64, 128, 256, 512, 1024,
2046, 4096, and 8192. See the “Usage Guidelines” section for additional
information.

packet-based
rate

Specifies the packet-based sampling rate; valid values are 64, 128, 256, 512, 1024,
2046, 4096, and 8192.

interval

(Optional) Sampling interval; valid values are from 8000 to 16000 milliseconds.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To enable sampling on the PFC3, you must enter the mls sampling command and the mls netflow
sampling command on the appropriate interfaces. If you do not enter the mls netflow sampling
command, NDE will not export flows.
The sampled NetFlow is supported on Layer 3 interfaces only.
You can enable the sampled NetFlow even if NDE is disabled, but no flows are exported.
With packet-based sampling, a flow with a packet count of n is sampled n/m times, where m is the
sampling rate.
The time-based sampling is based on a preset interval for each sampling rate. Table 2-24 lists the sample
intervals for each rate and period.
Table 2-24 Time-Based Sampling Intervals

Sampling Rate

Sampling Time
(milliseconds)

Export Interval (Milliseconds)

1 in 64

128

8192

1 in 128

64

8192

1 in 256

32

8192

1 in 512

16

8192

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-534

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls sampling

Table 2-24 Time-Based Sampling Intervals (continued)

Examples

Sampling Rate

Sampling Time
(milliseconds)

Export Interval (Milliseconds)

1 in 1024

8

8192

1 in 2048

4

8192

1 in 4096

4

16384

1 in 8192

4

32768

This example shows how to enable the time-based NetFlow sampling and set the sampling rate:
Router(config)# mls sampling time-based 1024
Router(config)#

This example shows how to enable the packet-based NetFlow sampling and set the sampling rate and
interval:
Router(config)# mls sampling packet-based 1024 8192
Router(config)#

Related Commands

Command

Description

mls netflow sampling

Enables the sampled NetFlow on an interface.

show mls sampling

Displays information about the sampled NDE status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-535

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls switching

mls switching
To enable the hardware switching, use the mls switching command. To disable hardware switching, use
the no form of this command.
mls switching
no mls switching

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable the hardware switching:
Router(config)# mls switching
Router(config)#

This example shows how to disable the hardware switching:
Router(config)# no mls switching
Router(config)#

Related Commands

Command

Description

mls switching unicast

Enables the hardware switching of the unicast traffic for an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-536

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls switching unicast

mls switching unicast
To enable the hardware switching of the unicast traffic for an interface, use the mls switching unicast
command. To disable the hardware switching of the unicast traffic for an interface, use the no form of
this command.
mls switching unicast
no mls switching unicast

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable the hardware switching for an interface:
Router(config-if)# mls switching unicast
Router(config-if)#

This example shows how to disable the hardware switching for an interface:
Router(config-if)# no mls switching unicast
Router(config-if)#

Related Commands

Command

Description

mls switching

Enables hardware switching.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-537

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mls verify

mls verify
To enable hardware packet parsing error checks, use the mls verify command. To disable Layer 3 error
checking in the hardware, use the no form of this command.
mls verify {ip | ipx} {checksum | {length {consistent | minimum}} | same-address | syslog}
no mls verify {ip | ipx} {checksum | {length {consistent | minimum}} same-address | syslog}

Syntax Description

ip

Specifies the IP checksum errors.

ipx

Specifies the IPX checksum errors.

checksum

Specifies the checksum-error check.

length
consistent

Checks the length in the header against the physical frame length.

length
minimum

Checks the minimum packet length.

same-address Checks for the packets that have equal source and destination IP addresses.
syslog

Defaults

Specifies the syslog packet parse error traps.

The default settings are as follows:
•

checksum

•

same-address is disabled.

•

syslog is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The IP too-short packets are the IP packets with an IP header length or IP total length field that is smaller
than 20 bytes.
When you enter the mls verify ip length minimum command, valid IPv4 packets are switched in the
hardware only if the IP protocol fields are equal to one of the following types:
•

ICMP (1)

•

IGMP (2)

•

IP (4)

•

TCP (6)

•

UDP (17)

•

IPv6 (41)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-538

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mls verify

•

GRE (47)

•

SIPP-ESP (50)

When you enter the no mls verify ip length minimum command, too-short packets are switched in the
hardware. The too-short packets that have IP protocol = 6 (TCP) are sent to the software.
To prevent packets with the same source and destination IP address from being switched in the hardware,
use the mls verify ip same-address command.

Examples

This example shows how to enable Layer 3 error checking in the hardware:
Router(config)# mls verify ip checksum
Router(config)#

This example shows how to disable Layer 3 error checking in the hardware:
Router(config)# no mls verify ip checksum
Router(config)#

This example shows how to prevent packets with the same source and destination IP address from being
switched in the hardware:
Router(config)# mls verify ip same-address
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-539

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mobility

mobility
To configure the wireless mGRE tunnels, use the mobility command. To return to the default settings,
use the no form of this command.
mobility {network-id id} | {tcp adjust-mss}
mobility [trust | broadcast]

Syntax Description

network-id id

Specifies the wireless network ID for the mGRE tunnel; valid values are
from 1 to 4095.

tcp adjust-mss

Adjusts the MSS value in TCP SYN and TCP ACK on the access points
automatically.

trust

(Optional) Specifies the trusted network.

broadcast

(Optional) Specifies that the mGRE tunnel convert the NBMA to the BMA.

Defaults

Untrusted network

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on Catalyst 6500 series switches that are configured with a WLSM only.
The tcp adjust-mss keywords are supported on mGRE tunnel interfaces only.
You can enter the ip tcp adjust-mss value command to change the TCP MSS to a lower value.
A trusted network can use DHCP or a static IP address. An untrusted network supports only DHCP
clients.

Examples

This example shows how to specify the network identification number for the mGRE tunnel:
Router (config-if)# mobility network-id 200
Router (config-if)#

This example shows how to specify the trusted network:
Router (config-if)# mobility trust
Router (config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-540

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mobility

This example shows how to specify that the mGRE tunnel convert the NBMA to the BMA:
Router (config-if)# mobility broadcast
Router (config-if)#

This example shows how to adjust the MSS value in TCP SYN and TCP ACK on the access points
automatically:
Router (config-if)# mobility tcp adjust-mss
Router (config-if)#

Related Commands

Command

Description

ip tcp adjust-mss

Adjusts the MSS value of TCP SYN packets going through a router.

show mobility

Displays information about the Layer 3 mobility and the wireless network.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-541

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mode

mode
To set the redundancy mode, use the mode command.
mode {rpr | rpr-plus | sso}

Syntax Description

Defaults

rpr

Specifies RPR mode.

rpr-plus

Specifies RPR+ mode.

sso

Specifies SSO mode.

The defaults are as follows:
•

SSO mode if the system is not configured for redundancy and the active and standby supervisor
engines have the same image.

•

RPR mode if different versions are installed.

•

If redundancy is enabled, the default is the mode that you have configured.

Command Modes

Redundancy configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The rpr-plus keywords are not supported by the Supervisor Engine 32 PISA.
NSF with SSO redundancy mode supports IPv4. NSF with SSO redundancy mode does not support IPv6,
IPX, and MPLS.
If you have configured MPLS on the Catalyst6500 seriessw itch with redundant supervisor engines, you
must configure the Catalyst 6500 series switch in RPR mode. The switch should not be running in the
default mode of SSO.
Enter the redundancy command in global configuration mode to enter redundancy configuration mode.
You can enter the mode command within redundancy configuration mode.
The standby supervisor engine reloads on any change of mode and begins to work in the current mode.

Examples

This example shows how to set the redundancy mode to SSO:
Router(config)# redundancy
Router(config-red)# mode sso
Router(config-red)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-542

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mode

Related Commands

Command

Description

redundancy

Enters redundancy configuration mode.

redundancy
force-switchover

Forces a switchover from the active to the standby supervisor engine.

route-converge-interval

Configures the time interval after which the old FIB entries are
purged.

show redundancy

Displays RF information.

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-543

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mode dot1q-in-dot1q access-gateway

mode dot1q-in-dot1q access-gateway
To enable a Gigabit Ethernet WAN interface to act as a gateway for QinQ VLAN translation, use the
mode dot1q-in-dot1q access-gateway command. To disable the QinQ VLAN translation on the
interface, use the no form of this command.
mode dot1q-in-dot1q access-gateway
no mode dot1q-in-dot1q access-gateway

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the Gigabit Ethernet WAN interfaces on Catalyst 6500 series switches
that are configured with an OSM-2+4GE-WAN+ OSM module only.
802.1Q provides a trunking option that tags packets with two VLAN tags to allow multiple VLANs to
be trunked together across an intermediate network. This use of a double-tagged tunnel is also referred
to as QinQ tunneling.
The mode dot1q-in-dot1q access-gateway command enhances QinQ tunneling by tagging packets with
two VLAN tags to allow multiple VLANs to be trunked together across an intermediate network. A
double-tagged tunnel performs the following functions:
•

Switches packets that are tagged with two 802.1Q VLAN tags to a destination service that is based
on a combination of VLAN tags.

•

Supports traffic shaping based on the VLAN tags.

•

Copies the 802.1P prioritization bits (P bits) from the inner (customer) VLAN tag to the outer
(service provider) VLAN tag.

You can also combine multiple GE-WAN interfaces into a virtual port-channel interface to enable QinQ
link bundling. Combining the interfaces not only simplifies the configuration but allows the GE-WAN
OSM to load balance the PE VLANs among the physical interfaces that are members of the bundle. In
addition, if one interface member of the link bundle goes down, its PE VLANs are automatically
reallocated to the other members of the bundle.

Note

You must remove all IP addresses that have been configured on the interface before using the mode
dot1q-in-dot1q access-gateway command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-544

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mode dot1q-in-dot1q access-gateway

After configuring the mode dot1q-in-dot1q access-gateway command, use the bridge-domain
(subinterface configuration) command to configure the VLAN mapping to be used on each
subinterface.

Caution

Examples

Using the mode dot1q-in-dot1q access-gateway command on an interface automatically deletes all the
subinterfaces that might be configured on the interface. It also releases any internal VLANs that might
have been previously used on the interface and its subinterfaces, allowing them to be reused for QinQ
translation. Using the no form of the command deletes all subinterfaces and releases any VLANs that
are currently being used by the interface and subinterface. We recommend that you save the interface
configuration before entering the mode dot1q-in-dot1q access-gateway command.

Note

Port-channel interface counters (as shown by the show counters interface port-channel and show
interface port-channel counters commands) are not supported for channel groups that are using
GE-WAN interfaces for QinQ link bundling. The show interface port-channel {number |
number.subif} command (without the counters keyword) is supported, however.

Tip

The mls qos trust command has no effect on a GE-WAN interface or port-channel group that has been
configured with the mode dot1q-in-dot1q access-gateway command. These interfaces and port
channels always trust the VLAN CoS bits in this configuration.

This example shows a typical configuration for the mode dot1q-in-dot1q access-gateway command:
Router# configure terminal
Router(config)# interface GE-WAN 4/1
Router(config-if)# mode dot1q-in-dot1q access-gateway
Router(config-if)#

This example shows the system message that appears when you try to configure the mode
dot1q-in-dot1q access-gateway command without first removing the IP address configuration:
Router# configure terminal
Router(config)# interface GE-WAN 3/0
Router(config-if)# mode dot1q-in-dot1q access-gateway
% interface GE-WAN3/0 has IP address 192.168.100.101
configured. Please remove the IP address before configuring
'mode dot1q-in-dot1q access-gateway' on this interface.
Router(config-if)# no ip address 192.168.100.101 255.255.255
Router(config-if)# mode dot1q-in-dot1q access-gateway
Router(config-if)#

This example shows how to disable QinQ mapping on an interface by using the no form of the mode
dot1q-in-dot1q access-gateway command. In addition, this command automatically removes all
subinterfaces on the interface and all of the subinterface QinQ mappings (configured with the
bridge-domain (subinterface configuration) command) and service policies.
Router# configure terminal
Router(config)# interface GE-WAN 3/0
Router(config-if)# no mode dot1q-in-dot1q access-gateway
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-545

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mode dot1q-in-dot1q access-gateway

This example shows a virtual port-channel interface that was created and assigned with two GE-WAN
interfaces. The mode dot1q-in-dot1q access-gateway command is then enabled on the port-channel
interface to allow it to act as a QinQ link bundle:
Router(config)# interface port-channel 20
Router(config-if)# interface GE-WAN 3/0
Router(config-if)# port-channel 20 mode on
Router(config-if)# interface GE-WAN 3/1
Router(config-if)# port-channel 20 mode on
Router(config-if)# interface port-channel 20
Router(config-if)# no ip address
Router(config-if)# mode dot1q-in-dot1q access-gateway
Router(config-if)#

This example shows the error message that appears if you attempt to enable QinQ translation on a
port-channel interface that contains one or more invalid interfaces:
Router# configure terminal
Router(config)# interface port-channel 30
7600-2(config-if)# mode dot1q-in-dot1q access-gateway
% 'mode dot1q-in-dot1q access-gateway' is not supported on Port-channel30
% Port-channel30 contains 2 Layer 2 Gigabit Ethernet interface(s)
Router(config-if)#

Related Commands

Command

Description

bridge-domain
(subinterface
configuration)

Binds a PVC to the specified vlan-id.

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

service-policy

Attaches a policy map to an interface.

set cos cos-inner
(policy-map
configuration)

Sets the 802.1Q prioritization bits in the trunk VLAN tag of a
QinQ-translated outgoing packet with the priority value from the inner
customer-edge VLAN tag.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-546

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor event-trace (EXEC)

monitor event-trace (EXEC)
To control the event trace function for a specified Cisco IOS software subsystem component, use the
monitor event-trace command.
monitor event-trace all-traces {{continuous [cancel]} | {dump [merged] [pretty]}}
monitor event-trace l3 {clear | {continuous [cancel]} | disable | {dump [pretty]} | enable |
{interface type mod/port} | one-shot}
monitor event-trace spa {clear | {continuous [cancel]} | disable | {dump [pretty]} | enable |
one-shot}
monitor event-trace subsys {clear | {continuous [cancel]} | disable | {dump [pretty]} | enable |
one-shot}

Syntax Description

all-traces

Displays the configured merged-event traces.

continuous

Displays the latest event trace entries continuously.

cancel

(Optional) Cancels the continuous display of latest trace entries.

dump

Writes the event trace results to the file configured using the monitor
event-trace (global configuration) command.

merged

(Optional) Dumps the entries in all event traces sorted by time.

pretty

(Optional) Saves the event trace message in an ASCII format.

l3

Displays information about the Layer 3 trace.

clear

Clears the trace.

disable

Turns off event tracing for the specified component.

enable

Turns on event tracing for the specified component.

interface type mod/port Specifies the interface to be logged.
one-shot

Clears any existing trace information from the memory, starts event tracing
again, and disables the trace when the trace reaches the size specified using
the monitor event-trace (global configuration) command.

spa

Displays information about the SPA trace.

subsys

Displays information about the initial trace of the subsystem.

Defaults

Trace information is saved in a binary format.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-547

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor event-trace (EXEC)

Usage Guidelines

Use the monitor event-trace (EXEC) command to control what, when, and how event trace data is
collected. Use this command after you have configured the event trace functionality on the networking
device using the monitor event-trace (global configuration) command.
The trace messages are saved in a binary format.

Note

The amount of data collected from the trace depends on the trace message size configured using the
monitor event-trace (global configuration) command for each instance of a trace.
Cisco IOS software allows for the subsystem components to define whether support for event tracing is
enabled or disabled at boot. You can enable or disable event tracing in two ways: using the monitor
event-trace (EXEC) command or using the monitor event-trace (global configuration) command. To
enable event tracing again, you would enter the enable form of either of these commands.
To determine whether a subsystem has enabled or disabled event tracing, use the monitor event-trace ?
command to get a list of software components that support event tracing. To determine whether event
tracing is enabled by default for the subsystem, use the show monitor event-trace command to view
trace messages.
Use the show monitor event-trace command to display trace messages.
Use the monitor event-trace component dump command to save trace message information for a single
event. By default, trace information is saved in a binary format. If you want to save trace messages in
an ASCII format, possibly for additional application processing, use the monitor event-trace
component dump pretty command.
To write the trace messages for all events currently enabled on a networking device to a file, enter the
monitor event-trace dump-file (global configuration) command.
To configure the file where you want to save trace information, use the monitor event-trace (global
configuration) command.

Examples

This example shows how to stop event tracing, clear the current memory, and reenable the trace function
for the SPA component. This example assumes that the tracing function is configured and enabled on
the networking device.
Router# monitor event-trace spa disable
Router# monitor event-trace spa clear
Router# monitor event-trace spa enable

This example shows how you can use the one-shot keyword to accomplish the same function as the
previous example except that you do not have to enter as many commands. Once the size of the trace
message file has been exceeded, the trace is terminated.
Router# monitor event-trace spa one-shot
Router#

This example shows how to write the trace messages for an event in a binary format. The trace messages
for the IPC component are written to a file as follows:
Router# monitor event-trace ipc dump
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-548

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor event-trace (EXEC)

This example shows how to write the trace messages for an event in an ASCII format. In this example,
the trace messages for the MBUS component are written to a file.
Router# monitor event-trace mbus dump pretty
Router#

Related Commands

Command

Description

monitor event-trace
(global configuration)

Configures event tracing for a specified Cisco IOS software subsystem
component.

show monitor
event-trace

Displays event trace messages for Cisco IOS software subsystem
components.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-549

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor event-trace (global configuration)

monitor event-trace (global configuration)
To configure event tracing for a specified Cisco IOS software subsystem component, use the monitor
event-trace (global) command. To change the default setting to enable or disable event tracing, see the
“Usage Guidelines” section for this command.
monitor event-trace all-traces dump-file filename
monitor event-trace l3 {disable | dump-file filename | enable | size number | {stacktrace
[depth]}}
monitor event-trace sequence-number
monitor event-trace spa {disable | dump-file filename | enable | size number | {stacktrace
[depth]}}
monitor event-trace stacktrace
monitor event-trace subsys {disable | dump-file filename | enable | size number | {stacktrace
[depth]}}
monitor event-trace timestamps [{datetime [localtime] [msec] [show-timezone]} | uptime]

Syntax Description

Defaults

dump-file filename

Specifies the URL to store the dump file containing the merged traces.

l3

Displays information about the Layer 3 trace.

disable

Turns off event tracing.

enable

Turns on event tracing.

size number

Sets the number of messages that can be written to memory for a single
instance of a trace; valid values are from 1 to 65536 messages.

stacktrace

Displays the stack trace stored with event trace entries.

depth

(Optional) Trace call stack at tracepoints; valid values are from 1 to 16.

sequence-number

Displays the event trace entries with a sequence number.

spa

Displays information about the SPA trace.

subsys

Displays information about the initial trace of the subsystem.

timestamps

Displays information about the format of event trace time stamps.

datetime

(Optional) Displays information about the format of event trace time
stamps.

localtime

(Optional) Displays information about the format of event trace time stamps
and includes the date and time.

msec

(Optional) Includes milliseconds in the time stamp.

show-timezone

(Optional) Displays information about the format of event trace time stamps
and includes time zone information.

uptime

(Optional) Displays time-stamped information about the system uptime.

Enabled or disabled depending on the software component.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-550

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor event-trace (global configuration)

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

Event tracing is intended for use as a software diagnostic tool and should be configured only under the
direction of a TAC representative. In Cisco IOS software images that do not provide subsystem support
for the event trace function, the monitor event-trace (global configuration) command is not available.
Cisco IOS software allows the subsystem components to define whether support for event tracing is
enabled or disabled by default. The command interface for event tracing allows users to change the
default two ways: using the monitor event-trace (EXEC) command or using the monitor event-trace
(global configuration) command.
Additionally, default settings do not show up in the configuration file. If the subsystem software enables
event tracing by default, the monitor event-trace component enable command will not show up in the
configuration file of the networking device; however, disabling event tracing that has been enabled by
default by the subsystem will create a line in the configuration file.

Note

The amount of data collected from the trace depends on the trace message size configured using the
monitor event-trace (global configuration) command for each instance of a trace.
When the number of event trace messages in memory exceeds the size, new messages will begin to
overwrite the older messages in the file.
The maximum filename length (path and filename) is 100 characters and the path can point to flash
memory on the networking device or to a TFTP or FTP server.
To determine whether a subsystem has enabled or disabled event tracing, use the monitor event-trace ?
command to get a list of software components that support event tracing.
To determine whether event tracing is enabled by default for the subsystem, use the show monitor
event-trace command to view trace messages.
To specify the trace call stack at tracepoints, you must clear the trace buffer first.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-551

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor event-trace (global configuration)

Examples

This example shows how to stop event tracing, clear the current memory, and reenable the trace function
for the SPA component. This example assumes that the tracing function is configured and enabled on
the networking device.
Router(config)# monitor event-trace spa disable
Router(config)# monitor event-trace spa clear
Router(config)# monitor event-trace spa enable

Related Commands

Command

Description

monitor event-trace
(EXEC)

Controls the event trace function for a specified Cisco IOS software
subsystem component.

show monitor
event-trace

Displays event trace messages for Cisco IOS software subsystem
components.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-552

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor permit-list

monitor permit-list
To configure a destination port permit list or add to an existing destination port permit list, use the
monitor permit-list command. To delete from or clear an existing destination port permit list, use the
no form of this command.
monitor permit-list
monitor permit-list destination {interface type} {slot/port[-port] [, type slot/port - port]
no monitor permit-list
no monitor permit-list destination {interface type} {slot/port[-port] [, type slot/port - port]

Syntax Description

destination

Specifies a destination port.

interface type

Specifies the interface type; valid values are ethernet, fastethernet,
gigabitethernet, or tengigabitethernet.

slot/port

Slot and port number.

-port

(Optional) Range of ports.

,

(Optional) Additional interface type and range of ports.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To prevent accidental configuration of ports as destinations, you can create a permit list of the ports that
are valid for use as destinations. With a destination port permit list configured, you can only configure
the ports in the permit list as destinations.

Examples

This example shows how to configure a destination port permit list that includes Gigabit Ethernet
ports 5/1 through 5/4 and 6/1:
Router# configure terminal
Router(config)# monitor permit-list
Router(config)# monitor permit-list destination interface gigabitethernet 5/1-4,
gigabitethernet 6/1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-553

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor permit-list

Related Commands

Command

Description

show monitor
permit-list

Displays the permit-list state and interfaces configured.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-554

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor session

monitor session
To start a new ERSPAN, SPAN, or RSPAN session, add or delete interfaces or VLANs to or from an
existing session, filter ERSPAN, SPAN, or RSPAN traffic to specific VLANs, or delete a session, use
the monitor session command. To remove one or more source or destination interfaces from the session,
remove a source VLAN from the session, or delete a session, use the no form of this command.
monitor session session source {{interface type} | {{vlan vlan-id} [rx | tx | both]} |
{remote vlan rspan-vlan-id}}
monitor session session destination {{interface type} | {vlan vlan-id} | {remote vlan vlan-id} |
{analysis-module slot-number} | {data-port port-number}}
monitor session session-number filter vlan vlan-range
monitor session servicemodule mod-list
monitor session session-number type {erspan-source | erspan-destination}
no monitor session {{range session-range} | local | remote | all | session}
no monitor session session source {{interface type} | {{vlan vlan-id} [rx | tx | both]} |
{remote vlan rspan-vlan-id}}
no monitor session session destination {{interface type} | {vlan vlan-id} | {remote vlan vlan-id}
| {analysis-module slot-number} | {data-port port-number}}

Syntax Description

session

Number of the SPAN session; valid values are from 1 to 66.

source

Specifies the SPAN source.

interface type

Specifies the interface type; see the “Usage Guidelines” section for
formatting information.

vlan vlan-id

Specifies the VLAN ID; valid values are from 1 to 4094.

rx

(Optional) Specifies the monitor-received traffic only.

tx

(Optional) Specifies the monitor-transmitted traffic only.

both

(Optional) Specifies the monitor-received and monitor-transmitted traffic.

remote vlan
rspan-vlan-id

Specifies the RSPAN VLAN as a destination VLAN.

destination

Specifies the SPAN-destination interface.

analysis-module
slot-number

Specifies the network analysis module number; see the “Usage Guidelines”
section for additional information.

data-port
port-number

Specifies the data-port number; see the “Usage Guidelines” section for
additional information.

filter vlan vlan-range

Limits SPAN-source traffic to specific VLANs.

servicemodule

Specifies service modules.

mod-list

(Optional) List of service module numbers.

type erspan-source

Enters the ERSPAN source-session configuration mode; see the monitor
session type command for additional information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-555

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor session

Defaults

type
erspan-destination

Enters the ERSPAN destination-session configuration mode; see the
monitor session type command for additional information.

range session-range

Specifies the range of sessions.

local

Specifies the local session.

remote

Specifies the remote session.

all

Specifies all sessions.

The defaults are as follows:
•

both.

•

servicemodule—All service modules are allowed to use the SPAN servicemodule session.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-556

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor session

Usage Guidelines
Note

Be careful when configuring SPAN-type source ports that are associated to SPAN-type destination ports
because you do not configure SPAN on high-traffic interfaces. If you configure SPAN on high-traffic
interfaces, you may saturate replication engines and interfaces. To configure SPAN-type source ports
that are associated to SPAN-type destination ports, enter the monitor session session source
{{interface type} | {{vlan vlan-id} [rx | tx | both]} | {remote vlan rspan-vlan-id}} command.
Use these formatting guidelines when configuring monitor sessions:
•

interface and single-interface formats are type slot/port; valid values for type are ethernet,
fastethernet, gigabitethernet, or tengigabitethernet.

•

An interface-list is a list of interfaces that are separated by commas. Insert a space before and after
each comma as shown in this example:
single-interface , single-interface , single-interface ...

•

An interface-range is a range of interfaces that are separated by dashes. Insert a space before and
after each dash. To enter multiple ranges, separate each range with a comma as shown in this
example:
type slot/first-port - last-port

•

A mixed-interface-list is a mixed list of interfaces. Insert a space before and after each dash and
comma as shown in this example:
single-interface, interface-range , ... in any order.

•

A single-vlan is an ID number of a single VLAN; valid values are from 1 to 4094.

•

A vlan-list is a list of VLAN IDs that are separated by commas. An example is shown as follows:
single-vlan , single-vlan , single-vlan ...

•

A vlan-range is a range of VLAN IDs that are separated by dashes. An example is shown as follows:
first-vlan-ID - last-vlan-ID

•

A mixed-vlan-list is a mixed list of VLAN IDs. Insert a space before and after each dash. To enter
multiple ranges, separate each VLAN ID with a comma as shown in this example:
single-vlan , vlan-range , ... in any order

The analysis-module slot-number and the data-port port-number keywords and arguments are
supported on Network Analysis Modules only.
The number of valid values for port-channel number are a maximum of 64 values ranging from 1 to 256.
You cannot share the destination interfaces among SPAN sessions. For example, a single destination
interface can belong to one SPAN session only and cannot be configured as a destination interface in
another SPAN session.
The local SPAN, RSPAN, and ERSPAN session limits are as follows:

Total Sessions

Local SPAN, RSPAN Source, or ERSPAN Source
Sessions

RSPAN Destination
Sessions

ERSPAN Destination
Sessions

66

2 (ingress or egress or both)

64

23

The local SPAN, RSPAN, and ERSPAN source and destination limits are as follows:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-557

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor session

In Each Local
SPAN Session

In Each RSPAN
Source Session

In Each ERSPAN
Source Session

Egress or ingress and egress sources
128

128

In Each RSPAN
Destination
Session

In Each ERSPAN
Destination
Session

—

—

—

—

128

Ingress sources
128

128

128

RSPAN and ERSPAN
destination session sources

—

—

—

Destinations per session

64

1 RSPAN VLAN 1 IP address

1 RSPAN VLAN 1 IP address
64

64

A particular SPAN session can either monitor the VLANs or monitor individual interfaces—you cannot
have a SPAN session that monitors both specific interfaces and specific VLANs. If you first configure
a SPAN session with a source interface, and then try to add a source VLAN to the same SPAN session,
you get an error. You also get an error if you configure a SPAN session with a source VLAN and then
try to add a source interface to that session. You must first clear any sources for a SPAN session before
switching to another type of source.
If you enter the filter keyword on a monitored trunk interface, only traffic on the set of specified VLANs
is monitored.
The port-channel interfaces display in the list of interface options if you have them configured. The
VLAN interfaces are not supported. However, you can span a particular VLAN by entering the monitor
session session source vlan vlan-id command.
The show monitor command displays the SPAN servicemodule session only if it is allocated in the
system. It also displays a list of allowed modules and a list of active modules that can use the
servicemodule session.
Only the no form of the monitor session servicemodule command is displayed when you enter the show
running-config command.
If no module is allowed to use the servicemodule session, the servicemodule session is automatically
deallocated. If at least one module is allowed to use the servicemodule session and at least one module
is online, the servicemodule session is automatically allocated.
If you allow or disallow a list of modules that are not service modules from using the servicemodule
session, there will be no effect on the allocation or deallocation of the servicemodule session. Only the
list of modules is saved in the configuration.
If you disable the SPAN servicemodule session with the no monitor session servicemodule command,
allowing or disallowing a list of modules from using the servicemodule session has no effect on the
allocation or deallocation of the servicemodule session. Only the list of modules is saved in the
configuration.
The monitor session servicemodule command is accepted even if there are no modules physically
inserted in any slot.

Examples

This example shows how to configure multiple sources for a session:
Router(config)# monitor session 2 source interface fastethernet 5/15 , 7/3 rx
Router(config)# monitor session 2 source interface gigabitethernet 1/2 tx
Router(config)# monitor session 2 source interface port-channel 102

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-558

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor session

Router(config)# monitor session 2 source filter vlan 2 - 3
Router(config)# monitor session 2 destination remote vlan 901

This example shows how to configure an RSPAN destination in the final switch (RSPAN destination
session):
Router(config)# monitor session 8 source remote vlan 901
Router(config)# monitor session 8 destination interface fastethernet 1/2 , 2/3

This example shows how to clear the configuration for sessions 1 and 2:
Router(config)# no monitor session 1 - 2
Router(config)#

This example shows how to clear the configuration for all sessions:
Router(config)# no monitor session all
Router(config)#

This example shows how to clear the configuration for all remote sessions:
Router(config)# no monitor session remote
Router(config)#

This example shows how to allow a list of modules to use the SPAN servicemodule session:
Router(config)# monitor session servicemodule module 1-2
Router(config)#

This example shows how to disallow a list of modules from using the SPAN servicemodule session:
Router(config)# no monitor session servicemodule module 1-2
Router(config)#

Related Commands

Command

Description

remote-span

Configures a VLAN as an RSPAN VLAN.

show monitor session

Displays information about the ERSPAN, SPAN, and RSPAN sessions.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-559

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor session type

monitor session type
To create an ERSPAN source session number or enter the ERSPAN session configuration mode for the
session, use the monitor session type command. To remove one or more source or destination interfaces
from the ERSPAN session, use the no form of this command.
monitor session erspan-session-number type {erspan-destination | erspan-source}
no monitor session erspan-session-number type {erspan-destination | erspan-source}

Syntax Description

erspan-session-number

Number of the SPAN session; valid values are from 1 to 66.

type erspan-destination Specifies the ERSPAN destination-session configuration mode.
type erspan-source

Specifies the ERSPAN source-session configuration mode.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

ERSPAN is supported on hardware revision 3.2 or higher. Enter the show module version | include
WS-SUP720-BASE command to display the hardware revision.
ERSPAN traffic is GRE-encapsulated SPAN traffic that can only be processed by an ERSPAN
destination session.
All ERSPAN source sessions on a switch must use the same source IP address. You enter the origin ip
address command to configure the IP address for the ERSPAN source sessions.
All ERSPAN destination sessions on a switch must use the same IP address. You enter the ip address
command to configure the IP address for the ERSPAN destination sessions. If the ERSPAN destination
IP address is not a Supervisor Engine 32 PISA (for example, it is a network sniffer), the traffic arrives
with the GRE and RSPAN headers/encapsulation intact.
The ERSPAN source session destination IP address, which must be configured on an interface on the
destination switch, is the source of traffic that an ERSPAN destination session sends to the destination
ports. You configure the same address in both the source and destination sessions with the ip address
command.
The ERSPAN ID differentiates the ERSPAN traffic arriving at the same destination IP address from
different ERSPAN source sessions.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-560

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor session type

The local ERSPAN session limits are as follows:
•

Total sessions—66

•

Source sessions—2 (ingress or egress or both)

•

Destination sessions—23

The monitor session type command creates a new ERSPAN session or allows you to enter the ERSPAN
session configuration mode. ERSPAN uses separate source and destination sessions. You configure the
source and destination sessions on different switches. The ERSPAN session configuration mode prompts
are as follows:
•

Router(config-mon-erspan-src)—Indicates the ERSPAN source session configuration mode.

•

Router(config-mon-erspan-src-dst)—Indicates the ERSPAN source session destination
configuration mode.

•

Router(config-mon-erspan-dst)—Indicates the ERSPAN destination session configuration mode.

•

Router(config-mon-erspan-dst-src)—Indicates the ERSPAN destination session source
configuration mode

Table 2-25 lists the ERSPAN destination session configuration mode syntaxes.
Table 2-25 ERSPAN Destination Session Configuration Mode Syntaxes

Syntax

Description

Global Configuration Mode

monitor session erspan-destination-session-number type
erspan-destination

Enters ERSPAN destination session configuration mode
and changes the prompt to the following:
Router(config-mon-erspan-dst)#

Destination Session Configuration Mode
description session-description

(Optional) Describes the ERSPAN destination session.

shutdown

(Optional) (Default) Inactivates the ERSPAN destination
session.

no shutdown

Activates the ERSPAN destination session.

destination {single-interface | interface-list |
interface-range | mixed-interface-list}

Associates the ERSPAN destination session number with
the destination ports.

source

Enters ERSPAN destination session source configuration
mode and changes the prompt to the following:
Router(config-mon-erspan-dst-src)#

Destination Session Source Configuration Mode

ip address ip-address [force]

Configures the ERSPAN flow destination IP address,
which must also be configured on an interface on the
destination switch and be entered in the ERSPAN
destination session configuration.

erspan-id erspan-flow-id

Configures the ID number used by the destination and
destination sessions to identify the ERSPAN traffic.

vrf vrf-name

(Optional) Configures the VRF name of the packets in the
ERSPAN traffic.
Table 2-26 lists the ERSPAN source session configuration mode syntaxes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-561

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor session type

Table 2-26 ERSPAN Source Session Configuration Mode Syntaxes

Syntax

Description

Global Configuration Mode

monitor session erspan-source-session-number type
erspan-source

Enters ERSPAN source session configuration mode and
changes the prompt to the following:
Router(config-mon-erspan-src)#

Source Session Configuration Mode

description session-description

(Optional) Describes the ERSPAN source session.

shutdown

(Optional) (Default) Inactivates the ERSPAN source
session.

no shutdown

Activates the ERSPAN source session.

source {{single-interface | interface-list | interface-range |
mixed-interface-list | single-vlan | vlan-list | vlan-range |
mixed-vlan-list} [rx | tx | both]}

Associates the ERSPAN source session number with the
source ports or VLANs, and selects the traffic direction to
be monitored.

filter {single-vlan | vlan-list | vlan-range | mixed-vlan-list}

(Optional) Configures source VLAN filtering when the
ERSPAN source is a trunk port.

destination

Enters ERSPAN source session destination configuration
mode and changes the prompt to the following:
Router(config-mon-erspan-src-dst)#

Source Session Destination Configuration Mode

ip address ip-address

Configures the ERSPAN flow destination IP address,
which must also be configured on an interface on the
destination switch and be entered in the ERSPAN
destination session configuration.

erspan-id erspan-flow-id

Configures the ID number used by the source and
destination sessions to identify the ERSPAN traffic.

origin ip address ip-address

Configures the IP address used as the source of the
ERSPAN traffic.

ip {{ttl ttl-value} | {prec ipp-value} | {dscp dscp-value}}

(Optional) Configures the following packet values in the
ERSPAN traffic:

vrf vrf-name

•

ttl ttl-value—IP time-to-live (TTL) value

•

prec ipp-value—IP-precedence value

•

dscp dscp-value—IP-precedence value

(Optional) Configures the VRF name of the packets in the
ERSPAN traffic.
When you configure the monitor sessions, follow these syntax guidelines:
•

erspan-destination-span-session-number can range from 1 to 66.

•

single-interface is interface type slot/port; type is ethernet, fastethernet, gigabitethernet, or
tengigabitethernet.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-562

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
monitor session type

•

interface-list is single-interface , single-interface , single-interface ...

Note

In lists, you must enter a space before and after the comma. In ranges, you must enter a space
before and after the dash.

•

interface-range is interface type slot/first-port - last-port .

•

mixed-interface-list is, in any order, single-interface , interface-range , ...

•

erspan-flow-id can range from 1 to 1023.

When you clear the monitor sessions, follow these syntax guidelines:
•

The no monitor session session-number command entered with no other parameters clears the
session session-number.

•

session-range is first-session-number-last-session-number.

Note

Examples

When you enter the no monitor session range command, do not enter spaces before or after
the dash. If you enter multiple ranges, do not enter spaces before or after the commas.

This example shows how to configure an ERSPAN source session number and enter the ERSPAN source
session configuration mode for the session:
Router(config)# monitor session 55 type erspan-source
Router(config-mon-erspan-src)#

This example shows how to configure an ERSPAN destination session number and enter the ERSPAN
destination session configuration mode for the session:
Router(config)# monitor session 55 type erspan-destination
Router(config-mon-erspan-dst)#

This example shows how to associate the ERSPAN destination session number with the destination
ports:
Router(config-mon-erspan-dst) destination interface fastethernet 1/2 , 2/3

This example shows how to enter the ERSPAN destination session source configuration:
Router(config-mon-erspan-dst)# source
Router(config-mon-erspan-dst-src)#

This example shows how to enter the ERSPAN destination session source configuration mode:
Router(config-mon-erspan-dst)# source
Router(config-mon-erspan-dst-src)#

This example shows how to configure multiple sources for a session:
Router(config-mon-erspan-src)#
Router(config-mon-erspan-src)#
Router(config-mon-erspan-src)#
Router(config-mon-erspan-src)#
Router(config-mon-erspan-src)#

source
source
source
source

interface fastethernet 5/15 , 7/3 rx
interface gigabitethernet 1/2 tx
interface port-channel 102
filter vlan 2 - 3

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-563

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

monitor session type

This example shows how to enter the ERSPAN source session destination configuration mode:
Router(config-mon-erspan-src)# destination
Router(config-mon-erspan-src-dst)#

This example shows how to configure the ID number that is used by the source and destination sessions
to identify the ERSPAN traffic:
Router(config-mon-erspan-src-dst)# erspan-id 1005
Router(config-mon-erspan-src-dst)#

Related Commands

Command

Description

show monitor session

Displays information about the ERSPAN, SPAN, and RSPAN sessions.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-564

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mpls l2transport route

mpls l2transport route
To enable routing of Layer 2 packets over MPLS, use the mpls l2transport route command. To disable
routing over MPLS, use the no form of this command.
mpls l2transport route destination vc-id
no mpls l2transport route destination vc-id

Syntax Description

destination

IP address of the router to which the virtual circuit is destined.

vc-id

Virtual-circuit identification to a router.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mpls l2transport route command enables the virtual connection used to route the VLAN packets.
The types of virtual connections used are as follows:
•

VC Type 4—Allows all the traffic in a VLAN to use a single VC across the MPLS network.

•

VC Type 5—Allows all traffic on a port to share a single VC across the MPLS network.

During the VC setup, VC type 5 is advertised. If the peer advertises VC type 4, the VC type is changed
to type 4 and the VC is restarted. Note that the change only happens from type 5 to type 4 and never from
type 4 to type 5.
An MPLS VLAN virtual circuit in Layer 2 runs across an MPLS cloud to connect the VLAN interfaces
on two PE routers.
Use the mpls l2transport route command on the VLAN interface of each PE router to route the VLAN
packets in Layer 2 across the MPLS cloud to the VLAN interface of the other PE router. Specify the IP
address of the other PE router for the destination parameter. Do not specify the IP address of the router
from which you are issuing the command.
You can choose any value for the virtual-connection ID. However, the virtual-circuit ID must be unique
to the virtual connection. In large networks, you may need to track the virtual-connection ID assignments
to ensure that a virtual-connection ID does not get assigned twice.
The routed virtual connections are supported on the main interfaces, not subinterfaces.
The virtual-circuit ID must be unique to each virtual connection.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-565

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mpls l2transport route

Examples

This example shows how to enable routing of Layer 2 packets over MPLS:
Router(config-if)# mpls l2transport route 192.16.0.1
Router(config-if)#

Related Commands

Command

Description

show mpls l2transport Displays the state of virtual circuits on a router.
vc

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-566

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mpls load-balance per-label

mpls load-balance per-label
To enable the load balancing for the tag-to-tag traffic, use the mpls load-balance per-label command.
To return to the default settings, use the no form of this command.
mpls load-balance per-label
no mpls load-balance per-label

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enable load balancing for the tag-to-tag traffic, the traffic is balanced based on the incoming
label (per prefix) among MPLS interfaces. Each MPLS interface supports an equal number of incoming
labels.
You can use the show mpls ttfib command to display the incoming label (indicated by an asterisk) that
is included in the load balancer.

Examples

This example shows how to enable the load balancing for the tag-to-tag traffic:
Router(config)# mpls load-balance per-label
Router(config)#

This example shows how to disable the load balancing for the tag-to-tag traffic:
Router(config)# no mpls load-balance per-label
Router(config)#

Related Commands

Command

Description

show mpls ttfib

Displays information about the MPLS TTFIB table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-567

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mpls ttl-dec

mpls ttl-dec
To specify standard MPLS tagging, use the mpls ttl-dec command. To return to the default settings, use
the no form of this command.
mpls ttl-dec
no mpls ttl-dec

Syntax Description

This command has no arguments or keywords.

Defaults

Optimized MPLS tagging (no mpls ttl-dec).

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

MPLS tagging has been optimized to allow the rewriting of the original packet’s IP ToS and TTL values
before the MPLS label is pushed onto the packet header. This change can result in a slightly lower
performance for certain types of traffic. If the packet’s original ToS/TTL values are not significant, you
enter the mpls ttl-dec command for standard MPLS tagging.

Examples

This example shows how to configure the Catalyst 6500 series switch to use standard MPLS tagging
behavior:
Router(config)# mpls ttl-dec
Router(config)#

This example shows how to configure the Catalyst 6500 series switch to use optimized MPLS tagging
behavior:
Router(config)# no mpls ttl-dec
Router(config)#

Related Commands

Command

Description

mpls l2transport route Enables routing of Layer 2 packets over MPLS.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-568

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
mtu

mtu
To adjust the maximum packet size or MTU size, use the mtu command. To return to the default settings,
use the no form of this command.
mtu bytes
no mtu

Syntax Description

bytes

Defaults

Table 2-27 lists the default MTU values if you disable the jumbo frames.

Byte size; valid values are from 64 to 9216 for SVI ports, from 1500 to 9170 for
the GE-WAN+ ports, and from 1500 to 9216 for all other ports.

Table 2-27 Default MTU Values

Media Type

Default MTU (bytes)

Ethernet

1500

Serial

1500

Token Ring

4464

ATM

4470

FDDI

4470

HSSI (HSA)

4470

If you enable the jumbo frames, the default is 64 for the SVI ports and 9216 for all the other ports. The
jumbo frames are disabled by default.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

For switch ports, only one larger-than-default MTU value is allowed globally. For Layer 3 ports,
including router ports and VLANs, you can configure nondefault MTU values on a per-interface basis.
For a complete list of modules that do not support jumbo frames, refer to the Catalyst Supervisor Engine
32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.
Changing the MTU value with the mtu command can affect values for the protocol-specific versions of
the command (for example, the ip mtu command). If the values that are specified with the ip mtu
command are the same as the value that is specified with the mtu command, and you change the value
for the mtu command, the ip mtu value automatically matches the new mtu command value. However,
changing the values for the ip mtu command has no effect on the value for the mtu command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-569

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

mtu

Examples

This example shows how to specify an MTU of 1800 bytes:
Router(config)# interface fastethernet 5/1
Router(config-if)# mtu 1800

Related Commands

Command

Description

ip mtu

Sets the MTU size of IP packets sent on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-570

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
name (MST configuration submode)

name (MST configuration submode)
To set the name of an MST region, use the name command. To return to the default name, use the no
form of this command.
name name
no name name

Syntax Description

name

Defaults

Empty string

Command Modes

MST configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Caution

Examples

Name to give the MST region. It can be any string with a maximum length
of 32 characters.

Two or more Catalyst 6500 series switches with the same VLAN mapping and configuration version
number are considered to be in different MST regions if the region names are different.

Be careful when using the name command to set the name of an MST region. If you make a mistake,
you can put the Catalyst 6500 series switch in a different region. The configuration name is a
case-sensitive parameter.

This example shows how to name a region:
Router(config-mst)# name Cisco
Router(config-mst)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-571

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

name (MST configuration submode)

Related Commands

Command

Description

instance

Maps a VLAN or a set of VLANs to an MST instance.

revision

Sets the revision number for the MST configuration.

show

Verifies the MST configuration.

show spanning-tree
mst

Displays the information about the MST protocol.

spanning-tree mst
configuration

Enters MST-configuration submode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-572

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
neighbor

neighbor
To specify the type of tunnel signaling and encapsulation mechanism for each peer, use the neighbor
command. To disable a split horizon, use the no form of this command.
neighbor remote-router-id {encapsulation encapsulation-type} | {pw-class pw-name}
[no-split-horizon]
no neighbor remote-router-id

Syntax Description

remote-router-id

Remote peering router identification.

encapsulation
encapsulation

Specifies the tunnel encapsulation type; valid values are l2tpv3 and mpls.

pw-class pw-name

Specifies the pseudo-wire property to be used to set up the emulated VC.

no-split-horizon

(Optional) Disables the Layer 2 split horizon in the data path.

Defaults

Split horizon is enabled.

Command Modes

Layer 2 VFI manual configuration submode

Command History

Release

Modification

12.2(18)ZY
Support for this command was introduced.
To avoid looping, you should not disable a split horizon in a fully meshed Virtual PVLAN service
(VPLS) network.

Examples

This example shows how to specify the tunnel encapsulation type:
Router(config-vfi)# neighbor 333 encapsulation mpls
Router(config-vfi)#

This example shows how to disable the Layer 2 split horizon in the data path:
Router(config-vfi)# neighbor 333 no-split-horizon
Router(config-vfi)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-573

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

net

net
To configure an IS-IS NET for the routing process, use the net command. To remove a NET, use the no
form of this command.
net net1 {alt net2}
no net net

Syntax Description

Defaults

net1

NET NSAP name or address for the IS-IS routing process on the PISA in the
primary slot; see the “Usage Guidelines” section for additional information.

alt net2

Specifies the NET name or address for the IS-IS routing process on the PISA in
the alternate slot; see the “Usage Guidelines” section for additional information.

net

NET NSAP name or address to be removed.

The defaults are as follows:
•

No NET is configured.

•

IS-IS process is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

A NET is an NSAP where the last byte is always the n-selector and is always zero. A NET can be from
8 to 20 bytes.
Under most circumstances, you should configure one NET only.
When entering the net, use these guidelines:
•

In a 3-slot chassis, slot 1 is the primary slot and slot 2 is the alternate slot.

•

In a 6-slot chassis, slot 5 is the primary slot and slot 6 is the alternate slot.

•

In a 9-slot chassis, slot 5 is the primary slot and slot 6 is the alternate slot.

•

In a 13-slot chassis, slot 7 is the primary slot and slot 8 is the alternate slot.

If you are using IS-IS to perform IP routing only (no connectionless network service routing is enabled),
you must configure a NET to define the router ID and area ID.
Multiple NETs per router are allowed with a maximum of three NETs. In rare circumstances, you can
configure two or three NETs. In such a case, the area this router is in will have three area addresses and
only one area.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-574

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
net

Multiple NETs can be temporarily useful for network reconfiguration where multiple areas are merged,
or where one area is split into more areas. Multiple area addresses enable you to renumber an area
individually as needed.

Examples

This example shows how to configure a router with system ID 0000.0c11.1110 and area ID
47.0004.004d.0001:
router isis Pieinthesky
net 47.0004.004d.0001.0001.0c11.1111.00

This example shows three IS-IS routing processes with three areas that are configured. Each area has a
unique identifier, but the system ID is the same for all areas.
clns routing
...
interface Tunnel529
ip address 10.0.0.5 255.255.255.0
ip router isis BB
clns router isis BB
interface Ethernet1
ip address 10.1.1.5 255.255.255.0
ip router isis A3253-01
clns router isis A3253-01
!
interface Ethernet2
ip address 10.2.2.5 255.255.255.0
ip router isis A3253-02
clns router isis A3253-02
...
router isis BB
net 49.2222.0000.0000.0005.00
!
router isis A3253-01
net 49.0553.0001.0000.0000.0005.00
is-type level-1
!
router isis A3253-02
net 49.0553.0002.0000.0000.0005.00
is-type level-1

Related Commands

! Defaults to "is-type level-1-2"

Command

Description

is-type

Configures the routing level for an instance of the IS-IS routing process.

router isis

Enables the IS-IS routing protocol and specifies an IS-IS process.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-575

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

nsf

nsf
To enable and configure Cisco NSF, use the nsf command. To disable NSF, use the no form of this
command.
nsf [enforce global]
nsf [{cisco | ietf} | {interface {wait seconds}} | {interval minutes} | {t3 [adjacency | {manual
seconds}}]
no nsf

Syntax Description

Defaults

enforce global

(Optional) Cancels OSPF NSF restart when non-NSF-aware neighbors are
detected.

cisco

(Optional) Specifies the Cisco proprietary IS-IS NSF method of checkpointing if
the active RP fails over.

ietf

(Optional) Specifies the IETF IS-IS NSF method of protocol modification if the
active RP fails over.

interface wait
seconds

(Optional) Specifies how long to wait for an interface to come up after failover before
it proceeds with the Cisco NSF process; valid values are from 1 to 60 seconds.

interval minutes

(Optional) Specifies how long to wait after a route processor stabilizes before
restarting; valid values are from 0 to 1440 minutes.

t3 adjacency

(Optional) Specifies that the time that IETF NSF waits for the LSP database to
synchronize is determined by the adjacency holdtime advertised to the neighbors
of the specified RP before switchover.

t3 manual
seconds

(Optional) Specifies the time to wait after the NSF database synchronizes before
informing other nodes to remove the restarting node from consideration as a transit;
valid values are from 5 to 3600 seconds.

The default settings are as follows:
•

NSF is disabled.

•

enforce global—Enabled.

•

interval minutes—5 minutes.

•

interface wait seconds—10 seconds.

•

t3 manual seconds—30 seconds.

Command Modes

Router configuration IS-IS

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-576

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
nsf

Usage Guidelines

Note

The nsf interface wait command can be used if Cisco proprietary IS-IS NSF is configured or if the
Internet Engineering Task Force (IETF) IS-IS NSF is enabled using the nsf t3 manual command. You
can use this command if an interface is slow to come up.

Cisco NSF is required only if the Catalyst 6500 series switch is expected to perform Cisco NSF during
a restart. If the Catalyst 6500 series switch is expected to cooperate with a neighbor that is doing a Cisco
NSF restart only, the switch must be NSF capable by default (running a version of code that supports
Cisco NSF), but Cisco NSF does not have to be configured on the switch.
The nsf commands are a subset of the router command and affects all the interfaces that are covered by
the designated process. Cisco NSF supports the BGP, OSPF, IS-IS, and EIGRP protocols. The
configuration commands that enable NSF processing are as follows:
•

nsf under the router ospf command

•

nsf ietf under the router isis command

•

bgp graceful-restart under the router bgp command

These commands must be issued as part of the router’s running configuration. During the restart, these
commands are restored to activate the NSF processing.
The [{cisco | ietf} | {interface {wait seconds}} | {interval minutes} | {t3 [adjacency | {manual
seconds}}] keywords and arguments apply to IS-IS only.
The {enforce global} keywords apply to OSPF only.

BGP NSF Guidelines
BGP support in NSF requires that neighbor networking devices be NSF-aware devices; that is, they must
have the graceful restart capability and advertise that capability in the OPEN message during session
establishment. If an NSF-capable router discovers that a particular BGP neighbor does not have the
graceful restart capability enabled, it will not establish an NSF-capable session with that neighbor. All
other neighbors that have a graceful restart capability will continue to have NSF-capable sessions with
this NSF-capable networking device. Enter the bgp graceful-restart router configuration command to
enable the graceful restart capability. Refer to the Cisco IOS Release 12.2 Command Reference for more
information.

EIRGP NSF Guidelines
A router may be an NSF-aware router but may not be participating in helping out the NSF restarting
neighbor because it is coming up from a cold start.

IS-IS NSF Guidelines
If you configure IETF on the networking device, but neighbor routers are not IETF-compatible, NSF will
abort after the switchover.
Use these two keywords when configuring IS-IS NSF:
•

ietf—Internet Engineering Task Force IS-IS—After a supervisor engine switchover, the
NSF-capable router sends the IS-IS NSF restart requests to the neighboring NSF-aware devices.

•

cisco—Cisco IS-IS. Full adjacency and LSP information is saved (checkpointed) to the standby
supervisor engine. After a switchover, the newly active supervisor engine maintains its adjacencies
using the checkpointed data to quickly rebuild its routing tables.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-577

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

nsf

OSPF NSF Guidelines
OSPF NSF requires that all neighbor networking devices be NSF-aware devices. If an NSF-capable
router discovers that it has non-NSF aware neighbors on a particular network segment, it will disable the
NSF capabilities for that segment. The other network segments that are composed entirely of
NSF-capable or NSF-aware routers will continue to provide NSF capabilities.
OSPF NSF supports N SF/SSO forIPv4 traffic only.OSPFv3 is not supported with NSF/SSO. Only
OSPFv2 is supported with NSF/SSO.

Examples

This example shows how to enable NSF for all OSPF-process interfaces:
Router(config)# router ospf 109
Router(config-router)# nsf
Router(config-router)#

This example shows how to disable NSF for all OSPF-process interfaces:
Router(config)# router ospf 109
Router(config-router)# no nsf
Router(config-router)#

Related Commands

Command

Description

router

Enables a routing process.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-578

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
pagp learn-method

pagp learn-method
To learn the input interface of the incoming packets, use the pagp learn-method command. To return
to the default settings, use the no form of this command.
pagp learn-method {aggregation-port | physical-port}
no pagp learn-method

Syntax Description

aggregation-port

Specifies how to learn the address on the port channel.

physical-port

Specifies how to learn the address on the physical port within the bundle.

Defaults

aggregation-port method

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the learning method to learn the address on the physical port within the
bundle:
Router(config-if)# pagp learn-method physical-port
Router(config-if)#

This example shows how to set the learning method to learn the address on the port channel within the
bundle:
Router(config-if)# pagp learn-method
Router(config-if)#

Related Commands

Command

Description

show pagp

Displays port-channel information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-579

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

pagp port-priority

pagp port-priority
To select a port in hot standby mode, use the pagp port-priority command. To return to the default
settings, use the no form of this command.
pagp port-priority priority
no pagp port-priority

Syntax Description

priority

Defaults

priority is 128.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Priority number; valid values are from 1 to 255.

Usage Guidelines

The higher the priority means the better the chances are that the port will be selected in the hot standby
mode.

Examples

This example shows how to set the port priority:
Router(config-if)# pagp port-priority 45
Router(config-if)#

Related Commands

Command

Description

pagp learn-method

Learns the input interface of the incoming packets.

show pagp

Displays port-channel information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-580

OL-11437-01

2
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
platform ip features sequential

platform ip features sequential
To enable IP precedence-based or DSCP-based egress QoS filtering to use any IP precedence or DSCP
policing or marking changes made by ingress PFC QoS, use the platform ip features sequential command.
To return to the default settings, use the no form of this command.
platform ip features sequential [access-group {ip-acl-name | ip-acl-number}]
no platform ip features sequential [access-group {ip-acl-name | ip-acl-number}]

Syntax Description

access-group
ip-acl-name

(Optional) Specifies the name of the ACL that is used to specify the match
criteria for the recirculation packets.

access-group
ip-acl-number

(Optional) Specifies the number of the ACL that is used to specify the
match criteria for the recirculation packets; valid values are from 1 to 199
and from 1300 to 2699.

Defaults

IP precedence-based or DSCP-based egress QoS filtering uses received IP precedence or DSCP values
and does not use any IP precedence or DSCP changes made by ingress QoS as the result of policing or
marking.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The enhanced egress-QoS filtering enables the IP precedence-based or DSCP-based egress-QoS filtering
to use any IP precedence or DSCP policing or marking changes made by ingress QoS.
The nonenhanced egress-QoS filtering behavior is the normal Catalyst 6500 series switch behavior when
QoS is applied in the hardware.
The PFC3 provides egress PFC QoS only for Layer 3-switched and routed traffic on egress Layer 3
interfaces (either LAN ports configured as Layer 3 interfaces or VLAN interfaces).
You configure enhanced egress QoS filtering on ingress Layer 3 interfaces (either LAN ports configured
as Layer 3 interfaces or VLAN interfaces).
To enable enhanced egress QoS filtering only for the traffic filtered by a specific standard, extended
named, or extended numbered IP ACL, enter the IP ACL name or number.
If you do not enter an IP ACL name or number, enhanced egress QoS filtering is enabled for all IP
ingress IP traffic on the interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-581

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

platform ip features sequential

Note

When you configure enhanced egress-QoS filtering, the PFC3A processes traffic to apply ingress PFC
QoS. The PFC3A applies ingress-QoS filtering and Catalyst 6500 series switch hardware ingress QoS.
The PFC3A incorrectly applies any egress-QoS filtering and Catalyst 6500 series switch hardware
egress QoS that is configured on the ingress interface.

Note

If you configure enhanced egress-QoS filtering on an interface that uses Layer 2 features to match the
IP precedence or DSCP as modified by ingress-QoS marking, the packets are redirected or dropped and
prevented from being processed by egress QoS.

Note

If you enable enhanced egress-QoS filtering, the hardware acceleration of NetFlow-based features such
as reflexive ACL, NAT, and TCP intercept are disabled.
To verify configuration, use the show running-config interface command.

Examples

This example shows how to enable enhanced egress-QoS filtering:
Router(config-if)# platform ip features sequential
Router(config-if)#

This example shows how to disable enhanced egress-QoS filtering:
Router(config-if)# no platform ip features sequential
Router(config-if)#

Related Commands

Command

Description

show running-config
interface

Displays the contents of the currently running configuration file.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-582

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
platform ipv6 acl icmp optimize neighbor-discovery

platform ipv6 acl icmp optimize neighbor-discovery
To optimize TCAM support for IPv6 ACLs, use the platform ipv6 acl icmp optimize
neighbor-discovery command. To disable optimization of TCAM support for IPv6 ACLs, use the no
form of this command.
platform ipv6 acl icmp optimize neighbor-discovery
no platform ipv6 acl icmp optimize neighbor-discovery

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

Use this command under the direction of the Cisco TAC only.
When you enable optimization of the TCAM support for IPv6 ACLs, the global ICMPv6
neighbor-discovery ACL at the top of the TCAM is programmed to permit all ICMPv6
neighbor-discovery packets. Enabling optimization prevents the addition of ICMPv6 ACEs at the end of
every IPv6 security ACL, reducing the number of TCAM resources being used. Enabling this command
reprograms IPv6 ACLs on all interfaces.

Note

The ICMPv6 neighbor-discovery ACL at the top of the TCAM takes precedence over security ACLs for
ICMP neighbor-discovery packets that you have configured, but has no effect if you have a bridge/deny
that overlaps with the global ICMP ACL.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-583

Chapter 2
platform ipv6 acl icmp optimize neighbor-discovery

Examples

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

This example shows how to optimize TCAM support for IPv6 ACLs:
Router(config)# platform ipv6 acl icmp optimize neighbor-discovery
Router(config)#

This example shows how to disable optimization of TCAM support for IPv6 ACLs:
Router(config)# no platform ipv6 acl icmp optimize neighbor-discovery
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-584

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
platform scp retry interval

platform scp retry interval
To enable SCP fast retry and set the fast-retry interval, use the platform scp retry interval command.
To disable SCP fast retry, use the no form of this command.
platform scp retry interval timeout-value
no platform scp retry interval

Syntax Description

timeout-value

Defaults

2000 milliseconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Fast retry interval; valid values are from 200 to 2000 milliseconds.

Usage Guidelines
Note

Examples

Use this command under the direction of the Cisco TAC only.

This example shows how to enable SCP fast retry and set the fast-retry interval:
Router(config)# platform scp retry interval 600
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-585

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

platform vfi dot1q-transparency

platform vfi dot1q-transparency
To enable 802.1Q transparency mode, use the platform vfi dot1q-transparency command. To disable
802.1Q transparency, use the no form of this command.
platform vfi dot1q-transparency
no platform vfi dot1q-transparency

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on OSM modules only.
The 802.1Q transparency allows a service provider to modify the MPLS EXP bits for core-based QoS
policies while leaving any VPLS customer 802.1p bits unchanged.
The dot1q Transparency for EoMPLS feature causes the VLAN-applied policy to affect only the IGP
label (for core QoS) and leaves the VC label EXP bits equal to the 802.1p bits. On the egress PE, the
802.1p bits are still rewritten based on the received VC EXP bits, however, because the EXP bits now
match the ingress 802.1p bits, a VPLS customer's 802.1p bits do not change.
Global configuration applies to all virtual forwarding instance (VFI) and switched virtual interface (SVI)
EoMPLS VCs configured on the Cisco 7600 series routers.
Interoperability requires applying the Dot1q Transparency for EoMPLS feature to all participating PE
routers.

Examples

This example shows how to enable 802.1Q transparency:
Router (config)# platform vfi dot1q-transparency
Router (config)#

This example shows how to disable 802.1Q transparency:
Router (config)# no platform vfi dot1q-transparency
Router (config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-586

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
police (policy map)

police (policy map)
To create a per-interface policer and configure the policy-map class to use it, use the police command.
To delete the per-interface policer from the policy-map class, use the no form of this command.
police {bits-per-second [normal-burst-bytes] [maximum-burst-bytes] [pir peak-rate-bps]} |
[conform-action action] [exceed-action action] [violate-action action]
no police {bits-per-second [normal-burst-bytes] [extended-burst-bytes] [pir peak-rate-bps]} |
[conform-action action] [exceed-action action] [violate-action action]

Syntax Description

Defaults

bits-per-second

CIR bits per second; valid values are from 32000 to 2 Gbps bits per
second.

normal-burst-bytes

(Optional) CIR token-bucket size; valid values are from 1000 to
512000000 bytes.

maximum-burst-bytes

(Optional) PIR token-bucket size; valid values are from 1000 to
32000000 bytes.

pir peak-rate-bps

(Optional) Sets the PIR peak rate; valid values are from 32000 to 2 Gbps
bits per second.

conform-action action

(Optional) Specifies the action to be taken if the bits-per-second rate has
not been exceeded; see the “Usage Guidelines” section for valid values.

exceed-action action

(Optional) Specifies the action to be taken when the bits-per-second rate
has been exceeded; see the“Usage Guidelines” section for valid values.

violate-action action

(Optional) Specifies the action to be taken when the bits-per-second rate
is greater than the maximum-burst-bytes rate; see the “Usage Guidelines”
section for valid values.

The defaults are as follows:
•

maximum-burst-bytes is equal to normal-burst-bytes.

•

conform-action is transmit.

•

exceed-action is drop.

•

violate-action is equal to the exceed-action.

•

pir peak-rate-bps is equal to the normal-burst-bytes rate.

Command Modes

Policy-map subcommand

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-587

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

police (policy map)

Usage Guidelines

On the Supervisor Engine 32 PISA, the police command is supported in software.
Named aggregate policers and microflow policers are not supported on the Supervisor Engine 32 PISA.
The normal-burst-bytes argument sets the CIR token bucket size.
The maximum-burst-bytes argument sets the PIR token bucket size (not supported with the flow
keyword). You must set the maximum-burst-bytes argument to be equal to the normal-burst-bytes
setting.
The pir peak-rate-bps corresponds to the extended-burst-bytes.
The valid values for action are as follows:
•

drop—Drops packets that do not exceed the bits-per-second rate.

•

policed-dscp-transmit—Causes all the out-of-profile traffic to be marked down as specified in the
markdown map.

•

set-dscp-transmit {dscp-value | dscp-bit-pattern | default | ef}—Marks the matched traffic with a
new DSCP value where the valid values are as follows:
– dscp-value—Specifies a DSCP value; valid values are from 0 to 63.
– dscp-bit-pattern—Specifies a DSCP bit pattern; valid values are listed in Table 2-28.
– default—Matches packets with default dscp (000000).
– ef—Matches packets with EF dscp (101110).

Table 2-28 Valid dscp-bit-pattern Values

Keyword

Definition

af11

Matches packets with AF11 dscp (001010).

af12

Matches packets withAF12 dscp (001100).

af13

Matches packets with AF13 dscp (001110).

af21

Matches packets with AF21 dscp (010010).

af22

Matches packets with AF22 dscp (010100).

af23

Matches packets with AF23 dscp (010110).

af31

Matches packets with AF31 dscp (011010).

af32

Matches packets with AF32 dscp (011100).

af33

Matches packets with AF33 dscp (011110).

af41

Matches packets with AF41 dscp (100010).

af42

Matches packets with AF42 dscp (100100).

af43

Matches packets with AF43 dscp (100110).

cs1

Matches packets with CS1 (precedence 1) dscp (001000).

cs2

Matches packets with CS2 (precedence 2) dscp (010000).

cs3

Matches packets with CS3 (precedence 3) dscp (011000).

cs4

Matches packets with CS4 (precedence 4) dscp (100000).

cs5

Matches packets with CS5 (precedence 5) dscp (101000).

cs6

Matches packets with CS6 (precedence 6) dscp (110000).

cs7

Matches packets with CS7 (precedence 7) dscp (111000).

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-588

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
police (policy map)

Examples

•

set-mpls-exp-imposition-transmit new-mpls-exp—Rewrites the MPLS experimental bits on
imposed label entries and transmits. The new-mpls-exp argument specifies the value used to set the
MPLS EXP bits that are defined by the policy map; valid values for new-mpls-exp are from 0 to 7.

•

set-mpls-exp-topmost-transmit—Rewrites the MPLS experimental bits on the topmost label
entries and transmits. The new-mpls-exp argument specifies the value used to set the MPLS EXP
bits that are defined by the policy map; valid values for new-mpls-exp are from 0 to 7.

•

set-prec-transmit new-precedence—Marks the matched traffic with a new IP-precedence value and
transmits; valid values for new-precedence are from 0 to 7.

•

transmit—Transmits the packets that do not exceed the bits-per-second rate.

This example shows how to create a policy map named max-pol-ipp5 that uses the class map named
ipp5, which is configured to trust received IP-precedence values and is configured with a
maximum-capacity aggregate policer:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# policy-map max-pol-ipp5
Router(config-pmap)# class ipp5
Router(config-pmap-c)# trust ip-precedence
Router(config-pmap-c)# police 2000000000 2000000 conform-action set-prec-transmit 6
exceed-action policed-dscp-transmit
Router(config-pmap-c)#

Related Commands

Command

Description

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

service-policy

Attaches a policy map to an interface.

show class-map

Displays class-map information.

show policy-map

Displays information about the policy map.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

2\

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-589

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

police rate

police rate
To configure traffic policing for traffic that is destined for the control plane, use the police rate
command. To remove traffic policing from the configuration, use the no form of this command.
police rate units pps [burst burst-in-packets packets] [peak-rate peak-rate-in-pps pps] [peak-burst
peak-burst-in-packets packets]
police rate units bps [burst burst-in-bytes bytes] [peak-rate peak-rate-in-bps bps] [peak-burst
peak-burst-in-bytes bytes]
police rate percent percentage [burst ms ms] [peak-rate percent percentage] [peak-burst ms ms]
no police rate units pps [burst burst-in-packets packets] [peak-rate peak-rate-in-pps pps]
[peak-burst peak-burst-in-packets packets]
no police rate units bps [burst burst-in-bytes bytes] [peak-rate peak-rate-in-bps bps] [peak-burst
peak-burst-in-bytes bytes]
no police rate percent percentage [burst ms ms] [peak-rate percent percentage] [peak-burst ms
ms]

Syntax Description

units

Police rate; see the “Usage Guidelines” section for valid values.

pps

Specifies that the rate at which traffic is policed is in packets per second.

burst burst-in-packets
packets

(Optional) Specifies the burst rate that is used for policing traffic; valid
values are from 1 to 512000 packets.

peak-rate
peak-rate-in-pps pps

(Optional) Specifies the PIR that is used for policing traffic; valid values are
from from 1 to 512000 packets.

peak-burst
peak-burst-in-packets
packets

(Optional) Specifies the peak-burst value that is used for policing traffic;
valid values are from 1 to 512000 packets.

bps

Specifies that the rate at which traffic is policed is in bits per second.

burst burst-in-bytes
bytes

(Optional) Specifies the burst rate that is used for policing traffic; valid
values are from 1000 to 512000000 bits.

peak-rate
peak-rate-in-bps bps

(Optional) Specifies the peak burst value that is used for the peak rate; valid
values are from 1000 to 512000000 bits.

peak-burst
peak-burst-in-bytes
bytes

(Optional) Specifies the peak burst value that is used for policing traffic;
valid values are from 1000 to 512000000 bits.

percent percentage

(Optional) Specifies the percentage of interface bandwidth that is used to
determine the rate at which traffic is policed; valid values are from 1 to 100.

burst ms ms

(Optional) Specifies the burst rate that is used for policing traffic; valid
values are from 1 to 2000 milliseconds.

peak-rate percent
percentage

(Optional) Specifies the percentage of the interface bandwidth that is used to
determine the PIR; valid values are from 1 to 100.

peak-burst ms ms

(Optional) Specifies the peak burst rate that is used for policing traffic; valid
values are from 1 to 2000 milliseconds.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-590

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
police rate

Defaults

Disabled

Command Modes

Policy-map class configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The valid values for units are as follows:
•

If the police rate is specified in pps, the valid values are from 1 to 2000000 pps.

•

If the police rate is specified in bps, the valid values are from 8,000 to 10,000,000,000 bps.

pps is used to calculate the PIR peak-rate-in-pps.
Use the police rate command to limit traffic that is destined for the control plane on the basis of packets
per second (pps), bytes per seconds (bps), or a percentage of interface bandwidth.
If the police rate command is entered, but the rate is not specified, traffic that is destined for the control
plane will be policed on the basis of bps.

Examples

This example shows how to configure policing on a class to limit traffic to an average rate of
1500000 pps:
Router(config)# class-map telnet-class
Router(config-cmap)# match access-group 140
Router(config-cmap)# exit
Router(config)# policy-map control-plane-policy
Router(config-pmap)# class telnet-class
Router(config-pmap-c)# police rate 1500000 pps bc 500000 packets
Router(config-pmap-c)# exit

Related Commands

Command

Description

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

show policy-map

Displays information about the policy map.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-591

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

policy-map

policy-map
To access QoS policy-map configuration mode to configure the QoS policy map, use the policy-map
command. To delete a policy map, use the no form of this command.
policy-map policy-map-name
no policy-map policy-map-name

Syntax Description

policy-map-name

Defaults

The defaults are as follows:

Policy map name. See the “Usage Guidelines” section for descriptions of
the policy-map subcommands.

•

extended-burst-bytes is equal to burst-bytes.

•

conform-action is transmit.

•

exceed-action is drop.

•

violate-action is equal to the exceed-action.

•

pir peak-rate-bps is equal to the normal (cir) rate.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In QoS policy-map configuration mode, these configuration commands are available:
•

exit exits QoS class-map configuration mode.

•

no removes a previously defined policy map.

•

class class-map [name] accesses QoS class-map configuration mode to specify a previously created
class map to be included in the policy map or to create a class map (see the class-map command for
additional information).

•

class {class-name | class-default} accesses the class configuration mode to specify the name of the
class whose policy you want to create or change (see the class (policy-map) command for additional
information).

•

police [aggregate name] subcommand defines a microflow or aggregate policer (see the police
(policy map) command for additional information) and provides the following syntaxes:
– police {aggregate name}
– police flow {bits-per-second [normal-burst-bytes] [maximum-burst-bytes] [pir peak-rate-bps]} |

[conform-action action] [exceed-action action] [violate-action action]

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-592

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
policy-map

– police flow mask {dest-only | full-flow | src-only} {bits-per-second [normal-burst-bytes]

[maximum-burst-bytes]} [conform-action action] [exceed-action action]
•

trust {cos | dscp | ip-precedence} sets the specified class trust values. Trust values that are set in
this command supersede trust values that are set on specific interfaces.

Table 2-29 describes the class syntax.
Table 2-29 class Syntax Description

Subcommand

Description

exit

(Optional) Exits from QoS class action configuration mode.

police

(Optional) Specifies flow policing; see the police (policy map)
command for additional information.

trust state

(Optional) Configures the policy map class trust state. Trust
states are cos, dscp, and ip-precedence.

cos

(Optional) Sets the internal DSCP value from a received or
interface CoS.

dscp

(Optional) Sets QoS to use the received DSCP value.

ip-precedence

(Optional) Sets the DSCP value from the received IP precedence.

If you do not specify an exceed-action in the policy-map, it defaults to drop and the violate-action
follows.
The PFC QoS does not support the bandwidth, priority, queue-limit, random-detect, or set keywords
in policy-map classes.

Examples

This example shows how to create a policy map named max-pol-ipp5 that uses a previously configured
class map named ipp5, how to configure trust-received IP-precedence values, and how to configure a
maximum-capacity aggregate policer and a microflow policer:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# policy-map max-pol-ipp5
Router(config-pmap)# class ipp5
Router(config-pmap-c)# trust ip-precedence
Router(config-pmap-c)# police 2000000000 2000000 8000000 conform-action set-prec-transmit
6 exceed-action policed-dscp-transmit
Router(config-pmap-c)# police flow 10000000 10000 conform-action set-prec-transmit 6
exceed-action policed-dscp-transmit
Router(config-pmap-c)# end
Router#

Related Commands

Command

Description

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

class (policy-map)

Specifies the name of the class that has a policy that you want to create or
change or specifies the default class (commonly known as the class-default
class) before you configure its policy.

service-policy

Attaches a policy map to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-593

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

policy-map

Command

Description

show class-map

Displays class-map information.

show policy-map

Displays information about the policy map.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-594

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
port access-map

port access-map
To create a port access map or enter port access-map command mode, use the port access-map
command. To remove a mapping sequence or the entire map, use the no form of this command.
port access-map name [seq#]
no port access-map name [seq#]

Syntax Description

name

Port access-map tag.

seq#

(Optional) Map sequence number; valid values are 0 to 65535.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the sequence number of an existing map sequence, you enter port access-map mode. If you
do not specify a sequence number, a number is automatically assigned. You can enter one match clause
and one action clause per map sequence.
If you enter the no port access-map name [seq#] command without entering a sequence number, the
whole map is removed.
Once you enter port access-map mode, the following commands are available:

Examples

•

action—Specifies the packet action clause; see the action command section.

•

default—Sets a command to its defaults.

•

end—Exits from configuration mode.

•

exit—Exits from the port access-map configuration mode.

•

match—Specifies the match clause; see the match command section.

•

no—Negates a command or sets its defaults.

This example shows how to enter port access-map mode:
Router(config)# port access-map ted
Router(config-port-map)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-595

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

port access-map

Related Commands

Command

Description

action

Sets the packet action clause.

match

Specifies the match clause by selecting one or more ACLs for a VLAN
access-map sequence.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-596

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
port-channel load-balance

port-channel load-balance
To set the load-distribution method among the ports in the bundle, use the port-channel load-balance
command. To return to the default settings, use the no form of this command.
port-channel load-balance method
no port-channel load-balance

Syntax Description

method

Defaults

method is src-dst-ip.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Load-distribution method; see the “Usage Guidelines” section for a list of valid values.

Valid method values are as follows:
•

dst-ip—Loads distribution on the destination IP address

•

dst-mac—Loads distribution on the destination MAC address

•

dst-port—Loads distribution on the destination port

•

src-dst-ip—Loads distribution on the source XOR-destination IP address

•

src-dst-mac—Loads distribution on the source XOR-destination MAC address

•

src-dst-port—Loads distribution on the source XOR-destination port

•

src-ip—Loads distribution on the source IP address

•

src-mac—Loads distribution on the source MAC address

•

src-port—Loads distribution on the source port

The port-channel per-module load-balance command allows you to enable or disable port-channel
load-balancing on a per-module basis.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-597

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

port-channel load-balance

This example shows how to set the load-distribution method to dst-ip:
Router(config)# port-channel load-balance dst-ip
Router(config)#

This example shows how to set the load-distribution method on a specific module:
Router(config)# port-channel load-balance dst-ip module 2
Router(config)#

Related Commands

Command

Description

interface port-channel

Creates a port-channel virtual interface and enters interface
configuration mode.

port-channel per-module
load-balance

Enables load-distribution on a per-module basis.

show etherchannel

Displays the EtherChannel information for a channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-598

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
port-channel load-balance mpls

port-channel load-balance mpls
To set the load-distribution method among the ports in the bundle for MPLS packets, use the
port-channel load-balance mpls command. To return to the default settings, use the no form of this
command.
port-channel load-balance mpls {label | label-ip}
no port-channel load-balance mpls

Syntax Description

label

Specifies using the MPLS label to distribute packets; see the “Usage
Guidelines” section for additional information.

label-ip

Specifies using the MPLS label or the IP address to distribute packets; see
the “Usage Guidelines” section for additional information.

Defaults

label-ip

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you select label, these guidelines apply:
•

With only one MPLS label, the last MPLS label is used.

•

With two or more MPLS labels, the last two labels (up to the fifth label) are used.

If you select label-ip, these guidelines apply:
•

With IPv4 and three or fewer labels, the source IP address XOR-destination IP address is used to
distribute packets.

•

With four or more labels, the last two labels (up to the fifth label) are used.

•

With non-IPv4 packets, the distribution method is the same as the label method.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-599

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

port-channel load-balance mpls

Examples

This example shows how to set the load-distribution method to label-ip:
Router(config)# port-channel load-balance mpls label-ip
Router(config)#

Related Commands

Command

Description

interface port-channel Creates a port-channel virtual interface and enters interface configuration
mode.
show etherchannel

Displays the EtherChannel information for a channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-600

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
port-channel min-links

port-channel min-links
To specify that a minimum number of bundled ports in an EtherChannel is required before the channel
can be active, use the port-channel min-links command. To return to the default settings, use the no form
of this command.
port-channel min-links min-num
no port-channel min-links

Syntax Description

min-num

Defaults

min-num is 1.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Minimum number of bundled ports in a channel that is required before the
channel can be active; valid values are from 2 to 8.

This command is supported on LACP (802.3ad) ports only. More than one LACP secondary port channel
can belong to the same channel group. This command is applied to all port channels in the same group.
If fewer links than the specified number are available, the port-channel interface does not become active.
Use the show running-config command to verify the configuration.

Examples

This example shows how to specify that a minimum number of bundled ports in an EtherChannel is
required before the channel can be active:
Router(config-if)# port-channel min-links 3
Router(config-if)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-601

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

port-channel per-module load-balance

port-channel per-module load-balance
To enable load-distribution on a per-module basis, use the port-channel per-module load-balance
command. To return to the default settings, use the no form of this command.
port-channel per-module load-balance
no port-channel per-module load-balance

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The port-channel load-balance method module slot command is supported on DFC systems only.
The port-channel per-module load-balance command allows you to enable or disable port-channel
load-balancing on a per-module basis. You can enter the port-channel load-balance method module
slot command to specify the load-balancing method on a specific module after you have entered the
port-channel per-module load-balance command.

Examples

This example shows how to enable load balancing on a per-module basis:
Router(config)# port-channel per-module load-balance
Router(config)#

Related Commands

Command

Description

interface port-channel Creates a port-channel virtual interface and enters interface configuration
mode.
port-channel
load-balance module

Enables load-distribution on a specific module.

show etherchannel

Displays the EtherChannel information for a channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-602

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
power enable

power enable
To turn on power for the modules, use the power enable command. To power down a module, use the
no form of this command.
power enable {module slot}
no power enable {module slot}

Syntax Description

module slot

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Specifies a module slot number; see the “Usage Guidelines” section for
valid values.

When you enter the no power enable module slot command to power down a module, the module’s
configuration is not saved.
When you enter the no power enable module slot command to power down an empty slot, the
configuration is saved.
The slot argument designates the module number. Valid values for slot depend on the chassis that is
used. For example, if you have a 13-slot chassis, valid values for the module number are from 1 to 13.

Examples

This example shows how to turn on the power for a module that was previously powered down:
Router(config)# power enable module 5
Router(config)#

This example shows how to power down a module:
Router(config)# no power enable module 5
Router(config)#

Related Commands

Command

Description

show power

Displays information about the power status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-603

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

power inline

power inline
To configure the administrative mode of the inline power on an interface, use the power inline
command.
power inline {auto [max max-milli-watts]} | never | {static [max max-milli-watts]}

Syntax Description

Defaults

auto

Turns on the device discovery protocol and applies power to the device, if
found.

max
max-milli-watts

(Optional) Specifies the maximum amount of power that a device connected
to a port can consume; valid values are from 4000 to 15400 milliwatts.

never

Turns off the device discovery protocol and stops supplying power to the
device.

static

Allocates power from the system power pool to a port.

The defaults are as follows:
•

auto.

•

max-milli-watts is 15400 milliwatts.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the inline power to the off mode on an interface:
Router(config-if)# interface fastethernet5/1
Router(config-if)# switchport
Router(config-if)# power inline never

This example shows how to allocate power from the system power pool to a port:
Router(config-if)# interface fastethernet5/1
Router(config-if)# switchport
Router(config-if)# power inline static max 15000

Related Commands

Command

Description

show power

Displays information about the power status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-604

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
power redundancy-mode

power redundancy-mode
To set the power-supply redundancy mode, use the power redundancy-mode command.
power redundancy-mode {combined | redundant}

Syntax Description

combined

Specifies no redundancy (combine power-supply outputs).

redundant

Specifies redundancy (either power supply can operate the system).

Defaults

redundant

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the power supplies to the no-redundancy mode:
Router(config)# power redundancy-mode combined
Router(config)#

This example shows how to set the power supplies to the redundancy mode:
Router(config)# power redundancy-mode redundant
Router(config)#

Related Commands

Command

Description

show power

Displays information about the power status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-605

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

priority-queue cos-map

priority-queue cos-map
To map CoS values to the receive and transmit strict-priority queues, use the priority-queue cos-map
command. To return to the default mapping, use the no form of this command.
priority-queue cos-map queue-id cos1 [cos2 [cos3 [cos4 [cos5 [cos6 [cos7 [cos8]]]]]]]

Syntax Description

Defaults

queue-id

Queue number; the valid value is 1.

cos1

CoS value; valid values are from 0 to 7.

. . . cos8

(Optional) CoS values; valid values are from 0 to 7.

The default mapping is queue 1 is mapped to CoS 5 for the following receive and transmit strict-priority
queues:
•

1p1q4t receive queues

•

1p1q0t receive queues

•

1p1q8t receive queues

•

1p2q2t transmit queues

•

1p3q8t transmit queues

•

1p7q8t transmit queues

•

1p3q1t transmit queues

•

1p2q1t transmit queues

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When mapping CoS values to the strict-priority queues, note the following information:
•

The queue number is always 1.

•

You can enter up to 8 CoS values to map to the queue.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-606

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
priority-queue cos-map

Examples

This example shows how to map CoS value 7 to the strict-priority queues on Gigabit Ethernet port 1/1:
Router(config-if)# priority-queue cos-map 1 7
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-607

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

priority-queue queue-limit

priority-queue queue-limit
To se the priority-queue size on an interface, use the priority-queue queue-limit command.
priority-queue queue-limit weight

Syntax Description

weight

Defaults

The default settings are as follows:

Priority-queue size weight; valid values are from 1 and 100 percent.

•

Global QoS is enabled—15

•

Global QoS is disabled—0

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

See the Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY
for a list of modules that support this command.

Examples

This example shows how to allocate available buffer space to a priority queue:
Router(config-if)# priority-queue queue-limit 15
Router(config-if)#

Related Commands

Command

Description

show queueing interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-608

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
private-vlan

private-vlan
To configure PVLANs and the association between a PVLAN and a secondary VLAN, use the
private-vlan command. To return to the default settings, use the no form of this command.
private-vlan {isolated | community | primary}
private-vlan association secondary-vlan-list | {add secondary-vlan-list} |
{remove secondary-vlan-list}
no private-vlan {isolated | community | primary}
no private-vlan association

Syntax Description

isolated

Designates the VLAN as an isolated PVLAN.

community

Designates the VLAN as a community PVLAN.

primary

Designates the VLAN as the primary PVLAN.

association

Creates an association between a secondary VLAN and a primary VLAN.

secondary-vlan-list

Number of the secondary VLAN.

add

Associates a secondary VLAN to a primary VLAN.

remove

Clears the association between a secondary VLAN and a primary VLAN.

Defaults

No PVLANs are configured.

Command Modes

config-VLAN submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You cannot configure PVLANs on a port-security port.
If you enter a pvlan command on a port-security port, this error message is displayed:
Command rejected: Gix/y is Port Security enabled port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-609

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

private-vlan

Within groups of 12 ports (1–12, 13–24, 25–36, and 37–48), do not configure the ports as isolated or as
community VLAN ports when one of the ports is a trunk, a SPAN destination, or a promiscuous private
VLAN port. If one port is a trunk, a SPAN destination, or a promiscuous private VLAN port, any isolated
or community VLAN configuration for the other ports within the 12 ports is inactive. To reactivate the
ports, remove the isolated or community VLAN-port configuration and enter the shutdown and no
shutdown commands.

Caution

If you enter the shutdown command and then the no shutdown command in the config-vlan mode on a
PVLAN (primary or secondary), the PVLAN type and association information is deleted. You will have
to reconfigure the VLAN to be a PVLAN.

Note

This restriction applies to Ethernet 10-Mb, 10/100-Mb, and 100-Mb modules except WS-X6548-RJ-45
and WS-X6548-RJ-21.
You cannot configure VLAN 1 or VLANs 1001 to 1005 as PVLANs.
VTP does not support PVLANs. You must configure PVLANs on each device where you want PVLAN
ports.
The secondary-vlan-list argument cannot contain spaces. It can contain multiple comma-separated
items. Each item can be a single PVLAN ID or a hyphenated range of PVLAN IDs. The
secondary-vlan-list parameter can contain multiple community VLAN IDs.
The secondary-vlan-list argument can contain only one isolated VLAN ID. A PVLAN is a set of private
ports that are characterized by using a common set of VLAN number pairs. Each pair is made up of at
least two special unidirectional VLANs and is used by isolated ports and/or by a community of ports to
communicate with routers.
An isolated VLAN is a VLAN that is used by isolated ports to communicate with promiscuous ports. An
isolated VLAN’s traffic is blocked on all other private ports in the same VLAN. Its traffic can only be
received by standard trunking ports and promiscuous ports that are assigned to the corresponding
primary VLAN.
A promiscuous port is defined as a private port that is assigned to a primary VLAN.
A primary VLAN is defined as the VLAN that is used to convey the traffic from the routers to customer
end stations on private ports.
A community VLAN is defined as the VLAN that carries the traffic among community ports and from
community ports to the promiscuous ports on the corresponding primary VLAN.
You can specify only one isolated vlan-id, while multiple community VLANs are allowed. Isolated and
community VLANs can only be associated with one VLAN. The associated VLAN list may not contain
primary VLANs. Similarly, you cannot configure a VLAN that is already associated to a primary VLAN
as a primary VLAN.
The private-vlan commands do not take effect until you exit the config-VLAN submode.
If you delete either the primary or secondary VLAN, the ports that are associated with the VLAN become
inactive.
Refer to the Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release
12.2ZY for additional configuration guidelines.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-610

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
private-vlan

Examples

This example shows how to create a PVLAN relationship between the primary VLAN 14, the isolated
VLAN 19, and the community VLANs 20 and 21:
Router(config) # vlan
Router(config-vlan) #
Router(config) # vlan
Router(config-vlan) #
Router(config-vlan) #
Router(config) # vlan
Router(config-vlan) #
Router(config-vlan) #

19
private-vlan
20
private-vlan
private-vlan
14
private-vlan
private-vlan

isolated
community
community
primary
association 19-21

This example shows how to remove an isolated VLAN and community VLAN 20 from the PVLAN
association:
Router(config) # vlan 14
Router(config-vlan) # private-vlan association remove 18,20
Router(config-vlan) #

This example shows how to remove a PVLAN relationship and delete the primary VLAN. The
associated secondary VLANs are not deleted.
Router(config-vlan) # no private-vlan 14
Router(config-vlan) #

Related Commands

Command

Description

show vlan

Displays VLAN information.

show vlan private-vlan Displays PVLAN information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-611

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

private-vlan mapping

private-vlan mapping
To create a mapping between the primary and the secondary VLANs so that both VLANs share the same
primary VLAN SVI, use the private-vlan mapping command. To remove all PVLAN mappings from the
SVI, use the no form of this command.
private-vlan mapping {[secondary-vlan-list | {add secondary-vlan-list} |
{remove secondary-vlan-list}]}
no private-vlan mapping

Syntax Description

secondary-vlan-list

(Optional) VLAN ID of the secondary VLANs to map to the primary
VLAN.

add

(Optional) Maps the secondary VLAN to the primary VLAN.

remove

(Optional) Removes the mapping between the secondary VLAN and the
primary VLAN.

Defaults

No PVLAN SVI mapping is configured.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The private-vlan mapping command affects traffic that is switched in the software on the PISA.
The secondary-vlan-list argument cannot contain spaces; it can contain multiple comma-separated
items. Each item can be a single PVLAN ID or a hyphenated range of PVLAN IDs.
This command is valid in the interface configuration mode of the primary VLAN.
The SVI of the primary VLAN is created at Layer 3.
Traffic that is received on the secondary VLAN is routed by the SVI of the primary VLAN.
The SVIs of existing secondary VLANs do not function and are considered as down after you enter this
command.
A secondary SVI can only be mapped to one primary SVI. If you configure the primary VLAN as a
secondary VLAN, all the SVIs that are specified in this command are brought down.
If you configure a mapping between two VLANs that do not have a valid Layer 2 association, the
mapping configuration does not take effect.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-612

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
private-vlan mapping

Examples

This example shows how to map the interface of VLAN 20 to the SVI of VLAN 18:
Router(config)# interface vlan 18
Router(config-if)# private-vlan mapping 18 20
Router(config-if)#

This example shows how to permit routing of secondary VLAN-ingress traffic from PVLANs 303
through 307, 309, and 440 and verify the configuration:
Router# configure terminal
Router(config)# interface vlan 202
Router(config-if)# private-vlan mapping add 303-307,309,440
Router(config-if)# end
Router# show interfaces private-vlan mapping
Interface Secondary VLAN Type
--------- -------------- ----------------vlan202
303
community
vlan202
304
community
vlan202
305
community
vlan202
306
community
vlan202
307
community
vlan202
309
community
vlan202
440
isolated
Router#

This example shows the displayed error message if the VLAN that you are adding is already mapped to
the SVI of VLAN 18. You must delete the mapping from the SVI of VLAN 18 first.
Router(config)# interface vlan 19
Router(config-if)# private-vlan mapping 19 add 21
Command rejected: The interface for VLAN 21 is already mapped as s secondary.
Router(config-if)#

This example shows how to remove all PVLAN mappings from the SVI of VLAN 19:
Router(config)# interface vlan 19
Router(config-if)# no private-vlan mapping
Router(config-if)#

Related Commands

Command

Description

show interfaces
private-vlan mapping

Displays the information about the PVLAN mapping for VLAN SVIs.

show vlan

Displays VLAN information.

show vlan private-vlan Displays PVLAN information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-613

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

private-vlan synchronize

private-vlan synchronize
To map the secondary VLANs to the same instance as the primary VLAN, use the private-vlan
synchronize command.
private-vlan synchronize

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

MST configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not map VLANs to the same instance as the associated primary VLAN when you exit the MST
configuration submode, a warning message displays and lists the secondary VLANs that are not mapped
to the same instance as the associated primary VLAN. The private-vlan synchronize command
automatically maps all secondary VLANs to the same instance as the associated primary VLANs.

Examples

This example assumes that a primary VLAN 2 and a secondary VLAN 3 are associated to VLAN 2, and that
all VLANs are mapped to the CIST instance 1. This example also shows the output if you try to change the
mapping for the primary VLAN 2 only:
Router(config)# spanning-tree mst configuration
Router(config-mst)# instance 1 vlan 2
Router(config-mst)# exit
These secondary vlans are not mapped to the same instance as their primary:
-> 3

This example shows how to initialize PVLAN synchronization:
Router(config-mst)# private-vlan synchronize
Router(config-mst)#

Related Commands

Command

Description

show

Verifies the MST configuration.

show spanning-tree
mst

Displays information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-614

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
process-min-time percent

process-min-time percent
To specify the minimum percentage of CPU process time OSPF takes before trying to release the CPU
for other processes, use the process-min-time percent command. To return to the default settings, use the
no form of this command.
process-min-time percent percent
no process-min-time

Syntax Description

percent

Defaults

percent is 25.

Command Modes

Router configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Percentage of CPU process time to be used before trying to release the CPU
for other processes; valid values are from 1 to 100.

Usage Guidelines
Note

Use this command under the direction of Cisco TAC only.
This command is supported by OSPFv2 and OSPFv3.
Use the process-min-time command to configure the minimum percentage of the process maximum
time. Once the percentage has been exceeded, CPU control may be given to a higher priority process.
The process maximum time is set using the process-max-time command. Use the process-min-time
command with the process-max-time command.

Examples

This example shows how to set the percentage of CPU process time to be used before releasing the CPU:
Router> configure terminal
Router(configure)# router ospf
Router(config-router)# process-min-time percent 35
Router(config-router)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-615

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

process-min-time percent

This example shows how to return to the default setting:
Router> configure terminal
Router(configure)# router rip
Router(config-router)# no process-min-time
Router(config-router)#

Related Commands

Command

Description

process-max-time

Configures the amount of time after which a process should voluntarily
yield to another process.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-616

OL-11437-01

2
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
rcv-queue bandwidth

rcv-queue bandwidth
To define the bandwidths for ingress (receive) WRR queues through scheduling weights, use the
rcv-queue bandwidth command. To return to the default settings, use the no form of this command.
rcv-queue bandwidth weight-1 ... weight-n
no rcv-queue bandwidth

Syntax Description

weight-1 ... weight-n

Defaults

The defaults are as follows:

WRR weights; valid values are from 0 to 255.

•

QoS enabled—4:255

•

QoS disabled—255:1

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is not supported on Catalyst 6500 series switches that are configured with a Supervisor
Engine 2.
This command is supported on 2q8t and 8q8t ports only.
You can configure up to seven queue weights.

Examples

This example shows how to allocate a three-to-one bandwidth ratio:
Router(config-if)# rcv-queue bandwidth 3 1
Router(config-if)#

Related Commands

Command

Description

rcv-queue queue-limit

Sets the size ratio between the strict-priority and standard receive queues.

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-617

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

rcv-queue cos-map

rcv-queue cos-map
To map the CoS values to the standard receive-queue drop thresholds, use the rcv-queue cos-map
command. To remove the mapping, use the no form of this command.
rcv-queue cos-map queue-id threshold-id cos-1 ... cos-n
no rcv-queue cos-map queue-id threshold-id

Syntax Description

queue-id

Queue ID; the valid value is 1.

threshold-id

Threshold ID; valid values are from 1 to 4.

cos-1 ... cos-n CoS values; valid values are from 0 to 7.

Defaults

The defaults are listed in Table 2-30.
Table 2-30 CoS-to-Standard Receive Queue Map Defaults

queue

threshold

cos-map

With QoS Disabled

queue

cos-map

With QoS Enabled

1

1

0,1, 2,3,4,5,6,7 1

1

0,1

1

2

1

2

2,3

1

3

1

3

4

1

4

1

4

6,7

2

1

2

1

5

5

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

threshold

The cos-n value is defined by the module and port type. When you enter the cos-n value, note that the
higher values indicate higher priorities.
Use this command on trusted ports only.
For additional information on configuring receive-queue thresholds, see the QoS chapter in the Catalyst
Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-618

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
rcv-queue cos-map

Examples

This example shows how to map the CoS values 0 and 1 to threshold 1 in the standard receive queue:
Router (config-if)# rcv-queue cos-map 1 1 0 1
cos-map configured on: Gi1/1 Gi1/2
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-619

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

rcv-queue queue-limit

rcv-queue queue-limit
To set the size ratio between the strict-priority and standard receive queues, use the rcv-queue
queue-limit command. To return to the default settings, use the no form of this command.
rcv-queue queue-limit {q-limit-1} {q-limit-2}
no rcv-queue queue-limit

Syntax Description

Defaults

q-limit-1

Standard queue weight; valid values are from 1 and 100 percent.

q-limit-2

Strict-priority queue weight; see the “Usage Guidelines” section for valid values.

The defaults are as follows:
•

80 percent is for low priority.

•

20 percent is for strict priority.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Valid strict-priority weight values are from 1 to 100 percent, except on 1p1q8t ingress LAN ports, where
valid values for the strict-priority queue are from 3 to 100 percent.
The rcv-queue queue-limit command configures ports on a per-ASIC basis.
Estimate the mix of strict-priority-to-standard traffic on your network (for example, 80-percent standard
traffic and 20-percent strict-priority traffic) and use the estimated percentages as queue weights.

Examples

This example shows how to set the receive-queue size ratio for Gigabit Ethernet interface 1/2:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface gigabitethernet 1/2
Router(config-if)# rcv-queue queue-limit 75 15
Router(config-if)# end
Router#

Related Commands

Command

Description

show queueing interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-620

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
rcv-queue random-detect

rcv-queue random-detect
To specify the minimum and maximum threshold for the specified receive queues, use the rcv-queue
random-detect command. To return to the default settings, use the no form of this command.
rcv-queue random-detect {max-threshold | min-threshold} queue-id threshold-percent-1 ...
threshold-percent-n
no rcv-queue random-detect {max-threshold | min-threshold} queue-id

Syntax Description

Defaults

max-threshold

Specifies the maximum threshold.

min-threshold

Specifies the minimum threshold.

queue-id

Queue ID; the valid value is 1.

threshold-percent-1
threshold-percent-n

Threshold weights; valid values are from 1 to 100 percent.

The defaults are as follows:
•

min-threshold—80 percent

•

max-threshold—20 percent

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on 1p1q8t and 8q8t ports only.
The 1p1q8t interface indicates one strict queue and one standard queue with eight thresholds. The 8q8t
interface indicates eight standard queues with eight thresholds. The threshold in the strict-priority queue
is not configurable.
Each threshold has a low- and a high-threshold value. The threshold values are a percentage of the
receive-queue capacity.
For additional information on configuring receive-queue thresholds, refer to the QoS chapter in the
Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-621

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

rcv-queue random-detect

Examples

This example shows how to configure the low-priority receive-queue thresholds:
Router (config-if)# rcv-queue random-detect max-threshold 1 60 100
Router (config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-622

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
rcv-queue threshold

rcv-queue threshold
To configure the drop-threshold percentages for the standard receive queues on 1p1q4t and 1p1q0t
interfaces, use the rcv-queue threshold command. To return the thresholds to the default settings, use the
no form of this command.
rcv-queue threshold queue-id threshold-percent-1 ... threshold-percent-n
no rcv-queue threshold

Syntax Description

Defaults

queue-id

Queue ID; the valid value is 1.

threshold- percent-1 ...
threshold- percent-n

Threshold ID; valid values are from 1 to 100 percent.

The defaults for the 1p1q4t and 1p1q0t configurations are as follows:
•

QoS assigns all traffic with CoS 5 to the strict-priority queue.

•

QoS assigns all other traffic to the standard queue.

The default for the 1q4t configuration is that QoS assigns all traffic to the standard queue.
If you enable QoS, the following default thresholds apply:
•

1p1q4t interfaces have this default drop-threshold configuration:
– Frames with CoS 0, 1, 2, 3, 4, 6, or 7 go to the standard receive queue.
– Using standard receive-queue drop threshold 1, the Catalyst 6500 series switch drops incoming

frames with CoS 0 or 1 when the receive-queue buffer is 50 percent or more full.
– Using standard receive-queue drop threshold 2, the Catalyst 6500 series switch drops incoming

frames with CoS 2 or 3 when the receive-queue buffer is 60 percent or more full.
– Using standard receive-queue drop threshold 3, the Catalyst 6500 series switch drops incoming

frames with CoS 4 when the receive-queue buffer is 80 percent or more full.
– Using standard receive-queue drop threshold 4, the Catalyst 6500 series switch drops incoming

frames with CoS 6 or 7 when the receive-queue buffer is 100 percent full.
– Frames with CoS 5 go to the strict-priority receive queue (queue 2), where the Catalyst 6500

series switch drops incoming frames only when the strict-priority receive-queue buffer is
100 percent full.
•

1p1q0t interfaces have this default drop-threshold configuration:
– Frames with CoS 0, 1, 2, 3, 4, 6, or 7 go to the standard receive queue. The Catalyst 6500 series

switch drops incoming frames when the receive-queue buffer is 100 percent full.
– Frames with CoS 5 go to the strict-priority receive queue (queue 2), where the Catalyst 6500

series switch drops incoming frames only when the strict-priority receive-queue buffer is
100 percent full.

Note

The 100-percent threshold may be actually changed by the module to 98 percent to allow BPDU traffic
to proceed. The BPDU threshold is factory set at 100 percent.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-623

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

rcv-queue threshold

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The queue-id value is always 1.
A value of 10 indicates a threshold when the buffer is 10 percent full.
Always set threshold 4 to 100 percent.
Receive thresholds take effect only on ports whose trust state is trust cos.
Configure the 1q4t receive-queue tail-drop threshold percentages with the wrr-queue threshold
command.

Examples

This example shows how to configure the receive-queue drop thresholds for Gigabit Ethernet
interface 1/1:
Router(config-if)# rcv-queue threshold 1 60 75 85 100
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

wrr-queue threshold

Configures the drop-threshold percentages for the standard receive and
transmit queues on 1q4t and 2q2t interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-624

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
reassign

reassign
To define the number of consecutive number of SYNs for a new connection that will go unanswered
before the connection is attempted to a different real server, use the reassign command. To change the
maximum number of connections to the default settings, use the no form of this command.
reassign threshold
no reassign

Syntax Description

threshold

Defaults

threshold is 3.

Command Modes

Real server configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Number of unanswered TCP SYNs that will be directed to a real server
before the connection is reassigned to a different real server; valid values
are from 1 to 4.

Usage Guidelines

If you do not specify the threshold value, the default value of the reassignment threshold is used.

Examples

This example shows how to define the reassignment threshold:
Router(config-if)# reassign 4
Router(config-if)#

This example shows how to revert to the default value:
Router(config-if)# no reassign
Router(config-if)#

Related Commands

Command

Description

faildetect numconns

Specifies the conditions that indicate a server failure.

inservice (real server)

Enables the real server for use by the Cisco IOS SLB feature.

retry

Defines the amount of time that must elapse before a connection is
attempted to a failed server.

maxconns (real server
configuration submode)

Limits the number of active connections to the real server.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-625

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

redundancy

redundancy
To enter redundancy configuration mode, use the redundancy command. From this mode, you can enter
the main CPU submode to manually synchronize the configurations that are used by the two supervisor
engines.
redundancy

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Once you enter redundancy configuration mode, these options are available:
•

exit—Exits from redundancy configuration mode.

•

main-cpu—Enters the main CPU submode.

•

no—Negates a command or sets its defaults.

From the main CPU submode, you can use the auto-sync command to use all of the redundancy
commands that are applicable to the main CPU.
To select the type of redundacy mode, use the mode command.
NSF with SSO redundancy mode supports IPv4. NSF with SSO redundancy mode does not support IPv6,
IPX, and MPLS.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-626

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
redundancy

Examples

This example shows how to enter redundancy mode:
Router (config)# redundancy
Router(config-r)#

This example shows how to enter the main CPU submode:
Router (config)# redundancy
Router (config-r)# main-cpu
Router (config-r-mc)#

Related Commands

Command

Description

auto-sync

Enables automatic synchronization of the configuration files in NVRAM.

mode

Sets the redundancy mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-627

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

redundancy force-switchover

redundancy force-switchover
To force a switchover from the active to the standby supervisor engine, use the redundancy
force-switchover command.
redundancy force-switchover

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Before using this command, see the “Performing a Fast Software Upgrade (FSU)” section of the Catalyst
Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for additional
information.
The redundancy force-switchover command conducts a manual switchover to the redundant supervisor
engine. The redundant supervisor engine becomes the new active supervisor engine running the new
Cisco IOS image. The modules are reset and the module software is downloaded from the new active
supervisor engine.
The old active supervisor engine reboots with the new image and becomes the redundant supervisor
engine.

Examples

This example shows how to switch over manually from the active to the standby supervisor engine:
Router# redundancy force-switchover
Router#

Related Commands

Command

Description

mode

Sets the redundancy mode.

redundancy

Enters redundancy configuration mode.

show redundancy

Displays RF information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-628

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
reload

reload
To reload the entire Catalyst 6500 series switch, use the reload command.
reload [text | in [hh:]mm [text] | at hh:mm [month day | day month] [text] | cancel]

Syntax Description

text

(Optional) Reason for the reload; the string can be from 1 to 255 characters.

in [hh:]mm

(Optional) Delays a Catalyst 6500 series switch reload for a specific amount of
time.

at hh:mm

(Optional) Schedules a Catalyst 6500 series switch reload to take place at the
specified time (using a 24-hour clock).

month

(Optional) Name of the month; any number of characters in a unique string.

day

(Optional) Number of the day; valid values are from 1 to 31.

cancel

(Optional) Cancels a scheduled reload.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The reload command stops the system. If the system is set to restart on error, it reboots itself. Use the
reload command after you enter configuration information into a file and the file is saved to the startup
configuration.
When you schedule a reload to occur at a later time (using the in keyword), it must take place within
approximately 24 days.
When specifying the reload time (using the at keyword), if you specify the month and day, the reload
takes place at the specified time and date. If you do not specify the month and day, the reload takes place
at the specified time on the current day (if the specified time is later than the current time), or on the next
day (if the specified time is earlier than the current time). Specifying 00:00 schedules the reload for
midnight. The reload must take place within approximately 24 days.
If you modify your configuration file, the Catalyst 6500 series switch prompts you to save the
configuration. During a save operation, the Catalyst 6500 series switch asks you if you want to proceed
with the save if the CONFIG_FILE environment variable points to a startup configuration file that no
longer exists. If you say “yes” in this situation, the Catalyst 6500 series switch goes to setup mode upon
reload.
You can use the at keyword if the system clock has been set on the MSM (either through NTP, the
hardware calendar, or manually). To schedule reloads across several MSMs to occur simultaneously,
you must synchronize the time on each MSM with NTP.
To display information about a scheduled reload, use the show reload command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-629

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

reload

Examples

This example shows how to reload the Catalyst 6500 series switch immediately:
Router# reload
Router#

This example shows how to reload the Catalyst 6500 series switch in 10 minutes:
Router# reload in 10
Router# Reload scheduled for 11:57:08 PDT Fri Apr 21 1996 (in 10 minutes)
Proceed with reload? [confirm]
Router#

This example shows how to reload the Catalyst 6500 series switch at 1:00 p.m. today:
Router# reload at 13:00
Router# Reload scheduled for 13:00:00 PDT Fri Apr 21 1996 (in 1 hour and 2 minutes)
Proceed with reload? [confirm]
Router#

This example shows how to reload the Catalyst 6500 series switch on April 20 at 2:00 a.m.:
Router# reload at 02:00 apr 20
Router# Reload scheduled for 02:00:00 PDT Sat Apr 20 1996 (in 38 hours and 9 minutes)
Proceed with reload? [confirm]
Router#

This example shows how to cancel a pending reload:
Router# reload cancel
%Reload cancelled.
Router#

Related Commands

Command

Description

copy
Saves configuration changes to the startup configuration.
system:running-config
nvram:startup-config
show reload

Displays the reload status on the router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-630

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
remote command

remote command
To execute a Catalyst 6500 series switch command directly on the switch console or a specified module
without having to log into the Catalyst 6500 series switch first, use the remote command command.
remote command {{module num} | standby-rp | switch} command

Syntax Description

module num

Specifies the module to access; see the “Usage Guidelines” section for
valid values.

standby-rp

Specifies the standby route processor.

switch

Specifies the active switch processor.

command

Command to be executed.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The module num keyword and argument designate the module number. Valid values depend on the
chassis that is used. For example, if you have a 13-slot chassis, valid values are from 1 to 13. The module
num keyword and argument are supported on the standby supervisor engine only.
When you execute the remote command switch command, the prompt changes to Switch-sp#.
This command is supported on the supervisor engine only.
This command does not support command completion, but you can use shortened forms of the command
(for example, entering sh for show).

Examples

This example shows how to execute the show calendar command from the standby route processor:
Router# remote command standby-rp show calendar
Switch-sp#
09:52:50 UTC Mon Nov 12 2001
Router#

Related Commands

Command

Description

remote login

Accesses the Catalyst 6500 series switch console or a specific module.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-631

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

remote login

remote login
To access the Catalyst 6500 series switch console or a specific module, use the remote login command.
remote login {{module num} | standby-rp | switch}

Syntax Description

module num

Specifies the module to access; see the “Usage Guidelines” section for
valid values.

standby-rp

Specifies the standby route processor.

switch

Specifies the active switch processor.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

When you enter the attach or remote login command to access another console from your switch, if you
enter global or interface configuration mode commands, the switch might reset.
The module num keyword and argument designate the module number. Valid values depend on the
chassis that is used. For example, if you have a 13-slot chassis, valid values are from 1 to 13. The module
num keyword and argument are supported on the standby supervisor engine only.
When you execute the remote login module num command, the prompt changes depending on the type
of module to which you are connecting.
When you execute the remote login standby-rp command, the prompt changes to Router-sdby#.
When you execute the remote login switch command, the prompt changes to Switch-sp#.
The remote login module num command is identical to the attach command.
There are two ways to end the session:
•

You can enter the exit command as follows:
Switch-sp# exit
[Connection to Switch closed by foreign host]
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-632

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
remote login

•

You can press Ctrl-C three times as follows:
Switch-sp# ^C
Switch-sp# ^C
Switch-sp# ^C
Terminate remote login session? [confirm] y
[Connection to Switch closed by local host]
Router#

Examples

This example shows how to perform a remote login to a specific module:
Router# remote login module 1
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session

Switch-sp#

This example shows how to perform a remote login to the Catalyst 6500 series switch processor:
Router# remote login switch
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session
Switch-sp#

This example shows how to perform a remote login to the standby route processor:
Router# remote login standby-rp
Trying Switch ...
Entering CONSOLE for Switch
Type "^C^C^C" to end this session
Router-sdby#

Related Commands

Command

Description

attach

Connects to a specific module from a remote location.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-633

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

remote-span

remote-span
To configure a VLAN as an RSPAN VLAN, use the remote-span command. To remove the RSPAN
designation, use the no form of this command.
remote-span

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

config-VLAN mode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is not supported in the VLAN database mode.
You can enter the show vlan remote-span command to display the RSPAN VLANs in the Catalyst 6500
series switch.

Examples

This example shows how to configure a VLAN as an RSPAN VLAN:
Router(config-vlan)# remote-span
Router(config-vlan)

This example shows how to remove the RSPAN designation:
Router(config-vlan)# no remote-span
Router(config-vlan)

Related Commands

Connect

Description

show vlan
remote-span

Displays a list of RSPAN VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-634

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
reset

reset
To leave the proposed new VLAN database, remain in VLAN configuration mode, and reset the
proposed new database so that it is identical to the current VLAN database, use the reset command.
reset

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

VLAN configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to cause the proposed new VLAN database to be abandoned and reset to the
current VLAN database:
Router(vlan)# reset
RESET completed.
Router(vlan)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-635

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

retry

retry
To define the amount of time that must elapse before a connection is attempted to a failed server, use
the retry command. To change the connection-reassignment threshold and client threshold to the default
settings, use the no form of this command.
retry retry-value
no retry

Syntax Description

retry-value

Defaults

retry-value is 60.

Command Modes

Real server configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Amount of time, in seconds, that must elapse after the detection of a server
failure before a new connection is attempted to the server; valid values are
from 1 to 3600.

This example shows how to define the retry timer:
Router(config-if)# retry 145
Router(config-if)#

This example shows how to revert to the default value:
Router(config-if)# no retry
Router(config-if)#

Related Commands

Command

Description

faildetect numconns

Specifies the conditions that indicate a server failure.

inservice (real server)

Enables the real server for use by the Cisco IOS SLB feature.

maxconns (real server
configuration
submode)

Limits the number of active connections to the real server.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-636

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
revision

revision
To set the revision number for the MST configuration, use the revision command. To return to the default
settings, use the no form of this command.
revision version
no revision

Syntax Description

version

Defaults

version is 0.

Command Modes

MST configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Caution

Examples

Revision number for the configuration; valid values are from 0 to 65535.

Two Catalyst 6500 series switches that have the same configuration but different revision numbers are
considered to be part of two different regions.

Be careful when using the revision command to set the revision number of the MST configuration
because a mistake can put the switch in a different region.

This example shows how to set the revision number of the MST configuration:
Router(config-mst)# revision 5
Router(config-mst)#

Related Commands

Command

Description

instance

Maps a VLAN or a set of VLANs to an MST instance.

name (MST configuration
submode)

Sets the name of an MST region.

show

Verifies the MST configuration.

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree mst
configuration

Enters MST-configuration submode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-637

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

rmon alarm

rmon alarm
To set an alarm on any MIB object, use the rmon alarm command. To disable the alarm, use the no form
of this command.
rmon alarm number variable interval {delta | absolute} rising-threshold value [event-number]
falling-threshold value [event-number] [owner string]
no rmon alarm number

Syntax Description

number

Alarm number that is identical to the alarmIndex in the alarmTable in
the RMON MIB; valid values are from 1 to 65535.

variable

MIB object to monitor; this value translates into the alarmVariable
that is used in the alarmTable of the RMON MIB.

interval

Time in seconds that the alarm monitors the MIB variable. This value
is identical to the alarmInterval that is used in the alarmTable of the
RMON MIB; valid values are from 1 to 4294967295.

delta

Specifies the change between MIB variables; this value affects the
alarmSampleType in the alarmTable of the RMON MIB.

absolute

Specifies each MIB variable directly; this value affects the
alarmSampleType in the alarmTable of the RMON MIB.

rising-threshold
value

Specifies the value at which the alarm is triggered; valid values are
from –2147483648 to 2147483647.

event-number

(Optional) Event number to trigger when the rising or falling
threshold exceeds its limit. This value is identical to the
alarmRisingEventIndex or the alarmFallingEventIndex in the
alarmTable of the RMON MIB; valid values are from 1 to 65535.

falling-threshold
value

Specifies the value at which the alarm is reset; valid values are from
–2147483648 to 2147483647.

owner string

(Optional) Specifies the owner for the alarm; this value is identical to
the alarmOwner in the alarmTable of the RMON MIB.

Defaults

No alarms are configured.

Command Modes

Global configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-638

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
rmon alarm

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

You must specify the MIB object as a dotted decimal value after the entry sequence (for example,
ifEntry.10.1). You cannot specify the variable name and the instance (for example, ifInOctets.1) or the
entire dotted decimal notation. The argument must be of the form entry.integer.instance.
To disable the RMON alarms, you must use the no form of the command on each configured alarm. For
example, enter the no rmon alarm 1 command, where the 1 identifies which alarm is to be removed.
Refer to RFC 1757 for more information about the RMON alarm group.
In the configuration that is shown in the example, the alarm monitors the MIB variable ifEntry.20.1 once
every 20 seconds until the alarm is disabled and checks the change in the variable’s rise or fall. If the
ifEntry.20.1 value shows a MIB counter increase of 15 or more, such as from 100000 to 100015, the
alarm is triggered. The alarm triggers event number 1, which is configured with the rmon event
command. Possible events include a log entry or an SNMP trap. If the ifEntry.20.1 value changes by 0
(falling-threshold 0), the alarm is reset and can be triggered again.

Examples

This example shows how to configure an RMON alarm:
Router(config)# rmon alarm 10 ifEntry.20.1 20 delta rising-threshold 15 1
falling-threshold 0
owner jjohnson

Related Commands

Command

Description

rmon

Enables RMON on an Ethernet interface.

rmon event

Adds or removes an event in the RMON-event table that is associated with
an RMON-event number.

show rmon

Displays the current RMON agent status on the router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-639

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

rmon event

rmon event
To add or remove an event in the RMON-event table that is associated with an RMON-event number,
use the rmon event command. To disable RMON on the interface, use the no form of this command.
rmon event number [log] [trap community] [description string] [owner string]
no rmon event number

Syntax Description

number

Assigned event number that is identical to the eventIndex in the eventTable
in the RMON MIB; valid values are from 1 to 65535.

log

(Optional) Generates an RMON log entry when the event is triggered and
sets the eventType in the RMON MIB to log or log-and-trap.

trap community

(Optional) Specifies the SNMP community string that is used for this trap.

description string

(Optional) Specifies a description of the event that is identical to the event
description in the eventTable of the RMON MIB.

owner string

(Optional) Specifies the owner of this event that is identical to the
eventOwner in the eventTable of the RMON MIB.

Defaults

No alarms are configured.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Refer to RFC 1757 for more information about the RMON MIB.
Use the trap community keyword and argument to configure the setting of the eventType in the RMON
MIB for this row as either snmp-trap or log-and-trap. This value is identical to the
eventCommunityValue in the eventTable in the RMON MIB.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-640

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
rmon event

Examples

This example shows how to add an event to the RMON-event table:
Router(config)# rmon event 1 log trap eventtrap description “High ifOutErrors” owner
sdurham

This example configuration creates RMON-event number 1, which is defined as High ifOutErrors, and
generates a log entry when the event is triggered by an alarm. The user sdurham owns the row that is
created in the event table by this command. This configuration also generates an SNMP trap when the
event is triggered.

Related Commands

Command

Description

rmon

Enables RMON on an Ethernet interface.

rmon alarm

Sets an alarm on any MIB object.

show rmon

Displays the current RMON agent status on the router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-641

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

route-converge-interval

route-converge-interval
To configure the time interval after which the old FIB entries are purged, use the
route-converge-interval command. To return to the default settings, use the no form of this command.
route-converge-interval seconds

Syntax Description

seconds

Defaults

seconds is 120 seconds (2 minutes).

Command Modes

Main CPU submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Time interval after which the old FIB entries are purged; valid values are from
60 to 3600 seconds.

Usage Guidelines

The time interval for route-converge delay is needed to simulate the route-converge time when routing
protocols restart on switchover.

Examples

This example shows how to set the time interval for the route-converge delay:
Router(config)# redundancy
Router(config-red)# main-cpu
Router(config-red-main)# route-converge-interval 90
Router(config-red-main)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-642

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
route-converge-interval

This example shows how to return to the default time interval for the route-converge delay:
Router(config)# redundancy
Router(config-red)# main-cpu
Router(config-red-main)# no route-converge-interval
Router(config-red-main)#

Related Commands

Command

Description

redundancy

Enters redundancy configuration mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-643

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

router

router
To enable a routing process, use the router command. To terminate a routing process, use the no form
of this command.
router {bgp as-num} | {eigrp as-num} | {isis process-id} | {ospf process-id [vrf vrf-id]}
no router ospf process-id

Syntax Description

bgp as-num

Specifies an autonomous BGP-system number; valid values are from 1 to
65535.

eigrp as-num

Specifies an autonomous EIGRP-system number; valid values are from 1 to
65535.

isis routing-area-tag

Specifies an ISO routing area designation.

ospf process-id

Specifies an internally used identification parameter for the routing process;
valid values are from 1 to 65535.

vrf vrf-id

(Optional) Specifies a VRF instance name.

Defaults

No OSPF routing process is enabled or defined.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you specify a process-id, it is locally assigned and can be any positive integer. A unique value is
assigned for each OSPF routing process.
You can specify multiple OSPF routing processes in each router.

Examples

This example shows how to configure an OSPF routing process and assign a process number of 109:
Router(config)# router ospf 109
Router(config)#

This example shows how to configure an OSPF routing process and assign a process number of 109 for
a specific VRF instance:
Router(config)# router ospf 109 vrf 109
Router(config)#

Related Commands

Command

Description

nsf

Enables and configures Cisco NSF.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-644

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
scheduler allocate

scheduler allocate
To guarantee the CPU time for the process tasks, use the scheduler allocate command. To return to the
default settings, use the no form of this command.
scheduler allocate interrupt-time process-time
no scheduler allocate

Syntax Description

Defaults

interrupt-time

Integer (in microseconds) that limits the maximum number of microseconds
to spend on fast switching within any one network-interrupt context; valid
values are from 400 to 60000 microseconds.

process-time

Integer (in microseconds) that guarantees the minimum number of
microseconds to spend at the process level when network interrupts are
disabled; valid values are from 100 to 4000.

The defaults are as follows:
•

interrupt-time is 4000 microseconds.

•

process-time is 800 microseconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

We recommend that you do not change the default settings.
Entering the scheduler allocate command without arguments is the same as entering the no scheduler
allocate or the default scheduler allocate command.

Examples

This example shows how to make 20 percent of the CPU time available for the process tasks:
Router-config# scheduler allocate 2000 500
Router-config#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-645

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

service counters max age

service counters max age
To set the time interval for retrieving statistics, use the service counters max age command. To return
to the default settings, use the no form of this command.
service counters max age seconds
no service counters max age

Syntax Description

seconds

Defaults

seconds is 5 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Maximum age of the statistics retrieved from the CLI or SNMP; valid values
are from 0 to 60 seconds.

Usage Guidelines
Note

If you decrease the time interval for retrieving statistics from the default setting (5 seconds), traffic
congestion may result in situations where frequent SNMP (SMNP bulk) retrievals occur.
Ifyou configure the seconds value between 6 and 9 seconds, the counter update occurs at the 10-second
default to ensure that the system is not too busy computing statistics. If the statistics collection uses more
than 20 percent of the CPU time, the system automatically increases the time that the statistics process
sleeps between counter updates.
Ifyou configure the seconds value between 0 and 5 seconds, and if the CPU utility is low, the counter
updates occur after the configured delay seconds which ensures that the system load is at 20 percent.
For example, if the statistics calculation time takes 4 seconds, and you have configured the service
maximum age to 5 seconds, the period between statistics collections will be 20 seconds (the collection
period equals the duration multiplied by 5) regardless of what you configured, which ensures that the
statistics collection does not increase the CPU utility.

Examples

This example shows how to set the time interval for retrieving statistics:
Router(config)# service counters max age 10
Router(config)#

This example shows how to return to the default setting:
Router(config)# no service counters max age
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-646

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
service-policy

service-policy
To attach a policy map to an interface, use the service-policy command. To remove a policy map from
an interface, use the no form of this command.
service-policy {input | output} policy-map-name
no service-policy {input | output} policy-map-name

Syntax Description

input policy-map-name

Specifies a previously configured input-policy map.

output policy-map-name

Specifies a previously configured output-policy map.

Defaults

No policy map is attached.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Do not attach a service policy to a port that is a member of an EtherChannel.
Although the CLI allows you to configure PFC-based QoS on the WAN ports on the OC-12 ATM OSMs
and on the WAN ports on the channelized OSMs, PFC-based QoS is not supported on the WAN ports
on these OSMs. OSMs are not supported on Catalyst 6500 series switches that are configured with a
Supervisor Engine 32 PISA.
PFC QoS supports the optional output keyword only on VLAN interfaces. You can attach both an
input-policy map and an output-policy map to a VLAN interface.

Examples

This example shows how to attach a policy map to a Fast Ethernet interface:
Router(config)# interface fastethernet 5/20
Router(config-if)# service-policy input pmap1
Router(config-if)#

Related Commands

Command

Description

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-647

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

service-policy (control-plane)

service-policy (control-plane)
To attach a policy map to a control plane for aggregate control plane services, use the service-policy
command. To remove a service policy from a control plane, use the no form of this command.
service-policy {input | output} policy-map-name
no service-policy {input | output} policy-map-name

Syntax Description

input

Applies the specified service policy to the packets that are entering the
control plane.

output

Applies the specified service policy to the packets that are exiting the control
plane and enables the Catalyst 6500 series switch to silently discard packets.

policy-map-name

Name of a service policy map (created using the policy-map command) to
be attached.

Defaults

No service policy is specified.

Command Modes

Control-plane configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The policy-map-name can be a maximum of 40 alphanumeric characters.
After entering the control-plane command, you should use the service-policy command to configure a
QoS policy. This policy is attached to the control plane interface for aggregate control plane services,
which can control the number or rate of packets that are going to the process level.
Silent mode allows a router that is running Cisco IOS software to operate without sending any system
messages. If a packet that is destined for the router is discarded for any reason, users will not receive an
error message. Some events that will not generate error messages are as follows:

Examples

•

Traffic that is being transmitted to a port in which that router is not listening

•

A connection to a legitimate address and port that is rejected because of a malformed request

This example shows how to configure trusted hosts with source addresses 10.1.1.1 and 10.1.1.2 to
forward Telnet packets to the control plane without constraint, while allowing all remaining Telnet
packets to be policed at the specified rate:
Router(config)# access-list 140 deny tcp host 10.1.1.1 any eq telnet
! Allow 10.1.1.2 trusted host traffic.
Router(config)# access-list 140 deny tcp host 10.1.1.2 any eq telnet
! Rate limit all other Telnet traffic.
Router(config)# access-list 140 permit tcp any any eq telnet

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-648

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
service-policy (control-plane)

! Define class-map “telnet-class.”
Router(config)# class-map telnet-class
Router(config-cmap)# match access-group 140
Router(config-cmap)# exit
Router(config)# policy-map control-plane-policy
Router(config-pmap)# class telnet-class
Router(config-pmap-c)# police 80000 conform transmit exceed drop
Router(config-pmap-c)# exit
Router(config-pmap)# exit
! Define aggregate control plane service for the active Route Processor.
Router(config)# control-plane
Router(config-cp)# service-policy input control-plane-policy
Router(config-cp)# exit

This example shows how to configure trusted networks with source addresses 3.3.3.0 and 4.4.4.0 to
receive Internet Control Message Protocol (ICMP) port-unreachable responses without constraint, while
allowing all remaining ICMP port-unreachables to be dropped:
Router(config)# access-list 141 deny icmp host 3.3.3.0 0.0.0.255 any port-unreachable
! Allow 4.4.4.0 trusted network traffic.
Router(config)# access-list 141 deny icmp host 4.4.4.0 0.0.0.255 any port-unreachable
! Rate limit all other ICMP traffic.
Router(config)# access-list 141 permit icmp any any port-unreachable
Router(config)# class-map icmp-class
Router(config-cmap)# match access-group 141
Router(config-cmap)# exit
Router(config)# policy-map control-plane-out-policy
! Drop all traffic that matches the class "icmp-class."
Router(config-pmap)# class icmp-class
Router(config-pmap-c)# drop
Router(config-pmap-c)# exit
Router(config-pmap)# exit
Router(config)# control-plane
! Define aggregate control plane service for the active route processor.
Router(config-cp)# service-policy output control-plane-policy
Router(config-cp)# exit

Related Commands

Command

Description

control-plane

Enters control-plane configuration mode, which allows users to associate or
modify attributes or parameters (such as a service policy) that are associated
with the control plane of the device.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

show policy-map
control-plane

Displays the configuration either of a class or of all classes for the policy
map of a control plane.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-649

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

session slot

session slot
To open a session with a module (for example, the NAM), use the session slot command.
session slot mod {processor processor-id}

Syntax Description

mod

Slot number.

processor
processor-id

Specifies the processor ID.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To end the session, enter the quit command.
This command allows you to use the module-specific CLI.

Examples

This example shows how to open a session with an MSM (module 4):
Router# session slot 4 processor 2
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-650

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
set cos cos-inner (policy-map configuration)

set cos cos-inner (policy-map configuration)
To set the 802.1Q prioritization bits in the trunk VLAN tag of a QinQ-translated outgoing packet with
the priority value from the inner customer-edge VLAN tag, use the set cos cos-inner command. To
return to the default settings, use the no form of this command.
set cos cos-inner
no set cos cos-inner

Syntax Description

This command has no keywords or arguments.

Defaults

P bits are copied from the outer provider-edge VLAN tag.

Command Modes

Policy-map class configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the Gigabit Ethernet WAN interfaces on Catalyst 6500 series switches
that are configured with an OSM-2+4GE-WAN+ OSM module only.
OSMs are not supported on Catalyst 6500 series switches that are configured with a Supervisor
Engine 32.
The 802.1P prioritization bits are used in the VLAN tag for QoS processing.
When the router copies the double-tagged QinQ packets to the destination interface, by default it uses
the P bits from the outer (provider) VLAN tag. To preserve the P bits that are in the inner (customer)
VLAN tag, use the set cos cos-inner command.
For the set cos cos-inner command to be effective, you must configure the appropriate interface or
subinterface as a trusted interface using the mls qos trust command. Otherwise, the interface or
subinterface defaults to being untrusted, where the Layer 2 interface zeroes out the P bits of the incoming
packets before the set cos cos-inner command can copy them to the outer VLAN tag.
The set cos cos-inner command is supported only for the subinterfaces that are configured with an inner
(customer) VLAN. The set cos cos-inner command is not supported for the subinterfaces that use the
out-range keyword on the bridge-domain (subinterface configuration) command or that are not
configured with any form of the bridge-domain (subinterface configuration) command.
This behavior remains when you configure the set cos cos-inner command on a policy that is applied to
a main interface. The set cos cos-inner command affects the subinterfaces that are configured with a
specific inner VLAN but it does not affect the subinterfaces that are not configured with any VLAN or
that are configured with the out-range keyword.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-651

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

set cos cos-inner (policy-map configuration)

Examples

This example shows how to configure a policy map for voice traffic that uses the P bits from the inner
VLAN tag:
Router(config-pmap-c)# set cos cos-inner
Router(config-pmap-c)#

This example shows how to configure the default policy map class to reset to its default value:
Router(config-pmap-c)# no set cos cos-inner
Router(config-pmap-c)#

This example shows the system message that appears when you attempt to apply a policy to a
subinterface that is configured with the bridge-domain (subinterface configuration) command:
Router(config-if)# bridge-vlan 32 dot1q-tunnel out-range
Router(config-if)# service-policy output cos1
%bridge-vlan 32 does not have any inner-vlan configured. 'set cos cos-inner' is not
supported
Router(config-if)#

Related Commands

Command

Description

bridge-domain
(subinterface
configuration)

Binds a PVC to the specified vlan-id.

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

mode dot1q-in-dot1q
access-gateway

Enables a Gigabit Ethernet WAN interface to act as a gateway for QinQ
VLAN translation.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

service-policy

Attaches a policy map to an interface.

set ip dscp (policy-map Marks a packet by setting the IP DSCP in the ToS byte.
configuration)
set ip precedence
(policy-map
configuration)

Sets the precedence value in the IP header.

show policy-map

Displays information about the policy map.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-652

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
set ip dscp (policy-map configuration)

set ip dscp (policy-map configuration)
To mark a packet by setting the IP DSCP in the ToS byte, use the set ip dscp command. To remove a
previously set IP DSCP, use the no form of this command.
set ip dscp ip-dscp-value
no set ip dscp ip-dscp-value

Syntax Description

ip-dscp-value

Defaults

This command has no default settings.

Command Modes

QoS policy-map configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

IP DSCP value; valid values are from 0 to 63. See the “Usage Guidelines”
section for additional information.

You can enter reserved keywords EF (expedited forwarding), AF11 (assured forwarding class AF11),
and AF12 (assured forwarding class AF12) instead of numeric values for ip-dscp-value.
After the IP DSCP bit is set, other QoS services can operate on the bit settings.
You cannot mark a packet by the IP precedence using the set ip precedence (policy-map
configuration) command and then mark the same packet with an IP DSCP value using the set ip dscp
command.
The network gives priority (or some type of expedited handling) to marked traffic. Typically, you set IP
precedence at the edge of the network (or administrative domain); data is queued based on the
precedence. WFQ can speed up handling for high-precedence traffic at congestion points. WRED
ensures that high-precedence traffic has lower loss rates than other traffic during traffic congestion.
The set ip precedence (policy-map configuration) command is applied when you create a service
policy in QoS policy-map configuration mode. This service policy is not attached to an interface or to
an ATM virtual circuit. See the service-policy command for information on attaching a service policy
to an interface.
When configuring policy-map class actions, note the following:
•

For hardware-switched traffic, PFC QoS does not support the bandwidth, priority, queue-limit, or
random-detect policy-map class commands. You can configure these commands because they can
be used for software-switched traffic.

•

PFC QoS does not support the set mpls or set qos-group policy-map class commands.

•

PFC QoS supports the set ip dscp and set ip precedence policy-map class commands (see the
“Configuring Policy Map Class Marking” section in the Catalyst Supervisor Engine 32 PISA Cisco
IOS Software Configuration Guide—Release 12.2ZY).

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-653

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

set ip dscp (policy-map configuration)

•

You cannot do all three of the following in a policy-map class:
– Mark traffic with the set ip dscp or set ip precedence (policy-map configuration) commands
– Configure the trust state
– Configure policing

In a policy-map class, you can either mark traffic with the set ip dscp or set ip precedence
(policy-map configuration) commands or do one or both of the following:
– Configure the trust state
– Configure policing

Examples

This example shows how to set the IP DSCP ToS byte to 8 in the policy map called policy1:
Router(config)# policy-map policy1
Router(config-pmap)# class class1
Router(config-pmap-c)# set ip dscp 8

All packets that satisfy the match criteria of class1 are marked with the IP DSCP value of 8. How packets
that are marked with the IP DSCP value of 8 are treated is determined by the network configuration.
This example shows that after you configure the settings that are shown for voice packets at the edge of
the network, all intermediate routers are then configured to provide low-latency treatment to the voice
packets:
Router(config)# class-map voice
Router(config-cmap)# match ip dscp ef
Router(config)# policy qos-policy
Router(config-pmap)# class voice
Router(config-pmap-c)# priority 24

Related Commands

Command

Description

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

service-policy

Attaches a policy map to an interface.

show policy-map

Displays information about the policy map.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-654

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
set ip precedence (policy-map configuration)

set ip precedence (policy-map configuration)
To set the precedence value in the IP header, use the set ip precedence command. To leave the
precedence value at the current setting, use the no form of this command.
set ip precedence ip-precedence-value
no set ip precedence

Syntax Description

ip-precedence-value

Defaults

This command is disabled by default.

Command Modes

QoS policy-map configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Precedence-bit value in the IP header; valid values are from 0 to 7. See
Table 2-31 for a list of value definitions.

Table 2-31 lists the value definitions for precedence values in the IP header. They are listed from least
to most important.
Table 2-31 Value Definitions for IP Precedence

Values

Definitions

0

routine

1

priority

2

immediate

3

flash

4

flash-override

5

critical

6

internet

7

network

After the IP-precedence bits are set, other QoS services, such as WFQ and WRED, operate on the bit
settings.
The network priorities (or some type of expedited handling) mark traffic through the application of WFQ
or WRED at points downstream in the network. Typically, you set IP precedence at the edge of the
network (or administrative domain); data is queued based on the precedence. WFQ can speed up
handling for certain precedence traffic at congestion points. WRED can ensure that certain precedence
traffic has lower loss rates than other traffic during traffic congestion.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-655

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

set ip precedence (policy-map configuration)

The set ip precedence command is applied when you create a service policy in QoS policy-map
configuration mode. This service policy is not attached to an interface or to an ATM virtual circuit. See
the service-policy command for information on attaching a service policy to an interface.

Examples

This example shows how to set the IP precedence to 5 for packets that satisfy the match criteria of the
class map called class1:
Router(config)# policy-map policy1
Router(config-pmap)# class class1
Router(config-pmap-c)# set ip precedence 5

All packets that satisfy the match criteria of class1 are marked with the IP precedence value of 5. How
packets that are marked with the IP-precedence value of 5 are treated is determined by the network
configuration.

Related Commands

Command

Description

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

service-policy

Attaches a policy map to an interface.

show policy-map

Displays information about the policy map.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-656

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
set mpls experimental

set mpls experimental
To set the experimental value, use the set mpls experimental command. To return to the default
settings, use the no form of this command.
set mpls experimental {{imposition | topmost} experimental-value}

Syntax Description

imposition

Specifies the experimental-bit value on IP to MPLS or MPLS input in all
newly imposed labels.

topmost

Specifies the experimental-bit value on the topmost label on the input or
output flows.

experimental-value

Experimental-bit value; valid values are from 0 to 7.

Defaults

This command is disabled by default.

Command Modes

QoS policy-map configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to set the experimental-bit value on the topmost label on input or output:
Router(config)# policy-map policy1
Router(config-pmap)# class class1
Router(config-pmap-c)# set mpls experimental topmost 5

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-657

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

set qos-group

set qos-group
To set the trusted state of a Layer 2 WAN interface, use the set qos-group command. To return to the
default settings, use the no form of this command.
set qos-group group-value {cos | prec}

Syntax Description

group-value

QoS group value; valid values are from 0 to 99.

cos

Specifies that the CoS bits in incoming frames are trusted and derives the
internal DSCP value from the CoS bits.

prec

Specifies that the ToS bits in the incoming packets contain an IP-precedence
value and derives the internal DSCP value from the IP-precedence bits.

Defaults

This command is disabled by default.

Command Modes

QoS policy-map configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is entered in Pipe mode on the MPLS input to select the egress queue.
This command is supported on WAN interfaces only.
Use the mls qos trust command to set the trusted state on LAN interfaces.

Examples

This example shows how to set the trusted state of an interface to IP precedence:
Router(config)# policy-map policy1
Router(config-pmap)# class class1
Router(config-pmap-c)# set qos-group 54 prec
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-658

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show

show
To verify the MST configuration, use the show command.
show [current | pending]

Syntax Description

current

(Optional) Displays the current configuration that is used to run MST.

pending

(Optional) Displays the edited configuration that will replace the current
configuration.

Defaults

This command has no default settings.

Command Modes

MST configuration submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The display output from the show pending command is the edited configuration that will replace the
current configuration if you enter the exit command to exit MST configuration mode.
Entering the show command with no arguments displays the pending configurations.

Examples

This example shows how to display the edited configuration:
Router(config-mst)# show pending
Pending MST configuration
Name
[zorglub]
Version
31415
Instance Vlans Mapped
-------- --------------------------------------------------------------------0
4001-4096
2
1010, 1020, 1030, 1040, 1050, 1060, 1070, 1080, 1090, 1100, 1110
1120
3
1-1009, 1011-1019, 1021-1029, 1031-1039, 1041-1049, 1051-1059
1061-1069, 1071-1079, 1081-1089, 1091-1099, 1101-1109, 1111-1119
1121-4000
-----------------------------------------------------------------------------Router(config-mst)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-659

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show

This example shows how to display the current configuration:
Router(config-mst)# show current
Current MST configuration
Name []
Revision 0
Instance Vlans mapped
-------- --------------------------------------------------------------------0 1-4094
-------------------------------------------------------------------------------

Related Commands

Command

Description

instance

Maps a VLAN or a set of VLANs to an MST instance.

name (MST
configuration
submode)

Sets the name of an MST region.

revision

Sets the revision number for the MST configuration.

show spanning-tree
mst

Displays the information about the MST protocol.

spanning-tree mst
configuration

Enters MST-configuration submode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-660

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show adjacency

show adjacency
To display information about the hardware Layer 3-switching adjacency table, use the show adjacency
command.
show adjacency [{interface interface-number} | {null interface-number} | {port-channel number}
| {vlan vlan-id} | detail | internal | summary]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, ge-wan, and atm.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 256.

vlan vlan-id

(Optional) Specifies the VLAN; valid values are from 1 to 4094.

detail

(Optional) Displays the information about the protocol detail and timer.

internal

(Optional) Displays the information about the internal data structure.

summary

(Optional) Displays a summary of CEF-adjacency information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
Hardware Layer 3-switching adjacency statistics are updated every 60 seconds.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-661

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show adjacency

The information that is contained in the show adjacency commands includes the following:

Examples

•

Protocol interface.

•

Type of routing protocol that is configured on the interface.

•

Interface address.

•

Method of adjacency that was learned.

•

MAC address of the adjacent router.

•

Time left before the adjacency rolls out of the adjacency table. After it rolls out, a packet must use
the same next hop to the destination.

This example shows how to display adjacency information:
Router# show adjacency
Protocol Interface
IP
FastEthernet2/3
IP
FastEthernet2/3
Router#

Address
172.20.52.1(3045)
172.20.52.22(11)

This example shows how to display a summary of adjacency information:
Router# show adjacency summary
Adjacency Table has 2 adjacencies
Interface
Adjacency Count
FastEthernet2/3
2
Router#

This example shows how to display protocol detail and timer information:
Router# show adjacency detail
Protocol Interface
IP
FastEthernet2/3

IP

FastEthernet2/3

Address
172.20.52.1(3045)
0 packets, 0 bytes
000000000FF920000380000000000000
00000000000000000000000000000000
00605C865B2800D0BB0F980B0800
ARP
03:58:12
172.20.52.22(11)
0 packets, 0 bytes
000000000FF920000380000000000000
00000000000000000000000000000000
00801C93804000D0BB0F980B0800
ARP
03:58:06

Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-662

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show adjacency

This example shows how to display adjacency information for a specific interface:
Router# show adjacency fastethernet 2/3
Protocol Interface
Address
IP
FastEthernet2/3
172.20.52.1(3045)
IP
FastEthernet2/3
172.20.52.22(11)
Router#

Related Commands

Command

Description

show mls cef
adjacency

Displays information about the MLS-hardware Layer 3-switching
adjacency node.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-663

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show arp

show arp
To display the ARP table, use the show arp command.
show arp

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the ARP table:
Router> show arp
Protocol Address
Internet 172.20.52.11
Internet 172.20.52.1
Internet 172.20.52.22
Router>

Age (min)
4
58
129

Hardware Addr
0090.2156.d800
0060.5c86.5b28
0080.1c93.8040

Type
ARPA
ARPA
ARPA

Interface
Vlan2
Vlan2
Vlan2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-664

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show asic-version

show asic-version
To display the ASIC version for a specific module, use the show asic-version command.
show asic-version slot number

Syntax Description

number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

Module number.

In the show asic-version command output, the ASIC types are as follows:
•

Lyra—Layer 2 forwarding engine

•

Hyperion—Packet rewrite, multicast, and SPAN engine

•

Polaris—Layer 3 CEF engine

•

Pinnacle—4-port Gigabit Ethernet interface

•

R2D2—Network interface (with combinations of 10/100/1000Mbps and 10Gbps), a receive packet
buffer interface, a transmit packet buffer interface as well as an interface to a further upstream ASIC
or FPGA.

•

Titan—Packet rewrite and replication engine

•

Vela—Constellation bus interface

This example shows how to display the ASIC type and version for a specific module:
Router# show asic-version slot 1
Module in slot 1 has 3 type(s) of
ASIC Name
Count
PINNACLE
1
MEDUSA
1
TITAN
1
Router#

ASICs
Version
(2.0)
(2.0)
(0.1)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-665

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show bootflash:

show bootflash:
To display information about the bootflash: file system, use the show bootflash: command.
show bootflash: [all | chips | filesys]

Syntax Description

all

(Optional) Displays all possible flash information.

chips

(Optional) Displays information about the flash chip.

filesys

(Optional) Displays information about the file system.

Defaults

This command has no default settings.

Command Modes

User EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about the file system status:
Router> show bootflash: filesys
-------- F I L E
S Y S T E M
S T A T U S -------Device Number = 0
DEVICE INFO BLOCK: bootflash
Magic Number
= 6887635
File System Vers = 10000
(1.0)
Length
= 1000000
Sector Size
= 40000
Programming Algorithm = 39
Erased State
= FFFFFFFF
File System Offset
= 40000
Length = F40000
MONLIB Offset
= 100
Length = C628
Bad Sector Map Offset = 3FFF8
Length = 8
Squeeze Log Offset
= F80000
Length = 40000
Squeeze Buffer Offset = FC0000
Length = 40000
Num Spare Sectors
= 0
Spares:
STATUS INFO:
Writable
NO File Open for Write
Complete Stats
No Unrecovered Errors
No Squeeze in progress
USAGE INFO:
Bytes Used
= 917CE8 Bytes Available = 628318
Bad Sectors
= 0
Spared Sectors = 0
OK Files
= 2
Bytes = 917BE8
Deleted Files = 0
Bytes = 0
Files w/Errors = 0
Bytes = 0
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-666

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show bootflash:

This example shows how to display image information:
Router> show bootflash:
-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
1
.. image
8C5A393A 237E3C
14 2063804 Aug 23 1999 16:18:45 c6msfc-boot-mz
2
.. image
D86EE0AD 957CE8
9 7470636 Sep 20 1999 13:48:49 rp.halley
Router>

This example shows how to display all bootflash information:
Router> show bootflash: all
-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
1
.. image
8C5A393A 237E3C
14 2063804 Aug 23 1999 16:18:45 c6msfc-bootmz
2
.. image
D86EE0AD 957CE8
9 7470636 Sep 20 1999 13:48:49 rp.halley
6456088 bytes available (9534696 bytes used)
-------- F I L E
S Y S T E M
S T A T U S -------Device Number = 0
DEVICE INFO BLOCK: bootflash
Magic Number
= 6887635
File System Vers = 10000
(1.0)
Length
= 1000000
Sector Size
= 40000
Programming Algorithm = 39
Erased State
= FFFFFFFF
File System Offset
= 40000
Length = F40000
MONLIB Offset
= 100
Length = C628
Bad Sector Map Offset = 3FFF8
Length = 8
Squeeze Log Offset
= F80000
Length = 40000
Squeeze Buffer Offset = FC0000
Length = 40000
Num Spare Sectors
= 0
Spares:
STATUS INFO:
Writable
NO File Open for Write
Complete Stats
No Unrecovered Errors
No Squeeze in progress
USAGE INFO:
Bytes Used
= 917CE8 Bytes Available = 628318
Bad Sectors
= 0
Spared Sectors = 0
OK Files
= 2
Bytes = 917BE8
Deleted Files = 0
Bytes = 0
Files w/Errors = 0
Bytes = 0
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-667

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show bootvar

show bootvar
To display information about the BOOT environment variable, use the show bootvar command.
show bootvar

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

User EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show bootvar command output depends on how you configure the boot statement as follows:
•

If you enter the boot system flash bootflash:sup720_image command in the boot configuration,
then the show bootvar command output displays the bootflash information.

•

If you enter the boot system flash sup-bootflash:sup720_image command in the boot
configuration, then the show bootvar command output displays the sup-bootflash information. This
action is the correct way of configuring the boot statement.

The show bootvar command is available from the switch processor CLI and the route processor CLI.
From the switch processor CLI, the display is always bootflash. With either the bootflash or the
sup-bootflash boot statement, the switch boots correctly. You should use sup-bootflash in the boot
configuration statement because the image is stored in the switch processor bootflash; the route
processor sees the image as sup-bootflash.
The number displayed after the image name (an example is c6sup12-js-mz.121-13.E,12) indicates the
number of times that the Catalyst 6500 series switch tries to reboot the file before giving up.

Examples

This example shows how to display information about the BOOT environment variable:
Router# show bootvar
BOOT variable = sup-bootflash:c6sup12-js-mz.121-13.E,12
CONFIG_FILE variable =
BOOTLDR variable = bootflash:c6msfc2-boot-mz.121-13.E.bin
Configuration register is 0x2102
Standby is up
Standby has 112640K/18432K bytes of memory.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-668

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show bootvar

Standby
Standby
Standby
Standby
Router#

Related Commands

BOOT variable = bootflash:c6sup12-js-mz.121-13.E,12
CONFIG_FILE variable =
BOOTLDR variable = bootflash:c6msfc2-boot-mz.121-13.E.bin
Configuration register is 0x2102

Command

Description

auto-sync

Enables automatic synchronization of the configuration files in NVRAM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-669

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show bootvar

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-670

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show cable-diagnostics tdr

show cable-diagnostics tdr
To display the test results for the TDR cable diagnostics, use the show cable-diagnostics tdr command.
show cable-diagnostics tdr {interface {interface interface-number}}

Syntax Description

interface interface Specifies the interface type; valid values are fastethernet and
gigabitethernet.
interface-number

Module and port number.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show cable-diagnostics tdr command is supported on specific modules. See the Release Notes for
Cisco IOS Release 12.2 ZY Supervisor Engine 32 PISA for the list of the modules that support TDR.
In the event of an open or shorted cable, the accuracy of length of where the cable is open or shorted is
plus or minus 2 meters.
The pair length can be displayed in meters (m), centimeters (cm), or kilometers (km).
If the TDR test has not been run on the port, the following message is displayed:
TDR test was never run on Gi2/12

Examples

This example shows how to display the information about the TDR test:
Router> show cable-diagnostics tdr interface gigabitethernet8/1
TDR test last run on: February 25 11:18:31
Interface Speed Pair Cable length
Distance to fault
Channel
--------- ----- ---- ------------------- ------------------- ------Gi8/1
1000 1-2 1
+/- 6 m
N/A
Pair B
3-4 1
+/- 6 m
N/A
Pair A
5-6 1
+/- 6 m
N/A
Pair C
7-8 1
+/- 6 m
N/A
Pair D
Router>

Pair status
-----------Terminated
Terminated
Terminated
Terminated

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-671

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show cable-diagnostics tdr

Table 2-32 describes the fields in the show cable-diagnostics tdr command output.
Table 2-32 show cable-diagnostics tdr Command Output Fields

Related Commands

Field

Description

Interface

Interface tested.

Speed

Current line speed.

Pair

Local pair name.

Cable Length

Cable length and accuracy. The accuracy unit is displayed in meters (m),
centimeters (cm), or kilometers (km).

Channel

Pair designation.

Pair status

Pair status displayed is one of the following:
•

Terminated—The link is up.

•

Shorted—A short is detected on the cable.

•

Open—An opening is detected on the cable.

•

Not Completed—The test on the port failed.

•

Not Supported—The test on the port is not supported.

•

Broken—The pair is bad—either open or shorted.

•

ImpedanceMis—The impedance is mismatched.

•

InProgress—The diagnostic test is in progress.

Command

Description

clear cable-diagnostics tdr

Clears a specific interface or clears all interfaces that support TDR.

test cable-diagnostics

Tests the condition of 10-Gigabit Ethernet links or copper cables on
48-port 10/100/1000 BASE-T modules.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-672

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show catalyst6000

show catalyst6000
To display the information about the Catalyst 6500 series switch, use the show catalyst6000 command.
show catalyst6000 {all | chassis-mac-address | switching-clock | traffic-meter}

Syntax Description

all

Displays the MAC-address ranges and the current and peak traffic-meter
reading.

chassis-mac-address

Displays the MAC-address range.

switching-clock

Displays the failure recovery mode of the switching clock.

traffic-meter

Displays the percentage of the backplane (shared bus) utilization.

Defaults

all

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the switching-clock keywords, the Catalyst 6500 series switch displays whether switching
of the redundant clock sources on the backplane is allowed if the active clock source fails.
The Catalyst 6500 series switch has either 64 or 1024 MAC addresses that are available to support the
software features. You can enter the show catalyst6000 chassis-mac-address command to display the
MAC-address range on your chassis.

Examples

This example shows how to display the MAC-address ranges and the current and peak traffic-meter
readings:
Router> show catalyst6000 all
chassis MAC addresses: 64 addresses from 0001.6441.60c0 to 0001.6441.60ff
traffic meter =
0% Never cleared
peak =
0% reached at 08:14:38 UTC Wed Mar 19 2003
switching-clock: clock switchover and system reset is allowed
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-673

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show catalyst6000

This example shows how to display the MAC-address ranges:
Router# show catalyst6000 chassis-mac-address
chassis MAC addresses: 1024 addresses from 00d0.004c.1800 to 00d0.004c.1c00
Router#

This example shows how to display the current and peak traffic-meter readings:
Router> show catalyst6000 traffic-meter
traffic meter = 0%
peak = 0% at 09:57:58 UTC Mon Nov 6 2000
Router#

This example shows how to display the failure recovery mode of the switching clock:
Router> show catalyst6000 switching-clock
switching-clock: clock switchover and system reset is allowed
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-674

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show cdp neighbors

show cdp neighbors
To display detailed information about the neighboring devices that are discovered through CDP, use the
show cdp neighbors command.
show cdp neighbors [type number] [detail]

Syntax Description

type

(Optional) Interface type that is connected to the neighbors about which you
want information; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, port-channel, and vlan.

number

(Optional) Interface number that is connected to the neighbors about which
you want information.

detail

(Optional) Displays detailed information about a neighbor (or neighbors)
including the network address, the enabled protocols, the hold time, and the
software version.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The port-channel values are from 0 to 282; values from 257 to 282 are supported on the CSM and the
FWSM only.

Examples

This example shows how to display the information about the CDP neighbors:
Router# show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID
Local Intrfce
Holdtme
Capability Platform Port ID
lab-7206
Eth 0
157
R
7206VXR
Fas 0/0/0
lab-as5300-1
Eth 0
163
R
AS5300
Fas 0
lab-as5300-2
Eth 0
159
R
AS5300
Eth 0
lab-as5300-3
Eth 0
122
R
AS5300
Eth 0
lab-as5300-4
Eth 0
132
R
AS5300
Fas 0/0
lab-3621
Eth 0
140
R S
3631-telcoFas 0/0
008024 2758E0
Eth 0
132
T
CAT3000
1/2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-675

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show cdp neighbors

Table 2-33 describes the fields that are shown in the example.
Table 2-33 show cdp neighbors Field Descriptions

Field

Definition

Device ID

Configured ID (name), MAC address, or serial number of the neighbor
device.

Local Intrfce

(Local Interface) The protocol that is used by the connectivity media.

Holdtme

(Holdtime) Remaining amount of time, in seconds, that the current
device holds the CDP advertisement from a transmitting router before
discarding it.

Capability

Capability code that is discovered on the device. This device type is
listed in the CDP Neighbors table. Possible values are as follows:
R—Router
T—Transparent bridge
B—Source-routing bridge
S—Switch
H—Host
I—IGMP device
r—Repeater
P—Phone

Platform

Product number of the device.

Port ID

Protocol and port number of the device.

This example shows how to display detailed information about your CDP neighbors:
Router# show cdp neighbors detail
------------------------Device ID: lab-7206
Entry address(es):
IP address: 172.19.169.83
Platform: cisco 7206VXR, Capabilities: Router
Interface: Ethernet0, Port ID (outgoing port): FastEthernet0/0/0
Holdtime : 123 sec
Version :
Cisco Internetwork Operating System Software
IOS (tm) 5800 Software (C5800-P4-M), Version 12.1(2)
Copyright (c) 1986-2002 by Cisco Systems, Inc.
advertisement version: 2
Duplex: half
------------------------Device ID: lab-as5300-1
Entry address(es):
IP address: 172.19.169.87
.
.
.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-676

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show cdp neighbors

Table 2-34 describes the fields that are shown in the example.
Table 2-34 show cdp neighbors detail Field Descriptions

Related Commands

Field

Definition

Device ID

Name of the neighbor device and either the MAC
address or the serial number of this device.

Entry address(es)

List of network addresses of neighbor devices.

[network protocol] address

Network address of the neighbor device. The address
can be in IP, IPX, AppleTalk, DECnet, or CLNS
protocol conventions.

Platform

Product name and number of the neighbor device.

Capabilities

Device type of the neighbor. This device can be a
router, a bridge, a transparent bridge, a source-routing
bridge, a switch, a host, an IGMP device, or a
repeater.

Interface

Protocol and port number of the port on the current
device.

Holdtime

Remaining amount of time, in seconds, that the
current device holds the CDP advertisement from a
transmitting router before discarding it.

Version:

Software version running on the neighbor device.

advertisement version:

Version of CDP that is being used for CDP
advertisements.

Duplex:

Duplex state of connection between the current device
and the neighbor device.

Command

Description

show cdp

Displays global CDP information.

show cdp entry

Displays information about a specific neighboring device discovered using
CDP.

show cdp interface

Displays information about the interfaces on which CDP is enabled.

show cdp traffic

Displays information about traffic between devices gathered using CDP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-677

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show cef interface policy-statistics

show cef interface policy-statistics
To display the per-interface traffic statistics, use the show cef interface policy-statistics command.
show cef interface policy-statistics

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

User EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the per-interface traffic statistics:
Router# show cef interface policy-statistics
POS7/0 is up (if_number 7)
Bucket PacketsBytes
1
0
0
2
0
0
3
0
0
4
0
0
5
100 10000
6
0
0
7
0
0
8
0
0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-678

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show class-map

show class-map
To display class-map information, use the show class-map command.
show class-map [class-name]

Syntax Description

class-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Name of the class map.

This example shows how to display class-map information for all class maps:
Router# show class-map
Class Map match-any class-default (id 0)
Match any
Class Map match-any class-simple (id 2)
Match any
Class Map match-all ipp5 (id 1)
Match ip precedence 5
Class Map match-all agg-2 (id 3)
Router#

This example shows how to display class-map information for a specific class map:
Router# show class-map ipp5
Class Map match-all ipp5 (id 1)
Match ip precedence 5
Router#

Related Commands

Command

Description

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

show policy-map

Displays information about the policy map.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-679

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show counters interface

show counters interface
To display the information about the interface counter, use the show counters interface command.
show counters interface {type mod/port} [delta]

Syntax Description

type

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, port-channel, pos, atm, null, tunnel,
and ge-wan.

mod/port

Module and port number.

delta

(Optional) Displays the interface counters values since the last clear
counters command.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show counters interface command is not supported on SVIs.
The show counters interface delta command displays a detailed list of the last-saved counter values.

Examples

This example shows how to display the information about the interface counter:
Router# show counters interface fastethernet 5/2
64 bit counters:
0.
rxHCTotalPkts = 1
1.
txHCTotalPkts = 1
2.
rxHCUnicastPkts = 0
3.
txHCUnicastPkts = 0
4.
rxHCMulticastPkts = 0
5.
txHCMulticastPkts = 0
6.
rxHCBroadcastPkts = 1
7.
txHCBroadcastPkts = 1
8.
rxHCOctets = 78
9.
txHCOctets = 78
10.
rxTxHCPkts64Octets = 0
11.
rxTxHCPkts65to127Octets = 2
12.
rxTxHCPkts128to255Octets = 0
13.
rxTxHCPkts256to511Octets = 0
14.
rxTxHCpkts512to1023Octets = 0
15.
rxTxHCpkts1024to1518Octets = 0
16.
txHCTrunkFrames = 0
17.
rxHCTrunkFrames = 0
18.
rxHCDropEvents = 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-680

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show counters interface

32 bit counters:
0.
rxCRCAlignErrors
1.
rxUndersizedPkts
2.
rxOversizedPkts
3.
rxFragmentPkts
4.
rxJabbers
5.
txCollisions
6.
ifInErrors
7.
ifOutErrors
8.
ifInDiscards
9.
ifInUnknownProtos
10.
ifOutDiscards
11.
txDelayExceededDiscards
12.
txCRC
13.
linkChange
14.
wrongEncapFrames
All Port Counters
1.
InPackets
2.
InOctets
3.
InUcastPkts
4.
InMcastPkts
5.
InBcastPkts
6.
OutPackets
7.
OutOctets
8.
OutUcastPkts
9.
OutMcastPkts
10.
OutBcastPkts
11.
AlignErr
12.
FCSErr
13.
XmitErr
14.
RcvErr
15.
UnderSize
16.
SingleCol
17.
MultiCol
18.
LateCol
19.
ExcessiveCol
20.
CarrierSense
21.
Runts
22.
Giants
23.
InDiscards
24.
OutDiscards
25.
InErrors
26.
OutErrors
27.
TrunkFramesTx
28.
TrunkFramesRx
29.
WrongEncap
30.
Broadcast_suppression_discards
31.
Multicast_suppression_discards
32.
Unicast_suppression_discards
33.
rxTxHCPkts64Octets
34.
rxTxHCPkts65to127Octets
35.
rxTxHCPkts128to255Octets
36.
rxTxHCPkts256to511Octets
37.
rxTxHCpkts512to1023Octets
38.
rxTxHCpkts1024to1518Octets
39.
DropEvents
40.
CRCAlignErrors
41.
UndersizedPkts
42.
OversizedPkts
43.
FragmentPkts
44.
Jabbers
45.
Collisions
46.
DelayExceededDiscards

=
=
=
=
=
=
=
=
=
=
=
=
=
=
=

0
0
0
0
0
0
0
0
0
0
0
0
0
1
0

=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=

1
78
0
0
1
1
78
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-681

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show counters interface

47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.

bpduOutlost
qos0Outlost
qos1Outlost
qos2Outlost
qos3Outlost
bpduCbicOutlost
qos0CbicOutlost
qos1CbicOutlost
qos2CbicOutlost
qos3CbicOutlost
bpduInlost
qos0Inlost
qos1Inlost
qos2Inlost
qos3Inlost
qos4Inlost
qos5Inlost
qos6Inlost
qos7Inlost
pqueInlost
Overruns
maxIndex

=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=
=

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

Router#

This example shows how to display the values for the interface counters since the last clear counters
command:
Router# show counters interface gigabitethernet5/2 delta
Time since last clear
--------------------1d08h
64 bit counters:
0. rxHCTotalPkts = 508473
1. txHCTotalPkts = 2366
2. rxHCUnicastPkts = 411611
3. txHCUnicastPkts = 193
4. rxHCMulticastPkts = 81868
5. txHCMulticastPkts = 2155
6. rxHCBroadcastPkts = 14994
7. txHCBroadcastPkts = 18
8. rxHCOctets = 36961992
.
.
.
Router#

Related Commands

Command

Description

clear counters

Clears the interface counters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-682

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show diagnostic

show diagnostic
To view the test results of the online diagnostics and list the supported test suites, use the show
diagnostic command.
show diagnostic bootup level
show diagnostic content [module num]
show diagnostic events [module num] [event-type event-type]
show diagnostic {ondemand settings}
show diagnostic {result [module num] [detail]}
show diagnostic schedule [module num]

Syntax Description

bootup level

Displays the coverage level for the configured boot-up diagnostics.

content

Displays test information including test ID, test attributes, and
supported coverage test levels for each test and for all modules.

module num

(Optional) Specifies the module number.

events

Displays the event log for the diagnostic events.

event-type event-type

(Optional) Specifies the event type; valid values are error, info, and
warning.

ondemand settings

Displays the settings for the ondemand diagnostics.

result

Displays the test results.

detail

(Optional) Displays the test statistics of each test.

schedule

Displays the current scheduled diagnostic tasks.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enter a module num, information for all modules is displayed.
In the command output, the possible testing results are as follows:
•

Passed (.)

•

Failed (F)

•

Unknown (U)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-683

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show diagnostic

Examples

This example shows how to display the test suite and the monitoring interval and test attributes:
Router# show diagnostic content module 1
Diagnostic Tests List for Module 1:
Module 1:
Diagnostics test suite attributes:
M/C/* - Minimal level test / Complete level test / Not applicable
B/* - Bypass bootup test / Not applicable
P/* - Per port test / Not applicable
D/N - Disruptive test / Non-disruptive test
S/* - Only applicable to standby unit / Not applicable
X/* - Not a health monitoring test / Not applicable
F/* - Fixed monitoring interval test / Not applicable
E/* - Always enabled monitoring test / Not applicable
A/I - Monitoring is active / Monitoring is inactive
Testing Interval
ID Test Name
Attributes (day hh:mm:ss.ms)
=== ================================== ========== =================
1) TestDummy1 ----------------------> M**D****A 000 00:01:00.000
2) TestDummy2 ----------------------> M**D**FEA 000 00:02:30.000
3) TestGBICIntegrity ---------------> *BPD****I not configured
4) TestActiveToStandbyLoopback -----> M*PDS***I not configured
5) TestLoopback --------------------> M*PD****I not configured
6) TestNewLearn --------------------> M**N****I not configured
7) TestIndexLearn ------------------> M**N****I not configured
8) TestConditionalLearn ------------> M**N****I not configured
9) TestBadBpdu ---------------------> M**D****I not configured
10) TestCapture ---------------------> M**D****I not configured
11) TestProtocolMatch ---------------> M**D****I not configured
12) TestChannel ---------------------> M**D****I not configured
13) TestDontShortcut ----------------> M**Nrefer*I not configured
14) TestL3Capture2 ------------------> M**N****I not configured
15) TestL3VlanMet -------------------> M**N****I not configured
16) TestIngressSpan -----------------> M**N****I not configured
17) TestEgressSpan ------------------> M**N****I not configured
18) TestAclPermit -------------------> M**N****I not configured
19) TestAclDeny ---------------------> M**D****I not configured
20) TestNetflowInlineRewrite --------> C*PD****I not configured
Router#

This example shows how to display the configured boot-up diagnostic level:
Router# show diagnostic bootup level
Current Bootup Diagnostic Level = Complete
Router#

This example shows how to display the event log for the diagnostics:
Router# show diagnostic events
Diagnostic events (storage for 500 events, 10 events recorded)
Event Type (ET):I - Info, W - Warning, E - Error
Time Stamp
-----------------08/26 15:51:04.335
08/26 15:51:04.335
08/26 15:51:15.511
08/26 15:51:15.511
08/26 16:15:02.247
08/26 16:15:02.247
08/26 16:15:12.683
08/26 16:15:12.683

ET
-I
I
I
I
I
I
I
I

[Card] Event Message
-------------------------------------------------------[1] TestIndexLearn Passed
[1] Diagnostics Passed
[8] TestLoopback Passed
[8] Diagnostics Passed
[1] TestDontLearn Passed
[1] Diagnostics Passed
[8] TestNetflowInlineRewrite Passed
[8] Diagnostics Passed

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-684

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show diagnostic

08/26 16:15:42.207 I
08/26 16:15:42.207 I
Router#

[2] TestActiveToStandbyLoopback Passed
[2] Diagnostics Passed

This example shows how to display the settings for the ondemand diagnostics:
Router# show diagnostic ondemand settings
Ondemand Run Iteration
= 2
Ondemand Action-on-Error = CONTINUE
Router#

This example shows how to display the current scheduled diagnostic tasks for the specified slot:
Router# show diagnostic schedule module 1
Current Time = 07:55:30 UTC Fri August 2 2002
Diagnostic for Module 1:
Schedule #1:
To be run on January 3 2003 23:32
Test ID(s) to be executed:1.
Schedule #2:
To be run daily 14:45
Test ID(s) to be executed:2.
Schedule #3:
To be run weekly Monday 3:33
Test ID(s) to be executed:all.
Router#

This example shows how to display the testing results for the specified slot:
Router# show diagnostic result module 3
Current bootup diagnostic level:complete
Module 3:
Overall Diagnostic Result for Module 8 :PASS
Diagnostic level at card bootup:complete
Test results:(. = Pass, F = Fail, U = Untested)

1) TestLoopback :
Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
---------------------------------------------------------------------------. . . . . . . . . . . . . . . . . . . . . . . .
Port 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
---------------------------------------------------------------------------. . . . . . . . . . . . . . . . . . . . . . . .
2) TestNewLearn -------------------->
3) TestIndexLearn ------------------>
4) TestDontLearn ------------------->
5) TestConditionalLearn ------------>
6) TestDontLearn -------------------> .
7) TestConditionalLearn ------------>
8) TestBadBpdu --------------------->
9) TestTrap ------------------------>
10) TestMatch ----------------------->
11) TestCapture --------------------->

.
.
.
.
.
.
.
.
.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-685

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show diagnostic

12)
13)
14)
15)
16)
17)
18)
19)
20)
21)
22)

TestProtocolMatch --------------->
TestChannel --------------------->
TestIPFibShortcut --------------->
TestDontShortcut ---------------->
TestL3Capture2 ------------------>
TestL3VlanMet ------------------->
TestIngressSpan ----------------->
TestEgressSpan ------------------>
TestAclPermit ------------------->
TestAclDeny --------------------->
TestNetflowInlineRewrite:

.
.
.
.
.
.
.
.
.
.

Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
---------------------------------------------------------------------------. . . . . . . . . . . . . . . . . . . . . . . .
Port 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
---------------------------------------------------------------------------. . . . . . . . . . . . . . . . . . . . . . . .
Router#

This example shows how to display the detailed testing results for the specified slot:
Router# show diagnostic result module 1 detail
Current bootup diagnostic level:complete
Module 1:
Overall Diagnostic Result for Module 1 :PASS
Diagnostic level at card bootup:complete
Test results:(. = Pass, F = Fail, U = Untested)
___________________________________________________________________________
1) TestDummy -----------------------> .
Error code ------------------> 0 (DIAG_SUCCESS)
Total run count -------------> 90
Last test execution time ----> Dec 10 2002 12:34:30
First test failure time -----> Dec 10 2002 11:57:39
Last test failure time ------> Dec 10 2002 12:34:10
Last test pass time ---------> Dec 10 2002 11:34:30
Total failure count ---------> 65
Consecutive failure count ---> 0
___________________________________________________________________________
2) TestLoopback:
Port 1 2
---------. .

Error code ------------------>
Total run count ------------->
Last test execution time ---->
First test failure time ----->
Last test failure time ------>
Last test pass time --------->
Total failure count --------->
Consecutive failure count --->

0 (DIAG_SUCCESS)
1
Dec 10 2002 12:37:18
n/a
n/a
Dec 10 2002 12:37:18
0
0

Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-686

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show diagnostic

This example shows how to display the event logs for the diagnostics:
Router# show diagnostic events
Diagnostic events (storage for 500 events, 10 events recorded)
EventType:I - Info, W - Warning, E - Error
TimeStamp
08/26 15:51:04.335
08/26 15:51:04.335
08/26 15:51:15.511
08/26 15:51:15.511
08/26 16:15:02.247
08/26 16:15:02.247
08/26 16:15:12.683
08/26 16:15:12.683
08/26 16:15:42.207
08/26 16:15:42.207
Router#

Related Commands

Type
I
I
I
I
I
I
I
I
I
I

Command

[Card] EventMessage
[1] TestIndexLearn Passed
[1] Diagnostics Passed
[8] TestLoopback Passed
[8] Diagnostics Passed
[1] TestDontLearn Passed
[1] Diagnostics Passed
[8] TestNetflowInlineRewrite Passed
[8] Diagnostics Passed
[2] TestActiveToStandbyLoopback Passed
[2] Diagnostics Passed

Description

diagnostic bootup level Sets the bootup diagnostic level.
diagnostic cns

Configures the CNS diagnostics.

diagnostic event-log
size

Modifies the diagnostic event-log size dynamically.

diagnostic monitor

Configures the health-monitoring diagnostic testing.

diagnostic ondemand

Configures the ondemand diagnostics.

diagnostic schedule
test

Sets the scheduling of test-based diagnostic testing for a specific module or
schedules a supervisor engine switchover.

diagnostic start

Runs the specified diagnostic test.

diagnostic stop

Stops the testing process.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-687

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show diagnostic cns

show diagnostic cns
To display the information about the CNS subject, use the show diagnostic cns command.
show diagnostic cns {publish | subscribe}

Syntax Description

publish

Displays the subject with which the diagnostic results is published.

subscribe

Displays the subscribed subjects.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The CNS subsystem communicates with remote network applications through the CNS-event agent and
follows the publish and subscribe model. An application sets itself up to receive events by subscribing
to the approprate event subject name.

Examples

This example shows how to display the subject with which the diagnostic results is published:
Router# show diagnostic cns publish
Subject: cisco.cns.device.diag_results
Router#

This example shows how to display the subscribed subject:
Router# show diagnostic cns subscribe
Subject: cisco.cns.device.diag_get_results
Router#

Related Commands

Command

Description

diagnostic cns

Configures the CNS diagnostics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-688

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show diagnostic sanity

show diagnostic sanity
To display sanity check results, use the show diagnostic sanity command.
show diagnostic sanity

Syntax Description

This command has no arguments or keywords.

Defaults

If you enter this command without any arguments, it displays information for all the Gigabit Ethernet
WAN interfaces in the Catalyst 6500 series switch.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The sanity check runs a set of predetermined checks on the configuration with a possible combination
of certain system states to compile a list of warning conditions. The checks are designed to look for
anything that seems out of place and are intended to serve as an aid to maintaining the system sanity.
The following is a list of the checks that are run and the action taken when the condition is found:
•

Checks whether the default gateways are reachable. If so, the system stops pinging.

•

If a port autonegotiates to half duplex, the system flags it.

Trunking Checks
•

If a trunk port has the mode set to on, the system flags it.

•

If a port is trunking and mode is auto, the system flags it.

•

If a trunk port is not trunking and the mode is desirable, the system flags it.

•

If a trunk port negotiates to half duplex, the system flags it.

Channeling Checks
•

If a port has channeling mode set to on, the system flags it.

•

If a port is not channeling and the mode is set to desirable, the system flags it.

•

If a VLAN has a spanning-tree root of 32K (root is not set), the system flags it.

Spanning-tree VLAN Checks
•

If a VLAN has a max age on the spanning-tree root that is different than the default, the system flags
it.

•

If a VLAN has a fwd delay on the spanning-tree root that is different than the default, the system
flags it.

•

If a VLAN has a fwd delay on the bridge that is different than the default, the system flags it.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-689

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show diagnostic sanity

•

If a VLAN has a fwd delay on the bridge that is different than the default, the system flags it.

•

If a VLAN has a hello time on the bridge that is different than the default, the system flags it.

Spanning-tree Port Checks
•

If a port has a port cost that is different than the default, the system flags it.

•

If a port has a port priority that is different than the default, the system flags it.

UDLD Checks
•

If a port has UDLD disabled, the system flags it.

•

If a port had UDLD shut down, the system flags it.

•

If a port had a UDLD undetermined state, the system flags it.

Assorted Port Checks
•

If a port had receive flow control disabled, the system flags it.

•

If a trunk port had PortFast enabled, the system flags it.

•

The system flags it if an inline power port has any of the following states:
– denied
– faulty
– other
– off

•

If a port has a native VLAN mismatch, the system flags it.

•

If a port has a duplex mismatch, the system flags it.

Bootstring and Config Register Checks
•

The config register on the primary supervisor engine (and on the secondary supervisor engine if
present) must be one of the following values: 0x2 , 0x102, or 0x2102.

•

The system verifies the bootstring on the primary supervisor engine (and on the secondary
supervisor engine if present). The system displays a message if the bootstring is empty.

•

The system verifies that every file is specified in the bootstring. The system displays a message if
the file is absent or shows up with a wrong checksum.
If only device: is specified as a filename, then the system verifies that the first file is on the device.

Assorted Checks
•

The system displays a message if IGMP snooping is disabled.

•

The system displays a message if any of the values of the snmp community access strings
{RO,RW,RW-ALL} is the same as the default.

•

The system displays a message if any of the modules are in states other than “Ok.”

•

The system displays a message that lists all the tests that failed (displayed as an “F”) in the show
test all command.

•

The system displays a message if *fast is not configured on the switch anywhere.

•

The system displays a message if there is enough room for the crashinfo file on the bootflash:.

•

The system displays a message if multicast routing is enabled globally but is not applied to all
interfaces.

•

The system displays a message if IGMP snooping is disabled and RGMP is enabled.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-690

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show diagnostic sanity

Examples

This example displays samples of the messages that could be displayed with the show diagnostic sanity
command:
Router# show diagnostic sanity
Pinging default gateway 10.6.141.1 ....
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.6.141.1, timeout is 2 seconds:
..!!.
Success rate is 0 percent (0/5)
IGMP snooping disabled please enable it for optimum config.
IGMP snooping disabled but RGMP enabled on the following interfaces,
please enable IGMP for proper config :
Vlan1, Vlan2, GigabitEthernet1/1
Multicast routing is enabled globally but not enabled on the following
interfaces:
GigabitEthernet1/1, GigabitEthernet1/2
A programming algorithm mismatch was found on the device bootflash:
Formatting the device is recommended.
The bootflash: does not have enough free space to accomodate the crashinfo file.
Please check your confreg value : 0x0.
Please check your confreg value on standby: 0x0.
The boot string is empty. Please enter a valid boot string .
Could not verify boot image "disk0:" specified in the boot string on the
slave.
Invalid boot image "bootflash:asdasd" specified in the boot string on the
slave.
Please check your boot string on the slave.
UDLD has been disabled globally - port-level UDLD sanity checks are
being bypassed.
OR
[
The following ports have UDLD disabled. Please enable UDLD for optimum
config:
Fa9/45
The following ports have an unknown UDLD link state. Please enable UDLD
on both sides of the link:
Fa9/45
]
The following ports have portfast enabled:
Fa9/35, Fa9/45
The following ports have trunk mode set to on:
Fa4/1, Fa4/13
The following trunks have mode set to auto:
Fa4/2, Fa4/3
The following ports with mode set to desirable are not trunking:
Fa4/3, Fa4/4

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-691

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show diagnostic sanity

The following trunk ports have negotiated to half-duplex:
Fa4/3, Fa4/4
The following ports are configured for channel mode on:
Fa4/1, Fa4/2, Fa4/3, Fa4/4
The following ports, not channeling are configured for channel mode
desirable:
Fa4/14
The following vlan(s) have a spanning tree root of 32768:
1
The following vlan(s) have max age on the spanning tree root different from
the default:
1-2
The following vlan(s) have forward delay on the spanning tree root different
from the default:
1-2
The following vlan(s) have hello time on the spanning tree root different
from the default:
1-2
The following vlan(s) have max age on the bridge different from the
default:
1-2
The following vlan(s) have fwd delay on the bridge different from the
default:
1-2
The following vlan(s) have hello time on the bridge different from the
default:
1-2
The following vlan(s) have a different port priority than the default
on the port FastEthernet4/1
1-2
The following ports have recieve flow control disabled:
Fa9/35, Fa9/45
The following inline power ports have power-deny/faulty status:
Gi7/1, Gi7/2
The following ports have negotiated to half-duplex:
Fa9/45
The following vlans have a duplex mismatch:
Fas 9/45
The following interafaces have a native vlan mismatch:
interface (native vlan - neighbor vlan)
Fas 9/45 (1 - 64)
The value for Community-Access on read-only operations for SNMP is the same
as default. Please verify that this is the best value from a security point
of view.
The value for Community-Access on write-only operations for SNMP is the same
as default. Please verify that this is the best value from a security point
of view.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-692

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show diagnostic sanity

The value for Community-Access on read-write operations for SNMP is the same
as default. Please verify that this is the best value from a security point
of view.
Please check the status of the following modules:
8,9
Module 2 had a MINOR_ERROR.
The Module 2 failed the following tests:
TestIngressSpan
The following ports from Module2 failed test1:
1,2,4,48

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-693

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show dot1q-tunnel

show dot1q-tunnel
To display a list of 802.1Q tunnel-enabled ports, use the show dot1q-tunnel command.
show dot1q-tunnel [{interface interface interface-number}]

Syntax Description

interface interface (Optional) Specifies the interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, and port-channel.
interface-number

Interface number; see the “Usage Guidelines” section for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enter any keywords, the 802.1Q tunnel ports for all interfaces are displayed.
The interface-number argument designates the module and port number for the ethernet, fastethernet,
gigabitethernet, and tengigabitethernet keywords. Valid values depend on the chassis and module that
are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is installed in a 13-slot
chassis, valid values for the slot number are from 1 to 13 and valid values for the port number are from
1 to 48.
The interface-number argument designates the port-channel number for the port-channel keyword;
valid values are from 1 to 282. The values from 257 to 282 are supported on the CSM and the FWSM
only.

Examples

This example indicates that the port is up and has one 802.1Q tunnel that is configured on it:
Router# show dot1q-tunnel interface port-channel 10
Interface
--------Po10

Related Commands

Command

Description

switchport mode

Sets the interface type.

vlan dot1q tag native

Enables 802.1Q tagging for all VLANs in a trunk.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-694

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show dot1x

show dot1x
To display the 802.1X information, use the show dot1x command.
show dot1x {interface interface interface-number}
show dot1x {all | brief | summary | {statistics {interface interface interface-number}}}

Syntax Description

interface interface

Displays the 802.1X information for the interface type; possible valid values
are ethernet, fastethernet, gigabitethernet, and tengigabitethernet.

interface-number

Interface number; see the “Usage Guidelines” section for valid values.

all

Displays the 802.1X information for all interfaces.

brief

Displays information about the 802.1X status for all interfaces.

summary

Displays information about the 802.1X summary for the whole system.

statistics

Displays information about the 802.1X port; see the “Usage Guidelines”
section for information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When entering the show dot1x statistics command, you must enter interface interface interface-number
for the command to perform correctly.
If you disable 802.1X globally, the output of the show dot1x brief command displays nothing and the
show dot1x summary command output displays 0 in all fields.
The interface-number argument designates the module and port number for the ethernet, fastethernet,
gigabitethernet, and tengigabitetherne keywords. Valid values depend on the chassis and module that
are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is installed in a 13-slot
chassis, valid values for the slot number are from 1 to 13 and valid values for the port number are from
1 to 48.

Examples

This example shows how to display the 802.1X information for a specific interface:
Router# show dot1x interface fastethernet 5/1
Default Dot1x Configuration Exists for this interface FastEthernet5/1
AuthSM State
= FORCE AUTHORIZED
BendSM State
= IDLE
PortStatus
= AUTHORIZED
MaxReq
= 2
MultiHosts
= Disabled

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-695

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show dot1x

PortControl
QuietPeriod
Re-authentication
ReAuthPeriod
ServerTimeout
SuppTimeout
TxPeriod

=
=
=
=
=
=
=

Force Authorized
60 Seconds
Disabled
3600 Seconds
30 Seconds
30 Seconds
30 Seconds

Router#

This example shows how to display the 802.1X information for all interfaces:
Router# show dot1x all
Dot1x Info for interface FastEthernet3/2
---------------------------------------------------AuthSM State = FORCE UNAUTHORIZED
BendSM State = IDLE
PortStatus = UNAUTHORIZED
MaxReq = 2
MultiHosts = Disabled
Port Control = Force UnAuthorized
QuietPeriod = 60 Seconds
Re-authentication = Disabled
ReAuthPeriod = 3600 Seconds
ServerTimeout = 30 Seconds
SuppTimeout = 30 Seconds
TxPeriod = 30 Seconds
Dot1x Info for interface FastEthernet3/12
---------------------------------------------------AuthSM State = Unknown State
BendSM State = Unknown State
PortStatus = UNKNOWN
MaxReq = 2
MultiHosts = Disabled
Port Control = Auto
QuietPeriod = 60 Seconds
Re-authentication = Disabled
ReAuthPeriod = 3600 Seconds
ServerTimeout = 30 Seconds
SuppTimeout = 30 Seconds
TxPeriod = 30 Seconds
Guest-Vlan = 91
Router#

This example shows how to display the 802.1X statistics for a port:
Router# show dot1x statistics interface fastethernet3/1
PortStatistics Parameters for Dot1x
-------------------------------------------TxReqId = 0 TxReq = 0 TxTotal = 0
RxStart = 0 RxLogoff = 0 RxRespId = 0 RxResp = 0
RxInvalid = 0 RxLenErr = 0 RxTotal= 0
RxVersion = 0 LastRxSrcMac 0000.0000.0000
Router#

This example shows how to display a summary of 802.1X information for the whole system:
Router# show dot1x summary
Total
Total
Total
Total
Total

number
number
number
number
number

of
of
of
of
of

dot1x enabled ports:
FORCE_UNAUTHORIZED dot1x ports:
authorized dot1x enabled ports:
dot1x ports in single host mode:
dot1x ports in multi host mode:

336
0
254
336
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-696

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show dot1x

Total number
Total number
Total number
Total number
Total number
Router#

of
of
of
of
of

dot1x authenticated supplicants:
supplicants in AUTH_DISCONNECTED state:
supplicants in AUTH_CONNECTING state:
supplicants in AUTH_AUTHENTICATING state:
supplicants in AUTH_HELD state:

254
0
0
0
0

This example shows how to display the status of all 802.1X-enabled ports:
Router# show dot1x brief
RV - Radius returned VLAN
Port
Supplicant MAC
----------------Fa4/1
0000.0000.0000
Fa4/2
0000.0000.0000
Fa4/3
0000.0000.0000
Fa4/4
0000.0000.0000
Fa4/5
0000.0000.0000
Fa4/6
0000.0000.0000
Fa4/7
0000.0000.0000
.
.
. Output truncated
Fa4/35
00fe.ed00.01ba
Fa4/36
00fe.ed00.01b8
Fa4/37
00fe.ed00.01e6
Fa4/38
00fe.ed00.01e4
Fa4/39
00fe.ed00.01e2
Fa4/40
00fe.ed00.01e0
Fa4/41
00fe.ed00.01de
Fa4/42
00fe.ed00.01dc
Router#

AuthSM State
-----------N/A
N/A
N/A
N/A
N/A
N/A
N/A

BendSM State
-----------N/A
N/A
N/A
N/A
N/A
N/A
N/A

Port Status
----------N/A
N/A
N/A
N/A
N/A
N/A
N/A

RV
----

AUTHENTICATED
AUTHENTICATED
AUTHENTICATED
AUTHENTICATED
AUTHENTICATED
AUTHENTICATED
AUTHENTICATED
AUTHENTICATED

IDLE
IDLE
IDLE
IDLE
IDLE
IDLE
IDLE
IDLE

AUTHORIZED
AUTHORIZED
AUTHORIZED
AUTHORIZED
AUTHORIZED
AUTHORIZED
AUTHORIZED
AUTHORIZED

101
101
101
101
101
101
101
101

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-697

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show dss log

show dss log
To display the invalidation routes for the DSS range on the NetFlow table, use the show dss log
command.
show dss log {ip | ipv6}

Syntax Description

ip

Displays the range-invalidation profile for the DSS IP.

ipv6

Displays the range-invalidation profile for the DSS IPv6.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Whenever an IPv6 entry is deleted from the routing table, a message is sent to the switch processor to
remove the entries that are associated to that network. Several IPv6 prefixes are collapsed to the less
specific one if too many invalidations occur in a short period of time.

Examples

This example shows how to display the range-invalidation profile for the DSS IP:
Router# show dss log
22:50:18.551 prefix
22:50:20.059 prefix
22:51:48.767 prefix
22:51:52.651 prefix
22:53:02.651 prefix
22:53:19.651 prefix
Router#

ip
172.20.52.18 mask 172.20.52.18
127.0.0.0 mask 255.0.0.0
172.20.52.18 mask 172.20.52.18
0.0.0.0 mask 0.0.0.0
0.0.0.0 mask 0.0.0.0
0.0.0.0 mask 0.0.0.0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-698

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show environment alarm

show environment alarm
To display the information about the environmental alarm, use the show environment alarm command.
show environment alarm [{status | threshold} [frutype]]

Syntax Description

status

(Optional) Displays the operational FRU status.

threshold

(Optional) Displays the preprogrammed alarm thresholds.

frutype

(Optional) Alarm type; valid values are all, backplane, clock number, earl slot,
fan-tray, module slot, rp slot, power-supply number, supervisor slot, and vtt
number. See the “Usage Guidelines” section for a list of valid values for number
and slot.

Defaults

If you do not enter a frutype, all the information about the environmental alarm status is displayed.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Valid values for the frutype are as follows:
•

clock number—1 and 2.

•

earl slot—See the “Usage Guidelines” section for valid values.

•

module slot—See the “Usage Guidelines” section for valid values.

•

rp slot—See the “Usage Guidelines” section for valid values.

•

power-supply number—1 and 2.

•

supervisor slot—See the “Usage Guidelines” section for valid values.

•

vtt number—1 to 3.

The slot argument designates the module and port number. Valid values for slot depend on the chassis
and module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.

Examples

This example shows how to display all the information about the status of the environmental alarm:
Router> show environment alarm threshold
environmental alarm thresholds:
power-supply 1 fan-fail: OK
threshold #1 for power-supply 1 fan-fail:
(sensor value != 0) is system minor alarm

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-699

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show environment alarm

power-supply 1 power-output-fail: OK
threshold #1 for power-supply 1 power-output-fail:
(sensor value != 0) is system minor alarm
fantray fan operation sensor: OK
threshold #1 for fantray fan operation sensor:
(sensor value != 0) is system minor alarm
operating clock count: 2
threshold #1 for operating clock count:
(sensor value < 2) is system minor alarm
threshold #2 for operating clock count:
(sensor value < 1) is system major alarm
operating VTT count: 3
threshold #1 for operating VTT count:
(sensor value < 3) is system minor alarm
threshold #2 for operating VTT count:
(sensor value < 2) is system major alarm
VTT 1 OK: OK
threshold #1 for VTT 1 OK:
(sensor value != 0) is system minor alarm
VTT 2 OK: OK
threshold #1 for VTT 2 OK:
(sensor value != 0) is system minor alarm
VTT 3 OK: OK
threshold #1 for VTT 3 OK:
(sensor value != 0) is system minor alarm
clock 1 OK: OK
threshold #1 for clock 1 OK:
(sensor value != 0) is system minor alarm
clock 2 OK: OK
threshold #1 for clock 2 OK:
(sensor value != 0) is system minor alarm
module 1 power-output-fail: OK
threshold #1 for module 1 power-output-fail:
(sensor value != 0) is system major alarm
module 1 outlet temperature: 21C
threshold #1 for module 1 outlet temperature:
(sensor value > 60) is system minor alarm
threshold #2 for module 1 outlet temperature:
(sensor value > 70) is system major alarm
module 1 inlet temperature: 25C
threshold #1 for module 1 inlet temperature:
(sensor value > 60) is system minor alarm
threshold #2 for module 1 inlet temperature:
(sensor value > 70) is system major alarm
module 1 device-1 temperature: 30C
threshold #1 for module 1 device-1 temperature:
(sensor value > 60) is system minor alarm
threshold #2 for module 1 device-1 temperature:
(sensor value > 70) is system major alarm
module 1 device-2 temperature: 29C
threshold #1 for module 1 device-2 temperature:
(sensor value > 60) is system minor alarm
threshold #2 for module 1 device-2 temperature:
(sensor value > 70) is system major alarm
module 5 power-output-fail: OK
threshold #1 for module 5 power-output-fail:
(sensor value != 0) is system major alarm
module 5 outlet temperature: 26C
threshold #1 for module 5 outlet temperature:
(sensor value > 60) is system minor alarm
threshold #2 for module 5 outlet temperature:
(sensor value > 75) is system major alarm
module 5 inlet temperature: 23C
threshold #1 for module 5 inlet temperature:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-700

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show environment alarm

(sensor value > 50) is system minor alarm
threshold #2 for module 5 inlet temperature:
(sensor value > 65) is system major alarm
EARL 1 outlet temperature: N/O
threshold #1 for EARL 1 outlet temperature:
(sensor value > 60) is system minor alarm
threshold #2 for EARL 1 outlet temperature:
(sensor value > 75) is system major alarm
EARL 1 inlet temperature: N/O
threshold #1 for EARL 1 inlet temperature:
(sensor value > 50) is system minor alarm
threshold #2 for EARL 1 inlet temperature:
(sensor value > 65) is system major alarm
Router>

Related Commands

Command

Description

show environment
status

Displays the information about the operational FRU status.

show environment
temperature

Displays the current temperature readings.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-701

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show environment cooling

show environment cooling
To display the information about the cooling parameter, use the show environment cooling command.
show environment cooling

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the cooling parameter:
Router# show environment cooling
fan-tray 1:
fan-tray 1 fan-fail: failed
fan-tray 2:
fan 2 type: FAN-MOD-9
fan-tray 2 fan-fail: OK
chassis cooling capacity: 690 cfm
ambient temperature: 55C
chassis per slot cooling capacity: 75 cfm
module
module
module
module
module
module
Router#

Related Commands

1
2
5
6
8
9

cooling
cooling
cooling
cooling
cooling
cooling

requirement:
requirement:
requirement:
requirement:
requirement:
requirement:

70
70
30
70
70
30

cfm
cfm
cfm
cfm
cfm
cfm

Command

Description

hw-module fan-tray
version

Sets the version (high or low power) type of the fan.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-702

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show environment status

show environment status
To display the information about the operational FRU status, use the show environment status
command.
show environment status [frutype]

Syntax Description

frutype

Defaults

If you do not enter a frutype, all FRU status information is displayed.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) FRU type; see the “Usage Guidelines” section for a list of valid values.

Valid values for the frutype are as follows:
•

all—No arguments.

•

backplane—No arguments.

•

clock number—1 and 2.

•

earl slot—See the “Usage Guidelines” section for valid values.

•

fan-tray—No arguments.

•

module slot—See the “Usage Guidelines” section for valid values.

•

power-supply number—1 and 2.

•

rp slot—See the “Usage Guidelines” section for valid values.

•

supervisor slot—See the “Usage Guidelines” section for valid values.

•

vtt number—1 to 3.

The slot argument designates the module and port number. Valid values for slot depend on the chassis
and module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.

Examples

This example shows how to display the information about the environmental status:
Router> show environment status
backplane:
operating clock count: 2
operating VTT count: 3
fan-tray:
fantray fan operation sensor: OK

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-703

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show environment status

VTT 1:
VTT 1 OK: OK
VTT 2:
VTT 2 OK: OK
VTT 3:
VTT 3 OK: OK
clock 1:
clock 1 OK: OK, clock 1 clock-inuse: not-in-use
clock 2:
clock 2 OK: OK, clock 2 clock-inuse: in-use
power-supply 1:
power-supply 1 fan-fail: OK
power-supply 1 power-output-fail: OK
module 1:
module 1 power-output-fail: OK
module 1 outlet temperature: 21C
module 1 inlet temperature: 25C
module 1 device-1 temperature: 30C
module 1 device-2 temperature: 29C
EARL 1 outlet temperature: N/O
EARL 1 inlet temperature: N/O
module 5:
module 5 power-output-fail: OK
module 5 outlet temperature: 26C
module 5 inlet temperature: 23C
module 5 device-1 temperature: 26C
module 5 device-2 temperature: 27C
Router>

This example shows how to display the information about the high-capacity power supplies:
Router# show environment status power-supply 2
power-supply 2:
power-supply 2 fan-fail: OK
power-supply 2 power-input 1: none
power-supply 2 power-input 2: AC low
power-supply 2 power-input 3: AC high
power-supply 2 power-output: low (mode 1)
power-supply 2 power-output-fail: OK

Table 2-35 describes the fields that are shown in the example.
Table 2-35 show environment status Command Output Fields

Field

Description

operating clock count

Physical clock count.

operating VTT count

Physical VTT count.

fan tray fan operation sensor

System fan tray failure status. The failure of the system fan
tray is indicated as a minor alarm.

VTT 1, VTT2, and VTT3

Status of the chassis backplane power monitors that are
located on the rear of the chassis under the rear cover.
Operation of at least two VTTs is required for the system to
function properly. A minor system alarm is signaled when
one of the three VTTs fails. A major alarm is signaled when
two or more VTTs fail and the supervisor engine is accessible
through the console port.

clock # clock-inuse

Clock status. Failure of either clock is considered to be a
minor alarm.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-704

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show environment status

Table 2-35 show environment status Command Output Fields (continued)

Related Commands

Field

Description

power-supply # fan-fail

Fan failure. Fan failures on either or both (if any) power
supplies are considered minor alarms.

power-input-fail

Power input failure status (none, AC high, AC low).

power-output-fail

Power output failure status (high, low).

outlet temperature

Exhaust temperature value.

inlet temperature

Intake temperature value.

device-1 and device-2
temperature

Two devices that measure the internal temperature on each
indicated module. The temperature shown indicates the
temperature that the device is recording. The devices are not
placed at an inlet or an exit but are additional reference
points.

Command

Description

show environment
alarm

Displays the information about the environmental alarm.

show environment
temperature

Displays the current temperature readings.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-705

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show environment temperature

show environment temperature
To display the current temperature readings, use the show environment temperature command.
show environment temperature [frutype]

Syntax Description

frutype

Defaults

If you do not enter a frutype, the module and EARL temperature readings are displayed.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) FRU type; see the “Usage Guidelines” section for a list of valid
values.

Valid values for the frutype are as follows:
•

earl slot—See the “Usage Guidelines” section for valid values.

•

module slot—See the “Usage Guidelines” section for valid values.

•

rp slot—See the “Usage Guidelines” section for valid values.

•

vtt number—1 to 3.

•

clock number—1 and 2.

The slot argument designates the module and port number. Valid values for slot depend on the chassis
and module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.
The show environment temperature module command output includes the updated information after
an SCP response is received.
In the output display, the following applies:

Examples

•

N/O means not operational—The sensor is broken, returning impossible values.

•

N/A means not available—The sensor value is presently not available; try again later.

•

VTT 1, 2, and 3 refer to the power monitors that are located on the chassis backplane under the rear
cover.

This example shows how to display the temperature information for a specific module:
Router> show environment temperature module 5
module 5 outlet temperature: 34C
module 5 inlet temperature: 27C
module 5 device-1 temperature: 42C

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-706

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show environment temperature

module
module
module
module
module
module
module
Router>

5
5
5
5
5
5
5

device-2 temperature: 41C
asic-1 (SSO-1) temp: 29C
asic-2 (SSO-2) temp: 29C
asic-3 (SSO-3) temp: 29C
asic-4 (SSO-4) temp: 28C
asic-5 (SSA-1) temp: 29C
asic-6 (HYPERION-1) temp: 29C

This example shows how to display the temperature readings for all modules:
Router> show environment temperature
VTT 1 outlet temperature: 25C
VTT 2 outlet temperature: 24C
VTT 3 outlet temperature: 28C
module 1 outlet temperature: 24C
module 1 device-2 temperature: 29C
RP 1 outlet temperature: 25C
RP 1 inlet temperature: 29C
EARL 1 outlet temperature: 25C
EARL 1 inlet temperature: 22C
module 5 outlet temperature: 27C
module 5 inlet temperature: 22C
Router#

Table 2-36 describes the fields that are shown in the example.
Table 2-36 show environment temperature Command Output Fields

Related Commands

Field

Description

outlet temperature

Exhaust temperature value.

inlet temperature

Intake temperature value.

device-1 and device-2 temperature

Two devices that measure the internal temperature on the
indicated module. The temperature shown indicates the
temperature that the device is recording. The devices are not
placed at an inlet or an exit but are additional reference points.

Command

Description

show environment
alarm

Displays the information about the environmental alarm.

show environment
status

Displays the information about the operational FRU status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-707

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show eobc

show eobc
To display the information about the EOBC interface, use the show eobc command.
show eobc

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the EOBC interface:
Router> show eobc
EOBC0/0 is up, line protocol is up
Hardware is DEC21143, address is 0000.2100.0000 (bia 0000.2100.0000)
MTU 0 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive not set
Unknown duplex, Unknown Speed, MII
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 25/2147483647, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
172196 packets input, 11912131 bytes
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast
0 input packets with dribble condition detected
172144 packets output, 11363476 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Interface EOBC0/0
Hardware is DEC21143
dec21140_ds=0x618FB938, registers=0x3C018000, ib=0x38A9180
rx ring entries=128, tx ring entries=256, af setup failed=0
rxring=0x38A9280, rxr shadow=0x618FBB20, rx_head=28, rx_tail=0
txring=0x38A9AC0, txr shadow=0x618FBD4C, tx_head=72, tx_tail=72, tx_count=0
PHY link up
CSR0=0xF8024882, CSR1=0xFFFFFFFF, CSR2=0xFFFFFFFF, CSR3=0x38A9280
CSR4=0x38A9AC0, CSR5=0xF0660000, CSR6=0x320CA002, CSR7=0xF3FFA261

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-708

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show eobc

CSR8=0xE0000000, CSR9=0xFFFDC3FF, CSR10=0xFFFFFFFF, CSR11=0x0
CSR12=0xC6, CSR13=0xFFFF0000, CSR14=0xFFFFFFFF, CSR15=0x8FF80000
DEC21143 PCI registers:
bus_no=0, device_no=6
CFID=0x00191011, CFCS=0x02800006, CFRV=0x02000041, CFLT=0x0000FF00
CBIO=0x20000801, CBMA=0x48018000, CFIT=0x28140120, CFDD=0x00000400
MII registers:
Register 0x00:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
Register 0x08:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
Register 0x10:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
Register 0x18:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
throttled=0, enabled=0, disabled=0
rx_fifo_overflow=0, rx_no_enp=0, rx_discard=0
tx_underrun_err=0, tx_jabber_timeout=0, tx_carrier_loss=0
tx_no_carrier=0, tx_late_collision=0, tx_excess_coll=0
tx_collision_cnt=0, tx_deferred=0, fatal_tx_err=0, tbl_overflow=0
HW addr filter: 0x38D2EE0, ISL Disabled
Entry= 0: Addr=0000.0000.0000
Entry= 1: Addr=0000.0000.0000
Entry= 2: Addr=0000.0000.0000
Entry= 3: Addr=0000.0000.0000
Entry= 4: Addr=0000.0000.0000
Entry= 5: Addr=0000.0000.0000
Entry= 6: Addr=0000.0000.0000
Entry= 7: Addr=0000.0000.0000
Entry= 8: Addr=0000.0000.0000
Entry= 9: Addr=0000.0000.0000
Entry=10: Addr=0000.0000.0000
Entry=11: Addr=0000.0000.0000
Entry=12: Addr=0000.0000.0000
Entry=13: Addr=0000.0000.0000
Entry=14: Addr=0000.0000.0000
Entry=15: Addr=0000.2100.0000
Router>

This example shows how to display the information about the EOBC interface but excludes lines that
contain the word output:
Router> show eobc | exclude output
EOBC0/0 is up, line protocol is up
Hardware is DEC21143, address is 0000.2100.0000 (bia 0000.2100.0000)
MTU 0 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive not set
Unknown duplex, Unknown Speed, MII
ARP type: ARPA, ARP Timeout 04:00:00
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 25/2147483647, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
175919 packets input, 12196443 bytes
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast
0 input packets with dribble condition detected
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
Interface EOBC0/0
Hardware is DEC21143
dec21140_ds=0x618FB938, registers=0x3C018000, ib=0x38A9180
rx ring entries=128, tx ring entries=256, af setup failed=0
rxring=0x38A9280, rxr shadow=0x618FBB20, rx_head=7, rx_tail=0
txring=0x38A9AC0, txr shadow=0x618FBD4C, tx_head=209, tx_tail=209, tx_count=0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-709

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show eobc

PHY link up
CSR0=0xF8024882, CSR1=0xFFFFFFFF, CSR2=0xFFFFFFFF, CSR3=0x38A9280
CSR4=0x38A9AC0, CSR5=0xF0660000, CSR6=0x320CA002, CSR7=0xF3FFA261
CSR8=0xE0000000, CSR9=0xFFFDC3FF, CSR10=0xFFFFFFFF, CSR11=0x0
CSR12=0xC6, CSR13=0xFFFF0000, CSR14=0xFFFFFFFF, CSR15=0x8FF80000
DEC21143 PCI registers:
bus_no=0, device_no=6
CFID=0x00191011, CFCS=0x02800006, CFRV=0x02000041, CFLT=0x0000FF00
CBIO=0x20000801, CBMA=0x48018000, CFIT=0x28140120, CFDD=0x00000400
MII registers:
Register 0x00:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
Register 0x08:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
Register 0x10:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
Register 0x18:
FFFF FFFF FFFF FFFF FFFF FFFF FFFF FFFF
throttled=0, enabled=0, disabled=0
rx_fifo_overflow=0, rx_no_enp=0, rx_discard=0
tx_underrun_err=0, tx_jabber_timeout=0, tx_carrier_loss=0
tx_no_carrier=0, tx_late_collision=0, tx_excess_coll=0
tx_collision_cnt=0, tx_deferred=0, fatal_tx_err=0, tbl_overflow=0
HW addr filter: 0x38D2EE0, ISL Disabled
Entry= 0: Addr=0000.0000.0000
Entry= 1: Addr=0000.0000.0000
Entry= 2: Addr=0000.0000.0000
Entry= 3: Addr=0000.0000.0000
Entry= 4: Addr=0000.0000.0000
Entry= 5: Addr=0000.0000.0000
Entry= 6: Addr=0000.0000.0000
Entry= 7: Addr=0000.0000.0000
Entry= 8: Addr=0000.0000.0000
Entry= 9: Addr=0000.0000.0000
Entry=10: Addr=0000.0000.0000
Entry=11: Addr=0000.0000.0000
Entry=12: Addr=0000.0000.0000
Entry=13: Addr=0000.0000.0000
Entry=14: Addr=0000.0000.0000
Entry=15: Addr=0000.2100.0000
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-710

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show erm statistics

show erm statistics
To display the FIB TCAM exception status for IPv4, IPv6, and MPLS protocols, use the show erm
statistics command.
show erm statistics

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The IPv4, IPv6, and MPLS exception state displays FALSE when the protocol is not under the exception
or displays TRUE when the protocol is under the exception.

Examples

This example shows how to display the FIB TCAM exception status for IPv4, IPv6, and MPLS
protocols:
Router> show erm statistics
#IPv4 excep notified
= 0
#IPv6 excep notified
= 0
#MPLS excep notified
= 0
#IPv4 reloads done
= 0
#IPv6 reloads done
= 0
#MPLS reloads done
= 0
Current IPv4 excep state = FALSE
Current IPv6 excep state = FALSE
Current MPLS excep state = FALSE
#Timer expired
= 0
#of erm msgs
= 1
Router>

Related Commands

Command

Description

mls erm priority

Assigns the priorities to define an order in which protocols attempt to
recover from the exception status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-711

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show errdisable detect

show errdisable detect
To display the error-disable detection status, use the show errdisable detect command.
show errdisable detect

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the error-disable detection status:
Router# show errdisable detect
ErrDisable Reason
Detection status
-------------------------------udld
Enabled
bpduguard
Enabled
rootguard
Enabled
packet-buffer-err
Enabled
pagp-flap
Enabled
dtp-flap
Enabled
link-flap
Enabled
Router#

Related Commands

Command

Description

errdisable detect cause Enables the error-disable detection.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-712

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show errdisable flap-value

show errdisable flap-value
To display the flap values for error-disable detection, use the show errdisable flap-value command.
show errdisable flap-value

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the flap values for error-disable detection:
Router# show errdisable flap-value
ErrDisable Reason
Flaps
Time (sec)
------------------------------pagp-flap
3
30
dtp-flap
3
30
link-flap
5
10
Router#Router#

Related Commands

Command

Description

errdisable detect cause

Enables the error-disable detection.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-713

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show errdisable recovery

show errdisable recovery
To display the information about the error-disable recovery timer, use the show errdisable recovery
command.
show errdisable recovery

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the error-disable recovery timer:
Router# show errdisable recovery
ErrDisable Reason
Timer Status
-----------------------------udld
Enabled
bpduguard
Enabled
rootguard
Enabled
pagp-flap
Enabled
dtp-flap
Enabled
link-flap
Enabled
Timer interval:300 seconds
Interfaces that will be enabled at the next timeout:
Interface
--------Fa9/4

Related Commands

Errdisable reason
----------------link-flap

Time left(sec)
-------------279

Command

Description

errdisable recovery

Configures the recovery mechanism variables.

show interfaces status

Displays the interface status or a list of interfaces in an error-disabled state
on LAN ports only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-714

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show etherchannel

show etherchannel
To display the EtherChannel information for a channel, use the show etherchannel command.
show etherchannel [channel-group] {port-channel | brief | detail | summary | port |
load-balance | protocol}

Syntax Description

channel-group

(Optional) Number of the channel group; valid values are a maximum
of 64 values from 1 to 282.

port-channel

Displays the port-channel information.

brief

Displays a summary of EtherChannel information.

detail

Displays the detailed EtherChannel information.

summary

Displays a one-line summary per channel group.

port

Displays the EtherChannel port information.

load-balance

Displays load-balance information.

protocol

Displays the enabled protocol.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify a channel-group, all channel groups are displayed.
The channel-group values that are from 257 to 282 are supported on the CSM and the FWSM only.
In the output, the Passive port list field is displayed for Layer 3 port channels only. This field means that
the physical interface, which is still not up, is configured to be in the channel group (and indirectly is
the only port channel in the channel group).
In the show etherchannel protocol output, if the interface is configured as part of the channel in mode
ON, the command displays Protocol: - (Mode ON).
In the output of the show etherchannel summary command, the following guidelines apply:
•

In the column that displays the protocol that is used for the channel, if the channel mode is ON, a
hyphen (-) is displayed.

•

Multiple aggregators are supported for LACP. For example, if two different bundles are created,
Po1 indicates the primary aggregator, and Po1A and Po1B indicate the secondary aggregators.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-715

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show etherchannel

In the output of the show etherchannel load-balance command, the following guidelines apply:

Examples

•

For EtherChannel load balancing of IPv6 traffic, if the traffic is bridged onto an EtherChannel (for
example, it is a Layer 2 channel and traffic in the same VLAN is bridged across it), the traffic is
always load balanced by the IPv6 addresses or either src, dest, or src-dest, depending on the
configuration. For this reason, the switch ignores the MAC/IP/ports for bridged IPv6 traffic. If you
configure src-dst-mac, the src-dst-ip(v6) address is used. If you configure src-mac, the src-ip(v6)
address is used.

•

IPv6 traffic that is routed over a Layer 2 or a Layer 3 channel is load balanced based on MAC
addresses or IPv6 addresses, depending on the configuration. The MAC/IP and the src/dst/src-dst
are supported, but load balancing that is based on Layer 4 ports is not supported. If you use the port
keyword, the IPv6 addresses, src, dst, or src-dst are used.

This example shows how to display the port-channel information for a specific group:
Router# show etherchannel 12 port-channel
Group: 12
---------Port-channels in the group:
---------------------Port-channel: Po1
-----------Age of the Port-channel
= 143h:01m:12s
Logical slot/port
= 14/1
Number of ports = 2
GC
= HotStandBy port = null
Port state
= Port-channel Ag-Inuse
Protocol
= LACP
Ports in the Port-channel:
Index
Load
Port
EC state
------+------+------+-----------0
55
Fa4/1
active
1
AA
Fa4/2
active
Time since last port bundled:
16h:28m:58s
Time since last port Un-bundled: 16h:29m:00s
Router#

Fa4/1
Fa4/4

This example shows how to display the load-balancing information:
Router# show etherchannel load-balance
EtherChannel Load-Balancing Configuration:
dst-mac
mpls label-ip
EtherChannel Load-Balancing Addresses Used Per-Protocol:
Non-IP: Destination MAC address
IPv4: Destination MAC address
IPv6: Destination MAC address (routed packets)
Destination IP address (bridged packets)
MPLS: Label or IP
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-716

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show etherchannel

This example shows how to display a summary of information for a specific group:
Router# show etherchannel 1 brief
Group: 1
---------Group state = L2
Ports: 4
Maxports = 8
Port-channels: 1 Max Port-channels = 1
Protocol: LACP
Router#

This example shows how to display the detailed information for a specific group:
Router# show etherchannel 12 detail
Group state = L2
Ports: 1
Maxports = 8
Port-channels: 1 Max Port-channels = 1
Protocol:
PAgP
Ports in the group:
------------------Port: Fa5/2
-----------Port state
Channel group
Port-channel
2
Port index
Flags:

= Down Not-in-Bndl
= 12
Mode = Desirable-Sl
= null
GC
= 0x00000000
= 0

Load = 0x00

Gcchange = 0
Pseudo port-channel = Po1
Protocol =

PAgP

S - Device is sending Slow LACPDUs F - Device is sending fast LACPDUs
A - Device is in active mode
P - Device is in passive mode

Local information:
Port
Fa4/1

Flags
SA

LACP Port
Priority
32768

State
bndl

Admin
Key
100

Oper
Key
100

Port
Number
0xc1

Port
State
0x75

Partner’s information:

Port
Fa4/1

Partner
System ID
8000,00b0.c23e.d861
LACP Partner
Port Priority
32768

Partner
Port Number
0x81

Partner
Oper Key
128

Age
14s

Partner
Flags
SP

Partner
Port State
0x81

Age of the port in the current state: 16h:27m:42s
Port-channels in the group:
---------------------Port-channel: Po12
-----------Age of the Port-channel
= 04d:02h:52m:26s
Logical slot/port
= 14/1
Number of ports = 0
GC
= 0x00000000
HotStandBy port = null
Port state
= Port-channel Ag-Not-Inuse
Protocol
=
PAgP
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-717

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show etherchannel

This example shows how to display a one-line summary per channel group:
Router# show etherchannel summary
Flags: D - down
P - in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3
S - Layer2
U - in use
f - failed to allocate aggregator
Number of channel-groups in use: 2
Number of aggregators:
2
Group Port-channel Protocol
Ports
------+-------------+-----------+----------------------------------------------12
Po12(SD)
PAgP
Fa5/2(D)
24
Po24(RD)
Router#

This example shows how to display the information about the EtherChannel port for a specific group:
Router# show etherchannel 1 port
Channel-group listing:
----------------------Group: 1
---------Ports in the group:
------------------Port: Fa5/4
-----------Port state
= EC-Enbld Down Not-in-Bndl Usr-Config
Channel group = 1
Mode = Desirable
Gcchange = 0
Port-channel = null
GC
= 0x00000000
Psudo-agport = Po1
Port index
= 0
Load = 0x00
Protocol =
LACP
Flags:

S - Device is sending Slow LACPDUs F - Device is sending fast LACPDUs
A - Device is in active mode
P - Device is in passive mode

Local information:
Port
Fa5/4

Flags
SA

LACP Port
Priority
32768

State
bndl

Admin
Key
100

Oper
Key
100

Port
Number
0xc1

Port
State
0x75

Partner’s information:

Port
Fa5/4

Partner
System ID
8000,00b0.c23e.d861
LACP Partner
Port Priority
32768

Partner
Port Number
0x81

Partner
Oper Key
128

Age
14s

Partner
Flags
SP

Partner
Port State
0x81

Age of the port in the current state: 04d:02h:57m:38s
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-718

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show etherchannel

This example shows how to display the protocol that was enabled:
Router# show etherchannel protocol
Channel-group listing:
----------------------Group: 12
---------Protocol: PAgP
Group: 24
---------Protocol:
Router#

Related Commands

-

(Mode ON)

Command

Description

channel-group

Assigns and configures an EtherChannel interface to an EtherChannel
group.

channel-protocol

Sets the protocol that is used on an interface to manage channeling.

interface port-channel Creates a port-channel virtual interface and enters interface configuration
mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-719

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm features

show fm features
To display the information about the feature manager, use the show fm features command.
show fm features

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the feature manager:
Router> show fm features
Designated PISA:1 Non-designated PISA:1
Redundancy Status:designated
Interface:FastEthernet2/10 IP is enabled
hw[EGRESS] = 1, hw[INGRESS] = 1
hw_force_default[EGRESS] = 0, hw_force_default[INGRESS] = 0
mcast = 0
priority = 2
reflexive = 0
inbound label:1
protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:106
outbound label:2
protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:106
Interface:FastEthernet2/26 IP is enabled
hw[EGRESS] = 1, hw[INGRESS] = 0
hw_force_default[EGRESS] = 0, hw_force_default[INGRESS] = 1
mcast = 0
priority = 2
reflexive = 0
inbound label:24
protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:113
outbound label:3
protocol:ip
feature #:1

feature

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-720

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm features

id:FM_IP_WCCP
Service ID:0
Service Type:0
Interface:Vlan55 IP is enabled
hw[EGRESS] = 1, hw[INGRESS] = 1
hw_force_default[EGRESS] = 0, hw_force_default[INGRESS] = 0
mcast = 0
priority = 2
reflexive = 0
inbound label:4
protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:111
Interface:Vlan101 IP is enabled
hw[EGRESS] = 1, hw[INGRESS] = 1
hw_force_default[EGRESS] = 0, hw_force_default[INGRESS] = 0
mcast = 0
priority = 2
reflexive = 0
inbound label:5
protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:101
outbound label:6
protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:101
Router>

This example shows how to display the lines of feature manager information starting with the line that
begins with Redundancy:
Router> show fm features | begin Redundancy
Redundancy Status: designated
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-721

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm inband-counters

show fm inband-counters
To display the number of inband packets that are sent by the PISA for SLB and WCCP, use the show fm
inband-counters command.
show fm inband-counters

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The output display for the show fm inband-counters command includes the number of SLB inband
packets that are sent by the PISA and the number of WCCP inband packets that are sent by the PISA.
If CBAC is configured, the command output displays the number of packets that are sent for CBAC by
the PISA.

Examples

This example shows how to display the number of SLB and WCCP inband packets that are sent by the
PISA:
Router# show fm inband-counters
Inband Packets Sent
Slot WCCP
SLB
1
0
0
2
0
0
3
0
0
4
0
0
5
0
0
6
0
0
7
0
0
8
0
0
9
0
0
10
0
0
11
0
0
12
0
0
13
0
0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-722

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm insp

show fm insp
To display the list and status of the ACLs and ports on which CBAC is configured, use the show fm insp
command.
show fm insp [detail]

Syntax Description

detail

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Displays all of the flow information.

If you can configure a VACL on the port before you configure CBAC, the status displayed is
INACTIVE; otherwise, it is ACTIVE. If PFC resources are exhausted, the command displays BRIDGE
and is followed by the number of failed currently active NetFlow requests that have been sent to the
PISA for processing.
The show fm insp command output includes this information:
•

interface:—Interface on which the IP inspect feature is enabled

•

(direction)—Direction in which the IP inspect feature is enabled (IN or OUT)

•

acl name:—Name that is used to identify packets that are being inspected

•

status:—(ACTIVE or INACTIVE) displays if HW-assist is provided for this interface+direction
(ACTIVE=hardware assisted or INACTIVE)

The optional detail keyword displays the ACEs that are part of the ACL that is used for IP inspect on
the given interface direction.

Examples

This example shows how to display the list and status of CBAC-configured ACLs and ports:
Router> show fm insp
interface:Vlan305(in) status :ACTIVE
acl name:deny
interfaces:
Vlan305(out):status ACTIVE

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-723

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm interface

show fm interface
To display the detailed information about the feature manager on a per-interface basis, use the show fm
interface command.
show fm interface {{interface interface-number} | {null interface-number} | {port-channel
number} | {vlan vlan-id}}

Syntax Description

interface

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

null
interface-number

Specifies the null interface; the valid value is 0.

port-channel
number

Specifies the channel interface; valid values are a maximum of 64 values
ranging from 1 to 282.

vlan vlan-id

Specifies the VLAN; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.

Examples

This example shows how to display the detailed information about the feature manager on a specified
interface:
Router# show fm interface fastethernet 2/26
Interface:FastEthernet2/26 IP is enabled
hw[EGRESS] = 1, hw[INGRESS] = 0
hw_force_default[EGRESS] = 0, hw_force_default[INGRESS] = 1
mcast = 0
priority = 2
reflexive = 0
inbound label:24

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-724

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm interface

protocol:ip
feature #:1
feature id:FM_IP_ACCESS
ACL:113
vmr IP value #1:0, 0, 0, 0, 0, 0, 0, 6 - 1
vmr IP mask #1:0, 0, FFFF, FFFF, 0, 0, 0, FF
vmr IP value #2:642D4122, 0, 0, 0, 1, 0, 0, 6 - 1
vmr IP mask #2:FFFFFFFF, 0, 0, 0, 1, 0, 0, FF
vmr IP value #3:0, 64020302, 0, 0, 6, 0, 0, 6 - 1
vmr IP mask #3:0, FFFFFFFF, 0, 0, 6, 0, 0, FF
vmr IP value #4:0, 64020302, 0, 0, A, 0, 0, 6 - 1
vmr IP mask #4:0, FFFFFFFF, 0, 0, A, 0, 0, FF
vmr IP value #5:0, 64020302, 0, 0, 12, 0, 0, 6 - 1
vmr IP mask #5:0, FFFFFFFF, 0, 0, 12, 0, 0, FF
vmr IP value #6:0, 0, 0, 0, 0, 0, 0, 0 - 2
vmr IP mask #6:0, 0, 0, 0, 0, 0, 0, 0
outbound label:3
protocol:ip
feature #:1
feature id:FM_IP_WCCP
Service ID:0
Service Type:0
Router#

This example shows how to display the detailed information about the feature manager on a specific
VLAN:
Router# show fm interface vlan 21
Interface: Vlan21 IP is disabled
hw_state[INGRESS] = not reduced, hw_state[EGRESS] = not reduced
mcast = 0
priority = 0
flags = 0x0
inbound label: 8
Feature IP_VACL:
----------------------------------------------------------------------------FM_FEATURE_IP_VACL_INGRESS i/f: Vl21 map name: test
=============================================================================
-----------------------------------------------------------IP Seq. No: 10 Seq. Result : VACL_ACTION_FORWARD_CAPTURE
-----------------------------------------------------------DPort - Destination Port SPort - Source Port Pro - Protocol
X - XTAG TOS - TOS Value Res - VMR Result
RFM - R-Recirc. Flag MRTNP - M-Multicast Flag R - Reflexive flag
- F-Fragment flag - T-Tcp Control N - Non-cachable
- M-More Fragments - P-Mask Priority(H-High, L-Low)
Adj. - Adj. Index T - M(Mask)/V(Value) FM - Flow Mask
NULL - Null FM SAO - Source Only FM DAO - Dest. Only FM
SADA - Sour.& Dest. Only VSADA - Vlan SADA Only FF - Full Flow
VFF - Vlan Full Flow F-VFF - Either FF or VFF A-VSD - Atleast VSADA
A-FF - Atleast FF A-VFF - Atleast VFF A-SON - Atleast SAO
A-DON - Atleast DAO A-SD - Atleast SADA SHORT - Shortest
A-SFF - Any short than FF A-EFF - Any except FF A-EVFF- Any except VFF
A-LVFF- Any less than VFF ERR - Flowmask Error
+----+-+---------------+---------------+-----+-----+---+---+-+---+-----+----+------+
|Indx|T| Dest Ip Addr | Source Ip Addr|DPort|SPort|Pro|RFM|X|ToS|MRTNP|Adj.| FM |
+----+-+---------------+---------------+-----+-----+---+---+-+---+-----+----+------+
1 V 22.2.2.2 21.1.1.1 0 0 0 --- 0 0 ----L ---- SHORT
M 255.255.255.255 255.255.255.255 0 0 0 000 0 0
TM_PERMIT_RESULT
2 V 32.2.2.2 31.1.1.1 0 0 0 --- 0 0 ----L ---- SHORT
M 255.255.255.255 255.255.255.255 0 0 0 000 0 0
TM_PERMIT_RESULT
3 V 0.0.0.0 0.0.0.0 0 0 0 --- 0 0 ----L ---- SHORT

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-725

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm interface

M 0.0.0.0 0.0.0.0 0 0 0 000 0 0
TM_L3_DENY_RESULT
-----------------------------------------------------------IP Seq. No: 65536 Seq. Result : VACL_ACTION_DROP
-----------------------------------------------------------+----+-+---------------+---------------+-----+-----+---+---+-+---+-----+----+------+
|Indx|T| Dest Ip Addr | Source Ip Addr|DPort|SPort|Pro|RFM|X|ToS|MRTNP|Adj.| FM |
+----+-+---------------+---------------+-----+-----+---+---+-+---+-----+----+------+
1 V 0.0.0.0 0.0.0.0 0 0 0 --- 0 0 ----L ---- SHORT
M 0.0.0.0 0.0.0.0 0 0 0 000 0 0
TM_PERMIT_RESULT
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-726

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm ipv6 traffic-filter

show fm ipv6 traffic-filter
To display the IPv6 information, use the show fm ipv6 traffic-filter command.
show fm ipv6 traffic-filter {all | {interface interface interface-number}}

Syntax Description

all

Displays IPv6 traffic filter information for all interfaces.

interface interface

Displays IPv6 traffic filter information for the specifed interface;
possible valid values are ethernet, fastethernet, gigabitethernet,
tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Examples

This example shows how to display the IPv6 information for a specific interface:
Router# show fm ipv6 traffic-filter interface vlan 50
----------------------------------------------------------------------------FM_FEATURE_IPV6_ACG_INGRESS Name:testipv6 i/f: Vlan50
=============================================================================
DPort - Destination Port SPort - Source Port Pro - Protocol
X - XTAG TOS - TOS Value Res - VMR Result
RFM - R-Recirc. Flag MRTNP - M-Multicast Flag R - Reflexive flag
- F-Fragment flag - T-Tcp Control N - Non-cachable
- M-More Fragments - P-Mask Priority(H-High, L-Low)
Adj. - Adj. Index T - M(Mask)/V(Value) FM - Flow Mask
NULL - Null FM SAO - Source Only FM DAO - Dest. Only FM
SADA - Sour.& Dest. Only VSADA - Vlan SADA Only FF - Full Flow
VFF - Vlan Full Flow F-VFF - Either FF or VFF A-VSD - Atleast VSADA
A-FF - Atleast FF A-VFF - Atleast VFF A-SON - Atleast SAO
A-DON - Atleast DAO A-SD - Atleast SADA SHORT - Shortest
A-SFF - Any short than FF A-EFF - Any except FF A-EVFF- Any except VFF
A-LVFF- Any less than VFF ERR - Flowmask Error

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-727

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm ipv6 traffic-filter

+----+-+----------------------------------------+----------------------------------------+
---+---+-+-----+----+------+
|Indx|T| Dest IPv6 Addr | Source IPv6
Addr |Pro|RFM|X|MRTNP|Adj.| FM |
+----+-+----------------------------------------+----------------------------------------+
---+---+-+-----+----+------+
1 V 0:200E::
200D::1 0 -F- - ----L ---- Shorte
M 0:FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 0 1
TM_SOFT_BRIDGE_RESULT
2 V 0:200E::
200D::1 17 --- - ----L ---- Shorte
M 0:FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 255 0
TM_PERMIT_RESULT
3 V 200E::
200D::1 0 -F- - ----L ---- Shorte
M FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 0 1
TM_SOFT_BRIDGE_RESULT
4 V 200E::
200D::1 17 --- - ----L ---- Shorte
M FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 255 0
TM_PERMIT_RESULT
5 V
:: :: 0 -F- - ----L ---- Shorte
M
:: :: 0 1
TM_SOFT_BRIDGE_RESULT
6 V
:: :: 0 -F- - ----L ---- Shorte
M
:: :: 0 1
TM_SOFT_BRIDGE_RESULT
7 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
8 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
9 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
10 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
11 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
12 V
:: :: 58 --- - ----L ---- Shorte
M

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-728

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm ipv6 traffic-filter

:: :: 255 0
TM_PERMIT_RESULT
13 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
14 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
15 V
:: :: 0 --- - ----L ---- Shorte
M
:: :: 0 0
TM_L3_DENY_RESULT
Router#

This example shows how to display the IPv6 information for all interfaces:
Router# show fm ipv6 traffic-filter all
----------------------------------------------------------------------------FM_FEATURE_IPV6_ACG_INGRESS Name:testipv6 i/f: Vlan50
=============================================================================
DPort - Destination Port SPort - Source Port Pro - Protocol
X - XTAG TOS - TOS Value Res - VMR Result
RFM - R-Recirc. Flag MRTNP - M-Multicast Flag R - Reflexive flag
- F-Fragment flag - T-Tcp Control N - Non-cachable
- M-More Fragments - P-Mask Priority(H-High, L-Low)
Adj. - Adj. Index T - M(Mask)/V(Value) FM - Flow Mask
NULL - Null FM SAO - Source Only FM DAO - Dest. Only FM
SADA - Sour.& Dest. Only VSADA - Vlan SADA Only FF - Full Flow
VFF - Vlan Full Flow F-VFF - Either FF or VFF A-VSD - Atleast VSADA
A-FF - Atleast FF A-VFF - Atleast VFF A-SON - Atleast SAO
A-DON - Atleast DAO A-SD - Atleast SADA SHORT - Shortest
A-SFF - Any short than FF A-EFF - Any except FF A-EVFF- Any except VFF
A-LVFF- Any less than VFF ERR - Flowmask Error
+----+-+----------------------------------------+----------------------------------------+
---+---+-+-----+----+------+
|Indx|T| Dest IPv6 Addr | Source IPv6
Addr |Pro|RFM|X|MRTNP|Adj.| FM |
+----+-+----------------------------------------+----------------------------------------+
---+---+-+-----+----+------+
1 V 0:200E::
200D::1 0 -F- - ----L ---- Shorte
M 0:FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 0 1
TM_SOFT_BRIDGE_RESULT
2 V 0:200E::
200D::1 17 --- - ----L ---- Shorte
M 0:FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 255 0
TM_PERMIT_RESULT
3 V 200E::
200D::1 0 -F- - ----L ---- Shorte
M FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 0 1
TM_SOFT_BRIDGE_RESULT
4 V 200E::
200D::1 17 --- - ----L ---- Shorte
M FFFF:FFFF:FFFF:FFFF::
FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF 255 0
TM_PERMIT_RESULT

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-729

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm ipv6 traffic-filter

5 V
:: :: 0 -F- - ----L ---- Shorte
M
:: :: 0 1
TM_SOFT_BRIDGE_RESULT
6 V
:: :: 0 -F- - ----L ---- Shorte
M
:: :: 0 1
TM_SOFT_BRIDGE_RESULT
7 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
8 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
9 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
TM_PERMIT_RESULT
10 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
13 V
:: :: 58 --- - ----L ---- Shorte
M
:: :: 255 0
.
. Output is truncated
.
Interface(s) using this IPv6 Ingress Traffic Filter:
Vl50,

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-730

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm nat netflow data

show fm nat netflow data
To display the information about the NAT-related NetFlow data, use the show fm nat netflow data
command.
show fm nat netflow data

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the NAT-related NetFlow data:
Router> show fm nat netflow data
FM Pattern with stat push disabled: 1
Default/TCP/UDP Timeouts:
Def s/w timeout: 86400 h/w timeout: 300 Pattern(ingress): 4
Pattern(egress): 4 Push interval: 1333
TCP s/w timeout: 86400 h/w timeout: 300 Pattern(ingress): 4
Pattern(egress): 4 Push interval: 1333
UDP s/w timeout: 300 h/w timeout: 300 Pattern(ingress): 3
Pattern(egress): 3 Push interval: 100
Port Timeouts:
Idle timeout :3600 secs
Fin/Rst timeout :10 secs
Fin/Rst Inband packets sent per timeout :10000
Netflow mode to Zero-out Layer4 information for fragment packet lookup :
Enabled
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-731

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm reflexive

show fm reflexive
To display the information about the reflexive entry for the dynamic feature manager, use the show fm
reflexive command.
show fm reflexive

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the reflexive entry for the dynamic feature
manager:
Router# show fm reflexive
Reflexive hash table:
Vlan613:refacl, OUT-REF, 64060E0A, 64060D0A, 0, 0, 7, 783, 6
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-732

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm summary

show fm summary
To display a summary of feature manager information, use the show fm summary command.
show fm summary

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display a summary of feature manager information:
Router# show fm summary
Current global ACL merge algorithm:BDD
Interface:FastEthernet2/10
ACL merge algorithm used:
inbound direction: ODM
outbound direction:BDD
TCAM screening for features is ACTIVE outbound
TCAM screening for features is ACTIVE inbound
Interface:FastEthernet2/26
ACL merge algorithm used:
inbound direction: ODM
outbound direction:BDD
TCAM screening for features is ACTIVE outbound
TCAM screening for features is INACTIVE inbound
.
.
.
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-733

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show fm vlan

show fm vlan
To display the information about the per-VLAN feature manager, use the show fm vlan command.
show fm vlan vlan-id

Syntax Description

vlan-id

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

VLAN ID; valid values are from 1 to 4094.

This example shows how to display the information about the per-VLAN feature manager:
Router# show fm vlan 1
hw[EGRESS] = 1, hw[INGRESS] = 1
hw_force_default[EGRESS] = 0, hw_force_default[INGRESS] = 0
mcast = 0
priority = 2
reflexive = 0
vacc_map : map1
inbound label: 5
merge_err: 0
protocol: ip
feature #: 1
feature id: FM_VACL
map_name: map1
seq #: 10
(only for IP_PROT) DestAddr SrcAddr Dpt Spt L4OP TOS Est prot Rslt
vmr IP value # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 6 permit
vmr IP mask # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 FF
vmr IP value # 2: 0.0.0.0 0.0.0.0 0 0 0 0 0 11 permit
vmr IP mask # 2: 0.0.0.0 0.0.0.0 0 0 0 0 0 FF
vmr IP value # 3: 0.0.0.0 0.0.0.0 0 0 0 0 0 0 deny
vmr IP mask # 3: 0.0.0.0 0.0.0.0 0 0 0 0 0 0
seq #: 65536
(only for IP_PROT) DestAddr SrcAddr Dpt Spt L4OP TOS Est prot Rslt
vmr IP value # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 0 permit
vmr IP mask # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 0
outbound label: 6
merge_err: 0
protocol: ip
feature #: 1
feature id: FM_VACL
map_name: map1
seq #: 10
(only for IP_PROT) DestAddr SrcAddr Dpt Spt L4OP TOS Est prot Rslt
vmr IP value # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 6 permit

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-734

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show fm vlan

vmr IP mask # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 FF
vmr IP value # 2: 0.0.0.0 0.0.0.0 0 0 0 0 0 11 permit
vmr IP mask # 2: 0.0.0.0 0.0.0.0 0 0 0 0 0 FF
vmr IP value # 3: 0.0.0.0 0.0.0.0 0 0 0 0 0 0 deny
vmr IP mask # 3: 0.0.0.0 0.0.0.0 0 0 0 0 0 0
seq #: 65536
(only for IP_PROT) DestAddr SrcAddr Dpt Spt L4OP TOS Est prot Rslt
vmr IP value # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 0 permit
vmr IP mask # 1: 0.0.0.0 0.0.0.0 0 0 0 0 0 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-735

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show icc

show icc
To display the information about the ICC counter and status, use the show icc command.
show icc {counters | status}

Syntax Description

counters

Specifies the counter information.

status

Specifies the status information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the ICC counter:
Router# show icc counters
total tx RPC packets to slot 1 LCP = 0
detail by request id: (=)
2 =0
7 =0
8 =0
10=0
11=0
12=0
14=0
17=0
18=0
19=0
20=0
total rx RPC packets from slot 1 LCP = 0
detail by request id: (=)
2 =5
7 =7
8 =11
10=4
11=1
12=2
14=1
17=67
18=7
19=159
20=29
total tx MCAST-SP packets to slot 1 LCP = 0
detail by request id: (=)
6 =0
7 =0
8 =0
9 =0
12=0
14=0
total rx MCAST-SP packets from slot 1 LCP = 0
detail by request id: (=)
6 =1
7 =1
8 =1
9 =1
12=41
14=67
total tx L3-MGR packets to slot 1 LCP = 0
detail by request id: (=)
1 =0
2 =0
3 =0
total rx L3-MGR packets from slot 1 LCP = 0
detail by request id: (=)
1 =1
2 =2
3 =1
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-736

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show icc

This example shows how to display the information about the ICC status:
Router# show icc status
Class Name
Msgs Pending
----- ---------------- -----------2 RPC
0
3 MSC
0
5 L3-MGR
0
13 TCAM-API
0
Router#

Max Pending
----------3
1
4
10

Total Sent
---------403
1
4173
26

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-737

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show idprom

show idprom
To display the IDPROMs for FRUs, use the show idprom command.
show idprom {all | frutype | interface interface slot} [detail]

Syntax Description

all

Displays the information for all FRU types.

frutype

Type of FRU to display information; see the “Usage Guidelines” section
for valid values.

interface
Specifies the interface to display information; valid values are as follows:
interface slot
• interface—GigabitEthernet
•

slot—1 to 13

See the “Usage Guidelines” section for additional information.
detail

(Optional) Displays the details of the IDPROM data (verbose).

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Valid frutypes are as follows:
•

backplane—No arguments.

•

clock number—1 and 2.

•

earl slot—See the following paragraph for valid values.

•

module slot—See the following paragraph for valid values.

•

rp slot—See the following paragraph for valid values.

•

power-supply—1 and 2.

•

supervisor slot—See the following paragraph for valid values.

•

vtt number—1 to 3.

The slot argument designates the module and port number. Valid values for slot depend on the specified
interface type and the chassis and module that are used. For example, if you specify a Gigabit Ethernet
interface and have a 48-port 10/100BASE-T Ethernet module that is installed in a 13-slot chassis, valid
values for the module number are from 1 to 13 and valid values for the port number are from 1 to 48.
Use the show idprom backplane command to display the chassis serial number.
The optional interface interface slot keyword and arguments are supported on GBIC security-enabled
interfaces only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-738

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show idprom

Examples

This example shows how to display IDPROM information for clock 1:
Router> show idprom clock 1
IDPROM for clock #1
(FRU is 'Clock FRU')
OEM String = 'Cisco Systems'
Product Number = 'WS-C6000-CL'
Serial Number = 'SMT03073115'
Manufacturing Assembly Number = '73-3047-04'
Manufacturing Assembly Revision = 'A0'
Hardware Revision = 1.0
Current supplied (+) or consumed (-) = 0.000A
Router>

This example shows how to display IDPROM information for power supply 1:
Router> show idprom power-supply 1
IDPROM for power-supply #1
(FRU is '110/220v AC power supply, 1360 watt')
OEM String = 'Cisco Systems, Inc.'
Product Number = 'WS-CAC-1300W'
Serial Number = 'ACP03020001'
Manufacturing Assembly Number = '34-0918-01'
Manufacturing Assembly Revision = 'A0'
Hardware Revision = 1.0
Current supplied (+) or consumed (-) = 27.460A
Router>

This example shows how to display detailed IDPROM information for power supply 1:
Router# show idprom power-supply 1 detail
IDPROM for power-supply #1
IDPROM image:
(FRU is '110/220v AC power supply, 1360 watt')
IDPROM image block #0:
hexadecimal contents of block:
00: AB AB 01 90 11 BE 01 00 00
10: 73 63 6F 20 53 79 73 74 65
20: 2E 00 57 53 2D 43 41 43 2D
30: 00 00 00 00 00 00 41 43 50
40: 31 00 00 00 00 00 00 00 00
50: 38 2D 30 31 00 00 00 00 00
60: 00 00 00 00 00 00 00 00 00
70: 00 00 00 01 00 00 00 00 00
80: 00 01 00 06 00 01 00 00 00

02
6D
31
30
00
00
00
00
00

AB
73
33
33
33
41
00
00
0A

01
2C
30
30
34
30
00
09
BA

00
20
30
32
2D
00
00
00
00

01
49
57
30
30
00
00
0C
00

43
6E
00
30
39
00
00
00
00

69
63
00
30
31
00
00
03
00

..............Ci
sco Systems, Inc
..WS-CAC-1300W..
......ACP0302000
1.........34-091
8-01......A0....
................
................
................

block-signature = 0xABAB, block-version = 1,
block-length = 144, block-checksum = 4542
*** common-block ***
IDPROM capacity (bytes) = 256 IDPROM block-count = 2
FRU type = (0xAB01,1)
OEM String = 'Cisco Systems, Inc.'
Product Number = 'WS-CAC-1300W'
Serial Number = 'ACP03020001'
Manufacturing Assembly Number = '34-0918-01'
Manufacturing Assembly Revision = 'A0'
Hardware Revision = 1.0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-739

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show idprom

Manufacturing bits = 0x0 Engineering bits = 0x0
SNMP OID = 9.12.3.1.6.1.0
Power Consumption = 2746 centiamperes
RMA failure code = 0-0-0-0
*** end of common block ***
IDPROM image block #1:
hexadecimal contents of block:
00: AB 01 01 14 02 5F 00 00 00 00 00 00 00 00 0A BA
10: 0A BA 00 16

....._..........
....

block-signature = 0xAB01, block-version = 1,
block-length = 20, block-checksum = 607
*** power supply block ***
feature-bits: 00000000 00000000
rated current at 110v: 2746
rated current at 220v: 2746
(centiamperes)
CISCO-STACK-MIB SNMP OID = 22 *** end of power supply block ***
End of IDPROM image
Router#

This example shows how to display IDPROM information for the backplane:
Router# show idprom backplane
IDPROM for backplane #0
(FRU is 'Catalyst 6000 9-slot backplane')
OEM String = 'Cisco Systems'
Product Number = 'WS-C6009'
Serial Number = 'SCA030900JA'
Manufacturing Assembly Number = '73-3046-04'
Manufacturing Assembly Revision = 'A0'
Hardware Revision = 1.0
Current supplied (+) or consumed (-) = 0.000A
Router#

This example shows how to display IDPROM information from a GBIC security-enabled interface:
Router# show idprom interface g5/1
GBIC Serial EEPROM Contents:
Common block:
Identifier :
Connector :
Transceiver
Speed :
Media :
Technology :
Link Length :
GE Comp Codes :
SONET Comp Codes :
Encoding : 8B10B
BR, Nominal : 12x100 MHz
Length(9u) : GBIC does not support single mode fibre,
or the length information must be determined from
the transceiver technology.
Length(50u) : GBIC does not support 50 micron multi-mode fibre,
or the length information must be determined from
the transceiver technology.
Length(62.5u) : GBIC does not support 62.5 micron multi-mode fibre,
or the length information must be determined from
the transceiver technology.
Length(Copper) : GBIC does not support copper cables,
or the length information must be determined from
the transceiver technology.
Vendor Name : IBM

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-740

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show idprom

Vendor OUI : 0x8 0x0 0x5A
Vendor PN : IBM42P12SNY
Vendor rev : CS10
CC_BASE : 0xC6
Extended ID Fields
Options : Loss of Signal implemented TX_FAULT signal implemented
TX_D
ISABLE is implemented and disables the serial output
BR, max : 5%
BR, min : 5%
Vendor SN : 21P70420005D6
Date code : 02071001
CC_EXT : 0xCE
Vendor Specific ID Fields:
0x00: 00 00 00 70 2E DF C4 69 50 E6 54 F9 05 D4 83 A2
0x10: 4B 0E 8B 00 00 00 00 00 00 00 00 00 7D 3F D9 1E
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-741

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces

show interfaces
To display traffic that is seen by a specific interface, use the show interfaces command.
show interfaces [{interface interface-number} | {null interface-number} | {vlan vlan-id}]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, and port-channel, atm, and
ge-wan.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The valid values for port-channel are from 1 to 308. The port-channel values that are from 257 to 282
are internally allocated, and are supported on the CSM and the FWSM only.
Statistics are collected on a per-VLAN basis for Layer 2-switched packets and Layer 3-switched
packets. Statistics are available for both unicast and multicast traffic. The Layer 3-switched packet
counts are available for both ingress and egress directions. The per-VLAN statistics are updated every
5 seconds.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-742

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces

In some cases, you might see a difference in the duplex mode that is displayed between the show
interfaces command and the show running-config commands. In this case, the duplex mode that is
displayed in the show interfaces command is the actual duplex mode that the interface is running. The
show interfaces command shows the operating mode for an interface, while the show running-config
command shows the configured mode for an interface.
If you do not enter any keywords, all counters for all modules are displayed.
The output of the show interfaces GigabitEthernet command displays an extra 4 bytes for every packet
that is sent or received. This display occurs on the LAN ports on the GE-WAN module and other
Catalyst 6500 series switch Gigabit Ethernet LAN modules. The extra 4 bytes are the Ethernet frame
CRC in the input and output byte statistics.

Examples

This example shows how to display traffic for a specific interface:
Router# show interfaces GigabitEthernet3/3
GigabitEthernet3/3 is up, line protocol is up (connected)
Hardware is C6k 1000Mb 802.3, address is 000f.2305.49c0 (bia 000f.2305.49c0)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation 802.1Q Virtual LAN, Vlan ID 1., loopback not set
Keepalive set (10 sec)
Full-duplex, 1000Mb/s, media type is LH
input flow-control is off, output flow-control is on
Clock mode is auto
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:19, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
L2 Switched: ucast: 360 pkt, 23040 bytes - mcast: 0 pkt, 0 bytes
L3 in Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes mcast
L3 out Switched: ucast: 0 pkt, 0 bytes mcast: 0 pkt, 0 bytes
437 packets input, 48503 bytes, 0 no buffer
Received 76 broadcasts (0 IP multicast)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 input packets with dribble condition detected
86 packets output, 25910 bytes, 0 underruns <===========
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 PAUSE output
0 output buffer failures, 0 output buffers swapped out
Router#

This example shows how to display traffic for a FlexWAN module:
Router# show interfaces pos 6/1/0.1
POS6/1/0.1 is up, line protocol is up
Hardware is Packet over Sonet
Internet address is 1.1.2.2/24
MTU 4470 bytes, BW 155000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation FRAME-RELAY <<<+++ no packets info after this line
Arches#sh mod 6

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-743

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces

Mod Ports Card Type
Model
Serial No.
--- ----- -------------------------------------- ------------------ ----------6
0 2 port adapter FlexWAN
WS-X6182-2PA
SAD04340JY3
Mod MAC addresses
Hw
Fw
Sw
Status
--- ---------------------------------- ------ ------------ ------------ ------6 0001.6412.a234 to 0001.6412.a273
1.3
12.2(2004022 12.2(2004022 Ok
Mod Online Diag Status
--- ------------------6 Pass
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-744

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces accounting

show interfaces accounting
To display the number of packets of each protocol type that have been sent through all configured
interfaces, use the show interfaces accounting command.
show interfaces [{interface interface-number} | {null interface-number} | {vlan vlan-id}]
accounting

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, and port-channel, atm, and
ge-wan.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

The Pkts Out and Chars Out fields display IPv6 packet counts only. The Pkts In and Chars In fields
display both IPv4 and IPv6 packet counts, except for tunnel interfaces. For tunnel interfaces, the IPv6
input packets are counted as IPv6 packets only.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port channels from 257 to 282 are internally allocated and are supported on the CSM and the FWSM
only.
If you do not enter any keywords, all counters for all modules are displayed.

Examples

This example shows how to display the number of packets of each protocol type that have been sent
through all configured interfaces:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-745

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces accounting

Router# show interfaces gigabitethernet5/2 accounting
GigabitEthernet5/2
Protocol Pkts In Chars In Pkts Out Chars Out
IP
50521
50521000 0
0
DEC MOP 0
0
1
129
CDP
0
0
1
592
IPv6
11
834
96
131658
Router#

Table 2-37 describes the fields that are shown in the example.
Table 2-37 show interfaces accounting Command Output Fields

Field

Description

Protocol

Protocol that is operating on the interface.

Pkts In

Number of IPv4 packets received for the specified protocol.

Chars In

Number of IPv4 characters received for the specified protocol.

Pkts Out

Number of hardware-switched IPv6 packets transmitted for the
specified protocol.

Chars Out

Number of IPv6 characters transmitted for the specified protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-746

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces capabilities

show interfaces capabilities
To display the interface capabilities for a module, an interface, or all interfaces, use the show interfaces
capabilities command.
show interfaces [interface interface-number] capabilities [{module number}]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and port-channel, and
ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

module number

(Optional) Specifies the module number; see the “Usage Guidelines” section
for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the chassis and module that are used. For example, if you have a 48-port
10/100BASE-T Ethernet module that is installed in a 13-slot chassis, valid values for the slot number
are from 2 to 13 and valid values for the port number are from 1 to 48.
The port-channel values are from 0 to 282; values from 257 to 282 are supported on the CSM and the
FWSM only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-747

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces capabilities

Examples

This example shows how to display the interface capabilities for a module:
Router# show interfaces capabilities module 6
FastEthernet6/1
Dot1x: yes
Model: WS-X6248-RJ-45
Type: 10/100BaseTX
Speed: 10,100,auto
Duplex: half,full
Trunk encap. type: 802.1Q,ISL
Trunk mode: on,off,desirable,nonegotiate
Channel: yes
Broadcast suppression: percentage(0-100)
Flowcontrol: rx-(off,on),tx-(none)
Membership: static
Fast Start: yes
QOS scheduling: rx-(1q4t), tx-(2q2t)
CoS rewrite: yes
ToS rewrite: yes
Inline power: no
SPAN: source/destination
UDLD yes
Link Debounce: yes
Link Debounce Time: no
Ports on ASIC: 1-12
Port-Security: yes
Router#

This example shows how to display the interface capabilities for an interface:
Router# show interfaces fastethernet 4/1 capabilities
FastEthernet4/1
Model: WS-X6348-RJ-45
Type: 10/100BaseTX
Speed: 10,100,auto
Duplex: half,full
Trunk encap. type: 802.1Q,ISL
Trunk mode: on,off,desirable,nonegotiate
Channel: yes
Broadcast suppression: percentage(0-100)
Flowcontrol: rx-(off,on),tx-(none)
Fast Start: yes
QOS scheduling: rx-(1q4t), tx-(2q2t)
CoS rewrite: yes
ToS rewrite: yes
Inline power: no
SPAN: source/destination

This example shows how to display the port-channel interface capabilities:
Router# show interfaces port-channel 12 capabilities
Port-channel12
Model:
NO IDPROM
Type:
unknown
Speed:
10,100,1000,auto
Duplex:
half,full
Trunk encap. type:
802.1Q,ISL
Trunk mode:
on,off,desirable,nonegotiate
Channel:
yes

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-748

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces capabilities

Broadcast suppression:
Flowcontrol:
Fast Start:
QOS scheduling:
CoS rewrite:
ToS rewrite:
Inline power:
SPAN:
Router#

percentage(0-100)
rx-(off,on),tx-(none)
yes
rx-(1q4t), tx-(1q4t)
yes
yes
no
source/destination

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-749

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces counters

show interfaces counters
To display the traffic that the physical interface sees, use the show interfaces counters command.
show interfaces [interface] counters [errors | etherchannel | {module number} | {protocol
status} | {trunk [module number]}]

Syntax Description

interface

(Optional) Interface type; for a list of valid values, see the “Usage Guidelines”
section.

errors

(Optional) Displays the interface-error counters.

etherchannel

(Optional) Displays information about the EtherChannel interface.

module number

(Optional) Displays the module number; see the “Usage Guidelines” section for
valid values.

protocol status

(Optional) Displays the current status of the enabled protocols.

trunk

(Optional) Displays the interface-trunk counters.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show interfaces [interface] counters command displays the number of all of the packets arriving
and includes the number of packets that may be dropped by the interface due to the storm-control
settings. To display the total number of dropped packets, you can enter the show interfaces [interface]
counters storm-control command.
If you do not enter any keywords, all counters for all modules are displayed.
When you enter the interface, these formats can be used:
•

card-type {slot}/{first-port} - {last-port}

•

card-type {slot}/{first-port} - {last-port}

You can define a single port range per command entry. If you specify a range of ports, the range must
consist of the same slot and port type.
When you define a range, you must enter a white space between the first port and the hyphen (-) as
follows:
show interfaces gigabitethernet7/1 -7 counters

The module number keyword and argument designate the module number and limit the display to
interfaces on the module. Valid values depend on the chassis that is used. For example, if you have a
13-slot chassis, valid values for the module number are from 1 to 13.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-750

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces counters

Valid values for card-type are as follows:
•

ethernet

•

fastethernet

•

gigabitethernet

•

tengigabitethernet

•

port-channel interface-number—Valid values are from 1 to 282; values from 257 to 282 are
supported on the CSM and the FWSM only.

When you enter the show interfaces interface counters etherchannel command, follow these
guidelines:

Examples

•

If interface specifies a physical port, the command displays this message, “Etherchnl not enabled
on this interface.”

•

If interface is omitted, the command displays the counters for all port channels (in the system) and
for their associated physical ports.

•

If interface specifies a port channel, the command displays the counters for the port channel and all
of the physical ports that are associated with it. In addition, when you enter the command specifying
the primary aggregator in a LACP port channel with multiple aggregators, the output includes the
statistics for all of the aggregators in the port channels and for the ports that are associated with
them.

This example shows how to display the error counters for a specific module:
Router# show interfaces counters errors module 1
Port
Align-Err
FCS-Err
Xmit-Err
Rcv-Err UnderSize
Gi1/1
0
0
0
0
0
Gi1/2
0
0
0
0
0
Port
s
Gi1/1
Gi1/2
Router#

Single-Col Multi-Col
0
0

Late-Col Excess-Col Carri-Sen

0
0

0
0

0
0

Runts

Giant

0
0

0
0

0
0

This example shows how to display traffic that is seen by a specific module:
Router# show interfaces counters module 1
Port
Gi1/1
Gi1/2
Port
Gi1/1
Gi1/2
Router#

InOctets
0
0

InUcastPkts
0
0

InMcastPkts
0
0

InBcastPkts
0
0

OutOctets
0
0

OutUcastPkts
0
0

OutMcastPkts
0
0

OutBcastPkts
0
0

This example shows how to display the trunk counters for a specific module:
Router# show interfaces counters trunk module 1
Port
Gi1/1
Gi1/2
Router#

TrunkFramesTx
0
0

TrunkFramesRx
0
0

WrongEncap
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-751

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces counters

This example shows how to display the counters for all port channels (in the system) and their associated
physical ports:
Router# show interfaces counters etherchannel
Port
InOctets
InUcastPkts
InMcastPkts
Po1
5518
1
29
Fa3/48
5518
1
29
Po2
11897
2
54
Fa3/45
5878
1
27
Fa3/46
6019
1
27
Po3
0
0
0
Po5
6073
1
27
Fa3/44
6073
1
27
Po5A
7811
1
53
Fa3/43
7811
1
53
Port
Po1
Fa3/48
Po2
Fa3/45
Fa3/46
Po3
Po5
Fa3/44
Po5A
Fa3/43

OutOctets
4333
4333
9532
4766
4766
0
17224
17224
174426
174426

OutUcastPkts
1
1
2
1
1
0
1
1
1
1

OutMcastPkts
24
24
46
23
23
0
214
214
2669
2669

InBcastPkts
1
1
2
1
1
0
1
1
1
1
OutBcastPkts
1
1
2
1
1
0
1
1
1
1

This example shows how to display the counters for a specific port channel and the counters for the
associated physical ports:
Router# show interfaces port-channel2 counters etherchannel
Port
Po2
Fa3/48
Port
Po2
Fa3/48
Router#

InOctets
6007
6007

InUcastPkts
1
1

InMcastPkts
31
31

InBcastPkts
1
1

OutOctets
4428
4428

OutUcastPkts
1
1

OutMcastPkts
25
25

OutBcastPkts
1
1

This example shows how to display the discard count and the level settings for each mode:
Router# show interfaces counters storm-control
Port
Fa5/1
Fa5/2
Fa5/3
.
.
.
Router#

Related Commands

UcastSupp %
100.0
100.0
100.0

McastSupp %
100.0
100.0
100.0

BcastSupp %
100.0
100.0
100.0

Command

Description

clear counters

Clears the interface counters.

TotalSuppDiscards
0
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-752

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces debounce

show interfaces debounce
To display the status and configuration for the debounce timer, use the show interfaces debounce
command.
show interfaces [{interface interface-number} | {null interface-number} | {vlan vlan-id}]
debounce [module num]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, port-channel, pos, atm, and ge-wan.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

vlan vlan-id

(Optional) Specifies the VLAN; valid values are from 1 to 4094.

module num

(Optional) Limits the display to interfaces on the specified module.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The debounce timer is not supported on the 10-Gigabit Ethernet module (WSX-6502-10GE).
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port-channel values are from 0 to 282; values from 257 to 282 are supported on the CSM and the
FWSM only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-753

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces debounce

Examples

This example shows how to display the debounce configuration of an interface:
Router# show interfaces GigabitEthernet1/1 debounce
Port
Debounce time
Value
Gi1/1
enable
100
Router#

Related Commands

Command

Description

link debounce

Enables the debounce timer on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-754

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces description

show interfaces description
To display a description and a status of an interface, use the show interfaces description command.
show interfaces [interface] description

Syntax Description

interface

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Interface type; for a list of valid values, see the “Usage
Guidelines” section.

When you enter the interface value, these formats can be used:
•

card-type {slot}/{first-port} - {last-port}

•

card-type {slot}/{first-port} - {last-port}

You can define a single port range per command entry. If you specify a range of ports, the range must
consist of the same slot and port type. When you define a range, you must enter a space before and after
the hyphen (-) as follows:
show interfaces gigabitethernet7/1 - 7 counters broadcast

Possible valid values for card-type are ethernet, fastethernet, gigabitethernet, tengigabitethernet,
port-channel, pos, atm, and ge-wan.
The port-channel values are from 0 to 282; values from 257 to 282 are supported on the CSM and the
FWSM only.

Examples

This example shows how to display the information for all interfaces:
Router# show interfaces description
Interface Status
Protocol Description
PO0/0
admin down
down
First POS interface
PO0/1
admin down
down
Gi1/0
up
up
GigE to server farm
Router#

Related Commands

Command

Description

description

Includes a specific description about the DSP interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-755

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces flowcontrol

show interfaces flowcontrol
To display flow-control information, use the show interfaces flowcontrol command.
show interfaces [interface [mod]] flowcontrol [module number]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, port-channel, pos, atm, and ge-wan.

mod

(Optional) Module and port number.

module number

(Optional) Specifies the module number; see the “Usage Guidelines” section for
valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The mod argument designates the module and port number. Valid values for mod depend on the chassis
and module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.
The module number keyword and argument designate the module number and limit the display to
interfaces on the module. Valid values depend on the chassis that is used. For example, if you have a
13-slot chassis, valid values for the module number are from 1 to 13.
The port-channel values are from 0 to 282; values from 257 to 282 are supported on the CSM and the
FWSM only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-756

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces flowcontrol

Examples

This example shows how to display flow-control information for all interfaces:
Router# show interfaces flowcontrol
Port

Send
FlowControl
admin
oper
-------- -------desired
off
desired
off
on
on

----Gi1/1
Gi1/2
Gi3/1
.
.
.
Gi8/2 desired
Gi8/3 desired
Gi8/4 desired
Router#

off
off
off

Receive FlowControl
admin
oper
-------- -------off
off
off
off
on
on

RxPause TxPause
------0
0
0

------0
0
0

off
off
off

0
0
0

0
0
0

off
off
off

This example shows how to display flow-control information for a specific interface:
Router# show interfaces gigabitethernet 8/2 flowcontrol
Port Send
FlowControl Receive FlowControl RxPause TxPause
admin
oper
admin
oper
----- -------- -------- -------- -------- ------- ------Gi8/2 desired
off
off
off
0
0
Router#

Table 2-38 describes the fields that are shown in the example.
Table 2-38 show port flowcontrol Command Output Fields

Field

Description

Port

Interface type and module and port number.

Send admin

Flow-control operation for admin state. On indicates that the local port is
allowed to send pause frames to remote ports, off indicates that the local
port is prevented from sending pause frames to remote ports, and desired
indicates predictable results whether a remote port is set to receive on,
receive off, or receive desired.

Send oper

Current flow-control operation. On indicates that the local port is allowed
to send pause frames to remote ports, off indicates that the local port is
prevented from sending pause frames to remote ports, and desired indicates
predictable results whether a remote port is set to receive on, receive off,
or receive desired.

Receive admin

Flow-control operation for admin state. On indicates that the local port is
allowed to send pause frames to remote ports, off indicates that the local
port is prevented from sending pause frames to remote ports, and desired
indicates predictable results whether a remote port is set to send on, send
off, or send desired.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-757

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces flowcontrol

Table 2-38 show port flowcontrol Command Output Fields (continued)

Related Commands

Field

Description

Receive oper

Current flow-control operation. On indicates that the local port is allowed
to send pause frames to remote ports, off indicates that the local port is
prevented from sending pause frames to remote ports, and desired indicates
predictable results whether a remote port is set to send on, send off, or
send desired.

RxPause

Number of pause frames that are received.

TxPause

Number of pause frames that are transmitted.

Command

Description

flowcontrol

Configures a port to send or receive pause frames.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-758

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces private-vlan mapping

show interfaces private-vlan mapping
To display the information about the PVLAN mapping for VLAN SVIs, use the show interfaces
private-vlan mapping command.
show interfaces [interface interface-number] private-vlan mapping [active]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid values.

active

(Optional) Displays the active interfaces only.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command displays SVI information only.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the chassis and module that are used. For example, if you have a 48-port
10/100BASE-T Ethernet module that is installed in a 13-slot chassis, valid values for the slot number
are from 1 to 13 and valid values for the port number are from 1 to 48.

Examples

This example shows how to display the information about the PVLAN mapping:
Router# show interfaces private-vlan mapping
Interface Secondary VLAN Type
--------- -------------- ----------------vlan2
301
community
vlan2
302
community
Router#

Related Commands

Command

Description

private-vlan

Configures PVLANs and the association between a PVLAN and a
secondary VLAN.

private-vlan mapping

Creates a mapping between the primary and the secondary VLANs so that
both VLANs share the same primary VLAN SVI.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-759

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces status

show interfaces status
To display the interface status or a list of interfaces in an error-disabled state on LAN ports only, use the
show interfaces status command.
show interfaces [interface interface-number] status [err-disabled | module number]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

interface-number Module and port number; see the “Usage Guidelines” section for valid
values.
err-disabled

(Optional) Displays the LAN ports in an error-disabled state.

module number

(Optional) Specifies the module number; see the “Usage Guidelines”
section for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the chassis and module that are used. For example, if you have a 48-port
10/100BASE-T Ethernet module that is installed in a 13-slot chassis, valid values for the slot number
are from 1 to 13 and valid values for the port number are from 1 to 48.
This command is supported on LAN ports only.
The module number keyword and argument designate the module number and limit the display to the
interfaces on the module. Valid values depend on the chassis that is used. For example, if you have a
13-slot chassis, valid values for the module number are from 1 to 13.
To find out if an interface is inactive, enter the show interfaces status command. If the interface is
inactive, the Status field displays “inactive.” If the port is not inactive, the Status field displays “none.”
To find the packet and byte count, you can enter the show interfaces counters command or the show
interfaces interface interface-number status command. The show interfaces counters command is the
preferred command to use. In some cases, the packet and byte count of the show interfaces interface
interface-number status command is incorrect.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-760

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces status

Examples

This example shows how to display the status of all LAN ports:
Router# show interfaces status
Port
Name
Gi1/1
Gi1/2
Fa5/1
.
.
.
Port
Name
Fa5/18
Fa5/19
Gi7/1
Gi7/2
Router#

Status
disabled
notconnect
disabled

Status
disabled
disabled
disabled
disabled

Vlan
routed
1
routed

Vlan
1
1
1
1

Duplex Speed Type
full 1000 missing
full 1000 unknown (4)
auto auto 10/100BaseTX

Duplex
auto
auto
full
full

Speed
auto
auto
1000
1000

Type
10/100BaseTX
10/100BaseTX
WDM-RXONLY
No Transceiver

This example shows how to display the packet and byte count of a specific LAN port:
Router# show interfaces fastethernet5/2 status
FastEthernet5/2
Switching path
Pkts In
Chars In
Pkts Out Chars Out
Processor
17
1220
20
2020
Route cache
0
0
0
0
Distributed cache
17
1220 206712817 2411846570
Total
34
2440 206712837 2411848590
Router#

This example shows how to display the status of LAN ports in an error-disabled state:
Router# show interfaces status err-disabled
Port
Fa9/4

Name

Status
notconnect

Reason
link-flap

informational error message when the timer expires on a cause
-------------------------------------------------------------5d04h:%PM-SP-4-ERR_RECOVER:Attempting to recover from link-flap err-disable state on Fa9/4
Router#

Related Commands

Command

Description

errdisable detect cause Enables the error-disable detection.
show errdisable
recovery

Displays the information about the error-disable recovery timer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-761

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces summary

show interfaces summary
To display a summary of statistics for all interfaces that are configured on a networking device, use the
show interfaces summary command.
show interfaces [interface interface-number] summary [vlan]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid values.

vlan

(Optional) Displays the total number of VLAN interfaces.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Separate counters for subinterfaces are not maintained and are not displayed in the show interfaces
summary output.

Examples

This example shows how to display a summary of statistics for all interfaces that are configured on a
networking device:
Router# show interfaces summary
*: interface is up
IHQ: pkts in input hold queue IQD: pkts dropped from input queue
OHQ: pkts in output hold queue OQD: pkts dropped from output queue
RXBS: rx rate (bits/sec) RXPS: rx rate (pkts/sec)
TXBS: tx rate (bits/sec) TXPS: tx rate (pkts/sec)
TRTL: throttle count
Interface IHQ IQD OHQ OQD RXBS RXPS TXBS TXPS TRTL
---------------------------------------------------------------------* FastEthernet0/0 0 0 0 0 0 0 0 0 0
Serial0/0 0 0 0 0 0 0 0 0 0
FastEthernet0/1 0 0 0 0 0 0 0 0 0
Serial0/1 0 0 0 0 0 0 0 0 0
Router#

This example shows how to display the total number of VLAN interfaces:
Router# show interfaces summary vlan
Total number of Vlan interfaces: 7
Vlan interfaces configured:
1,5,20,2000,3000-3001,4000
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-762

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces summary

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-763

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces switchport

show interfaces switchport
To display the administrative and operational status of a switching (nonrouting) port, use the show
interfaces switchport command.
show interfaces [interface interface-number] switchport [brief] [module number]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

brief

(Optional) Displays a brief summary of information.

module number

(Optional) Limits the display to interfaces on a specified module; see the
“Usage Guidelines” section for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number designates the module and port number. Valid values depend on the chassis and
module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.

Examples

This example shows how to display switch-port information using the include output modifier:
Router# show interfaces switchport | include VLAN
Name: Fa5/6
Access Mode VLAN: 200 (VLAN0200)
Trunking Native Mode VLAN: 1 (default)
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: ALL
.
.
.
Router#

This example shows how to display the configurations of two multiple VLAN access ports:
Router# show interfaces switchport
Name: Fa5/1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-764

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces switchport

Switchport: Enabled
Administrative Mode: access
Operational Mode: access
Dot1q Ethertype: 0x8200
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: off
Access Mode VLAN: 100
Voice VLAN: 102
Trunking Native Mode VLAN: 1 (default)
Administrative private-vlan host-association: none
Administrative private-vlan mapping: 900 ((Inactive)) 901 ((Inactive))
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Name: Fa5/2
Switchport: Enabled
Administrative Mode: access
Operational Mode: down
Dot1q Ethertype: 0x8200
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 100
Voice VLAN: 103 ((inactive))
Trunking Native Mode VLAN: 1 (default)
.
.
.

This example shows how to display a brief summary of information:
Router# show interfaces switchport brief module 3
Port Status Op.Mode Op.Encap Channel-id Vlan
Fa3/1 connected access native -- 1
Fa3/7 disabled -- dot1q Po26 1
Fa3/13 connected access native -- 666
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-765

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces switchport backup

show interfaces switchport backup
To display Flexlink pairs, use the show interfaces switchport backup command.
show interfaces [interface interface-number] switchport backup

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number designates the module and port number. Valid values depend on the chassis and
module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.

Examples

This example shows how to display all Flexlink pairs:
Router# show interfaces switchport backup
Switch Backup Interface Pairs:
Active Interface
Backup Interface
State
-----------------------------------------------------------------------FastEthernet3/1
FastEthernet4/1
Active Up/Backup Standby
FastEthernet5/1
FastEthernet5/2
Active Down/Backup Up
FastEthernet3/2
FastEthernet5/4
Active Standby/Backup Up
Po1
Po2
Active Down/Backup Down
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-766

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces switchport backup

This example shows how to display a specific Flexlink port:
Router# show interfaces fastethernet 4/1 switchport backup
Switch Backup Interface Pairs:
Active Interface
Backup Interface
State
-----------------------------------------------------------------------FastEthernet3/1
FastEthernet4/1
Active Up/Backup Standby
Router#

Related Commands

Command

Description

switchport backup

Configures an interface as a Flexlink backup interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-767

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces transceiver

show interfaces transceiver
To display information about the optical transceivers that have DOM enabled, use the show interfaces
transceiver command.
show interfaces [interface interface-number] transceiver [threshold violations] [detail |
{module number}]

Syntax Description

interface

(Optional) Interface type; possible valid values are gigabitethernet and
tengigabitethernet.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

threshold violations

(Optional) Displays information about the interface transceiver threshold
violations.

detail

(Optional) Displays detailed information about the interface transceiver.

module number

(Optional) Specifies the module number; see the “Usage Guidelines”
section for valid values.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

After a transceiver is inserted, the software waits approximately 10 seconds before reading the
diagnostic monitoring information. If you enter the show interfaces transceiver command before the
software has read the diagnostic monitoring information, the following message is displayed:
Waiting for diagnostic monitoring information to settle down.
Please try again after a few seconds.

Wait a few seconds and reenter the show interfaces transceiver command.
The interface interface-number arguments are supported on interfaces that have a transceiver that has
diagnostic monitoring enabled and the transceiver is in a module that supports the reading of diagnostic
monitoring information.

Examples

This example shows how to display transceiver information:
Router# show interfaces transceiver
If device is externally calibrated, only calibrated values are printed.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
NA or N/A: not applicable, Tx: transmit, Rx: receive.
mA: milliamperes, dBm: decibels (milliwatts).

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-768

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces transceiver

Port
------Gi1/1
Gi2/1
Gi2/2
Router#

Temperature
(Celsius)
----------40.6
35.5
49.5

Voltage
(Volts)
------5.09
5.05
3.30

Current
(mA)
-------0.4
0.1
0.0

Optical
Tx Power
(dBm)
--------25.2
-29.2
7.1

Optical
Rx Power
(dBm)
-------N/A
N/A
-18.7

This example shows how to display detailed transceiver information:
Router# show interfaces transceiver detail
mA: milliamperes, dBm: decibels (milliwatts), NA or N/A: not applicable.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are calibrated.
High Alarm
Threshold
(Celsius)
---------100.0
100.0
70.0
70.0

High Warn
Threshold
(Celsius)
--------100.0
100.0
60.0
60.0

Low Warn
Threshold
(Celsius)
--------0.0
0.0
5.0
5.0

Low Alarm
Threshold
(Celsius)
--------0.0
0.0
0.0
0.0

Port
------Gi1/1
Gi1/2
Gi2/1
Gi2/2

Voltage
(Volts)
--------------3.30
3.30
5.03
5.02

High Alarm
Threshold
(Volts)
---------6.50
6.50
5.50
5.50

High Warn
Threshold
(Volts)
--------6.50
6.50
5.25
5.25

Low Warn
Threshold
(Volts)
--------N/A
N/A
4.75
4.75

Low Alarm
Threshold
(Volts)
--------N/A
N/A
4.50
4.50

Port
------Gi1/1
Gi1/2
Gi2/1
Gi2/2

Current
(milliamperes)
----------------0.0
1.7
50.6
+
25.8

High Alarm
Threshold
(mA)
---------130.0
130.0
60.0
60.0

High Warn
Threshold
(mA)
--------130.0
130.0
40.0
40.0

Low Warn
Threshold
(mA)
--------N/A
N/A
10.0
10.0

Low Alarm
Threshold
(mA)
--------N/A
N/A
5.0
5.0

Port
------Gi1/1
Gi1/2
Gi2/1
Gi2/2

Optical
Transmit Power
(dBm)
----------------8.1
++
-9.8
-16.7
-0.8

High Alarm
Threshold
(dBm)
---------8.1
8.1
3.4
3.4

High Warn
Threshold
(dBm)
--------8.1
8.1
3.2
3.2

Low Warn
Threshold
(dBm)
--------N/A
N/A
-0.3
-0.3

Low Alarm
Threshold
(dBm)
--------N/A
N/A
-0.5
-0.5

Optical
Receive Power
(dBm)
----------------N/A
-30.9
N/A
N/A

High Alarm
Threshold
(dBm)
---------8.1
8.1
5.9
5.9

High Warn
Threshold
(dBm)
--------8.1
8.1
-6.7
-6.7

Low Warn
Threshold
(dBm)
--------N/A
N/A
-28.5
-28.5

Low Alarm
Threshold
(dBm)
--------N/A
N/A
-28.5
-28.5

Temperature
Port
(Celsius)
------- -----------------Gi1/1
48.1
Gi1/2
34.9
Gi2/1
43.5
Gi2/2
39.1

Port
------Gi1/1
Gi1/2
Gi2/1
Gi2/2
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-769

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces transceiver

This example shows how to display the threshold violations for all the transceivers on a Catalyst 6500
series switch:
Router# show interfaces transceiver threshold violations
Rx: Receive, Tx: Transmit.
DDDD: days, HH: hours, MM: minutes, SS: seconds
Time since Last Known
Time in slot
Threshold Violation
Port
(DDDD:HH:MM:SS) (DDDD:HH:MM:SS)
------- --------------- ---------------------Gi1/1
0000:00:03:41
Not applicable
Gi2/1
0000:00:03:40
0000:00:00:30
0000:00:00:30
Gi2/2

0000:00:03:40

Not applicable

Type(s) of Last Known
Threshold Violation(s)
---------------------Not applicable
Tx bias high warning
50.5 mA > 40.0 mA
Tx power low alarm
-17.0 dBm < -0.5 dBm
Not applicable

Router#

This example shows how to display the threshold violations for all transceivers on a specific module:
Router# show interfaces transceiver threshold violations module 2
lo: low, hi: high, warn: warning
DDDD: days, HH: hours, MM: minutes, SS: seconds
Time since Last Known
Time in slot
Threshold Violation
Port
(DDDD:HH:MM:SS) (DDDD:HH:MM:SS)
------- -------------- ---------------------Gi2/1
0000:00:03:40
0000:00:00:30
0000:00:00:30
Gi2/2

0000:00:03:40

Not applicable

Type(s) of Last Known
Threshold Violation
---------------------Tx bias high warning
50.5 mA > 40.0 mA
Tx power low alarm
-17.0 dBm < -0.5 dBm
Not applicable

Router#

This example shows how to display violations for the transceiver on a specific interface:
Router# show interfaces Gi2/1 transceiver threshold violations
Rx: Receive, Tx: Transmit.
DDDD: days, HH: hours, MM: minutes, SS: seconds
Time since Last Known
Time in slot
Threshold Violation
Port
(DDDD:HH:MM:SS) (DDDD:HH:MM:SS)
------- --------------- ---------------------Gi2/1
0000:00:03:40
0000:00:00:30
0000:00:00:30

Type(s) of Last Known
Threshold Violation(s)
---------------------Tx bias high warning
50.5 mA > 40.0 mA
Tx power low alarm
-17.0 dBm < -0.5 dBm

Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-770

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces trunk

show interfaces trunk
To display the interface-trunk information, use the show interfaces trunk command.
show interfaces [interface interface-number] trunk [module number]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section
for valid values.

module number

(Optional) Specifies the module number; see the “Usage Guidelines”
section for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify a keyword, only information for trunking ports is displayed.
The interface-number designates the module and port number. Valid values depend on the chassis and
module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.
The module number keyword and argument designate the module number and limit the display to
interfaces on the module. Valid values depend on the chassis that is used. For example, if you have a
13-slot chassis, valid values for the module number are from 1 to 13.

Examples

This example shows how to display the interface-trunk information for module 5:
Router# show interfaces trunk module 5
Port
Fa5/1
Fa5/2
Fa5/3
Fa5/4
Fa5/5
Fa5/6
Fa5/7
Fa5/8
Fa5/9

Mode
routed
routed
routed
routed
routed
off
off
off
desirable

Encapsulation
negotiate
negotiate
negotiate
negotiate
negotiate
negotiate
negotiate
negotiate
n-isl

Status
routed
routed
routed
routed
routed
not-trunking
not-trunking
not-trunking
trunking

Native vlan
1
1
1
1
1
10
10
1
1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-771

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces trunk

Fa5/10
Fa5/11
Fa5/12

desirable
routed
routed

negotiate
negotiate
negotiate

not-trunking
routed
routed

1
1
1

.
.
.
Fa5/48

routed

negotiate

routed

1

Port
Fa5/1
Fa5/2
Fa5/3
Fa5/4
Fa5/5
Fa5/6
Fa5/7
Fa5/8
Fa5/9
Fa5/10
Fa5/11
Fa5/12

Vlans allowed on trunk
none
none
none
none
none
none
none
200
1-1005
none
none
none

.
.
.
Fa5/48

none

Port
Vlans allowed and active in management domain
Fa5/1
none
Fa5/2
none
Fa5/3
none
Fa5/4
none
Fa5/5
none
Fa5/6
none
Fa5/7
none
Fa5/8
200
Fa5/9
1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
02,850,917,999,1002-1005
Fa5/10
none
Fa5/11
none
Fa5/12
none
.
.
.
Fa5/48

none

Port
Vlans in spanning tree forwarding state and not pruned
Fa5/1
none
Fa5/2
none
Fa5/3
none
Fa5/4
none
Fa5/5
none
Fa5/6
none
Fa5/7
none
Fa5/8
200
Fa5/9
1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
02,850,917,999,1002-1005
Fa5/10
none
Fa5/11
none

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-772

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces trunk

.
.
.
Fa5/48
Router#

none

This example shows how to display the trunking information for active trunking ports:
Router# show interfaces trunk
Port
Fa5/9

Mode
desirable

Encapsulation
n-isl

Port
Fa5/9

Vlans allowed on trunk
1-1005

Status
trunking

Native vlan
1

Port
Vlans allowed and active in management domain
Fa5/9
1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
02,850,917,999,1002-1005
Port
Vlans in spanning tree forwarding state and not pruned
Fa5/9
1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
02,850,917,999,1002-1005
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-773

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces unidirectional

show interfaces unidirectional
To display the operational state of an interface with a receive-only transceiver, use the show interfaces
unidirectional command.
show interfaces [interface interface-number] unidirectional [module number]

Syntax Description

interface

(Optional) Interface type; possible valid values are gigabitethernet and
tengigabitethernet.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section
for valid values.

module number

(Optional) Specifies the module number; see the “Usage Guidelines”
section for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify a keyword, only information for trunking ports is displayed.
The interface-number designates the module and port number. Valid values depend on the chassis and
module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 2 to 13 and valid values for the
port number are from 1 to 48.
The module number keyword and argument designate the module number and limit the display to
interfaces on the module. Valid values depend on the chassis that is used. For example, if you have a
13-slot chassis, valid values for the module number are from 2 to 13.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-774

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show interfaces unidirectional

Examples

This example shows how to display the operational state of an interface with a receive-only transceiver:
Router# show interfaces gigabitethernet5/2 unidirectional
Unidirectional configuration mode: send only
Unidirectional operational mode: receive only
CDP neighbour unidirectional configuration mode: off
Router#

Related Commands

Command

Description

show interfaces status

Displays the interface status or a list of interfaces in an error-disabled state
on LAN ports only.

unidirectional

Configures the software-based UDE.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-775

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show interfaces vlan mapping

show interfaces vlan mapping
To display the status of a VLAN mapping on a port, use the show interfaces vlan mapping command.
show interfaces [interface interface-number] vlan mapping

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, vlan, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number designates the module and port number or the VLAN number. Valid values
depend on the chassis and module that are used. For example, if you have a 48-port 10/100BASE-T
Ethernet module that is installed in a 13-slot chassis, valid values for the slot number are from 1 to 13
and valid values for the port number are from 1 to 48.

Examples

This example shows how to list all of the VLAN mappings that are configured on a port and indicate
whether such mappings are enabled or disabled on the port:
Router# show interfaces gigabitethernet5/2 vlan mapping
State: enabled
Original VLAN Translated VLAN
------------- --------------1649
755
Router#

Related Commands

Command

Description

show vlan mapping

Registers a mapping of an 802.1Q VLAN to an ISL VLAN.

switchport vlan
mapping enable

Enables VLAN mapping per switch port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-776

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip arp inspection

show ip arp inspection
To display the status of DAI for a specific range of VLANs, use the show ip arp inspection command.
show ip arp inspection [{interfaces [interface-name]} | {statistics [vlan vlan-range]}]

Syntax Description

interfaces interface-name

(Optional) Displays the trust state and the rate limit of ARP packets for
the provided interface.

statistics

(Optional) Displays statistics for the following types of packets that
have been processed by this feature: forwarded, dropped, MAC
validation failure, and IP validation failure.

vlan vlan-range

(Optional) Displays the statistics for the selected range of VLANs.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enter the statistics keyword, the configuration and operating state of DAI for the selected
range of VLANs is displayed.
If you do not specify the interface name, the trust state and rate limit for all applicable interfaces in the
system are displayed.

Examples

This example shows how to display the statistics of packets that have been processed by DAI for
VLAN 3:
Router# show ip arp inspection statistics vlan 3
Vlan
---3

Forwarded
--------31753

Dropped
------102407

Vlan
---3

DHCP Permits
-----------31753

ACL Permits
----------0

Vlan
Dest MAC Failures
-------------------3
0
Router#

DHCP Drops
---------102407

ACL Drops
---------0

Source MAC Failures
------------------0

IP Validation Failures
---------------------0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-777

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip arp inspection

This example shows how to display the statistics of packets that have been processed by DAI for all
active VLANs:
Router# show ip arp inspection statistics
Vlan
---1
2
3
4
100
101
1006
1007

Forwarded
--------0
0
68322
0
0
0
0
0

Dropped
------0
0
220356
0
0
0
0
0

Vlan
---1
2
3
4
100
101
1006
1007

DHCP Permits
-----------0
0
68322
0
0
0
0
0

ACL Permits
----------0
0
0
0
0
0
0
0

Vlan
Dest MAC Failures
-------------------1
0
2
0
3
0
4
0
100
0
101
0
1006
0
1007
0
Router#

DHCP Drops
---------0
0
220356
0
0
0
0
0

ACL Drops
---------0
0
0
0
0
0
0
0

Source MAC Failures
------------------0
0
0
0
0
0
0
0

IP Validation Failures
---------------------0
0
0
0
0
0
0
0

This example shows how to display the configuration and operating state of DAI for VLAN 1:
Router# show ip arp inspection vlan 1
Source Mac Validation
: Disabled
Destination Mac Validation : Disabled
IP Address Validation
: Disabled
Vlan
---1
Vlan
---1
Router#

Configuration
------------Enabled

Operation
--------Active

ACL Logging
----------Deny

DHCP Logging
-----------Deny

ACL Match
---------

Static ACL
----------

This example shows how to display the trust state of interface Fa6/3:
Router# show ip arp inspection interfaces fastEthernet 6/3
Interface
Trust State
Rate (pps)
Burst Interval
--------------- --------------------------------Fa6/1
Untrusted
20
5
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-778

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip arp inspection

This example shows how to display the trust state of the interfaces on the switch:
Router# show ip arp inspection interfaces
Interface
Trust State
Rate (pps)
--------------- -------------------Gi1/1
Untrusted
15
Gi1/2
Untrusted
15
Gi3/1
Untrusted
15
Gi3/2
Untrusted
15
Fa3/3
Trusted
None
Fa3/4
Untrusted
15
Fa3/5
Untrusted
15
Fa3/6
Untrusted
15
Fa3/7
Untrusted
15
Router#

Related Commands

Command

Description

arp access-list

Configures an ARP ACL for ARP inspection and QoS filtering and enters
the ARP ACL configuration submode.

clear ip arp inspection Clears the status of the log buffer.
log
show ip arp inspection Displays the status of DAI for a specific range of VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-779

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip arp inspection log

show ip arp inspection log
To show the status of the log buffer, use the show ip arp inspection log command.
show ip arp inspection log

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the current contents of the log buffer before and after the buffers are
cleared:
Router# show ip arp inspection log
Total Log Buffer Size : 10
Syslog rate : 0 entries per 10 seconds.
Interface
--------------Fa6/3
Fa6/3
Fa6/3
Fa6/3
Fa6/3
Fa6/3
Fa6/3
Fa6/3
Fa6/3
Fa6/3
-Router#

Vlan
----1
1
1
1
1
1
1
1
1
1
--

Sender MAC
Sender IP
Num of Pkts
----------------- --------------- ----------0002.0002.0002 1.1.1.2
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.3
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.4
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.5
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.6
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.7
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.8
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.9
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.10
1(12:02:52 UTC Fri
0002.0002.0002 1.1.1.11
1(12:02:52 UTC Fri
--5(12:02:52 UTC Fri

Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr

25
25
25
25
25
25
25
25
25
25
25

2003)
2003)
2003)
2003)
2003)
2003)
2003)
2003)
2003)
2003)
2003)

This example shows how to clear the buffer with the clear ip arp inspection log command:
Router# clear ip arp inspection log
Router# show ip arp inspection log
Total Log Buffer Size : 10
Syslog rate : 0 entries per 10 seconds.
No entries in log buffer.
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-780

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip arp inspection log

Related Commands

Command

Description

clear ip arp inspection Clears the status of the log buffer.
log
show ip arp inspection Shows the status of the log buffer.
log

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-781

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip auth-proxy watch-list

show ip auth-proxy watch-list
To display the information about the authentication proxy watch list, use the show ip auth-proxy
watch-list command.
show ip auth-proxy watch-list

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the authentication proxy watch list:
Router# show ip auth-proxy watch-list
Authentication Proxy Watch-list is enabled
Watch-list expiry timeout is 2 minutes
Total number of watch-list entries: 3
Source IP
12.0.0.2
12.0.0.3
1.2.3.4

Type
MAX_RETRY
TCP_NO_DATA
CFGED

Violation-count
MAX_LIMIT
MAX_LIMIT
N/A

Total number of watch-listed users: 3
Router#

Related Commands

Command

Description

clear ip auth-proxy
watch-list

Deletes a single watch-list entry or all watch-list entries.

ip auth-proxy
max-login-attempts

Limits the number of login attempts at a firewall interface.

ip auth-proxy
watch-list

Enables and configures an authentication proxy watch list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-782

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ipc

show ipc
To display IPC information, use the show ipc command.
show ipc {nodes | ports [open] | queue | status}

Syntax Description

nodes

Displays the participating nodes.

ports

Displays the local IPC ports.

open

(Optional) Displays the open ports only.

queue

Displays the contents of the IPC-retransmission queue.

status

Displays the status of the local IPC server.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display participating nodes:
Router# show ipc nodes
There are 66 nodes in this IPC realm.
ID
Type
Name
2210000
2000000
2010000
2020000
2040000

Local
ICC
ICC
ICC
ICC

Card33
Card0
Card1
Card2
Card4

Last
Sent
0
0
0
0
0

Last
Heard
0
0
0
0
0

0
0
270

0
0
17070

<... output truncated ...>
23E0000 ICC
23F0000 ICC
10000 ICC
Router#

Card62
Card63
IPC Master

This example shows how to display local IPC ports:
Router# show ipc ports
There are 6 ports defined.
Port ID
2210000.1
2210000.2
2210000.3
2210000.4
10000.3

Type
unicast
unicast
unicast
unicast
unicast

Name
Card33:Zone
Card33:Echo
Card33:Control
Remote TTY Server Port
IPC Master:Control

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-783

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ipc

2210000.5
unknown
Card33:Request
port_index = 0 seat_id = 0x10000
port_index = 1 seat_id = 0x10000
Router#

last sent = 0
last sent = 0

last heard = 1158
last heard = 0

This example shows how to display open IPC ports:
Router# show ipc ports open
There are 4 ports defined.
Port ID
Type
Name
10000.7
unicast
Unknown
port_index = 0 last sent = 2

last heard = 0

10000.8
unicast
Unknown
port_index = 0 last sent = 0

last heard = 0

10000.9
unicast
Unknown
port_index = 0 last sent = 17753 last heard = 0
port_index = 1 last sent = 0
last heard = 0
Router#

This example shows how to display the contents of the IPC-retransmission queue:
Router# show ipc queue
There are 0 IPC messages waiting for acknowledgement in the transmit queue.
There are 0 IPC messages waiting for a response.
There are 0 IPC messages waiting for additional fragments.
There are 2 messages currently in use by the system.
Router#

This example shows how to display the status of the local IPC server:
Router# show ipc status
IPC System Status:
This processor is a slave server.
1000 IPC message headers in cache
377053 messages in, 293133 out, 210699 delivered to local port,
83655 acknowledgements received, 83870 sent,
0 NACKS received, 0 sent,
0 messages dropped on input, 0 messages dropped on output
0 no local port, 0 destination unknown, 0 no transport
0 missing callback or queue, 0 duplicate ACKs, 0 retries,
0 message timeouts.
0 ipc_output failures, 0 mtu failures,
0 msg alloc failed, 0 emer msg alloc failed, 0 no origs for RPC replies
0 pak alloc failed, 0 memd alloc failed
0 no hwq, 0 failed opens, 0 hardware errors
No regular dropping of IPC output packets for test purposes
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-784

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cache flow

show ip cache flow
To display a summary of the NetFlow cache-flow entries, use the show ip cache flow command.
show ip cache flow [aggregation type [module num]]

Syntax Description

aggregation
type

(Optional) Displays the configuration of a particular aggregation cache; see the
“Usage Guidelines” section for valid values.

module num (Optional) Displays information about a specific module.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Valid values for aggregation type are as follows:
•

as—AS aggregation cache

•

destination-prefix—Destination-prefix aggregation cache

•

prefix—Source/destination-prefix aggregation cache

•

protocol-port—Protocol and port aggregation cache

•

source-prefix—Source-prefix aggregation cache

If you enter the show ip cache flow aggregation command without the module num, the
software-switched aggregation cache on the route processor (RP) is displayed.

Examples

This example shows how to display a summary of the NetFlow cache-flow entries:
Router# show ip cache flow
IP packet size distribution (0 total packets):
1-32 64 96 128 160 192 224 256 288 320 352 384 416
448
480
.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
.000 .000
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
IP Flow Switching Cache, 0 bytes
0 active, 0 inactive, 0 added
0 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-785

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cache flow

Inactive flows timeout in 15 seconds
last clearing of statistics never
Protocol Total Flows Packets Bytes Packets Active(Sec)
Idle(Sec)
-------- Flows /Sec /Flow /Pkt /Sec /Flow
/Flow
SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP
DstP
Pkts
Displaying Hardware entries in Module 7
SrcIf SrcIPaddress DstIPaddress Pr SrcP
DstP Pkts
Fa5/11 11.1.1.38 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.39 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.40 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.41 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.42 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.43 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.44 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.45 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.46 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.47 12.1.1.2 udp 63
63 986796
Fa5/11 11.1.1.48 12.1.1.2 udp 63
63 986796
Router#

This example shows how to display the information about a destination-prefix aggregation cache for a
specific module:
Router# show ip cache flow aggregation destination-prefix module 1
IPFLOW_DST_PREFIX_AGGREGATION records and statistics for module :1
IP Flow Switching Cache, 278544 bytes
2 active, 4094 inactive, 6 added
236 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes
Inactive flows timeout in 15 seconds
Dst If
Gi7/9
Gi7/10
Router#

Dst Prefix
9.1.0.0
11.1.0.0

Msk
/16
/16

AS
0
0

Flows Pkts B/Pk
3003
12M
64
3000 9873K
64

Active
1699.8
1699.8

Table 2-39 describes the show ip cache flow command output fields.
Table 2-39 show ip cache flow Command Output Fields—Packet Size Distribution

Field

Description

IP packet size
distribution

Two lines below this banner that show the percentage distribution
of packets by size range. In this display, 55.4% of the packets fall
in the size range of 33 to 64 bytes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-786

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cache flow

Table 2-40 describes the fields in the flow-switching cache lines of the output.
Table 2-40 show ip cache flow Command Output Fields—Flow-Switching Cache

Field

Description

bytes

Number of bytes of memory that the NetFlow cache uses.

active

Number of active flows in the NetFlow cache at the time this command
was entered.

inactive

Number of flow buffers that are allocated in the NetFlow cache but are
not currently assigned to a specific flow at the time this command was
entered.

added

Number of flows that were created since the start of the summary period.

ager polls

Number of times that the NetFlow code looked at the cache to expire
entries (used by Cisco for diagnostics only).

flow alloc failures

Number of times that the NetFlow code tried to allocate a flow but could
not.

Exporting flows to

IP address and UDP port number of the workstation to which flows are
exported.

Exporting using source
interface

Interface type that is used as the source IP address.

Version 5 flow records,
peer-as

Exported packets that use version 5 format and the export statistics that
include the peer AS for the source and destination. The number of records
stored in the datagram is between 1 and 30 for version 5.

Active flows timeout in Timeout period for active flows in the NetFlow cache.
flows exported in udp
datagrams

Total number of flows that are exported and the total number of UDP
datagrams that are used to export the flows to the workstation.

failed

Number of flows that could not be exported by the router because of
output interface limitations.

last clearing of statistics Standard time output (hh:mm:ss) since the clear ip flow stats command
was executed. This time output changes to hours and days after the time
exceeds 24 hours.
Table 2-41 describes the fields in the NetFlow cctivity by protocol lines of the output.
Table 2-41 show ip cache flow Command Output Fields—NetFlow Activity by Protocol

Field

Description

Protocol

IP protocol and the well-known port number as described in RFC 1340.

Total Flows

Number of flows for this protocol since the last time that the statistics were
cleared.

Flows/Sec

Average number of flows for this protocol seen per second; equal to total
flows/number of seconds for this summary period.

Packets/Flow

Average number of packets observed for the flows seen for this protocol. Equal
to total packets for this protocol/number of flows for this protocol for this
summary period.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-787

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cache flow

Table 2-41 show ip cache flow Command Output Fields—NetFlow Activity by Protocol (continued)

Field

Description

Bytes/Pkt

Average number of bytes observed for the packets seen for this protocol. Equal
to total bytes for this protocol/total number of packets for this protocol for this
summary period.

Packets/Sec

Average number of packets for this protocol per second. Equal to total packets
for this protocol/total number of seconds for this summary period.

Active(Sec)/Flo
w

Sum of all the seconds from the first packet to the last packet of an expired flow
(for example, TCP FIN, time-out, and so forth) in seconds/total flows for this
protocol for this summary period.

Idle(Sec)/Flow

Sum of all the seconds from the last packet seen in each nonexpired flow for this
protocol until the time this command was entered in seconds/total flows for this
summary period.

Table 2-42 describes the fields in the current flow lines of the output.
Table 2-42 show ip cache flow Command Output Fields—Current Flow

Related Commands

Field

Description

SrcIf

Internal port name for the source interface.

SrcIPaddress

Source-IP address for this flow.

DstIf

Router internal port name for the destination interface.

DstIPaddress

Destination-IP address for this flow.

Pr

IP protocol; for example, 6=TCP, 17=UDP, …. as defined in RFC 1340.

SrcP

Source port address, TCP/UDP “well known” port number, as defined in RFC 1340.

DstP

Destination-port address, TCP/UDP “well known” port number, as defined in
RFC 1340.

Pkts

Number of packets observed for this flow.

B/Pkt

Average observed number of bytes per packet for this flow.

Active

Number of seconds between first and last packet of a flow.

Command

Description

ip flow-aggregation
cache

Creates a flow-aggregation cache and enters the aggregation cache
configuration mode.

ip flow-cache entries

Changes the number of entries that are maintained in the NetFlow cache.

clear ip flow stats

Clears the NetFlow-switching statistics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-788

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cache verbose flow

show ip cache verbose flow
To display a detailed summary of NetFlow statistics, use the show ip cache verbose flow command.
show ip cache verbose flow

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Use the show ip cache verbose flow command to display the flow record fields in the NetFlow cache
in addition to the fields that are displayed with the show ip cache flow command. The values in the
additional fields that are shown depend on the NetFlow features that are enabled and the flags that are
set in the flow.

The flags and the fields displayed vary from flow to flow.
When you configure the MPLS-aware NetFlow feature, you can use the show ip cache verbose flow
command to display both the IP and MPLS portions of the MPLS flows in the NetFlow cache on a router
module. To display only the IP portion of the flow record in the NetFlow cache when MPLS-aware
NetFlow is configured, use the show ip cache flow command.

Examples

This example shows how to display a detailed summary of NetFlow statistics:
Router# show ip cache verbose flow
IP packet size distribution (1094508 total packets):
1-32
64
96 128 160 192 224 256 288 320 352 384 416 448 480
.000 1.00 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
IP Flow Switching Cache, 4456704 bytes
2 active, 65534 inactive, 2 added
298 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes
Inactive flows timeout in 15 seconds
IP Sub Flow Cache, 270600 bytes
4 active, 16380 inactive, 4 added, 2 added to flow
0 alloc failures, 0 force free

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-789

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cache verbose flow

1 chunk, 1 chunk added
last clearing of statistics never
Protocol
Total
Flows
Packets Bytes
-------Flows
/Sec
/Flow /Pkt
SrcIf
Port Msk AS
IPM: OPkts
SrcIf
Port Msk AS
IPM: OPkts
Fa5/11
0000 /16 0
FO: 1
Fa5/11
0000 /16 0
FO: 1

SrcIPaddress

Packets Active(Sec) Idle(Sec)
/Sec
/Flow
/Flow

DstIf
Port Msk AS

DstIPaddress
NextHop

Pr TOS Flgs Pkts
B/Pk Active

DstIf
Port Msk AS

DstIPaddress
NextHop

Pr TOS Flgs Pkts
B/Pk Active

Fa5/12
0000 /16 0

12.1.1.2
12.1.1.2

06 5B

00
46

551K
149.7

Fa5/12
0000 /16 0

12.1.1.2
12.1.1.2

06 5B

00
46

553K
150.4

OBytes
SrcIPaddress
OBytes
11.1.1.2

11.1.1.3

Displaying Hardware entries in Module 7
SrcIf
SrcIPaddress
DstIPaddress
Pkts
-0.0.0.0
0.0.0.0
0

Pr

SrcP
0

DstP

0

3

Router#

Table 2-43 describes the fields shown in the NetFlow cache lines of the display.
Table 2-43 show ip cache verbose flow Field Descriptions in the NetFlow Cache Display

Field

Description

bytes

Number of bytes of memory that are used by the NetFlow cache.

active

Number of active flows in the NetFlow cache at the time this
command was entered.

inactive

Number of flow buffers that are allocated in the NetFlow cache
but that are not assigned to a specific flow at the time this
command is entered.

added

Number of flows that were created since the start of the summary
period.

ager polls

Number of times that the NetFlow code caused entries to expire
(used by Cisco for diagnostics only).

flow alloc failures

Number of times that the NetFlow code tried to allocate a flow but
could not.

last clearing of statistics

Standard time output (hh:mm:ss) since the clear ip flow stats
privileged EXEC command was last executed. This time output
changes to hours and days after the time exceeds 24 hours.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-790

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cache verbose flow

Table 2-44 describes the fields shown in the activity by the protocol lines of the display.
Table 2-44 show ip cache verbose flow Field Descriptions in Activity By Protocol Display

Field

Description

Protocol

IP protocol and port number. (Go to http://www.iana.org, Protocol
Assignment Number Services, for the latest RFC values.)
Note

Only a small subset of all protocols is displayed.

Total Flows

Number of flows for this protocol since the last time statistics were
cleared.

Flows/Sec

Average number of flows for this protocol per second; equal to the
total flows divided by the number of seconds for this summary period.

Packets/Flow

Average number of packets for the flows for this protocol; equal to the
total packets for this protocol divided by the number of flows for this
protocol for this summary period.

Bytes/Pkt

Average number of bytes for the packets for this protocol; equal to the
total bytes for this protocol divided by the total number of packets for
this protocol for this summary period.

Packets/Sec

Average number of packets for this protocol per second; equal to the
total packets for this protocol divided by the total number of seconds
for this summary period.

Active(Sec)/Flow

Number of seconds from the first packet to the last packet of an
expired flow (for example, TCP connection close request [FIN],
timeout, and so on) divided by the total flows for this protocol for this
summary period.

Idle(Sec)/Flow

Number of seconds observed from the last packet in each nonexpired
flow for this protocol until the time at which this command was
entered divided by the total flows for this protocol for this summary
period.

Table 2-45 describes the fields in the NetFlow record lines of the display.
Table 2-45 show ip cache verbose flow Field Descriptions in NetFlow Record Display

Field

Description

SrcIf

Interface on which the packet was received.

Port Msk AS

Source port number (displayed in hexadecimal format), IP address
mask, and autonomous system number. This field is always set to 0 in
MPLS flows.

SrcIPaddress

IP address of the device that transmitted the packet.

DstIf

Interface from where the packet was transmitted.

Port Msk AS

Destination port number (displayed in hexadecimal format), IP
address mask, and autonomous system. This field is always set to 0 in
MPLS flows.

DstIPaddress

IP address of the destination device.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-791

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cache verbose flow

Table 2-45 show ip cache verbose flow Field Descriptions in NetFlow Record Display (continued)

Field

Description

NextHop

BGP next-hop address. This field is always set to 0 in the MPLS
flows.

Pr

IP protocol port number, displayed in hexadecimal format.
(Go to http://www.iana.org, Protocol Assignment Number Services,
for the latest RFC values.)

Related Commands

TOS

Type of service, displayed in hexadecimal format.

B/Pk

Average number of bytes that are observed for the packets seen for
this protocol.

Flgs

TCP flags, shown in hexadecimal format (result of bitwise OR of TCP
flags from all packets in the flow).

Pkts

Number of packets in this flow.

Active

Time the flow has been active.

FO

Fragment offset.

Command

Description

ip flow-cache mpls
label positions

Enables MPLS-aware NetFlow.

ip route-cache flow

Enables NetFlow switching for IP routing.

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-792

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cef epoch

show ip cef epoch
To display the epoch information for the adjacency table and all FIB tables, use the show ip cef epoch
command.
show ip cef epoch

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

These show commands also display the epoch information for the following:
•

show ip cef summary—Displays the table epoch for a specific FIB table.

•

show ip cef detail—Displays the epoch value for each entry of a specific FIB table.

•

show adjacency summary—Displays the adjacency table epoch.

•

show adjacency detail—Displays the epoch value for each entry of the adjacency table.

This example shows how to display epoch information:
Router# show ip cef epoch
CEF epoch information:
Table:Default-table
Table epoch:2 (164 entries at this epoch)
Adjacency table
Table epoch:1 (33 entries at this epoch)

This example shows the output after you clear the epoch table and increment the epoch number:
Router# show ip cef epoch
CEF epoch information:
Table:Default-table
Table epoch:2 (164 entries at this epoch)
Adjacency table
Table epoch:1 (33 entries at this epoch)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-793

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cef epoch

Router# clear ip cef epoch full
Router# show ip cef epoch
CEF epoch information:
Table:Default-table
Table epoch:3 (164 entries at this epoch)
Adjacency table
Table epoch:2 (33 entries at this epoch)
Router#

Syntax Description

Command

Description

clear ip cef epoch full

Begins a new epoch and increments the epoch number for all tables
(including the adjacency table).

show ip cef

Displays entries in the FIB or displays a summary of the FIB.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-794

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cef inconsistency

show ip cef inconsistency
To display the IP CEF inconsistencies, use the show ip cef inconsistency command.
show ip cef [vrf vrf-name] inconsistency [records [detail]]

Syntax Description

vrf vrf-name

(Optional) Specifies a VRF instance.

records

(Optional) Displays all recorded inconsistencies.

detail

(Optional) Displays the detailed information for each CEF table entry.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command displays the recorded IP CEF inconsistency records found by the lc-detect, scan-rp,
scan-rib, and scan-lc detection mechanisms.
You can configure the IP CEF-prefix consistency-detection mechanisms using the ip cef table
consistency-check command.

Examples

This example shows how to display the recorded CEF inconsistency records:
Router# show ip cef inconsistency
Table consistency checkers (settle time 65s)
lc-detect:running
0/0/0 queries sent/ignored/received
scan-lc:running [100 prefixes checked every 60s]
0/0/0 queries sent/ignored/received
scan-rp:running [100 prefixes checked every 60s]
0/0/0 queries sent/ignored/received
scan-rib:running [1000 prefixes checked every 60s]
0/0/0 queries sent/ignored/received
Inconsistencies:0 confirmed, 0/16 recorded

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-795

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cef inconsistency

Table 2-46 describes the fields shown in the display.
Table 2-46 show ip cef inconsistency Field Descriptions

Related Commands

Field

Description

settle time

Time after a recorded inconsistency is confirmed.

lc-detect running

Consistency checker lc-detect is running.

0/0/0 queries

Number of queries sent, ignored, and received.

Inconsistencies:

Number of inconsistencies confirmed and recorded. The maximum
number of inconsistency records to be recorded is 16.

Command

Description

clear ip cef
inconsistency

Clears the statistics and records for the CEF-consistency checker.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-796

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip cef summary

show ip cef summary
To display a summary of the IP CEF table, use the show ip cef summary command.
show ip cef summary

Syntax Description

This command has no keywords and arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display a summary of the IP CEF table:
Router# show ip cef summary
IP Distributed CEF with switching (Table Version 25), flags=0x0
21 routes, 0 reresolve, 0 unresolved (0 old, 0 new), peak 1
21 leaves, 16 nodes, 19496 bytes, 36 inserts, 15 invalidations
0 load sharing elements, 0 bytes, 0 references
universal per-destination load sharing algorithm, id 5163EC15
3(0) CEF resets, 0 revisions of existing leaves
Resolution Timer: Exponential (currently 1s, peak 1s)
0 in-place/0 aborted modifications
refcounts: 4377 leaf, 4352 node
Table epoch: 0 (21 entries at this epoch)
Adjacency Table has 9 adjacencies
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-797

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip cef vlan

show ip cef vlan
To display the information about the IP CEF VLAN interface status, the configuration, and the prefixes
for a specific interface, use the show ip cef vlan command.
show ip cef vlan vlan-id [detail]

Syntax Description

vlan-id

VLAN number; valid values are from 1 to 4094.

detail

(Optional) Displays the detailed information about the IP CEF VLAN interface.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the prefixes for a specific VLAN:
Router> show ip cef vlan 1003
Prefix
Next Hop
0.0.0.0/0
172.20.52.1
0.0.0.0/32
receive
10.7.0.0/16
172.20.52.1
10.16.18.0/23
172.20.52.1
Router>

Interface
FastEthernet3/3
FastEthernet3/3
FastEthernet3/3

This example shows how to display detailed IP CEF information for a specific VLAN:
Router> show ip cef vlan 1003 detail
IP Distributed CEF with switching (Table Version 2364), flags=0x0
1383 routes, 0 reresolve, 0 unresolved (0 old, 0 new)
1383 leaves, 201 nodes, 380532 bytes, 2372 inserts, 989 invalidations
0 load sharing elements, 0 bytes, 0 references
universal per-destination load sharing algorithm, id 9B6C9823
3 CEF resets, 0 revisions of existing leaves
refcounts: 54276 leaf, 51712 node
Adjacency Table has 5 adjacencies
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-798

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip dhcp relay information trusted-sources

show ip dhcp relay information trusted-sources
To list all the configured trusted interfaces, use the show ip dhcp relay information trusted-sources
command.
show ip dhcp relay information trusted-sources

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display a list of all the configured trusted interfaces:
Router# show ip dhcp relay information trusted-sources
List of trusted sources of relay agent information option:
Vlan60
Vlan62
Router#

Related Commands

Command

Description

ip dhcp relay
information option
trust-all

Enables all the interfaces as trusted sources of the DHCP relay-agent
information option.

ip dhcp relay
information trust

Enables an interface as a trusted source of the DHCP relay-agent
information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-799

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip dhcp snooping

show ip dhcp snooping
To display the DHCP snooping configuration, use the show ip dhcp snooping command.
show ip dhcp snooping [statistics [detail]]

Syntax Description

statistics

(Optional) Displays statistics information about DHCP snooping.

detail

(Optional) Displays the detailed information about DHCP snooping.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the DHCP snooping configuration:
Router# show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs:
5 10
Insertion of option 82 is enabled
Interface
Trusted
Rate limit (pps)
----------------------------------------FastEthernet6/11
no
10
FastEthernet6/36
yes
50
Router#

This example shows how to display the DHCP snooping statistics information:
Router# show ip dhcp snooping statistics
Packets Processed by DHCP Snooping
Packets Dropped Because
IDB not known
Queue full
Interface is in errdisabled
Rate limit exceeded
Received on untrusted ports
Nonzero giaddr
Source mac not equal to chaddr
No binding entry
Insertion of opt82 fail
Unknown packet
Interface Down
Unknown output interface
Router#

= 0
=
=
=
=
=
=
=
=
=
=
=
=

0
0
0
0
0
0
0
0
0
0
0
0

This example shows how to display detailed DHCP snooping statistics information:
Router# show ip dhcp snooping statistics detail
Packets Forwarded

= 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-800

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip dhcp snooping

Packets Dropped
Packets Dropped From untrusted ports
Router#

Related Commands

Command

= 0
= 0

Description

clear ip dhcp snooping Clears the IP DHCP table entries.
ip dhcp snooping

Globally enables DHCP snooping.

ip dhcp snooping
binding

Sets up and generates a DHCP binding configuration to restore bindings
across reboots.

ip dhcp snooping
database

Configures the DHCP snooping database.

ip dhcp snooping
information option

Enables DHCP option 82 data insertion.

ip dhcp snooping limit Configures the number of the DHCP messages that an interface can receive
rate
per second.
ip dhcp snooping
packets

Enables DHCP snooping on the tunnel interface.

ip dhcp snooping
verify mac-address

Verifies that the source MAC address in a DHCP packet matches the client
hardware address on an untrusted port.

ip dhcp snooping vlan

Enables DHCP snooping on a VLAN or a group of VLANs.

show ip dhcp snooping Displays the DHCP snooping binding entries.
binding
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-801

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip dhcp snooping binding

show ip dhcp snooping binding
To display the DHCP snooping binding entries, use the show ip dhcp snooping binding command.
show ip dhcp snooping binding [ip-address] [mac-address] [vlan vlan]
[interface interface interface-num]

Syntax Description

ip-address

(Optional) IP address for the binding entries.

mac-address

(Optional) MAC address for the binding entries.

vlan vlan

(Optional) Specifies a valid VLAN number; valid values are from 1 to 4094.

interface interface

(Optional) Specifies the interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, and tengigabitethernet.

interface-num

Module and port number.

Defaults

If no argument is specified, the switch displays the entire DHCP snooping binding table.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

DHCP snooping is enabled on a VLAN only if both the global snooping and the VLAN snooping are
enabled.

Examples

This example shows how to display the DHCP snooping binding entries for a switch:

Router# show ip dhcp snooping binding
MacAddress
----------0000.0100.0201
Router#

IP Address
----------10.0.0.1

Lease (seconds)
---------------1600

Type
------------dhcp-snooping

VLAN
-----

Interface
-----------100
FastEthernet3/1

This example shows how to display an IP address for DHCP snooping binding entries:
Router# show ip dhcp snooping binding 172.100.101.102
MacAddress
----------0000.0100.0201
Router#

IP Address
Lease (seconds)
-------------------------172.100.101.102
1600

Type
------------dhcp-snooping

VLAN
-----

Interface
-----------100
FastEthernet3/1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-802

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip dhcp snooping binding

This example shows how to display the MAC address for the DHCP snooping binding entries:
Router# show ip dhcp snooping binding 55.5.5.2 0002.b33f.3d5f
MacAddress
-----------------00:02:B3:3F:3D:5F
Router#

IpAddress
--------------55.5.5.2

Lease(sec)
---------492

Type
------------dhcp-snooping

VLAN Interface
---- -------------------99 FastEthernet6/36

This example shows how to display the DHCP snooping binding entries’ MAC address for a specific
VLAN:
Router# show ip dhcp snooping binding 55.5.5.2 0002.b33f.3d5f vlan 99
MacAddress
-----------------00:02:B3:3F:3D:5F
Router#

IpAddress
--------------55.5.5.2

Lease(sec)
---------479

Type
------------dhcp-snooping

VLAN
---99

Interface
-------------------FastEthernet6/36

This example shows how to display the dynamic DHCP snooping binding entries:
Router# show ip dhcp snooping binding dynamic
MacAddress
----------0000.0100.0201
Router#

IP Address
----------10.0.0.1

Lease (seconds)
---------------1600

Type
-----------dhcp-snooping

VLAN
-----

Interface
-----------100
FastEthernet3/1

This example shows how to display the DHCP snooping binding entries on VLAN 100:
Router# show ip dhcp snooping binding vlan 100
MacAddress
----------0000.0100.0201
Router#

IP Address
----------10.0.0.1

Lease (seconds)
---------------1600

Type
-----------dhcp-snooping

VLAN
-----

Interface
-----------100
FastEthernet3/1

This example shows how to display the DHCP snooping binding entries on Ethernet interface 0/1:
Router# show ip dhcp snooping binding interface fastethernet3/1
MacAddress
----------0000.0100.0201
Router#

IP Address
----------10.0.0.1

Lease (seconds)
---------------1600

Type
-----------dhcp-snooping

VLAN
-----

Interface
-----------100
FastEthernet3/1

Table 2-47 describes the fields in the show ip dhcp snooping command output.
Table 2-47 show ip dhcp snooping Command Output

Field

Description

Mac Address

Client hardware MAC address.

IP Address

Client IP address assigned from the DHCP server.

Lease (seconds)

IP address lease time.

Type

Binding type; statically configured from CLI or dynamically learned.

VLAN

VLAN number of the client interface.

Interface

Interface that connects to the DHCP client host.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-803

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip dhcp snooping binding

Related Commands

Command

Description

ip dhcp snooping

Globally enables DHCP snooping.

ip dhcp snooping
binding

Sets up and generates a DHCP binding configuration to restore bindings
across reboots.

ip dhcp snooping
database

Configures the DHCP snooping database.

ip dhcp snooping
information option

Enables DHCP option 82 data insertion.

ip dhcp snooping limit Configures the number of the DHCP messages that an interface can receive
rate
per second.
ip dhcp snooping
packets

Enables DHCP snooping on the tunnel interface.

ip dhcp snooping
verify mac-address

Verifies that the source MAC address in a DHCP packet matches the client
hardware address on an untrusted port.

ip dhcp snooping vlan

Enables DHCP snooping on a VLAN or a group of VLANs.

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the status of the DHCP snooping database agent.
database

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-804

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip dhcp snooping database

show ip dhcp snooping database
To display the status of the DHCP snooping database agent, use the show ip dhcp snooping database
command.
show ip dhcp snooping database [detail]

Syntax Description

detail

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Provides additional operating state and statistics information.

This example shows how to display the DHCP snooping database:
Router# show ip dhcp snooping database
Agent URL :
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Agent Running : No
Delay Timer Expiry : Not Running
Abort Timer Expiry : Not Running
Last Succeded Time : None
Last Failed Time : None
Last Failed Reason : No failure recorded.
Total Attempts
Successful Transfers
Successful Reads
Successful Writes
Media Failures

:
:
:
:
:

0
0
0
0
0

Startup Failures
Failed Transfers
Failed Reads
Failed Writes

:
:
:
:

0
0
0
0

Router#

This example shows how to view additional operating statistics:
Router# show ip dhcp snooping database detail
Agent URL : tftp://10.1.1.1/directory/file
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Agent Running : No
Delay Timer Expiry : 7 (00:00:07)
Abort Timer Expiry : Not Running
Last Succeded Time : None

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-805

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip dhcp snooping database

Last Failed Time : 17:14:25 UTC Sat Jul 7 2001
Last Failed Reason : Unable to access URL.
Total Attempts
Successful Transfers
Successful Reads
Successful Writes
Media Failures

:
:
:
:
:

21
0
0
0
0

Startup Failures
Failed Transfers
Failed Reads
Failed Writes

:
:
:
:

0
21
0
21

First successful access: Read
Last ignored bindings counters
Binding Collisions
:
Invalid interfaces
:
Parse failures
:
Last Ignored Time : None

:
0
0
0

Expired leases
:
Unsupported vlans :

0
0

Total ignored bindings counters:
Binding Collisions
:
0
Invalid interfaces
:
0
Parse failures
:
0

Expired leases
:
Unsupported vlans :

0
0

Router#

Related Commands

Command

Description

ip dhcp snooping

Globally enables DHCP snooping.

ip dhcp snooping
binding

Sets up and generates a DHCP binding configuration to restore bindings
across reboots.

ip dhcp snooping
database

Configures the DHCP snooping database.

ip dhcp snooping
information option

Enables DHCP option 82 data insertion.

ip dhcp snooping limit Configures the number of the DHCP messages that an interface can receive
rate
per second.
ip dhcp snooping
packets

Enables DHCP snooping on the tunnel interface.

ip dhcp snooping
verify mac-address

Verifies that the source MAC address in a DHCP packet matches the client
hardware address on an untrusted port.

ip dhcp snooping vlan

Enables DHCP snooping on a VLAN or a group of VLANs.

show ip dhcp snooping Displays the DHCP snooping configuration.
show ip dhcp snooping Displays the DHCP snooping binding entries.
binding

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-806

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip flow-export

show ip flow-export
To display the information about the software-switched flows for the data export, including the main
cache and all other enabled caches, use the show ip flow export command.
show ip flow export [template | verbose]

Syntax Description

template

(Optional) Displays export template statistics information.

verbose

(Optional) Displays verbose export statistics information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the software-switched flows for NDE:
Router# show ip flow export
Flow export v1 is disabled for main cache
Version 1 flow records
0 flows exported in 0 udp datagrams
0 flows failed due to lack of export packet
0 export packets were sent up to process level
0 export packets were dropped due to no fib
0 export packets were dropped due to adjacency issues
0 export packets were dropped due to fragmentation failures
0 export packets were dropped due to encapsulation fixup failures
0 export packets were dropped enqueuing for the RP
0 export packets were dropped due to IPC rate limiting
Router#

This example shows how to display export template statistics information:
Router# show ip flow export template
No Template export information
No Option Templates exist
Template Options Flag = 0
Total number of Templates added = 0
Total active Templates = 0
Flow Templates active = 0
Flow Templates added = 0
Option Templates active = 0
Option Templates added = 0
Template ager polls = 0
Option Template ager polls = 0
Main cache version 9 export is disabled
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-807

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip flow-export

This example shows how to display export verbose statistics information:
Router# show ip flow export verbose
Flow export v1 is disabled for main cache
Version 1 flow records
0 flows exported in 0 udp datagrams
0 flows failed due to lack of export packet
0 export packets were sent up to process level
0 export packets were dropped due to no fib
0 export packets were dropped due to adjacency issues
0 export packets were dropped due to fragmentation failures
0 export packets were dropped due to encapsulation fixup failures
0 export packets were dropped enqueuing for the RP
0 export packets were dropped due to IPC rate limiting
Router#

Related Commands

Command

Description

clear adjacency

Clears the CEF adjacency table.

ip flow-aggregation
cache

Creates a flow-aggregation cache and enters the aggregation cache
configuration mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-808

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip igmp groups

show ip igmp groups
To display the multicast groups with receivers that are directly connected to the router and that were
learned through IGMP, use the show ip igmp groups command.
show ip igmp [vrf vrf-name] groups [group-name | group-address | interface-type
interface-number] [detail]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

group-name

(Optional) Name of the multicast group as defined in the DNS hosts table.

group-address

(Optional) Address of the multicast group in four-part, dotted-decimal
notation.

interface-type

(Optional) Interface type.

interface-number

(Optional) Interface number.

detail

(Optional) Provides a detailed description of the sources that are known
through IGMP Version 3 (IGMPv3), IGMP v3lite, or URL Rendezvous
Directory (URD).

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you omit all optional arguments and keywords, the show ip igmp groups command displays all
directly connected multicast groups by group address, interface type, and interface number.

Examples

This example shows how to display output from the show ip igmp groups command:
Router# show ip igmp groups
IGMP Connected Group Membership
Group Address
Interface
239.255.255.254
Ethernet3/1
224.0.1.40
Ethernet3/1
224.0.1.40
Ethernet3/3
224.0.1.1
Ethernet3/1
224.9.9.2
Ethernet3/1
232.1.1.1
Ethernet3/1

Uptime
1w0d
1w0d
1w0d
1w0d
1w0d
5d21h

Expires
00:02:19
00:02:15
never
00:02:11
00:02:10
stopped

Last Reporter
172.21.200.159
172.21.200.1
172.16.214.251
172.21.200.11
172.21.200.155
172.21.200.206

This example shows how to display output from the show ip igmp groups command with the
group-address argument and detail keyword:
Router# show ip igmp groups 232.1.1.1 detail
Interface:
Group:

Ethernet3/2
232.1.1.1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-809

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip igmp groups

Uptime:
01:58:28
Group mode:
INCLUDE
Last reporter: 10.0.119.133
CSR Grp Exp:
00:02:38
Group source list: (C - Cisco Src Report, U - URD, R - Remote)
Source Address
Uptime
v3 Exp
CSR Exp
Fwd Flags
172.16.214.1
01:58:28 stopped
00:02:31 Yes C

Table 2-48 describes the fields shown in the displays.
Table 2-48 show ip igmp groups Field Descriptions

Field

Description

Group Address

Address of the multicast group.

Interface

Interface through which the group is reachable.

Uptime

Time in weeks, days, hours, minutes, and seconds that this multicast
group has been known.

Expires

Time in weeks, days, hours, minutes, and seconds until the entry
expires. If an entry expires, then the entry (for a short period) shows
“now” before it is removed.
“never” indicates that the entry will not time out, because a local
receiver is on this router for this entry.
“stopped” indicates that timing out of this entry is not determined by
this expire timer. If the router is in INCLUDE mode for a group, then
the whole group entry times out after the last source entry has timed
out (unless the mode is changed to EXCLUDE mode before it times
out).

Last Reporter

Last host to report being a member of the multicast group. Both IGMP
v3lite and URD require a v2-report.

Group mode:

Either INCLUDE or EXCLUDE. The group mode is based on the type
of membership reports that are received on the interface for the group.
In the output for the show ip igmp groups detail command, the
EXCLUDE mode also shows the Expires: field for the group entry
(not shown in the output).

CSR Grp Exp

Shown for multicast groups in the SSM range. It indicates the time (in
hours, minutes, and seconds) since the last received group
membership report was received. Cisco IOS software needs to use
these reports for the operation of URD and IGMP v3lite, but the
reports do not indicate group membership by themselves.

Group source list:

Details of which sources have been requested by the multicast group.

Source Address

IP address of the source.

Uptime

Time since the source state was created.

v3 Exp

Time in hours, minutes, and seconds until the membership for the
source times out according to IGMP operations. “stopped” displays if
no member uses IGMPv3 (but only IGMP v3lite or URD).

CSR Exp

Time in hours, minutes, and seconds until the membership for the
source times out according to IGMP v3lite or URD reports. “stopped”
displays if members use only IGMPv3.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-810

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip igmp groups

Table 2-48 show ip igmp groups Field Descriptions (continued)

Related Commands

Field

Description

Fwd

Status of whether the router is forwarding multicast traffic due to this
entry.

Flags

Information about the entry. The Remote flag indicates that an
IGMPv3 report has been received by this source. The C flag indicates
that an IGMP v3lite or URD report was received by this source. The
U flag indicates that a URD report was received for this source.

Command

Description

ip igmp query-interval Configures the frequency at which Cisco IOS software sends IGMP host
query messages.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-811

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip igmp interface

show ip igmp interface
To display the information about the IGMP-interface status and configuration, use the show ip igmp
interface command.
show ip igmp [vrf vrf-name] interface [{interface [interface-number]} | {null interface-number}
| {vlan vlan-id}]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

Specifies the null interface; the valid value is 0.

vlan vlan-id

Specifies the VLAN; valid values are from 1 to 4094.

Defaults

If you do not specify a VLAN, information for VLAN 1 is shown.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
If you omit the optional arguments, the show ip igmp interface command displays information about
all interfaces.

Examples

This example shows how to display IGMP information for VLAN 43:
Router# show ip igmp interface vlan 43
Vlan43 is up, line protocol is up
Internet address is 43.0.0.1/24
IGMP is enabled on interface
Current IGMP host version is 2
Current IGMP router version is 2
IGMP query interval is 60 seconds
IGMP querier timeout is 120 seconds

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-812

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip igmp interface

IGMP max query response time is 10 seconds
Last member query count is 2
Last member query response interval is 1000 ms
Inbound IGMP access group is not set
IGMP activity: 1 joins, 0 leaves
Multicast routing is enabled on interface
Multicast TTL threshold is 0
Multicast designated router (DR) is 43.0.0.1 (this system)
IGMP querying router is 43.0.0.1 (this system)
Multicast groups joined by this system (number of users):
224.0.1.40(1)
IGMP snooping is globally enabled
IGMP snooping is enabled on this interface
IGMP snooping fast-leave is disabled and querier is disabled
IGMP snooping explicit-tracking is enabled on this interface
IGMP snooping last member query interval on this interface is 1000 ms
Router#

Related Commands

Command

Description

clear ip igmp group

Deletes the entries for the IGMP-group cache.

show ip igmp snooping Displays the information about the dynamically learned and manually
mrouter
configured multicast router interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-813

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip igmp snooping explicit-tracking

show ip igmp snooping explicit-tracking
To display the information about the explicit host-tracking status for IGMPv3 hosts, use the show ip
igmp snooping explicit-tracking command.
show ip igmp snooping explicit-tracking {vlan vlan-id}

Syntax Description

vlan vlan-id

Defaults

If you do not specify a VLAN, information for VLAN 1 is shown.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Specifies the VLAN; see the “Usage Guidelines” section for valid values.

Usage Guidelines

Explicit host tracking is supported only with IGMPv3 hosts.

Examples

This example shows how to display the information about the explicit host-tracking status for IGMPv3
hosts:
Router# show ip igmp snooping explicit-tracking vlan 25
Source/Group
Interface Reporter Filter_mode
-----------------------------------------------------------------------10.1.1.1/226.2.2.2 Vl25:1/2 16.27.2.3 INCLUDE
10.2.2.2/226.2.2.2 Vl25:1/2 16.27.2.3 INCLUDE
Router#

Related Commands

Command

Description

ip igmp snooping
explicit-tracking

Enables explicit host tracking.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-814

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip igmp snooping mrouter

show ip igmp snooping mrouter
To display the information about the dynamically learned and manually configured multicast router
interfaces, use the show ip igmp snooping mrouter command.
show ip igmp snooping mrouter [{vlan vlan-id}]

Syntax Description

vlan vlan-id

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Specifies a VLAN; valid values are from 1 to 4094.

You can also use the show mac-address-table command to display entries in the MAC-address table
for a VLAN that has IGMP snooping enabled.
You can display IGMP snooping information for VLAN interfaces by entering the show ip igmp
interface vlan vlan-num command.

Examples

This example shows how to display the information about IGMP snooping for a specific VLAN:
Router# show ip igmp snooping mrouter interface 1
vlan
ports
-----+---------------------------------------1
Gi1/1,Gi2/1,Fa3/48,Router
Router#

Related Commands

Command

Description

ip igmp snooping
mrouter

Configures a Layer 2 port as a multicast router port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-815

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip igmp snooping rate-limit

show ip igmp snooping rate-limit
To display the information about the IGMP snooping rate limit, use the show ip igmp snooping
rate-limit command.
show ip igmp snooping rate-limit [statistics | vlan vlan-id]

Syntax Description

statistics

(Optional) Displays IGMP snooping statistics.

vlan vlan-id

(Optional) Specifies a VLAN; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the statistics for IGMP snooping rate limiting:
Router# show ip igmp snooping rate-limit statistics
Max IGMP messages incoming rate : Not configured
Vlan
Incoming rate Rate-limiting ON Disable count Time to Enable
-----+---------------+----------------+---------------+---------------+
222
1000
No
0
111
5999
Yes
3
185
Router#

This example shows how to display IGMP snooping rate-limit information for a specific VLAN:
Router# show ip igmp snooping rate-limit vlan 19
Max IGMP messages incoming rate : 200 pps
Vlan
Incoming IGMP rate (in pps)
--------+--------------------------------19
200
Router#

Related Commands

Command

Description

ip igmp snooping rate

Sets the rate limit for IGMP snooping packets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-816

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip igmp snooping statistics

show ip igmp snooping statistics
To display IGMPv3 statistics, use the show ip igmp snooping statistics command.
show ip igmp snooping statistics [{interface interface [interface-number]} |
{port-channel number} | {vlan vlan-id}]

Syntax Description

interface interface

(Optional) Displays IGMP statistics for the specified interface type; possible
valid values are ethernet, fastethernet, and gigabitethernet.

interface-number

(Optional) Multicast-related statistics for the specified module and port; see
the “Usage Guidelines” section for valid values.

port-channel number

(Optional) Displays multicast-related statistics for the specified
port-channel; valid values are from 1 to 282.

vlan vlan-id

(Optional) Displays multicast-related statistics for the specified VLAN;
valid values for vlan-id are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show ip igmp snooping statistics command displays the following statistics:
•

List of ports that are members of a group

•

Filter mode

•

Reporter-address behind the port

•

Additional information (such as the last-join and last-leave collected since the previous time that a
clear ip igmp snooping statistics command was issued)

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.
The #hosts behind the VLAN is displayed only if you define the max-hosts policy on the specified
VLAN and enable the log policy for the specified VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-817

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip igmp snooping statistics

Examples

This example shows how to display IGMPv3 statistics:
Router# show ip igmp snooping statistics interface FastEthernet5/1
IGMP Snooping statistics
Service-policy: Policy1policy tied with this interface
#Channels: 3
#hosts : 3
Query Rx: 2901 GS Query Rx: 0 V3 Query Tot Rx: 0
Join Rx: 8686 Leave Rx: 0 V3 Report Rx: 2300
Join Rx from router ports: 8684 Leave Rx from router ports: 0
Total Rx: 11587
Channel/Group
Interface
Reporter
Uptime
Last-Join
10.7.20.1,239.1.1.1 F5/1
10.5.20.1 00:12:00 1:10:00
10.7.30.1,239.1.1.1 F5/1
10.5.30.1 00:50:10 1:10:02
10.7.40.1,239.1.1.1 F5/1
10.5.40.1 00:10:10 1:10:03
Router#

Last-Leave
0:30:02
-

Table 2-49 describes the fields that are shown in the example.
Table 2-49 show ip igmp snooping statistics Field Descriptions

Related Commands

Field

Description

Service-policy: Policy1

Policy tied to this interface.

#Channels: 3

Number of channels behind the specified interface.

#hosts

Number of hosts behind the specified interface. This
field is displayed only if max-hosts policy is used.

Command

Description

clear ip igmp snooping Clears the IGMP snooping statistics.
statistics

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-818

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip igmp udlr

show ip igmp udlr
To display UDLR information for the connected multicast groups on the interfaces that have a UDL
helper address configured, use the show ip igmp udlr command.
show ip igmp udlr [group-name | group-address | interface-type interface-number]

Syntax Description

group-name

(Optional) Name of the multicast group.

group-address

(Optional) Address of the multicast group.

interface-type interface-number

(Optional) Interface type and number.

Defaults

This command has no default settings.

Command Modes

User EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command displays which groups are being forwarded and received over the UDL.
On the upstream router, this command shows which interface is a UDL interface and which IP multicast
groups are being forwarded out that interface. The UDL Reporter is the IP address of the downstream
interface on the receiving router. If there is more than one downstream router, this field shows which
downstream router forwarded the IGMP host report to the upstream router over the ground-based
network. This report is forwarded over the UDL so that all downstream routers know which groups have
already been requested by other downstream routers, and additional IGMP host reports are suppressed.
On the downstream router, this command (in the Interface field) shows which local interface received
an IGMP host report (from a connected host for a specific group). The UDL Reporter is the IP address
of the router that had forwarded the IGMP host report to the upstream router over the ground-based
network. The UDL Interfaces column shows the interface on which IP multicast packets are being
received.

Examples

This example shows the output of the show ip igmp udlr command on an upstream router:
Router# show ip igmp udlr
IGMP UDLR Status, UDL Interfaces: Serial0
Group Address
Interface
UDL Reporter
224.2.127.254
Serial0
10.0.0.2
224.0.1.40
Serial0
10.0.0.2
225.7.7.7
Serial0
10.0.0.2
Router#

Reporter Expires
00:02:12
00:02:11
00:02:15

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-819

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip igmp udlr

This example shows the output of the show ip igmp udlr command on a downstream router:
Router# show ip igmp udlr
IGMP UDLR Status, UDL Interfaces: Serial0
Group Address
Interface
UDL Reporter
224.2.127.254
Serial0
10.0.0.2
224.0.1.40
Serial0
10.0.0.2
225.7.7.7
Serial0
10.0.0.2
Router#

Reporter Expires
00:02:49
00:02:48
00:02:52

Table 2-50 describes the fields shown in the output of the show ip igmp udlr command.
Table 2-50 show ip igmp udlr Field Descriptions

Field

Description

Group Address

All group’s helper addresses on the interface.

Interface

Interface type and number to which the group is connected.

UDL Reporter

IP address of the router on the UDL network that is IGMP helping
for the group.

Reporter Expires

How soon the UDL Reporter will become inactive, in
hours:minutes:seconds. This can occur under the following
conditions:
•

The UDL Reporter has become nonoperational.

•

The link or network to the reporter has become
nonoperational.

•

The group member attached to the UDL Reporter has left the
group.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-820

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip interface

show ip interface
To display the usability status of interfaces that are configured for IP, use the show ip interface
command.
show ip interface [type number]

Syntax Description

type

(Optional) Interface type.

number

(Optional) Interface number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The Cisco IOS software automatically enters a directly connected route in the routing table if the
interface is usable. A usable interface is one through which the software can send and receive packets.
If the software determines that an interface is not usable, it removes the directly connected routing entry
from the routing table. Removing the entry allows the software to use dynamic routing protocols to
determine backup routes to the network, if any.
If the interface can provide two-way communication, the line protocol is marked “up.” If the interface
hardware is usable, the interface is marked “up.”
If you specify an optional interface type, you see only information on that specific interface.
If you specify no optional arguments, you see information on all the interfaces.
When an asynchronous interface is encapsulated with PPP or Serial Line Internet Protocol (SLIP), IP
fast switching is enabled. The show ip interface command on an asynchronous interface that is
encapsulated with PPP or SLIP displays a message indicating that IP fast switching is enabled.

Examples

This example shows how to display the usability status for a specific VLAN:
Router# show ip interface vlan 1
Vlan1 is up, line protocol is up
Internet address is 10.6.58.4/24
Broadcast address is 255.255.255.255
Address determined by non-volatile memory
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-821

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip interface

Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Flow switching is disabled
IP CEF switching is enabled
IP Fast switching turbo vector
IP Normal CEF switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Probe proxy name replies are disabled
Policy routing is disabled
Network address translation is disabled
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
BGP Policy Mapping is disabled
Sampled Netflow is disabled
IP multicast multilayer switching is disabled
Netflow Data Export (hardware) is enabled
Router#

Table 2-51 describes the fields that are shown in the example.
Table 2-51 show ip interface Field Descriptions

Field

Description

Ethernet0 is up

If the interface hardware is usable, the interface is marked “up.”
For an interface to be usable, both the interface hardware and line
protocol must be up.

line protocol is up

If the interface can provide two-way communication, the line
protocol is marked “up.” For an interface to be usable, both the
interface hardware and line protocol must be up.

Internet address and subnet mask IP address and subnet mask of the interface.
Broadcast address

Broadcast address.

Address determined by...

Status of how the IP address of the interface was determined.

MTU

MTU value that is set on the interface.

Helper address

Helper address, if one has been set.

Secondary address

Secondary address, if one has been set.

Directed broadcast forwarding

Status of directed broadcast forwarding.

Multicast groups joined

Multicast groups to which this interface belongs.

Outgoing access list

Status of whether the interface has an outgoing access list set.

Inbound access list

Status of whether the interface has an incoming access list set.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-822

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip interface

Table 2-51 show ip interface Field Descriptions (continued)

Field

Description

Proxy ARP

Status of whether Proxy Address Resolution Protocol (ARP) is
enabled for the interface.

Security level

IP Security Option (IPSO) security level set for this interface.

Split horizon

Status of the split horizon.

ICMP redirects

Status of the redirect messages on this interface.

ICMP unreachables

Status of the unreachable messages on this interface.

ICMP mask replies

Status of the mask replies on this interface.

IP fast switching

Status of whether fast switching has been enabled for this
interface. Fast switching is typically enabled on serial interfaces,
such as this one.

IP SSE switching

Status of the IP silicon switching engine (SSE).

Router Discovery

Status of the discovery process for this interface. It is typically
disabled on serial interfaces.

IP output packet accounting

Status of IP accounting for this interface and the threshold
(maximum number of entries).

TCP/IP header compression

Status of compression.

Probe proxy name

Status of whether the HP Probe proxy name replies are generated.

WCCP Redirect outbound is
enabled

Status of whether packets that are received on an interface are
redirected to a cache engine.

WCCP Redirect exclude is
disabled

Status of whether packets that are targeted for an interface are
excluded from being redirected to a cache engine.

Netflow Data Export (hardware)
is enabled

NDE hardware flow status on the interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-823

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip mcache

show ip mcache
To display the contents of the IP fast-switching cache, use the show ip mcache command.
show ip mcache [vrf vrf-name] [group-address | group-name] [source-address | source-name]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing and
forwarding (VRF) instance.

group-address |
group-name

(Optional) Fast-switching cache for the single group.

source-address |
source-name

(Optional) If the source address or name is also specified, displays a single
multicast cache entry.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The group-address | group-name can be either a Class D IP address or a DNS name.
The source-address | source-name can be either a unicast IP address or a DNS name.

Examples

This example shows how to display the contents of the IP fast-switching cache. This entry shows a
specific source (wrn-source 226.62.246.73) sending to the World Radio Network group (224.2.143.24):
Router> show ip mcache wrn wrn-source
IP Multicast Fast-Switching Cache
(226.62.246.73/32, 224.2.143.24), Fddi0, Last used: 00:00:00
Ethernet0
MAC Header: 01005E028F1800000C1883D30800
Ethernet1
MAC Header: 01005E028F1800000C1883D60800
Ethernet2
MAC Header: 01005E028F1800000C1883D40800
Ethernet3
MAC Header: 01005E028F1800000C1883D70800

Table 2-52 describes the fields shown in the display.
Table 2-52 show ip mcache Field Descriptions

Field

Description

226.62.246.73

Source address.

224.2.143.24

Destination address.

Fddi0

Incoming or expected interface on which the packet should be received.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-824

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip mcache

Table 2-52 show ip mcache Field Descriptions (continued)

Field

Description

Last used:

Latest time that the entry was accessed for a packet that was successfully
fast switched. “Semi-fast” indicates that the first part of the outgoing
interface list is fast switched and the rest of the list is process level
switched.

Ethernet0

Outgoing interface list and respective MAC header that is used when
rewriting the packet for output. If the interface is a tunnel, the MAC header
shows the real next-hop MAC header and, in parentheses, the real interface
name.

MAC Header:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-825

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip mds interface

show ip mds interface
To display MDS information for all the interfaces on the module, use the show ip mds interface
command.
show ip mds interface [vrf vrf-name]

Syntax Description

vrf vrf-name

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Specifies the name that is assigned to the multicast VPN routing and
forwarding (VRF) instance.

This example shows how to display MDS information for all the interfaces on the module:
Router# show ip mds interface
Interface
Ethernet1/0/0
Ethernet1/0/1
Ethernet1/0/2
Ethernet1/0/3
Ethernet1/0/4
Ethernet1/0/5
Ethernet1/0/6
Ethernet1/0/7
POS2/0/0
POS3/0/0
Virtual-Access1
Loopback0
Tunnel0
Tunnel1
Ethernet1/0/3.1
Ethernet1/0/3.2

SW-Index
2
3
4
5
6
7
8
9
10
11
13
14
15
16
17
18

HW-Index
1
2
3
4
5
6
7
8
9
10
11
12
23
24
4
4

HW IDB
0x60C2DB40
0x60C32280
0x60C35E40
0x60C39E60
0x60C3D780
0x60C41140
0x60C453A0
0x60C48DC0
0x0
0x0
0x0
0x0
0x61C2E480
0x61C267E0
0x60C39E60
0x60C39E60

FS Vector
0x602FB7A4
0x603D52B8
0x602FB7A4
0x603D52B8
0x602FB7A4
0x602FB7A4
0x602FB7A4
0x602FB7A4

0x603D52B8
0x603D52B8
0x603D52B8
0x603D52B8

VRF
default
default
default
default
default
default
default
default
default
default
default
default
vrf1
vrf2
vrf1
vrf2

Table 2-53 describes the fields shown in the display.
Table 2-53 show ip mds interface Field Descriptions

Field

Description

Interface

Specified interface.

SW-Index

Software index.

HW-Index

Hardware index.

HW IDB

Hardware interface description block.

VRF

VPN routing/forwarding instance.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-826

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip mpacket

show ip mpacket
To display the contents of the circular cache-header buffer, use the show ip mpacket command.
show ip mpacket [vrf vrf-name] [group-address | group-name] [source-address | source-name]
[detail]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing
and forwarding (VRF) instance.

group-address |
group-name

(Optional) Cache headers matching the specified group address or group
name.

source-address |
source-name

(Optional) Cache headers matching the specified source address or source
name.

detail

(Optional) In addition to the summary information, displays the rest of the
IP header fields on an additional line, plus the first 8 bytes after the IP
header (usually the UDP port numbers).

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is applicable only when the ip multicast cache-headers command is in effect.
Each time that this command is entered, a new buffer is allocated. The summary display (when the detail
keyword is omitted) shows the IP packet identifier, time-to-live (TTL) value, source and destination IP
addresses, and a local time stamp when the packet was received.
The two arguments and one keyword can be used in the same command in any combination.

Examples

This example shows how to display the contents of the circular cache-header buffer:
Router # show ip mpacket smallgroup
IP Multicast Header Cache - entry count:6, next index: 7
Key: id/ttl timestamp (name) source group
D782/117
7302/113
6CB2/114
D782/117
E2E9/123
1CA7/127

206416.908
206417.908
206417.412
206417.868
206418.488
206418.544

(ABC-xy.company.com) 192.168.228.10 224.5.6.7
(school.edu) 147.12.2.17 224.5.6.7
(MSSRS.company.com) 154.2.19.40 224.5.6.7
(ABC-xy.company.com) 192.168.228.10 224.5.6.7
(Newman.com) 211.1.8.10 224.5.6.7
(teller.company.com) 192.168.6.10 224.5.6.7

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-827

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip mpacket

Table 2-54 describes the fields shown in the display.
Table 2-54 show ip mpacket Field Descriptions

Related Commands

Field

Description

entry count

Number of packets cached (one packet for each line in the display). The cache
has lines numbered from 0 to 1024.

next index

Index for the next element in the cache.

id

Identification number of the IP packet.

ttl

Current TTL of the packet.

timestamp

Time-stamp sequence number of the packet.

(name)

DNS name of the source sending to the group. Name appears in parentheses.

source

IP address of the source sending to the group.

group

Multicast group address to which the packet is sent. In this example, the group
address is the group name smallgroup.

Command

Description

ip multicast
cache-headers

Allocates a circular buffer to store IP multicast packet headers that the
router receives.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-828

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip mroute

show ip mroute
To display the information about the IP-multicast routing table, use the show ip mroute command.
show ip mroute [vrf vrf-name] [{interface interface-number} | {null interface-number} |
{port-channel number} | {vlan vlan-id} | {{host-name | host-address} [source]} | {active
[kbps | {interface-type num}]} | {count | pruned | static | summary}]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN routing and
forwarding (VRF) instance.

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number (Optional) Module and port number; see the “Usage Guidelines” section for valid
values.
null
(Optional) Specifies the null interface; the valid value is 0.
interface-number
port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 282.

vlan vlan-id

(Optional) Specifies the VLAN; valid values are from 1 to 4094.

host-name |
host-address

(Optional) Name or IP address as defined in the DNS hosts table.

source

(Optional) IP address or name of a multicast source.

active

(Optional) Displays the rate that active sources are sending to multicast groups.

kbps

(Optional) Minimum rate at which active sources are sending to multicast
groups; active sources sending at this rate or greater are displayed. Valid values
are from 1 to 4294967295 kbps.

count

(Optional) Displays the route and packet count information.

pruned

(Optional) Displays the pruned routes.

static

(Optional) Displays the static multicast routes.

summary

(Optional) Displays a one-line, abbreviated summary of each entry in the
IP-multicast routing table.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-829

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip mroute

Usage Guidelines

If you omit all optional arguments and keywords, the show ip mroute command displays all entries in
the IP-multicast routing table.
The show ip mroute active kbps command displays all sources sending at a rate greater than or equal
to kbps.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port-channel number values are from 257 to 282 are supported on the CSM and the FWSM only.
The multicast routing table is populated by creating source, group (S,G) entries from star, group (*,G)
entries. The star refers to all source addresses, the “S” refers to a single source address, and the “G” is
the destination multicast group address. In creating (S,G) entries, the software uses the best path to that
destination group that is found in the unicast routing table (through RPF).

Examples

This example shows how to display all entries in the IP-multicast routing table:
Router# show ip mroute 224.1.1.1
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate MSDP Advertisement,
U - URD, I - Received Source Specific Host Report, Z - Multicast Tunnel
Y - Joined MDT-data group, y - Sending to MDT-data group, s - SSM
Outgoing interface flags: H - Hardware switched
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 224.1.1.1), 00:00:07/00:02:59, RP 2.0.0.1, flags: BC
Bidir-Upstream: Null, RPF nbr 0.0.0.0, RPF-MFD
Outgoing interface list:
Vlan202, Forward/Sparse-Dense, 00:00:07/00:02:59, H
Router#

This example shows how to display the rate that active sources are sending to multicast groups and to
display only active sources sending at greater than the default rate:
Router# show ip mroute active
Active IP Multicast Sources - sending >= 4 kbps
Group: 224.2.127.254, (sdr.cisco.com)
Source: 146.137.28.69 (mbone.ipd.anl.gov)
Rate: 1 pps/4 kbps(1sec), 4 kbps(last 1 secs), 4 kbps(life avg)
Group: 224.2.201.241, ACM 97
Source: 130.129.52.160 (webcast3-e1.acm97.interop.net)
Rate: 9 pps/93 kbps(1sec), 145 kbps(last 20 secs), 85 kbps(life avg)
Group: 224.2.207.215, ACM 97
Source: 130.129.52.160 (webcast3-e1.acm97.interop.net)
Rate: 3 pps/31 kbps(1sec), 63 kbps(last 19 secs), 65 kbps(life avg)
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-830

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip mroute

This example shows how to display the information about the route and packet count:
Router# show ip mroute count
IP Multicast Statistics
56 routes using 28552 bytes of memory
13 groups, 3.30 average sources per group
Forwarding Counts:Pkt Count/Pkts per second/Avg Pkt Size/Kilobits per second
Other counts:Total/RPF failed/Other drops(OIF-null, rate-limit etc)
Group:224.2.136.89, Source count:1, Group pkt count:29051
Source:132.206.72.28/32, Forwarding:29051/-278/1186/0, Other:85724/8/56665
Router#

This example shows how to display summary information:
Router# show ip mroute summary
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, s - SSM Group, C - Connected, L - Local,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT, M - MSDP created entry, X - Proxy Join Timer Running
A - Advertised via MSDP, U - URD, I - Received Source Specific Host
Report
Outgoing interface flags: H - Hardware switched
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
Router#

Table 2-55 describes the fields that are shown in the example.
Table 2-55 show ip mroute Field Descriptions

Field

Description

Flags:

Information about the entry.

D - Dense

Entry is operating in dense mode.

S - Sparse

Entry is operating in sparse mode.

s - SSM Group

Entry is a member of an SSM group.

C - Connected

Member of the multicast group is present on the directly connected
interface.

L - Local

Router is a member of the multicast group.

P - Pruned

Route has been pruned. This information is retained in case a
downstream member wants to join the source.

R - Rp-bit set

Status of whether the (S,G) entry is pointing toward the route
processor. This field shows a prune state along the shared tree for
a particular source.

F - Register flag

Status of whether the software is registering for a multicast source.

T - SPT-bit set

Status of whether the packets have been received on the
shortest-path tree.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-831

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip mroute

Table 2-55 show ip mroute Field Descriptions (continued)

Field
J - Join SPT

Description
For (*, G) entries, indicates that the rate of traffic flowing down the
shared tree is exceeding the SPT-Threshold that is set for the
group. (The default SPT-Threshold setting is 0 kbps.) When the J
- Join SPT flag is set, the next (S,G) packet that is received down
the shared tree triggers an (S,G) join in the direction of the source
causing the router to join the source tree.
For (S,G) entries, indicates that the entry was created because the
SPT-Threshold for the group was exceeded. When the J - Join SPT
flag is set for (S,G) entries, the router monitors the traffic rate on
the source tree and attempts to switch back to the shared tree for
this source if the traffic rate on the source tree falls below the
group’s SPT-Threshold for more than 1 minute.
The router measures the traffic rate on the shared tree and
compares the measured rate to the group’s SPT-Threshold once
every second. If the traffic rate exceeds the SPT-Threshold, the
J - Join SPT flag is set on the (*, G) entry until the next
measurement of the traffic rate. The flag is cleared when the next
packet arrives on the shared tree and a new measurement interval
is started.
If the default SPT-Threshold value of 0 Kbps is used for the group,
the J - Join SPT flag is always set on (*, G) entries and is never
cleared. When the default SPT-Threshold value is used, the router
immediately switches to the shortest-path tree when traffic from a
new source is received.

Bidir-Upstream: Null, RPF
nbr 0.0.0.0, RPF-MFD

Interface that is used to reach the PIM route processor. Set to Null
if the router is the PIM route processor or if no route exists to the
PIM route processor.

Outgoing interface flags:

Information about the outgoing entry.

H - Hardware switched

Entry is hardware switched.

Timers:

Uptime/Expires.

Interface state:

Interface, Next-Hop or VCD, State/Mode.

(*, 224.0.255.1)
(198.92.37.100/32,
224.0.255.1)

Entry in the IP-multicast routing table. The entry consists of the IP
address of the source router followed by the IP address of the
multicast group. An asterisk (*) in place of the source router
indicates all sources.
Entries in the first format are referred to as (*,G) or “star comma
G” entries. Entries in the second format are referred to as (S,G) or
“S comma G” entries. (*,G) entries are used to build (S,G) entries.

uptime

Hours, minutes, and seconds that the entry has been in the
IP-multicast routing table.

expires

Hours, minutes, and seconds until the entry is removed from the
IP-multicast routing table on the outgoing interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-832

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip mroute

Table 2-55 show ip mroute Field Descriptions (continued)

Related Commands

Field

Description

RP

Address of the route processor. For routers and access servers
operating in sparse mode, this address is always 0.0.0.0.

flags:

Information about the entry.

Incoming interface:

Expected interface for a multicast packet from the source. If the
packet is not received on this interface, it is discarded.

RPF neighbor

IP address of the upstream router to the source. Tunneling indicates
that this router is sending data that is encapsulated in register
packets to the route processor. The hexadecimal number in
parentheses indicates to which route processor it is registering.
Each bit indicates a different route processor if multiple route
processors per group are used.

Dvmrp or Mroute

Status of whether the RPF information is obtained from the
DVMRP routing table or the static mroute configuration.

Outgoing interface list:

Interfaces through which packets are forwarded. When you enable
the ip pim nbma-mode command on the interface, the IP address
of the PIM neighbor is also displayed.

Ethernet0

Name and number of the outgoing interface.

Next hop or VCD

Next hop specifies the downstream neighbor’s IP address. VCD
specifies the virtual-circuit descriptor number. VCD0 indicates
that the group is using the static-map virtual circuit.

Forward/Dense

Status of whether the packets are forwarded on the interface if
there are no restrictions due to access lists or the TTL threshold.
Following the slash (/), the mode in which the interface is operating
(dense or sparse).

Forward/Sparse

Sparse mode interface is in forward mode.

time/time
(uptime/expiration time)

Per interface, the duration in hours, minutes, and seconds that the
entry has been in the IP-multicast routing table. Specifies that
following the slash (/), the duration in hours, minutes, and seconds
until the entry is removed from the IP-multicast routing table.

Command

Description

ip multicast-routing

Enables IP multicast routing.

ip pim

Enables PIM on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-833

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip mroute bidirectional

show ip mroute bidirectional
To display Bidir information from the IP-multicast routing table, use the show ip mroute bidirectional
command.
show ip mroute bidirectional [{interface interface-number} | {null interface-number} |
{port-channel number} | {vlan vlan-id} | {{host-name | host-address} [source]} | {active
[kbps | {interface-type num}]} | {count | pruned | static | summary}]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

null
interface-number

Specifies the null interface; the valid value is 0.

port-channel
number

Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 282.

vlan vlan-id

Specifies the VLAN; valid values are from 1 to 4094.

host-name |
host-address

(Optional) Name or IP address as defined in the DNS hosts table.

source

(Optional) IP address or name of a multicast source.

active

(Optional) Displays the rate that active sources are sending to multicast
groups.

kbps

(Optional) Minimum rate at which active sources are sending to
multicast groups; active sources sending at this rate or greater are
displayed. Valid values are from 1 to 4294967295 kbps.

count

(Optional) Displays the route and packet count.

pruned

(Optional) Displays the pruned routes.

static

(Optional) Displays the static multicast routes.

summary

(Optional) Displays a one-line, abbreviated summary of each entry in
the IP-multicast routing table.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-834

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip mroute bidirectional

Usage Guidelines

If you omit all optional arguments and keywords, the mroute bidirectional command displays all
entries in the IP-multicast routing table.

Examples

This example shows how to display the information in the IP-multicast routing table that is related to
bidirectional PIM:
Router# show ip mroute bidirectional
(*, 225.1.3.0), 00:00:02/00:02:57, RP 3.3.3.3, flags:BC
Bidir-Upstream:GigabitEthernet2/1, RPF nbr 10.53.1.7, RPF-MFD
Outgoing interface list:
GigabitEthernet2/1, Bidir-Upstream/Sparse-Dense, 00:00:02/00:00:00,H
Vlan30, Forward/Sparse-Dense, 00:00:02/00:02:57, H
(*, 225.1.2.0), 00:00:04/00:02:55, RP 3.3.3.3, flags:BC
Bidir-Upstream:GigabitEthernet2/1, RPF nbr 10.53.1.7, RPF-MFD
Outgoing interface list:
GigabitEthernet2/1, Bidir-Upstream/Sparse-Dense, 00:00:04/00:00:00,H
Vlan30, Forward/Sparse-Dense, 00:00:04/00:02:55, H
(*, 225.1.4.1), 00:00:00/00:02:59, RP 3.3.3.3, flags:BC
Bidir-Upstream:GigabitEthernet2/1, RPF nbr 10.53.1.7, RPF-MFD
Outgoing interface list:
GigabitEthernet2/1, Bidir-Upstream/Sparse-Dense, 00:00:00/00:00:00,H
Vlan30, Forward/Sparse-Dense, 00:00:00/00:02:59, H
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-835

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip msdp count

show ip msdp count
To display the number of sources and groups that originated in MSDP source-active messages and the
number of source-active messages from an MSDP peer in the source-active cache, use the show ip msdp
count command.
show ip msdp [vrf vrf-name] count [as-number]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

as-number

(Optional) Number of sources and groups that originated in
source-active messages from the specified autonomous system
number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enter the ip msdp cache-sa-state command for this command to obtain any output from the
show ip msdp command.

Examples

This example shows how to display the number of sources and groups that originated in MSDP
source-active messages and the number of source-active messages from an MSDP peer in the
source-active cache:
Router# show ip msdp count
SA State per Peer Counters, : <# SA learned>
224.135.250.116: 24
172.16.240.253: 3964
172.16.253.19: 10
172.16.170.110: 11
SA State per ASN Counters, : <# sources>/<# groups>
Total entries: 4009
?: 192/98, 9: 1/1, 14: 107/57, 17: 7/5
18: 4/3, 25: 23/17, 26: 39/27, 27: 2/2
32: 19/7, 38: 2/1, 52: 4/4, 57: 1/1
68: 4/4, 73: 12/8, 81: 19/1, 87: 9/6
.
.
.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-836

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip msdp count

Table 2-56 describes the fields shown in the display.
Table 2-56 show ip msdp count Field Descriptions

Related Commands

Field

Description

224.135.250.116: 24

MSDP peer with IP address 224.135.250.116: 24 source-active
messages from the MSDP peer in the source-active cache.

Total entries

Total number of source-active entries in the source-active cache.

9: 1/1

Autonomous system 9: 1 source/1 group.

Command

Description

ip msdp cache-sa-state Creates a source-active state on the router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-837

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip msdp peer

show ip msdp peer
To display detailed information about the MSDP peer, use the show ip msdp peer command.
show ip msdp [vrf vrf-name] peer [peer-address | peer-name]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

peer-address | peer-name

(Optional) DNS name or IP address of the MSDP peer for which
information is displayed.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display detailed information about the MSDP peer:
Router# show ip msdp peer 224.135.250.116
MSDP Peer 224.135.250.116 (rtp5-rp1.cisco.com), AS 109 (configured AS)
Description:
Connection status:
State: Up, Resets: 9, Connection source: Loopback2 (228.69.199.17)
Uptime(Downtime): 1d10h, Messages sent/received: 436765/429062
Output messages discarded: 0
Connection and counters cleared 1w2d
ago
SA Filtering:
Input (S,G) filter: none, route-map: none
Input RP filter: none, route-map: none
Output (S,G) filter: none, route-map: none
Output RP filter: none, route-map: none
SA-Requests:
Input filter: none
Sending SA-Requests to peer: disabled
Peer ttl threshold: 0
SAs learned from this peer: 32, SAs limit: 500
Input queue size: 0, Output queue size: 0

Table 2-57 describes the fields shown in the display.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-838

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip msdp peer

Table 2-57 show ip msdp peer Field Descriptions

Related Commands

Field

Description

MSDP Peer

IP address of the MSDP peer.

AS

Autonomous system to which the MSDP peer belongs.

State:

State of the MSDP peer.

Connection source:

Interface used to obtain the IP address for the TCP local connection
address.

Uptime(Downtime):

Days and hours that the MSDP peer is up or down. If the time is less
than 24 hours, it is shown in hours:minutes:seconds.

Messages sent/received:

Number of source-active messages sent to the MSDP peer/number
of source-active messages received from the MSDP peer.

SA Filtering:

Information regarding access list filtering of source-active input
and output if any.

SA-Requests:

Information regarding access list filtering of source-active requests
if any.

SAs learned from this peer:

Number of source-active messages from the MSDP peer in the
source-active cache.

SAs limit:

Source-active message limit for this MSDP peer.

Command

Description

ip msdp peer

Configures an MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-839

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip msdp sa-cache

show ip msdp sa-cache
To display the (S,G) state that is learned from MSDP peers, use the show ip msdp sa-cache command.
show ip msdp [vrf vrf-name] sa-cache [group-address | source-address | group-name |
source-name] [group-address | source-address | group-name | source-name] [as-number]

Syntax Description

vrf vrf-name

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

group-address |
(Optional) Group address, source address, group name, or source
source-address | group-name | name of the group or source about which (S,G) information is
source-name
displayed.
as-number

(Optional) Only state originated by the autonomous system number
specified is displayed.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The state is cached only if you enter the ip msdp cache-sa-state command.
If you specify two addresses or names, an (S,G) entry corresponding to those addresses is displayed. If
you specify one group address only, all sources for that group are displayed.
If no options are specified, the entire source-active cache is displayed.

Examples

This example shows how to display the (S,G) state that is learned from MSDP peers:
Router# show ip msdp sa-cache
MSDP Source-Active Cache - 2398 entries
(172.16.41.33, 238.105.148.0), RP 172.16.3.111, MBGP/AS 704, 2d10h/00:05:33
(172.16.112.8, 224.2.0.1), RP 192.168.200.65, MBGP/AS 10888, 00:03:21/00:02:38
(172.16.10.13, 227.37.32.1), RP 192.168.3.92, MBGP/AS 704, 05:22:20/00:03:32
(172.16.66.18, 233.0.0.1), RP 192.168.3.111, MBGP/AS 704, 2d10h/00:05:35
(172.16.66.148, 233.0.0.1), RP 192.168.3.111, MBGP/AS 704, 2d10h/00:05:35
(172.16.10.13, 227.37.32.2), RP 192.168.3.92, MBGP/AS 704, 00:44:30/00:01:31
(172.16.70.203, 224.2.236.2), RP 192.168.253.7, MBGP/AS 3582, 02:34:16/00:05:49
(172.18.42.104, 236.195.56.2), RP 192.168.3.92, MBGP/AS 704, 04:21:13/00:05:22
(172.16.10.13, 227.37.32.3), RP 192.168.3.92, MBGP/AS 704, 00:44:30/00:02:31
(172.18.15.43, 224.0.92.3), RP 192.168.200.65, MBGP/AS 10888, 6d09h/00:05:35
(172.18.15.111, 224.0.92.3), RP 192.168.200.65, MBGP/AS 10888, 16:18:08/00:05:35
(172.18.21.45, 224.0.92.3), RP 192.168.200.65, MBGP/AS 10888, 16:18:08/00:05:35
(172.18.15.75, 224.0.92.3), RP 192.168.200.65, MBGP/AS 10888, 08:40:52/00:05:35

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-840

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip msdp sa-cache

(172.18.15.100, 224.0.92.3), RP 192.168.200.65, MBGP/AS 10888, 08:40:52/00:05:35
(172.16.10.13, 227.37.32.6), RP 192.168.3.92, MBGP/AS 704, 00:45:30/00:05:31
(172.18.41.33, 224.247.228.10), RP 192.168.3.111, MBGP/AS 704, 2d10h/00:05:35
(172.18.222.210, 224.2.224.13), RP 192.168.3.92, MBGP/AS 704, 01:51:53/00:05:22
(172.18.41.33, 229.231.124.13), RP 192.168.3.111, MBGP/AS 704, 2d10h/00:05:33
(172.18.32.138, 224.2.200.23), RP 192.168.253.7, MBGP/AS 3582, 21:33:40/00:05:49
(172.18.75.244, 224.2.200.23), RP 192.168.253.7, MBGP/AS 3582, 21:33:40/00:05:49

Table 2-58 describes the fields shown in the display.
Table 2-58 show ip msdp sa-cache Field Descriptions

Related Commands

Field

Description

(172.16.41.33, 238.105.148.0)

First address (source) that is sending to the second address
(group).

RP 172.16.3.111

Rendezvous point address in the originating domain where the
source-active messages started.

MBGP/AS 704

Rendezvous point that is in autonomous system 704 according to
multiprotocol BGP.

2d10h/00:05:33

Route that has been cached for 2 days and 10 hours. If no
source-active message is received in 5 minutes and 33 seconds,
the route is removed from the source-active cache.

Command

Description

clear ip msdp sa-cache Clears MSDP source active cache entries.
ip msdp cache-sa-state Creates a source-active state on the router.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-841

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip msdp summary

show ip msdp summary
To display the MSDP peer status, use the show ip msdp summary command.
show ip msdp [vrf vrf-name] summary

Syntax Description

vrf vrf-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

This example shows how to display the MSDP peer status:
Router# show ip msdp summary
MSDP Peer Status Summary
Peer Address
AS
State
224.135.250.116 109
*172.20.240.253 1239
172.16.253.19
109
172.16.170.110
109

Up
Up
Up
Up

Uptime/ Reset SA
Peer Name
Downtime Count Count
1d10h
9
111
rtp5-rp1
14:24:00 5
4010 sl-rp-stk
12:36:17 5
10
shinjuku-rp1
1d11h
9
12
ams-rp1

Table 2-59 describes the fields shown in the display.
Table 2-59 show ip msdp summary Field Descriptions

Field

Description

Peer Address

IP address of the MSDP peer.

AS

Autonomous system to which the MSDP peer belongs.

State

State of the MSDP peer.

Uptime/Downtime

Days and hours that the MSDP peer is up or down per the state that is shown
in the previous column. If the time is less than 24 hours, it is shown in
hours:minutes:seconds.

SA Count

Number of source-active messages from this MSDP peer in the
source-active cache.

Peer Name

Name of the MSDP peer.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-842

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip nhrp

show ip nhrp
To display information about the NHRP cache, use the show ip nhrp command.
show ip nhrp [summary | dynamic | static | incomplete] [{interface-type interface-number} |
ip-address] [detail | brief]

Syntax Description

summary

(Optional) Displays a summary of NHRP cache purge information.

dynamic

(Optional) Displays the dynamic (learned) IP-to-NBMA cache entries only.

static

(Optional) Displays the static IP-to-NBMA address cache entries only
(configured using the ip nhrp map command).

incomplete

(Optional) Displays information about an incomplete cache.

interface-type
interface-number

(Optional) NHRP cache information for the specified interface type only; see
Table 2-60 for types, number ranges, and descriptions.

ip-address

(Optional) NHRP cache information for the specified IP address only.

detail

(Optional) Displays detailed information about the NHRP cache.

brief

(Optional) Displays basic information about the NHRP cache.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Table 2-60 lists the valid types, number ranges, and descriptions for the type and number optional
arguments.

The valid types can vary according to the platform and interfaces on the platform.

Table 2-60 Valid Types, Number Ranges, and Interface Descriptions

Valid Types

Number Ranges

Interface Descriptions

async

1

Async

ctunnel

0 to 2147483647

C-Tunnel

dialer

0 to 20049

Dialer

fastethernet

0 to 6

Fast Ethernet IEEE 802.3

GigabitEthernet

0 to 6

Gigabit Ethernet IEEE 802.3

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-843

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip nhrp

Table 2-60 Valid Types, Number Ranges, and Interface Descriptions (continued)

Examples

Valid Types

Number Ranges

Interface Descriptions

loopback

0 to 2147483647

Loopback

mfr

0 to 2147483647

Multilink Frame Relay bundle

multilink

0 to 2147483647

Multilink-group

null

0

Null

port-channel

1 to 282

EtherChannel of interfaces

pos-channel

1 to 4094

PoS channel of interfaces

tunnel

0 to 2147483647

Tunnel interfaces

vif

1

PGM multicast host

tunnel

0 to 2147483647

Tunnel

virtual-template

1 to 1000

Virtual template

virtual-tokenring 0 to 2147483647

Virtual Token Ring

xtagatm

Extended tag ATM

0 to 2147483647

This example shows how to display information about the NHRP cache:
Router# show ip nhrp
10.0.0.2 255.255.255.255, ATM0/0 created 0:00:43 expire 1:59:16
Type: dynamic Flags: authoritative
NBMA address: 11.1111.1111.1111.1111.1111.1111.1111.1111.1111.11
10.0.0.1 255.255.255.255, Tunnel0 created 0:10:03 expire 1:49:56
Type: static Flags: authoritative
NBMA address: 11.1.1.2

Table 2-61 describes the fields shown in the display.
Table 2-61 show ip nhrp Field Descriptions

Field

Description

10.0.0.2 255.255.255.255

IP address and its network mask in the IP-to-NBMA address
cache. The mask is currently always 255.255.255.255 because
aggregation of NBMA information through NHRP is not
supported.

ATM0/0 created 0:00:43

Interface type and number (in this case, ATM slot and port
numbers) and when it was created (hours:minutes:seconds).

expire 1:59:16

Time in which the positive and negative authoritative NBMA
address will expire (hours:minutes:seconds). This value is
based on the ip nhrp holdtime command.

Type

•

dynamic—NBMA address was obtained from the NHRP
Request packet.

•

static—NBMA address was statically configured.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-844

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip nhrp

Table 2-61 show ip nhrp Field Descriptions (continued)

Field

Description

Flags

NBMA address

•

authoritative—Indicates that the NHRP information was
obtained from the next-hop server or router that maintains
the NBMA-to-IP address mapping for a particular
destination.

•

implicit—Indicates that the information was learned not
from an NHRP request generated from the local router, but
from an NHRP packet being forwarded or from an NHRP
request being received by the local router.

•

negative—For negative caching; indicates that the
requested NBMA mapping could not be obtained.

Nonbroadcast multiaccess address. The address format is
appropriate for the type of network being used (for example,
ATM, Ethernet, SMDS, or multipoint tunnel).

This example shows how to display basic information about the dynamic (learned) IP-to-NBMA cache
entries only for a specific IP address:
Router# show ip nhrp dynamic 255.255.255.255 brief
Target
Via
NBMA
Mode

Related Commands

Intfc

Claimed

Command

Description

ip nhrp holdtime

Changes the number of seconds that NHRP NBMA addresses are advertised
as valid in authoritative NHRP responses.

ip nhrp map

Statically configures the IP-to-NBMA address mapping of IP destinations
connected to an MBMA network.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-845

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim bsr-router

show ip pim bsr-router
To display the BSR information, use the show ip pim bsr-router command.
show ip pim vrf vrf-name bsr-router

Syntax Description

vrf vrf-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Specifies the name that is assigned to the multicast VPN routing and
forwarding (VRF) instance.

Usage Guidelines

The output includes elected BSR information and information about the locally configured candidate
rendezvous-point advertisement.

Examples

This example shows how to display the BSR information:
Router# show ip pim bsr-router
PIMv2 Bootstrap information
This system is the Bootstrap Router (BSR)
BSR address: 172.16.143.28
Uptime: 04:37:59, BSR Priority: 4, Hash mask length: 30
Next bootstrap message in 00:00:03 seconds
Next Cand_RP_advertisement in 00:00:03 seconds.
RP: 172.16.143.28(Ethernet0), Group acl: 6

Table 2-62 describes the fields shown in the display.
Table 2-62 show ip pim bsr Field Descriptions

Field

Description

BSR address

IP address of the bootstrap router.

Uptime

Length of time that this router has been up, in hours, minutes,
and seconds.

BSR Priority

Priority as configured in the ip pim bsr-candidate command.

Hash mask length

Length of a mask (32 bits maximum) that is to be ANDed with
the group address before the hash function is called. This value
is configured in the ip pim bsr-candidate command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-846

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim bsr-router

Table 2-62 show ip pim bsr Field Descriptions (continued)

Related Commands

Field

Description

Next bootstrap message in

Time in hours, minutes, and seconds in which the next
bootstrap message is due from this BSR.

Next Cand_RP_advertisement in

Time in hours, minutes, and seconds in which the next
candidate rendezvous-point advertisement will be sent.

RP

List of IP addresses of rendezvous points.

Group acl

Standard IP access list number that defines the group prefixes
that are advertised in association with the rendezvous-point
address. This value is configured in the ip pim bsr-candidate
command.

Command

Description

ip pim bsr-candidate

Configures the router to announce its candidacy as a BSR.

ip pim rp-candidate

Configures the router to advertise itself as a PIM Version 2
rendezvous-point candidate to the BSR.

show ip pim rp-hash

Displays which rendezvous point is being selected for a specified group.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-847

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim interface df

show ip pim interface df
To display information about the designated forwarder interface, use the show ip pim interface df
command.
show ip pim vrf vrf-name interface df [rp-addr]

Syntax Description

vrf vrf-name

Specifies the name that is assigned to the multicast VRF instance.

rp-addr

(Optional) Hostname or IP address of the designated forwarder.

Defaults

If you do not specify rp-addr, all designated forwarders are displayed.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the DF interface:
Router# show ip pim interface df 10.18.1.31
Interface
RP
DF Winner
Vlan70
10.18.1.31
10.70.1.55
FastEthernet5/5
10.18.1.31
10.16.1.30
FastEthernet5/6
10.18.1.31
10.18.1.31
Router#

Metric
0
0
0

Uptime
14:16:24
14:16:24
14:16:24

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-848

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim mdt bgp

show ip pim mdt bgp
To display the detailed BGP advertisement of the route distinguisher for the MDT default group, use the
show ip pim mdt bgp command.
show ip pim vrf vrf-name mdt bgp

Syntax Description

vrf vrf-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Specifies the name that is assigned to the multicast VRF instance.

This example shows how to display the detailed BGP advertisement of the route distinguisher for the
MDT default group:
Router# show ip pim mdt bgp
MDT-default group 232.2.1.4
rid:1.1.1.1 next_hop:1.1.1.1

Table 2-63 describes the fields shown in the display.
Table 2-63 show ip pim mdt bgp Field Descriptions

Field

Description

MDT-default group

MDT default groups that have been advertised to this router.

rid:10.1.1.1

BGP router ID of the advertising router.

next_hop:10.1.1.1

BGP next-hop address that was contained in the advertisement.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-849

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim mdt history

show ip pim mdt history
To display the information on data MDTs that have been reused, use the show ip pim mdt history
command.
show ip pim vrf vrf-name mdt history interval minutes

Syntax Description

vrf vrf-name

Specifies the name that is assigned to the multicast VRF instance.

interval minutes

Specifies the length of time, in minutes, for which the interval can be configured;
valid values are from 1 to 71582 minutes (the maximum is 71582 minutes or
7 weeks).

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show ip pim mdt history command displays the data MDTs that have been reused during the past
configured interval.

Examples

This example shows how to display the information on data MDTs that have been reused:
Router# show ip pim vrf blue mdt history interval 20
MDT-data send history for VRF - blue for the past 20 minutes
MDT-data group
10.9.9.8
10.9.9.9

Number of reuse
3
2

Table 2-64 describes the fields shown in the display.
Table 2-64 show ip pim mdt history Field Descriptions

Field

Description

MDT-data group

MDT data group for which information is being shown.

Number of reuse

Number of data MDTs that have been reused in this group.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-850

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim mdt receive

show ip pim mdt receive
To display the data MDT advertisements that are received by a specified router, use the show ip pim
mdt receive command.
show ip pim vrf vrf-name mdt receive [detail]

Syntax Description

vrf vrf-name

Specifies the name that is assigned to the multicast VRF instance.

detail

(Optional) Provides a detailed description of the data MDT advertisements that
are received.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When a router wants to switch over from the default MDT to a data MDT, it advertises the VRF source,
the group pair, and the global multicast address over which the traffic will be sent. If the remote router
wants to receive this data, then the remote router joins this global address multicast group.

Examples

This example shows how to display the data MDT advertisements that are received by a specified router:
Router# show ip pim vrf vpn8 mdt receive detail
Joined MDT-data groups for VRF:vpn8
group:232.2.8.0 source:10.0.0.100 ref_count:13
(10.101.8.10, 225.1.8.1), 1d13h/00:03:28/00:02:26, OIF count:1, flags:TY
(10.102.8.10, 225.1.8.1), 1d13h/00:03:28/00:02:27, OIF count:1, flags:TY

Table 2-65 describes the fields shown in the display.
Table 2-65 show ip pim mdt receive Field Descriptions

Field

Description

group:172.16.8.0

Group that caused the data MDT to be built.

source:10.0.0.100

VRF source that caused the data MDT to be built.

ref_count:13

Number of source and group pairs that are reusing this data MDT.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-851

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim mdt receive

Table 2-65 show ip pim mdt receive Field Descriptions (continued)

Field

Description

OIF count:1

Number of interfaces out of which this multicast data is being forwarded.

flags:

Information about the entry:
A - Candidate MSDP advertisement
B - Bidir group
D - Dense
C - Connected
F - Register flag
I - Received source-specific host report
J - Join SPT
L - Local
M - MSDP-created entry
P - Pruned
R - RP bit set
S - Sparse
s - SSM group
T - SPT bit set
X - Proxy join timer running
U -URD
Y - Joined MDT data group
y - Sending to MDT data group
Z - Multicast tunnel

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-852

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim mdt send

show ip pim mdt send
To display the data MDT advertisements that a specified router has made, use the show ip pim mdt send
command.
show ip pim vrf vrf-name mdt send

Syntax Description

vrf vrf-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Specifies the name that is assigned to the multicast VRF instance.

Usage Guidelines

Use this command to show the data MDT advertisements that a specified router has made.

Examples

This example shows how to display the data MDT advertisements that a specified router has made:
Router# show ip pim mdt send
MDT-data send list for VRF:vpn8
(source, group)
(10.100.8.10, 225.1.8.1)
(10.100.8.10, 225.1.8.2)
(10.100.8.10, 225.1.8.3)
(10.100.8.10, 225.1.8.4)
(10.100.8.10, 225.1.8.5)
(10.100.8.10, 225.1.8.6)
(10.100.8.10, 225.1.8.7)
(10.100.8.10, 225.1.8.8)
(10.100.8.10, 225.1.8.9)
(10.100.8.10, 225.1.8.10)

MDT-data group
232.2.8.0
232.2.8.1
232.2.8.2
232.2.8.3
232.2.8.4
232.2.8.5
232.2.8.6
232.2.8.7
232.2.8.8
232.2.8.9

ref_count
1
1
1
1
1
1
1
1
1
1

Table 2-66 describes the fields shown in the display.
Table 2-66 show ip pim mdt send Field Descriptions

Field

Description

source, group

Source and group addresses that this router has switched over to data MDTs.

MDT-data group

Multicast address over which these data MDTs are being sent.

ref_count

Number of source and group pairs that are reusing this data MDT.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-853

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim neighbor

show ip pim neighbor
To display the list that the PIM neighbors discovered, use the show ip pim neighbor command.
show ip pim vrf vrf-name neighbor [interface-type interface-number]

Syntax Description

vrf vrf-name

Specifies the name that is assigned to the multicast VRF instance.

interface-type

(Optional) Interface type.

interface-number

Interface number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command to determine which routers on the LAN are configured for PIM.

Examples

This example shows how to display the list that the PIM neighbors discovered:
Router# show ip pim neighbor
PIM Neighbor Table
Neighbor Address Interface
192.168.37.2
Ethernet0
192.168.37.33
Ethernet0
192.168.36.131
Ethernet1
192.168.36.130
Ethernet1
10.1.22.9
Tunnel0

Uptime
Expires
17:38:16 0:01:25
17:33:20 0:01:05
17:33:20 0:01:08
18:56:06 0:01:04
19:14:59 0:01:09

Mode
Dense
Dense (DR)
Dense (DR)
Dense
Dense

Table 2-67 describes the fields shown in the display.
Table 2-67 show ip pim neighbor Field Descriptions

Field

Description

Neighbor Address

IP address of the PIM neighbor.

Interface

Interface type and number on which the neighbor is reachable.

Uptime

Time in hours, minutes, and seconds that the entry has been in the PIM
neighbor table.

Expires

Time in hours, minutes, and seconds until the entry will be removed from the
IP multicast routing table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-854

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim neighbor

Table 2-67 show ip pim neighbor Field Descriptions (continued)

Related Commands

Field

Description

Mode

Mode in which the interface is operating.

(DR)

Status of whether this neighbor is a designated router on the LAN.

Command

Description

ip pim state-refresh
disable

Disables the processing and forwarding of PIM dense-mode refresh-control
messages on a PIM router.

ip pim state-refresh
origination-interval

Configures the origination of and the interval for PIM dense-mode
state-refresh control messages on a PIM router.

show ip pim interface
df

Displays information about the designated forwarder interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-855

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim rp-hash

show ip pim rp-hash
To display which rendezvous point is being selected for a specified group, use the show ip pim rp-hash
command.
show ip pim vrf vrf-name rp-hash {group-address | group-name}

Syntax Description

vrf vrf-name

Specifies the name that is assigned to the multicast VRF instance.

group-address |
group-name

Rendezvous-point information for the specified group address or name as
defined in the DNS hosts table.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command displays which rendezvous point was selected for the group specified. It also shows
whether this rendezvous point was selected by Auto-RP or the PIM Version 2 bootstrap mechanism.

Examples

This example shows how to display which rendezvous point is being selected for a specified group:
Router# show ip pim rp-hash 239.1.1.1
RP 172.16.24.12 (mt1-47a.cisco.com), v2
Info source: 172.16.24.12 (mt1-47a.cisco.com), via bootstrap
Uptime: 05:15:33, expires: 00:02:01

Table 2-68 describes the fields shown in the display.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-856

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim rp-hash

Table 2-68 show ip pim rp-hash Field Descriptions

Field

Description

RP 172.16.24.12 (mt1-47a.cisco.com), v2

Address of the rendezvous point for the group
specified (239.1.1.1). The DNS name of the
rendezvous point within the parentheses. If the address
of the rendezvous point is not registered in the DNS, a
question mark (?) is displayed. PIM Version 2 is
configured.

Info source: 172.16.24.12
(mt1-47a.cisco.com), via bootstrap

System from which the router learned this
rendezvous-point information and the DNS name of
the source. The rendezvous point was selected by the
bootstrap mechanism. In this case, the BSR is also the
rendezvous point.

Uptime

Length of time (in hours, minutes, and seconds) that
the router has known about this rendezvous point.

expires

Time (in hours, minutes, and seconds) after which the
information about this rendezvous point expires. If the
router does not receive any refresh messages in this
time, it discards information about this rendezvous
point.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-857

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim rp mapping

show ip pim rp mapping
To display the mappings for the PIM group to the active rendezvous points, use the show ip pim rp
mapping command.
show ip pim vrf vrf-name rp mapping [rp-address]

Syntax Description

vrf vrf-name

Specifies the name that is assigned to the multicast VRF instance.

rp-address

(Optional) Rendezvous-point IP address.

Defaults

If you do not specify an rp-address, the mappings for all the active rendezvous points are displayed.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the mappings for the PIM group to the active rendezvous points:
Router# show ip pim rp mapping
PIM Group-to-RP Mappings
This system is an RP-mapping agent
Group(s) 224.1.0.0/16
RP 6.6.6.6 (?), v2v1
Info source: 6.6.6.6 (?), elected via
and the elected RP.
Uptime: 22:36:49, expires: 00:02:04
Group(s) 225.2.2.0/24
RP 9.9.9.9 (?), v2v1, bidir
Info source: 9.9.9.9 (?), elected via
Uptime: 22:36:20, expires: 00:02:37
Group(s) 226.2.2.0/24
RP 2.2.2.2 (?), v2v1, bidir
Info source: 2.2.2.2 (?), elected via
Uptime: 22:36:24, expires: 00:02:29
Group(s) 227.2.2.0/24
RP 9.9.9.9 (?), v2v1, bidir
Info source: 9.9.9.9 (?), elected via
Uptime: 22:36:21, expires: 00:02:35
Router#

Auto-RP ---> learned via Auto-RP

Auto-RP

Auto-RP

Auto-RP

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-858

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim rp mapping

Table 2-69 describes the fields that are shown in the example.
Table 2-69 show ip pim rp mapping Field Descriptions

Field

Description

Info source

ACL number.

Static

Group-to-mapping information from the static rendezvous-point configuration.

Bidir Mode

Status of whether the rendezvous point is operating in bidirectional mode.

RP

Address of the rendezvous point for that group.

(?)

Status that shows no Domain Name System (DNS) name has been specified.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-859

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim snooping

show ip pim snooping
To display the information about IP PIM snooping, use the show ip pim snooping command.
show ip pim snooping
show ip pim snooping vlan vlan-id [neighbor | mac-group | statistics | mroute [{src-ip |
group-ip}]]

Syntax Description

vlan vlan-id

Displays information for a specific VLAN; valid values are from 1 to 4094.

neighbor

(Optional) Displays information about the neighbor database.

mac-group

(Optional) Displays information about the GDA database in Layer 2.

statistics

(Optional) Displays information about the VLAN statistics.

mroute

(Optional) Displays information about the mroute database.

src-ip

(Optional) Source IP address.

group-ip

(Optional) Group IP address.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the information about the global status:
Router# show ip pim snooping
Global runtime mode: Enabled
Global admin mode : Enabled
Number of user enabled VLANs: 1
User enabled VLANs: 10
Router#

This example shows how to display the information about a specific VLAN:
Router# show ip pim snooping vlan 10
3 neighbors (0 DR priority incapable, 0 Bi-dir incapable)
6 mroutes, 3 mac entries
DR is 10.10.10.4
RP DF Set
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-860

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim snooping

This example shows how to display the information about the neighbor database for a specific VLAN:
Router# show ip pim snooping vlan 10 neighbor
IP Address
Mac address
Port Uptime/Expires
Flags
10.10.10.2
000a.f330.344a 3/13 00:09:57/00:01:22
10.10.10.1
000a.f330.334a 3/12 00:09:44/00:01:21
10.10.10.4
000a.f330.3c00 15/01 00:09:57/00:01:22 DR
Number of Neighbors = 3
Router#

This example shows how to display the information about the GDA database for a specific VLAN in
Layer 2:
Router# show ip pim snooping vlan 10 mac-group
Mac address
Group address
Uptime/Expires
0100.5e01.6465 224.1.100.101
00:20:26/00:02:43
0100.5e01.6464 224.1.100.100
00:20:28/00:02:41
0100.5e00.0128 224.0.1.40
00:20:27/00:02:47
Number of mac-groups = 3
Router#

Outgoing Ports
3/12 3/13 15/1
3/12 3/13 15/1
3/12 3/13 15/1

This example shows how to display the detailed statistics for a specific VLAN:
Router# show ip pim snooping vlan 10 statistics
PIMv2 statistics for vlan 10:
Hello
: 811
Join/Prunes
: 1332
RP DF Election
: 0
Asserts
: 133
Other types
: 0
Hello
Hello
Hello
Hello
Hello
Hello
Hello
Hello
Hello
Error
Error
Error
Error

option holdtime [1]
option Generation ID[20]
option DR priority[19]
option Bi-dir capable[22]
option Fast Hold[65005]
option Lan Prune Delay[2]
option Tag switching [17]
option PIM-DM State Refresh[21]
option Deprecated Cisco DR priority[18]
- Hello length too short
- Hello hold option missing
- Hello option length
- Hello option unknown

:
:
:
:
:
:
:
:
:
:
:
:
:

811
544
544
0
0
0
0
544
0
0
0
0
0

Error
Error
Error
Error

-

:
:
:
:

0
0
0
0

Join/Prune
Join/Prune
Join/Prune
Join/Prune

Address Family
Parser malloc failure
Unknown up/down neighbor
Malformed packet discards

Error - RPDF election Address Family
Error - RPDF Unknown up/down neighbor

: 0
: 0

Error - Generic packet input error
Router#

: 0

This example shows how to display the information about the mroute database for all mrouters in a
specific VLAN:
Router# show ip pim snooping vlan 10 mroute
Number of Mroutes = 6
Flags: J/P - (*,G) Join/Prune, j/p - (S,G) Join/Prune
SGR-P - (S,G,R) Prune

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-861

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip pim snooping

(*, 224.1.100.101), 00:16:14/00:02:58
10.10.10.1->10.10.10.2, 00:16:14/00:02:58, J
Downstream ports: 3/12
Upstream
ports: 3/13
Outgoing
ports: 3/12 3/13
(*, 224.1.100.100), 00:16:16/00:02:56
10.10.10.1->10.10.10.2, 00:16:16/00:02:56, J
Downstream ports: 3/12
Upstream
ports: 3/13
Outgoing
ports: 3/12 3/13
(10.10.10.2, 224.0.1.40), 00:16:10/00:03:03
10.10.10.1->10.10.10.2, 00:16:10/00:03:03, SGR-P
Downstream ports:
Upstream
ports: 3/13
Outgoing
ports: 3/13
(*, 224.0.1.40), 00:16:16/00:03:02
10.10.10.1->10.10.10.2, 00:16:16/00:03:02, J
Downstream ports: 3/12
Upstream
ports: 3/13
Outgoing
ports: 3/12 3/13
(*, 224.10.10.10), 00:02:23/00:01:06
Downstream ports:
Upstream
ports:
Outgoing
ports: 3/12 3/13
(123.123.123.123, 224.10.10.10), 00:02:23/00:01:06
10.10.10.1->10.10.10.2, 00:02:23/00:01:06, j
Downstream ports: 3/12
Upstream
ports: 3/13
Outgoing
ports: 3/12 3/13
Router#

This example shows how to display the information about the PIM mroute for a specific source address:
Router# show ip pim snooping vlan 10 mroute 224.1.100.100
(*, 224.1.100.100), 00:16:36/00:02:36
10.10.10.1->10.10.10.2, 00:16:36/00:02:36, J
Downstream ports: 3/12
Upstream
ports: 3/13
Outgoing
ports: 3/12 3/13
Router#

This example shows how to display the information about the PIM mroute for a specific source and
group address:
Router# show ip pim snooping vlan 10 mroute 123.123.123.123 224.10.10.10
(123.123.123.123, 224.10.10.10), 00:03:04/00:00:25
10.10.10.1->10.10.10.2, 00:03:04/00:00:25, j
Downstream ports: 3/12
Upstream
ports: 3/13
Outgoing
ports: 3/12 3/13
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-862

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip pim snooping

Related Commands

Command

Description

ip pim snooping (global
configuration mode)

Enables PIM snooping globally.

ip pim snooping (interface
configuration mode)

Enables PIM snooping on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-863

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip rpf events

show ip rpf events
To display the triggered RPF statistics, use the show ip rpf events command.
show ip rpf [vrf vrf-name] events

Syntax Description

vrf vrf-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.

This example shows how to display the triggered RPF statistics:
Router# show ip rpf events
Last 15 triggered multicast RPF check events
RPF backoff delay: 500 msec
RPF maximum delay: 5 sec
DATE/TIME BACKOFF PROTOCOL EVENT RPF CHANGES
Jan 1 00:00:55.643 500 msec EIGRP Route UP 0
Jan 1 00:00:07.283 1000 sec Connected Route UP 0
Jan 1 00:00:06.283 500 msec Connected Route UP 0
Router#

Related Commands

Command

Description

ip multicast rpf
backoff

Sets the PIM-backoff interval.

ip multicast rpf
interval

Sets the RPF consistency-check interval.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-864

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ip wccp

show ip wccp
To display the WCCP statistics, use the show ip wccp command.
show ip wccp [{service-number | web-cache} [detail | view]]

Syntax Description

service-number

(Optional) Identification number of the cache engine service group being
controlled by a router; valid values are from 0 to 99.

web-cache

(Optional) Directs the router to display statistics for the web-cache service.

detail

(Optional) Displays information for the router and all cache engines in the
currently configured cluster.

view

(Optional) Displays which other members of a particular service group have
or have not been detected.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the show ip wccp service-number command to provide the “Total Packets Redirected” count. The
“Total Packets Redirected” count is the number of flows, or sessions, that are redirected.
Use the show ip wccp service-number detail command to provide the “Packets Redirected” count. The
“Packets Redirected” count is the number of flows, or sessions, that are redirected.
Use the show ip wccp web-cache detail command to provide an indication of how many flows, rather
than packets, are using Layer 2 redirection.
For cache-engine clusters using Cisco cache engines, the reverse proxy service-number is indicated by
a value of 99.
Use the clear ip wccp command to reset the counter for the “Packets Redirected” information.
For additional information on the IP WCCP commands, refer to the “Configuring Web Cache Services
Using WCCP” section in the Cisco IOS Configuration Fundamentals Configuration Guide.

Examples

This example shows how to display the connected cache engine using Layer 2 redirection:
Router# show ip wccp web-cache detail
WCCP Cache-Engine information:
IP Address:
10.11.1.1
Protocol Version:
2.0
State:
Usable
Redirection:
L2
Initial Hash Info:
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-865

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ip wccp

Assigned Hash Info:
Hash Allotment:
Packets Redirected:
Connect Time:

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
256 (100.00%)
10273
17:05:44

Table 2-70 describes the fields that are shown in the example.
Table 2-70 show ip wccp web-cache detail Command Output Fields

Field

Description

WCCP Cache-Engine information Header for the area that contains fields for the IP address and
version of WCCP that is associated with the router that is
connected to the cache engine in the service group.
IP Address

IP address of the router that is connected to the cache engine in
the service group.

Protocol Version

Version of WCCP that is used by the router in the service group.

WCCP Cache-Engine information Fields for information on cache engines.

Related Commands

IP Address

IP address of the cache engine in the service group.

Protocol Version

Version of WCCP that is used by the cache engine in the service
group.

State

Status of whether the cache engine is operating properly and can
be contacted by a router and other cache engines in the service
group.

Initial Hash Info

Initial state of the hash-bucket assignment.

Assigned Hash Info

Current state of the hash-bucket assignment.

Hash Allotment

Percentage of buckets that is assigned to the current cache engine.
Both a value and a percent figure are displayed.

Packets Redirected

Number of flows or sessions that have been redirected to the
cache engine.

Connect Time

Amount of time that it takes for the cache engine to connect to the
router.

Command

Description

clear ip wccp

Removes WCCP statistics (counts) maintained on the router for a particular
service.

ip wccp

Directs a router to enable or disable the support for a cache engine service
group.

ip wccp redirect

Enables packet redirection on an outbound or inbound interface using
WCCP.

ip wccp web-cache
accelerated

Enables the hardware acceleration for WCCP version 1.

show ip interface

Displays the usability status of interfaces that are configured for IP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-866

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ipv6 mfib

show ipv6 mfib
To display the forwarding entries and interfaces in the IPv6 MFIB, use the show ipv6 mfib command.
show ipv6 mfib [{group-ip-addr/prefix-length | group-name | group-address [source-name |
source-address]} | {active kbps} | count | interface | status | summary | verbose]
show ipv6 mfib [link-local [active [kbps] | count | verbose]]

Syntax Description

group-ip-addr/prefix-length

(Optional) Group IPv6 address/prefix length for the IPv6 network
assigned to the interface.

group-name

(Optional) Multicast group name.

group-address

(Optional) Group IPv6 address.

source-name

(Optional) Source name.

source-address

(Optional) Source IP address.

active kbps

(Optional) Displays the rate at which active sources are sending to
multicast groups; valid values are from 0 to 4294967295 kilobits
per second.

count

(Optional) Displays information about the route and packet count.

interface

(Optional) Displays information about the interface settings and
status.

status

(Optional) Displays information about the general settings and
status.

summary

(Optional) Displays information about the summary statistics.

verbose

(Optional) Displays additional information such as the MAC
encapsulation header and platform-specific information.

link-local

(Optional) Displays the link-local groups.

Defaults

prefix-length is 128.

Command Modes

User EXEC or Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the show ipv6 mfib command to display MFIB entries, forwarding interfaces, and their traffic
statistics. This command can be enabled on virtual IP (VIP) if the router is operating in distributed mode.
Use the show ipv6 mfib active command to display MFIB entries actively used to forward packets. In
many cases, it is useful to provide the optional kbps argument to display the set of entries that are
forwarding an amount of traffic larger or equal to the amount set by the kbps argument.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-867

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ipv6 mfib

Use the show ipv6 mfib count command to display the average packet size and data rate in kilobits per
seconds.
The prefix-length is the length of the IPv6 prefix. A decimal value that indicates how many of the
high-order contiguous bits of the address comprise the prefix (the network portion of the address). A
slash mark must precede the decimal value.
A forwarding entry in the MFIB has flags that determine the default forwarding and signaling behavior
to use for packets matching the entry. The entry also has per-interface flags that further specify the
forwarding behavior for packets received or forwarded on specific interfaces. Table 2-71 describes the
MFIB forwarding entries and interface flags.
Table 2-71 MFIB Forwarding Entries and Interface Flags

Examples

Flag

Description

F

Forward—Data is forwarded out of this interface.

A

Accept—Data received on this interface is accepted for forwarding.

IC

Internal copy—Deliver a copy of the packets received or forwarded on this
interface to the router.

NS

Negate signal—Reverse the default entry signaling behavior for packets
received on this interface.

DP

Do not preserve—When signaling the reception of a packet on this interface,
do not preserve a copy of it (discard it instead).

SP

Signal present—The reception of a packet on this interface was just signaled.

S

Signal—By default, signal the reception of packets matching this entry.

C

Perform directly connected check for packets matching this entry. Signal the
reception if packets were originated by a directly connected source.

This example shows how to display information for a specific group IPv6 address:
Router# show ipv6 mfib ff35::1:1
IP Multicast Forwarding Information Base
Entry Flags: C - Directly Connected, S - Signal, IA - Inherit A flag,
AR - Activity Required, D - Drop
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts: Total/RPF failed/Other drops
Interface Flags: A - Accept, F - Forward, NS - Negate Signalling
IC - Internal Copy, NP - Not platform switched
SP - Signal Present
Interface Counts: Distributed FS Pkt Count/FS Pkt Count/PS Pkt Count
(1600::2,FF35::1:1) Flags:
RP Forwarding: 7188/100/48/37, Other: 203619/203619/0
LC Forwarding: 0/0/0/0, Other: 0/0/0
Vlan25 Flags: A
Vlan11 Flags: F NS
Pkts: 0/7188/0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-868

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ipv6 mfib

Table 2-72 describes the fields shown in the display.
Table 2-72 show ipv6 mfib Field Descriptions

Field

Description

Entry flags

Information about the entry.

Forwarding Counts Statistics on the packets that are received and forwarded to at least one interface.
Pkt Count/

Total number of packets received and forwarded since the creation of the
multicast forwarding state to which this counter applies.

Pkts per second/

Number of packets received and forwarded per second.

Avg Pkt Size/

Total number of bytes divided by the total number of packets for this multicast
forwarding state. There is no direct display for the total number of bytes. You can
calculate the total number of bytes by multiplying the average packet size by the
packet count.

Kbits per second

Bytes per second divided by packets per second, and divided by 1000.

Other counts:

Statistics on the received packets. These counters include statistics about the
packets received and forwarded and packets received but not forwarded.

Interface Flags:

Information about the interface. See Table 2-71 for further information on
interface flags.

Interface Counts:

Interface statistics.

This example shows forwarding entries and interfaces in the MFIB with a group address of FF03:1::1
and a source address of 5002:1::2 specified:
Router# show ipv6 mfib FF03:1::1 5002:1::2
IP Multicast Forwarding Information Base
Entry Flags:C - Directly Connected, S - Signal, IA - Inherit A flag,
AR - Activity Required, D - Drop
Forwarding Counts:Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts:Total/RPF failed/Other drops
Interface Flags:A - Accept, F - Forward, NS - Negate Signalling
IC - Internal Copy, NP - Not platform switched
SP - Signal Present
Interface Counts:FS Pkt Count/PS Pkt Count
(5002:1::2,FF03:1::1) Flags:
Forwarding:71505/0/50/0, Other:42/0/42
GigabitEthernet5/0 Flags:A
GigabitEthernet5/0.19 Flags:F NS
Pkts:239/24
GigabitEthernet5/0.20 Flags:F NS
Pkts:239/24
.
.
.
GigabitEthernet5/0.16 Flags:F NS
Pkts:71628/24

This example shows forwarding entries and interfaces in the MFIB with a group address of FF03:1::1
and a default prefix of 128:
Router# show ipv6 mfib FF03:1::1/128
IP Multicast Forwarding Information Base
Entry Flags:C - Directly Connected, S - Signal, IA - Inherit A flag,

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-869

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ipv6 mfib

AR - Activity Required, D - Drop
Forwarding Counts:Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts:Total/RPF failed/Other drops
Interface Flags:A - Accept, F - Forward, NS - Negate Signalling
IC - Internal Copy, NP - Not platform switched
SP - Signal Present
Interface Counts:FS Pkt Count/PS Pkt Count
(*,FF03:1::1) Flags:C
Forwarding:0/0/0/0, Other:0/0/0
Tunnel1 Flags:A NS
GigabitEthernet5/0.25 Flags:F NS
Pkts:0/0
.
.
.
GigabitEthernet5/0.16 Flags:F NS
Pkts:0/0

This example displays statistics on the rate at which active IP multicast sources are sending information.
The router is switching traffic from 2001::1:1:200 to FF05::1:
Router# show ipv6 mfib active
Active IPv6 Multicast Sources - sending >= 4 kbps
Group: FF05::1
Source: 2001::1:1:200
Rate: 20 pps/16 kbps(1sec), 0 kbps(last 128 sec)

Table 2-73 describes the fields shown in the display.
Table 2-73 show ipv6 mfib active Field Descriptions

Field

Description

Group:

Summary information about counters for (*, G) and the range of (S,G) states for
one particular group G. The following RP-tree: and Source: output fields contain
information about the individual states belonging to this group.
Note

Rate...kbps

For PIM-SSM range groups, the Group: displays are statistical. All SSM
range (S,G) states are individual, unrelated SSM channels.

Bytes per second divided by packets per second and divided by 1000. On an IP
multicast fast-switching platform, the number of packets per second is the
number of packets during the last second. Other platforms may use a different
approach to calculate this number. Refer to the Catalyst Supervisor Engine 32
PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for more
information.

This example displays statistics from the MFIB about the group and source. The router is switching
traffic from 2001::1:1:200 to FF05::1:
Router# show ipv6 mfib count
IP Multicast Statistics
54 routes, 7 groups, 0.14 average sources per group
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kilobits per second
Other counts: Total/RPF failed/Other drops(OIF-null, rate-limit etc)
Group: FF00::/8
RP-tree:
Forwarding: 0/0/0/0, Other: 0/0/0
Group: FF00::/15
RP-tree:
Forwarding: 0/0/0/0, Other: 0/0/0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-870

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ipv6 mfib

Group: FF05::1
RP-tree:
Forwarding: 2/0/100/0, Other: 0/0/0
Source: 10::1:1:200,
Forwarding: 367/10/100/7, Other: 0/0/0
Tot. shown: Source count: 1, pkt count: 369
Group: FF10::/15
RP-tree:
Forwarding: 0/0/0/0, Other: 0/0/0
Group: FF20::/15
RP-tree:
Forwarding: 0/0/0/0, Other: 0/0/0

Table 2-74 describes the fields shown in the display.
Table 2-74 show ipv6 mfib count Field Descriptions

Field

Description

Forwarding Counts Statistics on the packets that are received and forwarded to at least one interface.
Pkt Count/

Total number of packets received and forwarded since the multicast forwarding
state to which this counter applies was created.

Pkts per second/

Number of packets received and forwarded per second.

Avg Pkt Size/

Total number of bytes divided by the total number of packets for this multicast
forwarding state. There is no direct display for the total number of bytes. You can
calculate the total number of bytes by multiplying the average packet size by the
packet count.

Kilobits per second Bytes per second, divided by packets per second, and divided by 1000.
Other counts:

Statistics on the received packets. These counters include statistics about the
packets received and forwarded and packets received but not forwarded.

Total/

Total number of packets received.

RPF failed/

Number of packets not forwarded due to a failed RPF or acceptance check (when
bidirectional PIM is configured).

Other drops
(OIF-null,
rate-limit etc)

Number of packets not forwarded for reasons other than an RPF or acceptance
check (such as the outgoing interface [OIF] list was empty or because the packets
were discarded because of a configuration that was enabled).

Group:

Summary information about counters for (*,G) and the range of (S,G) states for
one particular group G. The following RP-tree: and Source: output fields contain
information about the individual states belonging to this group.
Note

RP-tree:

For Source Specific Multicast (PIM-SSM) range groups, the Group:
displays are statistical. All SSM range (S,G) states are individual,
unrelated SSM channels.

Counters for the (*,G) state of this group G. These counters are displayed only
for groups that have a forwarding mode that do not forward packets on the shared
tree. These (*,G) groups are bidirectional PIM and PIM sparse mode (PIM-SM)
groups. There are no RP-tree displays for PIM SSM range groups.

This example shows forwarding entries and interfaces in the MFIB and additional information such as
the MAC encapsulation header and platform-specific information:
Router# show ipv6 mfib ff33::1:1 verbose
IP Multicast Forwarding Information Base
Entry Flags: C - Directly Connected, S - Signal, IA - Inherit A flag,
AR - Activity Required, K - Keepalive
Forwarding Counts: Pkt Count/Pkts per second/Avg Pkt Size/Kbits per second
Other counts: Total/RPF failed/Other drops

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-871

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ipv6 mfib

Platform per slot HW-Forwarding Counts: Pkt Count/Byte Count
Platform flags: HF - Forwarding entry,HB - Bridge entry,HD - NonRPF Drop entry,
NP - Not platform switchable,RPL - RPF-ltl linkage,
MCG - Metset change,ERR - S/w Error Flag,RTY - In RetryQ,
LP - L3 pending,MP - Met pending,AP - ACL pending
Interface Flags: A - Accept, F - Forward, NS - Negate Signalling
IC - Internal Copy, NP - Not platform switched
SP - Signal Present
Interface Counts: Distributed FS Pkt Count/FS Pkt Count/PS Pkt Count
(10::2,FF33::1:1) Flags: K
RP Forwarding: 0/0/0/0, Other: 0/0/0
LC Forwarding: 0/0/0/0, Other: 0/0/0
HW Forwd:
0/0/0/0, Other: NA/NA/NA
Slot 6: HW Forwarding: 0/0, Platform Flags: HF RPL
Slot 1: HW Forwarding: 0/0, Platform Flags: HF RPL
Vlan10 Flags: A
Vlan30 Flags: F NS
Pkts: 0/0/0 MAC: 33330001000100D0FFFE180086DD
Router#

Table 2-75 describes the fields shown in the display.
Table 2-75 show ipv6 mfib verbose Field Descriptions

Field

Description

Platform flags

Information about the platform.

Platform per slot
HW-Forwarding
Counts

Total number of packets per bytes forwarded.

Table 2-76 describes the MFIB platform flags.
Table 2-76 MFIB Platform Flags

Flag

Description

H

Entry is installed in hardware

HF

Forwarding entry

HB

Bridge entry

HD

NonRPF Drop entry

NP

Software switched

RPL

RPF-ltl linkage

MCG

Metset change

ERR

S/w Error Flag

RTY

In RetryQ

LP

Layer 3 pending

MP

Met pending

AP

ACL pending

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-872

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show ipv6 mld snooping

show ipv6 mld snooping
To display MLDv2 snooping information, use the show ipv6 mld snooping command.
show ipv6 mld snooping {{explicit-tracking vlan} | {mrouter [vlan vlan]} | {report-suppression
vlan vlan} | {statistics vlan vlan}}

Syntax Description

explicit-tracking vlan vlan

Displays the status of explicit host tracking.

mrouter

Displays the multicast router interfaces on an optional VLAN.

vlan vlan

(Optional) Specifies the VLAN number on the multicast router
interfaces.

report-suppression vlan vlan

Displays the status of the report suppression.

statistics vlan vlan

Displays IGMP snooping information on a VLAN.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can also use the show ip igmp snooping commands to display information about IGMP snooping.
You can enter the show ipv6 mld snooping mrouter command without arguments to display all the
multicast router interfaces.

Examples

This example shows how to display explicit tracking information on VLAN 25:
Router# show ipv6 mld snooping explicit-tracking vlan 25
Source/Group
Interface
Reporter
Filter_mode
-----------------------------------------------------------------------10.1.1.1/226.2.2.2
Vl25:1/2
16.27.2.3
INCLUDE
10.2.2.2/226.2.2.2
Vl25:1/2
16.27.2.3
INCLUDE
Router#

This example shows how to display the multicast router interfaces in VLAN 1:
Router# show ipv6 mld snooping mrouter vlan 1
vlan
ports
-----+---------------------------------------1
Gi1/1,Gi2/1,Fa3/48,Router
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-873

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show ipv6 mld snooping

This example shows the IGMP snooping statistics information for VLAN 25:
Router# show ipv6 mld snooping statistics interface vlan 25
Snooping staticstics for Vlan25
#channels:2
#hosts
:1
Source/Group
10.1.1.1/226.2.2.2
10.2.2.2/226.2.2.2
Router#

Related Commands

Interface
Gi1/2:Vl25
Gi1/2:Vl25

Reporter
16.27.2.3
16.27.2.3

Uptime
00:01:47
00:01:47

Command

Description

ipv6 mld snooping

Enables MLDv2 snooping globally.

ipv6 mld snooping
explicit-tracking

Enables explicit host tracking.

ipv6 mld snooping
querier

Enables the MLDv2 snooping querier.

ipv6 mld snooping
report-suppression

Enables report suppression on a VLAN.

Last-Join
00:00:50
00:00:50

Last-Leave
-

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-874

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show l2protocol-tunnel

show l2protocol-tunnel
To display the protocols that are tunneled on an interface or on all interfaces, use the show
l2protocol-tunnel command.
show l2protocol-tunnel [{interface interface mod/port} | {vlan vlan-id} | summary]

Syntax Description

interface
interface

(Optional) Specifies the interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

mod/port

Module and port number.

vlan vlan-id

Specifies the VLAN; valid values are from 1 to 4094.

summary

(Optional) Displays a summary of a tunneled port.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show l2protocol-tunnel command displays only the ports that have protocol tunneling enabled.
The show l2protocol-tunnel summary command displays the ports that have protocol tunneling
enabled, regardless of whether the port is down or currently configured as a trunk.

Examples

This example shows how to display the protocols that are tunneled on all interfaces:
Router# show l2protocol-tunnel
COS for Encapsulated Packets: 5
Drop Threshold for Encapsulated Packets: 3000
Port
Protocol Shutdown
Drop
Encapsulation
Threshold Threshold
Counter
------- -------- --------- --------- ------------Fa3/38 cdp
---3000
5
stp
---3000
2653
--------Router#

Decapsulation
Counter
------------0
0
----

Drop
Counter
------------0
0
----

This example shows how to display a summary of Layer 2-protocol tunnel ports:
Router# show l2protocol-tunnel summary
COS for Encapsulated Packets:5
Drop Threshold for Encapsulated Packets:0
Port

Protocol

Shutdown
Threshold
(cdp/stp/vtp)

Drop
Threshold
(cdp/stp/vtp)

Status

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-875

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show l2protocol-tunnel

------Fa9/1
Fa9/9
Fa9/47
Fa9/48
Router>

Related Commands

------------- stp --cdp stp vtp
--- --- --cdp stp vtp

-------------------/----/-------/----/-------/----/-------/----/----

-------------------/----/-------/----/---1500/1500/1500
----/----/----

---------down
up
down(trunk)
down(trunk)

Command

Description

l2protocol-tunnel

Enables the protocol tunneling on an interface and specifies the type of
protocol to be tunneled.

l2protocol-tunnel
drop-threshold

Specifies the maximum number of packets that can be processed for the
specified protocol on that interface before being dropped.

l2protocol-tunnel
global drop-threshold

Enables rate limiting at the software level.

l2protocol-tunnel
shutdown-threshold

Specifies the maximum number of packets that can be processed for the
specified protocol on that interface in 1 second.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-876

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show l3-mgr

show l3-mgr
To display the information about the Layer 3 manager, use the show l3-mgr command.
show l3-mgr status
show l3-mgr {interface {{interface interface-number} | {null interface-number} |
{port-channel number} | {vlan vlan-id} | status}}

Syntax Description

status

Displays information about the global variable.

interface

Displays information about the Layer 3 manager.

interface

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

null
interface-number

Specifies the null interface; the valid value is 0.

port-channel
number

Specifies the channel interface; valid values are a maximum of 64 values
ranging from 1 to 282.

vlan vlan-id

Specifies the VLAN; valid values are from 1 to 4094.

status

Displays status information about the Layer 3 manager.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.

Examples

This example shows how to display the status of the Layer 3 manager:
Router# show l3-mgr status
l3_mgr_state:
2
l3_mgr_req_q.count:
0
l3_mgr_req_q.head:
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-877

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show l3-mgr

l3_mgr_req_q.tail:
0
l3_mgr_max_queue_count: 1060
l3_mgr_shrunk_count: 0
l3_mgr_req_q.ip_inv_count:
303
l3_mgr_req_q.ipx_inv_count:
0
l3_mgr_outpak_count: 18871
l3_mgr_inpak_count:
18871
l3_mgr_max_pending_pak: 4
l3_mgr_pending_pak_count: 0
nde enable statue:
current nde addr:

0
0.0.0.0

Router#

This example shows how to display the information about the Layer 3 manager for a specific interface:
Router# show l3-mgr interface fastethernet 5/40
vlan:
0
ip_enabled:
1
ipx_enabled:
1
bg_state:
0 0 0 0
hsrp_enabled:
0
hsrp_mac:
0000.0000.0000
state:
0
up:
0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-878

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show lacp

show lacp
To display LACP information, use the show lacp command.
show lacp [channel-group] {counters | internal | neighbors | sys-id}

Syntax Description

channel-group

(Optional) Number of the channel group; valid values are from 1 to
282.

counters

Displays information about the LACP statistics.

internal

Displays LACP internal information.

neighbors

Displays information about the LACP neighbor.

sys-id

Displays the LACP system identification.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify a channel-group, all channel groups are displayed.
The channel-group values from 257 to 282 are supported on the CSM and the FWSM only.
You can enter the optional channel-group to specify a channel group for all keywords, except the sys-id
keyword.

Examples

This example shows how to display the LACP statistics for a specific channel group:
Router# show lacp 1 counters
LACPDUs
Marker
LACPDUs
Port
Sent
Recv
Sent
Recv
Pkts Err
--------------------------------------------------Channel group: 1
Fa4/1
8
15
0
0
3
0
Fa4/2
14
18
0
0
3
0
Fa4/3
14
18
0
0
0
Fa4/4
13
18
0
0
0

The output displays the following information:
•

The LACPDUs Sent and Recv columns display the LACPDUs that are sent and received on each
specific interface.

•

The LACPDUs Pkts and Err columns display the marker-protocol packets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-879

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show lacp

This example shows how to display internal information for the interfaces that belong to a specific channel:
Router# show lacp 1 internal
Flags: S - Device sends PDUs at slow rate. F - Device sends PDUs at fast rate.
A - Device is in Active mode.
P - Device is in Passive mode.
Channel group 1
Port
Fa4/1
Fa4/2
Fa4/3
Fa4/4
Router#

Flags
saC
saC
saC
saC

State
bndl
bndl
bndl
bndl

LACPDUs
Interval
30s
30s
30s
30s

LACP Port
Priority
32768
32768
32768
32768

Admin
Key
100
100
100
100

Oper
Key
100
100
100
100

Port
Number
0xc1
0xc2
0xc3
0xc4

Port
State
0x75
0x75
0x75
0x75

Table 2-77 describes the fields that are shown in the example.
Table 2-77 show lacp internal Command Output Fields

Field

Description

State

State of the specific port at the current moment is displayed; allowed values
are as follows:
•

bndl—Port is attached to an aggregator and bundled with other
ports.

•

susp—Port is in a suspended state; it is not attached to any
aggregator.

•

indep—Port is in an independent state (not bundled but able to
switch data traffic. In this case, LACP is not running on the partner
port).

•

hot-sby—Port is in a hot-standby state.

•

down—Port is down.

LACPDUs Interval

Interval setting.

LACP Port Priority

Port-priority setting.

Admin Key

Administrative key.

Oper Key

Operator key.

Port Number

Port number.

Port State

State variables for the port that are encoded as individual bits within a
single octet with the following meaning [1]:
•

bit0: LACP_Activity

•

bit1: LACP_Timeout

•

bit2: Aggregation

•

bit3: Synchronization

•

bit4: Collecting

•

bit5: Distributing

•

bit6: Defaulted

•

bit7: Expired

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-880

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show lacp

This example shows how to display the information about the LACP neighbors for a specific port
channel:
Router# show lacp 1 neighbors
Flags: S - Device sends PDUs at slow rate. F - Device sends PDUs at fast rate.
A - Device is in Active mode.
P - Device is in Passive mode.
Channel group 1 neighbors
Partner
Port
System ID
Fa4/1
8000,00b0.c23e.d84e
Fa4/2
8000,00b0.c23e.d84e
Fa4/3
8000,00b0.c23e.d84e
Fa4/4
8000,00b0.c23e.d84e

Fa4/1
Fa4/2
Fa4/3
Fa4/4
Router#

Port
Priority
32768
32768
32768
32768

Admin
Key
200
200
200
200

Partner
Port Number
0x81
0x82
0x83
0x84
Oper
Key
200
200
200
200

Age
29s
0s
0s
0s

Flags
P
P
P
P

Port
State
0x81
0x81
0x81
0x81

If no PDUs have been received, the default administrative information is displayed in braces.
This example shows how to display the LACP system identification:
Router> show lacp sys-id
8000,AC-12-34-56-78-90

The system identification is made up of the system priority and the system MAC address. The first 2 bytes
are the system priority, and the last 6 bytes are the globally administered individual MAC address that is
associated to the system.

Related Commands

Command

Description

clear lacp counters

Clears the statistics for all interfaces belonging to a specific channel group.

lacp port-priority

Sets the priority for the physical interfaces.

lacp system-priority

Sets the priority of the system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-881

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show logging ip access-list

show logging ip access-list
To display information about the logging IP access list, use the show logging ip access-list command.
show logging ip access-list {cache | config}

Syntax Description

cache

Displays information about all the entries in the OAL cache.

config

Displays information about the logging IP access-list configuration.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

OAL is supported on IPv4 unicast traffic only.

Examples

This example shows how to display all the entries in the OAL cache:
Router# show logging ip access-list cache
Matched flows:
id prot src_ip dst_ip sport dport status count
total lastlog
-------------------------------------------------------------------------------------1 17 20.2.1.82 21.2.12.2 111 63 Permit 0
3906 2d02h
2 17 20.2.1.82 21.2.12.2 1135 63 Permit 0
3906 2d02h
3 17 20.2.1.82 21.2.12.2 2159 63 Permit 0
3906 2d02h
4 17 20.2.1.82 21.2.12.2 3183 63 Permit 0
3906 2d02h
5 17 20.2.1.82 21.2.12.2 4207 63 Permit 0
3906 2d02h
6 17 20.2.1.82 21.2.12.2 5231 63 Deny 0
3906 2d02h
7 17 20.2.1.82 21.2.12.2 6255 63 Deny 0
3906 2d02h
8 17 20.2.1.82 21.2.12.2 7279 63 Permit 0
3906 2d02h
9 17 20.2.1.82 21.2.12.2 8303 63 Permit 0
3906 2d02h
10 17 20.2.1.82 21.2.12.2 9327 63 Permit 0
3905 2d02h
11 17 20.2.1.82 21.2.12.2 10351 63 Permit 0
3905 2d02h

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-882

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show logging ip access-list

12 17 20.2.1.82
3905 2d02h
13 17 20.2.1.82
3905 2d02h
14 17 20.2.1.82
3905 2d02h
15 17 20.2.1.82
3905 2d02h
16 17 20.2.1.82
3905 2d02h
17 17 20.2.1.82
3905 2d02h
18 17 20.2.1.82
3905 2d02h
19 17 20.2.1.82
3905 2d02h
20 17 20.2.1.82
3905 2d02h
Number of
Number of
Number of
Number of
Router#

21.2.12.2 11375 63 Permit 0
21.2.12.2 12399 63 Deny 0
21.2.12.2 13423 63 Permit 0
21.2.12.2 14447 63 Deny 0
21.2.12.2 15471 63 Permit 0
21.2.12.2 16495 63 Permit 0
21.2.12.2 17519 63 Permit 0
21.2.12.2 18543 63 Permit 0
21.2.12.2 19567 63 Permit 0

entries: 20
messages logged: 112
packets logged: 11200
packets received for logging: 11200

This example shows how to display information about the logging IP access-list configuration:
Router# show logging ip access-list config
Logging ip access-list configuration
Maximum number of cached entries: 8192
Logging rate limiter: 0
Log-update interval: 300
Log-update threshold: 0
Configured on input direction:
Vlan2
Vlan1
Configured on output direction:
Vlan2
Router#

Related Commands

Command

Description

clear logging ip
access-list cache

Clears all the entries from the OAL cache and sends them to the syslog.

logging ip access-list
cache (global
configuration mode)

Configures the OAL parameters.

logging ip access-list
cache (interface
configuration mode)

Enables an OAL-logging cache on an interface that is based on direction.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-883

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mac-address-table

show mac-address-table
To display the information about the MAC-address table, use the show mac-address-table command.
show mac-address-table
show mac-address-table {address mac-addr} [all | {interface interface interface-number} |
{vlan vlan-id}]
show mac-address-table aging-time [vlan vlan-id]
show mac-address-table count [vlan vlan-id]
show mac-address-table dynamic [{address mac-addr} | {interface interface interface-number}
| {vlan vlan-id}]
show mac-address-table {interface interface interface-number}
show mac-address-table limit [vlan vlan-id | {interface interface}]
show mac-address-table multicast [count | {{igmp-snooping | mld-snooping} [count]} | {user
[count]} | {vlan vlan-id}]
show mac-address-table notification {mac-move | threshold}
show mac-address-table static [{address mac-addr} | detail | {interface interface
interface-number} | {vlan vlan-id}]
show mac-address-table synchronize statistics
show mac-address-table unicast-flood
show mac-address-table vlan vlan-id

Syntax Description

address mac-addr

Displays information about the MAC-address table for a specific
MAC address; see the “Usage Guidelines” section for format
guidelines.

all

(Optional) Displays every instance of the specified MAC address in
the forwarding table.

interface interface

(Optional) Displays information about a specific interface type;
possible valid values are ethernet, fastethernet, gigabitethernet,
tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for
valid values.

vlan vlan-id

(Optional) Displays information for a specific VLAN only; valid
values are from 1 to 4094.

aging-time

Displays information about the MAC-address aging time.

count

Displays the number of entries that are currently in the MAC-address
table.

dynamic

Displays information about the dynamic MAC-address table entries
only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-884

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mac-address-table

limit

Displays MAC-usage information.

multicast

Displays information about the multicast MAC-address table entries
only.

igmp-snooping

Displays the addresses learned by IGMP snooping.

mld-snooping

Displays the addresses learned by MLDv2 snooping.

user

Displays the manually entered (static) addresses.

notification
mac-move

Displays the MAC-move notification status.

notification
threshold

Displays the CAM-table utilization notification status.

static

Displays information about the static MAC-address table entries
only.

synchronize
statistics

Displays information about the statistics collected on the switch
processor.

unicast-flood

Displays unicast-flood information.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not specify a module number, the output of the show mac-address-table command displays
information about the supervisor engine. To display information about the MAC-address table of the
switch processor, you must enter the all keyword.
The mac-addr is a 48-bit MAC address and the valid format is H.H.H.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
Valid values for mac-group-address are from 1 to 9.
The optional count keyword displays the number of multicast entries.
The optional multicast keyword displays the multicast MAC addresses (groups) in a VLAN or displays
all statically installed or IGMP snooping-learned entries in the Layer 2 table.
The information that is displayed in the show mac-address-table unicast-flood command output is as
follows:
•

Up to 50 flood entries, shared across all the VLANs that are not configured to use the filter mode,
can be recorded.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-885

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mac-address-table

•

The output field displays are defined as follows:
– ALERT—Information is updated approximately every 3 seconds.
– SHUTDOWN—Information is updated approximately every 3 seconds.

Note

The information displayed on the destination MAC addresses is deleted as soon as the floods
stop after the port shuts down.
– Information is updated each time that you install the filter. The information lasts until you

remove the filter.
The show mac-address-table protocol {assigned | ip | ipx | other} syntax is not supported on
Catalyst 6500 series switches that are configured with a Supervisor Engine 720.
The keyword definitions for the protocol argument are as follows:
•

assigned specifies assigned protocol entries.

•

ip specifies IP protocol.

•

ipx specifies IPX protocols.

•

other specifies other protocol entries.

The dynamic entries that are displayed in the Learn field are always set to Yes.
The show mac-address-table limit command output displays the following information:
•

The current number of MAC addresses.

•

The maximum number of MAC entries that are allowed.

•

The percentage of usage.

The show mac-address-table synchronize statistics command output displays the following
information:
•

Number of messages processed at each time interval.

•

Number of active entries sent for synchronization.

•

Number of entries updated, created, ignored, or failed.

Examples
Note

In a distributed EARL switch, the asterisk (*) indicates a MAC address that is learned on a port that is
associated with this EARL.
This example shows how to display the information about the MAC-address table for a specific MAC
address (the Catalyst 6500 series switch is configured with a Supervisor Engine 2):
Router# show mac-address-table address 001.6441.60ca
Codes: * - primary entry
vlan
mac address
type
learn qos
ports
------+----------------+--------+-----+---+-------------------------Supervisor:
* --- 0001.6441.60ca
static No
-- Router
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-886

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mac-address-table

This example shows how to display MAC-address table information for a specific MAC address (the
Catalyst 6500 series switch is configured with a Supervisor Engine 720):
Router# show mac-address-table address 0100.5e00.0128
Legend: * - primary entry
age - seconds since last seen
n/a - not available
vlan
mac address
type
learn
age
ports
------+----------------+--------+-----+----------+-------------------------Supervisor:
*
44 0100.5e00.0128
static Yes
Fa6/44,Router
*
1 0100.5e00.0128
static Yes
Router
Module 9:
*
44 0100.5e00.0128
static Yes
Fa6/44,Router
*
1 0100.5e00.0128
static Yes
Router
Router#

This example shows how to display the currently configured aging time for all VLANs:
Router#
Vlan
---*100
200

show mac-address-table aging-time
Aging Time
---------300
1000

Router#

This example shows how to display the entry count for a specific slot:
Router# show mac-address-table count slot 1
MAC Entries on slot 1 :
Dynamic Address Count:
4
Static Address (User-defined) Count: 25
Total MAC Addresses In Use:
29
Total MAC Addresses Available:
131072
Router#

This example shows how to display all the dynamic MAC-address entries:
Router# show mac-address-table dynamic
Legend: * - primary entry
age - seconds since last seen
n/a - not applicable
vlan
mac address
type
learn
age
ports
------+----------------+--------+-----+----------+-------------------------* 10
0010.0000.0000
dynamic Yes
n/a
Gi4/1
* 3
0010.0000.0000
dynamic Yes
0
Gi4/2
* 1
0002.fcbc.ac64
dynamic Yes
265
Gi8/1
* 1
0009.12e9.adc0
static
No
Router
Router#

This example shows how to display the information about the MAC-address table for a specific interface
(the Catalyst 6500 series switch is configured with a Supervisor Engine 720):
Router# show mac-address-table interface fastethernet 6/45
Legend: * - primary entry
age - seconds since last seen
n/a - not available
vlan
mac address
type
learn
age
ports
------+----------------+--------+-----+----------+-------------------------*
45 00e0.f74c.842d
dynamic Yes
5
Fa6/45
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-887

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mac-address-table

Note

A leading asterisk (*) indicates entries from a MAC address that was learned from a packet coming from
an outside device to a specific module.
This example shows how to display the MAC-move notification status:
Router# show mac-address-table notification mac-move
MAC Move Notification: Enabled
Router#

This example shows how to display the CAM-table utilization-notification status:
Router# show mac-address-table notification threshold
Status limit Interval
-------------+-----------+------------enabled 1 120
Router#

This example shows how to display unicast-flood information:
Router# show mac-address-table unicast-flood
Unicast Flood Protection status: enabled
Configuration:
vlan Kfps action timeout
------+----------+-----------------+---------2 2 alert none
Mac filters:
No. vlan souce mac addr. installed
on time left (mm:ss)
-----+------+-----------------+------------------------------+-----------------Flood details:
Vlan souce mac addr. destination mac addr.
------+----------------+------------------------------------------------2 0000.0000.cafe 0000.0000.bad0, 0000.0000.babe,
0000.0000.bac0
0000.0000.bac2, 0000.0000.bac4,
0000.0000.bac6
0000.0000.bac8
2 0000.0000.caff 0000.0000.bad1, 0000.0000.babf,
0000.0000.bac1
0000.0000.bac3, 0000.0000.bac5,
0000.0000.bac7
0000.0000.bac9
Router#

This example shows how to display all the static MAC-address entries (this Catalyst 6500 series switch
is configured with a Supervisor Engine 2):
Router# show mac-address-table static
Codes: * - primary entry
vlan
mac address
type
learn qos
ports
------+----------------+--------+-----+---+-------------------------* --- 0001.6441.60ca
static No
-- Router
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-888

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mac-address-table

This example shows how to display the information about the MAC-address table for a specific VLAN:
Router# show mac-address-table vlan 100
vlan
mac address
type
protocol qos
ports
-----+---------------+--------+---------+---+-------------------------------100 0050.3e8d.6400 static
assigned -- Router
100 0050.7312.0cff dynamic
ip -- Fa5/9
100 0080.1c93.8040 dynamic
ip -- Fa5/9
100 0050.3e8d.6400 static
ipx -- Router
100 0050.3e8d.6400 static
other -- Router
100 0100.0cdd.dddd static
other -- Fa5/9,Router,Switch
100 00d0.5870.a4ff dynamic
ip -- Fa5/9
100 00e0.4fac.b400 dynamic
ip -- Fa5/9
100 0100.5e00.0001 static
ip -- Fa5/9,Switch
100 0050.3e8d.6400 static
ip -- Router
Router#

This example shows how to display the information about the MAC-address table for MLDv2 snooping:
Router# show mac-address-table multicast mld-snooping
vlan mac address type learn qos ports
-----+---------------+--------+-----+---+---------------------------------- 3333.0000.0001 static Yes - Switch,Stby-Switch
--- 3333.0000.000d static Yes - Fa2/1,Fa4/1,Router,Switch
--- 3333.0000.0016 static Yes - Switch,Stby-Switch
Router#

Related Commands

Command

Description

mac-address-table
aging-time

Configures the aging time for entries in the Layer 2 table.

mac-address-table
limit

Enables MAC limiting.

mac-address-table
Enables MAC-move notification.
notification mac-move
mac-address-table
static

Adds static entries to the MAC-address table or configures a static MAC
address with IGMP snooping disabled for that address.

mac-address-table
synchronize

Synchronizes the Layer 2 MAC address table entries across the PFC.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-889

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mac-address-table learning

show mac-address-table learning
To display the MAC-address learning state, use the show mac-address-table learning command.
show mac-address-table learning [{vlan vlan-id} | {interface interface slot/port}] [module num]

Syntax Description

vlan vlan-id

(Optional) Displays information about the MAC-address learning state for the
specified switch port VLAN; valid values are from 1 to 4094.

interface
interface
slot/port

(Optional) Displays information about the MAC-address learning state for the
specified routed interface type, the slot number, and the port number.

module num

(Optional) Displays information about the MAC-address learning state for the
specified module number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The module num keyword and argument can be used to specify supervisor engines only.
The interface interface slot/port keyword and arguments can be used on routed interfaces only. The
interface interface slot/port keyword and arguments cannot be used to configure learning on switch-port
interfaces.
If you specify the vlan vlan-id, the state of the MAC-address learning of the specified VLAN, including
router interfaces, on all modules, is displayed.
If you specify the vlan vlan-id and the module num, the state of the MAC-address learning of a specified
VLAN on a specified module is displayed.
If you specify the interface interface slot/port keyword and arguments, the state of the MAC-address
learning of the specified interface on all modules is displayed.
If you specify the interface interface slot/port keyword and arguments, the state of the MAC-address
learning of the specified interface on the specified module is displayed.
If you enter the show mac-address-table learning command with no arguments or keywords, the status
of MAC learning on all the existing VLANs on all the supervisor engines configured on a Catalyst 6500
series switch is displayed.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-890

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mac-address-table learning

Examples

This example shows how to display the MAC-address learning status on all the existing VLANs on all
the supervisor engines:
Router# show mac-address-table learning
VLAN/Interface
-------------------1
100
150
200
250
1006
1007
1008
1009
1010
1011
1012
1013
1014
GigabitEthernet6/1
GigabitEthernet6/2
GigabitEthernet6/4
FastEthernet3/4
FastEthernet3/5
GigabitEthernet4/1
GigabitEthernet4/2
GigabitEthernet7/1
GigabitEthernet7/2

Mod1
Mod4
Mod7
--------------------yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
yes
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no

Router#

Table 2-78 describes the fields that are shown in the example.
Table 2-78 show mac-address-table learning Field Descriptions

Field

Description

VLAN/Interface1

VLAN ID or interface type, module, and port number.

Mod#

Module number of a supervisor engine.

yes

MAC-address learning is enabled.

no

MAC-address learning is disabled.

1. The interfaces displayed are routed interfaces that have internal VLANs assigned to them.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-891

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mac-address-table learning

This example shows how to display the status of MAC-address learning on all the existing VLANs on a
single supervisor engine:
Router# show mac-address-table learning module 4
VLAN/Interface
-------------------1
100
150
200
250
1006
1007
1008
1009
1010
1011
1012
1013
1014
GigabitEthernet6/1
GigabitEthernet6/2
GigabitEthernet6/4
FastEthernet3/4
FastEthernet3/5
GigabitEthernet4/1
GigabitEthernet4/2
GigabitEthernet7/1
GigabitEthernet7/2

Mod4
----yes
yes
yes
yes
yes
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no

Router#

This example shows how to display the status of MAC-address learning for a specific VLAN on all the
supervisor engines:
Router# show mac-address-table learning vlan 100
VLAN
---100
Router

Mod1
Mod4
Mod7
--------------------no
no
yes

This example shows how to display the status of MAC-address learning for a specific VLAN on a
specific supervisor engine:
Router# show mac-address-table learning vlan 100 module 7
VLAN
---100
Router

Mod7
----yes

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-892

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mac-address-table learning

This example shows how to display the status of MAC-address learning for a specific supervisor engine:
Router# show mac-address-table learning interface FastEthernet 3/4
Interface
--------Fa3/4
Router

Mod1
Mod4
Mod7
--------------------no
yes
no

This example shows how to display the status of MAC-address learning for a specific interface on a
specific specific supervisor engine:
Router# show mac-address-table learning interface FastEthernet 3/4 module 1
Interface
--------Fa3/4
Router

Related Commands

Mod1
----no

Command

Description

mac-address-table
learning

Enables MAC-address learning.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-893

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show memory dead

show memory dead
To display statistics of memory allocated by processes that are now terminated, use the show memory
dead command.
show memory dead [totals]

Syntax Description

totals

Command Modes

User EXEC
Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Displays memory totals for processes that have been terminated.

Usage Guidelines

The show memory dead command displays information about processes that have been terminated.
Terminated processes accounts for memory allocated under another process.

Examples

This example shows the sample output from the show memory dead command:
Router# show memory dead

I/O

Head
600000

Total(b)
2097152

Used(b)
461024

Free(b)
1636128

Lowest(b)
1635224

Largest(b)
1635960

Processor memory
Address
1D8310
2CA964
2CAA04
2CAAA0
2ED714
2F12AC
2F1304
2F1348
300C28

Bytes
60
36
112
68
52
44
24
68
340

Prev.
1D82C8
2CA914
2CA9B4
2CAA04
2ED668
2F124C
2F12AC
2F1304
300A14

Next
1D8378
2CA9B4
2CAAA0
2CAB10
2ED774
2F1304
2F1348
2F13B8
300DA8

Ref
1
1
1
1
1
1
1
1
1

PrevF

NextF

Alloc PC
3281FFE
3281FFE
3A42144
3A420D4
3381C84
3A50234
3A420D4
3381C84
3381B42

What
Router Init
Router Init
OSPF Stub LSA RBTree
Router Init
Router Init
Router Init
Router Init
Router Init
Router Init

Table 2-79 describes the significant fields shown in the display.
Table 2-79 show memory dead Field Descriptions

Field

Description

Head

Hexadecimal address of the head of the memory allocation chain.

Total(b)

Sum of used bytes plus free bytes.

Used(b)

Amount of memory in use.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-894

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show memory dead

Table 2-79 show memory dead Field Descriptions (continued)

Field

Description

Free(b)

Amount of memory not in use (in bytes).

Lowest(b)

Smallest amount of free memory since last boot (in bytes).

Largest(b)

Size of the largest available free block (in bytes).

Address

Hexadecimal address of the block (in bytes).

Bytes

Size of the block (in bytes).

Prev.

Address of the preceding block.

Next

Address of the following block.

Ref

Reference count for that memory block, indicating how many different processes are
using that block of memory.

PrevF

Address of the preceding free block (if free).

NextF

Address of the following free block (if free).

Alloc PC

Address of the system call that allocated the block.

What

Name of the process that owns the block, or “(fragment)” if the block is a fragment,
or “(coalesced)” if the block was coalesced from adjacent free blocks.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-895

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls asic

show mls asic
To display the ASIC version, use the show mls asic command.
show mls asic

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the ASIC versions:
Router# show mls asic
Earl in Module 2
Tycho - ver:1 Cisco-id:1C8 Vendor-id:49
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-896

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef

show mls cef
To display the MLS-hardware Layer 3-switching table entries, use the show mls cef command.
show mls cef [ip] [prefix [mask-length | load-info]] [detail] [module number]
show mls cef [ip] [{lookup ...} | {multicast ...} | {rpf ...} | {vpn ...} | {vrf ...}]
show mls cef [{adjacency ...} | {block block-number [entries]} | {config-register reg-address} |
{diags [detail]} | {entry index [detail]} | {exact-route ...} | {hardware [module number]} |
{inconsistency ...} | {lookup ...} | {masks [type] [module number]} | {rpf ...} | {statistics ...}
| {summary [module number]} | {tunnel fragment} | {used-blocks [type] [module number]}
| {vpn ...} | {vrf ...}]
show mls cef [{eom ...} | {ip ...} | {ipv6 ...} | {mpls ...}]

Syntax Description

ip

(Optional) Displays IPv6 unicast entries in the MLS-hardware Layer 3-switching
table; see the “Usage Guidelines” section for additional information.

prefix

(Optional) Entry prefix in the format A.B.C.D.

mask-length

(Optional) Mask length; valid values are from 0 to 32.

load-info

(Optional) Displays output with a hash value next to each adjacency.

detail

(Optional) Displays detailed hardware information. See the “Usage Guidelines”
section for important information.

module number

(Optional) Displays information about the entries for a specific module.

lookup ...

(Optional) Displays IP entries in the MLS-hardware Layer 3-switching table for the
specified destination IP address. See the show mls cef lookup command.

multicast ...

(Optional) Displays IP entries in the MLS-hardware Layer 3-switching table in the
compact CEF table display format; see the show mls cef ip multicast command.

rpf ...

(Optional) Displays information about the RPF hardware in the MLS-hardware
Layer 3-switching table; see the show mls cef rpf command.

vpn ...

(Optional) Displays information about the VPN ID CEF table. See the “Usage
Guidelines” section for important information.

vrf ...

(Optional) Displays information about the CEF table for the specified VRF
name.

adjacency ...

(Optional) Displays information about the MLS-hardware Layer 3-switching
adjacency node; see the show mls cef adjacency command.

block
block-number

(Optional) Displays information about the mask-block utilization for a specific
block; valid values are from 0 to 4294967295. See the “Usage Guidelines”
section for important information.

entries

(Optional) Displays the mask-block utilization entries. See the “Usage
Guidelines” section for important information.

config-register
reg-address

(Optional) Displays information about the hardware configuration register for a
specific register. See the “Usage Guidelines” section for important information.

diags

(Optional) Displays information about the diagnostic entry. See the “Usage
Guidelines” section for important information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-897

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef

entry index

(Optional) Specifies the specified prefix entry index to display; valid values are
from 0 to 4294967295. See the “Usage Guidelines” section for important
information.

exact-route ...

(Optional) Displays information about hardware load sharing; see the show mls
cef exact-route command.

hardware

(Optional) Displays a summary of the hardware information. See the “Usage
Guidelines” section for important information.

inconsistency ...

(Optional) Displays information about the consistency checker; see the show mls
cef inconsistency command.

masks ...

(Optional) Displays information about the mask. See the “Usage Guidelines”
section for important information.

statistics ...

(Optional) Displays the number of switched packets and bytes; see the show mls
cef statistics command.

tunnel fragment (Optional) Displays the operational status of tunnel fragmentation.
summary ...

(Optional) Displays a summary of rates in the hardware for each protocol; see the
show mls cef summary command.

used-blocks

(Optional) Displays a list of used blocks; see the “Usage Guidelines” section for
important information.

eom ...

Displays information about the EoM protocol; this keyword is not supported.

ip ...

Displays information about the IP protocol; see the “Usage Guidelines” section
for additional information.

ipv6 ...

Displays information about the IPv6 protocol.

mpls ...

Displays information about MPLS; see the show mls cef mpls command.

Defaults

If you do not specify a protocol, the default display is for IP and the global CEF table.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-898

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef

Usage Guidelines

The ... indicates that there is additional information.
The following options are for expert users only and are not documented:
•

load-info

•

detail

•

block block-number [entries]

•

config-register reg-address}

•

diags [detail]

•

entry index [detail]

•

hardware [module number]

•

masks [type]

•

used-blocks [type]

•

vpn

The MLS-hardware Layer 3 switching applies to IP traffic only.
Use the show mls cef [ip] vrf command to display the VRF CEF table entries.
You can enter this command on the supervisor engine or switch consoles. Enter the remote login
command to session into the supervisor engine to enter the commands.
The show mls cef command offers three levels of options as follows:
•

Protocol-independent options—The following keywords are not protocol specific:
– adjacency
– exact-route
– inconsistency
– module
– rpf
– statistics
– summary
– used-blocks
– vpn
– vrf

•

Protocol-dependent keywords—The following keywords specify a protocol:
– eom
– ip
– ipv6
– mpls

•

Default keywords—The following keywords display identical output for both the show mls cef and
show mls cef ip commands:
–

prefix

– lookup

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-899

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef

– multicast—This keyword is not supported on systems configured with a Supervisor

Engine 720.
– module
– rpf
– vpn
– vrf

Examples

This example shows how the show mls cef and show mls cef ip commands are identical:
Router# show mls cef
Codes: decap - Decapsulation, + - Push Label
Index Prefix
Adjacency
64
127.0.0.51/32
punt
65
127.0.0.0/32
punt
66
127.255.255.255/32 punt
67
1.1.1.100/32
punt
68
1.1.1.0/32
punt
69
1.1.1.255/32
punt
70
2.2.2.100/32
punt
71
2.2.2.0/32
punt
72
2.2.2.255/32
punt
73
2.2.2.5/32
Gi5/2,
0000.c005.0205
74
0.0.0.0/32
punt
75
255.255.255.255/32 punt
76
200.1.22.22/32
punt
77
200.0.0.0/32
punt
78
200.255.255.255/32 punt
79
200.1.1.153/32
Vl30,
0050.808b.8200
81
200.1.1.91/32
Vl30,
0004.4eef.8800
82
200.1.1.100/32
Vl30,
00d0.bb02.0400
83
200.12.223.3/32
Vl30,
00d0.061b.7000
84
200.2.5.3/32
Vl30,
00d0.061d.200a
85
200.1.1.101/32
Vl30,
0007.ecfc.e40a
86
200.0.100.1/32
Vl30,
0050.2a8d.700a
87
200.1.1.104/32
Vl30,
0050.0f2d.ac00
88
223.255.254.226/32 Vl30,
0050.2a8d.700a
89
2.2.2.7/32
Gi5/2,
0000.c005.0207
90
1.1.1.5/32
Gi5/1,
0000.0101.0105
3200
224.0.0.0/24
punt
3201
1.1.1.0/24
punt
3202
2.2.2.0/24
punt
134400 200.0.0.0/8
punt
134432 0.0.0.0/0
drop
524256 0.0.0.0/0
drop
Router#

This example shows how to display all the MLS-hardware Layer 3-switching table IP entries:
Router# show mls cef ip
Codes:
Index
64
65
66
67
68
69

decap - Decapsulation, + - Push Label
Prefix
Adjacency
127.0.0.51/32
punt
127.0.0.0/32
punt
127.255.255.255/32 punt
1.1.1.100/32
punt
1.1.1.0/32
punt
1.1.1.255/32
punt

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-900

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef

70
2.2.2.100/32
71
2.2.2.0/32
72
2.2.2.255/32
73
2.2.2.5/32
74
0.0.0.0/32
75
255.255.255.255/32
76
200.1.22.22/32
77
200.0.0.0/32
78
200.255.255.255/32
79
200.1.1.153/32
81
200.1.1.91/32
82
200.1.1.100/32
83
200.12.223.3/32
84
200.2.5.3/32
85
200.1.1.101/32
86
200.0.100.1/32
87
200.1.1.104/32
88
223.255.254.226/32
89
2.2.2.7/32
90
1.1.1.5/32
3200
224.0.0.0/24
3201
1.1.1.0/24
3202
2.2.2.0/24
134400 200.0.0.0/8
134432 0.0.0.0/0
524256 0.0.0.0/0
Router#

punt
punt
punt
Gi5/2,
punt
punt
punt
punt
punt
Vl30,
Vl30,
Vl30,
Vl30,
Vl30,
Vl30,
Vl30,
Vl30,
Vl30,
Gi5/2,
Gi5/1,
punt
punt
punt
punt
drop
drop

0000.c005.0205

0050.808b.8200
0004.4eef.8800
00d0.bb02.0400
00d0.061b.7000
00d0.061d.200a
0007.ecfc.e40a
0050.2a8d.700a
0050.0f2d.ac00
0050.2a8d.700a
0000.c005.0207
0000.0101.0105

Table 2-80 describes the fields in the examples.
Table 2-80 show mls cef Command Output Fields

Field

Description

Index

MLS-hardware Layer 3-switching table entry index; the maximum is
256,000 entries.

Prefix

Entry prefix address/mask.

Adjacency

Adjacency types are as follows:
•

drop—Packets matching the prefix entry are dropped.

•

punt—Packets are redirected to an PISA for further processing.

•

mac-address—Packets matching the prefix are forwarded to this specific next
hop or the final destination host if directly attached.

This example shows how to display the operational status of tunnel fragmentation:
Router# show mls cef tunnel fragment
Tunnel Fragmentation:
Enabled
Router#

Related Commands

Command

Description

show mls cef summary Displays the number of routes in the MLS-hardware Layer 3-switching
table for all the protocols.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-901

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef adjacency

show mls cef adjacency
To display information about the MLS-hardware Layer 3-switching adjacency node, use the show mls
cef adjacency command.
show mls cef adjacency [all | decap-tunnel | {encap-tunnel ip-src-addr} | {entry index [to
end-range]} | {flags lower-flag upper-flag} | mac-address number | mac-rewrite | macv4 |
{mpls [label]} | multicast | nat | recirculation | special | tcp | usage] [detail] [module number]

Syntax Description

all

(Optional) Displays all application-allocated entries.

decap-tunnel

(Optional) Displays the decapsulated tunneled-packet information.

encap-tunnel
ip-src-addr

(Optional) Displays the encapsulated tunnel-adjacency entry that matches the
specified address.

entry index

(Optional) Displays the adjacency-entry information for the specified
index; valid values are from 0 to 1048575.

to end-range

(Optional) Specifies the index range to display adjacency-entry
information; valid values are from 0 to 1048575.

flags

(Optional) Displays information about the specified bit flags. See the
“Usage Guidelines” section for additional information.

lower-flag

Lower 32-bits flag values to display; valid values are 0 to FFFFFFFF.

upper-flag

Upper 32-bits flag values to display; valid values are 0 to FFFFFFFF.

mac-address number

(Optional) Displays information about the matched MAC-address
adjacency for the specified 48-bit hardware address in the H.H.H format.

mac-rewrite

(Optional) Displays information about the MAC-rewrite adjacency.

macv4

(Optional) Displays information about the MACv4 adjacency.

mpls

(Optional) Displays information about the MPLS adjacency.

label

(Optional) MPLS label to display adjacency-entry information; valid values
are from 0 to 1048575.

multicast

(Optional) Displays information about the multicast adjacency.

nat

(Optional) Displays information about the NAT adjacency.

recirculation

(Optional) Displays information about the recirculated-adjacency entry.

special

(Optional) Displays information about the special adjacencies.

tcp

(Optional) Displays information about the TCP-application adjacency.

usage

(Optional) Displays information about the adjacency usage.

detail

(Optional) Displays hardware-entry details.

module number

(Optional) Displays information about the adjacency node for a specific
module.

Defaults

This command has no default settings.

Command Modes

EXEC

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-902

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef adjacency

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

The decap-tunnel and endcap-tunnel keywords are used to display the tunnel nodes. The encapsulator
node is considered the tunnel-entry point and the decapsulator node is considered the tunnel-exit point.
There may be multiple source-destination pairs using the same tunnel between the encapsulator and
decapsulator.
The decap-tunnel and endcap-tunnel keywords are not supported on Catalyst 6500 series switches that
are configured with a Supervisor Engine 720.
The flags keyword applies to all adjacency formats (for example, mac-rewrite, mpls, and multicast) and
indicates the bits that are set in the adjacency for the specific adjacency.
The module number keyword and argument designate the module and port number. Valid values depend
on the chassis and module used. For example, if you have a 48-port 10/100BASE-T Ethernet module
installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values for
the port number are from 1 to 48.
MLS-hardware Layer 3 switching applies to IP traffic only.
MLS-hardware Layer 3-switching adjacency statistics are updated every 60 seconds.
You can display hardware-switched IP-directed broadcast information by entering the show mls cef
adjacency mac-address number detail command.
For each MLS-hardware Layer 3-switching FIB entry, MLS-hardware Layer 3 switching stores Layer 2
information from the PISA for adjacent nodes in the MLS-hardware Layer 3-switching adjacency table.
Adjacent nodes are directly connected at Layer 2. To forward traffic, MLS-hardware Layer 3 switching
selects a route from a MLS-hardware Layer 3-switching FIB entry, which points to a MLS-hardware
Layer 3-switching adjacency entry, and uses the Layer 2 header for the adjacent node in the adjacency
table entry to rewrite the packet during Layer 3 switching. MLS-hardware Layer 3 switching supports
one million adjacency-table entries.

Examples

This example shows how to display information for all adjacency nodes:
Router# show mls cef adjacency all
Index: 5

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0

Index: 32773

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0


Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-903

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef adjacency

This example shows how to display the adjacency-entry information for a specific index:
Router# show mls cef adjacency entry 132
Index: 132

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0

This example shows how to display the adjacency-entry information for a range of indexes:
Router# show mls cef adjacency entry 132 to 134
Index: 132

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0

Index: 133

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0

Index: 134

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0

Router#

This example shows how to display recirculation-adjacency information:
Router# show mls cef adjacency recirculation detail
Index: 6
smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 65535, vlan: 0, dindex: 0x0, ccc = 110,
format: RECIR, l3rw_vld: 1
Router#

This example shows how to display specific bit flags:
Router# show mls cef adjacency flags 8408 0
STAT_REQUIRED NO_STAT CAP1 IQO UTTL UTOS
Router#

This example shows how to display adjacency-node information for a specific MAC address:
Router# show mls cef adjacency mac-address 00e0.f74c.842d
Index: 133138

smac: 00d0.061d.200a, dmac: 00e0.f74c.842d
mtu: 1518, vlan: 45, dindex: 0x0, l3rw_vld: 1
packets: 0, bytes: 0

Index: 133144

smac: 00d0.061d.200a, dmac: 00e0.f74c.842d
mtu: 1518, vlan: 45, dindex: 0x0, l3rw_vld: 1
packets: 0, bytes: 0

Router#

This example shows how to display the MAC-rewrite adjacency information:
Router# show mls cef adjacency mac-rewrite
Index: 133132

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
packets: 0, bytes: 0

Index: 133133

smac: 000a.421f.3000, dmac: 0050.2a8d.700a
mtu: 1518, vlan: 1, dindex: 0x0, l3rw_vld: 1
packets: 0, bytes: 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-904

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef adjacency

Index: 133134

smac: 000a.421f.3000, dmac: 0000.7201.0001
mtu: 1518, vlan: 72, dindex: 0x0, l3rw_vld: 1
packets: 0, bytes: 0

Index: 133135

smac: 000a.421f.3000, dmac: 0000.7301.0001
mtu: 1518, vlan: 73, dindex: 0x0, l3rw_vld: 1
packets: 0, bytes: 0


This example shows how to display information about the MPLS adjacency:
Router# show mls cef adjacency mpls detail
Index: 32768 smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 1514, vlan: 0, dindex: 0x7FFA, l3rw_vld: 1
format: MPLS, flags: 0x1000408600
label0: 0, exp: 0, ovr: 0
label1: 0, exp: 0, ovr: 0
label2: 0, exp: 0, ovr: 0
op: POP
packets: 0, bytes: 0
Router#

This example shows how to display information about the multicast adjacency:
Router# show mls cef adjacency multicast detail
Index: 22 smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 0, vlan: 0, dindex: 0x0, l3rw_vld: 0
format: MULTICAST, flags: 0x800
met2: 0, met3: 0
packets: 2232, bytes: 180684
Router#

This example shows how to display information about the NAT adjacency:
Router# show mls cef adjacency nat detail
Index: 200 mtu: 1522, vlan: 1063, dindex: 0x7FFA, l3rw_vld: 1
format: NAT, flags: 0x8600
ip_sa: 2.2.2.2, src_port: 100
ip_da: 3.3.3.3, dst_port: 300
delta_seq: 0, delta_ack: 0
packets: 0, bytes: 0
Router#

This example shows how to display information about the special adjacency:
Router# show mls cef adjacency special
Index: 0

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 9234, vlan: 0, dindex: 0x0, l3rw_vld: 0
format: MULTICAST, flags: 0x800 (mcast_fib_fail)
met2: 0, met3: 0
packets: 0, bytes: 0

Index: 1

smac: 0000.0000.0000, dmac: 0000.0000.0000
mtu: 9234, vlan: 0, dindex: 0x0, l3rw_vld: 0
format: MULTICAST, flags: 0x800 (mcast_fib_rf_cr)
met2: 0, met3: 0
packets: 0, bytes: 0



Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-905

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef adjacency

This example shows how to display information about the TCP adjacency:
Router# show mls cef adjacency tcp detail
Index: 200 smac: abcd.abcd.abcd, dmac: 0000.1000.2000
mtu: 1518, vlan: 1063, dindex: 0x0, l3rw_vld: 1
format: MAC_TCP, flags: 0x8408
delta_seq: 10, delta_ack: 0
packets: 0, bytes: 0
Router#

This example shows how to display information about the adjacency usage:
Router# show mls cef adjacency usage
Adjacency Table Size: 1048576
ACL region usage: 2
Non-stats region usage: 128
Stats region usage: 31
Total adjacency usage: 161
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-906

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef exact-route

show mls cef exact-route
To display information about the hardware load sharing, use the show mls cef exact-route command.
show mls cef exact-route src-ip {dest-ip | src-l4port} [dest-l4port | {module num}]
show mls cef exact-route {vrf instance-name} src-ip {dest-ip | src-l4port} [dest-l4port |
{module num}]

Syntax Description

src-ip

Source IP address.

dest-ip

Destination IP address.

src-l4port

Layer 4-source port number; valid values are from 0 to 65535.

dest-l4port

(Optional) Layer 4-destination port number; valid values are from 0 to 65535.

module num

(Optional) Module number.

vrf
instance-name

Displays the numeric VPN routing and forwarding ID for the specified VRF
instance name.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The vrf instance-name keyword and argument are not supported on Catalyst 6500 series switches that
are configured with a Supervisor Engine 2.

Examples

This example shows how to display the hardware load-sharing information:
Router# show mls cef exact-route 172.20.52.16 172.20.52.31
Interface: Gi2/1, Next Hop: 255.255.255.255, Vlan: 4073, Destination Mac: 00d0.061d.200a
Router#

Related Commands

Command

Description

show ip cef exact-route Displays the exact route for a source-destination IP address pair.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-907

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef exception

show mls cef exception
To display information about the CEF exception, use the show mls cef exception command.
show mls cef exception {status [detail] | priorities}

Syntax Description

status

Displays information about the CEF-exception status.

detail

(Optional) Displays detailed hardware information; see the “Usage Guidelines”
section for more information.

priorities

Displays information about the CEF-exception priority.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The detail keyword is for expert users only and is not documented.
In the output of the show mls cef exception status command, the following definitions apply:

Examples

•

FALSE—Indicates that the protocol is not under the exception.

•

TRUE—Indicates that the protocol is under the exception.

This example shows how to display detailed information about the CEF-exception status:
Router#
Current
Current
Current
Router#

show
IPv4
IPv6
MPLS

mls
FIB
FIB
FIB

cef exception status
exception state = FALSE
exception state = FALSE
exception state = FALSE

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-908

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef exception

This example shows how to display the FIB ERM-exception priority:
Router# show mls cef exception priorities
Priority Protocol
=====================
1 IPv4
2 IPv6
3 MPLS
Router#

Related Commands

Command

Description

mls erm priority

Assigns the priorities to define an order in which protocols attempt to
recover from the exception status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-909

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef hardware

show mls cef hardware
To display the MLS-hardware Layer 3-switching table entries, use the show mls cef hardware
command.
show mls cef hardware [module number]

Syntax Description

module number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Displays the adjacency-node information for a specific module.

Usage Guidelines

MLS-hardware Layer 3 switching applies to IP traffic only.

Examples

This example shows how to display all the MLS-hardware Layer 3-switching table entries:
Router# show mls cef hardware
CEF TCAM v2:
Size:
65536 rows/device, 4 device(s), 262144 total rows
32 entries/mask-block
8192 total blocks (32b wide)
1212416 s/w table memory
Options:
sanity check: on
sanity interval: 301 seconds
consistency check: on
consistency interval: 61 seconds
redistribution: off
redistribution interval: 120 seconds
redistribution threshold: 10
compression: on
compression interval: 31 seconds
tcam/ssram shadowing: on
Operation Statistics:
Entries inserted:
0000000000000024
Entries deleted:
0000000000000005
Entries compressed:
0000000000000000
Blocks inserted:
0000000000000018
Blocks deleted:
0000000000000004
Blocks compressed:
0000000000000000
Blocks shuffled:
0000000000000002
Blocks deleted for exception:
0000000000000000

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-910

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef hardware

Direct h/w modifications:

0000000000000000

Background Task Statistics:
Consistency Check count:
Consistency Errors:
SSRAM Consistency Errors:
Sanity Check count:
Sanity Check Errors:
Compression count:

0000000000014066
0000000000000000
0000000000000000
0000000000002855
0000000000000000
0000000000004621

Exception Handling status
: on
L3 Hardware switching status : on
Fatal Error Handling Status : Reset
Fatal Errors:
0000000000000000
Fatal Error Recovery Count:
0000000000000000
SSRAM ECC error summary:
Uncorrectable ecc entries
Correctable ecc entries
Packets dropped
Packets software switched

:
:
:
:

0
0
0
0

FIB SSRAM Entry status
---------------------Key: UC - Uncorrectable error, C - Correctable error
SSRAM banks : Bank0
Bank1
No ECC errors reported in FIB SSRAM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-911

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef inconsistency

show mls cef inconsistency
To display consistency-checker information, use the show mls cef inconsistency command.
show mls cef inconsistency [module num | now | records] [detail] [module num]

Syntax Description

module num

(Optional) Displays inconsistency information for the specified module.

now

(Optional) Runs a consistency check and displays any issues.

records

(Optional) Displays the inconsistency records.

detail

(Optional) Displays hardware-entry details.

module num

(Optional) Displays the adjacency-node information for a specific module.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

If you enter the show mls cef inconsistency command with no arguments, this information is displayed:
•

Consistency check count

•

TCAM-consistency check errors

•

SSRAM-consistency check errors

This example shows how to display information about the consistency checker:
Router# show mls cef inconsistency
Consistency Check Count
: 81
TCAM Consistency Check Errors : 0
SSRAM Consistency Check Errors : 0
Router#

This example shows how to display information about the consistency checker for a specific module:
Router# show mls cef inconsistency module 7
Consistency Check Count
: 11033
TCAM Consistency Check Errors : 0
SSRAM Consistency Check Errors : 0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-912

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef inconsistency

This example shows how to run a consistency check and display any issues:
Router# show mls cef inconsistency now
Performing TCAM check now ...done
No. of FIB TCAM Consistency Check Errors : 0
Performing SSRAM check now ...done
No. of FIB SSRAM Consistency Check Errors : 0
Router#

This example shows how to display the consistency records:
Router# show mls cef inconsistency records
Consistency Check Count
: 11044
TCAM Consistency Check Errors : 0
SSRAM Consistency Check Errors : 0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-913

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ip

show mls cef ip
To display the IP entries in the MLS-hardware Layer 3-switching table, use the show mls cef ip command.
show mls cef ip [prefix [mask-length]] [detail] [module number]
show mls cef ip accounting per-prefix
show mls cef ip {lookup ...} | {multicast tcam ...} | {rpf ...} | {vpn ...} | {vrf ...}

Syntax Description

prefix

(Optional) Entry prefix in the format A.B.C.D.

mask-length

(Optional) Mask length; valid values are from 0 to 32.

detail

(Optional) Displays hardware-entry details.

module number

(Optional) Displays the entries for a specific module.

accounting
per-prefix

Displays all the prefixes that are configured for the statistic collection.

lookup ...

Displays the TCAM-entry index for the specified destination IP unicast
address; see the show mls cef lookup command.

multicast tcam ...

Displays the IP entries in the MLS-hardware Layer 3-switching table in the
compact CEF table-display format; see the “Usage Guidelines” section for
additional information.

rpf ...

Displays the RPF-hardware information in the MLS-hardware
Layer 3-switching table; see the show mls cef rpf command.

vpn ...

(Optional) Displays information about the VPN ID CEF table; see the
“Usage Guidelines” section for more information.

vrf ...

Displays information about the VPN-instance CEF table.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

See the show mls cef ip multicast tcam command for information about this command.
The ... indicates that there is additional information.
The vpn keyword is for expert users only and is not documented.
Information in the output of the show mls cef ip command is also displayed in the show mls cef
commands.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-914

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ip

The lookup is performed as a “longest prefix match” and displays the TCAM-entry index that applies to
the specified destination IP address.
The information output is in this format: Index, Prefix, Mask, and Adjacency.

Examples

This example shows how the show mls cef and show mls cef ip commands are identical:
Router# show mls cef
Codes: decap - Decapsulation, + - Push Label
Index Prefix
Adjacency
64
127.0.0.51/32
punt
65
127.0.0.0/32
punt
66
127.255.255.255/32 punt
67
1.1.1.100/32
punt
68
1.1.1.0/32
punt
69
1.1.1.255/32
punt
70
2.2.2.100/32
punt
71
2.2.2.0/32
punt
72
2.2.2.255/32
punt
73
2.2.2.5/32
Gi5/2,
0000.c005.0205
74
0.0.0.0/32
punt
75
255.255.255.255/32 punt
76
200.1.22.22/32
punt
77
200.0.0.0/32
punt
78
200.255.255.255/32 punt
79
200.1.1.153/32
Vl30,
0050.808b.8200
81
200.1.1.91/32
Vl30,
0004.4eef.8800
82
200.1.1.100/32
Vl30,
00d0.bb02.0400
83
200.12.223.3/32
Vl30,
00d0.061b.7000
84
200.2.5.3/32
Vl30,
00d0.061d.200a
85
200.1.1.101/32
Vl30,
0007.ecfc.e40a
86
200.0.100.1/32
Vl30,
0050.2a8d.700a
87
200.1.1.104/32
Vl30,
0050.0f2d.ac00
88
223.255.254.226/32 Vl30,
0050.2a8d.700a
89
2.2.2.7/32
Gi5/2,
0000.c005.0207
90
1.1.1.5/32
Gi5/1,
0000.0101.0105
3200
224.0.0.0/24
punt
3201
1.1.1.0/24
punt
3202
2.2.2.0/24
punt
134400 200.0.0.0/8
punt
134432 0.0.0.0/0
drop
524256 0.0.0.0/0
drop
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-915

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ip

This example shows how to display all the MLS-hardware Layer 3-switching table IP entries:
Router# show mls cef ip
Codes: decap - Decapsulation, + - Push Label
Index Prefix
Adjacency
64
127.0.0.51/32
punt
65
127.0.0.0/32
punt
66
127.255.255.255/32 punt
67
1.1.1.100/32
punt
68
1.1.1.0/32
punt
69
1.1.1.255/32
punt
70
2.2.2.100/32
punt
71
2.2.2.0/32
punt
72
2.2.2.255/32
punt
73
2.2.2.5/32
Gi5/2,
0000.c005.0205
74
0.0.0.0/32
punt
75
255.255.255.255/32 punt
76
200.1.22.22/32
punt
77
200.0.0.0/32
punt
78
200.255.255.255/32 punt
79
200.1.1.153/32
Vl30,
0050.808b.8200
81
200.1.1.91/32
Vl30
0004.4eef.8800
82
200.1.1.100/32
Vl30
00d0.bb02.0400
83
200.12.223.3/32
Vl30
00d0.061b.7000
84
200.2.5.3/32
Vl30
00d0.061d.200a
85
200.1.1.101/32
Vl30
0007.ecfc.e40a
86
200.0.100.1/32
Vl30
0050.2a8d.700a
87
200.1.1.104/32
Vl30
0050.0f2d.ac00
88
223.255.254.226/32 Vl30
0050.2a8d.700a
89
2.2.2.7/32
Gi5/2
0000.c005.0207
90
1.1.1.5/32
Gi5/1
0000.0101.0105
3200
224.0.0.0/24
punt
3201
1.1.1.0/24
punt
3202
2.2.2.0/24
punt
134400 200.0.0.0/8
punt
134432 0.0.0.0/0
drop
524256 0.0.0.0/0
drop
Router#

Table 2-81 describes the fields shown in the examples.
Table 2-81 show mls cef ip Command Output Fields

Field

Description

Index

MLS-hardware Layer 3-switching table entry index; the maximum is
256,000 entries.

Prefix

Entry prefix address/mask.

Adjacency

Adjacency information.

This example shows how to display the detailed MLS-hardware Layer 3-switching table entries:
Router# show mls cef ip 127.0.0.52 detail
Codes: M - mask entry, V - value entry, A - adjacency index, P - priority bit
D - full don't switch, m - load balancing modnumber, B - BGP Bucket sel
V0 - Vlan 0,C0 - don't comp bit 0,V1 - Vlan 1,C1 - don't comp bit 1
RVTEN - RPF Vlan table enable, RVTSEL - RPF Vlan table select

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-916

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ip

Format: IPV4_DA - (8 |
Format: IPV4_SA - (9 |
M(194
): E | 1 FFF
V(194
): 8 | 1 0
Router#

xtag vpn pi cr recirc tos prefix)
xtag vpn pi cr recirc prefix)
0 0 0 0
255.255.255.255
0 0 0 0
127.0.0.52
(A:133120 ,P:1,D:0,m:0 ,B:0)

This example shows how to display all the prefixes that are configured for the statistic collection:
Router# show mls cef ip accounting per-prefix
VRF
Prefix/Mask
Packets

Bytes

A - Active, I - Inactive
Router#

Related Commands

Command

Description

show mls cef

Displays the MLS-hardware Layer 3-switching table entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-917

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ip multicast

show mls cef ip multicast
To display the IP entries in the multilayer switching (MLS)-hardware Layer 3-switching table on the switch
processor, use the show mls cef ip multicast command.
show mls cef ip multicast {bidir | grp-only | source source-ip} [detail | group group-id |
vlan rpf-vlanid]
show mls cef ip multicast control [detail | prefix prefix | vlan rpf-vlanid]
show mls cef ip multicast group group-id [detail | vlan rpf-vlanid]
show mls cef ip multicast src-grp [detail | group group-ip | source | vlan rpf-vlanid]
show mls cef ip multicast subnet [detail | prefix prefix | vlan rpf-vlanid]
show mls cef ip multicast summary [vpn-num]
show mls cef ip multicast tcam [prefix [mask]] [detail] [module num] [vrf src-ip {src-port |
dst-ip} [dst-port | module num]]
show mls cef ip multicast {grp-mask | vlan rpf-vlanid | vpn vpn-id} [detail]

Syntax Description

bidir

Displays Bidir information.

grp-only

Displays hardware-entry information that is based on (*,G) shortcuts; see the
“Usage Guidelines” section for additional information.

source source-ip

Displays hardware-entry information based on the specified source IP address.

detail

(Optional) Displays hardware-entry details.

group group-id

(Optional) Displays hardware-entry information that is based on the specified
group IP address.

vlan rpf-vlanid

(Optional) Displays information for a specific RPF VLAN ID; valid values are
from 0 to 4095.

control

(Optional) Displays hardware-entry information that is based on (*,G/m)
entries; see the “Usage Guidelines” section for additional information.

prefix prefix

(Optional) Displays hardware-entry information that is based on an IP subnet
prefix.

src-grp

Displays hardware-entry information that is based on (S,G) shortcuts; see the
“Usage Guidelines” section for additional information.

subnet

Displays hardware-entry information that is based on (S/m,*) shortcuts; see the
“Usage Guidelines” section for additional information.

summary

Displays a summary of installed-hardware shortcuts.

tcam

Displays CEF-table information in a compact format; see the “Usage
Guidelines” section for additional information.

mask

(Optional) Displays hardware-entry information that is based on the specified
subnet mask.

vrf src-ip

(Optional) Displays the numeric VRF ID for the specified source IP address.

src-port

(Optional) Layer 4 source port; valid values are from 0 to 65535.

dst-ip

(Optional) Destination IP address.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-918

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ip multicast

dst-port

(Optional) Layer 4 destination port; valid values are from 0 to 65535.

grp-mask

Displays hardware-entry information that is based on Bidir (*,G/m) shortcuts.

vpn vpn-id

Displays hardware-entry information that is based on the specified VPN ID;
valid values are from 0 to 4095.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

There are two MMLS modes, ingress and egress. The output displayed differs for each mode.
The hardware-entry types are as follows:
•

{S/m,*}—Interface/mask (or subnet) entries that are used to catch a directly connected source.

•

{*,G/m}—Groups that are served by the route processors as group/mask.

•

{G,C}—G indicates a destination MAC address, which is derived from an IP-multicast address, and
C indicates the ingress VLAN.

•

{S,G,C}—S indicates the source IP address, G indicates the destination IP address, which is a
multicast address, and C indicates the ingress VLAN, which is usually the RPF VLAN of the flow.

•

{S,G}—Multicast-routing table entry that is maintained by the software or a multicast-forwarding
table entry that is created in the FIB table.

•

{*,G}—Same as {S,G}, except that the source address is a wildcard.

The DF index field ranges from 1 to 4 and is an index into the acceptance (PIM route processors
multiplied by the DF) table. The acceptance table is used with DF forwarding and is used to identify the
set of DF interfaces for each of the four RPs in a VPN.

Examples

This example shows how to display ingress hardware-entry information that is based on Bidir (*,G/m)
shortcuts:
Router# show mls cef ip multicast grp-mask
Multicast CEF Entries for VPN#0
Flags: R - Control, S - Subnet, B - Bidir, C - Complete, P - Partial,
c - Central Rewrite, p - Primary Input, r - Recirculation
Source/mask
Destination/mask
RPF/DF Flags #packets
#bytes
rwindex Output Vlans/Info
+-------------------+-------------------+-------+-----+-------------+------------------+-------+------------------------------+
*
226.2.2.0/24
Df0
BCp
0
0
Vl50 [1 oifs]
*
225.2.2.0/24
Df1
BCp
0
0
Vl51 [1 oifs]

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-919

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ip multicast

*
227.2.2.0/24
Vl51 [1 oifs]
Found 3 entries. 3 are mfd entries
Router#

Df1

BCp

0

0

-

This example shows how to display detailed ingress hardware-entry information that is based on Bidir
(*,G/m) shortcuts:
Router# show mls cef ip multicast grp-mask detail
(*, 226.2.2.0/24)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:0 AdjPtr:7,32775,65543,98311 FibRpfNf:0 FibRpfDf:0 FibAddr:0x100
rwvlans:0 rwindex:0x0 adjmac:0006.d606.e240 rdt:0 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1518 rwtype:L3 met2:0x0 met3:0x5
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0005
V E C: 50 I:0x00449
(*, 225.2.2.0/24)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:1 AdjPtr:8,32776,65544,98312 FibRpfNf:0 FibRpfDf:0 FibAddr:0x102
rwvlans:0 rwindex:0x0 adjmac:0006.d606.e240 rdt:0 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1518 rwtype:L3 met2:0x0 met3:0x6
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0006
V E C: 51 I:0x0044B
(*, 227.2.2.0/24)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:1 AdjPtr:19,32787,65555,98323 FibRpfNf:0 FibRpfDf:0 FibAddr:0x104
rwvlans:0 rwindex:0x0 adjmac:0006.d606.e240 rdt:0 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1518 rwtype:L3 met2:0x0 met3:0x7
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0007
V E C: 51 I:0x0044B
Found 3 entries. 3 are mfd entries
Router#

This example shows how to display ingress-Bidir information:
Router# show mls cef ip multicast bidir
Multicast CEF Entries for VPN#0
Flags: R - Control, S - Subnet, B - Bidir, C - Complete, P - Partial,
c - Central Rewrite, p - Primary Input, r - Recirculation
Source/mask
Destination/mask
RPF/DF Flags #packets
#bytes
rwindex Output Vlans/Info
+-------------------+-------------------+-------+-----+-------------+------------------+-------+------------------------------+
*
225.2.2.2/32
Df1
BCp
0
0
Vl51,Vl30 [2 oifs]
*
225.2.2.1/32
Df1
BCp
0
0
Vl51,Vl30 [2 oifs]
Found 2 entries. 2 are mfd entries
Router#

This example shows how to display detailed ingress-Bidir information:
Router# show mls cef ip multicast bidir detail
(*, 225.2.2.2)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:1 AdjPtr:10,32778,65546,98314 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-920

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ip multicast

rwvlans:0 rwindex:0x0 adjmac:0006.d606.e240 rdt:0 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1518 rwtype:L3 met2:0x0 met3:0xA
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x000A
V C: 51 I:0x004B5 P->19A0
- V
V E C: 30 I:0x0049B
(*, 225.2.2.1)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:1 AdjPtr:9,32777,65545,98313 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE0
rwvlans:0 rwindex:0x0 adjmac:0006.d606.e240 rdt:0 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1518 rwtype:L3 met2:0x0 met3:0x8
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0008
V C: 51 I:0x004B1 P->199C
- V
V E C: 30 I:0x00499
Found 2 entries. 2 are mfd entries
Router#

This example shows how to display egress hardware-entry information that is based on Bidir (*,G/m)
shortcuts:
Router# show mls cef ip multicast grp-mask
Multicast CEF Entries for VPN#0
Flags: R - Control, S - Subnet, B - Bidir, C - Complete, P - Partial,
c - Central Rewrite, p - Primary Input, r - Recirculation
Source/mask
Destination/mask
RPF/DF Flags #packets
#bytes
rwindex Output Vlans/Info
+-------------------+-------------------+-------+-----+-------------+------------------+-------+------------------------------+
*
225.2.2.0/24
Df0
BCp
0
0
*
225.2.2.0/24
Bpr
0
0
0x4AE
Vl51 [1 oifs]
*
225.2.2.0/24
Br
0
0
0x40E
Vl51 [1 oifs]
*
226.2.2.0/24
Df1
BCp
0
0
*
226.2.2.0/24
Bpr
0
0
0x4AE
Vl50 [1 oifs]
*
226.2.2.0/24
Br
0
0
0x40E
Vl50 [1 oifs]
*
227.2.2.0/24
Df0
BCp
0
0
*
227.2.2.0/24
Bpr
0
0
0x4AE
Vl51 [1 oifs]
*
227.2.2.0/24
Br
0
0
0x40E
Vl51 [1 oifs]
Found 3 entries. 3 are mfd entries
Router#

This example shows how to display detailed egress hardware-entry information that is based on Bidir
(*,G/m) shortcuts:
Router# show mls cef ip multicast grp-mask detail
(*, 225.2.2.0/24)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:0 AdjPtr:7,32775,65543,98311 FibRpfNf:0 FibRpfDf:0 FibAddr:0x120
rwvlans:0 rwindex:0x0 rdt:0 E:0 CAP1:0
fmt:recir l3rwvld:1 DM:0 mtu:1522 rwtype:RECIR
packets:0000000000000 bytes:000000000000000000
PI:1 (1) CR:0 (0) Recirc:1 (1)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-921

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ip multicast

AdjPtr:8,32776,65544,98312 FibRpfNf:0 FibRpfDf:0 FibAddr:0x122
rwvlans:0 rwindex:0x4AE adjmac:0006.d606.e240 rdt:1 E:1 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x5
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0005
V E C: 51 I:0x0044C
PI:0 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:9,32777,65545,98313 FibRpfNf:0 FibRpfDf:0 FibAddr:0x124
rwvlans:0 rwindex:0x40E adjmac:0006.d606.e240 rdt:1 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x5
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0005
V E C: 51 I:0x0044C
(*, 226.2.2.0/24)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:1 AdjPtr:10,32778,65546,98314 FibRpfNf:0 FibRpfDf:0 FibAddr:0x126
rwvlans:0 rwindex:0x0 rdt:0 E:0 CAP1:0
fmt:recir l3rwvld:1 DM:0 mtu:1522 rwtype:RECIR
packets:0000000000000 bytes:000000000000000000
PI:1 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:11,32779,65547,98315 FibRpfNf:0 FibRpfDf:0 FibAddr:0x128
rwvlans:0 rwindex:0x4AE adjmac:0006.d606.e240 rdt:1 E:1 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x1C
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x001C
V E C: 50 I:0x00447
PI:0 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:12,32780,65548,98316 FibRpfNf:0 FibRpfDf:0 FibAddr:0x12A
rwvlans:0 rwindex:0x40E adjmac:0006.d606.e240 rdt:1 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x1C
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x001C
V E C: 50 I:0x00447
(*, 227.2.2.0/24)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:0 AdjPtr:13,32781,65549,98317 FibRpfNf:0 FibRpfDf:0 FibAddr:0x12C
rwvlans:0 rwindex:0x0 rdt:0 E:0 CAP1:0
fmt:recir l3rwvld:1 DM:0 mtu:1522 rwtype:RECIR
packets:0000000000000 bytes:000000000000000000
PI:1 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:14,32782,65550,98318 FibRpfNf:0 FibRpfDf:0 FibAddr:0x12E
rwvlans:0 rwindex:0x4AE adjmac:0006.d606.e240 rdt:1 E:1 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x1D
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x001D
V E C: 51 I:0x0044C
PI:0 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:15,32783,65551,98319 FibRpfNf:0 FibRpfDf:0 FibAddr:0x130
rwvlans:0 rwindex:0x40E adjmac:0006.d606.e240 rdt:1 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x1D
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x001D
V E C: 51 I:0x0044C
Found 3 entries. 3 are mfd entries
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-922

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ip multicast

This example shows how to display egress-Bidir information:
Router# show mls cef ip multicast bidir
Multicast CEF Entries for VPN#0
Flags: R - Control, S - Subnet, B - Bidir, C - Complete, P - Partial,
c - Central Rewrite, p - Primary Input, r - Recirculation
Source/mask
Destination/mask
RPF/DF Flags #packets
#bytes
rwindex Output Vlans/Info
+-------------------+-------------------+-------+-----+-------------+------------------+-------+------------------------------+
*
225.2.2.2/32
Df0
BCp
0
0
*
225.2.2.2/32
Bpr
0
0
0x4AE
Vl51,Vl30 [2 oifs]
*
225.2.2.2/32
Br
0
0
0x40E
Vl51,Vl30 [2 oifs]
*
225.2.2.1/32
Df0
BCp
0
0
*
225.2.2.1/32
Bpr
0
0
0x4AE
Vl51,Vl30 [2 oifs]
*
225.2.2.1/32
Br
0
0
0x40E
Vl51,Vl30 [2 oifs]
Found 2 entries. 2 are mfd entries
Router#

This example shows how to display detailed egress-Bidir information:
Router# show mls cef ip multicast bidir detail
(*, 225.2.2.2)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:0 AdjPtr:19,32787,65555,98323 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE6
rwvlans:0 rwindex:0x0 rdt:0 E:0 CAP1:0
fmt:recir l3rwvld:1 DM:0 mtu:1522 rwtype:RECIR
packets:0000000000000 bytes:000000000000000000
PI:1 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:20,32788,65556,98324 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE8
rwvlans:0 rwindex:0x4AE adjmac:0006.d606.e240 rdt:1 E:1 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x22
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0022
V C: 51 I:0x004B3 P->24
V E C: 30 I:0x004B6
PI:0 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:21,32789,65557,98325 FibRpfNf:0 FibRpfDf:0 FibAddr:0xEA
rwvlans:0 rwindex:0x40E adjmac:0006.d606.e240 rdt:1 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x22
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x0022
V C: 51 I:0x004B3 P->24
V E C: 30 I:0x004B6
(*, 225.2.2.1)
PI:1 (1) CR:0 (0) Recirc:0 (1)
DFidx:0 AdjPtr:16,32784,65552,98320 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE0
rwvlans:0 rwindex:0x0 rdt:0 E:0 CAP1:0
fmt:recir l3rwvld:1 DM:0 mtu:1522 rwtype:RECIR
packets:0000000000000 bytes:000000000000000000
PI:1 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:17,32785,65553,98321 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE2
rwvlans:0 rwindex:0x4AE adjmac:0006.d606.e240 rdt:1 E:1 CAP1:0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-923

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ip multicast

fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x1E
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x001E
V C: 51 I:0x004AF P->20
V E C: 30 I:0x004B2
PI:0 (1) CR:0 (0) Recirc:1 (1)
AdjPtr:18,32786,65554,98322 FibRpfNf:0 FibRpfDf:0 FibAddr:0xE4
rwvlans:0 rwindex:0x40E adjmac:0006.d606.e240 rdt:1 E:0 CAP1:0
fmt:mcast l3rwvld:1 DM:0 mtu:1522 rwtype:L3 met2:0x0 met3:0x1E
packets:0000000000000 bytes:000000000000000000
Starting Offset: 0x001E
V C: 51 I:0x004AF P->20
V E C: 30 I:0x004B2
Found 2 entries. 2 are mfd entries
Router#

This example shows how to display TCAM information:
Router# show mls cef ip multicast tcam
Index Group
64
224.0.1.39
66
224.0.1.40
96
224.0.0.0
Router#

Source
0.0.0.0
0.0.0.0
0.0.0.0

RPF/DF Interface
NULL
NULL
NULL

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-924

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ipv6

show mls cef ipv6
To display the hardware IPv6-switching table entries, use the show mls cef ipv6 command.
show mls cef ipv6 [vrf-number] [ip-address/mask] [acccounting per-prefix] [module number]
show mls cef ipv6 exact-route src-addr [L4-src-port] dst-addr [L4-dst-port]
show mls cef ipv6 multicast tcam [v6mcast-address] [detail] [internal]

Syntax Description

vrf-number

(Optional) VRF number; valid values are from 0 to 4095.

ip-address/mask

(Optional) Entry IPv6 address and prefix mask; see the “Usage Guidelines”
section for formatting information.

acccounting
per-prefix

(Optional) Displays per-prefix accounting statistics.

module number

(Optional) Displays the entries for a specific module.

exact-route
src-addr

Specifies the source IP address to display the hardware load sharing results.

L4-src-port

(Optional) Layer 4-source port number; valid values are from 0 to 65535.

dst-addr

Destination IP address.

L4-dst-port

(Optional) Layer 4-destination port number; valid values are from 0 to
65535.

multicast tcam

Displays IPv6-multicast entries.

v6mcast-address

(Optional) IPv6-multicast address.

detail

(Optional) Displays detailed hardware information.

internal

(Optional) Displays internal hardware information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter this command on the supervisor engine and MLS-hardware Layer 3-switching module
consoles only. Enter the remote login command to session into the supervisor engine to enter the
commands.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-925

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef ipv6

When entering the ip-address/mask argument, use this format, X:X:X:X::X/mask, where valid values for
mask are from 0 to 128.
Up to 64 IPv6 prefixes are supported.
You must enter the L4-src-port and L4-dst-port arguments when the load-sharing mode is set to full, for
example, when Layer 4 ports are included in the load-sharing hashing algorithm.

Examples

This example shows how to display the hardware IPv6-switching table entries:
Router# show mls cef ipv6
Codes:M-MPLS encap, + - Push label
Index Prefix Adjacency
524384 BEEF:6::6/128 punt
524386 5200::6/128 punt
524388 2929::6/128 punt
524390 6363::30/128 Fa1/48 , 0000.0001.0002
524392 3FFE:1B00:1:1:0:5EFE:1B00:1/128 punt
524394 2002:2929:6:2::6/128 punt
524396 2002:2929:6:1::6/128 punt
524398 6363::6/128 punt
524416 BEEF:6::/64 drop
524418 5200::/64 punt
524420 2929::/64 punt
524422 2002:2929:6:2::/64 punt
524424 2002:2929:6:1::/64 punt
524426 6363::/64 punt
524428 3FFE:1B00:1:1::/64 Tu4 , V6 auto-tunnel
524448 FEE0::/11 punt
524480 FE80::/10 punt
524512 FF00::/8 punt
524544 ::/0 drop
Router#

This example shows how to display the IPv6 entries for a specific IPv6 address and mask:
Router# show mls cef ipv6 2001:4747::/64
Codes:R - Recirculation, I-IP encap
M-MPLS encap, + - Push label
Index Prefix Out i/f Out Label
160 2001:4747::/64 punt
Router#

This example shows how to display all the IPv6-FIB entries that have per-prefix statistics available:
Router# show mls cef ipv6 accounting per-prefix
(I) BEEF:2::/64: 0 packets, 0 bytes
A - Active, I - Inactive
Router#

This example shows how to display detailed hardware information:
Router# show mls cef ipv6 detail
Codes: M - mask entry, V - value entry, A - adjacency index, P - FIB Priority
D - FIB Don't short-cut, m - mod-num
Format: IPv6_DA - (C | xtag vpn uvo prefix)
M(128 ): F | 1 FF 1 FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF:FFFF
V(128 ): C | 1 0 1 2001:4747::1253 (A:12 ,P:1,D:0,m:0 )
M(160 ): F | 1 FF 1 FFFF:FFFF:FFFF:FFFF::
V(160 ): C | 1 0 1 2001:4747:: (A:11 ,P:1,D:0,m:0 )

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-926

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef ipv6

M(224 ):
V(224 ):
M(256 ):
V(256 ):
M(352 ):
V(352 ):
M(480 ):
V(480 ):
Router#

Related Commands

F
C
F
C
F
C
F
C

|
|
|
|
|
|
|
|

1
1
1
1
1
1
1
1

FF 1 FFE0::
0 1 FEE0:: (A:11 ,P:1,D:0,m:0 )
FF 1 FFC0::
0 1 FE80:: (A:12 ,P:1,D:0,m:0 )
FF 1 FF00::
0 1 FF00:: (A:12 ,P:1,D:0,m:0 )
FF 1 ::
0 1 :: (A:14 ,P:1,D:0,m:0

Command

Description

mls ipv6 acl compress
address unicast

Turns on the compression of IPv6 addresses.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-927

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef logging

show mls cef logging
To display the contents of the TCAM-inconsistency buffer, use the show mls cef logging command.
show mls cef logging [module num]

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Displays the entries for a specific module.

The TCAM-inconsistency buffer records any inconsistency that is found in the TCAM.
MLS-hardware Layer 3 switching applies to IP traffic only.

Examples

This example shows how to display the contents of the TCAM inconsistency buffer:
Router# show mls cef logging
PFIB_ERR:TCAM_SHADOW_CONSISTENCY_ERR:value : Index: 100
Expected: 0 -0 -0
Hardware: 5 -1020304 -0
PFIB_ERR:TCAM_SHADOW_CONSISTENCY_ERR:Mask : Index: 3
Expected: 4 -0 -0
Hardware: 6 -FFF00000-0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-928

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef lookup

show mls cef lookup
To display the IP entries in the MLS-hardware Layer 3-switching table for the specified destination IP
address, use the show mls cef lookup command.
show mls cef [ip] lookup address [detail] [module number]

Syntax Description

ip

(Optional) Displays IP entries in the MLS-hardware Layer 3-switching table;
see the “Usage Guidelines” section for additional information.

address

IP address in the format A.B.C.D.

detail

(Optional) Displays hardware-entry details.

module number

(Optional) Displays the entries for a specific module.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The lookup is performed as a “longest-prefix match” and displays the TCAM-entry index that applies to
the specified destination IP address.
The information output is in this format: Index, Prefix, Mask, and Adjacency.
The output of the show mls cef lookup ip and the show mls cef lookup commands is identical.

Examples

This example shows how to display the longest prefix match that applies to a specific IPv4-unicast
address:
Router# show mls cef lookup 224.0.0.0
Codes: decap - Decapsulation, + - Push Label
Index Prefix
Adjacency
3200
224.0.0.0/24
punt
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-929

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef maximum-routes

show mls cef maximum-routes
To view the current maximum-route system configuration, use the show mls cef maximum-routes
command.
show mls cef maximum-routes

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enter the mls cef maximum-routes command to change the configuration, the following
additional fields appear in the output of the show mls cef maximum-routes command:
•

User configured—Shows configuration changes that you have made.

•

Upon reboot—Shows the configuration after a system reboot.

These fields appear if you have not saved the change (using the copy system:running-config nvram:
startup-config command) after entering the mls cef maximum-routes command. See the “Examples”
section for additional information.

Examples

This example shows the display after you have entered the mls cef maximum-routes command, saved
the change (copy system:running-config nvram: startup-config command), and rebooted the system:
Router# show mls cef maximum-routes
FIB TCAM maximum routes :
=======================
Current :------IPv4 - 1k (default)
MPLS - 239k
IPv6 + IP Multicast - 8k (default)
Router#

This example shows the display if you entered the mls cef maximum-routes command and did not save
the change:
Router# show mls cef maximum-routes
FIB TCAM maximum routes :
=======================
Current :------IPv4 - 1k (default)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-930

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef maximum-routes

MPLS - 239k
IPv6 + IP Multicast - 8k (default)
User configured :--------------IPv4 + MPLS - 192k (default)
IPv6 + IP multicast - 32k (default)
Upon reboot :----------IPv4 - 1k (default)
MPLS - 239k
IPv6 + IP multicast - 8k (default)
Router#

This example shows the output if you have made a configuration change and saved the change (copy
system:running-config nvram: startup-config command):
Router# show mls cef maximum-routes
FIB TCAM maximum routes :
=======================
Current :------IPv4 - 1k (default)
MPLS - 239k
IPv6 + IP Multicast - 8k (default)
User configured :--------------IPv4 + MPLS - 192k (default)
IPv6 + IP multicast - 32k (default)
Router#

Related Commands

Command

Description

copy
Saves the configuration to NVRAM.
system:running-config
nvram: startup-config
mls cef
maximum-routes

Limits the maximum number of the routes that can be programmed in the
hardware allowed per protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-931

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef mpls

show mls cef mpls
To display the MPLS entries in the MLS-hardware Layer 3-switching table, use the show mls cef mpls
command.
show mls cef mpls [detail] [internal] [labels value] [module number] [vpn instance]
[vrf instance]

Syntax Description

detail

(Optional) Displays hardware-entry details.

internal

(Optional) Displays internal CEF entries.

labels value

(Optional) Displays the entries for a specific label; valid values are from
0 to 1048575.

module number

(Optional) Displays the entries for a specific module.

vpn instance

(Optional) Displays the VPN ID MPLS table entries for a specific VPN
instance; valid values are from 0 to 4095.

vrf instance-name (Optional) Displays the MPLS CEF table entries for a specific VRF.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This examples shows how to display MPLS entries:
Router# show mls cef mpls
Codes: + - Push label, - - Pop Label
Index Local
Label
Label
Op
Router#

* - Swap Label
Out i/f

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-932

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef rpf

show mls cef rpf
To display the information about the RPF hardware in the MLS-hardware Layer 3-switching table, use the
show mls cef rpf command.
show mls cef [ip] rpf [ip-address] [module num]

Syntax Description

ip

(Optional) Displays IP entries in the MLS-hardware Layer 3-switching table;
see the “Usage Guidelines” section for additional information.

ip-address

(Optional) IP address.

module num

(Optional) Displays the entries for a specific module.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the show mls cef ip rpf command without arguments, the RPF global mode status is
displayed.
The output of the show mls cef ip rpf and the show mls cef rpf commands is identical.

Examples

This example shows how to display the status of the RPF global mode:
Router# show mls cef rpf
RPF global mode:
Router#

not enabled

This example shows how to display the RPF information for a specific IP address:
Router# show mls cef rpf 10.100.0.0
RPF information for prefix 10.100.0.0/24
uRPF check performed in the hardware for interfaces :
GigabitEthernet1/1
Router#

Related Commands

Command

Description

mls ip cef rpf
multipath

Configures the RPF modes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-933

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef statistics

show mls cef statistics
To display the number of switched packets and bytes, use the show mls cef statistics command.
show mls cef statistics [module number]

Syntax Description

module number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Displays the information for a specific module.

This example shows how to display the MLS-hardware Layer 3-switching statistics:
Router# show mls cef statistics
Total CEF switched packets:
Total CEF switched bytes:
Router#

0000000000000000
0000000000000000

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-934

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef summary

show mls cef summary
To display the number of routes in the MLS-hardware Layer 3-switching table for all the protocols, use
the show mls cef summary command.
show mls cef summary [module number]

Syntax Description

module number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Displays the information for a specific module.

Usage Guidelines

The number of prefixes in the MLS-hardware Layer 3-switching table indicates the individual numbers
for IPv4 and IPv6 unicast, IPv4 multicast, MPLS, and EoM routes.

Examples

This example shows how to display a summary of MLS-hardware Layer 3-switching information:
Router# show mls cef summary
Total routes:
80385
IPv4 unicast routes:
IPv4 Multicast routes:
MPLS routes:
IPv6 unicast routes:
EoM routes:
Router#

42
5
0
2
0

Table 2-82 describes the fields in the show mls cef summary command output.
Table 2-82 show mls cef summary Command Output Fields

Field

Description

Total MLS-hardware Number of MLS-hardware Layer 3-switching packets
Layer 3-switching
forwarded by the MLS-hardware Layer 3-switching
switched packets
engine.
Total MLS-hardware Number of bytes forwarded by the MLS-hardware
Layer 3-switching
Layer 3-switching engine.
switched bytes
Total routes

Number of route entries.

IP unicast routes

Number of IP-unicast route entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-935

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef summary

Table 2-82 show mls cef summary Command Output Fields (continued)

Related Commands

Field

Description

IPX routes

Number of IPX route entries.

IP multicast routes

Number of IP-multicast route entries.

Command

Description

show mls cef

Displays the MLS-hardware Layer 3-switching table entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-936

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls cef vrf

show mls cef vrf
To display information about the VPN routing and forwarding instance CEF table for a specific VRF
name, use the show mls cef vrf command.
show mls cef vrf instance-name [prefix] [detail] [lookup ip-address] [module num]
[rpf [ip-address]]

Syntax Description

instance-name

VPN routing/forwarding instance name; valid values are from 0 to 4095.

prefix

(Optional) Prefix of the entry to display.

detail

(Optional) Displays the hardware-entry details.

lookup ip-address

(Optional) Displays the longest prefix-match lookup entry for the specified
address.

module num

(Optional) Displays the entries for a specific module.

rpf ip-address

(Optional) Displays the uRPF check information for the (optional) specified IP
address.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show mls cef ip command displays the CEF entries in the default VRF. To display specific
(nondefault) VRF entries, use the show mls cef [ip] vrf vrf-name command.

Examples

This example shows how to display information about the VPN routing and forwarding instance CEF
table for a specific VRF name:
Router# show mls cef vrf vpn-1
Codes: decap - Decapsulation, + - Push Label
Index Prefix Adjacency
64 0.0.0.0/32 receive
65 255.255.255.255/32 receive
280 7.50.27.1/32 receive
281 7.50.27.0/32 receive
282 7.50.27.255/32 receive
298 2.1.1.1/32 receive

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-937

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls cef vrf

299 2.1.1.0/32 receive
300 2.1.1.255/32 receive
656 2.1.99.1/32 receive
Router#

Related Commands

Command

Description

show mls cef ip

Displays the IP entries in the MLS-hardware Layer 3-switching table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-938

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls df-table

show mls df-table
To display information about the DF table, use the show mls df-table command.
show mls df-table start-vlan end-vlan

Syntax Description

start-vlan

Start of a range of VLAN IDs; valid values are from 1 to 4094.

end-vlan

End of a range of VLAN IDs; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

Switch processor—EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

In the output display, the following applies:
•

1 indicates that DF is enabled.

•

0 indicates that DF is disabled.

This example shows how to display the DF-table contents for a range of VLANs:
Switch-sp# show mls df-table 201 212
TYCHO FIB DF Table
vlan

df_index
3 2 1 0
-----+---------201
1 1 1 1
202
1 1 1 1
203
1 1 1 1
204
1 1 1 1
205
1 1 1 1
206
1 1 1 1
207
1 1 1 1
208
1 1 1 1
209
1 1 1 1
210
1 1 1 1
211
1 1 1 1
212
1 1 1 1
Switch-sp#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-939

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip

show mls ip
To display the MLS IP information, use the show mls ip command.
show mls ip [any | destination {hostname | ip-address} | detail | flow {tcp | udp} | {vlan vlan-id}
| {macd destination-mac-address} | {macs source-mac-address} | {module number} |
source {hostname | ip-address} | count | static]
show mls {ipv6 | mpls}

Syntax Description

any

(Optional) Displays any MLS IP information.

destination
hostname

(Optional) Displays the entries for a specific destination hostname.

destination
ip-address

(Optional) Displays the entries for a specific destination IP address.

detail

(Optional) Specifies a detailed output.

flow

(Optional) Specifies the flow type.

tcp | udp

Selects the flow type.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

macd destination (Optional) Specifies the destination MAC address.
-mac-address
macs sourcemac-address

(Optional) Specifies the source MAC address.

module number

(Optional) Displays the entries that are downloaded on the specified
module; see the “Usage Guidelines” section for valid values.

source hostname (Optional) Displays the entries for a specific source address.
source
ip-address

(Optional) Displays the entries for a specific source IP address.

count

(Optional) Displays the total number of MLS entries.

static

(Optional) Displays the total number of static entries.

ipv6

Displays the total number of IPv6 entries.

mpls

Displays the total number of MPLS entries.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-940

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48. This definition also applies to the module number keyword and
argument.
When you view the output, note that a colon (:) is used to separate the fields.

Examples

This example shows how to display any MLS IP information:
Router# show mls ip any
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------0.0.0.0
0.0.0.0
0
:0
:0
0
: 0x0
82
3772
1329 20:46:03
L3 - Dynamic
Router#

This example shows how to display MLS information on a specific IP address:
Router# show mls ip destination 172.20.52.122
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Dst i/f:DstMAC
Pkts
Bytes
----------------------------------------------------------------------SrcDstPorts
SrcDstEncap Age
LastSeen
---------------------------------------172.20.52.122
0.0.0.0
5
: 00e0.4fac.b3ff 684
103469
Fa5/9,Fa5/9 ARPA,ARPA
281
07:17:02
Number of Entries Found = 1
Router#

This example shows how to display MLS information on a specific flow type:
Router# show mls ip flow udp
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------0.0.0.0
0.0.0.0
0
:0
:0
0
: 0x0
78
3588
1259 20:44:53
L3 - Dynamic
Router#

This example shows how to display detailed MLS information:
Router# show mls ip detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Mask Pi R CR Xt Prio Dsc IP_EN OP_EN Pattern Rpf FIN_RDT FIN/RST
----+--+-+--+--+----+---+-----+-----+-------+---+-------+------Ig/acli Ig/aclo Ig/qosi Ig/qoso Fpkt Gemini MC-hit Dirty Diags
-------+-------+-------+-------+----+------+------+-----+-----QoS

Police Count Threshold

Leak

Drop Bucket

Use-Tbl Use-Enable

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-941

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip

-----------+------------+---------+-----------+----+-------+-------+----------+
127.0.0.19
127.0.0.16
udp :68
:67
1009: 0x0
72
3312
1170 20:43:24
L3 - Dynamic
0
1 0 0 1 0
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0x0
0
0
0
NO
64
NO
NO
Router#

Related Commands

Command

Description

mls ip

Enables MLS IP for the internal router on the interface.

show mls netflow ip

Displays information about the hardware NetFlow IP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-942

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip cef rpf-table

show mls ip cef rpf-table
To display the configuration of the RPF CEF table, use the show mls ip cef rpf-table command.
show mls ip cef rpf-table

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the RPF CEF-table entries:
Router# show mls ip cef rpf-table
---------------------------------------------------------------------------172.10.10.0/24
[0] Fa2/1, Fa2/2, Fa2/3, Fa2/4
172.10.20.0/24
172.10.30.0/24
10.10.0.0/16
[1] Gi1/1, Gi1/2
10.20.0.0/16
Router#

Related Commands

Command

Description

mls ip cef rpf
interface-group

Defines an interface group in the RPF-VLAN table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-943

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip multicast

show mls ip multicast
To display the MLS IP information, use the show mls ip multicast command.
show mls ip multicast [{capability [module num]} | connected | group} {{hostname | ip-address}
[ip-mask]} | {interface {interface interface-number}} | {module number} | mdt |
{source {hostname | ip-address}} | statistics | summary]
show mls ip multicast consistency-check [mroute-mlsm | {rp-sp [log [clear] | statistics]}]

Syntax Description

capability

Displays information about the multicast-replication capabilities.

module num

(Optional) Specifies the module number.

connected

(Optional) Displays the installed interface or mask entries.

group

(Optional) Displays the entries for a specific multicast-group address.

hostname

Group IP hostname.

ip-address

Group IP address.

ip-mask

(Optional) IP mask for group IP address.

interface

(Optional) Specifies an interface.

interface

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

module number

(Optional) Displays the entries that are downloaded on the specified
module; see the “Usage Guidelines” section for valid values.

mdt

(Optional) Displays hardware-accelerated MDT information.

source hostname

(Optional) Displays the entries for a specific source address.

source ip-address

(Optional) Displays the entries for a specific source IP address.

statistics

(Optional) Displays the statistics from multicast entries.

summary

(Optional) Displays a summary of statistics from multicast entries.

consistency-check

Displays consistency-checker information.

mroute-mlsm

(Optional) Displays mroute/MLSM consistency-checker information.

rp-sp

(Optional) Displays route processor/switch processor
consistency-checker information.

log

(Optional) Displays a log of mismatches that have been detected and
corrected.

clear

(Optional) Clears the mismatches log.

statistics

(Optional) Displays the statistics of prefixes checked.

Defaults

This command has no default settings.

Command Modes

EXEC

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-944

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip multicast

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48. These valid values also apply when entering the module number
keyword and argument.
When you view the output, note that a colon (:) is used to separate the fields.

Examples

This example shows how to display general MLS IP-multicast information:
Router# show mls ip multicast
Multicast hardware switched flows:
(*, 224.1.1.1) Incoming interface: Vlan0, Packets switched: 0
Hardware switched outgoing interfaces: Vlan202
RPF-MFD installed
Total hardware switched flows : 1
Router#

This example shows how to display a summary of MLS information:
Router# show mls ip multicast summary
1 MMLS entries using 168 bytes of memory
Number of partial hardware-switched flows: 0
Number of complete hardware-switched flows: 1
Directly connected subnet entry install is enabled
Aggregation of routed oif is enabled
Hardware shortcuts for mvpn mroutes supported
Egress Mode of replication is enabled
Maximum route support is enabled
Router#

This example shows how to display MLS information on a specific interface:
Router# show mls ip multicast interface fastethernet 5/9
DstIP
SrcIP
Dst i/f:DstMAC
Pkts
Bytes
----------------------------------------------------------------------SrcDstPorts
SrcDstEncap Age
LastSeen
---------------------------------------172.20.52.37
0.0.0.0
100: 00d0.5870.a4ff 1
129
Fa5/9,----- ARPA,ARPA
107
06:10:02
172.20.52.36
0.0.0.0
100 : 0050.7312.0cff 50
6403
Fa5/9,----- ARPA,ARPA
107
06:10:04
Number of Entries Found = 2
Router#

This example shows how to display information about the multicast-replication capabilities:
Router# show mls ip multicast capability
Current mode of replication is Ingress
auto replication mode detection is ON
Slot
2
5
6

Multicast replication capability
Egress
Egress
Egress

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-945

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip multicast

8
9
Router#

Ingress
Ingress

This example shows how to display information about the mroute consistency-checker log:
Router# show mls ip multicast consistency-check mroute-mlsm
MMLS Consistancy checker of mroute-scan type is enabled
Inter scan period = 2 sec
Number of entry scanned = 20
Settle time = 60 sec
Storage for 1000 events (40000 bytes)
Mroute entry missed for a Shortcut : 0
Mroute entry was uneligible for a Shortcut : 0
Mroute entry rpf i/f mismatched with Shortcut : 0
Mroute oif in hw and Shortcut oif in sw : 0
Mroute oif in sw and Shortcut oif in sw : 0
Mroute oif in sw and Shortcut oif in hw : 0
Mroute #oif mismatched with Shortcut #oif : 0
.
.
.


This example shows how to display a log of mismatches that have been detected and corrected:
Router# show mls ip multicast consistency-check rp-sp log
MLSM RP<->SP Consistency Checker Mismatch log for Table 0:
size 512 current-index 0
0 total used entries in log
Router#

Related Commands

Command

Description

mls ip multicast
(interface
configuration mode)

Enables MLS IP shortcuts on the interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-946

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip multicast bidir

show mls ip multicast bidir
To display the Bidir hardware-switched entries, use the show mls ip multicast bidir command.
show mls ip multicast bidir [{group {{hostname | ip-address} [ip-mask]}} | {interface {interface
interface-number}} | {source {hostname | ip-address}}]

Syntax Description

group

(Optional) Displays the entries for a specific multicast-group address.

hostname

Group IP hostname.

ip-address

Group IP address.

ip-mask

(Optional) IP mask for group IP address.

interface

(Optional) Specifies an interface.

interface

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, and tengigabitethernet.

interface-number

Module and port number; see the “Usage Guidelines” section for valid values.

source hostname

(Optional) Displays the entries for a specific source address.

source ip-address

(Optional) Displays the entries for a specific source IP address.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the Bidir hardware-switched entries:
Router# show mls ip multicast bidir
Multicast hardware switched flows:
(*, 226.1.4.0) Incoming interface: Vlan51, Packets switched: 0
Hardware switched outgoing interfaces: Vlan51 Vlan30
RPF-MFD installed
(*, 227.1.4.0) Incoming interface: Gi2/1, Packets switched: 0
Hardware switched outgoing interfaces: Gi2/1 Vlan30
RPF-MFD installed
Router#

Related Commands

Command

Description

mls ip multicast bidir
gm-scan-interval

Sets the RPF scan interval for the Bidir rendezvous point.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-947

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip multicast rp-mapping

show mls ip multicast rp-mapping
To display the mappings for the PIM-Bidir group to active rendezvous points, use the show mls ip
multicast rp-mapping command.
show mls ip multicast rp-mapping [rp-address] [df-cache | gm-cache]

Syntax Description

rp-address

(Optional) Rendezvous-point address.

df-cache

(Optional) Displays information on the DF list in the rendezvous-point mapping
cache in the hardware.

gm-cache

(Optional) Displays information on the group/mask ranges in the rendezvous-point
mapping cache in the hardware.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the mappings for the PIM group-to-active rendezvous points:
Router# show mls ip multicast rp-mapping
RP Address State DF-count GM-count
2.2.2.2 H 1 1
9.9.9.9 H 1 2
Router#

This example shows how to display information that is based on the DF list in the mapping cache of the
route processor:
Router# show mls ip multicast rp-mapping df-cache
RP Address
State
DF
State
9.9.9.9
H
Vl30 H
Router#

This example shows how to display information that is based on the mapping cache of the route
processor:
Router# show mls ip multicast rp-mapping gm-cache
State: H - Hardware Switched, I - Install Pending, D - Delete Pending,
Z - Zombie
RP Address State Group Mask State Packet/Byte-count
60.0.0.60 H 230.31.0.0 255.255.0.0 H 100/6400
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-948

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip multicast sso

show mls ip multicast sso
To display information about multicast high-availability SSO, use the show mls ip multicast sso
command.
show mls ip multicast sso [statistics]

Syntax Description

statistics

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Displays multicast high-availability SSO statistical information.

This example shows how to display multicast high-availability SSO information:
Router> show mls ip multicast sso
Multicast SSO is enabled
Multicast HA Parameters
---------------------------------------------------+------+
protocol convergence timeout
120 secs
flow leak percent
10
flow leak interval
20 secs
heartquake#

This example shows how to display statistical information about multicast high-availability SSO:
Router# show mls ip multicast sso statistics
Multicast HA Statistics: ACTIVE
--------------------------------------------------+------+
CHKPT msgs sent
5
CHKPT msgs send failed
0
CHKPT msgs send aborted
0
CHKPT met add msg sent
5
CHKPT met del msg sent
1
CHKPT icroif msg sent
1
MET HA met add enqueued
5
MET HA met del enqueued
1
ICROIF HA add enqueued
1
ICROIF HA del enqueued
0
CHKPT buffer failure
0
MET HA Reconstruction Statistics
--------------------------------------------------+------+
Number of met blks reconstructed
0
Number of normal sets reconstructed
0
Number of fixed sets reconstructed
0
Number of sets deleted
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-949

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip multicast sso

Number of blks not found
normal sets reconstruction failed
fixed set reconstruction failed

0
0
0

Multicast HA Statistics: STANDBY
--------------------------------------------------+------+
CHKPT msgs rcvd
5
CHKPT met add msg rcvd
5
CHKPT met del msg rcvd
1
CHKPT icroif msg rcvd
1
CHKPT msg unknown
0
CHKPT buffer failure
0
Router#

Related Commands

Command

Description

mls ip multicast sso

Configures the SSO parameters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-950

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip non-static

show mls ip non-static
To display information for the software-installed nonstatic entries, use the show mls ip non-static
command.
show mls ip non-static [count [module number] | detail [module number] | module number]

Syntax Description

count

(Optional) Displays the total number of nonstatic entries.

module number

(Optional) Designates the module number.

detail

(Optional) Specifies a detailed per-flow output.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the software-installed nonstatic entries:
Router> show mls ip non-static
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Router>

This example shows how to display detailed information for the software-installed nonstatic entries:
Router> show mls ip non-static detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------QoS
Police Count Threshold
Leak
Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
Router>

This example shows how to display the total number of software-installed nonstatic entries:
Router> show mls ip non-static count
Displaying Netflow entries in Supervisor Earl
Number of shortcuts = 0
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-951

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip routes

show mls ip routes
To display the NetFlow routing entries, use the show mls ip routes command.
show mls ip routes [non-static | static] [count [module number] | detail [module number] |
module number]

Syntax Description

non-static

(Optional) Displays the software-installed nonstatic entries.

static

(Optional) Displays the software-installed static entries.

count

(Optional) Displays the total number of NetFlow routing entries.

module number

(Optional) Displays the entries that are downloaded on the specified
module; see the “Usage Guidelines” section for valid values.

detail

(Optional) Specifies a detailed per-flow output.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the software-installed nonstatic routing entries:
Router> show mls ip routes non-static
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Router>

This example shows how to display detailed information for the software-installed nonstatic routing
entries:
Router> show mls ip routes non-static detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------QoS
Police Count Threshold
Leak
Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-952

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip routes

This example shows how to display the total number of software-installed routing entries:
Router> show mls ip routes count
Displaying Netflow entries in Supervisor Earl
Number of shortcuts = 0
Router>

Related Commands

Command

Description

show mls netflow ip
sw-installed

Displays information for the software-installed IP entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-953

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls ip static

show mls ip static
To display the information for the software-installed static IP entries, use the show mls ip static
command.
show mls ip static [count [module number] | detail [module number] | module number]

Syntax Description

count

(Optional) Displays the total number of static entries.

module number

(Optional) Designates the module number.

detail

(Optional) Specifies a detailed per-flow output.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the software-installed static entries:
Router> show mls ip static
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Router>

This example shows how to display detailed information for the software-installed static entries:
Router> show mls ip static detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------QoS
Police Count Threshold
Leak
Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
Router>

This example shows how to display the total number of software-installed static entries:
Router> show mls ip static count
Displaying Netflow entries in Supervisor Earl
Number of shortcuts = 0
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-954

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls ip statistics

show mls ip statistics
To display the statistical information for the NetFlow IP entries, use the show mls ip statistics
command.
show mls ip statistics [count [module number] | detail [module number] | module number]

Syntax Description

count

(Optional) Displays the total number of NetFlow entries.

module number

(Optional) Displays the entries that are downloaded on the specified module.

detail

(Optional) Specifies a detailed per-flow output.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display statistical information for the NetFlow IP entries:
Router> show mls ip statistics
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Router>

This example shows how to display detailed statistical information for the NetFlow IP entries:
Router> show mls ip statistics detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------QoS
Police Count Threshold
Leak
Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-955

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls nde

show mls nde
To display information about the NDE hardware-switched flow, use the show mls nde command.
show mls nde

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The output for Catalyst 6500 series switches includes the current NDE mode.

Examples

This example shows how to display information about the NDE hardware-switched flow on a
Catalyst 6500 series switch:
Router# show mls nde
Netflow Data Export enabled (Interface Mode)
Exporting flows to 172.20.55.71 (9991)
Exporting flows from 10.6.60.120 (59020)
Version: 7
Include Filter not configured
Exclude Filter not configured
Total Netflow Data Export Packets are:
0 packets, 0 no packets, 0 records
Router#

Related Commands

Command

Description

mls nde sender

Enables MLS NDE export.

show ip flow-export

Displays the information about the hardware-switched and
software-switched flows for the data export, including the main cache and
all other enabled caches.

show mls netflow

Displays configuration information about the NetFlow hardware.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-956

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow

show mls netflow
To display configuration information about the NetFlow hardware, use the show mls netflow command.
show mls netflow {aging | aggregation flowmask | creation | flowmask | {table-contention
{detailed | summary}} | usage}
show mls netflow [ip | ipv6 | mpls] [any | count | destination {hostname | ip-address} | detail |
dynamic | flow {tcp | udp} | module number | nowrap | source {hostname | ip-address} |
sw-installed [non-static | static]]

Syntax Description

aging

Displays the NetFlow-aging information.

aggregation
flowmask

Displays the flow mask that is set for the currrent NetFlow aggregations.

creation

Displays the configured protocol-creation filters.

flowmask

Displays the current NetFlow IP and IPX flow mask.

table-contention Displays the NetFlow table-contention level information.
detailed

Displays detailed NetFlow table-contention level information.

summary

Displays a summary of NetFlow table-contention levels.

usage

Displays the NetFlow table-usage notification status.

ip

(Optional) Displays information about the NetFlow IP table; see the show
mls netflow ip command.

ipv6

(Optional) Displays information about the NetFlow IPv6 table; see the
show mls netflow ipv6 command.

mpls

(Optional) Displays information about the NetFlow MPLS table.

any

(Optional) Displays detailed NetFlow table-entry information with no test
wrap.

count

(Optional) Displays the total number of MLS NetFlow IP entries.

destination
hostname

(Optional) Displays the entries for a specific destination hostname.

destination
ip-address

(Optional) Displays the entries for a specific destination IP address.

detail

(Optional) Specifies a detailed output.

dynamic

(Optional) Displays the hardware-created dynamic entries.

flow tcp

(Optional) Displays information about the TCP flows.

flow udp

(Optional) Displays information about the UDP flows.

module number

(Optional) Displays the entries that are downloaded on the specified
module; see the “Usage Guidelines” section for valid values.

nowrap

(Optional) Displays information without text wrap.

source hostname (Optional) Displays the entries for a specific source address.
source
ip-address

(Optional) Displays the entries for a specific source IP address.

sw-installed

(Optional) Displays the routing NetFlow entries; see the show mls netflow
ip sw-installed command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-957

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls netflow

non-static

(Optional) Displays information for software-installed static IP entries;
see the show mls netflow ip sw-installed command.

static

(Optional) Displays information for the software-installed nonstatic IP
entries; see the show mls netflow ip sw-installed command.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface, macd, and macs keywords are not supported.
If you enter the show mls netflow ip command with no argument, the output of the show mls netflow
ip routes and show mls netflow ip dynamic commands are displayed.
When you view the output, note that a colon (:) is used to separate the fields.
If you enable the NetFlow table-usage notification and the NetFlow table-usage exceeds a preset
percentage threshold, a warning message is displayed. You can use the mls netflow usage notify
command to set the threshold percentage and the time interval to check the NetFlow table usage.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48. These valid values also apply when entering the module number
keyword and argument.

Examples

This example shows how to display the NetFlow-aging configuration:
Router# show mls netflow aging
enable timeout packet threshold
------ ------- ---------------normal aging true
300
N/A
fast aging
true
32
100
long aging
true
900
N/A
Router#

This example shows how to display the configured protocol-creation filters:
Router# show mls netflow creation
Excluded protocols:
port protocol
-------+---------10
tcp
8
udp/tcp
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-958

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow

This example shows how to display the flow mask that is set for the currrent NetFlow aggregation:
Router# show mls netflow aggregation flowmask
Current flowmask set for netflow aggregation : Dest only
Minimum flowmask required for netflow aggregation schemes
----------------------+-------------------+----------------Aggregation Scheme Min. Flowmask Status
----------------------+-------------------+----------------as Intf Src Dest disabled
protocol-port Full Flow disabled
source-prefix Intf Src Dest disabled
destination-prefix Dest only enabled
prefix Intf Src Dest disabled
Router#

This example shows how to display detailed information about the NetFlow table-contention level:
Router# show mls netflow table-contention detailed
Earl in Module 2
Detailed Netflow CAM (TCAM and ICAM) Utilization
================================================
TCAM Utilization
:
0%
ICAM Utilization
:
0%
Netflow TCAM count :
0
Netflow ICAM count :
0
Router#

This example shows how to display a summary of the NetFlow table-contention level:
Router# show mls netflow table summary
Earl in Module 2
Summary of Netflow CAM Utilization (as a percentage)
====================================================
TCAM Utilization
:
0%
ICAM Utilization
:
0%
Router#

This example shows how to display the NetFlow table-usage notification status:
Router#
Netflow
Netflow
Netflow
Router#

Related Commands

show mls netflow usage
table usage notification enabled at 80% every 300 seconds
table utilization of module 7 is 99%
table utilization of module 10 is 24%

Command

Description

ip flow-aggregation
cache

Creates a flow-aggregation cache and enters the aggregation cache
configuration mode.

mls netflow usage
notify

Monitors the NetFlow table usage on the switch processor.

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-959

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls netflow ip

show mls netflow ip
To display information about the hardware NetFlow IP, use the show mls netflow ip command.
show mls netflow ip any
show mls netflow ip count [module number]
show mls netflow ip destination {hostname | ip-address}[/ip-mask] [count [module number]] |
detail | dynamic | flow {icmp | tcp | udp} | module number | nowrap | qos | source {hostname
| ip-address}[/ip-mask] | sw-installed [non-static | static]
show mls netflow ip detail [module number | nowrap [module number]]
show mls netflow ip dynamic [count [module number]] [detail] [module number] [nowrap
[module number]] [{qos [module number] [nowrap [module number]}]]
show mls netflow ip {flow {icmp | tcp | udp}} [count [module number]] | {destination {hostname
| ip-address}[/ip-mask]} | detail | dynamic | flow {icmp | tcp | udp} | module number |
nowrap | qos | source {hostname | ip-address} | sw-installed [non-static | static]
show mls netflow ip {module number}
show mls netflow ip qos [module number | nowrap [module number]]
show mls netflow ip source {hostname | ip-address}[/ip-mask] [count [module number]] | detail
| dynamic | flow {icmp | tcp | udp} | module number | nowrap | qos | sw-installed [non-static
| static]

Syntax Description

any

Displays detailed NetFlow table-entry information with no test wrap.

count

Displays the total number of MLS NetFlow IP entries.

module number

(Optional) Displays the entries that are downloaded on the specified module; see
the “Usage Guidelines” section for valid values.

destination
hostname

Displays the entries for a specific destination hostname.

destination
ip-address

Displays the entries for a specific destination IP address.

/ip-mask

(Optional) IP mask for a destination IP address.

detail

(Optional) Specifies a detailed output.

dynamic

Displays the hardware-created dynamic entries; see the show mls nde command.

flow icmp

Displays information about the ICMP flows.

flow tcp

Displays information about the TCP flows.

flow udp

Displays information about the UDP flows.

nowrap

Displays information without text wrap.

qos

Displays QoS microflow policing information.

source hostname Displays the entries for a specific source address.
source
ip-address

Displays the entries for a specific source IP address.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-960

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow ip

sw-installed

(Optional) Displays the routing NetFlow entries; see the show mls netflow ip
sw-installed command.

non-static

(Optional) Displays information for software-installed static IP entries; see the
show mls netflow ip sw-installed command.

static

(Optional) Displays information for the software-installed nonstatic IP entries;
see the show mls netflow ip sw-installed command.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the show mls netflow ip command with no arguments, the output of the show mls netflow
ip sw-installed and show mls nde commands are displayed.
When you view the output, note that a colon (:) is used to separate the fields.

Examples

This example shows how to display information about any MLS NetFlow IP:
Router# show mls netflow ip
Displaying Netflow entries in Supervisor Earl
DstIP SrcIP Prot:SrcPort:DstPort Src i/f:AdjPtr
----------------------------------------------------------------------------Pkts Bytes Age LastSeen Attributes
--------------------------------------------------12.1.1.2 11.1.1.2 tcp :3 :5 Fa5/11 :0x0
459983 21159218 6 07:45:13 L3 - Dynamic
12.1.1.2 11.1.1.3 tcp :3 :5 Fa5/11 :0x0
459984 21159264 6 07:45:13 L3 - Dynamic
Router#

This example shows how to display detailed NetFlow table-entry information:
Router# show mls netflow ip detail
Displaying Netflow entries in Supervisor Earl
DstIP SrcIP Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts Bytes Age LastSeen Attributes
--------------------------------------------------Mask Pi R CR Xt Prio Dsc IP_EN OP_EN Pattern Rpf FIN_RDT FIN/RST
----+--+-+--+--+----+---+-----+-----+-------+---+-------+------Ig/acli Ig/aclo Ig/qosi Ig/qoso Fpkt Gemini MC-hit Dirty Diags
-------+-------+-------+-------+----+------+------+-----+------

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-961

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls netflow ip

QoS Police Count Threshold Leak Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
172.30.46.2 172.30.45.2 4 :0 :0 Gi7/1: 0x0
140063 6442898 15 01:42:52 L3 - Dynamic
1 1 0 0 1 0 0 1 1 0 0 0 0
0 0 0 0 0 0 0 0 0
0x0 672645504 0 0 NO 31784 NO NO
Router#

This example shows how to display NetFlow table-entry information with no test wrap:
Router# show mls netflow ip nowrap
Displaying Netflow entries in Supervisor Earl
DstIP SrcIP Prot:SrcPort:DstPort Src i/f
:AdjPtr Pkts Bytes Age LastSeen Attributes
---------------------------------------------------------------------------------------------------------------------------------------12.1.1.2 11.1.1.92 udp :63 :63 Fa5/11
:0x0 176339 8111594 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.93 udp :63 :63 Fa5/11
:0x0 176338 8111548 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.94 udp :63 :63 Fa5/11
:0x0 176338 8111548 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.95 udp :63 :63 Fa5/11
:0x0 176338 8111548 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.96 udp :63 :63 Fa5/11
:0x0 176338 8111548 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.97 udp :63 :63 Fa5/11
:0x0 176337 8111502 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.98 udp :63 :63 Fa5/11
:0x0 176337 8111502 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.99 udp :63 :63 Fa5/11
:0x0 176337 8111502 912 22:31:15 L3 - Dynamic
12.1.1.2 11.1.1.100 udp :63 :63 Fa5/11
:0x0 176337 8111502 912 22:31:15 L3 - Dynamic
Router#

This example shows how to display information about the MLS NetFlow on a specific IP address:
Router# show mls netflow ip destination 172.20.52.122
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Router#

This example shows how to display information about the MLS NetFlow on a specific flow:
Router# show mls netflow ip flow udp
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------172.20.52.19
0.0.0.0
0
:0
:0
0
: 0
0
0
1407 11:01:32
L3 - Dynamic
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-962

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow ip

This example shows how to display detailed information about the MLS NetFlow on a full-flow mask:
Router# show mls netflow ip detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------QoS
Police Count Threshold
Leak
Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
172.20.52.19
0.0.0.0
0
:0
:0
0
: 0
0
0
1464 11:02:31
L3 - Dynamic
0x0
0
0
0
NO
64
NO
NO
Router#

This example shows how to display detailed information about a specific flow type:
Router# show mls netflow ip flow icmp
Displaying Netflow entries in Supervisor Earl
DstIP SrcIP Prot:SrcPort:DstPort Src i/f
:AdjPtr
>
>--------------------------------------------------------------------------Pkts Bytes Age LastSeen Attributes
--------------------------------------------------12.1.1.2 11.1.10.151 icmp:0 :0 Fa5/11
:0x0
1945 89470 1062 08:45:15 L3 - Dynamic
12.1.1.2 11.1.10.153 icmp:0 :0 Fa5/11
:0x0
1945 89470 1062 08:45:15 L3 - Dynamic
12.1.1.2 11.1.10.155 icmp:0 :0 Fa5/11
:0x0
1945 89470 1062 08:45:15 L3 - Dynamic
12.1.1.2 11.1.10.157 icmp:0 :0 Fa5/11
:0x0
1945 89470 1062 08:45:15 L3 - Dynamic
12.1.1.2 11.1.10.159 icmp:0 :0 Fa5/11
:0x0
1945 89470 1062 08:45:15 L3 - Dynamic
12.1.1.2 11.1.10.161 icmp:0 :0 Fa5/11
:0x0
1945 89470 1062 08:45:15 L3 - Dynamic
12.1.1.2 11.1.10.163 icmp:0 :0 Fa5/11
:0x0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-963

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls netflow ip

This example shows how to display QoS information:
Router# show mls netflow ip qos
Displaying netflow qos information in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
------------------------------------------------------------------------Pkts
Bytes
LastSeen
QoS
PoliceCount Threshold Leak
------------------------------------------------------------------------Drop Bucket
-----------xxx.xxxx.xxx.xxx xxx.xxx.xxx.xxx xxxx:63
:63
Fa5/11 :0x0
772357
35528422
17:59:01
xxx
xxx
xxx
xxx
xxx
xxx
Router#

Related Commands

Command

Description

clear mls netflow

Clears the MLS NetFlow-shortcut entries.

ip flow-aggregation
cache

Creates a flow-aggregation cache and enters the aggregation cache
configuration mode.

show ip cache flow

Displays a summary of the NetFlow cache-flow entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-964

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow ip sw-installed

show mls netflow ip sw-installed
To display information for the software-installed IP entries, use the show mls netflow ip sw-installed
command.
show mls netflow ip sw-installed {non-static | static} [count [module number] | detail [module
number] | module number]

Syntax Description

non-static

Displays the software-installed routing entries.

static

Displays the software-installed static routing entries.

count

(Optional) Displays the total number of nonstatic entries.

module number

(Optional) Displays the entries that are downloaded on the specified
module; see the “Usage Guidelines” section for valid values.

detail

(Optional) Specifies a detailed per-flow output.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the software-installed nonstatic entries:
Router> show mls netflow ip sw-installed non-static
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------Router>

This example shows how to display detailed information for the software-installed nonstatic entries:
Router> show mls netflow ip sw-installed non-static detail
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f:AdjPtr
-------------------------------------------------------------------Pkts
Bytes
Age
LastSeen Attributes
--------------------------------------------------QoS
Police Count Threshold
Leak
Drop Bucket Use-Tbl Use-Enable
-----------+------------+---------+-----------+----+-------+-------+----------+
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-965

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls netflow ip sw-installed

This example shows how to display the total number of software-installed nonstatic entries:
Router> show mls netflow ip sw-installed non-static count
Displaying Netflow entries in Supervisor Earl
Number of shortcuts = 0
Router>

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-966

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow ipv6

show mls netflow ipv6
To display information about the hardware NetFlow IPv6 configuration, use the show mls netflow ipv6
command.
show mls netflow ipv6 any
show mls netflow ipv6 count [module number]
show mls netflow ipv6 destination ipv6-address[/ipv6-prefix] [count [module number]] | detail |
dynamic | flow {icmp | tcp | udp} | module number | nowrap | qos |
source ipv6-address[/ipv6-prefix] | sw-installed [non-static | static]
show mls netflow ipv6 detail [module number | nowrap [module number]]
show mls netflow ipv6 dynamic [count [module number]] [detail] [module number] [nowrap
[module number]] [{qos [module number]] [nowrap [module number]}]
show mls netflow ipv6 {flow {icmp | tcp | udp}} [count [module number]] | {destination
ipv6-address[/ipv6-prefix]} | detail | dynamic | flow {icmp | tcp | udp} | module number |
nowrap | qos | {source ipv6-address[/ipv6-prefix]} | sw-installed [non-static | static]]
show mls netflow ipv6 {module number}
show mls netflow ipv6 qos [module number | nowrap [module number]]
show mls netflow ipv6 source ipv6-address[/ipv6-prefix] [count [module number]] | detail |
dynamic | flow {icmp | tcp | udp} | module number | nowrap | qos | sw-installed [non-static
| static]

Syntax Description

any

Displays the NetFlow-aging information.

count

Displays the total number of MLS NetFlow IPv6 entries.

module number

(Optional) Displays the entries that are downloaded on the specified
module; see the “Usage Guidelines” section for valid values.

destination ipv6-address Displays the entries for a specific destination IPv6 address.
/ipv6-prefix

IPv6 prefix; valid values are from 0 to 128.

detail

Specifies a detailed output.

dynamic

Displays the hardware-created dynamic entries.

flow icmp | tcp | udp

Specifies the flow type.

nowrap

(Optional) Turns off text wrapping.

qos

Displays information about QoS statistics.

source ipv6-address

(Optional) Displays the entries for a specific source IPv6 address.

sw-installed

(Optional) Displays the routing NetFlow entries.

non-static

(Optional) Displays information about the software-installed static IPv6
entries.

static

(Optional) Displays information about the software-installed nonstatic
IPv6 entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-967

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls netflow ipv6

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about the hardware NetFlow configuration:
Router# show mls netflow ipv6
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
------------------------------------------------------------------------------Prot:SrcPort:DstPort
Src i/f
:AdjPtr
Pkts
Bytes
Age LastSeen
Attributes
-----------------------------------------------------------------------------------------50::2
47::2
tcp :16
:32
Vl47
:0x0
23758
1425480
4
23:48:36
L3 (IPv6) - Dynamic
50::2
47::3
tcp :16
:32
Vl47
:0x0
23758
1425480
4
23:48:36
L3 (IPv6) - Dynamic
50::2
47::4
tcp :16
:32
Vl47
:0x0
23758
1425480
4
23:48:36
L3 (IPv6) - Dynamic
50::2
47::5
tcp :16
:32
Vl47
:0x0
23758
1425480
4
23:48:36
L3 (IPv6) - Dynamic
50::2
47::6
tcp :16
:32
Vl47
:0x0
23758
1425480
4
23:48:36
L3 (IPv6) - Dynamic
Router#

This example shows how to display IPv6 microflow policing information:
Router# show mls netflow ipv6 qos
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
-------------------------------------------------------------------------------Prot:SrcPort:DstPort Src i/f
:AdjPtr
Pkts
Bytes
-------------------------------------------------------------------------------LastSeen
QoS
PoliceCount Threshold
Leak
Drop Bucket
-------------------------------------------------------------------101::3
100::2
icmp:0
:0
-0x0
0
0
22:22:09
0x0
0
0
0
NO 0
101::2
100::2
icmp:0
:0
-0x0
0
0
22:22:09
0x0
0
0
0
NO 0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-968

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls netflow ipv6

This example shows how to display IPv6 microflow policing information for a specific module:
Router# show mls netflow ipv6 qos module 7
Displaying Netflow entries in module 7
DstIP
SrcIP
-------------------------------------------------------------------------------Prot:SrcPort:DstPort Src i/f
:AdjPtr
Pkts
Bytes
-------------------------------------------------------------------------------LastSeen
QoS
PoliceCount Threshold
Leak
Drop Bucket
-------------------------------------------------------------------101::2
100::2
icmp:0
:0
-0x0
0
0
22:22:56
0x0
0
0
0
NO 0
101::3
100::2
icmp:0
:0
-0x0
0
0
22:22:56
0x0
0
0
0
NO 0
Router#

This example shows the output display when you turn off text wrapping:
Router# show mls netflow ipv6 qos nowrap
Displaying Netflow entries in Supervisor Earl
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f
:AdjPtr
Pkts
Bytes
LastSeen
QoS
PoliceCount Threshold
Leak
Drop Bucket
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------101::3
100::2
icmp:0
:0
-0x0
0
0
22:22:19 0x0
0
0
0
NO 0
101::2
100::2
icmp:0
:0
-0x0
0
0
22:22:19 0x0
0
0
0
NO 0
Router#

This example shows the output display when you turn off text wrapping for a specific module:
Router# show mls netflow ipv6 qos nowrap module 7
Displaying Netflow entries in module 7
DstIP
SrcIP
Prot:SrcPort:DstPort Src i/f
:AdjPtr
Pkts
Bytes
LastSeen
QoS
PoliceCount Threshold
Leak
Drop Bucket
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------101::3
100::2
icmp:0
:0
-0x0
0
0
22:22:38 0x0
0
0
0
NO 0
101::2
100::2
icmp:0
:0
-0x0
0
0
22:22:38 0x0
0
0
0
NO 0
Router#

Related Commands

Command

Description

clear mls netflow

Clears the MLS NetFlow-shortcut entries.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-969

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls qos

show mls qos
To display MLS QoS information, use the show mls qos command.
show mls qos [{arp | ipv6 | ip | ipx | last | mac | maps [map-type]} [{interface interface-number}
| {slot slot} | {null interface-number} | {port-channel number} | {vlan vlan-id}]]

Syntax Description

arp

(Optional) Displays ARP information.

ipv6

(Optional) Displays IPv6 information.

ip | ipx

(Optional) Displays information about the MLS IP or IPX status.

last

(Optional) Displays information about the last packet-policing.

mac

(Optional) Displays information about the MAC address-based QoS status.

maps

(Optional) Displays information about the QoS mapping.

map-type

(Optional) Map type; see the “Usage Guidelines” section for valid values.

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, ge-wan, pos, and atm.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

slot slot

(Optional) Specifies the slot number; displays the global and per-interface
QoS enabled and disabled settings and the global QoS counters.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 282.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-970

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls qos

Valid values for map-types are defined as follows:
•

cos-dscp—Specifies the ingress CoS-to-DSCP mapping to display; valid values are from 0 to 7.

•

dscp-cos—Displays the egress DSCP-to-CoS mapping.

•

dscp-exp—Displays the DSCP-to-EXP mapping on the MPLS domain ingress and egress; this
keyword is not supported.

•

exp-dscp—Displays the EXP-to-DSCP mapping on the MPLS domain ingress and egress; this keyword
is not supported.

•

ip-prec-dscp value—Specifies the ingress IP precedence-to-DSCP mapping to display; valid values
are from 0 to 7.

•

policed-dscp—Displays the policed DSCP values to marked-down DSCP values mapping.

The dscp-exp and exp-dscp options are supported on Catalyst 6500 series switches that are configured
with a Supervisor Engine 720 only.

Examples

This example shows how to display information about the last logged packet:
Router# show mls qos last
QoS engine last packet information:
Packet was transmitted
Output TOS/DSCP: 0xC0/48[unchanged]
Aggregate policer index: 0(none)
Microflow policer index: 0(none)
Router#

Output COS: 0[unchanged]

This example shows how to display the QoS-map settings:
Router# show mls qos maps
Policed-dscp map:
0 1 2 3 4 5 6 7 8
---------------------------------00: 00 01 02 03 04 05 06 07 08
10: 10 11 12 13 14 15 16 17 18
20: 20 21 22 23 24 25 26 27 28
30: 30 31 32 33 34 35 36 37 38
40: 40 41 42 43 44 45 46 47 48
50: 50 51 52 53 54 55 56 57 58
60: 60 61 62 63
Dscp-cos map:
0 1 2 3 4 5 6 7 8
---------------------------------00: 00 00 00 00 00 00 00 00 01
10: 01 01 01 01 01 01 02 02 02
20: 02 02 02 02 03 03 03 03 03
30: 03 03 04 04 04 04 04 04 04
40: 05 05 05 05 05 05 05 05 06
50: 06 06 06 06 06 06 07 07 07
60: 07 07 07 07

9
09
19
29
39
49
59

9
01
02
03
04
06
07

Cos-dscp map:
cos:
0 1 2 3 4 5 6 7
---------------------------------dscp:
0 8 16 24 32 40 48 56
IpPrecedence-dscp map:
ipprec:
0 1 2 3 4 5 6 7
----------------------------------

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-971

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls qos

dscp:

0

8 16 24 32 40 48 56

Router#

This example shows how to verify the configuration of DSCP-mutation mapping:
Router# show mls qos maps | begin DSCP mutation
DSCP mutation map mutmap1:
(dscp= d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
------------------------------------0 :
00 01 02 03 04 05 06 07 08 09
1 :
10 11 12 13 14 15 16 17 18 19
2 :
20 21 22 23 24 25 26 27 28 29
3 :
08 31 32 33 34 35 36 37 38 39
4 :
40 41 42 43 44 45 46 47 48 49
5 :
50 51 52 53 54 55 56 57 58 59
6 :
60 61 62 63
<...Output Truncated...>
Router#

Note

In the DSCP-mutation map displays, the marked-down DSCP values are shown in the body of the matrix.
The first digit of the original DSCP value is in the column labeled d1, and the second digit is in the top
row. In the example, DSCP 30 maps to DSCP 08.
This example shows how to display IPv6 information:
Router# show mls qos ipv6
QoS Summary [IPv6]:
(* - shared aggregates, Mod - switch module)
Int Mod Dir

Agg Trust Fl
AgForward-By
AgPoliced-By
Id
Id
-----------------------------------------------------------------------------All
Router#

7

-

Class-map DSCP

Default

0

0*

No

0

189115356

0

This example shows how to display QoS information:
Router# show mls qos
QoS is enabled globally
Microflow policing is enabled globally
QoS ip packet dscp rewrite enabled globally
QoS is disabled on the following interfaces:
Fa6/3 Fa6/4
QoS DSCP-mutation map is enabled on the following interfaces:
Fa6/5
Vlan or Portchannel(Multi-Earl) policies supported: Yes
Egress policies supported: Yes
----- Module [5] ----QoS global counters:
Total packets: 164
IP shortcut packets: 0
Packets dropped by policing: 0
IP packets with TOS changed by policing: 0
IP packets with COS changed by policing: 0
Non-IP packets with COS changed by policing: 0
MPLS packets with EXP changed by policing: 0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-972

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls qos

Related Commands

Command

Description

mls qos (global
configuration mode)

Enables the QoS functionality globally.

mls qos (interface
configuration mode)

Enables the QoS functionality on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-973

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls qos free-agram

show mls qos free-agram
To display the number of free aggregate RAM indexes on the switch processor, use the show mls qos
free-agram command.
show mls qos free-agram

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the number of free aggregate RAM indexes on the switch processor :
Router# show mls qos free-agram
Total Number of Avalable AG RAM indices : 1023
Module [1]
Free AGIDs : 1023
Module [6]
Free AGIDs : 1023
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-974

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls qos maps

show mls qos maps
To display information about the QoS-map configuration and runtime-version, use the show mls qos
maps command.
show mls qos maps [cos-dscp | cos-mutation | dscp-cos | dscp-exp | dscp-mutation | exp-dscp |
exp-mutation | ip-prec-dscp | policed-dscp]

Syntax Description

cos-dscp

(Optional) Displays information about the CoS-to-DSCP map.

cos-mutation

(Optional) Displays information about the CoS-mutation map.

dscp-cos

(Optional) Displays information about the DSCP-to-CoS map.

dscp-exp

(Optional) Displays information about the DSCP-to-exp map.

dscp-mutation

(Optional) Displays information about the DSCP-mutation map.

exp-dscp

(Optional) Displays information about the exp-to-DSCP map.

exp-mutation

(Optional) Displays information about the exp-mutation map.

ip-prec-dscp

(Optional) Displays information about the IP precedence-to-DSCP map.

policed-dscp

(Optional) Displays information about the policed-DSCP map.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about the QoS-map configuration and runtime version:
Router# show mls qos maps
Normal Burst Policed-dscp map:
d1 : d2 0 1 2 3 4 5 6 7 8 9
------------------------------------0 :
00 01 02 03 04 05 06 07 08 09
1 :
10 11 12 13 14 15 16 17 18 19
2 :
20 21 22 23 24 25 26 27 28 29
3 :
30 31 32 33 34 35 36 37 38 39
4 :
40 41 42 43 44 45 46 47 48 49
5 :
50 51 52 53 54 55 56 57 58 59
6 :
60 61 62 63
Maximum Burst Policed-dscp map:
d1 : d2 0 1 2 3 4 5 6 7 8 9
------------------------------------0 :
00 01 02 03 04 05 06 07 08 09
1 :
10 11 12 13 14 15 16 17 18 19
2 :
20 21 22 23 24 25 26 27 28 29
3 :
30 31 32 33 34 35 36 37 38 39

(dscp= d1d2)

(dscp= d1d2)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-975

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls qos maps

4 :
5 :
6 :

40 41 42 43 44 45 46 47 48 49
50 51 52 53 54 55 56 57 58 59
60 61 62 63

Dscp-cos map:
d1 : d2 0 1 2 3 4 5 6 7 8 9
------------------------------------0 :
00 00 00 00 00 00 00 00 01 01
1 :
01 01 01 01 01 01 02 02 02 02
2 :
02 02 02 02 03 03 03 03 03 03
3 :
03 03 04 04 04 04 04 04 04 04
4 :
05 05 05 05 05 05 05 05 06 06
5 :
06 06 06 06 06 06 07 07 07 07
6 :
07 07 07 07

(dscp= d1d2)

Cos-dscp map:
cos:
0 1 2 3 4 5 6 7
-----------------------------------dscp:
0 8 16 24 32 40 48 56
IpPrecedence-dscp map:
ipprec:
0 1 2 3 4 5 6 7
-----------------------------------dscp:
0 8 16 24 32 40 48 56
Router#

This example shows how to display the configuration and runtime version of the CoS-to-CoS map:
Router# show mls qos maps cos-mutation
CoS mutation map test-map:
In-CoS : Out-CoS
-----------------0 :
0
1 :
1
2 :
2
3 :
1
4 :
1
5 :
1
6 :
6
7 :
7
Router#

Related Commands

Command

Description

mls qos map cos-dscp

Defines the ingress CoS-to-DSCP map for trusted interfaces.

mls qos map
cos-mutation

Maps a packet’s CoS to a new CoS value.

mls qos map dscp-cos

Defines an egress DSCP-to-CoS map.

mls qos map
dscp-mutation

Defines a named DSCP mutation map.

mls qos map
ip-prec-dscp

Defines an ingress-IP precedence-to-DSCP map for trusted interfaces.

mls qos map
policed-dscp

Sets the mapping of policed DSCP values to marked-down DSCP values.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-976

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls qos mpls

show mls qos mpls
To display an interface summary for MPLS QoS classes in the policy maps, use the show mls qos mpls
command.
show mls qos mpls [{interface interface-number} | {module slot}]

Syntax Description

interface

(Optional) Interface type; possible valid values are fastethernet,
gigabitethernet, tengigabitethernet.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

module slot

(Optional) Specifies the module slot number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported in PFC3BXL or PFC3B mode only.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Examples

This example shows how to display an interface summary for MPLS QoS classes in the policy maps:
Router# show mls qos mpls
QoS Summary [MPLS]: (* - shared aggregates, Mod - switch module)
Int Mod Dir Class-map DSCP Agg Trust Fl AgForward-By AgPoliced-By
Id Id
--------------------------------------------------------------------------------------------------------------------Fa3/38 5 In exp2 0 1 dscp 0 378900 0
Fa3/41 5 In exp4 0 3 dscp 0 0 0
All 5 - Default 0 0* No 0 1191011240 0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-977

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls qos mpls

Related Commands

Command

Description

mls qos exp-mutation

Attaches an egress-EXP mutation map to the interface.

mls qos map exp-dscp

Defines the ingress EXP value to the internal DSCP map.

mls qos map
exp-mutation

Maps a packet’s EXP to a new EXP value.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-978

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls qos protocol

show mls qos protocol
To display protocol pass-through information, use the show mls qos protocol command.
show mls qos protocol [module num]

Syntax Description

module num

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Specifies the module number.

This example shows how to display protocol pass-through information:
Router# show mls qos protocol
RIP : Passthru mode
OSPF : Passthru mode
ND : Policing mode Cir = 32000 Burst = 1000
----- Module [5] ----Routing protocol RIP is using AgId 0*
Routing protocol OSPF is using AgId 0*
Routing protocol ND is using AgId 1
----- Module [6] ----Routing protocol RIP is using AgId 0*
Routing protocol OSPF is using AgId 0*
Router#

Related Commands

Command

Description

mls qos protocol

Defines the routing-protocol packet policing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-979

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls qos statistics-export info

show mls qos statistics-export info
To display information about the MLS-statistics data-export status and configuration, use the show mls
qos statistics-export info command.
show mls qos statistics-export info

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about the MLS-statistics data-export status and
configuration:
Router# show mls qos statistics-export info
QoS Statistics Data Export Status and Configuration information
--------------------------------------------------------------Export Status : enabled
Export Interval : 250 seconds
Export Delimiter : @
Export Destination : 172.20.52.3, UDP port 514 Facility local6, Severity debug
QoS Statistics Data Export is enabled on following ports:
--------------------------------------------------------FastEthernet5/24
QoS Statistics Data export is enabled on following shared aggregate policers:
----------------------------------------------------------------------------aggr1M
QoS Statistics Data Export is enabled on following class-maps:
--------------------------------------------------------------class3
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-980

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls qos statistics-export info

Related Commands

Command

Description

mls qos
statistics-export
(global configuration
mode)

Enables QoS-statistics data export globally.

mls qos
statistics-export
(interface
configuration mode)

Enables per-port QoS-statistics data export.

mls qos
statistics-export
aggregate-policer

Enables QoS-statistics data export on the named aggregate policer.

mls qos
statistics-export
class-map

Enables QoS-statistics data export for a class map.

mls qos
statistics-export
delimiter

Sets the QoS-statistics data-export field delimiter.

mls qos
statistics-export
destination

Configures the QoS-statistics data-export destination host and UDP port
number.

mls qos
statistics-export
interval

Specifies how often a port and/or aggregate-policer QoS-statistics data is read
and exported.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-981

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls rate-limit

show mls rate-limit
To display information about the MLS rate limiter, use the show mls rate-limit command.
show mls rate-limit [usage]

Syntax Description

usage

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Displays the feature that is used with the rate-limiter register.

In the command output, the rate-limit status could be one of the following:
•

On indicates a rate for that particular case has been set.

•

Off indicates that the rate-limiter type has not been configured, and the packets for that case are not
rate limited.

•

On/Sharing indicates a particular case (not manually configured) is affected by the configuration of
another rate limiter belonging to the same sharing group.

•

A hyphen indicates that the multicast partial-SC rate limiter is disabled.

In the command output, the rate-limit sharing indicates the following information:
•

Whether sharing is static or dynamic

•

Group dynamic sharing codes

The show mls rate-limit usage command displays the hardware register that is used by a rate-limiter
type. If the register is not used by any rate-limiter type, Free is displayed in the output. If the register is
used by a rate-limiter type, Used and the rate-limiter type are displayed.

Examples

This example shows how to display information about the rate-limit status:
Router# show mls rate-limit
Sharing Codes: S - static, D - dynamic
Codes dynamic sharing: H - owner (head) of the group, g - guest of the group
Rate Limiter Type
--------------------MCAST NON RPF
MCAST DFLT ADJ
MCAST DIRECT CON
ACL BRIDGED IN
ACL BRIDGED OUT

Status
---------Off
On
Off
Off
Off

Packets/s
--------100000
-

Burst
----100
-

Sharing
------Not sharing
-

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-982

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls rate-limit

IP FEATURES
ACL VACL LOG
CEF RECEIVE
CEF GLEAN
MCAST PARTIAL SC
IP RPF FAILURE
TTL FAILURE
ICMP UNREAC. NO-ROUTE
ICMP UNREAC. ACL-DROP
ICMP REDIRECT
MTU FAILURE
MCAST IP OPTION
UCAST IP OPTION
LAYER_2 PDU
LAYER_2 PT
LAYER_2 PORTSEC
IP ERRORS
CAPTURE PKT
MCAST IGMP
MCAST IPv6 DIRECT CON
MCAST IPv6 ROUTE CNTL
MCAST IPv6 *G M BRIDG
MCAST IPv6 SG BRIDGE
MCAST IPv6 DFLT DROP
MCAST IPv6 SECOND. DR
MCAST IPv6 *G BRIDGE
MCAST IPv6 MLD
IP ADMIS. ON L2 PORT
Router#

Off
On
Off
Off
On
On
On
On
On
Off
On
Off
Off
Off
Off
On
On
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off
Off

2000
100000
100
1000
100
100
1000
10000
100
-

1
100
10
100
10
10
100
1
10
-

Not sharing
Not sharing
Group:0 S
Not sharing
Group:0 S
Group:0 S
Not sharing
Not sharing
Group:0 S
-

This example shows how to display information about the rate-limit usage:
Router# show mls rate-limit usage
Rate Limiter Type
--------------------Layer3 Rate Limiters:
RL# 0: Free
RL# 1: Free
RL# 2: Free
RL# 3: Used
MCAST DFLT ADJ
RL# 4: Used
MTU FAILURE
RL# 5: Used
TTL FAILURE
RL# 6: Used
IP RPF FAILURE
ICMP UNREAC. NO-ROUTE
ICMP UNREAC. ACL-DROP
IP ERRORS
RL# 7: Used
ACL VACL LOG
RL# 8: Rsvd for capture
Layer2 Rate Limiters:
RL# 9: Reserved
RL#10: Reserved
RL#11: Free
RL#12: Used

Packets/s
---------

Burst
-----

-

-

100000

100

1000

100

1000

100

100
100
100
100

10
10
10
10

2000
-

1
-

-

-

-

LAYER_2 PORTSEC

10000

1

Router #

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-983

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls rate-limit

Related Commands

Command

Description

mls rate-limit layer2

Enables and sets the rate limiters for the control packets in Layer 2.

mls rate-limit
multicast ipv4

Enables and sets the rate limiters for the IPv4 multicast packets.

mls rate-limit
multicast ipv6

Configures the IPv6 multicast rate limiters.

mls rate-limit unicast
acl

Enables and sets the ACL-bridged rate limiters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-984

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls sampling

show mls sampling
To display information about the sampled NDE status, use the show mls sampling command.
show mls sampling

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Sampled NetFlow is supported on Layer 3 interfaces only.

Examples

This example shows how to display information about the sampled NDE status:
Router# show mls sampling
time-based sampling is enabled
1 out of every 1024 packets is being sampled.
Sampling Interval and Period is 4 millisec per 4096 millisec
Router#

Related Commands

Command

Description

mls netflow sampling

Enables the sampled NetFlow on an interface.

mls sampling

Enables the sampled NetFlow and specifies the sampling method.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-985

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls statistics

show mls statistics
To display the MLS statistics for the IP, multicast, Layer 2 protocol, and QoS, use the show mls
statistics command.
show mls statistics [module num | protocol type]

Syntax Description

module num

(Optional) Displays the MLS statistics for a specific module.

protocol type

(Optional) Displays MLS statistics information based on a protocol (such
as Telnet, FTP, or WWW).

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The total packets switched performance displayed is the rate calculated as the average rate in a period
within the last 30 seconds.
The ingress ACL denied packet count is displayed in the Total packets L3 Switched field and in the Total
packets dropped by ACL field.
The RPF failed packet count is displayed in the Total packets L3 Switched field.
If the IP multicast source sends traffic to any multicast group that does not have an (*,G) entry present
in the mroute table, the show mls statistics command displays these packets as incrementing in the Total
Mcast Packets Switched/Routed field. These packets are dropped in the hardware because there are no
receivers for that group and no entry in the mroute table.

Examples

This example shows how to display the MLS statistics for all modules:
Router# show mls statistics
Statistics for Earl in Module 2
L2 Forwarding Engine
Total packets Switched

: 20273@ 22552 pps

L3 Forwarding Engine
Total Packets Bridged
Total Packets FIB Switched
Total Packets ACL Routed
Total Packets Netflow Switched
Total Mcast Packets Switched/Routed
Total ip packets with TOS changed

:
:
:
:
:
:

20273
7864
0
0
220598
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-986

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls statistics

Total
Total
Total
Total

ip packets with COS changed
non ip packets COS changed
packets dropped by ACL
packets dropped by Policing

:
:
:
:

0
0
0
705757744

Statistics for Earl in Module 9
L2 Forwarding Engine
Total packets Switched
L3 Forwarding Engine
Total Packets Bridged
Total Packets FIB Switched
Total Packets ACL Routed
Total Packets Netflow Switched
Total Mcast Packets Switched/Routed
Total ip packets with TOS changed
Total ip packets with COS changed
Total non ip packets COS changed
Total packets dropped by ACL
Total packets dropped by Policing
Router#

: 16683@ 1 pps

:
:
:
:
:
:
:
:
:
:

0
0
0
0
0
0
0
0
0
277949053

This example shows how to display the MLS statistics for a specific module:
Router# show mls statistics module 1
Statistics for Earl in Module 1
L2 Forwarding Engine
Total packets Switched
>>
L3 Forwarding Engine
Total Packets Bridged
Total Packets FIB Switched
Total Packets ACL Routed
Total Packets Netflow Switched
Total Mcast Packets Switched/Routed
Total ip packets with TOS changed
Total ip packets with COS changed
Total non ip packets COS changed
Total packets dropped by ACL
Total packets dropped by Policing
Total Unicast RPF failed packets
Errors
MAC/IP length inconsistencies
Short IP packets received
IP header checksum errors
MAC/IPX length inconsistencies
Short IPX packets received
Router#

: 2748166@ 22332 pps

:
:
:
:
:
:
:
:
:
:
:

92750@ 34 pps
7
0
0
3079200
0
0
0
0
0
0

:
:
:
:
:

0
0
0
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-987

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mls table-contention

show mls table-contention
To display TCL information, use the show mls table-contention command.
show mls table-contention {detailed | summary | aggregate}

Syntax Description

detailed

Displays the detailed TCL information.

summary

Displays the TCL level.

aggregate

Displays the aggregate count of all missed flows in the Supervisor Engine 720
and page hits/misses in Supervisor Engine 2.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter the aggregate keyword to display the statistics for the NetFlow-creation failures and
NetFlow-hash aliases in the Supervisor Engine 720.
You can enter the aggregate keyword to display the page hits and misses in the Supervisor Engine 2.
The last reading of the corresponding registers are displayed in the summary and detailed keywords for
the Supervisor Engine 720.

Examples

This example shows how to display a detailed list of TCL information:
Router# show mls table-contention detailed
Detailed Table Contention Level Information
===========================================
Layer 3
------L3 Contention Level:
0
Page Hits Requiring 1 Lookup
=
31
Page Hits Requiring 2 Lookups
=
0
Page Hits Requiring 3 Lookups
=
0
Page Hits Requiring 4 Lookups
=
0
Page Hits Requiring 5 Lookups
=
0
Page Hits Requiring 6 Lookups
=
0
Page Hits Requiring 7 Lookups
=
0
Page Hits Requiring 8 Lookups
=
0
Page Misses
=
0
Router#

This example shows how to display a summary of TCL information:
Router# show mls table-contention summary

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-988

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mls table-contention

Summary of Table Contention Levels (on a scale of 0 (lowest) to 3 (highest))
============================================================================
L3 Contention Level: 0

This example shows how to display an aggregate count of all missed flows in the Supervisor Engine 720
and page hits/misses in Supervisor Engine 2:
Router# show mls table-contention aggregate
Earl in Module 1
Detailed Table Contention Level Information
===========================================
Layer 3
------L3 Contention Level:
0
Page Hits Requiring 1 Lookup
=
24000
Page Hits Requiring 2 Lookups
=
480
Page Hits Requiring 3 Lookups
=
0
Page Hits Requiring 4 Lookups
=
0
Page Hits Requiring 5 Lookups
=
0
Page Hits Requiring 6 Lookups
=
0
Page Hits Requiring 7 Lookups
=
0
Page Hits Requiring 8 Lookups
=
0
Page Misses
=
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-989

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mmls igmp explicit-tracking

show mmls igmp explicit-tracking
To display information about the host-tracking database, use the show mmls igmp explicit-tracking
command.
show mmls igmp explicit-tracking [vlan-id]

Syntax Description

vlan-id

Defaults

This command has no default settings.

Command Modes

Switch processor—Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) VLAN ID; valid values are 1 to 4094.

This example shows how to display information about the host-tracking database for a specific VLAN:
Switch-sp# show mmls igmp explicit-tracking 27
Source/Group
Interface
Reporter
Filter_mode
-----------------------------------------------------------------------10.1.1.1/224.1.1.1
Vl27:3/25
16.27.2.3
INCLUDE
10.2.2.2/224.1.1.1
Vl27:3/25
16.27.2.3
INCLUDE
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-990

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mmls msc

show mmls msc
To display information about MMLS, use the show mmls msc command.
show mmls msc [cache | entry | icroif-cache | rpdf-cache | statistics | vpn]

Syntax Description

cache

(Optional) Displays information about the multicast shortcuts for the process
cache.

entry

(Optional) Displays information about the dump-hardware entries in Layer 3.

icroif-cache

(Optional) Displays information about the dump-ICROIF cache.

rpdf-cache

(Optional) Displays information about the dump-Bidir RPDF cache.

statistics

(Optional) Displays statistics about the multicast-shortcuts process.

vpn

(Optional) Displays information about VPN.

Defaults

This command has no default settings.

Command Modes

Switch processor—Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about MMLS:
Switch-sp# show mmls msc
General Info
---------------------------------------------------+------+
Number shortcuts in software database
1890
Number of MFD in software database
1890
Router MAC
0001.64f8.1b00
Internal Vlan
4093
Aggregation Vlan
0
Aggregation Indexes
0
Current Size of inputQ
0
Maximum Size of inputQ
2
flow statistics timeout [sec]
25
non-rpf MFDs purge timeout [sec]
20
non-rpf MFDs aging timeout [sec]
2.0
Switch-sp#

This example shows how to display information about the MMLS shortcut-process cache:
Switch-sp# show mmls msc cache
-------------macg cache buckets for vpn 0----------------Bucket 90 #g: 1
Group mac address: 0100.5e01.0105
$$$ (S,G,C): (100.0.0.4, 224.1.1.5, 100)
mfd_flag: 1

type: Sparse

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-991

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mmls msc

$$$ (S,G,C): (0.0.0.0, 224.1.1.5, 1)
mfd_flag: 1 type: Sparse
### vlan: 100
sc_count:
0 rpf_count:
1
### vlan:
1
sc_count:
0 rpf_count:
1
Bucket 91 #g: 1
Group mac address: 0100.5e01.0104
$$$ (S,G,C): (100.0.0.4, 224.1.1.4, 100)
mfd_flag: 1 type: Sparse
$$$ (S,G,C): (0.0.0.0, 224.1.1.4, 1)
mfd_flag: 1 type: Sparse
### vlan: 100
sc_count:
0 rpf_count:
1
### vlan:
1
sc_count:
0 rpf_count:
1
Bucket 92 #g: 1
Group mac address: 0100.5e01.0103
$$$ (S,G,C): (100.0.0.4, 224.1.1.3, 100)
mfd_flag: 1 type: Sparse
$$$ (S,G,C): (0.0.0.0, 224.1.1.3, 1)
mfd_flag: 1 type: Sparse
### vlan: 100
sc_count:
0 rpf_count:
1
### vlan:
1
sc_count:
0 rpf_count:
1
Bucket 93 #g: 1
Group mac address: 0100.5e01.0102
$$$ (S,G,C): (100.0.0.4, 224.1.1.2, 100)
mfd_flag: 1 type: Sparse
$$$ (S,G,C): (0.0.0.0, 224.1.1.2, 1)
mfd_flag: 1 type: Sparse
### vlan: 100
sc_count:
0 rpf_count:
1
### vlan:
1
sc_count:
0 rpf_count:
1
Bucket 94 #g: 1
Group mac address: 0100.5e01.0101
$$$ (S,G,C): (100.0.0.4, 224.1.1.1, 100)
mfd_flag: 1 type: Sparse
$$$ (S,G,C): (0.0.0.0, 224.1.1.1, 1)
mfd_flag: 1 type: Sparse
### vlan: 100
sc_count:
0 rpf_count:
1
### vlan:
1
sc_count:
0 rpf_count:
1
Switch-sp#

This example shows how to display dump ICROIF-cache information:
Switch-sp# show mmls msc icroif-cache
msc_local_icroif_index: 0x493
msc_global_icroif_index: 0x494
ICROIF CACHE:
------------Module mask: 0x8
Switch-sp#

Icroif_index: 0x495

This example shows how to display a dump list of DF interfaces for the PIM-RPs:
Switch-sp# show mmls msc rpdf-cache
--------------- RP-CACHE [VPN-0] -------------Bucket# :0
RP-addr: 1.0.0.1, Rpf: 0 Vpn: 0
DF-index: 0
DF-list: 201 202 203 204 205
211 212
Group-list:
(224.1.0.0/24, H)
G/m-count: 1, G/32-count: 1

206

207

208

209

210

206

207

208

209

210

Bucket# :2
RP-addr: 3.0.0.1, Rpf: 0 Vpn: 0
DF-index: 2
DF-list: 201 202 203 204 205
211 212

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-992

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mmls msc

Group-list:
(224.1.2.0/24, H)
G/m-count: 1, G/32-count: 0
Bucket# :3
RP-addr: 2.0.0.1, Rpf: 0 Vpn: 0
DF-index: 1
DF-list: 201 202 203 204 205
211 212
Group-list:
(224.1.1.0/24, H)
G/m-count: 1, G/32-count: 1

206

207

208

209

210

206

207

208

209

210

Bucket# :5
RP-addr: 4.0.0.1, Rpf: 0 Vpn: 0
DF-index: 3
DF-list: 201 202 203 204 205
211 212
Group-list:
(224.1.3.0/24, H)
G/m-count: 1, G/32-count: 0
Switch-sp#

This example shows how to display the statistics for the multicast-shortcut process:
Switch-sp# show mmls msc statistics
Communication Statistics
--------------------------------------------------+------+
Number MSM PDU Received
1
Number MSM PDU Sent
1
Unsolicited Feature Notification Sent
1
Feature Notification Received
2
Feature Notification Sent
2
Stop retry Sent
0
Stop download Sent
0
Error Statistics
--------------------------------------------------+------+
L2 entry not found
0
LTL full error
0
MET full error
0
Debug Statistics
--------------------------------------------------+------+
HW Met failure
0
HW Dist failure
0
HW L3 Install failure
0
HW L3 Update failure
0
TLV Statistics
--------------------------------------------------+------+
INSTALL TLV Received
0
SELECTIVE DELETE TLV Received
0
GROUP DELETE TLV Received
0
UPDATE TLV Received
0
INPUT VLAN DELETE TLV Received
0
OUTPUT VLAN DELETE TLV Received
0
GLOBAL DELETE TLV Received
0
MFD INSTALL TLV Received
0
MFD DELETE TLV Received
0
MFD GLOBAL DELETE Received
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-993

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mmls msc

NRPF MFD INSTALL TLV Received
NRPF MFD DELETE TLV Received
SUBNET INSTALL TLV Received
SUBNET DELETE TLV Received
MVPN INSTALL TLV Received
MVPN SELECTIVE DELETE TLV Received
MVPN UPDATE TLV Received
MVPN GROUP DELETE TLV Received
MVPN MFD INSTALL TLV Received
MVPN MFD DELETE TLV Received
MVPN BIDIR RPDF UPDATE TLV Received
MVPN BIDIR RP UPDATE TLV Received
MVPN BIDIR CLEAR ALL GRP TLV Received
MVPN BIDIR CLEAR RP GRP TLV Received
MVPN BIDIR CLEAR ALL DF TLV Received
MVPN BIDIR CLEAR RP DF TLV Received
MVPN BIDIR CLEAR ALL RP TLV Received
MVPN BIDIR NONDF INSTALL TLV Received

0
0
15
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

INSTALL TLV Ack Sent
SELECTIVE DELETE TLV Ack Sent
GROUP DELETE TLV Ack Sent
UPDATE TLV Ack Sent
INPUT VLAN DELETE TLV Ack Sent
OUTPUT VLAN DELETE TLV Ack Sent
GLOBAL DELETE TLV Ack Sent
MFD INSTALL TLV Ack Sent
MFD DELETE TLV Ack Sent
MFD GLOBAL DELETE Ack Sent
NRPF MFD INSTALL TLV Ack Sent
NRPF MFD DELETE TLV Ack Sent
SUBNET INSTALL TLV Ack Sent
SUBNET DELETE TLV Ack Sent
MVPN INSTALL TLV Ack Sent
MVPN SELECTIVE DELETE TLV Ack Sent
MVPN UPDATE TLV Ack Sent
MVPN GROUP DELETE TLV Ack Sent
MVPN MFD INSTALL TLV Ack Sent
MVPN MFD DELETE TLV Ack Sent
MVPN BIDIR RPDF UPDATE TLV Ack Sent
MVPN BIDIR RP UPDATE TLV Ack Sent
MVPN BIDIR CLEAR ALL GRP TLV Ack Sent
MVPN BIDIR CLEAR RP GRP TLV Ack Sent
MVPN BIDIR CLEAR ALL DF TLV Ack Sent
MVPN BIDIR CLEAR RP DF TLV Ack Sent
MVPN BIDIR CLEAR ALL RP TLV Ack Sent
MVPN BIDIR NONDF INSTALL TLV Ack Sent

0
0
0
0
0
0
0
0
0
0
0
0
15
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0

TLV Error Statistics
--------------------------------------------------+------+
Generic error
0
L3 entry exist error
0
Hash collision error
0
L3 entry not found
0
MFD exist error
0
MFD not found error
0
Invalid subnet error
0
Bidir-RP not found error
0
Bidir-DF partial fail error
0
Bidir-DF Table full error
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-994

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mmls msc

TLV Debug Statistics
--------------------------------------------------+------+
Non RPF L3 failure
0
Bidir DF install
0
Bidir DF failure
0
Bidir NDF install
0
Bidir NDF failure
0
Bidir DF err-tlv sent
0
Bidir GRP err-tlv sent
0
Switch-sp#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-995

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mobility

show mobility
To display information about the Layer 3 mobility and the wireless network, use the show mobility
command.
show mobility {{ap [ipaddr]} | {mn [ip ipaddr]} | {mac mac-addr} | {network network-id} |
status}

Syntax Description

ap

Displays information about the access point.

ipaddr

(Optional) IP address.

mn

Displays information about the mobile node.

ip ipaddr

(Optional) Displays information about the IP database thread.

mac mac-addr

(Optional) Displays information about the MAC database thread.

network
network-id

Displays information for a specific wireless network ID.

status

Displays status information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on Catalyst 6500 series switches that are configured with a WLSM only.

Examples

This example shows how to display information about the access point:
Router# show mobility ap
AP IP Address
AP Mac Address Wireless Network-ID
--------------- -------------- ------------------148.1.1.2 000d.29a2.a852 101 102 109 103
Router#

This example shows how to display information about the access points for a specific network ID:
Router# show mobility ap 148.1.1.2 detail
IP Address : 148.1.1.2
MAC Address : 000d.29a2.a852
Participating Wireless Tunnels: 101, 102, 109, 103
Registered Mobile Nodes on AP {148.1.1.2, 000d.29a2.a852} :
MN Mac Address MN IP Address AP IP Address Wireless Network-ID
-------------- --------------- --------------- ------------------000a.8afa.85c9 10.1.3.11 148.1.1.2 103

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-996

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mobility

000d.bdb7.83f7 10.1.2.11 148.1.1.2 102
000d.bdb7.83fb 10.1.1.11 148.1.1.2 101
Router#
Router# show mobility network-id 101
Wireless Network ID : 101
Wireless Tunnel Source IP Address : 1.1.1.1
Wireless Network Properties : Trusted
Wireless Network State : Up
Registered Access Point on Wireless Network 101:
AP IP Address AP Mac Address Wireless Network-ID
--------------- -------------- ------------------148.1.1.2 000d.29a2.a852 101 102 109 103
Registered Mobile Nodes on Wireless Network 101:
MN Mac Address MN IP Address AP IP Address Wireless Network-ID
-------------- --------------- --------------- ------------------000d.bdb7.83fb 10.1.1.11 148.1.1.2 101
Router#
Router# show mobility status
WLAN Module is located in Slot: 4 (HSRP State: Active) LCP
Communication status
: up
MAC address used for Proxy ARP: 0030.a349.d800
Number of Wireless Tunnels
: 1
Number of Access Points
: 2
Number of Mobile Nodes
: 0
Wireless Tunnel Bindings:
Src IP Address
Wireless Network-ID Flags
--------------- ------------------- ------1.1.1.1
101
B
Flags: T=Trusted, B=IP Broadcast enabled, A=TCP Adjust-mss enabled
Router#

Related Commands

Command

Description

mobility

Configures the wireless mGRE tunnels.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-997

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show module

show module
To display the module status and information, use the show module command.
show module [mod-num | all | power | provision | version]

Syntax Description

mod-num

(Optional) Number of the module.

all

(Optional) Displays the information for all modules.

power

(Optional) Displays administration and operating status.

provision

(Optional) Displays the status about the module provisioning.

version

(Optional) Displays the version information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In the Mod Sub-Module fields, the show module command displays the supervisor engine number but
appends the uplink daughter card’s module type and information.
Entering the show module command with no arguments is the same as entering the show module all
command.

Examples

This example shows how to display information for all modules on a Catalyst 6500 series switch that is
configured with a Supervisor Engine 720:
Router# show module
Mod Ports Card Type
--- ----- -------------------------------------5
2 Supervisor Engine 720 (Active)
8
48 aCEF720 48 port 10/100/1000 Ethernet
9
32 dCEF720 32 port Gigabit Ethernet
Mod
--5
8
9

MAC addresses
---------------------------------00e0.aabb.cc00 to 00e0.aabb.cc3f
0005.9a3b.d8c4 to 0005.9a3b.d8c7
00e0.b0ff.f0f4 to 00e0.b0ff.f0f5

Hw
-----1.0
0.705
0.207

Model
-----------------WS-SUP720-BASE
WS-X6748-GE-TX
WS-X6832-SFP

Fw
-----------12.2(2003012
7.1(0.12-Eng
12.2(2002082

Serial No.
----------SAD0644030K
SAD07010045
SAD07010045

Sw
-----------12.2(2003012
12.2(2003012
12.2(2003012

Status
------Ok
Ok
Ok

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-998

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show module

Mod
--5
5

Sub-Module
Model
Serial
Hw
Status
--------------------------- --------------- --------------- ------- ------Policy Feature Card 3
WS-F6K-PFC3
SAD0644031P
0.302
Ok
PISA Daughtercard
WS-SUP720
SAD06460172
0.701

Mod Online Diag Status
--- ------------------5 Not Available
7 Bypass
8 Bypass
9 Bypass
Router#

This example shows how to display information for a specific module:
Router# show module 2
Mod Ports Card Type
Model
Serial No.
--- ----- -------------------------------------- ------------------ ----------5
2 Supervisor Engine 720 (Active)
WS-SUP720-BASE
SAD0644030K
Mod MAC addresses
Hw
Fw
Sw
Status
--- ---------------------------------- ------ ------------ ------------ ------5 00e0.aabb.cc00 to 00e0.aabb.cc3f
1.0
12.2(2003012 12.2(2003012 Ok
Mod
--5
5

Sub-Module
Model
Serial
Hw
Status
--------------------------- --------------- --------------- ------- ------Policy Feature Card 3
WS-F6K-PFC3
SAD0644031P
0.302
Ok
PISA Daughtercard
WS-SUP720
SAD06460172
0.701

Mod Online Diag Status
--- ------------------5 Not Available
Router#

This example shows how to display version information:
Router# show module version
Mod Port Model
Serial #
Versions
--- ---- ------------------ ----------- -------------------------------------2 0
WS-X6182-2PA
Hw : 1.0
Fw : 12.2(20030125:231135)
Sw : 12.2(20030125:231135)
4 16
WS-X6816-GBIC
SAD04400CEE Hw : 0.205
6 2
WS-X6K-SUP3-BASE
SAD064300GU Hw : 0.705
Fw : 7.1(0.12-Eng-02)TAM
Sw : 12.2(20030125:231135)
Sw1: 8.1(0.45)KIS
WS-X6K-SUP3-PFC3
SAD064200VR Hw : 0.701
Fw : 12.2(20021016:001154)
Sw : 12.2(20030125:231135)
WS-F6K-PFC3
SAD064300M7 Hw : 0.301
9 48
WS-X6548-RJ-45
SAD04490BAC Hw : 0.301
Fw : 6.3(1)
Sw : 7.5(0.30)CFW11
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-999

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show module

This example shows how to display the administration and operating status of the modules:
Router# show module power
Mod Card Type
--- -------------------------------------1 SFM-capable 48-port 10/100 Mbps RJ45
4 SFM-capable 16 port 1000mb GBIC
5 Supervisor Engine 720 (Active)
Router#

Admin Status
-----------on
on
on

Oper Status
-----------on
on
on

This example shows how to display module provisioning information:
Router# show module provision
Module Provision
1
dynamic
2
dynamic
3
dynamic
4
dynamic
5
dynamic
6
dynamic
7
dynamic
8
dynamic
9
dynamic
10
dynamic
11
dynamic
12
dynamic
13
dynamic
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1000

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show monitor permit-list

show monitor permit-list
To display the permit-list state and interfaces configured, use the show monitor permit-list command.
show monitor permit-list

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the permit-list state and interfaces configured:
Router# show monitor permit-list
SPAN Permit-list
:Admin Enabled
Permit-list ports
:Gi5/1-4,Gi6/1
Router(config)#

Related Commands

Command

Description

monitor permit-list

Configures a destination port permit list or adds to an existing destination
port permit list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1001

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show monitor session

show monitor session
To display information about the ERSPAN, SPAN and RSPAN sessions, use the show monitor session
command.
show monitor session [{range session-range} | local | remote | all | session]
show monitor session [erspan-destination | erspan-source] [detail]

Syntax Description

range session-range

(Optional) Displays a range of sessions; valid values are from 1 to 66. See the
“Usage Guidelines” section for additional information.

local

(Optional) Displays only local SPAN sessions.

remote

(Optional) Displays both RSPAN source and destination sessions.

all

(Optional) Displays all sessions.

session

(Optional) Number of the session; valid values are from 1 to 66.

erspan-destination

(Optional) Displays information about the destination ERSPAN sessions
only.

erspan-source

(Optional) Displays information about the source ERSPAN sessions only.

detail

(Optional) Displays detailed session information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When entering a range of sessions, use a dash (-) to specify a range and separate multiple entries with a
comma (,). Do not enter spaces before or after the comma or the dash.
You can enter multiple ranges by separating the ranges with a comma.
If you enter the show monitor session command without specifying a session, the information for all
sessions is displayed.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1002

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show monitor session

Examples

This example shows how to display the saved version of the monitor configuration for a specific session:
Router# show monitor session 2
Session 2
-----------Type : Remote Source Session
Source Ports:
RX Only:
Dest RSPAN VLAN:
Router#

Fa1/1-3
901

This example shows how to display the detailed information from a saved version of the monitor
configuration for a specific session:
Router# show monitor session 2 detail
Session 2
-----------Type : Remote Source Session
Source Ports:
RX Only:
TX Only:
Both:
Source VLANs:
RX Only:
TX Only:
Both:
Source RSPAN VLAN:
Destination Ports:
Filter VLANs:
Dest RSPAN VLAN:
Router#

Fa1/1-3
None
None
None
None
None
None
None
None
901

This example shows how to display information about the destination ERSPAN sessions only:
Router# show monitor session erspan-destination
Session 2
--------Type
: ERSPAN Destination Session
Status
: Admin Disabled
Router#

This example shows how to display detailed information about the destination ERSPAN sessions only:
Router# show monitor session erspan-destination detail
Session 2
--------Type
: ERSPAN Destination Session
Status
: Admin Disabled
Description
: Source Ports
:
RX Only
: None
TX Only
: None
Both
: None
Source VLANs
:
RX Only
: None
TX Only
: None
Both
: None
Source RSPAN VLAN
: None
Destination Ports
: None
Filter VLANs
: None
Destination RSPAN VLAN : None
Source IP Address
: None

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1003

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show monitor session

Source IP VRF
Source ERSPAN ID
Destination IP Address
Destination IP VRF
Destination ERSPAN ID
Origin IP Address
IP QOS PREC
IP TTL
Router#

:
:
:
:
:
:
:
:

None
None
None
None
None
None
0
255

This example shows how to display information about the source ERSPAN sessions only:
Router# show monitor session erspan-source
Session 1
--------Type
: ERSPAN Source Session
Status
: Admin Disabled
Session 3
--------Type
: ERSPAN Source Session
Status
: Admin Disabled
Router#

This example shows how to display detailed information about the source ERSPAN sessions only:
Router# show monitor session erspan-source detail
Session 1
--------Type
: ERSPAN Source Session
Status
: Admin Disabled
Description
: Source Ports
:
RX Only
: None
TX Only
: None
Both
: None
Source VLANs
:
RX Only
: None
TX Only
: None
Both
: None
Source RSPAN VLAN
: None
Destination Ports
: None
Filter VLANs
: None
Destination RSPAN VLAN : None
Source IP Address
: None
Source IP VRF
: None
Source ERSPAN ID
: None
Destination IP Address : None
Destination IP VRF
: None
Destination ERSPAN ID : None
Origin IP Address
: None
IP QOS PREC
: 0
IP TTL
: 255
Session 3
--------Type
Status
Description
Source Ports
RX Only
TX Only
Both
Source VLANs
RX Only

:
:
:
:
:
:
:
:
:

ERSPAN Source Session
Admin Disabled
None
None
None
None

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1004

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show monitor session

Related Commands

TX Only
Both
Source RSPAN VLAN
Destination Ports
Filter VLANs
Destination RSPAN VLAN
Source IP Address
Source IP VRF
Source ERSPAN ID
Destination IP Address
Destination IP VRF
Destination ERSPAN ID
Origin IP Address
IP QOS PREC
IP TTL
Router#

:
:
:
:
:
:
:
:
:
:
:
:
:
:
:

None
None
None
None
None
None
None
None
None
None
None
None
None
0
255

Command

Description

monitor session

Starts a new ERSPAN, SPAN, or RSPAN session, adds or deletes interfaces
or VLANs to or from an existing session, filters ERSPAN, SPAN, or
RSPAN traffic to specific VLANs, or deletes a session.

monitor session type

Creates an ERSPAN source session number or enters the ERSPAN session
configuration mode for the session.

remote-span

Configures a VLAN as an RSPAN VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1005

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mpls l2transport vc

show mpls l2transport vc
To display the state of virtual circuits on a router, use the show mpls l2transport vc command.
show mpls l2transport vc [detail] [[vc-id ] | [vc-id-min] vc-id-max] | [summary]

Syntax Description

detail

(Optional) Displays the detailed information about the virtual circuits on a PE router.

vc-id

(Optional) Virtual-circuit ID.

vc-id-min

(Optional) Range of virtual-circuit IDs to be displayed; valid values are from 0 to
429467295.

vc-id-max (Optional) Range of virtual-circuit IDs; valid values are from 0 to 429467295.
summary (Optional) Displays a summary of the active virtual circuits on a PE router’s MPLS
interfaces.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the status of the virtual circuits on the switch:
Router# show mpls l2transport vc
Transport Client
VC
Local
VC ID
Intf
State
VC Label
4
Vl4
UP
23
101
Vl101
UP
24
Router#

Remote
VC Label
21
22

Tunnel
Label
77
77

This example shows the output of the summary keyword:
Router# show mpls l2transport vc summary
MPLS interface VC summary:
interface: Gi8/1, programmed imposition vcs: 1
interface: Gi8/3, programmed imposition vcs: 1
VC summary (active/non-active) by destination:
destination: 13.0.0.1, Number of locally configured vc(s): 2
Router#

This example shows the detailed information about the currently routed virtual circuits on the switch
interfaces:
Router# show mpls l2transport vc detail
VC ID: 111, Local Group ID: 5, Remote Group ID: 2 (VC is up)
Client Intf: Gi1/0.1 is up, Destination: 2.2.2.2, Peer LDP Ident: 2.2.2.2:0
Local VC Label: 17, Remote VC Label: 17, Tunnel Label: 16

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1006

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mpls l2transport vc

Outgoing Interface: Gi0/0, Next Hop: 12.1.1.3
Local MTU: 1500, Remote MTU: 1500
Remote interface description: GigabitEthernet0/0.1
Imposition: LC Programmed
Current Imposition/Last Disposition Slot: 1/255
Packet Totals(in/out): 0/0
Byte totals(in/out): 0/0
VC ID: 123, Local Group ID: 6, Remote Group ID: 3 (VC is up)
Client Intf: Gi1/0.2 is up, Destination: 2.2.2.2, Peer LDP Ident: 2.2.2.2:0
Local VC Label: 18, Remote VC Label: 19, Tunnel Label: 16
Outgoing Interface: Gi0/0, Next Hop: 12.1.1.3
Local MTU: 1500, Remote MTU: 1500
Remote interface description: GigabitEthernet0/0.2
Imposition: LC Programmed
Current Imposition/Last Disposition Slot: 1/255
Packet Totals(in/out): 0/0
Byte totals(in/out): 0/0
Router#

This example shows information about the detailed virtual circuit for a specified virtual circuit:
Router# show mpls l2transport vc 111 detail
VC ID: 111, Local Group ID: 5, Remote Group ID: 2 (VC is up)
Client Intf: Gi1/0.1 is up, Destination: 2.2.2.2, Peer LDP Ident: 2.2.2.2:0
Local VC Label: 17, Remote VC Label: 17, Tunnel Label: 16
Outgoing Interface: Gi0/0, Next Hop: 12.1.1.3
Local MTU: 1500, Remote MTU: 1500
Remote interface description: GigabitEthernet0/0.1
Imposition: LC Programmed
Current Imposition/Last Disposition Slot: 1/255
Packet Totals(in/out): 0/0
Byte totals(in/out): 0/0
Router#

Table 2-83 describes the fields that are shown in the example.
Table 2-83 show mpls l2transport vc Command Field Descriptions

Field

Description

Transport VC ID

Virtual-circuit identifier that is assigned to one of the interfaces on the switch.

Client Intf

Ingress or egress interface through which the Layer 2-VLAN packet travels.

VC State

Status of the virtual circuit. The status can be one of the following:
•

UP—The virtual circuit is in a state where it can carry traffic between the
two virtual-circuit end points. A virtual circuit is up when both imposition
and disposition interfaces are programmed.
The disposition interfaces are programmed if the virtual circuit has been
configured and the client interface is up.
The imposition interface is programmed if the disposition interface is
programmed and you have a remote virtual-circuit label and an IGP label.
The IGP label can be implicit null in a back-to-back configuration. (An IGP
label means that there is a LSP to the peer.)

•

DOWN—The VC is not ready to carry traffic between the two virtual-circuit
end points.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1007

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mpls l2transport vc

Table 2-83 show mpls l2transport vc Command Field Descriptions (continued)

Field

Description

Local VC Label

Virtual-circuit label that a router signals to its peer router, which is used by the
peer router during imposition. The local virtual-circuit label is a disposition label
and determines the egress interface of an arriving packet from the MPLS
backbone.

Remote VC
Label

Disposition virtual-circuit label of the remote peer router.

Tunnel Label

IGP label that is used to route the packet over the MPLS backbone to the
destination router with the egress interface.

VC ID

Virtual-circuit identifier that is assigned to one of the interfaces on the router.

Local Group ID

ID that is used to group virtual circuits locally. Ethernet over MPLS groups
virtual circuits by the hardware port, which is unique for each port on a router.

Remote Group ID ID that is used by the peer to group several virtual circuits.
Client

Ingress or egress interface through which the Layer 2-VLAN packet travels.

Destination

Destination that is specified for this virtual circuit. You specify the destination
IP address as part of the mpls l2transport route vc command.

Peer LDP ID

Targeted peer’s LDP IP address.

Outgoing
Interface

Egress interface of the virtual circuit.

Next Hop

IP address of the next hop.

Local MTU

Maximum transmission unit that is specified for the client interface.

Remote MTU

Maximum transmission unit that is specified for the remote router’s client
interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1008

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mpls l2transport vc

Table 2-83 show mpls l2transport vc Command Field Descriptions (continued)

Related Commands

Field

Description

Imposition

Status of the module.

LC programmed

LC not programmed.

Current
Imposition/
Last Disposition
Slot

Current imposition is the outgoing interface that is used for imposition.

Packet Totals
(in/out)

Total number of packets that are forwarded in each direction.

Byte Totals
(in/out)

Total number of bytes that are forwarded in each direction.

Command

Last disposition slot is the interface where packets for this virtual circuit arrive.

Description

mpls l2transport route Enables routing of Layer 2 packets over MPLS.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1009

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mpls platform

show mpls platform
To display platform-specific information, use the show mpls platform command.
show mpls platform {common | eompls | gbte-tunnels | reserved-vlans vlan vlan-id | {statistics
[reset]} | vpn-vlan-mapping}

Syntax Description

common

Displays the counters for shared code between the LAN and WAN
interfaces.

eompls

Displays information about the EoMPLS-enabled interface.

gbte-tunnels

Displays information about the MMLS GBTE tunnels.

reserved-vlans vlan
vlan-id

Displays RP-reserved VLAN show commands; valid values are from 0 to
4095.

statistics

Displays information about the RP-control plane statistics.

reset

(Optional) Resets the statistics counters.

vpn-vlan-mapping

Displays information about the VPN-to-VLAN mapping table.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the counters for shared code between the LAN and WAN interfaces:
Router# show mpls platform common
Common MPLS counters for LAN and WAN
------------------------------------No. of MPLS configured LAN interfaces
= 12
No. of cross-connect configured VLAN interfaces = 0
Router#

This example shows how to display the EoMPLS-enabled interface information:
Router# show mpls platform eompls
Interface
VLAN
GigabitEthernet 101
FastEthernet6/1 2022
Router#

This example shows how to display the GBTE-tunnels information:
Router# show mpls platform gbte-tunnels
To
From
InLbl
I/I/F kbps
Router#

Kbits

H/W Info

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1010

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mpls platform

This example shows how to display the RP-reserved VLAN show commands:
Router# show mpls platform reserved-vlans vlan 1005
Router#

Note

This example shows the output if there are no configured reserved VLANs.
This example shows how to display the information about the RP-control plane statistics:
Router# show mpls platform statistics
RP MPLS Control Plane Statistics:
==================================================
Reserved VLAN creates
0000000001
Reserved VLAN frees
0000000000
Reserved VLAN creation failures
0000000000
Aggregate Label adds
0000000001
Aggregate Label frees
0000000000
Aggregate Labels in Superman
0000000001
Feature Rsvd VLAN Reqs
0000000000
Feature Gen Rsvd VLAN Reqs
0000000000
Feature Rsvd VLAN Free Reqs
0000000000
EoMPLS VPN# Msgs
0000000009
EoMPLS VPN# Msg Failures
0000000000
EoMPLS VPN# Msg Rsp Failures
0000000000
EoMPLS VPN# Set Reqs
0000000010
EoMPLS VPN# Reset Reqs
0000000008
FIDB mallocs
0000000000
FIDB malloc failures
0000000000
FIDB frees
0000000000
EoMPLS Req mallocs
0000000018
EoMPLS Req malloc failures
0000000000
EoMPLS Req frees
0000000018
EoMPLS VPN# allocs
0000000010
EoMPLS VPN# frees
0000000008
EoMPLS VPN# alloc failures
0000000000
GB TE tunnel additions
0000000000
GB TE tunnel label resolves
0000000000
GB TE tunnel deletions
0000000000
GB TE tunnel changes
0000000000
GB TE tunnel heads skips
0000000000
gb_flow allocs
0000000000
gb_flow frees
0000000000
rsvp req creats
0000000000
rsvp req frees
0000000000
rsvp req malloc failures
0000000000
gb_flow malloc failures
0000000000
psb search failures
0000000000
GB TE tunnel deleton w/o gb_flow
0000000000
errors finding slot number
0000000000
Router#

This example shows how to reset the RP-control plane statistics counters:
Router# show mpls platform statistics reset
Resetting Const RP MPLS control plane software statistics ...
GB TE tunnel additions
0000000000
GB TE tunnel label resolves
0000000000
GB TE tunnel deletions
0000000000
GB TE tunnel changes
0000000000
GB TE tunnel heads skips
0000000000
gb_flow allocs
0000000000

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1011

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show mpls platform

gb_flow frees
rsvp req creats
rsvp req frees
rsvp req malloc failures
gb_flow malloc failures
psb search failures
GB TE tunnel deleton w/o gb_flow
errors finding slot number
Router#

0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000
0000000000

This example shows how to display information about the VPN-to-VLAN mapping table:
Router# show mpls platform vpn-vlan-mapping
VPN# Rsvd Vlan IDB Created Feature Has agg label
0
1025
Yes
No
No
1
0
No
No
Yes
Router#

In superman
No
Yes

EoM data
No
No

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1012

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show mpls ttfib

show mpls ttfib
To display information about the MPLS TTFIB table, use the show mpls ttfib command.
show mpls ttfib [{detail [hardware]} | {vrf instance [detail]}

Syntax Description

detail

(Optional) Displays detailed information.

hardware

(Optional) Displays detailed hardware information.

vrf instance

(Optional) Displays entries for a specified VPN Routing/Forwarding instance.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about the MPLS TTFIB table:
Router# show mpls ttfib
Local Outgoing
Packets Tag
Tag
Tag or VC
Switched
4116
21
0
34
0
45
0
4117
16
0
17
0
18
0
4118
21
0
56
0
4119
35
0
47
0

LTL
Dest.
Destination
Outgoing
Index Vlanid Mac Address
Interface
0xE0 1020
0000.0400.0000 PO4/1*
0x132 1019
00d0.040d.380a GE5/3
0xE3 4031
0000.0430.0000 PO4/4
0x132 1019
00d0.040d.380a GE5/3*
0xE0 1020
0000.0400.0000 PO4/1
0xE3 4031
0000.0430.0000 PO4/4
0xE0 1020
0000.0400.0000 PO4/1*
0xE3 4031
0000.0430.0000 PO4/4
0xE3 4031
0000.0430.0000 PO4/4*
0xE0 1020
0000.0400.0000 PO4/1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1013

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show pagp

show pagp
To display port-channel information, use the show pagp command.
show pagp [group-number] {counters | internal | neighbor | pgroup}

Syntax Description

group-number

(Optional) Channel-group number; valid values are a maximum of 64 values
from 1 to 282.

counters

Displays the traffic information.

internal

Displays the internal information.

neighbor

Displays the neighbor information.

pgroup

Displays the active port channels.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter any show pagp command to display the active port-channel information. To display the
nonactive information, enter the show pagp command with a group.
The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.

Examples

This example shows how to display information about the PAgP counters:
Router# show pagp counters
Information
Flush
Port
Sent
Recv
Sent
Recv
-------------------------------------Channel group: 1
Fa5/4
2660
2452
0
0
Fa5/5
2676
2453
0
0
Channel group: 2
Fa5/6
289
261
0
0
Fa5/7
290
261
0
0
Channel group: 1023
Fa5/9
0
0
0
0
Channel group: 1024
Fa5/8
0
0
0
0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1014

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show pagp

This example shows how to display internal PAgP information:
Router# show pagp 1 internal
Flags: S - Device is sending Slow hello.
A - Device is in Auto mode.
Timers: H - Hello timer is running.
S - Switching timer is running.

C - Device is in Consistent state.
Q - Quit timer is running.
I - Interface timer is running.

Channel group 1
Port
Fa5/4
Fa5/5
Router#

Flags State
SC
U6/S7
SC
U6/S7

Timers

Hello
Interval
30s
30s

Partner PAgP
Count
Priority
1
128
1
128

Learning
Method
Any
Any

This example shows how to display PAgP-neighbor information for all neighbors:
Router# show pagp neighbor
Flags: S - Device is sending Slow hello.
A - Device is in Auto mode.
Channel group 1 neighbors
Partner
Port
Name
Fa5/4
JAB031301
Fa5/5
JAB031301

Partner
Device ID
0050.0f10.230c
0050.0f10.230c

Partner
Port
2/45
2/46

Partner
Age Flags
2s SAC
27s SAC

Group
Cap.
2D
2D

Channel group 2 neighbors
Partner
Port
Name
Fa5/6
JAB031301
Fa5/7
JAB031301

Partner
Device ID
0050.0f10.230c
0050.0f10.230c

Partner
Port
2/47
2/48

Partner
Age Flags
10s SAC
11s SAC

Group
Cap.
2F
2F

Channel group 1023 neighbors
Partner
Port
Name

Partner
Device ID

Partner
Port

Age

Partner Group
Flags
Cap.

Partner
Device ID

Partner
Port

Age

Partner Group
Flags
Cap.

Channel group 1024 neighbors
Partner
Port
Name
Router#

Related Commands

C - Device is in Consistent state.
P - Device learns on physical port.

Command

Description

pagp learn-method

Learns the input interface of the incoming packets.

pagp port-priority

Selects a port in hot standby mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1015

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform

show platform
To display platform information, use the show platform command.
show platform {buffers | eeprom | fault | {hardware capacity} | {hardware pfc mode} |
internal-vlan | netint | {software ipv6-multicast connected} | {tech-support ipmulticast
group-ip-addr src-ip-addr} | tlb}

Syntax Description

buffers

Displays buffer-allocation information.

eeprom

Displays CPU EEPROM information.

fault

Displays the fault date.

hardware capacity

Displays the capacities and utilizations for hardware resources; see
the show platform hardware capacity command.

hardware pfc mode

Displays the type of installed PFC.

internal-vlan

Displays the internal VLAN.

netint

Displays the platform network-interrupt information.

software ipv6-multicast
connected

Displays all the IPv6 subnet ACL entries on the route processor; see
the show platform software ipv6-multicast command.

tech-support ipmulticast

Displays IP multicast-related information for TAC.

group-ip-addr

Group IP address.

src-ip-addr

Source IP address.

tlb

Displays information about the TLB register.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display buffer-allocation information:
Router# show platform buffers
Reg. set
Min
Max
TX
640
ABQ
640 16384
0
0
40
1
6715
8192
2
0
0
3
0
0
4
0
0
5
0
0
6
0
0
7
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1016

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform

Threshold = 8192
Vlan Sel Min Max
1019
1 6715 8192
Router#

Cnt
0

Rsvd
0

This example shows how to display CPU EEPROM information:
Router# show platform eeprom
PISA CPU IDPROM:
IDPROM image:
IDPROM image block #0:
hexadecimal contents of block:
00: AB AB 02 9C 13 5B 02 00 00
10: 73 63 6F 20 53 79 73 74 65
20: 00 00 57 53 2D 58 36 4B 2D
30: 43 33 00 00 00 00 53 41 44
40: 4C 00 00 00 00 00 00 00 00
50: 34 2D 30 37 00 00 00 00 00
60: 00 00 00 00 00 00 00 00 00
70: 00 00 00 00 02 BD 00 00 00
80: 00 03 00 01 00 01 00 02 03
90: 00 00 00 00 00 00 00 00 00

02
6D
53
30
00
00
00
00
E9
00

60
73
55
36
37
30
00
00
00
00

03
00
50
34
33
35
00
09
00
00

03
00
33
34
2D
00
00
00
00

E9
00
2D
30
37
00
00
05
00

43
00
50
31
34
00
00
00
00

69
00
46
57
30
00
00
01
00

.....[....`...Ci
sco Systems.....
..WS-X6K-SUP3-PF
C3....SAD064401W
L.........73-740
4-07......05....
................
................
................
............

block-signature = 0xABAB, block-version = 2,
block-length = 156, block-checksum = 4955
*** common-block ***
IDPROM capacity (bytes) = 512 IDPROM block-count = 2
FRU type = (0x6003,1001)
OEM String = 'Cisco Systems'
Product Number = 'WS-X6K-SUP3-PFC3'
Serial Number = 'SAD064401WL'
Manufacturing Assembly Number = '73-7404-07'
Manufacturing Assembly Revision = '05'
Hardware Revision = 0.701
Manufacturing bits = 0x0 Engineering bits = 0x0
SNMP OID = 9.5.1.3.1.1.2.1001
Power Consumption = 0 centiamperes
RMA failure code = 0-0-0-0
CLEI =
*** end of common block ***
IDPROM image block #1:
hexadecimal contents of block:
00: 60 03 02 67 0C 24 00 00 00
10: 00 00 00 00 00 00 00 51 00
20: 02 02 00 01 00 01 00 00 00
30: 00 00 00 00 00 00 00 00 00
40: 14 01 00 00 00 00 00 00 00
50: 00 00 81 81 81 81 80 80 80
60: 80 80 06 72 00 46 37

00
05
00
00
00
80

00
9A
00
00
00
80

00
3A
00
00
00
80

00
7E
00
00
00
80

00
9C
00
00
00
80

00
00
00
00
00
80

00
00
00
00
00
80

`..g.$..........
.......Q...:~...
................
................
................
................
...r.F7

block-signature = 0x6003, block-version = 2,
block-length = 103, block-checksum = 3108
*** linecard specific block ***
feature-bits =
00000000 00000000
hardware-changes-bits =
00000000 00000000
card index = 81
mac base = 0005.9A3A.7E9C
mac_len = 0
num_processors = 2
epld_num = 2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1017

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform

epld_versions = 0001 0001 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
0000
port numbers:
pair #0: type=14, count=01
pair #1: type=00, count=00
pair #2: type=00, count=00
pair #3: type=00, count=00
pair #4: type=00, count=00
pair #5: type=00, count=00
pair #6: type=00, count=00
pair #7: type=00, count=00
sram_size = 0
sensor_thresholds =
sensor #0: critical = -127 oC (sensor present but ignored), warning = -127 oC (sensor
present but ignored)
sensor #1: critical = -127 oC (sensor present but ignored), warning = -127 oC (sensor
present but ignored)
sensor #2: critical = -128 oC (sensor not present), warning = -128 oC (sensor not
present)
sensor #3: critical = -128 oC (sensor not present), warning = -128 oC (sensor not
present)
sensor #4: critical = -128 oC (sensor not present), warning = -128 oC (sensor not
present)
sensor #5: critical = -128 oC (sensor not present), warning = -128 oC (sensor not
present)
sensor #6: critical = -128 oC (sensor not present), warning = -128 oC (sensor not
present)
sensor #7: critical = -128 oC (sensor not present), warning = -128 oC (sensor not
present)
max_connector_power = 1650
cooling_requirement = 70
ambient_temp = 55
*** end of linecard specific block ***
Router#

This example shows how to display fault-date information:
Router# show platform fault
Fault History Buffer:
s72033_rp Software (s72033_rp-JSV-M), Experimental Version 12.2(20030331:071521)
[kkuttuva-CSCea55513-const2 120]
Compiled Mon 31-Mar-03 21:58 by kkuttuva
Signal = 10, Code = 0x1C, Uptime 00:01:14
$0 : 00000000, AT : 00000000, v0 : 00000000, v1 : 00000000
a0 : 00000000, a1 : 10050000, a2 : 00000000, a3 : 43F4B614
t0 : 50A19548, t1 : 10048000, t2 : 10040000, t3 : 10050000
t4 : 43F515A8, t5 : 43F515A4, t6 : 43F515A0, t7 : 43F5159C
s0 : 50A19548, s1 : 00000000, s2 : 50A19548, s3 : 10030100
s4 : 10030000, s5 : 41700000, s6 : 43F4B614, s7 : 41DB0000
t8 : 43F51614, t9 : 00000000, k0 : 5032D19C, k1 : 40231598
gp : 41F96960, sp : 50A19508, s8 : 422183A0, ra : 4027FB50
EPC : 4027FB84, SREG : 3401F103, Cause : 8000001C
Router#

This example shows how to display the PFC-operating mode:
Router# show platform hardware pfc mode
PFC operating mode : PFC3A
Router#

This example shows how to display platform net-interrupt information:
Router# show platform netint
Network IO Interrupt Throttling:
throttle count=0, timer count=0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1018

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform

active=0, configured=1
netint usec=3999, netint mask usec=800
inband_throttle_mask_hi = 0x0
inband_throttle_mask_lo = 0x800000
Router#

This example shows how to display TLB-register information:
Router# show platform tlb
Mistral revision 5
TLB entries : 42
Virt Address range
0x10000000:0x1001FFFF
0x10020000:0x1003FFFF
0x10040000:0x1005FFFF
0x10060000:0x1007FFFF
0x10080000:0x10087FFF
0x10088000:0x1008FFFF
0x18000000:0x1801FFFF
0x19000000:0x1901FFFF
0x1E000000:0x1E1FFFFF
0x1E880000:0x1E899FFF
0x1FC00000:0x1FC7FFFF
0x30000000:0x3001FFFF
0x40000000:0x407FFFFF
.
.
.
0x58000000:0x59FFFFFF
0x5A000000:0x5BFFFFFF
0x5C000000:0x5DFFFFFF
0x5E000000:0x5FFFFFFF
Router#

Phy Address range
Attributes
0x010000000:0x01001FFFF
CacheMode=2,
0x010020000:0x01003FFFF
CacheMode=2,
0x010040000:0x01005FFFF
CacheMode=2,
0x010060000:0x01007FFFF
CacheMode=2,
0x010080000:0x010087FFF
CacheMode=2,
0x010088000:0x01008FFFF
CacheMode=2,
0x010000000:0x01001FFFF
CacheMode=0,
0x010000000:0x01001FFFF
CacheMode=7,
0x01E000000:0x01E1FFFFF
CacheMode=2,
0x01E880000:0x01E899FFF
CacheMode=2,
0x01FC00000:0x01FC7FFFF
CacheMode=2,
0x070000000:0x07001FFFF
CacheMode=2,
0x000000000:0x0007FFFFF
CacheMode=3,

RW,
RW,
RW,
RW,
RW,
RW,
RW,
RW,
RW,
RW,
RO,
RW,
RO,

Valid
Valid
Valid
Valid
Valid
Valid
Valid
Valid
Valid
Valid
Valid
Valid
Valid

0x088000000:0x089FFFFFF
0x08A000000:0x08BFFFFFF
0x08C000000:0x08DFFFFFF
0x08E000000:0x08FFFFFFF

RW,
RW,
RW,
RW,

Valid
Valid
Valid
Valid

CacheMode=3,
CacheMode=3,
CacheMode=3,
CacheMode=3,

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1019

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform hardware capacity

show platform hardware capacity
To display the capacities and utilizations for the hardware resources, use the show platform hardware
capacity command.
show platform hardware capacity [resource-type]

Syntax Description

resource-type

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Hardware resource type; see the “Usage Guidelines” section for
the valid values.

The valid values for resource-type are as follows:
•

acl—Displays the capacities and utilizations for ACL/QoS TCAM resources.

•

cpu—Displays the capacities and utilizations for CPU resources.

•

eobc—Displays the capacities and utilizations for EOBC resources.

•

flash—Displays the capacities and utilizations for flash/NVRAM resources.

•

forwarding—Displays the capacities and utilizations for Layer 2 and Layer 3 forwarding resources.

•

interface—Displays the capacities and utilizations for interface resources.

•

monitor—Displays the capacities and utilizations for SPAN resources.

•

multicast—Displays the capacities and utilizations for Layer 3 multicast resources.

•

netflow—Displays the capacities and utilizations for NetFlow resources.

•

pfc—Displays the capacities and utilizations for all the PFC resources including Layer 2 and
Layer 3 forwarding, NetFlow, CPU rate limiters, and ACL/QoS TCAM resources.

•

power—Displays the capacities and utilizations for power resources.

•

qos—Displays the capacities and utilizations for QoS policer resources.

•

rate-limiter—Displays the capacities and utilizations for CPU rate limiter resources.

•

system—Displays the capacities and utilizations for system resources.

•

vlan—Displays the capacities and utilizations for VLAN resources.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1020

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform hardware capacity

The show platform hardware capacity cpu command displays the following information:
•

CPU utilization for the last 5 seconds (busy time and interrupt time), the percentage of the last
1-minute average busy time, and the percentage of the last 5-minute average busy time.

•

Processor memory total available bytes, used bytes, and percentage used.

•

I/O memory total available bytes, used bytes, and percentage used.

The show platform hardware capacity eobc command displays the following information:
•

Transmit and receive rate

•

Packets received and packets sent

•

Dropped received packets and dropped transmitted packets

The show platform hardware capacity forwarding command displays the following information:
•

The total available entries, used entries, and used percentage for the MAC tables.

•

The total available entries, used entries, and used percentage for the FIB TCAM tables. The display
is done per protocol base.

•

The total available entries, used entries, and used percentage for the adjacency tables. The display
is done for each region in which the adjacency table is divided.

•

The created entries, failures, and resource usage percentage for the NetFlow TCAM and ICAM
tables.

•

The total available entries and mask, used entries and mask, reserved entries and mask, and entries
and mask used percentage for the ACL/QoS TCAM tables. The output displays the available, used,
reserved, and used percentage of the labels. The output displays the resource of other hardware
resources that are related to the ACL/QoS TCAMs (such as available, used, reserved, and used
percentage of the LOU, ANDOR, and ORAND).

•

The available, used, reserved, and used percentage for the CPU rate limiters.

The show platform hardware capacity interface command displays the following information:
•

Tx/Rx drops—Displays the sum of transmit and receive drop counters on each online module
(aggregate for all ports) and provides the port number that has the highest drop count on the module.

•

Tx/Rx per port buffer size—Summarizes the port-buffer size on a per-module basis for modules
where there is a consistent buffer size across the module.

The show platform hardware capacity monitor command displays the following SPAN information:
•

The maximum local SPAN sessions, maximum RSPAN sessions, maximum ERSPAN sessions, and
maximum service module sessions.

•

The local SPAN sessions used/available, RSPAN sessions used/available, ERSPAN sessions
used/available, and service module sessions used/available.

The show platform hardware capacity multicast command displays the following information:
•

Multicast Replication Mode: ingress and egress IPv4 and IPv6 modes.

•

The MET table usage that indicates the total used and the percentage used for each module in the
system.

•

The bidirectional PIM DF table usage that indicates the total used and the percentage used.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1021

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform hardware capacity

The show platform hardware capacity system command displays the following information:
•

PFC operating mode (PFC Version)

•

Supervisor redundancy mode (RPR, SSO, none, and so forth)

•

Module-specific switching information, including the following information:
– Part number (WS-SUP720-BASE, WS-X6548-RJ-45, and so forth)
– Series (supervisor engine)
– CEF Mode (central CEF, dCEF)

The show platform hardware capacity vlan command displays the following VLAN information:

Examples

•

Total VLANs

•

VTP VLANs that are used

•

External VLANs that are used

•

Internal VLANs that are used

•

Free VLANs

This example shows how to display CPU capacity and utilization information for the route processor,
the switch processor, and the LAN module in the Catalyst 6500 series switch:
Router# show platform hardware capacity cpu
CPU Resources
CPU utilization: Module
5 seconds
1 RP
0% / 0%
1 SP
5% / 0%
7
69% / 0%
8
78% / 0%
Processor memory: Module
Bytes:
Total
1 RP
176730048
1 SP
192825092
7
195111584
8
195111584
I/O memory: Module
Bytes:
Total
1 RP
35651584
1 SP
35651584
7
35651584
8
35651584
Router#

1 minute
1%
5%
69%
74%
Used
51774704
51978936
35769704
35798632
Used
12226672
9747952
9616816
9616816

5 minutes
1%
4%
69%
74%
%Used
29%
27%
18%
18%
%Used
34%
27%
27%
27%

This example shows how to display EOBC-related statistics for the route processor, the switch
processor:
Router# show platform hardware capacity eobc
EOBC Resources
Module
Packets/sec
Total packets
1 RP
Rx:
61
108982
Tx:
37
77298
1 SP
Rx:
34
101627
Tx:
39
115417
7
Rx:
5
10358
Tx:
8
18543
8
Rx:
5
12130
Tx:
10
20317
Router#

Dropped packets
0
0
0
0
0
0
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1022

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform hardware capacity

This example shows how to display information about the total capacity, the bytes used, and the
percentage that is used for the flash/NVRAM resources present in the system:
Router# show platform hardware capacity flash
Flash/NVRAM Resources
Usage: Module Device
Bytes:
Total
1 RP bootflash:
31981568
1 SP disk0:
128577536
1 SP sup-bootflash:
31981568
1 SP const_nvram:
129004
1 SP nvram:
391160
Router#

Used
15688048
105621504
29700644
856
22065

%Used
49%
82%
93%
1%
6%

This example shows how to display the capacity and utilization of the EARLs present in the system:
Router# show platform hardware capacity forwarding
L2 Forwarding Resources
MAC Table usage:
Module Collisions Total
6
0 65536
VPN CAM usage:

Total
512

L3 Forwarding Resources
FIB TCAM usage:
72 bits (IPv4, MPLS, EoM)
144 bits (IP mcast, IPv6)
detail:

Total
196608
32768

Protocol
IPv4
MPLS
EoM
IPv6
IPv4 mcast
IPv6 mcast

Adjacency usage:

Forwarding engine load:
Module
6
Netflow Resources
TCAM utilization:
ICAM utilization:

Total
1048576

pps
8

Module
6
Module
6

Flowmasks:
Mask#
IPv4:
0
IPv4:
1
IPv4:
2
IPv4:
3
IPv6:
IPv6:
IPv6:
IPv6:
CPU Rate Limiters Resources
Rate limiters:
Layer 3
Layer 2

peak-pps
1972

0
1
2
3

Used
11

%Used
1%

Used
0

%Used
0%

Used
36
7

%Used
1%
1%

Used
36
0
0

%Used
1%
0%
0%

4
3
0

1%
1%
0%

Used
175

%Used
1%

peak-time
02:02:17 UTC Thu Apr 21 2005

Created
1
Created
0

Failed
0
Failed
0

%Used
0%
%Used
0%

Type
Features
reserved
none
Intf FulNAT_INGRESS NAT_EGRESS FM_GUARDIAN
unused
none
reserved
none
reserved
unused
unused
reserved

Total
9
4

none
none
none
none

Used
4
2

Reserved
1
2

%Used
44%
50%

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1023

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform hardware capacity

ACL/QoS TCAM Resources
Key: ACLent - ACL TCAM entries, ACLmsk - ACL TCAM masks, AND - ANDOR,
QoSent - QoS TCAM entries, QOSmsk - QoS TCAM masks, OR - ORAND,
Lbl-in - ingress label, Lbl-eg - egress label, LOUsrc - LOU source,
LOUdst - LOU destination, ADJ - ACL adjacency
Module ACLent ACLmsk QoSent QoSmsk Lbl-in Lbl-eg LOUsrc LOUdst
6
1%
1%
1%
1%
1%
1%
0%
0%

AND
0%

OR
0%

ADJ
1%

Router#

This example shows how to display the interface resources:
Router# show platform hardware capacity interface
Interface Resources
Interface drops:
Module
Total drops:
Tx
Rx
9
0
2
Interface buffer sizes:
Module
1
5
Router#

Bytes:

Highest drop port:

Tx buffer
12345
12345

Tx
0

Rx
48

Rx buffer
12345
12345

This example shows how to display SPAN information:
Router# show platform hardware capacity monitor
SPAN Resources
Source sessions: 2 maximum, 0 used
Type
Used
Local
0
RSPAN source
0
ERSPAN source
0
Service module
0
Destination sessions: 64 maximum, 0 used
Type
Used
RSPAN destination
0
ERSPAN destination (max 24)
0
Router#

This example shows how to display the capacity and utilization of resources for Layer 3 multicast
functionality:
Router# show platform hardware capacity multicast
L3 Multicast Resources
IPv4 replication mode: ingress
IPv6 replication mode: ingress
Bi-directional PIM Designated Forwarder Table usage: 4 total, 0 (0%) used
Replication capability: Module
IPv4
IPv6
5
egress
egress
9
ingress
ingress
MET table Entries: Module
Total
Used
%Used
5
65526
6
0%
Router#

This example shows how to display information about the system power capacities and utilizations:
Router# show platform hardware capacity power
Power Resources
Power supply redundancy mode: administratively combined
operationally combined
System power: 1922W, 0W (0%) inline, 1289W (67%) total allocated
Powered devices: 0 total
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1024

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform hardware capacity

This example shows how to display the capacity and utilization of QoS policer resources per EARL in
the Catalyst 6500 series switch:
Router# show platform hardware capacity qos
QoS Policer Resources
Aggregate policers: Module
1
5
Microflow policer configurations: Module
1
5
Router#

Total
1024
1024
Total
64
64

Used
102
1
Used
32
1

%Used
10%
1%
%Used
50%
1%

This example shows how to display information about the key system resources:
Router# show platform hardware capacity systems
System Resources
PFC operating mode: PFC3BXL
Supervisor redundancy mode: administratively rpr-plus, operationally rpr-plus
Switching Resources: Module
Part number
Series
CEF mode
5
WS-SUP720-BASE
supervisor
CEF
9
WS-X6548-RJ-45
CEF256
CEF
Router#

This example shows how to display VLAN information:
Router# show platform hardware capacity vlan
VLAN Resources
VLANs: 4094 total, 10 VTP, 0 extended, 0 internal, 4084 free
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1025

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform pisa np

show platform pisa np
To display Supervisor Engine 32 PISA-specific information, use the show platform pisa np command.
show platform pisa np counter

Syntax Description

counter

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

Counter information; see the “Usage Guidelines section for the list of valid
values.

The valid values for the counter argument are as follows:
•

me num counters—Displays the microengine information; valid values are from 0 to 15.

•

acl counters—Displays the ACL counter information.

•

all counters—Displays all Supervisor Engine 32 PISA-specific counters.

•

all pps counters—Displays the packets per second for all Supervisor Engine 32 PISA-specific
counters.

•

fpm counters—Displays the flexible packet matching (FPM) counter information.

•

mqc counters—Displays the modular QoS CLI information.

•

nbar counters—Displays the network-based application recognition (NBAR) counter information.

•

rx counters—Displays the receive engine counter information.

•

tx counters—Displays the transmit engine counter information.

This example shows how to display the ACL counter information:
Router# show platform pisa np acl counters
ACL Statistics
-------------ACL Pkts Received
ACL Pkts Forwarded
ACL Unknown Msg
Router#

: 0
: 0
: 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1026

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform pisa np

This example shows how to display all Supervisor Engine 32 PISA-specific counters:
Router# show platform pisa np all counters
NP ENGINE STATISTICS:
-------------------RX Statistics
------------Idle: 0
Frames Received: 162
Control Frames Received: 0
Forward RBUF: 0
Forward RBUF+DRAM: 162
Forward Buffered: 0
Post stalls: 0
Error: 0
Error(bad sop): 0
Error(missing sop): 0
Error(data buf alloc fail): 0
Error(control buf alloc fail):
Error(packet too big): 0
Error(packet length mismatch):
NBAR Statistics
--------------NBAR Pkts Received :
NBAR Pkts Classified:
PD
Pkts Received :
NBAR Pkts Out
:
NBAR Debug 0
:
NBAR Debug 1
:
NBAR Debug 2
:
NBAR Debug 3
:

0
0

0
0
0
0
0
0
0
0

FPM Statistics
-------------FPM Config Stamp
FPM Pkts Received
FPM Pkts Forwarded
FPM Pkts Dropped
FPM Unknown Msg
FPM Error
FPM Cache Misses

:
:
:
:
:
:
:

ACL Statistics
-------------ACL Pkts Received
ACL Pkts Forwarded
ACL Unknown Msg

: 0
: 0
: 0

MQC Statistics
-------------MQC Pkts Received
:
MQC Pkts Transmited :
MQC Unknown
:
MQC Error
:
MQC Pkts marked DSCP :
MQC Policer Conformed:
MQC Policer Exceeded :
MQC Pkts Dropped
:

0
0
0
0
0
0
0

0
0
0
0
0
0
0
0

TX Statistics
------------Errors: 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1027

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform pisa np

Fastpath RBUFs received: 162
Fastpath pkt received: 0
FastTX receive: 0
SlowTX receive: 162
Packets transmitted (loopback): 162
Packets transmit to hyperion: 162
Packets punt to CP: 0
Packets punt to Nitrox: 0
Packets forward to CM: 0
Packets forward to TCP: 0
Packets forward to Reassembly: 0
Packets forward to Fragmentation: 0
Packets forward to XScale: 162
Packets IPCP forward: 0
WARN: TX Packet too small: 0
DROP: Packet too big error: 0
DROP: Connection Route: 0
DROP: Connection Miss: 0
DROP: Bad connection route: 162
DROP: RX Interface miss: 0
DROP: Out of buffers: 0
DROP: Unknown Msg received: 0
DROP: Bandwidth rate policed: 0
Close request Sent: 0
Stubs Statistics for ME: 2
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 3
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 4
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 5
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1028

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform pisa np

SCRATCH Fail Count:
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0

0

Stubs Statistics for ME: 6
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 7
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 8
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 9
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 10
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 11
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1029

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform pisa np

SRAM Fail Count: 0
SCRATCH Pass Count:
SCRATCH Fail Count:
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0

0
0

Stubs Statistics for ME: 12
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 13
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 14
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Stubs Statistics for ME: 15
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0

This example shows how to display the packets per second for all Supervisor Engine 32 PISA-specific
counters:
Router# show platform pisa np all pps
Throughput in packets-per-sec (pps) within 5 secs interval:
----------------------------------------------------------Rx
Ingress PPS 0
Rx
Egress PPS 0
NBAR Ingress PPS 0
NBAR Egress PPS 0
FPM Ingress PPS 0
FPM Egress PPS 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1030

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform pisa np

ACL Ingress
ACL Egress
MQC Ingress
MQC Egress
Tx
Ingress
Tx
Egress
Router#

PPS
PPS
PPS
PPS
PPS
PPS

0
0
0
0
0
0

This example shows how to display the FPM counter information:
Router# show platform pisa np fpm counters
FPM Statistics
-------------FPM Config Stamp
FPM Pkts Received
FPM Pkts Forwarded
FPM Pkts Dropped
FPM Unknown Msg
FPM Error
FPM Cache Misses
Router#

:
:
:
:
:
:
:

0
0
0
0
0
0
0

This example shows how to display the ME counter information for a specific ME:
Router# show platform pisa np me 0 counters
Stubs Statistics for ME: 0
DRAM Pass Count: 0
DRAM Fail Count: 0
SRAM Pass Count: 0
SRAM Fail Count: 0
SCRATCH Pass Count: 0
SCRATCH Fail Count: 0
LMEM Pass Count: 0
LMEM Fail Count: 0
ME Run Count: 0
Router#

This example shows how to display the the modular QoS CLI information:
Router# show platform pisa np mqc counters
MQC Statistics
-------------MQC Pkts Received
:
MQC Pkts Transmited :
MQC Unknown
:
MQC Error
:
MQC Pkts marked DSCP :
MQC Policer Conformed:
MQC Policer Exceeded :
MQC Pkts Dropped
:
Router#

0
0
0
0
0
0
0
0

This example shows how to display the network-based application recognition counter information:
Router# show platform pisa np nbar counters
NBAR Statistics
--------------NBAR Pkts Received :
NBAR Pkts Classified:
PD
Pkts Received :
NBAR Pkts Out
:

0
0
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1031

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform pisa np

NBAR
NBAR
NBAR
NBAR

Debug
Debug
Debug
Debug

0
1
2
3

:
:
:
:

0
0
0
0

This example shows how to display the receive engine counter information:
Router# show platform pisa np rx counters
RX Statistics
------------Idle: 0
Frames Received: 159
Control Frames Received: 0
Forward RBUF: 0
Forward RBUF+DRAM: 159
Forward Buffered: 0
Post stalls: 0
Error: 0
Error(bad sop): 0
Error(missing sop): 0
Error(data buf alloc fail): 0
Error(control buf alloc fail):
Error(packet too big): 0
Error(packet length mismatch):
Router#

0
0

This example shows how to display the transmit engine counter information:
Router# show platform pisa np tx counters
TX Statistics
------------Errors: 0
Fastpath RBUFs received: 159
Fastpath pkt received: 0
FastTX receive: 0
SlowTX receive: 159
Packets transmitted (loopback): 159
Packets transmit to hyperion: 159
Packets punt to CP: 0
Packets punt to Nitrox: 0
Packets forward to CM: 0
Packets forward to TCP: 0
Packets forward to Reassembly: 0
Packets forward to Fragmentation: 0
Packets forward to XScale: 159
Packets IPCP forward: 0
WARN: TX Packet too small: 0
DROP: Packet too big error: 0
DROP: Connection Route: 0
DROP: Connection Miss: 0
DROP: Bad connection route: 159
DROP: RX Interface miss: 0
DROP: Out of buffers: 0
DROP: Unknown Msg received: 0
DROP: Bandwidth rate policed: 0
Close request Sent: 0
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1032

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform software ipv6-multicast

show platform software ipv6-multicast
To display information about the platform software IPv6 multicast, use the show platform software
ipv6-multicast command.
show platform software ipv6-multicast {acl-exception | acl-table | capability | connected |
shared-adjacencies | statistics | summary}

Syntax Description

acl-exception

Displays the IPv6-multicast entries that were switched in the software due
to ACL exceptions.

acl-table

Displays the IPv6-multicast ACL request table entries.

capability

Displays the hardware capabilities.

connected

Displays the IPv6-multicast subnet/connected hardware entries.

shared-adjacencies

Displays the IPv6-multicast shared adjacencies.

statistics

Displays the internal software-based statistics.

summary

Displays the IPv6-multicast hardware-shortcut count.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the IPv6-hardware capabilities:
Router# show platform software ipv6-multicast capability
Hardware switching for ipv6 is Enabled
(S,G) forwarding for ipv6 supported using Netflow
(*,G) bridging for ipv6 is supported using Fib
Directly-connected entries for IPv6 is supported using ACL-TCAM.
Current System HW Replication Mode : Egress
Audo-detection of Replication Mode : ON
Slot Replication-Capability Replication-Mode
2 Egress
Egress
5 Egress
Egress
Router#

This example shows how to display the IPv6-multicast subnet/connected-hardware entries:
Router# show platform software ipv6-multicast connected
IPv6 Multicast Subnet entries
Flags : H - Installed in ACL-TCAM
X - Not installed in ACL-TCAM due to
label-full exception

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1033

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show platform software ipv6-multicast

Interface: Vlan40 [ H ]
S:40::1 G:FF00::
S:0:5000::2 G:FF00::
S:5000::2 G:FF00::
Interface: Vlan30 [ H ]
S:30::1 G:FF00::
Interface: Vlan20 [ H ]
S:20::1 G:FF00::
Interface: Vlan10 [ H ]
S:10::1 G:FF00::
Router#

This example shows how to display the IPv6-multicast shared adjacencies:
Router# show platform software ipv6-multicast shared-adjacencies
---- SLOT [7] ---Shared IPv6 Mcast Adjacencies
----------------------------Subnet bridge adjacency
Control bridge adjacency
StarG_M bridge adjacency
S_G bridge adjacency
Default drop adjacency
StarG (spt == INF) adjacency
StarG (spt != INF) adjacency
Router#

Index Packets
Bytes
------ ------------- -----------------0x7F802 0
0
0x7
0
0
0x8
0
0
0x9
0
0
0xA
0
0
0xB
0
0
0xC
0
0

This example shows how to display the IPv6-multicast statistics information:
Router# show platform software ipv6-multicast statistics
IPv6 Multicast HW-switching Status
IPv6 Multicast (*,G) HW-switching Status
IPv6 Multicast Subnet-entries Status
Default MFIB IPv6-table
(S,G,C) flowmask index
(*,G,C) flowmask index

:
:
:
:
:
:

Enabled
Disabled
Enabled
0x5108F770
3
65535

General Counters
--------------------------------------------------+------+
Mfib-hw-entries count
0
Mfib-add count
4
Mfib-modify count
2
Mfib-delete count
2
Mfib-NP-entries count
0
Mfib-D-entries count
0
Mfib-IC-entries count
0
Error Counters
--------------------------------------------------+------+
ACL flowmask err count
0
ACL TCAM exptn count
0
ACL renable count
0
Idb Null error
0
Router#

This example shows how to display the IPv6-multicast hardware shortcut count:
Router# show platform software ipv6-multicast summary
IPv6 Multicast Netflow SC summary on Slot[7]:
Shortcut Type
Shortcut count
---------------------------+-------------(S, G)
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1034

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show platform software ipv6-multicast

IPv6 Multicast FIB SC summary on Slot[7]:
Shortcut Type
Shortcut count
---------------------------+-------------(*, G/128)
0
(*, G/m)
0
Router#

Related Commands

Command

Description

ipv6 mfib
hardware-switching

Configures hardware switching for IPv6 multicast packets on a global basis.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1035

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show policy-map

show policy-map
To display information about the policy map, use the show policy-map command.
show policy-map [policy-map-name]

Syntax Description

policy-map-name

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Name of the policy map.

This example shows how to display information about all policy maps:
Router# show policy-map
Policy Map simple
Policy Map max-pol-ipp5
class ipp5
class ipp5
police flow 10000000 10000 conform-action set-prec-transmit 6 exceed-action
policed-dscp-transmit
trust precedence
police 2000000000 2000000 2000000 co
nform-action set-prec-transmit 6exceed-action policed-dscp-transmit
Router#

This example shows how to display information for a specific policy map:
Router# show policy-map max-pol-ipp5
Policy Map max-pol-ipp5
class ipp5
class ipp5
police flow 10000000 10000 conform-action set-prec-transmit 6 exceed-action
policed-dscp-transmit
trust precedence
police 2000000000 2000000 2000000 co
nform-action set-prec-transmit 6exceed-action policed-dscp-transmit
Router#

Related Commands

Command

Description

class-map

Accesses the QoS class-map configuration mode to configure QoS class
maps.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1036

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show policy-map

Command

Description

show class-map

Displays class-map information.

show policy-map
interface

Displays the statistics and the configurations of the input and output
policies that are attached to an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1037

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show policy-map control-plane

show policy-map control-plane
To display the configuration either of a class or of all classes for the policy map of a control plane, use
the show policy-map control-plane command.
show policy-map control-plane [all] [input [class class-name] | output | [class class-name]]

Syntax Description

all

(Optional) Displays information for all control plane interfaces.

input

(Optional) Displays statistics for the attached input policy.

class class-name

(Optional) Displays the name of the class.

output

(Optional) Displays statistics for the attached output policy.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command Historyv
Usage Guidelines

The show policy-map control-plane command displays information for aggregate control-plane
services that control the number or rate of packets that are going to the process level.

Examples

This example shows that the policy map TEST is associated with the control plane. This policy map
polices traffic that matches the class-map TEST, while allowing all other traffic (that matches the
class-map class-default) to go through as is. Table 2-84 describes the fields shown in the display.
Router# show policy-map control-plane
Control Plane
Service-policy input:TEST
Class-map:TEST (match-all)
20 packets, 11280 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match:access-group 101
police:
8000 bps, 1500 limit, 1500 extended limit
conformed 15 packets, 6210 bytes; action:transmit
exceeded 5 packets, 5070 bytes; action:drop
violated 0 packets, 0 bytes; action:drop
conformed 0 bps, exceed 0 bps, violate 0 bps
Class-map:class-default (match-any)
105325 packets, 11415151 bytes
5 minute offered rate 0 bps, drop rate 0 bps
Match:any

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1038

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show policy-map control-plane

Table 2-84 show policy-map control-plane Field Descriptions

Field
Description
Fields Associated with Classes or Service Policies
Service-policy input

Name of the input service policy that is applied to the control
plane. (If configured, this field will also show the output
service policy.)

Class-map

Class of traffic being displayed. Traffic is displayed for each
configured class. The choice for implementing class matches
(for example, match-all or match-any) can also appear next to
the traffic class.

offered rate

Rate, in kbps, at which packets are coming into the class.

drop rate

Rate, in kbps, at which packets are dropped from the class.
The drop rate is calculated by subtracting the number of
sucessfully transmitted packets from the offered rate.

Match

Match criteria for the specified class of traffic.
Note

For more information about the variety of match
criteria options available, refer to the chapter
“Configuring the Modular Quality of Service
Command-Line Interface” in the Cisco IOS Quality
of Service Solutions Configuration Guide.

Fields Associated with Traffic Policing

Related Commands

police

police command has been configured to enable traffic
policing.

conformed

Action to be taken on packets conforming to a specified rate;
displays the number of packets and bytes on which the action
was taken.

exceeded

Action to be taken on packets exceeding a specified rate;
displays the number of packets and bytes on which the action
was taken.

violated

Action to be taken on packets violating a specified rate;
displays the number of packets and bytes on which the action
was taken.

Command

Description

control-plane

Enters control-plane configuration mode.

service-policy
(control-plane)

Attaches a policy map to a control plane for aggregate control plane
services.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1039

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show policy-map interface

show policy-map interface
To display the statistics and the configurations of the input and output policies that are attached to an
interface, use the show policy-map interface command.
show policy-map interface [{interface interface-number} | {null interface-number} | {vlan
vlan-id}] [input | output]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

input

(Optional) Specifies the input policies only.

output

(Optional) Specifies the output policies only.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The output keyword is not supported.
Catalyst 6500 series switches that are configured with a Supervisor Engine 32 PISA display byte
counters.
The output does not display policed-counter information; 0 is displayed in its place (for example,
0 packets, 0 bytes). To view dropped and forwarded policed-counter information, enter the show mls
qos ip command.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1040

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show policy-map interface

Examples

This example shows how to display the statistics and the configurations of all the input and output
policies that are attached to an interface:
Router# show policy-map interface
FastEthernet5/36
service-policy input: max-pol-ipp5
class-map: ipp5 (match-all)
0 packets, 0 bytes
5 minute rate 0 bps
match: ip precedence 5
class ipp5
police 2000000000 2000000 conform-action set-prec-transmit 6 exceed-action p
policed-dscp-transmit
Router#

This example shows how to display the input-policy statistics and the configurations for a specific
interface:
Router# show policy-map interface fastethernet 5/36 input
FastEthernet5/36
service-policy input: max-pol-ipp5
class-map: ipp5 (match-all)
0 packets, 0 bytes
5 minute rate 0 bps
match: ip precedence 5
class ipp5
police 2000000000 2000000 conform-action set-prec-transmit 6 exceed-action p
policed-dscp-transmit
Router#

Related Commands

Command

Description

class-map

Accesses the QoS class map configuration mode to configure QoS class
maps.

policy-map

Accesses QoS policy-map configuration mode to configure the QoS policy
map.

show class-map

Displays class-map information.

show mls qos

Displays MLS QoS information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1041

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show port-security

show port-security
To display information about the port-security setting, use the show port-security command.
show port-security [interface interface interface-number]
show port-security [interface interface interface-number] {address | vlan}

Syntax Description

interface interface

(Optional) Specifies the interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, and tengigabitethernet.

address

Displays all the secure MAC addresses that are configured on all the switch
interfaces or on a specified interface with aging information for each address.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The vlan keyword is supported on trunk ports only and displays per-VLAN maximums set on a trunk
port.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Examples

This example shows the output from the show port-security command when you do not enter any
options:
Router# show port-security
Secure Port
MaxSecureAddr CurrentAddr SecurityViolation Security
Action
(Count)
(Count)
(Count)
---------------------------------------------------------------------------Fa5/1
11
11
0
Shutdown
Fa5/5
15
5
0
Restrict
Fa5/11
5
4
0
Protect
---------------------------------------------------------------------------Total Addresses in System: 21
Max Addresses limit in System: 128
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1042

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show port-security

This example shows how to display port-security information for a specified interface:
Router# show port-security interface fastethernet 5/1
Port Security: Enabled
Port status: SecureUp
Violation mode: Shutdown
Maximum MAC Addresses: 11
Total MAC Addresses: 11
Configured MAC Addresses: 3
Aging time: 20 mins
Aging type: Inactivity
SecureStatic address aging: Enabled
Security Violation count: 0
Router#

This example show how to display all the secure MAC addresses that are configured on all the switch
interfaces or on a specified interface with aging information for each address:
Router# show port-security address
Default maximum: 10
VLAN Maximum Current
1
5
3
2
4
4
3
6
4
Router#

Related Commands

Command

Description

clear port-security

Deletes configured secure MAC addresses and sticky MAC addresses
from the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1043

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show power

show power
To display information about the power status, use the show power command.
show power [{available | redundancy-mode | {status {all | {module num}}} | {power-supply
number} | total | used | inline [{interface number} | {module num}}]]

Syntax Description

available

(Optional) Displays the available system power (margin).

redundancy-mode (Optional) Displays the power-supply redundancy mode.
status

(Optional) Displays the power status.

all

Displays all the FRU types.

module num

Displays the power status for a specific module.

power-supply
number

Displays the power status for a specific power supply; valid values are 1 and 2.

total

(Optional) Displays the total power that is available from the power supplies.

used

(Optional) Displays the total power that is budgeted for powered-on items.

inline

(Optional) Displays the inline power status.

interface number

(Optional) Specifies the interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, null, port-channel, and
vlan. See the “Usage Guidelines” section for additional information.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Regardless of the type of supervisor engine you are using, the Catalyst 6500 series switch allocates
power to the second supervisor engine slot in anticipation of a redundant supervisor engine
configuration. You cannot turn off this function.
If you do not install a second supervisor engine, we recommend that you put the highest
power-consuming module into the second supervisor engine slot to get the maximum power utilization.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1044

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show power

Valid values for vlan-id are from 1 to 4094.
The Inline power field in the show power output displays the inline power that is consumed by the
modules. For example, this example shows that module 9 has consumed 0.300 A of inline power:
Inline power
module

Examples

#
9

current
0.300A

This example shows how to display the available system power:
Router> show power available
system power available = 20.470A
Router>

This example shows how to display power-supply redundancy mode:
Router# show power redundancy-mode
system power redundancy mode = redundant
Router#

This command shows how to display the system-power status:
Router> show
system power
system power
system power
system power

power
redundancy mode = combined
total =
3984.12 Watts (94.86 Amps @ 42V)
used =
1104.18 Watts (26.29 Amps @ 42V)
available = 2879.94 Watts (68.57 Amps @ 42V)
Power-Capacity PS-Fan Output Oper
PS
Type
Watts
A @42V Status Status State
---- ------------------ ------- ------ ------ ------ ----1
WS-CAC-3000W
2830.80 67.40 OK
OK
on
2
WS-CAC-1300W
1153.32 27.46 OK
OK
on
Note: PS2 capacity is limited to 2940.00 Watts (70.00 Amps @ 42V)
when PS1 is not present
Pwr-Allocated Oper
Fan Type
Watts
A @42V State
---- ------------------ ------- ------ ----1
FAN-MOD-9
241.50 5.75 OK
2
241.50 5.75 failed
Pwr-Requested Pwr-Allocated Admin Oper
Slot Card-Type
Watts
A @42V Watts
A @42V State State
---- ------------------ ------- ------ ------- ------ ----- ----1
WS-X6K-SUP2-2GE
145.32 3.46
145.32 3.46 on
on
2
145.32 3.46 3
WS-X6516-GBIC
118.02 2.81
118.02 2.81 on
on
5
WS-C6500-SFM
117.18 2.79
117.18 2.79 on
on
7
WS-X6516A-GBIC
214.20 5.10
on
off (insuff cooling capacity)
8
WS-X6516-GE-TX
178.50 4.25
178.50 4.25 on
on
9
WS-X6816-GBIC
733.98 17.48
on
off (connector rating
exceeded)
Router>

This example shows how to display the power status for all FRU types:
Router# show power status all
FRU-type
#
current
power-supply
1
27.460A
module
1
4.300A
module
2
4.300A
module
5
2.690A
Router#

admin state oper
on
on
on
on
(reserved)
on
on

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1045

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show power

This example shows how to display the power status for a specific module:
Router# show power status module 1
FRU-type
#
current
admin state oper
module
1
-4.300A
on
on
Router#

This example shows how to display the power status for a specific power supply:
Router# show power status power-supply 1
FRU-type
#
current
admin state oper
power-supply
1
27.460A
on
on
Router#

This example displays information about the high-capacity power supplies:
Router# show power status power-supply
Power-Capacity
PS
Type
Watts
A @42V
---- ------------------ ------- -----1
WS-CAC-6000W
2672.04 63.62
2
WS-CAC-9000W-E
2773.68 66.04
Router#

2
PS-Fan
Status
-----OK
OK

Output
Status
-----OK
OK

Oper
State
----on
on

This example shows how to display the total power that is available from the power supplies:
Router# show power total
system power total = 27.460A
Router#

This example shows how to display the total power that is budgeted for powered-on items:
Router# show power used
system power used = -6.990A
Router#

This command shows how to display the inline power status on the interfaces:
Router# show power inline
Interface
Admin
Oper
Power ( mWatt ) Device
-------------------- ----- ---------- --------------- ----------FastEthernet9/1
auto on
6300
Cisco 6500 IP Phone
FastEthernet9/2
auto on
6300
Cisco 6500 IP Phone
.
.
. 

This command shows how to display the inline power status for a specific module:
Router# show power inline mod 7
Interface

Admin

Oper

Power
Device
Class
(Watts)
---------- ----- ---------- ------- -------------- ----------Gi7/1
auto
on
6.3 Cisco IP Phone 7960 n/a
Gi7/2
static power-deny
0 Ieee PD
3
.
.
. 

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1046

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show power

Related Commands

Command

Description

power enable

Turns on power for the modules.

power
redundancy-mode

Sets the power-supply redundancy mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1047

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show qdm status

show qdm status
To display information about the status for the currently active QDM clients who are connected to the
Catalyst 6500 series switch, use the show qdm status command.
show qdm status

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

You can use this command to display the unique client ID that is assigned to each QDM client that is
connected to the Catalyst 6500 series switch. The output display includes the following information:
•

Number of QDM clients that are currently connected to the Catalyst 6500 series switch

•

Version of QDB client

•

Name and IP address of client

•

Client identification

•

Connection duration

This example shows how to display information on the status of the currently active QDM web-based
clients:
Router# show qdm status
Number of QDM Clients : 2
QDM Client v2.1(0.7)-_picard_2 @ 10.34.8.92 (id:5)
connected since 07:50:00 UTC Sat Aug 11 1917
QDM Client v2.1(0.7)-_janeway_2 @ 171.69.49.14 (id:4)
connected since 07:49:39 UTC Sat Aug 11 1917
Router#

Related Commands

Command

Description

disconnect qdm

Disconnects a QDM session.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1048

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show qm-sp port-data

show qm-sp port-data
To display information about the QoS-manager switch processor, use the show qm-sp port-data
command.
show qm-sp port-data {mod port}

Syntax Description

mod port

Defaults

This command has no default settings.

Command Modes

Switch command—Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Module and port number; see the “Usage Guidelines” section for valid
values.

This command is supported by the supervisor engine only. This command can be entered only from the
Catalyst 6500 series switch console (see the remote login command).
The mod port arguments designate the module and port number. Valid values depend on the chassis and
module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values for
the port number are from 1 to 48.
Enter the show qm-sp port-data command to verify the values that are programmed in the hardware.

Examples

This example shows how to display information about the QoS manager:
Switch-sp# show qm-sp port-data 1 2
----------------------------------------------------------------------------* Type: Tx[1p2q2t] Rx[1p1q4t] [0] Pinnacle
* Per-Port: [Untrusted] Default COS[0] force[0] [VLAN based]
----------------------------------------------------------------------------* COSMAP(C[Q/T]) TX: 0[1/1] 1[1/1] 2[1/2] 3[1/2] 4[2/1] 5[3/1] 6[2/1] 7[2/2]
RX: 0[1/1] 1[1/1] 2[1/2] 3[1/2] 4[1/3] 5[2/1] 6[1/3] 7[1/4]
----------------------------------------------------------------------------* WRR bandwidth:
[7168 18432]
* TX queue limit(size): [311296 65536 65536]
* WRED queue[1]:
failed (0x82)
queue[2]:
failed (0x82)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1049

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show qm-sp port-data

----------------------------------------------------------------------------* TX drop thr queue[1]: type[2 QOS_SCP_2_THR] dropThr[311104 311104]
queue[2]: type[2 QOS_SCP_2_THR] dropThr[61504 61504]
* RX drop threshold:
type[4 QOS_SCP_4_THR] dropThr[62259 62259 62259 62259]
* RXOvr drop threshold: type[0 UNSUPPORTED] dropThr[16843009 131589 61504 61504]
* TXOvr drop threshold: type[0 UNSUPPORTED] dropThr[67174656 260 16843009 131589]
Switch-sp#

Related Commands

Command

Description

rcv-queue queue-limit

Sets the size ratio between the strict-priority and standard receive queues.

remote login

Accesses the Catalyst 6500 series switch console or a specific module.

wrr-queue

Allocates the bandwidth between the standard transmit queues.

wrr-queue queue-limit Sets the transmit-queue size ratio on an interface.
wrr-queue threshold

Configures the drop-threshold percentages for the standard receive and
transmit queues on 1q4t and 2q2t interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1050

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show queueing interface

show queueing interface
To display queueing information, use the show queueing interface command.
show queueing interface {{interface interface-number} | {null interface-number} | {vlan
vlan-id}}

Syntax Description

interface

Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

Module and port number; see the “Usage Guidelines” section for valid
values.

null
interface-number

Specifies the null interface; the valid value is 0.

vlan vlan-id

Specifies the VLAN ID; valid values are from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13 and valid values
for the port number are from 1 to 48.
The show queueing interface command does not display the absolute values that are programmed in
the hardware. Enter the show qm-sp port-data command to verify the values that are programmed in
the hardware.

Examples

This example shows how to display queueing information:
Router# show queueing interface fastethernet 5/1
Interface FastEthernet5/1 queueing strategy: Weighted Round-Robin
Port QoS is enabled
Port is untrusted
Extend trust state: trusted
Default COS is 0
Transmit queues [type = 2q2t]:
Queue Id
Scheduling Num of thresholds
----------------------------------------1
WRR low
2
2
WRR high
2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1051

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show queueing interface

WRR bandwidth ratios:
queue-limit ratios:

100[queue 1] 255[queue 2]
70[queue 1] 30[queue 2]

queue tail-drop-thresholds
-------------------------1
80[1] 100[2]
2
80[1] 100[2]
queue thresh cos-map
--------------------------------------1
1
0 1
1
2
2 3
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1052

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show redundancy

show redundancy
To display RF information, use the show redundancy command.
show redundancy {clients | counters | history | states | switchover}

Syntax Description

clients

Displays information about the RF client.

counters

Displays information about the RF counter.

history

Displays a log of past status for the RF.

states

Displays information about the RF state.

switchover

Displays the switchover counts, the uptime since active, and the total
system uptime.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display information about the RF client:
Router# show redundancy clients
clientID = 0
clientSeq =
clientID = 25
clientSeq =
clientID = 5026
clientSeq =
clientID = 5029
clientSeq =
clientID = 5006
clientSeq =
clientID = 6
clientSeq =
clientID = 7
clientSeq =
clientID = 5008
clientSeq =
clientID = 28
clientSeq =
clientID = 29
clientSeq =
clientID = 65000
clientSeq =
Router#

0
130
130
135
170
180
190
190
330
340
65000

RF_INTERNAL_MSG
CHKPT RF
CHKPT RF
Redundancy Mode RF
RFS client
Const OIR Client
PF Client
PF Client
Const Startup Config
Const IDPROM Client
RF_LAST_CLIENT

The output displays the following information:
•

clientID displays the client’s ID number.

•

clientSeq displays the client’s notification sequence number.

•

Current RF state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1053

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show redundancy

This example shows how to display information about the RF counters:
Router# show redundancy counters
Redundancy Facility OMs
comm link up = 0
comm link down down = 0
invalid client tx
null tx by client
tx failures
tx msg length invalid

=
=
=
=

0
0
0
0

client not rxing msgs
rx peer msg routing errors
null peer msg rx
errored peer msg rx

=
=
=
=

0
0
0
0

buffers tx
tx buffers unavailable
buffers rx
buffer release errors

=
=
=
=

0
0
0
0

duplicate client registers = 0
failed to register client = 0
Invalid client syncs = 0
Router#

This example shows how to display information about the RF history:
Router# show redundancy history
00:00:00 client added: RF_INTERNAL_MSG(0) seq=0
00:00:00 client added: RF_LAST_CLIENT(65000) seq=65000
00:00:02 client added: Const Startup Config Sync Clien(28) seq=330
00:00:02 client added: CHKPT RF(25) seq=130
00:00:02 client added: PF Client(7) seq=190
00:00:02 client added: Const OIR Client(6) seq=180
00:00:02 client added: Const IDPROM Client(29) seq=340
00:00:02 *my state = INITIALIZATION(2) *peer state = DISABLED(1)
00:00:02 RF_PROG_INITIALIZATION(100) RF_INTERNAL_MSG(0) op=0 rc=11
00:00:02 RF_PROG_INITIALIZATION(100) CHKPT RF(25) op=0 rc=11
00:00:02 RF_PROG_INITIALIZATION(100) Const OIR Client(6) op=0 rc=11
00:00:02 RF_PROG_INITIALIZATION(100) PF Client(7) op=0 rc=11
.
.
.

This example shows how to display information about the RF state:
Router# show redundancy states
my state = 13 -ACTIVE
peer state = 1 -DISABLED
Mode = Simplex
Unit = Primary
Unit ID = 1
Redundancy Mode
Redundancy Mode
Split Mode
Manual Swact
Communications

(Operational) = Route Processor Redundancy
(Configured) = Route Processor Redundancy
= Disabled
= Disabled Reason: Simplex mode
= Down
Reason: Simplex mode

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1054

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show redundancy

client count = 11
client_notification_TMR
keep_alive TMR
keep_alive count
keep_alive threshold
RF debug mask

=
=
=
=
=

30000 milliseconds
4000 milliseconds
0
7
0x0

Router#

If you enter the show redundancy states command with SSO configured, the Redundancy Mode
(Operational) and the Redundancy Mode (Configured) fields display Stateful Switchover.
This example shows how to display the switchover counts, the uptime since active, and the total system
uptime:
Router# show redundancy switchover
Switchovers this system has experienced
Uptime since this supervisor switched to active
Total system uptime from reload

: 1
: 1 minute
: 2 hours, 47 minutes

Router#

Related Commands

Command

Description

mode

Sets the redundancy mode.

redundancy

Enters redundancy configuration mode.

redundancy
force-switchover

Forces a switchover from the active to the standby supervisor engine.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1055

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show rom-monitor

show rom-monitor
To display the ROMMON status, use the show rom-monitor command.
show rom-monitor {slot num} {sp | rp}

Syntax Description

slot num

Specifies the slot number of the ROMMON to be displayed.

sp

Displays the ROMMON status of the switch processor.

rp

Displays the ROMMON status of the route processor.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enter the show rom-monitor command, the output displays the following:
•

Region region1 and region2—Displays the status of the ROMMON image and the order of
preference that region1 or region2 images should be booted from. The ROMMON image status
values are as follows:
– First run—Indicates that a check of the new image is being run.
– Invalid—Indicates that the new image has been checked and the upgrade process has started.
– Approved—Indicates that the ROMMON field upgrade process has completed.

•

Currently running—This field displays the currently running image and the region.

The sp or rp keyword is required only if a supervisor engine is installed in the specified slot.

Examples

This example shows how to display ROMMON information:
Router# show rom-monitor slot 1 sp
Region F1:APPROVED
Region F2:FIRST_RUN, preferred
Currently running ROMMON from F1 region
Router#

Related Commands

Command

Description

upgrade rom-monitor

Sets the execution preference on a ROMMON.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1056

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show rpc

show rpc
To display RPC information, use the show rpc command.
show rpc {applications | counters | status}

Syntax Description

applications

Displays information about the RPC application.

counters

Displays the RPC counters.

status

Displays the RPC status.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display RPC applications:
Router# show rpc applications
ID Dest Callback Application
1 0011  rpc-master
2 0011  cygnus-oir
3 0021 60201708 rpc-slave-33
4 0021 6022A514 idprom-MP
5 0021 60204420 msfc-oir
6 0011  Nipcon-SP
7 0011  sw_vlan_sp
8 0011  stp_switch_api
9 0011  pagp_rpc
10 0011  span_switch_rpc
11 0011  pf_rp_rpc
13 0011  mapping_sp
14 0011  logger-sp
17 0011  c6k_power_sp
18 0011  c6k_sp_environmental
19 0011  pagp_switch_rpc
20 0011  pm-cp
21 0021 602675B0 Nipcon-RP
22 0021 602283B0 pm-mp
23 0021 601F2538 sw_vlan_rp
24 0021 601F77D0 span_switch_sp_rpc
25 0021 601F7950 idbman_fec
26 0021 601F7F30 logger-rp
27 0021 601F80D8 pagp_switch_l3_split
28 0021 601F81C0 pagp_switch_sp2mp
29 0021 6026F190 c6k_rp_environmental
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1057

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show rpc

This example shows how to display information about the RPC counters:
Router# show rpc counters
ID Dest Rcv-req Xmt-req
1 0011 0
26
2 0011 0
6221
4 0021 15
0
5 0021 6222
0
7 0011 0
2024
8 0011 0
3
9 0011 0
188
11 0011 0
4
13 0011 0
2
14 0011 0
3
17 0011 0
2
18 0011 0
66
19 0011 0
109
20 0011 0
33
22 0021 126
0
23 0021 5
0
24 0021 14
0
25 0021 22
0
26 0021 8
0
27 0021 3
0
28 0021 3
0
Router#

Q size
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

Application
rpc-master
cygnus-oir
idprom-MP
msfc-oir
sw_vlan_sp
stp_switch_api
pagp_rpc
pf_rp_rpc
mapping_sp
logger-sp
c6k_power_sp
c6k_sp_environmental
pagp_switch_rpc
pm-cp
pm-mp
sw_vlan_rp
span_switch_sp_rpc
idbman_fec
logger-rp
pagp_switch_l3_split
pagp_switch_sp2mp

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1058

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show running-config

show running-config
To display the status and configuration of the module, Layer 2 VLAN, or interface, use the show
running-config command.
show running-config [{interface interface } | {module number} | {vlan vlan-id} ]

Syntax Description

interface interface

(Optional) Specifies the interface type; possible valid values are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and
ge-wan.

module number

(Optional) Specifies the module number.

vlan vlan-id

(Optional) Specifies the VLAN information to display; valid values are
from 1 to 4094.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In some cases, you might see a difference in the duplex mode that is displayed between the show
interfaces command and the show running-config command. In this case, the duplex mode that is
displayed in the show interfaces command is the actual duplex mode that the interface is running. The
show interfaces command shows the operating mode for an interface, while the show running-config
command shows the configured mode for an interface.
The show running-config command output for an interface might display the duplex mode but no
configuration for the speed. This output indicates that the interface speed is configured as auto and that
the duplex mode shown becomes the operational setting once the speed is configured to something other
than auto. With this configuration, it is possible that the operating duplex mode for that interface does
not match the duplex mode that is shown with the show running-config command.

Examples

This example shows how to display the module and status configuration for all modules:
Router# show running-config
Building configuration...
Current configuration:
!
version 12.0
service timestamps debug datetime localtime
service timestamps log datetime localtime
no service password-encryption
!

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1059

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show running-config

hostname Router
!
boot buffersize 126968
boot system flash slot0:halley
boot bootldr bootflash:c6msfc-boot-mz.120-6.5T.XE1.0.83.bin
enable password lab
!
clock timezone Pacific -8
clock summer-time Daylight recurring
redundancy
main-cpu
auto-sync standard
!
ip subnet-zero
!
ip multicast-routing
ip dvmrp route-limit 20000
ip cef
mls flow ip destination
mls flow ipx destination
cns event-service server
!
spanning-tree portfast bpdu-guard
spanning-tree uplinkfast
spanning-tree vlan 200 forward-time 21
port-channel load-balance sdip
!
!
!
shutdown
!
!
.
.
.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1060

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show scp

show scp
To display SCP information, use the show scp command.
show scp {accounting | counters | {{mcast [group group-id} | inst]} | {process id} | status}

Syntax Description

accounting

Displays information about the SCP accounting.

counters

Displays information about the SCP counter.

mcast

Displays information about the SCP multicast.

group group-id

(Optional) Displays information for a specific group and group ID; valid
values are from 1 to 127.

inst

(Optional) Displays information for an instance.

process id

(Optional) Displays all the processes that have registered an SAP with SCP.

status

Displays information about the local SCP server status.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display all the processes that have registered an SAP with SCP:
Router# show scp process
Sap Pid Name
=== === ====
0 180 CWAN-RP SCP Input Process
18 42 itasca
20 3 Exec
21 3 Exec
22 180 CWAN-RP SCP Input Process
Total number of SAP registered = 5
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1061

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show snmp mib ifmib ifindex

show snmp mib ifmib ifindex
To display the SNMP interface index identification numbers (ifIndex values) for all the system
interfaces or the specified system interface, use the show snmp mib ifmib ifindex command.
show snmp mib ifmib ifindex [interface interface-number][:subinterface][.subinterface][port]

Syntax Description

interface

(Optional) Interface type; possible valid values for type are ethernet,
fastethernet, gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number Module and port number; see the “Usage Guidelines” section for valid values.
:subinterface

(Optional) Subinterface number; the valid value is 0.

.subinterface

(Optional) Subinterface number; valid values are from 0 to 4294967295.

port

(Optional) Interface number.

Defaults

The ifIndex values for all the interfaces are displayed.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show snmp mib ifmib ifindex command allows you to display SNMP interface index identification
numbers (ifIndex values) that are assigned to interfaces and subinterfaces using the CLI. This command
allows you to view these values without using a Network Management Station.
If a specific interface is not specified using the optional interface-type, slot, port-adapter, and port
arguments, the ifDescr and ifIndex pairs of all interfaces and subinterfaces present on the system are
shown.
Use the show snmp mib ifmib ifindex ? command to determine the options available on your system.
Typical interface-types values include async, dialer, ethernet, fastEthernet, and serial.

Examples

This example shows how to display the ifIndex for a specific interface:
Router# show snmp mib ifmib ifIndex Ethernet2/0
Ethernet2/0: Ifindex = 2

This example shows how to display the ifIndex for all interfaces:
Router# show snmp mib ifmib ifindex
ATM1/0: Ifindex = 1
ATM1/0-aal5 layer: Ifindex = 12
ATM1/0-atm layer: Ifindex = 10
ATM1/0.0-aal5 layer: Ifindex = 13
ATM1/0.0-atm subif: Ifindex = 11

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1062

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show snmp mib ifmib ifindex

ATM1/0.9-aal5 layer: Ifindex = 32
ATM1/0.9-atm subif: Ifindex = 31
ATM1/0.99-aal5 layer: Ifindex = 36
ATM1/0.99-atm subif: Ifindex = 35
Ethernet2/0: Ifindex = 2
Ethernet2/1: Ifindex = 3
Ethernet2/2: Ifindex = 4
Ethernet2/3: Ifindex = 5
Null0: Ifindex = 14
Serial3/0: Ifindex = 6
Serial3/1: Ifindex = 7
Serial3/2: Ifindex = 8
Serial3/3: Ifindex = 9

Related Commands

Command

Description

snmp ifindex persist

Enables ifIndex values in the Interfaces MIB (IF-MIB) that persist across
reboots (ifIndex persistence) only on a specific interface.

snmp-server ifindex
persist

Enables ifIndex values globally so that they will remain constant across
reboots for use by SNMP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1063

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show spanning-tree

show spanning-tree
To display information about the spanning-tree state, use the show spanning-tree command.
show spanning-tree [bridge-group | active | backbonefast | {bridge [id]} | detail |
inconsistentports | {interface interface interface-number} | root | summary [total] |
uplinkfast | {vlan vlan-id} | {port-channel number} | pathcost-method]

Syntax Description

bridge-group

(Optional) Bridge-group number; valid values are from 1 to 255.

active

(Optional) Displays information about the spanning tree on active interfaces
only.

backbonefast

(Optional) Displays information about the spanning-tree BackboneFast status.

bridge

(Optional) Displays information about the bridge status and configuration.

id

(Optional) Displays the bridge identifier.

detail

(Optional) Displays detailed information about the spanning-tree state.

inconsistentports

(Optional) Displays information about the root-inconsistency state.

interface interface (Optional) Displays the interface type and number; possible valid values for
type are ethernet, fastethernet, gigabitethernet, tengigabitethernet, pos,
atm, and ge-wan.
interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

root

(Optional) Displays the status and configuration of the root bridge.

summary

(Optional) Displays a summary of port states.

total

(Optional) Displays the total lines of the spanning-tree state section.

uplinkfast

(Optional) Displays the status of the spanning-tree UplinkFast.

vlan vlan-id

(Optional) Specifies the VLAN ID; valid values are from 1 to 4094.

port-channel
number

(Optional) Specifies the channel interface; valid values are a maximum of
64 values ranging from 1 to 282.

pathcost-method

(Optional) Displays the default path-cost calculation method that is used.

Defaults

This command has no default settings.

Command Modes

Priviledged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The pos, atm, and ge-wan keywords are supported on Catalyst 6500 series switches that are configured
with a Supervisor Engine 2 only.
The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1064

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show spanning-tree

The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 2 to 13 and valid values
for the port number are from 1 to 48.
When checking spanning tree-active states and you have a large number of VLANs, you can enter the
show spanning-tree summary total command. You can display the total number of VLANs without
having to scroll through the list of VLANs.

Examples

This example shows how to display a summary of interface information:
Router# show spanning-tree
VLAN0001
Spanning tree enabled protocol ieee
Root ID
Priority
4097
Address
0004.9b78.0800
This bridge is the root
Hello Time
2 sec Max Age 20 sec
Bridge ID

Forward Delay 15 sec

Priority
4097
(priority 4096 sys-id-ext 1)
Address
0004.9b78.0800
Hello Time
2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 15

Interface
Name
---------------Gi2/1
Gi2/2
Fa4/3
Fa4/4

Port ID
Designated
Prio.Nbr
Cost Sts
Cost Bridge ID
-------- --------- --- --------- -------------------128.65
4 LIS
0 4097 0004.9b78.0800
128.66
4 LIS
0 4097 0004.9b78.0800
128.195
19 LIS
0 4097 0004.9b78.0800
128.196
19 BLK
0 4097 0004.9b78.0800

Port ID
Prio.Nbr
-------128.65
128.66
128.195
128.195

Router#

Table 2-85 describes the fields that are shown in the example.
Table 2-85 show spanning-tree Command Output Fields

Field

Definition

Port ID Prio.Nbr

Port ID and priority number.

Cost

Port cost.

Sts

Status information.

This example shows how to display information about the spanning tree on active interfaces only:
Router# show spanning-tree active
UplinkFast is disabled
BackboneFast is disabled
VLAN1 is executing the ieee compatible Spanning Tree protocol
Bridge Identifier has priority 32768, address 0050.3e8d.6401
Configured hello time 2, max age 20, forward delay 15
Current root has priority 16384, address 0060.704c.7000
Root port is 265 (FastEthernet5/9), cost of root path is 38
Topology change flag not set, detected flag not set

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1065

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show spanning-tree

Number of topology changes 0 last change occurred 18:13:54 ago
Times: hold 1, topology change 24, notification 2
hello 2, max age 14, forward delay 10
Timers: hello 0, topology change 0, notification 0
.
.
.
Router#

This example shows how to display the status of spanning-tree BackboneFast:
Router# show spanning-tree backbonefast
BackboneFast is enabled
BackboneFast statistics
----------------------Number of transition via backboneFast (all VLANs)
Number of inferior BPDUs received (all VLANs)
Number of RLQ request PDUs received (all VLANs)
Number of RLQ response PDUs received (all VLANs)
Number of RLQ request PDUs sent (all VLANs)
Number of RLQ response PDUs sent (all VLANs)
Router#

:
:
:
:
:
:

0
0
0
0
0
0

This example shows how to display information about the spanning tree for this bridge only:
Router# show spanning-tree bridge
VLAN1
Bridge ID Priority
32768
Address
0050.3e8d.6401
Hello Time
2 sec Max Age 20 sec
.
.
.
Router#

Forward Delay 15 sec

This example shows how to display detailed information about the interface:
Router# show spanning-tree detail
VLAN1 is executing the ieee compatible Spanning Tree protocol
Bridge Identifier has priority 4096, address 00d0.00b8.1401
Configured hello time 2, max age 20, forward delay 15
We are the root of the spanning tree
Topology change flag not set, detected flag not set
Number of topology changes 9 last change occurred 02:41:34 ago
from FastEthernet4/21
Times: hold 1, topology change 35, notification 2
hello 2, max age 20, forward delay 15
Timers: hello 1, topology change 0, notification 0, aging 300
Port 213 (FastEthernet4/21) of VLAN1 is forwarding
Port path cost 19, Port priority 128, Port Identifier 128.213.
Designated root has priority 4096, address 00d0.00b8.1401
Designated bridge has priority 4096, address 00d0.00b8.1401
Designated port id is 128.213, designated path cost 0
Timers: message age 0, forward delay 0, hold 0
Number of transitions to forwarding state: 1
BPDU: sent 4845, received 1
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1066

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show spanning-tree

This example shows how to display information about the spanning tree for a specific interface:
Router# show spanning-tree interface fastethernet 5/9
Interface Fa0/10 (port 23) in Spanning tree 1 is ROOT-INCONSISTENT
Port path cost 100, Port priority 128
Designated root has priority 8192, address 0090.0c71.a400
Designated bridge has priority 32768, address 00e0.1e9f.8940
.
.
.

This example shows how to display information about the spanning tree for a specific bridge group:
Router# show spanning-tree 1
UplinkFast is disabled
BackboneFast is disabled
Bridge group 1 is executing the ieee compatible Spanning Tree protocol
Bridge Identifier has priority 32768, address 00d0.d39c.004d
Configured hello time 2, max age 20, forward delay 15
Current root has priority 32768, address 00d0.d39b.fddd
Root port is 7 (FastEthernet2/2), cost of root path is 19
Topology change flag set, detected flag not set
Number of topology changes 3 last change occurred 00:00:01 ago
from FastEthernet2/2
Times: hold 1, topology change 35, notification 2
hello 2, max age 20, forward delay 15
Timers: hello 0, topology change 0, notification 0 bridge aging time 15
Port 2 (Ethernet0/1/0) of Bridge group 1 is down
Port path cost 100, Port priority 128
Designated root has priority 32768, address 0050.0bab.1808
Designated bridge has priority 32768, address 0050.0bab.1808
Designated port is 2, path cost 0
Timers: message age 0, forward delay 0, hold 0
BPDU: sent 0, received 0
Router#

This example shows how to display a summary of port states:
Router# show spanning-tree summary
Root bridge for: Bridge group 1, VLAN0001, VLAN0004-VLAN1005
VLAN1013-VLAN1499, VLAN2001-VLAN4094
EtherChannel misconfiguration guard is enabled
Extended system ID is enabled
Portfast is enabled by default
PortFast BPDU Guard is disabled by default
Portfast BPDU Filter is disabled by default
Loopguard is disabled by default
UplinkFast is disabled
BackboneFast is disabled
Pathcost method used is long
Name
Blocking Listening Learning Forwarding
---------------------- -------- --------- -------- ---------1 bridge
0
0
0
1
3584 vlans 3584 0 0 7168 10752
Blocking Listening Learning Forwarding
---------------------- -------- --------- -------- ---------Total
3584
0
0
7169
Router#

STP Active
---------1
STP Active
---------10753

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1067

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show spanning-tree

This example shows how to display the total lines of the spanning-tree state section:
Router# show spanning-tree summary total
Root bridge for:Bridge group 10, VLAN1, VLAN6, VLAN1000.
Extended system ID is enabled.
PortFast BPDU Guard is disabled
EtherChannel misconfiguration guard is enabled
UplinkFast is disabled
BackboneFast is disabled
Default pathcost method used is long
Name
Blocking Listening Learning Forwarding STP Active
-------------------- -------- --------- -------- ---------- ---------105 VLANs 3433
0
0
105
3538
BackboneFast statistics
----------------------Number of transition via backboneFast (all VLANs)
Number of inferior BPDUs received (all VLANs)
Number of RLQ request PDUs received (all VLANs)
Number of RLQ response PDUs received (all VLANs)
Number of RLQ request PDUs sent (all VLANs)
Number of RLQ response PDUs sent (all VLANs)
Router#

:0
:0
:0
:0
:0
:0

This example shows how to display information about the spanning tree for a specific VLAN:
Router# show spanning-tree vlan 200
VLAN0200
Spanning tree enabled protocol ieee
Root ID Priority 32768
Address 00d0.00b8.14c8
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32768
Address 00d0.00b8.14c8
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 300
Interface Role Sts Cost Prio.Nbr Status
---------------- ---- --- --------- -------- -------------------------------Fa4/4 Desg FWD 200000 128.196 P2p
Fa4/5 Back BLK 200000 128.197 P2p
Router#

Table 2-86 describes the fields that are shown in the example.
Table 2-86 show spanning-tree vlan Command Output Fields

Field

Definition

Role

Current 802.1w role; valid values are Boun (boundary), Desg (designated), Root, Altn
(alternate), and Back (backup).

Sts

Spanning-tree states; valid values are BKN* (broken)1, BLK (blocking), DWN (down),
LTN (listening), LBK (loopback), LRN (learning), and FWD (forwarding).

Cost

Port cost.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1068

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show spanning-tree

Table 2-86 show spanning-tree vlan Command Output Fields (continued)

Field

Definition

Prio.Nbr

Port ID that consists of the port priority and the port number.

Status

Status information; valid values are as follows:
•

P2p/Shr—The interface is considered as a point-to-point (resp. shared) interface by
the spanning tree.

•

Edge—PortFast has been configured (either globally using the default command
or directly on the interface) and no BPDU has been received.

•

*ROOT_Inc, *LOOP_Inc, *PVID_Inc, and *TYPE_Inc—The port is in a broken
state (BKN*) for an inconsistency. The port would be Root inconsistent,
Loopguard inconsistent, PVID inconsistent, or Type inconsistent.

•

Bound(type)—When in MST mode, identifies the boundary ports and specifies the
type of the neighbor (STP, RSTP, or PVST).

•

Peer(STP)—When in PVRST rapid-pvst mode, identifies the port connected to a
previous version of the 802.1D bridge.

1. For information on the *, see the definition for the Status field.

This example shows how to determine if any ports are in the root-inconsistent state:
Router#

show spanning-tree inconsistentports

Name
Interface
Inconsistency
-------------------- -------------------- -----------------VLAN1
FastEthernet3/1
Root Inconsistent
Number of inconsistent ports (segments) in the system :1
Router#

Related Commands

Command

Description

spanning-tree backbonefast

Enables BackboneFast on all Ethernet VLANs.

spanning-tree cost

Sets the path cost of the interface for STP calculations.

spanning-tree guard

Enables or disables the guard mode.

spanning-tree pathcost method

Sets the default path-cost calculation method.

spanning-tree portfast (interface
configuration mode)

Enables PortFast mode.

spanning-tree portfast bpdufilter
default

Enables BPDU filtering by default on all PortFast ports.

spanning-tree portfast bpduguard
default

Enables BPDU guard by default on all PortFast ports.

spanning-tree port-priority

Sets an interface priority when two bridges vie for position as the
root bridge.

spanning-tree uplinkfast

Enables UplinkFast.

spanning-tree vlan

Configures STP on a per-VLAN basis.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1069

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show spanning-tree mst

show spanning-tree mst
To display the information about the MST protocol, use the show spanning-tree mst command.
show spanning-tree mst [configuration [digest]]
show spanning-tree mst [instance-id] [detail]
show spanning-tree mst [instance-id] interface interface [detail]

Syntax Description

configuration

(Optional) Displays information about the region configuration.

digest

(Optional) Displays information about the MD5 digest included in the
current MSTCI.

instance-id

(Optional) Instance identification number; valid values are from 0 to 4094.

detail

(Optional) Displays detailed information about the MST protocol.

interface interface (Optional) Displays the interface type and number; possible valid values for
type are ethernet, fastethernet, gigabitethernet, tengigabitethernet, pos,
atm, ge-wan, port-channel, and vlan. See the “Usage Guidelines” section
for valid number values.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The valid values for interface depend on the specified interface type and the chassis and module that are
used. For example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T
Ethernet module that is installed in a 13-slot chassis, valid values for the module number are from 2 to 13
and valid values for the port number are from 1 to 48.
The number of valid values for port-channel number are a maximum of 64 values ranging from 1 to
282. The port-channel number values from 257 to 282 are supported on the CSM and the FWSM only.
The number of valid values for vlan are from 1 to 4094.
Valid values for instance-id are from 0 to 4094.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1070

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show spanning-tree mst

In the output display of the show spanning-tree mst configuration command, a warning message may
display. This message appears if you do not map secondary VLANs to the same instance as the associated
primary VLAN. The display includes a list of the secondary VLANs that are not mapped to the same
instance as the associated primary VLAN. The warning message is as follows:
These secondary vlans are not mapped to the same instance as their primary:
-> 3

In the output display of the show spanning-tree mst configuration digest command, if the output applies to
both standard and prestandard bridges at the same time on a per-port basis, two different digests are
displayed.
If you configure a port to transmit prestandard BPDUs only, the prestandard flag displays in the show
spanning-tree commands. The variations of the prestandard flag are as follows:
•

Pre-STD (or prestandard in long format)—This flag displays if the port is configured to transmit
prestandard BPDUs and if a prestandard neighbor bridge has been detected on this interface.

•

Pre-STD-Cf (or prestandard (config) in long format)—This flag displays if the port is configured to
transmit prestandard BPDUs but a prestandard BPDU has not been received on the port, the
autodetection mechanism has failed, or a misconfiguration, if there is no prestandard neighbor, has
occurred.

•

Pre-STD-Rx (or prestandard (rcvd) in long format)—This flag displays when a prestandard BPDU
has been received on the port but it has not been configured to send prestandard BPDUs. The port
will send prestandard BPDUs, but we recommend that you change the port configuration so that the
interaction with the prestandard neighbor does not rely only on the autodetection mechanism.

If the configuration is not prestandard compliant (for example, a single MST instance has an ID that is
greater than or equal to 16), the prestandard digest is not computed and the following output is
displayed:
Router# show spanning-tree mst configuration digest
Name
[region1]
Revision 2
Instances configured 3
Digest
0x3C60DBF24B03EBF09C5922F456D18A03
Pre-std Digest N/A, configuration not pre-standard compatible
Router#

MST BPDUs include an MST configuration identifier (MSTCI) that consists of the region name, region
revision, and an MD5 digest of the VLAN-to-instance mapping of the MST configuration.
See the show spanning-tree command for output definitions.

Examples

This example shows how to display information about the region configuration:
Router> show spanning-tree mst configuration
Name
[leo]
Revision 2702
Instance Vlans mapped
-------- --------------------------------------------------------------------0
1-9,11-19,21-29,31-39,41-4094
1
10,20,30,40
-------------------------------------------------------------------------------

This example shows how to display additional MST-protocol values:
Router# show spanning-tree mst 3 detail
###### MST03 vlans mapped: 3,3000-3999
Bridge address 0002.172c.f400 priority 32771 (32768 sysid 3)
Root this switch for MST03

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1071

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show spanning-tree mst

GigabitEthernet1/1 of MST03 is boundary forwarding
Port info port id 128.1 priority 128
cost 20000
Designated root address 0002.172c.f400 priority 32771
cost 0
Designated bridge address 0002.172c.f400 priority 32771 port
id 128.1
Timers: message expires in 0 sec, forward delay 0, forward transitions 1
Bpdus (MRecords) sent 4, received 0
FastEthernet4/1 of MST03 is designated forwarding
Port info port id 128.193 priority 128 cost
200000
Designated root address 0002.172c.f400 priority 32771
cost 0
Designated bridge address 0002.172c.f400 priority 32771 port id
128.193
Timers: message expires in 0 sec, forward delay 0, forward transitions 1
Bpdus (MRecords) sent 254, received 1
FastEthernet4/2 of MST03 is backup blocking
Port info port id 128.194 priority 128 cost
200000
Designated root address 0002.172c.f400 priority 32771
cost 0
Designated bridge address 0002.172c.f400 priority 32771 port id
128.193
Timers: message expires in 2 sec, forward delay 0, forward transitions 1
Bpdus (MRecords) sent 3, received 252
Router#

This example shows how to display MST information for a specific interface:
Router# show spanning-tree mst 0 interface fastethernet 4/1 detail
Edge port: no (trunk) port guard : none
(default)
Link type: point-to-point (point-to-point) bpdu filter: disable
(default)
Boundary : internal bpdu guard : disable
(default)
FastEthernet4/1 of MST00 is designated forwarding
Vlans mapped to MST00 1-2,4-2999,4000-4094
Port info port id 128.193 priority 128 cost
200000
Designated root address 0050.3e66.d000 priority 8193
cost 20004
Designated ist master address 0002.172c.f400 priority 49152
cost 0
Designated bridge address 0002.172c.f400 priority 49152 port id
128.193
Timers: message expires in 0 sec, forward delay 0, forward transitions 1
Bpdus sent 492, received 3
Router#

This example shows how to display the MD5 digest included in the current MSTCI:
Router# show spanning-tree mst configuration digest
Name
[mst-config]
Revision 10
Instances configured 25
Digest
0x40D5ECA178C657835C83BBCB16723192
Pre-std Digest 0x27BF112A75B72781ED928D9EC5BB4251
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1072

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show spanning-tree mst

This example displays the new master role for all MST instances at the boundary of the region on the
port that is a CIST root port:
Router# show spanning-tree mst interface fastethernet4/9
FastEthernet4/9 of MST00 is root forwarding
Edge port: no
(default)
port guard : none
Link type: point-to-point (auto)
bpdu filter: disable
Boundary : boundary
(RSTP)
bpdu guard : disable
Bpdus sent 3428, received 6771
Instance
-------0
8
9
11
Router#

Related Commands

Role
---Root
Mstr
Mstr
Mstr

Sts
--FWD
FWD
FWD
FWD

Cost
--------200000
200000
200000
200000

Prio.Nbr
-------128.201
128.201
128.201
128.201

(default)
(default)
(default)

Vlans mapped
------------------------------2-7,10,12-99,101-999,2001-3999,4001-4094
8,4000
1,9,100
11,1000-2000

Command

Description

spanning-tree mst

Sets the path cost and port-priority parameters for any MST instance.

spanning-tree mst
forward-time

Sets the forward-delay timer for all the instances on the Catalyst 6500 series
switch.

spanning-tree mst
hello-time

Sets the hello-time delay timer for all the instances on the Catalyst 6500 series
switch.

spanning-tree mst
max-hops

Specifies the number of possible hops in the region before a BPDU is
discarded.

spanning-tree mst root Designates the primary and secondary root, sets the bridge priority, and sets
the timer value for an instance.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1073

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show standby delay

show standby delay
To display HSRP information about the delay periods, use the show standby delay command.
show standby delay [type number]

Syntax Description

type number

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Interface type and number for which output is displayed.

This example shows how to display information about the delay periods:
Router# show standby delay
Interface
Ethernet0/3
Router#

Related Commands

Minimum Reload
1
5

Command

Description

standby delay
minimum reload

Configures the delay period before the initialization of HSRP groups.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1074

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show sup-bootflash

show sup-bootflash
To display information about the sup-bootflash file system, use the show sup-bootflash command.
show sup-bootflash [all | chips | filesys]

Syntax Description

all

(Optional) Displays all possible flash information.

chips

(Optional) Displays information about the flash chip.

filesys

(Optional) Displays information about the file system.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display a summary of bootflash information:
Router# show sup-bootflash
-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
1
.. image
EBC8FC4D A7487C
6 10700796 Nov 19 1999 07:07:37 halley
2
.. unknown C7EB077D EE2620
25 4644130 Nov 19 1999 07:50:44 cat6000-sup_
5-3-3-CSX.bin
645600 bytes available (15345184 bytes used)
Router#

This example shows how to display all bootflash information:
Router# show sup-bootflash all
-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
1
.. image
EBC8FC4D A7487C
6 10700796 Nov 19 1999 07:07:37 halley
2
.. unknown C7EB077D EE2620
25 4644130 Nov 19 1999 07:50:44 cat6000-sup_
5-3-3-CSX.bin
645600 bytes available (15345184 bytes used)
-------- F I L E
S Y S T E M
S T A T U S -------Device Number = 2
DEVICE INFO BLOCK: bootflash
Magic Number
= 6887635
File System Vers = 10000
(1.0)
Length
= 1000000
Sector Size
= 40000
Programming Algorithm = 19
Erased State
= FFFFFFFF
File System Offset
= 40000
Length = F40000
MONLIB Offset
= 100
Length = F568
Bad Sector Map Offset = 3FFF8
Length = 8
Squeeze Log Offset
= F80000
Length = 40000
Squeeze Buffer Offset = FC0000
Length = 40000
Num Spare Sectors
= 0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1075

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show sup-bootflash

Spares:
STATUS INFO:
Writable
NO File Open for Write
Complete Stats
No Unrecovered Errors
No Squeeze in progress
USAGE INFO:
Bytes Used
= EA2620
Bad Sectors
= 0
OK Files
= 2
Deleted Files = 0
Files w/Errors = 0

Bytes Available = 9D9E0
Spared Sectors = 0
Bytes = EA2520
Bytes = 0
Bytes = 0

******** Intel SCS Status/Register Dump ********
COMMON MEMORY REGISTERS: Bank 0
Intelligent ID Code : 890089
Compatible Status Reg: 800080
DEVICE TYPE:
Layout
: Paired x16 Mode
Write Queue Size
: 64
Queued Erase Supported : No
Router#

This example shows how to display information about the flash chip:
Router# show sup-bootflash chips
******** Intel SCS Status/Register Dump ********
COMMON MEMORY REGISTERS: Bank 0
Intelligent ID Code : 890089
Compatible Status Reg: 800080
DEVICE TYPE:
Layout
: Paired x16 Mode
Write Queue Size
: 64
Queued Erase Supported : No
Router#

This example shows how to display information about the file system:
Router# show sup-bootflash filesys
-------- F I L E
S Y S T E M
S T A T U S -------Device Number = 2
DEVICE INFO BLOCK: bootflash
Magic Number
= 6887635
File System Vers = 10000
(1.0)
Length
= 1000000
Sector Size
= 40000
Programming Algorithm = 19
Erased State
= FFFFFFFF
File System Offset
= 40000
Length = F40000
MONLIB Offset
= 100
Length = F568
Bad Sector Map Offset = 3FFF8
Length = 8
Squeeze Log Offset
= F80000
Length = 40000
Squeeze Buffer Offset = FC0000
Length = 40000
Num Spare Sectors
= 0
Spares:
STATUS INFO:
Writable
NO File Open for Write

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1076

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show sup-bootflash

Complete Stats
No Unrecovered Errors
No Squeeze in progress
USAGE INFO:
Bytes Used
= EA2620
Bad Sectors
= 0
OK Files
= 2
Deleted Files = 0
Files w/Errors = 0

Bytes Available = 9D9E0
Spared Sectors = 0
Bytes = EA2520
Bytes = 0
Bytes = 0

Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1077

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show system jumbomtu

show system jumbomtu
To display the global MTU setting, use the show system jumbomtu command.
show system jumbomtu

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the global MTU setting:
Router# show system jumbomtu
Global Ethernet MTU is 1550 bytes.
Router#

Related Commands

Command

Description

system jumbomtu

Sets the maximum size of the Layer 2 and Layer 3 packets.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1078

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show tcam counts

show tcam counts
To display the TCAM statistics, use the show tcam counts command.
show tcam counts [module number]

Syntax Description

module
number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Specifies the module number; see the “Usage Guidelines”
section for valid values.

Usage Guidelines

The module number keyword and argument designate the module and port number. Valid values for
number depend on the chassis and module that are used. For example, if you have a 48-port
10/100BASE-T Ethernet module that is installed in a 13-slot chassis, valid values for the module number
are from 2 to 13 and valid values for the port number are from 1 to 48.

Examples

This example shows how to display the TCAM statistics:
Router# show tcam counts
Used
Free
------Labels:
8
504

Percent Used
-----------1

Reserved
--------

ACL_TCAM
-------Masks:
Entries:

6
37

4090
32731

0
0

0
0

QOS_TCAM
-------Masks:
Entries:

3
20

4093
32748

0
0

0
0

0
0
0
1

128
16
16
2047

0
0
0
0

LOU:
ANDOR:
ORAND:
ADJ:
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1079

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show tcam counts

Table 2-87 describes the fields that are shown in the example.
Table 2-87 show tcam counts Command Output Fields

Field

Description

Labels Used

Number of labels that are used (maximum of 512).

Labels Free

Number of free labels remaining.

Labels Percent Used

Percentage of labels that are used.

Masks Used

Number of masks that are used (maximum of 4096).

Masks Free

Number of free labels remaining.

Masks Percent Used

Percentage of masks that are used.

Entries Used

Number of labels that are used (maximum of 32767).

Entries Free

Number of free labels that are remaining.

Entries Percent Used

Percentage of entries that are used.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1080

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show tcam interface

show tcam interface
To display information about the interface-based TCAM, use the show tcam interface command.
show tcam interface {interface interface-number} | {null interface-number} | {vlan vlan-id} {acl
{in | out}} | {qos {type1 | type2}} type [detail | module number]

Syntax Description

interface

(Optional) Interface type; possible valid values are ethernet, fastethernet,
gigabitethernet, tengigabitethernet, pos, atm, and ge-wan.

interface-number

(Optional) Module and port number; see the “Usage Guidelines” section for
valid values.

null
interface-number

(Optional) Specifies the null interface; the valid value is 0.

vlan vlan-id

(Optional) Specifies the VLAN; see the “Usage Guidelines” section for valid
values.

acl in

(Optional) Displays the ACL-based incoming packets.

acl out

(Optional) Displays the ACL-based outgoing packets.

qos type1

(Optional) Displays the QoS-based Type 1 packets.

qos type2

(Optional) Displays the QoS-based Type 2 packets.

type

Protocol type to display; valid values are arp, ipv4, ipv6, mpls, and other.

detail

(Optional) Displays detailed information.

module number

(Optional) Specifies the module number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the clear mls acl counters command to clear the TCAM ACL match counters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1081

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show tcam interface

Examples

This example shows how to display interface-based TCAM information:
Router# show tcam interface vlan 7 acl in ip
deny ip any any
permit ip 20.20.0.0 0.0.255.255 22.22.0.0 0.0.255.255
redirect ip 20.21.0.0 0.0.255.255 22.23.0.0 0.0.255.255
permit tcp 24.24.0.0 0.0.255.255 30.30.0.0 0.0.255.255
Fragments (1 match)
permit tcp 25.25.0.0 0.0.255.255 31.31.0.0 0.0.255.255
fragments
permit tcp 25.25.0.0 0.0.255.255 range 30000 30020 31.31.0.0
0.0.255.255 range 10000 10010 (102 matches)
permit tcp 24.24.0.0 0.0.255.255 eq 9000 30.30.0.0 0.0.255.255
eq telnet
deny ip any any
deny ip any any
Router#

This example shows how to display detailed TCAM information:
Router# show tcam interface fa5/2 acl in ip detail
-----------------------------------------------------------------------------------------------------------------DPort - Destination Port
SPort - Source Port
TCP-F - U -URG
Pro
- Protocol
I
- Inverted LOU
TOS
- TOS Value
- A -ACK
rtr
- Router
MRFM - M -MPLS Packet
TN
- T -Tcp Control
- P -PSH
COD
- C -Bank Care Flag
- R -Recirc. Flag
- N -Non-cachable
- R -RST
- I -OrdIndep. Flag
- F -Fragment Flag
CAP
- Capture Flag
- S -SYN
- D -Dynamic Flag
- M -More Fragments F-P
- FlowMask-Prior.
- F -FIN
T
- V(Value)/M(Mask)/R(Result)
X
- XTAG
(*)
- Bank Priority
------------------------------------------------------------------------------------------------------------------

Interface: 1018
label: 1
lookup_type: 0
protocol: IP
packet-type: 0
+-+-----+---------------+---------------+---------------+---------------+------+---+----+-+---+--+---+---+
|T|Index| Dest Ip Addr | Source Ip Addr|
DPort
|
SPort
| TCP-F
|Pro|MRFM|X|TOS|TN|COD|F-P|
+-+-----+---------------+---------------+---------------+---------------+------+---+----+-+---+--+---+---+
V 18396
0.0.0.0
0.0.0.0
P=0
P=0
-----0 ---- 0
0 -- --- 0-0
M 18404
0.0.0.0
0.0.0.0
0
0

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1082

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show tcam interface

0 ---- 0
0
R rslt: L3_DENY_RESULT

V 36828
0.0.0.0
0 ---- 0
0 -- --- 0-0
M 36836
0.0.0.0
0 ---- 0
0
R rslt: L3_DENY_RESULT (*)
Router#

Related Commands

rtr_rslt: L3_DENY_RESULT

0.0.0.0

P=0

P=0

0.0.0.0

0

0

------

rtr_rslt: L3_DENY_RESULT (*)

Command

Description

clear mls acl counters

Clears the MLS ACL counters.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1083

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show tech-support

show tech-support
To display information that is useful to Cisco TAC when reporting a problem, use the show
tech-support command.
show tech-support [cef | ipmulticast [vrf instance-number] | isis | password [page] | platform |
page | rsvp]

Syntax Description

Defaults

cef

(Optional) Displays CEF-related TAC information.

ipmulticast

(Optional) Displays IP multicast-related TAC information.

vrf
instance-number

(Optional) Specifies an VRF instance number.

isis

(Optional) Displays CLNS- and ISIS-related TAC information.

password

(Optional) Removes passwords and other security information in the output.

page

(Optional) Causes the output to display a page of information at a time.

platform

(Optional) Displays platform-specific TAC information.

rsvp

(Optional) Displays IP RSVP-related TAC information.

The defaults are as follows:
•

Outputs are displayed without page breaks.

•

Passwords and other security information are removed from the output.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

To interrupt and terminate the show tech-support output, simultaneously press and release the CTRL,
ALT, and 6 keys.
Press the Return key to display the next line of output, or press the Space bar to display the next page
of information. If you do not enter the page keyword, the output scrolls (that is, it does not stop for page
breaks).
If you do not enter the password keyword, passwords and other security-sensitive information in the
output are replaced with the label “.”
The show tech-support commands are a compilation of several show commands and can be lengthy.
For a sample display of the output of the show tech-support command, see the individual show
command listed.
If you enter the show tech-support command without arguments, the output displays, but is not limited
to, the equivalent of these show commands:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1084

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show tech-support

•

show version

•

show running-config

•

show stacks

•

show interfaces

•

show controllers

•

show process memory

•

show process cpu

•

show buffers

•

show logging

•

show module

•

show power

•

show environment

•

show interfaces switchport

•

show interfaces trunk

•

show vlan

•

show mac-address-table

•

show spanning-tree

If you enter the ipmulticast keyword, the output displays, but is not limited to, these show commands:
•

show ip pim interface

•

show ip pim interface count

•

show ip pim interface df

•

show ip pim mdt

•

show ip pim mdt bgp

•

show ip pim neighbor

•

show ip pim rp

•

show ip pim rp metric

•

show ip igmp groups

•

show ip igmp interface

•

show mls ip multicast rp-mapping gm-cache

•

show ip mroute count

•

show ip mroute

•

show ip mcache

•

show ip dvmrp route

•

show mmls msc rpdf-cache

•

show mmls gc process

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1085

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show tech-support

If you enter the isis keyword, the output displays the equivalent of the show isis commands.
If you enter the rsvp keyword, the output displays the equivalent of the show ip rsvp commands.

Examples

For a sample display of the show tech-support command output, see the commands that are listed in the
“Usage Guidelines” section.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1086

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show top counters interface report

show top counters interface report
To display TopN reports and information, use the show top counters interface report command.
show top counters interface report [number]

Syntax Description

number

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Number of the report to be displayed; valid values are from 1 to 5.

This command is supported on Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet ports only.
When you enter a TopN request, a round of polling is performed, the counters for all the applicable ports
in the Catalyst 6500 series switch are read, and the information is saved. The TopN process then sleeps
for the specified interval. After wakeup, another round of polling is performed and the counter
information from the ports is read. The difference between the two sets of data is stored. The ports are
then sorted, the ports choose from one of the seven types of statistics information, and a TopN report is
generated.
The port statistics will not be displayed in the following cases:

Note

•

If a port is not present during the first poll.

•

If a port is not present during the second poll.

•

If a port’s speed or duplex changes during the polling interval.

•

If a port’s type changes from Layer 2 to Layer 3 or Layer 3 to Layer 2 during the polling interval.

For the report display format, due to the 80 characters per line limitation, only 10 spaces are reserved
for the Tx/Rx-okts, Tx/Rx-bcst, and Tx/Rx-mcst columns. When these columns are larger than 10 digits,
the display wraps around to the next line.
When you start the TopN processes from a Telnet session and the Telnet session is terminated before the
TopN processes are completed, all the backgound TopN processes continue and generate the TopN
reports, but the foreground TopN processes are terminated once the Telnet session is terminated.
When the TopN report is being generated against a large number of ports (for example, 13 slot x 96
ports/slot) in a very short interval (10 seconds), the actual interval time between the first and second
polling may be longer than the specified interval time because polling takes time.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1087

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show top counters interface report

Examples

This example shows how to display TopN reports and information:
Router# show top counters interface
Id Start Time
Int
-- ---------------------------- --1 08:18:25 UTC Tue Nov 23 2004 76
2 08:19:54 UTC Tue Nov 23 2004 76
3 08:21:34 UTC Tue Nov 23 2004 76
4 08:26:50 UTC Tue Nov 23 2004 90
Router#

report
N
Sort-By
--- --------20 util
20 util
20 util
20 util

Status
------done
done
done
done

Owner
---------------------console
console
console
bambam onvty0 (9.10.69.13)

This example shows how to display TopN reports and information for a specific report:
Router# show top counters interface report 1
Started By
: console
Start Time
: 08:18:25 UTC Tue Nov 23 2004
End Time
: 08:19:42 UTC Tue Nov 23 2004
Port Type
: All
Sort By
: util
Interval
: 76 seconds
Port
Band Util Bytes
Packets
Broadcast Multicast In- Bufwidth
(Tx + Rx)
(Tx + Rx)
(Tx + Rx) (Tx + Rx) err ovflw
------- ----- ---- ----------- ----------- ---------- ---------- ---- ----Fa2/5
Fa2/48
Fa2/46
Fa2/47
Fa2/6
Fa2/44
Gi4/15
Gi4/14
Gi4/13
Gi4/12
Gi4/11
Gi4/10
Gi4/9
Gi4/8
Gi4/7
Gi4/6
Gi4/5
Gi4/4
Gi4/3
Gi4/2
Router#

100
100
100
100
100
100
1000
1000
1000
1000
1000
1000
1000
1000
1000
1000
1000
1000
1000
1000

50
35
25
22
15
10
0
0
0
0
0
0
0
0
0
0
0
0
0
0

726047564
508018905
362860697
323852889
217815835
145146009
0
0
0
0
0
0
0
776
0
0
0
0
776
0

11344488
7937789
5669693
4762539
3403372
2267900
0
0
0
0
0
0
0
2
0
0
0
0
2
0

11344487
0
0
4762495
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

1
43
43
43
39
43
0
0
0
0
0
0
0
2
0
0
0
0
2
0

0
0
0
0
21
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0

This example shows the display if you request a TopN report that is still in pending status:
Router# show top counters interface report 4
Id
Start time
Int N
Sort-by
Status
Owner (type/machine/user)
--- ------------------- --- --- ---------- -------- ------------------------4 1/24/2004,11:34:26 30 20 In-Errors pending Console//
Router#

Related Commands

Command

Description

clear top counters
interface report

Clears the TopN reports.

collect top counters
interface

Lists the TopN processes and specific TopN reports.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1088

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show udld

show udld
To display the administrative and operational UDLD status, use the show udld command.
show udld [interface-id | neighbors]

Syntax Description

interface-id

(Optional) Interface name.

neighbors

(Optional) Displays neighbor information only.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you do not enter an interface-id value, the administrative and operational UDLD status for all
interfaces is displayed.

Examples

This example shows how to display the UDLD state for a single interface:
Router# show udld gigabitethernet2/2
Interface Gi2/2
--Port enable administrative configuration setting: Follows device default
Port enable operational state: Enabled
Current bidirectional state: Bidirectional
Current operational state: Advertisement
Message interval: 60
Time out interval: 5
No multiple neighbors detected
Entry 1
--Expiration time: 146
Device ID: 1
Current neighbor state: Bidirectional
Device name: 0050e2826000
Port ID: 2/1
Neighbor echo 1 device: SAD03160954
Neighbor echo 1 port: Gi1/1
Message interval: 5
CDP Device name: 066527791
Router#

This example shows how to display neighbor information only:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1089

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show udld

Router# show udld neighbors
Port
Device Name
-------- -----------------------------Gi3/1
SAL0734K5R2
Gi4/1
SAL0734K5R2
Router#

Related Commands

Device ID
-----------1
1

Port-ID
------Gi4/1
Gi3/1

OperState
-------------Bidirectional
Bidirectional

Command

Description

udld

Enables aggressive or normal mode in UDLD and sets the configurable
message time.

udld port

Enables UDLD on the interface or enables UDLD in aggressive mode on the
interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1090

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show version

show version
To display the configuration of the system hardware, the software version, the names and sources of
configuration files, and the boot images, use the show version command.
show version

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display the configuration of the system hardware, the software version, the
names and sources of configuration files, and the boot images:
Router# show version
Cisco Internetwork Operating System Software
IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly.E020626) NIG
HTLY BUILD
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Wed 26-Jun-02 06:20 by
Image text-base: 0x40008BF0, data-base: 0x419BA000
ROM: System Bootstrap, Version 12.1(11r)E1, RELEASE SOFTWARE (fc1)
Router uptime is 2 weeks, 8 hours, 48 minutes
Time since Router switched to active is 1 minute
System returned to ROM by power-on (SP by power-on)
System image file is "sup-bootflash:c6sup22-jsv-mz"
cisco Catalyst 6000 (R7000) processor with 112640K/18432K bytes of memory.
Processor board ID SAD06210067
R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
3 Virtual Ethernet/IEEE 802.3 interface(s)
48 FastEthernet/IEEE 802.3 interface(s)
381K bytes of non-volatile configuration memory.
16384K bytes of Flash internal SIMM (Sector size 512K).
Configuration register is 0x2102
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1091

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show version

Table 2-88 describes the fields that are shown in the example.
Table 2-88 show version Field Descriptions

Field

Description

IOS (tm) c6sup2_rp Software
(c6sup2_rp-JSV-M), Version
12.1(nightly.E020626)
NIGHTLY BUILD

Version number. Always specify the complete version number
when reporting a possible software problem. In the example output,
the version number is 12.1.

ROM: System Bootstrap,
Version 12.1(11r)E1,
RELEASE SOFTWARE (fc1)

Bootstrap version string.

BOOTFLASH: 7200 Software
(C7200-BOOT-M), Version
11.1(472), RELEASE
SOFTWARE

Boot version string.

Router uptime is

Amount of time that the system has been up and running.

Time since Router switched to
active

Amount of time since switchover occurred.

System restarted by

Log of how the system was last booted, both as a result of normal
system startup and of system error. For example, information can
be displayed to indicate a bus error that is typically the result of an
attempt to access a nonexistent address, as follows:
System restarted by bus error at PC 0xC4CA, address 0x210C0C0

System image file is

If the software was booted over the network, the Internet address of
the boot host is shown. If the software was loaded from onboard
ROM, this line reads “running default software.”

cisco Catalyst 6000 (R7000)
processor with
112640K/18432K bytes of
memory.

Remaining output in each display that shows the hardware
configuration and any nonstandard software options.

Configuration register is

Configuration register contents that are displayed in hexadecimal
notation.

The output of the show version EXEC command can provide certain messages, such as bus error
messages. If such error messages appear, report the complete text of this message to your technical
support specialist.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1092

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan

show vlan
To display VLAN information, use the show vlan command.
show vlan [{brief | {id vlan-id} | {name name} [ifindex]} | ifindex]

Syntax Description

brief

(Optional) Displays only a single line for each VLAN, naming the VLAN,
status, and ports.

id vlan-id

(Optional) Displays information about a single VLAN that is identified by a
VLAN ID number; valid values are from 1 to 4094.

name name

(Optional) Displays information about a single VLAN that is identified by
VLAN name; valid values are an ASCII string from 1 to 32 characters.

ifindex

(Optional) Displays the VLAN’s ifIndex number.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Each Ethernet switch port and Ethernet repeater group belong to only one VLAN. Trunk ports can be on
multiple VLANs.
If you shut down a VLAN using the state suspend or the state active command, these values appear in
the Status field:
•

suspended—VLAN is suspended.

•

active—VLAN is active.

If you shut down a VLAN using the shutdown command, these values appear in the Status field:
•

act/lshut—VLAN status is active but shut down locally.

•

sus/lshut—VLAN status is suspended but shut down locally.

If a VLAN is shut down internally, these values appear in the Status field:
•

act/ishut—VLAN status is active but shut down internally.

•

sus/ishut—VLAN status is suspended but shut down internally.

If a VLAN is shut down locally and internally, the value that is displayed in the Status field is act/ishut
or sus/ishut. If a VLAN is shut down locally only, the value that is displayed in the Status field is
act/lshut or sus/lshut.
Separate VLAN ranges with a hyphen, and separate VLANs with a comma and no spaces in between.
For example, you can enter the following:
Router# show vlan id 1-4,3,7,5-20

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1093

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan

Examples

This example shows the ouput for a VLAN (VLAN0002) that is active but shut down internally:
Router# show vlan
VLAN Name
---- -------------------------------1
default
2
VLAN0002
<...Output truncated...>

Status
--------active
act/ishut

Ports
------------------------------Fa5/9
Fa5/9

This example shows the ouput for a VLAN (VLAN0002) that is active but shut down locally:
Router# show vlan
VLAN Name
---- -------------------------------1
default
2
VLAN0002
<...Output truncated...>

Status
--------active
act/lshut

Ports
------------------------------Fa5/9
Fa5/9

This example shows how to display the VLAN parameters for all VLANs within the administrative
domain:
Router# show vlan
VLAN Name
---- -------------------------------1
default
2
VLAN0002
3
VLAN0003
4
VLAN0004
5
VLAN0005
6
VLAN0006
<...Output truncated...>

Status
--------active
active
active
active
active
active

Ports
------------------------------Fa5/9
Fa5/9
Fa5/9
Fa5/9
Fa5/9
Fa5/9

1004 fddinet-default
1005 trbrf-default

active
active

Fa5/9
Fa5/9

VLAN
---1
2
3
4
5
6
10

Type
----enet
enet
enet
enet
enet
enet
enet

SAID
---------100001
100002
100003
100004
100005
100006
100010

MTU
----1500
1500
1500
1500
1500
1500
1500

Parent
------

RingNo
------

BridgeNo
--------

Stp
----

BrdgMode
--------

Trans1
-----0
0
303
304
305
0
0

Trans2
-----0
0
0
0
0
0
0

<...Output truncated...>
Remote SPAN VLANs
----------------2, 20
Primary Secondary Type
Ports
------- --------- ----------------- -----------------------------------------Router#

This example shows how to display the VLAN name, status, and associated ports only:
Router# show vlan brief
VLAN Name
---- -------------------------------1
default
2
VLAN0002
3
VLAN0003
4
VLAN0004

Status
--------active
active
act/lshut
act/lshut

Ports
------------------------------Fa5/9
Fa5/9
Fa5/9
Fa5/9

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1094

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan

5
VLAN0005
10
VLAN0010
.
.
.
999 VLAN0999
1002 fddi-default
1003 trcrf-default
1004 fddinet-default
1005 trbrf-default
Router#

active
active

Fa5/9
Fa5/9

active
active
active
active
active

Fa5/9
Fa5/9
Fa5/9
Fa5/9
Fa5/9

This example shows how to display the VLAN parameters for multiple VLANs:
Router# show vlan id 1-4,3,7,5-20
VLAN
---1
2
3
4
5
6
10
20

Name
-------------------------------default
VLAN0002
VLAN0003
VLAN0004
VLAN0005
VLAN0006
VLAN0010
VLAN0020

VLAN
---1
2
3
4
5
6
10
20

Type
----enet
enet
enet
enet
enet
enet
enet
enet

SAID
---------100001
100002
100003
100004
100005
100006
100010
100020

MTU
----1500
1500
1500
1500
1500
1500
1500
1500

Parent
------

Status
Ports
--------- -----------------------------active
Fa5/7, Fa5/12
active
act/lshut
act/lshut
active
active
active
active

RingNo
------

BridgeNo
--------

Stp
----

BrdgMode
--------

Trans1
-----0
0
303
304
305
0
0
0

Trans2
-----0
0
0
0
0
0
0
0

Remote SPAN VLANs
------------------------------------------------------------------------------

Primary Secondary Type
Ports
------- --------- ----------------- -----------------------------------------Router#

This example shows how to display the ifIndex number for VLAN 10 only:
Router# show vlan id 10 ifindex
VLAN Ifindex
---- ------10
37
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1095

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan

Table 2-89 describes the fields that are shown in the example.
Table 2-89 show vlan Command Output Fields

Related Commands

Field

Description

VLAN

VLAN number.

Name

Name, if configured, of the VLAN.

Status

Status of the VLAN (active or suspend, act/lshut or sus/lshut, or act/ishut
or sus/ishut).

Ports

Ports that belong to the VLAN.

Type

Media type of the VLAN.

SAID

Security association ID value for the VLAN.

MTU

Maximum transmission unit size for the VLAN.

Parent

Parent VLAN, if one exists.

RingNo

Ring number for the VLAN, if applicable.

BrdgNo

Bridge number for the VLAN, if applicable.

Stp

Spanning Tree Protocol type that is used on the VLAN.

BrdgMode

Bridging mode for this VLAN—possible values are SRB and SRT; the
default is SRB.

AREHops

Maximum number of hops for All-Routes Explorer frames—possible
values are 1 through 13; the default is 7.

STEHops

Maximum number of hops for Spanning Tree Explorer frames—possible
values are 1 through 13; the default is 7.

Backup CRF

Status of whether the TrCRF is a backup path for traffic.

Ifindex

Number of the ifIndex.

Remote SPAN VLAN

RSPAN status.

Primary

Number of the primary VLAN.

Secondary

Number of the secondary VLAN.

Ports

Indicates the ports within a VLAN.

Type

Type of VLAN—Possible values are primary, isolated, community,
nonoperation, or normal.

Command

Description

show vlan private-vlan Displays PVLAN information.
vlan (config-VLAN
submode)

Configures a specific VLAN.

vtp

Configures the global VTP state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1096

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan access-log

show vlan access-log
To display information about the VACL logging including the configured logging properties, flow table
contents, and statistics, use the show vlan access-log command.
show vlan access-log config
show vlan access-log flow protocol {{src-addr src-mask} | any | {host {hostname | host-ip}}}
{{dst-addr dst-mask} | any | {host {hostname | host-ip}}} [vlan vlan-id]
show vlan access-log statistics

Syntax Description

config

Displays the configured VACL-logging properties.

flow

Displays the contents of the VACL-flow table.

protocol

Protocol name or number; valid values are icmp, igmp, ip, tcp, udp, or
numbers from 0 to 255 to designate a protocol.

src-addr src-mask

Source address and mask.

any

Displays information for any host.

host hostname

Displays information for a hostname.

host host-ip

Displays information for an IP address.

dst-addr dst-mask

Destination address and mask.

vlan vlan-id

(Optional) Displays information for a specific VLAN; valid values are
from 1 to 4094.

statistics

Displays packet and message counts and other statistics.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This command shows how to display the configured VACL-logging properties:
Router# show vlan access-log config
VACL Logging Configuration:
max log table size
:500
log threshold
:4000
rate limiter
:3000
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1097

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan access-log

This example shows how to display the VACL statistics:
Router# show vlan access-log statistics
VACL Logging Statistics:
total packets
:0
logged
:0
dropped
:0
Dropped Packets Statistics:
unsupported protocol
:0
no packet buffer
:0
hash queue full
:0
flow table full
:0
Misc Information:
VACL Logging LTL Index :0x7E02
free packet buffers
:8192
log messages sent
:0
log table size
:0
Router#

Related Commands

Command

Description

vlan access-log

Configures the VACL-logging properties, including the log-table size,
redirect-packet rate, and logging threshold.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1098

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan access-map

show vlan access-map
To display the contents of a VLAN-access map, use the show vlan access-map command.
show vlan access-map [map-name]

Syntax Description

map-name

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) VLAN access-map name.

This command shows how to display the contents of a VLAN-access map:
Router# show vlan access-map mordred
Vlan access-map "mordred" 1
match: ip address 13
action: forward capture
Router#
show vlan counters

Related Commands

Command

Description

action

Sets the packet action clause.

match

Specifies the match clause by selecting one or more ACLs for a VLAN
access-map sequence.

vlan access-map

Creates a VLAN access map or enters VLAN access-map command mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1099

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan counters

show vlan counters
To display the software-cached counter values, use the show vlan counters command.
show vlan [id vlanid] counters

Syntax Description

id vlanid

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Displays the software-cached counter values for a specific VLAN; valid
values are from 1 to 4094.

The show vlan id counters command is not supported on SVIs.
For Layer 2 and Layer 3 VLAN interfaces and router ports, per-interface switching statistics and
VLAN-counter information to the PISA are exported approximately every 3 minutes.
If you enter the show vlan counters command with no arguments, the software-cached counter values
for all VLANs are displayed.

Examples

This example shows how to display the software-cached counter values for a specific VLAN:
Router> show vlan id 205 counters
VLAN vlanid 205
L2-Unicast-Pkts
10
L3-In-Unicast-Pkts
0
L3-Out-Unicast-Pkts 0
L2-NonUnicast-Pkts + L3-In-NonUnicast-Pkts 5
L3-Out-NonUnicast-Pkts
6
L2-Unicast-Octets 6
L3-In-Unicast-Octets 6
L3-Out-Unicast-Octets 6
L2-NonUnicast-Octets + L3-In-NonUnicast-Octets 6
L3-Out-NonUnicast-Octets 6

Related Commands

Command

Description

clear vlan counters

Clears the software-cached counter values to zero for a specified VLAN or
all existing VLANs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1100

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan dot1q tag native

show vlan dot1q tag native
To display native VLAN-tagging information, use the show vlan dot1q tag native command.
show vlan dot1q tag native

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display native VLAN-tagging information:
Router# show vlan dot1q tag native
dot1q native vlan tagging is enabled
Internal dot1q native vlan: 1015
Router#

Related Commands

Command

Description

vlan dot1q tag native

Enables 802.1Q tagging for all VLANs in a trunk.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1101

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan filter

show vlan filter
To display information about the VLAN filter, use the show vlan filter command.
show vlan filter [{access-map map-name} | {vlan vlan-id} | {interface interface
interface-number}]

Syntax Description

access-map
map-name

(Optional) Displays the VLANs that are filtered by the specified map.

vlan vlan-id

(Optional) Displays the filter for the specified VLAN; valid values are from 1
to 4094.

interface
interface

Specifies the interface type; valid values are pos, atm, or serial. See the
“Usage Guidelines” section for additional information.

interface-number Interface number; see the “Usage Guidelines” section for additional
information.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The show vlan filter map-name interface command accepts only ATM, POS, or serial interface types.
If your system is not configured with any of these interface types, the interface interface
interface-number keyword and arguments are not provided.
The interface-number argument designates the module and port number. Valid values for
interface-number depend on the specified interface type and the chassis and module that are used. For
example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module
that is installed in a 13-slot chassis, valid values for the module number are from 2 to 13 and valid values
for the port number are from 1 to 48.
If you do not specify an optional keyword and argument, all mappings are displayed. If you enter access-map
map_name, all the VLANs and interfaces that are associated with the specified map are shown. If you enter
vlan vlan-id or interface interface interface-number, its associated access map, if existing, is shown.
In the output for VACLs on VLANs, the following applies:
•

Configured on VLANs—User configured

•

Active on VLANs—VLAN list on which the VACL is active

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1102

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan filter

Examples

This example shows how to display mappings between the VACLs and the VLANs and the VACLs and
the interfaces:
Router# show vlan filter
VLAN Map mordred:
Configured on VLANs: 2,4-6
Active on VLANs: 2,4-6
Router#

Related Commands

Command

Description

vlan access-map

Creates a VLAN access map or enters VLAN access-map command mode.

vlan filter

Applies a VLAN access map.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1103

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan internal usage

show vlan internal usage
To display information about the internal VLAN allocation, use the show vlan internal usage
command.
show vlan [id vlan-id] internal usage

Syntax Description

id vlan-id

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Displays information about the internal VLAN allocation for the
specified VLAN; valid values are from 1 to 4094.

In some cases, the output displays the following:
workaround vlan

A workaround VLAN is used to enable the PFC-based policing on the PWAN1 main interface. Without
the workaround VLAN, the packets hit the PFC policer twice for PWAN1 because the same VLAN is
used when packets traverse the local bus before and after PXF processing.

Usage Guidelines

Entering the show vlan internal usage command displays the Ethernet interfaces.

Examples

This example shows how to display the current internal VLAN allocation:
Router# show vlan internal usage
VLAN
---1025
1026
1027
1028
1029
1030
1032
1033
1129

Usage
-------------------Port-channel6
GigabitEthernet1/2
FastEthernet3/20
FastEthernet3/21
-

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1104

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan internal usage

This example shows how to display the internal VLAN allocation for a specific VLAN:
Router# show vlan id 1030 internal usage
VLAN Usage
---- -------------------1030 GigabitEthernet1/2

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1105

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan mapping

show vlan mapping
To register a mapping of an 802.1Q VLAN to an ISL VLAN, use the show vlan mapping command.
show vlan mapping

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to list the map for an 802.1Q VLAN to an ISL VLAN:
Router# show vlan mapping
802.1Q Trunk Remapped VLANs:
802.1Q VLAN ISL VLAN
----------- ----------101
202
200
330
Router#

Related Commands

Command

Description

show interfaces vlan
mapping

Displays the status of a VLAN mapping on a port.

switchport vlan
mapping enable

Enables VLAN mapping per switch port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1106

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan private-vlan

show vlan private-vlan
To display PVLAN information, use the show vlan private-vlan command.
show vlan private-vlan [type]

Syntax Description

type

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

(Optional) Displays the PVLAN type (isolated, community, or primary).

Usage Guidelines

In the show vlan private-vlan type command output display, “normal” displayed as a type indicates a
regular VLAN that is configured in a PVLAN. A display of “normal” means that two VLANs have been
associated before the type was set and that the PVLAN is not operational. This information is useful for
debugging purposes.

Examples

This example shows how to display information about all currently configured PVLANs:
Router# show vlan private-vlan
Primary
------2
2
100
150

401
Router#

Secondary
--------301
302
10
101
151
202
303
402

Type
Ports
----------------- -----------------------------------------community
Fa5/3, Fa5/25
community
community
isolated
non-operational
community
community
non-operational

This example shows how to display information about all currently configured PVLAN types:
Router# show vlan private-vlan type
Vlan
---202
303
304
305
306
307

Type
----------------primary
community
community
community
community
community

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1107

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan private-vlan

308 normal
309 community
440 isolated
Router#

Table 2-90 describes the fields that are shown in the example.
Table 2-90 show vlan private-vlan Command Output Fields

Related Commands

Field

Description

Primary

Number of the primary VLAN.

Secondary

Number of the secondary VLAN.

Secondary-Type

Secondary VLAN type—Possible values are isolated or community.

Ports

Indicates the ports within a VLAN.

Type

Type of VLAN—Possible values are primary, isolated, community,
nonoperation, or normal.

Command

Description

private-vlan mapping

Creates a mapping between the primary and the secondary VLANs so that
both VLANs share the same primary VLAN SVI.

private-vlan

Configures PVLANs and the association between a PVLAN and a
secondary VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1108

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan remote-span

show vlan remote-span
To display a list of RSPAN VLANs, use the show vlan remote-span command.
show vlan remote-span

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to display a list of remote SPAN VLANs:
Router# show vlan remote-span
Remote SPAN VLANs
-----------------------------------------------------------------------------2,20

Related Commands

Command

Description

remote-span

Configures a VLAN as an RSPAN VLAN.

vlan (config-VLAN
submode)

Configures a specific VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1109

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlans

show vlans
To display information about the Cisco IOS VLAN subinterfaces, use the show vlans command.
show vlans [vlan]

Syntax Description

vlan

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) VLAN ID number; valid values are from 1 to 4094.

The EXEC show vlan command displays information about the Layer 2 VLAN. The privileged EXEC
show vlans command displays information about the VLAN subinterface in Layer 3.
When entering the show vlans command, you cannot shorten the vlans keyword.

Examples

This example shows how to display information about the Cisco IOS VLAN subinterfaces:
Router# show vlans
Virtual LAN ID: 122 (Inter Switch Link
VLAN Trunk Interface: GE-WAN9/1.1
Protocols Configured: Address:
IP
10.122.0.2
Virtual LAN ID: 123 (Inter Switch Link
VLAN Trunk Interface: GE-WAN9/1.2
Protocols Configured: Address:
IP
10.123.0.2
Virtual LAN ID: 124 (Inter Switch Link
VLAN Trunk Interface: GE-WAN9/1.3
Protocols Configured: Address:
IP
10.124.0.2
Virtual LAN ID: 133 (Inter Switch Link
VLAN Trunk Interface: GE-WAN9/3.1
Protocols Configured: Address:
IP
11.133.0.1
Virtual LAN ID: 134 (Inter Switch Link
VLAN Trunk Interface: GE-WAN9/3.2
Protocols Configured: Address:
IP
11.134.0.1
Router#

Encapsulation)
Received:

Transmitted:
18

16

Encapsulation)
Received:

Transmitted:
13

16

Encapsulation)
Received:

Transmitted:
0

17

Encapsulation)
Received:

Transmitted:
0

1

Encapsulation)
Received:

Transmitted:
0

1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1110

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlans

Table 2-91 describes the fields that are shown in the example.
Table 2-91 show vlans Command Output Fields

Field

Description

Virtual LAN ID

Domain number of the VLAN.

VLAN Trunk Interface

Subinterface carrying the VLAN traffic.

Protocols Configured

Protocols that are configured on the VLAN.

Address

Network address.

Received

Number of packets that are received.

Transmitted

Number of packets that are transmitted.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1111

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vlan virtual-port

show vlan virtual-port
To display the number of logical virtual ports required, use the show vlan virtual-port command.
show vlan virtual-port [slot num]

Syntax Description

slot num

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

(Optional) Specifies the slot number of which status is to be displayed.

This example shows how to display the number of logical virtual ports that are required for a specific
slot:
Router# show vlan virtual-port slot 3
Slot 3
Port
Virtual-ports
------------------------Fa3/1
1
Fa3/2
1
Fa3/3
1
Fa3/4
1
Fa3/5
1
Fa3/6
1
Fa3/7
1
Fa3/8
1
Fa3/11
1
Fa3/12
1
Fa3/13
1
.
.
.
Fa3/33
4
Fa3/34
4
Fa3/35
4
Fa3/36
4
Fa3/37
4
Fa3/38
4
Fa3/39
4
Fa3/40
4
Total virtual ports:82
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1112

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vlan virtual-port

This example shows how to display the number of logical virtual ports that are required for all slots:
Router# show vlan virtual-port
Slot 1
------Total slot virtual ports 1
Slot 3
------Total slot virtual ports 82
Slot 4
------Total slot virtual ports 4
Total chassis virtual ports 87
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1113

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vtp

show vtp
To display the VTP statistics and domain information, use the show vtp command.
show vtp {counters | status}

Syntax Description

counters

Displays information about the VTP statistics.

status

Displays information about the VTP domain status.

Defaults

This command has no default settings.

Command Modes

EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

In the output of the show vtp status command, the last modified time is of the modifier itself, for
example, the time displayed in the line “Configuration last modified by 7.0.22.11 at 5-5-06 05:51:49”,
is the time that the modifier (7.0.22.11) last modified the VLAN configuration.

Examples

This example shows how to display the VTP statistics:
Router# show vtp counters
VTP statistics:
Summary advertisements received
Subset advertisements received
Request advertisements received
Summary advertisements transmitted
Subset advertisements transmitted
Request advertisements transmitted
Number of config revision errors
Number of config digest errors
Number of V1 summary errors

:
:
:
:
:
:
:
:
:

1
1
0
31
1
0
0
0
0

VTP pruning statistics:
Trunk

Join Transmitted Join Received

Summary advts received from
non-pruning-capable device
---------------- ---------------- ---------------- --------------------------Fa5/9
1555
1564
0
Router#

This example shows how to display the status of the VTP domain:
Router# show vtp status
VTP Version
: 2
Configuration Revision
: 250
Maximum VLANs supported locally : 1005

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1114

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
show vtp

Number of existing VLANs
: 33
VTP Operating Mode
: Server
VTP Domain Name
: Lab_Network
VTP Pruning Mode
: Enabled
VTP V2 Mode
: Enabled
VTP Traps Generation
: Disabled
MD5 digest
: 0xE6 0xF8 0x3E 0xDD 0xA4 0xF5 0xC2 0x0E
Configuration last modified by 172.20.52.18 at 9-22-99 11:18:20
Local updater ID is 172.20.52.18 on interface Vl1 (lowest numbered VLAN interfac
e found)
Router#

This example shows how to display only those lines in the show vtp output that contain the word
Summary:
Router# show vtp counters | include Summary
Summary advertisements received
: 1
Summary advertisements transmitted : 32
Trunk
Join Transmitted Join Received
Router#

Summary advts received from

Table 2-92 describes the fields that are shown in the example.
Table 2-92 show vtp Command Output Fields

Field

Description

Summary advts received

Total number of summary advts that are received.

Subset advts received

Total number of subset advts that are received.

Request advts received

Total number of request advts that are received.

Summary advts transmitted

Total number of summary advts that are transmitted.

Subset advts transmitted

Total number of subset advts that are transmitted.

Request advts transmitted

Total number of request advts that are transmitted.

No of config revision errors

Number of config revision errors.

No of config digest errors

Number of config revision digest errors.

Trunk

Trunk port participating in VTP pruning.

Join Transmitted

Number of VTP-Pruning Joins that are transmitted.

Join Received

Number of VTP-Pruning Joins that are received.

Summary advts received from Number of Summary advts that are received from
non-pruning-capable device
nonpruning-capable devices.
Number of existing VLANs

Total number of VLANs in the domain.

Configuration Revision

VTP revision number that is used to exchange VLAN information.

Maximum VLANs supported
locally

Maximum number of VLANs that are allowed on the device.

Number of existing VLANs

Number of existing VLANs.

VTP Operating Mode

Status on whether VTP is enabled or disabled.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1115

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

show vtp

Table 2-92 show vtp Command Output Fields (continued)

Related Commands

Field

Description

VTP Domain Name

Name of the VTP domain.

VTP Pruning Mode

Status on whether VTP pruning is enabled or disabled.

VTP V2 Mode

Status of the VTP V2 mode as server, client, or transparent.

VTP Traps Generation

Status on whether VTP-trap generation mode is enabled or disabled.

MD5 digest

Checksum values.

Command

Description

vtp

Configures the global VTP state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1116

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
shutdown vlan

shutdown vlan
To shut down local traffic on a specified VLAN, use the shutdown vlan command. To restart local
traffic on the VLAN, use the no form of this command.
shutdown vlan vlan-id
no shutdown vlan vlan-id

Syntax Description

vlan-id

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

VLAN number of the VLAN to be locally shut down; valid values are from
2 to 1001.

Usage Guidelines

This command does not support extended-range VLANs.

Examples

This example shows how to shut down traffic on VLAN 2:
Router(config)# shutdown vlan 2
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1117

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp ifindex clear

snmp ifindex clear
To clear any previously configured snmp ifindex commands that were issued for a specific interface,
use the snmp ifindex clear command.
snmp ifindex clear

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interface-index persistence occurs when ifIndex values in the IF-MIB persist across reboots and allow
for consistent identification of specific interfaces using SNMP.
Use the snmp ifindex clear command on a specific interface when you want that interface to use the
global configuration setting for ifIndex persistence. This command clears any ifIndex-configuration
commands that were previously entered for that specific interface.
When you clear the ifIndex configuration, the ifIndex persistence is enabled for all interfaces as
specified by the snmp-server ifindex persist command in global configuration mode.

Examples

This example shows how to enable ifIndex persistence for all interfaces:
Router(config)# snmp ifindex persist

This example shows how to disable IfIndex persistence for Ethernet 0/1 only:
Router(config)# interface ethernet 0/1
Router(config-if)# no snmp ifindex persist
Router(config-if)# exit

This example shows how to clear the ifIndex configuration from the Ethernet 0/1 configuration:
Router(config)# interface ethernet 0/1
Router(config-if)# snmp ifindex clear
Router(config-if)# exit

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1118

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
snmp ifindex clear

Related Commands

Command

Description

snmp ifindex persist

Enables ifIndex values in the Interfaces MIB (IF-MIB) that persist across
reboots (ifIndex persistence) only on a specific interface.

snmp-server ifindex
persist

Enables ifIndex values globally so that they will remain constant across
reboots for use by SNMP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1119

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp ifindex persist

snmp ifindex persist
To enable ifIndex values in the Interfaces MIB (IF-MIB) that persist across reboots (ifIndex persistence)
only on a specific interface, use the snmp ifindex persist command. To disable ifIndex persistence only
on a specific interface, use the no form of this command.
snmp ifindex persist
no snmp ifindex persist

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interface index persistence occurs when ifIndex values in the IF-MIB persist across reboots and allow
for consistent identification of specific interfaces using SNMP.
The snmp ifindex persist command in interface configuration mode enables and disables ifIndex
persistence for individual entries (that correspond to individual interfaces) in the ifIndex table of the
IF-MIB.
The snmp-server ifindex persist command in global configuration mode enables and disables ifIndex
persistence for all interfaces on the routing device. This action applies only to interfaces that have
ifDescr and ifIndex entries in the ifIndex table of the IF-MIB.
IfIndex commands that you configure for an interface apply to all subinterfaces on that interface.

Examples

This example shows how to enable ifIndex persistence for interface Ethernet 0/1 only:
Router(config)# interface ethernet 0/1
Router(config-if)# snmp ifindex persist
Router(config-if)# exit

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1120

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
snmp ifindex persist

This example shows how to enable ifIndex persistence for all interfaces and then disable ifIndex
persistence for interface Ethernet 0/1 only:
Router(config)# snmp ifindex persist
Router(config)# interface ethernet 0/1
Router(config-if)# no snmp ifindex persist
Router(config-if)# exit

Related Commands

Command

Description

snmp ifindex clear

Clears any previously configured snmp ifindex commands that were issued
for a specific interface.

snmp-server ifindex
persist

Enables ifIndex values globally so that they remain constant across reboots
for use by SNMP.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1121

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp-server enable traps

snmp-server enable traps
To enable the SNMP notifications (traps or informs) that are available on your system, use the
snmp-server enable traps command. To disable all available SNMP notifications, use the no form of
this command.
snmp-server enable traps [notification-type]
no snmp-server enable traps [notification-type]

Syntax Description

notification-type

Defaults

This command is disabled by default. Most notification types are disabled. However, some notification
types cannot be controlled with this command.

(Optional) Type of notification (trap or inform) to enable or disable. If no
type is specified, all notifications that are available on your device are
enabled or disabled. See the “Usage Guidelines” section for valid values.

If you enter this command without a notification-type, all notification types that are controlled by this
command are enabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

For additional notification types, refer to the Cisco IOS Release 12.2 Command Reference.
SNMP notifications can be sent as traps or inform requests. This command enables both traps and inform
requests for the specified notification types. To specify whether the notifications should be sent as traps
or informs, use the snmp-server host [traps | informs] command.
If you do not enter an snmp-server enable traps command, no notifications that are controlled by this
command are sent. To configure the router to send these SNMP notifications, you must enter at least one
snmp-server enable traps command. If you enter the command with no keywords, all notification types
are enabled. If you enter the command with a keyword, only the notification type that is related to that
keyword is enabled. To enable multiple types of notifications, you must issue a separate
snmp-server enable traps command for each notification type and notification option.
The snmp-server enable traps command is used with the snmp-server host command. Use the
snmp-server host command to specify which host or hosts receive SNMP notifications. To send
notifications, you must configure at least one snmp-server host command.
The following list of MIBs are used for the traps:
•

chassis—Controls the chassisAlarm traps from the CISCO-STACK-MIB

•

flash—Controls SNMP flash traps from the CISCO-FLASH-MIB
– insertion—Controls the SNMP flash insertion-trap notifications

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1122

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
snmp-server enable traps

– removal—Controls the SNMP flash removal-trap notifications
•

fru-ctrl—Controls the FRU-control traps from the CISCO-ENTITY-FRU-CONTROL-MIB

•

module—Controls the SNMP-module traps from the CISCO-STACK-MIB

•

stpx—Controls all the traps from the CISCO-STP-EXTENSIONS-MIB

•

vlancreate—Controls the SNMP VLAN-created trap notifications

•

vlandelete—Controls the SNMP VLAN-deleted trap notifications

•

vtp—Controls the VTP traps from the CISCO-VTP-MIB

The following SNMP-server enable traps are supported:

Examples

•

bridge—Controls the STP Bridge MIB traps

•

c6kxbar—Controls the c6kxbar intbus-crcexcd intbus-crcrcvrd swbus trap

•

csg—Controls the CSG agent quota database traps

•

flex-links—Controls the flex-links status traps

•

mac-notification—Controls the MAC-Notification move threshold traps

•

stpx—Controls the STPX inconsistency root-inconsistency loop-inconsistency traps

•

vlan-mac-limit—Controls the Layer 2 control VLAN MAC limit notifications traps

This example shows how to send all traps to the host that are specified by the name myhost.cisco.com,
using the community string that is defined as public:
Router(config)# snmp-server enable traps
Router(config)# snmp-server host myhost.cisco.com public

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1123

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp-server enable traps transceiver type all

snmp-server enable traps transceiver type all
To enable all supported SNMP transceiver traps for all transceiver types, use the snmp-server enable
traps transceiver type all command. To disable the transceiver SNMP trap notifications, use the no
form of this command.
snmp-server enable traps transceiver type all
no snmp-server enable traps transceiver type all

Syntax Description

The command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The snmp-server enable traps command is used with the snmp-server host command. Use the
snmp-server host command to specify which host or hosts receive SNMP notifications. To send
notifications, you must configure at least one snmp-server host command.

Examples

This example shows how to enable all supported SNMP transceiver traps for all transceiver types:
Router(config)# snmp-server enable traps transceiver type all
Router(config)#

Related Commands

Command

Description

show interfaces
transceiver

Displays information about the optical transceivers that have DOM enabled.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1124

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
snmp-server ifindex persist

snmp-server ifindex persist
To enable ifIndex values globally so that they will remain constant across reboots for use by SNMP, use
the snmp-server ifindex persist command. To disable ifIndex persistence globally, use the no form of
this command.
snmp-server ifindex persist
no snmp-server ifindex persist

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interface-index persistence occurs when ifIndex values in the IF-MIB persist across reboots and allow
for consistent identification of specific interfaces using SNMP.
The snmp-server ifindex persist command in global configuration mode does not override
interface-specific configurations. To override the interface-specific configuration of ifIndex persistence,
enter the [no] snmp ifindex persist and snmp ifindex clear commands in interface configuration mode.
Entering the [no] snmp-server ifindex persist command in global configuration mode enables and
disables ifIndex persistence for all interfaces on the routing device using ifDescr and ifIndex entries in
the ifIndex table of the IF-MIB.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1125

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp-server ifindex persist

Examples

This example shows how to enable ifIndex persistence for all interfaces:
Router(config)# snmp-server ifindex persist
Router(config)#

Note

Related Commands

This example shows that if ifIndex persistence was previously disabled for a specific interface using the
no snmp ifindex persist command in interface configuration mode, ifIndex persistence remains
disabled for that interface. The global ifIndex command does not override the interface-specific
commands.

Command

Description

snmp ifindex clear

Clears any previously configured snmp ifindex commands that were issued
for a specific interface.

snmp ifindex persist

Enables ifIndex values in the Interfaces MIB (IF-MIB) that persist across
reboots (ifIndex persistence) only on a specific interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1126

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
snmp-server source-interface

snmp-server source-interface
To specify the interface from which a SNMP trap originates the informs or traps, use the snmp-server
source-interface command. To remove the source designation, use the no form of the comman
snmp-server source-interface {traps | informs} interface
no snmp-server source-interface {traps | informs} [interface]

Syntax Description

traps

Specifies SNMP traps.

informs

Specifies SNMP informs.

interface

Specifies the interface type and the module and port number of the source
interface.

Defaults

No interface is designated.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The source interface must have an IP address.
Enter the interface argument in the following format: interface-type/module/port.
An SNMP trap or inform sent from a Cisco SNMP server has a notification IP address of the interface
it went out of at that time. Use this command to monitor notifications from a particular interface.

Examples

This example shows how to specify that the interface gigabitethernet5/2 is the source for all informs:
Router(config)# snmp-server source-interface informs gigabitethernet5/2
Router(config)#

This example shows how to specify that the interface gigabitethernet5/3 is the source for all traps:
Router(config)# snmp-server source-interface traps gigabitethernet5/3
Router(config)#

This example shows how to remove the source designation for all traps for a specific interface:
Router(config)# no snmp-server source-interface traps gigabitethernet5/3
Router(config)#

Related Commands

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1127

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp-server source-interface

Command

Description

snmp-server
trap-source interface

Specifies the interface from which a SNMP trap should originate. This
command has been replaced by the snmp-server source-interface
command.

snmp-server enable
traps

Enables a router to send SNMP traps and informs.

snmp-server host

Specifies the recipient of a SNMP notification operation.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1128

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
snmp-server trap authentication unknown-context

snmp-server trap authentication unknown-context
To enable the authorization failure traps during an unknown context error, use the snmp-server trap
authentication unknown-context command. To disable the the authorization failure traps, use the no
form of this command.
snmp-server trap authentication unknown-context
no snmp-server trap authentication unknown-context

Syntax Description

This command has no arguments or keywords.

Defaults

No authFail traps are generated.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable the authorization failure traps during an unknown context error:
Router(config)# snmp-server trap authentication unknown-context
Router(config)#

This example shows how to disable the authorization failure traps during an unknown context error:
Router(config)# no snmp-server trap authentication unknown-context
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1129

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

snmp-server trap link switchover

snmp-server trap link switchover
To enable sending a linkdown trap followed by a linkup trap for every interface in the switch during a
switch failover, use the snmp-server trap link switchover command. To disable linkdown during a
switch failover, use the no form of this command.
snmp-server trap link switchover
no snmp-server trap link switchover

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

By default, no link traps are generated during a switchover.

Examples

This example shows how to return to the default setting:
Router(config)# snmp-server trap link switchover
Router(config)#

This example shows how to disable linkdown followed by a linkup trap for every interface in the switch
during a switch failover:
Router(config)# no snmp-server trap link switchover
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1130

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree backbonefast

spanning-tree backbonefast
To enable BackboneFast on all Ethernet VLANs, use the spanning-tree backbonefast command. To
disable BackboneFast, use the no form of this command.
spanning-tree backbonefast
no spanning-tree backbonefast

Syntax Description

This command has no arguments or keywords.

Defaults

BackboneFast is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Enable BackboneFast on all Catalyst 6500 series switches to allow the detection of indirect link failures
to start spanning-tree reconfiguration sooner.

Examples

This example shows how to enable BackboneFast on all Ethernet VLANs:
Router(config)# spanning-tree backbonefast
Router(config)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1131

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree bpdufilter

spanning-tree bpdufilter
To enable BPDU filtering on the interface, use the spanning-tree bpdufilter command. To return to the
default settings, use the no form of this command.
spanning-tree bpdufilter {enable | disable}
no spanning-tree bpdufilter

Syntax Description

enable

Enables BPDU filtering on this interface.

disable

Disables BPDU filtering on this interface.

Defaults

The setting that is already configured when you enter the spanning-tree portfast bpdufilter default
command.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

Be careful when you enter the spanning-tree bpdufilter enable command. Enabling BPDU filtering on
an interface is similar to disabling the spanning tree for this interface. If you do not use this command
correctly, you might create bridging loops.
Entering the spanning-tree bpdufilter enable command to enable BPDU filtering overrides the
PortFast configuration.
When configuring Layer 2-protocol tunneling on all the service-provider edge switches, you must enable
spanning-tree BPDU filtering on the 802.1Q tunnel ports by entering the spanning-tree bpdufilter
enable command.
BPDU filtering prevents a port from sending and receiving BPDUs. The configuration is applicable to
the whole interface, whether it is trunking or not. This command has three states:
•

spanning-tree bpdufilter enable—Unconditionally enables BPDU filtering on the interface.

•

spanning-tree bpdufilter disable—Unconditionally disables BPDU filtering on the interface.

•

no spanning-tree bpdufilter—Enables BPDU filtering on the interface if the interface is in
operational PortFast state and if you configure the spanning-tree portfast bpdufilter default
command.

Use the spanning-tree portfast bpdufilter default command to enable BPDU filtering on all ports that
are already configured for PortFast.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1132

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree bpdufilter

Examples

This example shows how to enable BPDU filtering on this interface:
Router(config-if)# spanning-tree bpdufilter enable
Router(config-if)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree portfast Enables BPDU filtering by default on all PortFast ports.
bpdufilter default

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1133

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree bpduguard

spanning-tree bpduguard
To enable BPDU guard on the interface, use the spanning-tree bpduguard command. To return to the
default settings, use the no form of this command.
spanning-tree bpduguard {enable | disable}
no spanning-tree bpduguard

Syntax Description

enable

Enables BPDU guard on this interface.

disable

Disables BPDU guard on this interface.

Defaults

The setting that is already configured when you enter the spanning-tree portfast bpduguard default
command.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

BPDU guard prevents a port from receiving BPDUs. Typically, this feature is used in a service-provider
environment where the network administrator wants to prevent an access port from participating in the
spanning tree. If the port still receives a BPDU, it is put in the error-disabled state as a protective
measure. This command has three states:
•

spanning-tree bpduguard enable—Unconditionally enables BPDU guard on the interface.

•

spanning-tree bpduguard disable—Unconditionally disables BPDU guard on the interface.

•

no spanning-tree bpduguard—Enables BPDU guard on the interface if it is in the operational
PortFast state and if the spanning-tree portfast bpduguard default command is configured.

This example shows how to enable BPDU guard on this interface:
Router(config-if)# spanning-tree bpduguard enable
Router(config-if)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree portfast bpduguard default

Enables BPDU guard by default on all PortFast ports.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1134

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree cost

spanning-tree cost
To set the path cost of the interface for STP calculations, use the spanning-tree cost command. To
return to the default settings, use the no form of this command.
spanning-tree cost cost
no spanning-tree cost

Syntax Description

cost

Defaults

The default path cost is computed from the interface’s bandwidth setting; the default path costs are as
follows:

Path cost; valid values are from 1 to 200000000.

•

Ethernet—100

•

16-Mb Token Ring—62

•

FDDI—10

•

FastEthernet—10

•

ATM 155—6

•

GigabitEthernet—1

•

10-Gigabit Ethernet—2

•

HSSI—647

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you configure the cost, note that higher values indicate higher costs. This range applies regardless
of the protocol type that is specified.

Examples

This example shows how to access an interface and set a path cost value of 250 for the spanning-tree
VLAN that is associated with that interface:
Router(config)# interface ethernet 2/0
Router(config-if)# spanning-tree cost 250
Router(config-if)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1135

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree etherchannel guard misconfig

spanning-tree etherchannel guard misconfig
To display an error message when a loop due to a channel misconfiguration is detected, use the
spanning-tree etherchannel guard misconfig command. To disable the error message, use the no form
of this command.
spanning-tree etherchannel guard misconfig
no spanning-tree etherchannel guard misconfig

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

EtherChannel uses either PAgP or LACP and does not work if the EtherChannel mode of the interface
has been enabled using the channel-group group-number mode on command.
When an EtherChannel-guard misconfiguration is detected, this error message displays:
msgdef(CHNL_MISCFG, SPANTREE, LOG_CRIT, 0, "Detected loop due to etherchannel
misconfiguration of %s %s")

To determine which local ports are involved in the misconfiguration, enter the show interfaces status
err-disabled command. To check the EtherChannel configuration on the remote device, enter the show
etherchannel summary command on the remote device.
After you correct the configuration, enter the shutdown and the no shutdown commands on the
associated port-channel interface.

Examples

This example shows how to enable the EtherChannel-guard misconfiguration:
Router(config)# spanning-tree etherchannel guard misconfig
Router(config)#

Related Commands

Command

Description

show etherchannel
summary

Displays the EtherChannel information for a channel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1136

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree etherchannel guard misconfig

Command

Description

show interfaces status
err-disabled

Displays the interface status or a list of interfaces in an error-disabled state
on LAN ports only.

shutdown

Disables an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1137

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree extend system-id

spanning-tree extend system-id
To enable the extended-system ID feature on chassis that support 1024 MAC addresses, use the
spanning-tree extend system-id command. To disable the extended system identification, use the no
form of this command.
spanning-tree extend system-id
no spanning-tree extend system-id

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled on systems that do not provide 1024 MAC addresses.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The Catalyst 6500 series switch can support 64 or up to 1024 MAC addresses. For a Catalyst 6500 series
switch with 64 MAC addresses, STP uses the extended-system ID and a MAC address to make the bridge
ID unique for each VLAN.
You cannot disable the extended-system ID on a Catalyst 6500 series switch that supports 64 MAC
addresses.
Enabling or disabling the extended-system ID updates the bridge IDs of all active STP instances, which
might change the spanning-tree topology.

Examples

This example shows how to enable the extended-system ID:
Router(config)# spanning-tree extend system-id
Router(config)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1138

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree guard

spanning-tree guard
To enable or disable the guard mode, use the spanning-tree guard command. To return to the default
settings, use the no form of this command.
spanning-tree guard {loop | root | none}
no spanning-tree guard

Syntax Description

loop

Enables the loop-guard mode on the interface.

root

Enables root-guard mode on the interface.

none

Sets the guard mode to none.

Defaults

Guard mode is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

This example shows how to enable root guard:
Router(config-if)# spanning-tree guard root
Router(config-if)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree
loopguard default

Enables loop guard as a default on all ports of a given bridge.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1139

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree link-type

spanning-tree link-type
To configure a link type for a port, use the spanning-tree link-type command. To return to the default
settings, use the no form of this command.
spanning-tree link-type {point-to-point | shared}
no spanning-tree link-type

Syntax Description

point-to-point

Specifies that the interface is a point-to-point link.

shared

Specifies that the interface is a shared medium.

Defaults

Link type is automatically derived from the duplex setting unless you explicitly configure the link type.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

RSTP+ fast transition works only on point-to-point links between two bridges.
By default, the switch derives the link type of a port from the duplex mode. A full-duplex port is
considered as a point-to-point link while a half-duplex configuration is assumed to be on a shared link.
If you designate a port as a shared link, RSTP+ fast transition is forbidden, regardless of the duplex setting.

Examples

This example shows how to configure the port as a shared link:
Router(config-if)# spanning-tree link-type shared
Router(config-if)#

Related Commands

Command

Description

show spanning-tree
interface

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1140

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree loopguard default

spanning-tree loopguard default
To enable loop guard as a default on all ports of a given bridge, use the spanning-tree loopguard default
command. To disable loop guard, use the no form of this command.
spanning-tree loopguard default
no spanning-tree loopguard default

Syntax Description

This command has no keywords or arguments.

Defaults

Loop guard is disabled.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Loop guard provides additional security in the bridge network. Loop guard prevents alternate or root ports
from becoming the designated port due to a failure that could lead to a unidirectional link.
Loop guard operates only on ports that are considered point to point by the spanning tree.
The individual loop-guard port configuration overrides this command.

Examples

This example shows how to enable loop guard:
Router(config)# spanning-tree loopguard default
Router(config)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree guard

Enables or disables the guard mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1141

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mode

spanning-tree mode
To switch between PVST+, Rapid-PVST+, and MST modes, use the spanning-tree mode command. To
return to the default settings, use the no form of this command.
spanning-tree mode [pvst | mst | rapid-pvst]
no spanning-tree mode

Syntax Description

pvst

(Optional) PVST+ mode.

mst

(Optional) MST mode.

rapid-pvst

(Optional) Rapid-PVST+ mode.

Defaults

pvst

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

Examples

Be careful when using the spanning-tree mode command to switch between PVST+, Rapid-PVST+,
and MST modes. When you enter the command, all spanning-tree instances are stopped for the previous
mode and are restarted in the new mode. Using this command may cause the user traffic to be disrupted.

This example shows how to switch to MST mode:
Router(config)# spanning-tree mode mst
Router(config)#

This example shows how to return to the default mode (PVST+):
Router(config)# no spanning-tree mode
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1142

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree mst

spanning-tree mst
To set the path cost and port-priority parameters for any MST instance (including the CIST with instance
ID 0), use the spanning-tree mst command. To return to the default settings, use the no form of this
command.
spanning-tree mst instance-id {cost cost} | {port-priority prio}
no spanning-tree mst instance-id {cost | port-priority}

Syntax Description

Defaults

instance-id

Instance ID number; valid values are from 0 to 15.

cost cost

(Optional) Path cost for an instance; valid values are from 1 to 200000000.

port-priority
prio

(Optional) Port priority for an instance; valid values are from 0 to 240 in increments
of 16.

The defaults are as follows:
•

cost depends on the port speed; the faster interface speeds indicate smaller costs. MST always uses
long path costs.

•

prio is 128.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Higher cost cost values indicate higher costs. When entering the cost, do not include a comma in the
entry; for example, enter 1000, not 1,000.
Higher port-priority prio values indicate smaller priorities.

Examples

This example shows how to set the interface path cost:
Router(config-if)# spanning-tree mst 0 cost 17031970
Router(config-if)#

This example shows how to set the interface priority:
Router(config-if)# spanning-tree mst 0 port-priority 64
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1143

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mst

Related Commands

Command

Description

show spanning-tree mst

Displays the information about the MST protocol.

spanning-tree port-priority

Sets an interface priority when two bridges vie for position as the root
bridge.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1144

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree mst configuration

spanning-tree mst configuration
To enter MST-configuration submode, use the spanning-tree mst configuration command. To return
to the default settings, use the no form of this command.
spanning-tree mst configuration
no spanning-tree mst configuration

Syntax Description

This command has no keywords or arguments.

Defaults

The default value for the MST configuration is the default value for all its parameters:
•

No VLANs are mapped to any MST instance (all VLANs are mapped to the CIST instance).

•

The region name is an empty string.

•

The revision number is 0.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The MST configuration consists of three main parameters:
•

Instance VLAN mapping—See the instance command

•

Region name—See the name (MST configuration submode) command

•

Configuration revision number—See the revision command

The abort and exit commands allow you to exit MST configuration submode. The difference between
the two commands depends on whether you want to save your changes or not.
The exit command commits all the changes before leaving MST configuration submode. If you do not
map secondary VLANs to the same instance as the associated primary VLAN, when you exit
MST-configuration submode, a warning message displays and lists the secondary VLANs that are not
mapped to the same instance as the associated primary VLAN. The warning message is as follows:
These secondary vlans are not mapped to the same instance as their primary:
-> 3

The abort command leaves MST-configuration submode without committing any changes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1145

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mst configuration

Changing an MST-configuration submode parameter can cause connectivity loss. To reduce service
disruptions, when you enter MST-configuration submode, make changes to a copy of the current MST
configuration. When you are done editing the configuration, you can apply all the changes at once by
using the exit keyword, or you can exit the submode without committing any change to the configuration
by using the abort keyword.
In the unlikely event that two users commit a new configuration at exactly at the same time, this warning
message displays:
% MST CFG:Configuration change lost because of concurrent access

Examples

This example shows how to enter MST-configuration submode:
Router(config)# spanning-tree mst configuration
Router(config-mst)#

This example shows how to reset the MST configuration to the default settings:
Router(config)# no spanning-tree mst configuration
Router(config)#

Related Commands

Command

Description

instance

Maps a VLAN or a set of VLANs to an MST instance.

name (MST
configuration
submode)

Sets the name of an MST region.

revision

Sets the revision number for the MST configuration.

show

Verifies the MST configuration.

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1146

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree mst forward-time

spanning-tree mst forward-time
To set the forward-delay timer for all the instances on the Catalyst 6500 series switch, use the
spanning-tree mst forward-time command. To return to the default settings, use the no form of this
command.
spanning-tree mst forward-time seconds
no spanning-tree mst forward-time

Syntax Description

seconds

Defaults

seconds is 15.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Number of seconds to set the forward-delay timer for all the instances on the
Catalyst 6500 series switch; valid values are from 4 to 30 seconds.

This example shows how to set the forward-delay timer:
Router(config)# spanning-tree mst forward-time 20
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1147

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mst hello-time

spanning-tree mst hello-time
To set the hello-time delay timer for all the instances on the Catalyst 6500 series switch, use the
spanning-tree mst hello-time command. To return to the default settings, use the no form of this
command.
spanning-tree mst hello-time seconds
no spanning-tree mst hello-time

Syntax Description

seconds

Defaults

2 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Number of seconds to set the hello-time delay timer for all the instances on the
Catalyst 6500 series switch; valid values are from 1 to 10 seconds.

Usage Guidelines

If you do not specify the hello-time value, the value is calculated from the network diameter.

Examples

This example shows how to set the hello-time delay timer:
Router(config)# spanning-tree mst hello-time 3
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1148

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree mst max-age

spanning-tree mst max-age
To set the max-age timer for all the instances on the Catalyst 6500 series switch, use the spanning-tree
mst max-age command. To return to the default settings, use the no form of this command.
spanning-tree mst max-age seconds
no spanning-tree mst max-age

Syntax Description

seconds

Defaults

20 seconds

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Number of seconds to set the max-age timer for all the instances on the Catalyst 6500
series switch; valid values are from 6 to 40 seconds.

This example shows how to set the max-age timer:
Router(config)# spanning-tree mst max-age 40
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1149

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mst max-hops

spanning-tree mst max-hops
To specify the number of possible hops in the region before a BPDU is discarded, use the spanning-tree
mst max-hops command. To return to the default settings, use the no form of this command.
spanning-tree mst max-hops hopnumber
no spanning-tree mst max-hops

Syntax Description

hopnumber

Defaults

20 hops

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Number of possible hops in the region before a BPDU is discarded; valid values are
from 1 to 255 hops.

This example shows how to set the number of possible hops:
Router(config)# spanning-tree mst max-hops 25
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1150

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree mst pre-standard

spanning-tree mst pre-standard
To configure a port to transmit only prestandard BPDUs, use the spanning-tree mst pre-standard
command. To return to the default settings, use the no form of this command.
spanning-tree mst pre-standard
no spanning-tree mst pre-standard

Syntax Description

This command has no arguments or keywords.

Defaults

The default is to automatically detect prestandard neighbors.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Even with the default configuration, the port can receive both prestandard and standard BPDUs.
Prestandard BPDUs are based on the Cisco IOS MST implementation that was created before the IEEE
standard was finalized. Standard BPDUs are based on the finalized IEEE standard.
If you configure a port to transmit prestandard BPDUs only, the prestandard flag displays in the show
spanning-tree commands. The variations of the prestandard flag are as follows:
•

Pre-STD (or prestandard in long format)—This flag displays if the port is configured to transmit
prestandard BPDUs and if a prestandard neighbor bridge has been detected on this interface.

•

Pre-STD-Cf (or prestandard (config) in long format)—This flag displays if the port is configured to
transmit prestandard BPDUs but a prestandard BPDU has not been received on the port, the
autodetection mechanism has failed, or a misconfiguration, if there is no prestandard neighbor, has
occurred.

•

Pre-STD-Rx (or prestandard (rcvd) in long format)—This flag displays when a prestandard BPDU
has been received on the port but it has not been configured to send prestandard BPDUs. The port
will send prestandard BPDUs, but we recommend that you change the port configuration so that the
interaction with the prestandard neighbor does not rely only on the autodetection mechanism.

If the MST configuration is not compatible with the prestandard (if it includes an instance ID greater
than 15), only standard MST BPDUs are transmitted, regardless of the STP configuration on the port.

Examples

This example shows how to configure a port to transmit only prestandard BPDUs:
Router(config-if)# spanning-tree mst pre-standard
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1151

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mst pre-standard

Related Commands

Command

Description

show spanning-tree
mst

Displays information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1152

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree mst root

spanning-tree mst root
To designate the primary and secondary root, set the bridge priority, and set the timer value for an
instance, use the spanning-tree mst root command. To return to the default settings, use the no form of
this command.
spanning-tree mst instance-id root {{primary | secondary} | {priority prio}} [diameter dia
[hello-time hello-time]]
no spanning-tree mst root

Syntax Description

Defaults

instance-id

Instance identification number; valid values are from 1 to 15.

primary

Specifies the high enough priority (low value) to make the bridge root of the
spanning-tree instance.

secondary

Specifies the switch as a secondary root, should the primary root fail.

priority prio

Specifies the bridge priority; see the “Usage Guidelines” section for valid values and
additional information.

diameter dia

(Optional) Specifies the timer values for the bridge that are based on the network
diameter; valid values are from 1 to 7.

hello-time
hello-time

(Optional) Specifies the duration between the generation of configuration messages
by the root switch.

The defaults are as follows:
•

spanning-tree mst root has no default settings.

•

prio is 32768.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can set the bridge priority in increments of 4096 only. When you set the priority, valid values are
0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344,
and 61440.
You can set the prio to 0 to make the switch root.
You can enter the instance-id as a single instance or a range of instances, for example, 0-3,5,7-9.
The spanning-tree root secondary bridge priority value is 16384.
The diameter dia and hello-time hello-time keywords and arguments are available for instance 0 only.
If you do not specify the hello-time argument, the argument is calculated from the network diameter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1153

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree mst root

Examples

This example shows how to set the bridge priority:
Router(config)# spanning-tree mst 0 root priority 4096
Router(config)#

This example shows how to set the priority and timer values for the bridge:
Router(config)# spanning-tree mst 0 root primary diameter 7 hello-time 2
Router(config)# spanning-tree mst 5 root primary
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1154

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree pathcost method

spanning-tree pathcost method
To set the default path-cost calculation method, use the spanning-tree pathcost method command. To
return to the default settings, use the no form of this command.
spanning-tree pathcost method {long | short}
no spanning-tree pathcost method

Syntax Description

long

Specifies the 32-bit based values for default port-path costs.

short

Specifies the 16-bit based values for default port-path costs.

Defaults

short

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command applies to all the spanning-tree instances on the Catalyst 6500 series switch.
The long path-cost calculation method utilizes all 32 bits for path-cost calculation and yields values in
the range of 1 through 200,000,000.
The short path-cost calculation method (16 bits) yields values in the range of 1 through 65535.

Examples

This example shows how to set the default path-cost calculation method to long:
Router(config#) spanning-tree pathcost method long
Router(config#)

This example shows how to set the default path-cost calculation method to short:
Router(config#) spanning-tree pathcost method short
Router(config#)

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1155

Chapter 2
spanning-tree portfast (interface configuration mode)

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree portfast (interface configuration mode)
To enable PortFast mode where the interface is immediately put into the forwarding state upon linkup
without waiting for the timer to expire, use the spanning-tree portfast command. To return to the
default settings, use the no form of this command.
spanning-tree portfast
spanning-tree portfast {disable | trunk}
no spanning-tree portfast

Syntax Description

disable

Disables PortFast on the interface.

trunk

Enables PortFast on the interface even in the trunk mode.

Defaults

The settings that are configured by the spanning-tree portfast default command.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You should use this command only with interfaces that connect to end stations; otherwise, an accidental
topology loop could cause a data-packet loop and disrupt the Catalyst 6500 series switch and network
operation.
An interface with PortFast mode enabled is moved directly to the spanning-tree forwarding state when
linkup occurs without waiting for the standard forward-time delay.
Be careful when using the no spanning-tree portfast command. This command does not disable
PortFast if the spanning-tree portfast default command is enabled.
This command has four states:
•

spanning-tree portfast—This command enables PortFast unconditionally on the given port.

•

spanning-tree portfast disable—This command explicitly disables PortFast for the given port. The
configuration line shows up in the running configuration because it is not the default.

•

spanning-tree portfast trunk—This command allows you to configure PortFast on trunk ports.

Note

If you enter the spanning-tree portfast trunk command, the port is configured for PortFast
even in the access mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1156

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree portfast (interface configuration mode)

•

Examples

no spanning-tree portfast—This command implicitly enables PortFast if you define the
spanning-tree portfast default command in global configuration mode and if the port is not a trunk
port. If you do not configure PortFast globally, the no spanning-tree portfast command is
equivalent to the spanning-tree portfast disable command.

This example shows how to enable PortFast mode:
Router(config-if)# spanning-tree portfast
Router(config-if)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree portfast Enables PortFast by default on all access ports.
default

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1157

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree portfast bpdufilter default

spanning-tree portfast bpdufilter default
To enable BPDU filtering by default on all PortFast ports, use the spanning-tree portfast bpdufilter
default command. To return to the default settings, use the no form of this command.
spanning-tree portfast bpdufilter default
no spanning-tree portfast bpdufilter default

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The spanning-tree portfast bpdufilter command enables BPDU filtering globally on PortFast ports.
BPDU filtering prevents a port from sending or receiving any BPDUs.
You can override the effects of the portfast bpdufilter default command by configuring BPDU filtering
at the interface level.

Note

Be careful when enabling BPDU filtering. The feature’s functionality is different when you enable it on
a per-port basis or globally. When enabled globally, BPDU filtering is applied only on ports that are in
an operational PortFast state. Ports send a few BPDUs at linkup before they effectively filter outbound
BPDUs. If a BPDU is received on an edge port, it immediately loses its operational PortFast status and
BPDU filtering is disabled.
When enabled locally on a port, BPDU filtering prevents the Catalyst 6500 series switch from receiving
or sending BPDUs on this port.

Caution

Be careful when using this command. Using this command incorrectly can cause bridging loops.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1158

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree portfast bpdufilter default

This example shows how to enable BPDU filtering by default:
Router(config)# spanning-tree portfast bpdufilter default
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

spanning-tree
bpdufilter

Enables BPDU filtering on the interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1159

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree portfast bpduguard default

spanning-tree portfast bpduguard default
To enable BPDU guard by default on all PortFast ports, use the spanning-tree portfast bpduguard
default command. To return to the default settings, use the no form of this command.
spanning-tree portfast bpduguard default
no spanning-tree portfast bpduguard default

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

Be careful when using this command. You should use this command only with interfaces that connect
to end stations; otherwise, an accidental topology loop could cause a data-packet loop and disrupt the
Catalyst 6500 series switch and network operation.
BPDU guard disables a port if it receives a BPDU. BPDU guard is applied only on ports that are PortFast
enabled and are in an operational PortFast state.

Examples

This example shows how to enable BPDU guard by default:
Router(config)# spanning-tree portfast bpduguard default
Router(config)#

Related Commands

Command

Description

show spanning-tree
mst

Displays the information about the MST protocol.

spanning-tree portfast Enables the BPDU guard on the interface.
bpduguard default

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1160

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree portfast default

spanning-tree portfast default
To enable PortFast by default on all access ports, use the spanning-tree portfast default command. To
disable PortFast by default on all access ports, use the no form of this command.
spanning-tree portfast default
no spanning-tree portfast default

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

Be careful when using this command. You should use this command only with interfaces that connect
to end stations; otherwise, an accidental topology loop could cause a data-packet loop and disrupt the
Catalyst 6500 series switch and network operation.
An interface with PortFast mode enabled is moved directly to the spanning-tree forwarding state when
linkup occurs without waiting for the standard forward-time delay.
You can enable PortFast mode on individual interfaces using the spanning-tree portfast (interface
configuration mode) command.

Examples

This example shows how to enable PortFast by default on all access ports:
Router(config)# spanning-tree portfast default
Router(config)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree portfast Enables PortFast mode.
(interface
configuration mode)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1161

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree port-priority

spanning-tree port-priority
To set an interface priority when two bridges vie for position as the root bridge, use the spanning-tree
port-priority command. The priority you set breaks the tie. To return to the default settings, use the no
form of this command.
spanning-tree port-priority port-priority
no spanning-tree port-priority

Syntax Description

port-priority

Defaults

port-priority is 128.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Examples

Port priority; valid values are from 2 to 255.

This example shows how to increase the likelihood that the spanning-tree instance 20 is chosen as the
root bridge on Ethernet interface 2/0:
Router(config-if)# spanning-tree port-priority 0
Router(config-if)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

spanning-tree mst

Sets the path cost and port-priority parameters for any MST instance (including
the CIST with instance ID 0).

spanning-tree vlan

Configures STP on a per-VLAN basis.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1162

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree transmit hold-count

spanning-tree transmit hold-count
To specify the transmit hold count, use the spanning-tree transmit hold-count command. To return to
the default settings, use the no form of this command.
spanning-tree transmit hold-count value
no spanning-tree transmit hold-count

Syntax Description

value

Defaults

value is 6.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Number of BPDUs that can be sent before pausing for 1 second;
valid values are from 1 to 20.

This command is supported on all spanning-tree modes.
The transmit hold count determines the number of BPDUs that can be sent before pausing for 1 second.

Note

Changing this parameter to a higher value may have a significant impact on CPU utilization, especially
in rapid-PVST mode. Lowering this parameter could slow convergence in some scenarios. We
recommend that you do not change the value from the default setting.
If you change the value setting, enter the show running-config command to verify the change.
If you delete the command, use the show spanning-tree mst command to verify the deletion.

Examples

This example shows how to specify the transmit hold count:
Router(config)# spanning-tree transmit hold-count 8
Router(config)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

show spanning-tree
mst

Displays the information about the MST protocol.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1163

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree uplinkfast

spanning-tree uplinkfast
To enable UplinkFast, use the spanning-tree uplinkfast command. To disable UplinkFast, use the no
form of this command.
spanning-tree uplinkfast [max-update-rate packets-per-second]
no spanning-tree uplinkfast [max-update-rate]

Syntax Description

max-update-rate
packets-per-second

Defaults

The defaults are as follows:

(Optional) Specifies the maximum rate (in packets per second) at which
update packets are sent; valid values are from 0 to 65535.

•

UplinkFast is disabled.

•

packets-per-second is 150 packets per second.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command only on access switches.
When you configure UplinkFast, the bridge priority is changed to 49152 so that this switch is not
selected as root. All interface path costs of all spanning-tree interfaces that belong to the specified
spanning-tree instances also increase by 3000.
When spanning tree detects that the root interface has failed, UplinkFast causes an immediate switchover
to an alternate root interface, transitioning the new root interface directly to the forwarding state. During
this time, a topology change notification is sent. To minimize the disruption that is caused by the
topology change, a multicast packet is sent to 01-00-0C-CD-CD-CD for each station address in the
forwarding bridge except for those associated with the old root interface.
Use the spanning-tree uplinkfast max-update-rate command to enable UplinkFast (if it is not already
enabled) and change the rate at which update packets are sent. Use the no form of this command to return
to the default rate.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1164

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree uplinkfast

Examples

This example shows how to enable UplinkFast and set the maximum rate to 200 packets per second:
Router(config)# spanning-tree uplinkfast max-update-rate 200
Router(config)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1165

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

spanning-tree vlan

spanning-tree vlan
To configure STP on a per-VLAN basis, use the spanning-tree vlan command. To return to the default
settings, use the no form of this command.
spanning-tree vlan vlan-id [forward-time seconds | hello-time hello-time | max-age seconds |
priority priority | protocol protocol | {root {primary | secondary} [diameter net-diameter
[hello-time hello-time]]}]
no spanning-tree vlan vlan-id [forward-time | hello-time | max-age | priority | protocol | root]

Syntax Description

Defaults

vlan-id

VLAN identification number; valid values are from 1 to 4094.

forward-time
seconds

(Optional) Specifies the STP forward-delay time; valid values are from 4 to
30 seconds.

hello-time
hello-time

(Optional) Specifies the number of seconds between the generation of
configuration messages by the root switch; valid values are from 1 to 10 seconds.

max-age seconds

(Optional) Specifies the maximum number of seconds that the information in a
BPDU is valid; valid values are from 6 to 40 seconds.

priority priority

(Optional) Specifies the STP-bridge priority; valid values are from 0 to 65535.

protocol protocol

(Optional) Specifies the STP; see the “Usage Guidelines” section for a list of
valid values.

root primary

(Optional) Forces this switch to be the root bridge.

root secondary

(Optional) Forces this switch to be the root switch should the primary root fail.

diameter
net-diameter

(Optional) Specifies the maximum number of bridges between any two points of
attachment between end stations; valid values are from 2 through 7.

The defaults are as follows:
•

forward-time—15 seconds

•

hello-time—2 seconds

•

max-age—20 seconds

•

priority—The default with IEEE STP enabled is 32768; the default with STP enabled is 128

•

protocol—IEEE

•

root—No STP root

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1166

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
spanning-tree vlan

Usage Guidelines
Caution

When disabling spanning tree on a VLAN using the no spanning-tree vlan vlan-id command, ensure
that all switches and bridges in the VLAN have spanning tree disabled. You cannot disable spanning tree
on some switches and bridges in a VLAN and leave it enabled on other switches and bridges in the same
VLAN because switches and bridges with spanning tree enabled have incomplete information about the
physical topology of the network.

Caution

We do not recommend disabling spanning tree, even in a topology that is free of physical loops.
Spanning tree is a safeguard against misconfigurations and cabling errors. Do not disable spanning tree
in a VLAN without ensuring that there are no physical loops present in the VLAN.
When setting the max-age seconds, if a bridge does not hear BPDUs from the root bridge within the
specified interval, it assumes that the network has changed and recomputes the spanning-tree topology.
Valid values for protocol are dec—Digital STP, ibm—IBM STP, ieee—IEEE Ethernet STP, and
vlan-bridge—VLAN Bridge STP.
The spanning-tree root primary alters this switch’s bridge priority to 8192. If you enter the
spanning-tree root primary command and the switch does not become root, then the bridge priority is
changed to 100 less than the bridge priority of the current bridge. If the switch does not become root, an
error results.
The spanning-tree root secondary alters this switch’s bridge priority to 16384. If the root switch should
fail, this switch becomes the next root switch.
Use the spanning-tree root commands on the backbone switches only.

Examples

This example shows how to enable spanning tree on VLAN 200:
Router(config)# spanning-tree vlan 200
Router(config)#

This example shows how to configure the switch as the root switch for VLAN 10 with a network
diameter of 4:
Router(config)# spanning-tree vlan 10 root primary diameter 4
Router(config)#

This example shows how to configure the switch as the secondary root switch for VLAN 10 with a
network diameter of 4:
Router(config)# spanning-tree vlan 10 root secondary diameter 4
Router(config)#

Related Commands

Command

Description

show spanning-tree

Displays information about the spanning-tree state.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1167

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

speed

speed
To set the port speed for an Ethernet interface, use the speed command. To disable a speed setting, use
the no form of this command.
speed {10 | 100 | 1000}
speed auto [speed-list]
speed [1000 | nonegotiate]
no speed

Syntax Description

10

Specifies the interface transmits at 10 Mbps.

100

Specifies the interface transmits at 100 Mbps.

1000

(Optional) Specifies the interface transmits at 1000 Mbps.

auto

Enables the autonegotiation capability.

speed-list

(Optional) Speed autonegotiation capability to a specific speed; see the
“Usage Guidelines” section for valid values.

nonegotiate

(Optional) Enables or disables the link-negotiation protocol on the
Gigabit Ethernet ports.

Defaults

See Table 2-93 for a list of default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the speed [10 | 100] command for 10/100 ports, the speed auto [10 100 [1000]] command for
10/100/1000 ports, and the speed [1000 | nonegotiate] command for Gigabit Ethernet ports.
Separate the speed-list entries with a space.
The following speed-list configurations are supported:
•

speed auto—Negotiate all speeds.

•

speed auto 10 100—Negotiate 10 and 100 speeds only.

•

speed auto 10 100 1000—Negotiate all speeds.

When you enable link negotiation, the speed, duplex, flow control, and clocking negotiations between
two Gigabit Ethernet ports are automatically enabled.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1168

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
speed

Table 2-93 lists the supported command options by interface.
Table 2-93 Supported speed Command Options

Interface Type

Supported Syntax

Default Setting

Usage Guidelines

10/100-Mbps
module

speed [10 | 100]

auto

If the speed is set to auto, you cannot
set duplex.

speed auto [10 | 100]

If the speed is set to 10 or 100, and
you do not configure the duplex
setting, the duplex is set to half.
10/100/1000-Mbps
interface

speed auto [{10 100} auto
[1000]]

If the speed is set to auto, you cannot
set duplex.
If the speed is set to 10 or 100, and
you do not configure the duplex
setting, the duplex is set to half by
default.
If the speed is set to 10 100, the
interface is not forced to half duplex
by default.

100-Mbps fiber
modules

Factory set

Not applicable.

Gigabit Ethernet
module

speed [1000 |
nonegotiate]

Speed is 1000 or Speed, duplex, flow control, and
clocking negotiations are enabled.
negotiation is
enabled.

10-Mbps ports

Factory set

Not applicable.

If you decide to configure the interface speed and duplex commands manually, and enter a value other
than speed auto (for example, 10 or 100 Mbps), ensure that you configure the connecting interface speed
command to a matching speed but do not use the auto keyword.
If you set the Ethernet interface speed to auto on a 10/100-Mbps or 10/100/1000-Mbps Ethernet
interface, both speed and duplex are autonegotiated.
The Gigabit Ethernet interfaces are full duplex only. You cannot change the duplex mode on the Gigabit
Ethernet interfaces or on a 10/100/1000-Mbps interface that is configured for Gigabit Ethernet.
When manually configuring the interface speed to either 10 or 100 Mbps, the switch prompts you to
configure duplex mode on the interface.

Note

Caution

Catalyst 6500 series switches cannot automatically negotiate interface speed and duplex mode if either
connecting interface is configured to a value other than auto.

Changing the interface speed and duplex mode might shut down and reenable the interface during the
reconfiguration.
You cannot set the duplex mode to half when the port speed is set at 1000 and similarly, you cannot set
the port speed to 1000 when the mode is set to half duplex. In addition, if the port speed is set to auto,
the duplex command is rejected.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1169

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

speed

Table 2-94 describes the relationship between the duplex and speed commands.
Table 2-94 Relationship Between duplex and speed Commands

duplex Command

Examples

speed Command

Resulting System Action

duplex half or duplex full speed auto

Autonegotiates both speed and duplex
modes

duplex half

speed 10

Forces 10 Mbps and half duplex

duplex full

speed 10

Forces 10 Mbps and full duplex

duplex half

speed 100

Forces 100 Mbps and half duplex

duplex full

speed 100

Forces 100 Mbps and full duplex

duplex full

speed 1000

Forces 1000 Mbps and full duplex

This example shows how to configure the interface to transmit at 100 Mbps:
Router(config-if)# speed 100
Router(config-if)#

Related Commands

Command

Description

duplex

Configures the duplex operation on an interface.

interface

Selects an interface to configure and enters interface configuration mode.

show interfaces

Displays traffic that is seen by a specific interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1170

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
squeeze

squeeze
To delete flash files permanently by squeezing a flash file system, use the squeeze command.
squeeze filesystem:

Syntax Description

filesystem:

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Flash file system; valid values are bootflash: and flash:.

When flash memory is full, you might need to rearrange the files so that the space that is used by the
files that are marked “deleted” can be reclaimed.
When you enter the squeeze command, the router copies all valid files to the beginning of flash memory
and erases all files that are marked “deleted.” You cannot recover “deleted” files and you can write to
the reclaimed flash-memory space.
In addition to removing deleted files, use the squeeze command to remove any files that the system has
marked as “error.” An error file is created when a file write fails (for example, the device is full). To
remove error files, you must use the squeeze command. The squeeze operation might take as long as
several minutes because it can involve erasing and rewriting almost an entire flash-memory space.
The colon is required when entering the filesystem.

Examples

This example shows how to permanently erase the files that are marked “deleted” from the flash
memory:
Router # squeeze flash:
Router #

Related Commands

Command

Description

delete

Deletes a file from a flash memory device or NVRAM.

dir

Displays a list of files on a file system.

undelete

Recovers a file that is marked “deleted” on a flash file system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1171

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

stack-mib portname

stack-mib portname
To specify a name string for a port, use the stack-mib portname command.
stack-mib portname portname

Syntax Description

portname

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Name for a port.

Usage Guidelines

Using the stack-mib command to set a name string to a port corresponds to the portName MIB object
in the portTable of CISCO-STACK-MIB. portName is the MIB object in the portTable of
CISCO-STACK-MIB. You can set this object to be descriptive text describing the function of the
interface.

Examples

This example shows how to set a name to a port:
Router(config-if)# stack-mib portname portal_to_paradise
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1172

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
standby delay minimum reload

standby delay minimum reload
To configure the delay period before the initialization of HSRP groups, use the standby delay minimum
reload command. To disable the delay period, use the no form of this command.
standby delay minimum [min-delay] reload [reload-delay]
no standby delay minimum [min-delay] reload [reload-delay]

Syntax Description

Defaults

min-delay

(Optional) Minimum time, in seconds, to delay HSRP-group initialization after
an interface comes up. This minimum delay applies to all subsequent interface
events.

reload-delay

(Optional) Time, in seconds, to delay after the router has reloaded. This delay
applies only to the first interface-up event after the router has reloaded.

The defaults are as follows:
•

min-delay is 1 second.

•

reload-delay is 5 seconds.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If the active router fails or is removed from the network, the standby router automatically becomes the
new active router. If the former active router comes back online, you can control whether it takes over
as the active router by using the standby preempt command.
However, even if the standby preempt command is not configured, the former active router resumes
the active role after it reloads and comes back online. Use the standby delay minimum reload
command to set a delay period for HSRP-group initialization. This command allows time for the packets
to get through before the router resumes the active role.
We recommend that you use the standby delay minimum reload command if the standby timers
command is configured in milliseconds or if HSRP is configured on a VLAN interface of a switch.
In most configurations, the default values provide sufficient time for the packets to get through, and it
is not necessary to configure longer delay values.
The delay is canceled if an HSRP packet is received on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1173

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

standby delay minimum reload

Examples

This example shows how to set the minimum delay to 30 seconds and the delay after the first reload to
120 seconds:
Router(config-if) # standby delay minimum 30 reload 120
Router(config-if) #

Related Commands

Command

Description

show standby delay

Displays HSRP information about the delay periods.

standby preempt

Configures HSRP preemption and preemption delay.

standby timers

Configures the time between hello packets and the time before other routers
declare the active Hot Standby or standby router to be down.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1174

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
standby track

standby track
To configure an interface so that the Hot Standby-priority changes are based on the availability of other
interfaces, use the standby track command. To delete all tracking configuration for a group, use the no
form of this command.
standby [group-number] track {interface-type interface-number | designated-router}
[priority-decrement]
no standby group-number track

Syntax Description

Defaults

group-number

(Optional) Group number on the interface to which the tracking applies; valid
values are from 0 to 255.

interface-type
interface-number

Interface type and number to be tracked.

designated-router

Specifies that if the designated router becomes nondesignated, the active HSRP
router becomes the designated router.

priority-decrement

(Optional) Amount that the Hot Standby priority for the router is decremented
(or incremented) when the interface goes down (or comes back up); valid values
are from 1 to 255.

The defaults are as follows:
•

The group is 0.

•

The priority-decrement is 10.

•

The designated-router keyword is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Prior to entering the designated-router keyword, you must ensure that the new designated router has a
higher HSRP priority than the current designated router to take over.
When a tracked interface goes down, the Hot Standby priority decreases by the number that is specified
by the priority-decrement argument. If an interface is not tracked, its state changes do not affect the Hot
Standby priority. For each interface that is configured for Hot Standby, you can configure a separate list
of interfaces to be tracked.
When multiple tracked interfaces are down, the decrements are cumulative whether they are configured
with priority-decrement values or not.
A tracked interface is considered down if the IP address is disabled on that interface.
You must enter the group-number when using the no form of this command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1175

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

standby track

If you configure HSRP to track an interface, and that interface is physically removed as in the case of
an OIR operation, then HSRP regards the interface as always down. You cannot remove the HSRP
interface-tracking configuration. To prevent this situation, use the no standby track interface-type
interface-number command before you physically remove the interface.
When you enter a group-number 0, no group number is written to NVRAM, providing backward
compatibility.

Examples

This example shows how to enable HSRP tracking for group 1 on an interface:
Router(config-if)# standby 1 track Ethernet0/2
Router(config-if)#

This example shows how to specify that if the designated router becomes nondesignated, the active
HSRP router becomes the designated router:
Router(config-if)# standby 1 track designated-router 15
Router(config-if)#

Related Commands

Command

Description

show standby

Displays HSRP information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1176

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
standby use-bia

standby use-bia
To configure the HSRP to use the burned-in address of the interface as its virtual MAC address instead
of the preassigned MAC address (on Ethernet and FDDI) or the functional address (on Token Ring), use
the standby use-bia command. To return to the default virtual MAC address, use the no form of this
command.
standby use-bia [scope interface]
no standby use-bia

Syntax Description

scope interface

Defaults

HSRP uses the preassigned MAC address on Ethernet and FDDI or the functional address on Token
Ring.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

(Optional) Configures this command for the subinterface on which it
was entered instead of the major interface.

This command is not supported on Catalyst 6500 series switches that are configured with a PFC2.
The PFC2 supports a maximum of 16 unique HSRP-group numbers. You can use the same HSRP-group
numbers in different VLANs. If you configure more than 16 HSRP groups, this restriction prevents use
of the VLAN number as the HSRP-group number.

Note

Identically numbered HSRP groups use the same virtual MAC address, which might cause errors if you
configure bridge groups.
Hardware Layer 3 switching supports the following ingress and egress encapsulations:
•

Ethernet V2.0 (ARPA)

•

802.3 with 802.2 with 1 byte control (SAP1)

•

802.3 with 802.2 and SNAP

Hardware Layer 3 switching is permanently enabled. No configuration is required.

Examples

This example shows how to configure the HSRP to use the burned-in address of the interface as the
virtual MAC address that is mapped to the virtual IP address:
Router(config-if) # standby use-bia
Router(config-if) #

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1177

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

storm-control level

storm-control level
To set the suppression level, use the storm-control level command. To turn off the suppression mode,
use the no form of this command.
storm-control {broadcast | multicast | unicast} level level[.level]
no storm-control {broadcast | multicast | unicast} level

Syntax Description

broadcast

Specifies the broadcast traffic.

multicast

Specifies the multicast traffic.

unicast

Specifies the unicast traffic.

level

Integer-suppression level; valid values are from 0 to 100 percent.

.level

(Optional) Fractional-suppression level; valid values are from 0 to 99.

Defaults

All packets are passed.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can enter this command on switch ports and router ports.
Enter the storm-control level command to enable traffic storm control on the interface, configure the
traffic storm-control level, and apply the traffic storm-control level to all traffic storm-control modes
that are enabled on the interface.
Only one suppression level is shared by all three suppression modes. For example, if you set the
broadcast level to 30 and set the multicast level to 40, both levels are enabled and set to 40.
The Catalyst 6500 series switch supports storm control for multicast and unicast traffic only on Gigabit
and 10-Gigabit Ethernet LAN ports. The switch supports storm control for broadcast traffic on all LAN
ports.
The multicast and unicast keywords are supported on Gigabit and 10-Gigabit Ethernet LAN ports only.
Unicast and multicast suppression is also supported on the WS-X6148A-RJ-45 and the WS-X6148-SFP
modules.
The period is required when you enter the fractional-suppression level.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1178

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
storm-control level

The suppression level is entered as a percentage of the total bandwidth. A threshold value of 100 percent
means that no limit is placed on traffic. A threshold value of 0 or 0.0 (fractional) percent means that all
specified traffic is blocked on a port, with the following guidelines:
•

A fractional level value of 0.33 or lower is the same as 0.0 on the following modules:
– WS-X6704-10GE
– WS-X6748-SFP
– WS-X6724-SFP
– WS-X6748-GE-TX

•

Enter 0 on all other modules to block all specified traffic on a port.

Enter the show interfaces counters broadcast command to display the discard count.
Enter the show running-config command to display the enabled suppression mode and level setting.
To turn off suppression for the specified traffic type, you can do one of the following:

Examples

•

Set the level to 100 percent for the specified traffic type.

•

Use the no form of this command.

This example shows how to enable and set the suppression level:
Router(config-if)# storm-control broadcast level 30
Router(config-if)#

This example shows how to disable the suppression mode:
Router(config-if)# no storm-control multicast level
Router(config-if)#

Related Commands

Command

Description

show interfaces
counters

Displays the traffic that the physical interface sees.

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1179

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport

switchport
To modify the switching characteristics of the Layer 2-switched interface, use the switchport command
(without parameters).To return the interface to the routed-interface status and cause all further Layer 2
configuration to be erased, use the no form of this command (without parameters). Use the switchport
commands (with parameters) to configure the switching characteristics.
switchport
switchport {host | nonegotiate}
no switchport
no switchport nonegotiate

Syntax Description

host

Optimizes the port configuration for a host connection.

nonegotiate

Specifies that the device will not engage in a negotiation protocol on this interface.

Defaults

The default access VLAN and trunk-interface native VLAN are default VLANs that correspond to the
platform or interface hardware.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enter the switchport command without any keywords to configure the LAN interface as a
Layer 2 interface before you can enter additional switchport commands with keywords. This action is
required only if you have not entered the switchport command for the interface.
Entering the no switchport command shuts down the port and then reenables it. This action may
generate messages on the device to which the port is connected.
To optimize the port configuration, entering the switchport host command sets the switch port mode to
access, enables spanning tree PortFast, and disables channel grouping. Only an end station can accept
this configuration.
Because spanning-tree PortFast is enabled, you should enter the switchport host command only on ports
that are connected to a single host. Connecting other Catalyst 6500 series switches, hubs, concentrators,
switches, and bridges to a fast-start port can cause temporary spanning-tree loops.
Enable the switchport host command to decrease the time that it takes to start up packet forwarding.
The no form of the switchport nonegotiate command removes nonegotiate status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1180

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport

When using the nonegotiate keyword, DISL/DTP-negotiation packets are not sent on the interface. The
device trunks or does not trunk according to the mode parameter given: access or trunk. This command
returns an error if you attempt to execute it in dynamic (auto or desirable) mode.
You must force a port to trunk before you can configure it as a SPAN-destination port. Use the
switchport nonegotiate command to force the port to trunk.

Examples

This example shows how to cause the port interface to stop operating as a Cisco-routed port and convert
to a Layer 2-switched interface:
Router(config-if)# switchport
Router(config-if)#

Note

The switchport command is not used on platforms that do not support Cisco-routed ports. All physical
ports on such platforms are assumed to be Layer 2-switched interfaces.
This example shows how to optimize the port configuration for a host connection:
Router(config-if)# switchport host
switchport mode will be set to access
spanning-tree portfast will be enabled
channel group will be disabled
Router(config-if)#

This example shows how to cause a port interface that has already been configured as a switched
interface to refrain from negotiating trunking mode and act as a trunk or access port (depending on the
mode set):
Router(config-if)# switchport nonegotiate
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1181

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport access vlan

switchport access vlan
To set the VLAN when the interface is in access mode, use the switchport access vlan command. To
reset the access-mode VLAN to the appropriate default VLAN for the device, use the no form of this
command.
switchport access vlan vlan-id
no switchport access vlan

Syntax Description

vlan-id

Defaults

The defaults are as follows:

VLAN to set when the interface is in access mode; valid values are from 1 to 4094.

•

Access VLAN and trunk-interface native VLAN are default VLANs that correspond to the platform
or interface hardware.

•

All VLAN lists include all VLANs.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enter the switchport command without any keywords to configure the LAN interface as a
Layer 2 interface before you can enter the switchport access vlan command. This action is required only
if you have not entered the switchport command for the interface.
Entering the no switchport command shuts down the port and then reenables it. This action may
generate messages on the device to which the port is connected.
The no form of the switchport access vlan command resets the access-mode VLAN to the appropriate
default VLAN for the device.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1182

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport access vlan

Examples

This example shows how to cause the port interface to stop operating as a Cisco-routed port and convert
to a Layer 2-switched interface:
Router(config-if)# switchport
Router(config-if)#

Note

The switchport command is not used on platforms that do not support Cisco-routed ports. All physical
ports on such platforms are assumed to be Layer 2-switched interfaces.
This example shows how to cause a port interface that has already been configured as a switched
interface to operate in VLAN 2 instead of the platform’s default VLAN in the interface-configuration
mode:
Router(config-if)# switchport access vlan 2
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1183

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport autostate exclude

switchport autostate exclude
To exclude a port from the VLAN interface link-up calculation, use the switchport autostate exclude
command. To return to the default settings, use the no form of this command.
switchport autostate exclude
no switchport autostate exclude

Syntax Description

This command has no keywords or arguments.

Defaults

All ports are included in the VLAN interface link-up calculation.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

You must enter the switchport command without any keywords to configure the LAN interface as a
Layer 2 interface before you can enter the switchport autostate exclude command. This action is
required only if you have not entered the switchport command for the interface.

The switchport command is not used on platforms that do not support Cisco-routed ports. All physical
ports on such platforms are assumed to be Layer 2-switched interfaces.
A VLAN interface configured on the PISA is considered up if there are ports forwarding in the
associated VLAN. When all ports on a VLAN are down or blocking, the VLAN interface on the PISA
is considered down. For the VLAN interface to be considered up, all the ports in the VLAN need to be
up and forwarding. You can enter the switchport autostate exclude command to exclude a port from
the VLAN interface link-up calculation.
The switchport autostate exclude command marks the port to be excluded from the interface VLAN
up calculation when there are multiple ports in the VLAN.
The show interface interface switchport command displays the autostate mode if the mode has been
set. If the mode has not been set, the autostate mode is not displayed.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1184

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport autostate exclude

Examples

This example shows how to exclude a port from the VLAN interface link-up calculation:
Router(config-if)# switchport autostate exclude
Router(config-if)#

This example shows how to include a port in the VLAN interface link-up calculation:
Router(config-if)# no switchport autostate exclude
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1185

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport backup

switchport backup
To configure an interface as a Flexlink backup interface, use the switchport backup command. To
disable Flexlink, use the no form of this command.
switchport backup interface interface-type interface-number
no switchport backup interface interface-type interface-number

Syntax Description

interface interface-type Specifies the interface type and the module and port number to configure as
interface-number
a Flexlink backup interface.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When you enable Flexlink, both the active and the standby links are up physically and mutual backup is
provided.
Flexlink is supported on Layer 2 interfaces only and does not support routed ports.
Flexlink does not switch back to the original active interface after recovery.
The interface-number designates the module and port number. Valid values depend on the chassis and
module that are used. For example, if you have a 48-port 10/100BASE-T Ethernet module that is
installed in a 13-slot chassis, valid values for the slot number are from 1 to 13 and valid values for the
port number are from 1 to 48.
Flexlink is designed for simple access topologies (two uplinks from a leaf node). You must ensure that
there are no loops from the wiring closet to the distribution/core network to enable Flexlink to perform
correctly.
Flexlink converges faster for directly connected link failures only. Any other network failure has no
improvement with Flexlink fast convergence.
You must enter the switchport command without any keywords to configure the LAN interface as a
Layer 2 interface before you can enter the switchport autostate exclude command. This action is
required only if you have not entered the switchport command for the interface.

Note

The switchport command is not used on platforms that do not support Cisco-routed ports. All physical
ports on such platforms are assumed to be Layer 2-switched interfaces.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1186

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport backup

Examples

This example shows how to enable Flexlink on an interface:
Router(config-if)# switchport backup interface fastethernet 4/1
Router(config-if)#

This example shows how to disable Flexlink on an interface:
Router(config-if)# switchport backup interface fastethernet 4/1
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport backup

Displays Flexlink pairs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1187

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport block unicast

switchport block unicast
To prevent the unknown unicast packets from being forwarded, use the switchport block unicast
command. To allow the unknown unicast packets to be forwarded, use the no form of this command.
switchport block unicast
no switchport block unicast

Syntax Description

This command has no arguments or keywords.

Defaults

The default settings are as follows:
•

Unknown unicast traffic is not blocked.

•

All traffic with unknown MAC addresses is sent to all ports.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can block the unknown unicast traffic on the switch ports.
Blocking the unknown unicast traffic is not automatically enabled on the switch ports; you must
explicitly configure it.

Note

For more information about blocking the packets, refer to the Catalyst Supervisor Engine 32 PISA Cisco
IOS Software Configuration Guide—Release 12.2ZY.
You can verify your setting by entering the show interfaces interface-id switchport command.

Examples

This example shows how to block the unknown unicast traffic on an interface:
Router(config-if)# switchport block unicast
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1188

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport capture

switchport capture
To configure the port to capture VACL-filtered traffic, use the switchport capture command. To
disable the capture mode on the port, use the no form of this command.
switchport capture
no switchport capture

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enter the switchport command without any keywords to configure the LAN interface as a
Layer 2-switched interface before you can enter additional switchport commands with keywords. This
action is required only if you have not entered the switchport command for the interface.
The VACL capture function for the NAM is supported on the Supervisor Engine 720 but is not supported
with the IDSM-2.
The switchport capture command applies only to Layer 2-switched interfaces.
WAN interfaces support only the capture functionality of VACLs.
Entering the no switchport command shuts down the port and then reenables it. This action may
generate messages on the device to which the port is connected.
Entering the switchport capture command sets the capture function on the interface so that the packets
with the capture bit set are received by the interface.
There is no restriction on the order that you enter the switchport capture and switchport capture
allowed vlan commands. The port does not become a capture port until you enter the switchport
capture (with no arguments) command.
The capture port must allow the destination VLANs of the captured packets. Once you enable a capture
port, the packets are allowed from all VLANs by default, the capture port is on longer in the originally
configured mode, and the capture mode enters monitor mode. In monitor mode, the capture port does the
following:
•

Does not belong to any VLANs that it was in previously.

•

Does not allow incoming traffic.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1189

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport capture

Examples

•

Preserves the encapsulation on the capture port if you enable the capture port from a trunk port and
the trunking encapsulation was ISL or 802.1Q. The captured packets are encapsulated with the
corresponding encapsulation type. If you enable the capture port from an access port, the captured
packets are not encapsulated.

•

When you enter the no switchport capture command to disable the capture function, the port
returns to the previously configured mode (access or trunk).

•

Packets are captured only if the destination VLAN is allowed on the capture port.

This example shows how to configure an interface to capture VACL-filtered traffic:
Router(config-if)# switchport capture
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

switchport capture
allowed vlan

Specifies the destination VLANs of the VACL-filtered traffic.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1190

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport capture allowed vlan

switchport capture allowed vlan
To specify the destination VLANs of the VACL-filtered traffic, use the switchport capture allowed
vlan command. To clear the configured-destination VLAN list and return to the default settings, use the
no form of this command.
switchport capture allowed vlan {add | all | except | remove} vlan-id [,vlan-id[,vlan-id[,...]]
no switchport capture allowed vlan

Syntax Description

add

Adds the specified VLANs to the current list.

all

Adds all VLANs to the current list.

except

Adds all VLANs except the ones that are specified.

remove

Removes the specified VLANs from the current list.

vlan-id

VLAN IDs of the allowed VLANs when this port is in capture mode; valid values
are from 1 to 4094.

Defaults

all

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You must enter the switchport command without any keywords to configure the LAN interface as a
Layer 2-switched interface before you can enter additional switchport commands with keywords. This
action is required only if you have not entered the switchport command for the interface.
The switchport capture allowed vlan command applies only to Layer 2-switched interfaces.
Entering the no switchport command shuts down the port and then reenables it. This action may
generate messages on the device to which the port is connected.
You can enter the vlan-id as a single VLAN, a group of VLANs, or both. For example, you would enter
switchport capture allowed vlan 1-1000, 2000, 3000-3100.
There is no restriction on the order that you enter the switchport capture and switchport capture
allowed vlan commands. The port does not become a capture port until you enter the switchport
capture (with no arguments) command.
WAN interfaces support only the capture functionality of VACLs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1191

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport capture allowed vlan

Examples

This example shows how to add the specified VLAN to capture VACL-filtered traffic:
Router(config-if)# switchport capture allowed vlan add 100
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1192

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport dot1q ethertype

switchport dot1q ethertype
To specify the EtherType value to be programmed on the interface, use the switchport dot1q ethertype
command. To return to the default settings, use the no form of this command.
switchport dot1q ethertype value

Syntax Description

value

Defaults

The value is 0x8100.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

EtherType value for 802.1Q encapsulation; valid values are from 0x600 to 0xFFFF.

You can configure a custom EtherType-field value on trunk ports and on access ports.
Each port supports only one EtherType-field value. A port that is configured with a custom
EtherType-field value does not recognize frames that have any other EtherType-field value as tagged
frames.

Caution

A port that is configured with a custom EtherType-field value considers frames that have any other
EtherType-field value to be untagged frames. A trunk port that is configured with a custom
EtherType-field value puts frames that are tagged with any other EtherType-field value into the native
VLAN. An access port or tunnel port that is configured with a custom EtherType-field value puts frames
that are tagged with any other EtherType-field value into the access VLAN.
You can configure a custom EtherType-field value on the following modules:
•

Supervisor engines

•

WS-X6516A-GBIC

•

WS-X6516-GBIC

Note

•

The WS-X6516A-GBIC and WS-X6516-GBIC modules apply a configured custom
EtherType-field value to all ports that are supported by each port ASIC (1 through 8 and 9
through 16).
WS-X6516-GE-TX

You cannot configure a custom EtherType-field value on the ports in an EtherChannel.
You cannot form an EtherChannel from ports that are configured with custom EtherType-field values.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1193

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport dot1q ethertype

Examples

This example shows how to set the EtherType value to be programmed on the interface:
Router (config-if)# switchport dot1q ethertype 1234
Router (config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1194

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport mode

switchport mode
To set the interface type, use the switchport mode command. To reset the mode to the appropriate
default mode for the device, use the no form of this command.
switchport mode {access | trunk | {dynamic {auto | desirable}} | dot1q-tunnel}
switchport mode private-vlan {host | promiscuous}
no switchport mode
no switchport mode private-vlan

Syntax Description

Defaults

access

Specifies the nontrunking, nontagged single-VLAN Layer-2 interface.

trunk

Specifies the trunking VLAN interface in Layer 2.

dynamic auto

Specifies the interface that converts the link to a trunk link.

dynamic
desirable

Specifies the interface that actively attempts to convert the link to a trunk link.

dot1q-tunnel

Specifies the 802.1Q-tunneling interface.

private-vlan
host

Specifies the ports with a valid PVLAN association that become active
host-PVLAN ports.

private-vlan
promiscuous

Specifies the ports with a valid PVLAN mapping that become active
promiscuous ports.

The defaults are as follows:
•

The mode is dependent on the platform; it should either be dynamic auto for platforms that are
intended for wiring closets or dynamic desirable for platforms that are intended as backbone
switches.

•

No mode is set for PVLAN ports.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter access mode, the interface goes into permanent nontrunking mode and negotiates to convert
the link into a nontrunk link even if the neighboring interface does not agree to the change.
If you enter trunk mode, the interface goes into permanent trunking mode and negotiates to convert the
link into a trunk link even if the neighboring interface does not agree to the change.
If you enter dynamic auto mode, the interface converts the link to a trunk link if the neighboring
interface is set to trunk or desirable mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1195

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport mode

If you enter dynamic desirable mode, the interface becomes a trunk interface if the neighboring
interface is set to trunk, desirable, or auto mode.
If you configure a port as a promiscuous or host-PVLAN port and one of the following applies, the port
becomes inactive:
•

The port does not have a valid PVLAN association or mapping configured.

•

The port is a SPAN destination.

If you delete a private-port PVLAN association or mapping, or if you configure a private port as a SPAN
destination, the deleted private-port PVLAN association or mapping or the private port that is configured
as a SPAN destination becomes inactive.
If you enter dot1q-tunnel mode, BPDU filtering is enabled and CDP is disabled on protocol-tunneled
interfaces.

Examples

This example shows how to set the interface to dynamic desirable mode:
Router(config-if)# switchport mode dynamic desirable
Router(config-if)#

This example shows how to set a port to PVLAN-host mode:
Router(config-if)# switchport mode private-vlan host
Router(config-if)#

This example shows how to set a port to PVLAN-promiscuous mode:
Router(config-if)# switchport mode private-vlan promiscuous
Router(config-if)#

Related Commands

Command

Description

show dot1q-tunnel

Displays a list of 802.1Q tunnel-enabled ports.

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

switchport

Modifies the switching characteristics of the Layer 2-switched interface.

switchport
private-vlan
host-association

Modifies the switching characteristics of the Layer 2-switched interface.

switchport
private-vlan mapping

Defines the PVLAN mapping for a promiscuous port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1196

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport port-security

switchport port-security
To enable port security on an interface, use the switchport port-security command. To disable port
security, use the no form of this command.
switchport port-security
no switchport port-security

Syntax Description

This command has no keywords or arguments.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

Follow these guidelines when configuring port security:
•

Port security is supported on trunks.

•

Port security is supported on 802.1Q tunnel ports.

•

A secure port cannot be a destination port for a Switch Port Analyzer (SPAN).

•

A secure port cannot belong to an EtherChannel.

•

A secure port cannot be a trunk port.

•

A secure port cannot be an 802.1X port. If you try to enable 802.1X on a secure port, an error
message appears, and 802.1X is not enabled. If you try to change an 802.1X-enabled port to a secure
port, an error message appears, and the security settings are not changed.

This example shows how to enable port security:
Router(config-if)# switchport port-security
Router(config-if)#

This example shows how to disable port security:
Router(config-if)# no switchport port-security
Router(config-if)#

Related Commands

Command

Description

show port-security

Displays information about the port-security setting.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1197

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport port-security aging

switchport port-security aging
To configure the port security aging, use the switchport port-security aging command. To disable
aging, use the no form of this command.
switchport port-security aging {{time time} | {type {absolute | inactivity}}}

Syntax Description

Defaults

time time

Sets the duration for which all addresses are secured; valid values are from 1 to
1440 minutes.

type

Specifies the type of aging.

absolute

Specifies absolute aging; see the “Usage Guidelines” section for more
information.

inactivity

Specifies that the timer starts to run only when there is no traffic; see the “Usage
Guidelines” section for more information.

The defaults are as follows:
•

Disabled

•

If enabled, the defaults are as follows:
– time is 0.
– type is absolute.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

Follow these guidelines when configuring port security:
•

Port security is supported on trunks.

•

Port security is supported on 802.1Q tunnel ports.

•

You can apply one of two types of aging for automatically learned addresses on a secure port:

•

Absolute aging times out the MAC address after the age-time has been exceeded, regardless of the
traffic pattern. This default is for any secured port, and the age-time is set to 0.

•

Inactivity aging times out the MAC address only after the age_time of inactivity from the
corresponding host has been exceeded.

This example shows how to set the aging time as 2 hours:
Router(config-if)# switchport port-security aging time 120
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1198

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport port-security aging

This example shows how to set the aging time as 2 minutes:
Router(config-if)# switchport port-security aging time 2
Router(config-if)#

This example shows how to set the aging type on a port to absolute aging:
Router(config-if) switchport port-security aging type absolute
Router(config-if)#

This example shows how to set the aging type on a port to inactivity:
Router(config-if) switchport port-security aging type inactivity
Router(config-if)#

Related Commands

Command

Description

show port-security

Displays information about the port-security setting.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1199

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport port-security mac-address

switchport port-security mac-address
To add a MAC address to the list of secure MAC addresses, use the switchport port-security
mac-address command. To remove a MAC address from the list of secure MAC addresses, use the no
form of this command.
switchport port-security mac-address {mac-addr | {sticky [mac-addr]}} [vlan vlan | vlan-list]
no switchport port-security mac-address mac-addr [vlan vlan | vlan-list]

Syntax Description

mac-addr

MAC addresses for the interface; valid values are from 1 to 1024.

sticky

Configures the dynamic MAC addresses as sticky on an interface.

vlan vlan |
vlan-list

(Optional) Specifies a VLAN or range of VLANs; see the “Usage Guidelines”
section for additional information.

Defaults

This command has no default settings.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you configure fewer secure MAC addresses than the maximum number of secure MAC addresses on
all interfaces, the remaining MAC addresses are dynamically learned.
To clear multiple MAC addresses, you must enter the no form of this command once for each MAC
address to be cleared.
The vlan-list argument is visible only if the port has been configured and is operational as a trunk. Enter
the switchport mode trunk command and then enter the switchport nonegotiate command.
The sticky keyword configures the dynamic MAC addresses as sticky on an interface. Sticky MAC
addresses configure the static Layer 2 entry to stay sticky to a particular interface. This feature can
prevent MAC moves or prevent the entry from being learned on a different interface.
You can configure the sticky feature even when port security is not enabled on the interface. It becomes
operational once port security is enabled on the interface.

Note

You can enter the switchport port-security mac-address sticky command only if the sticky feature is
enabled on the interface.
When port security is enabled, disabling the sticky feature causes all configured and learned sticky
addresses to be deleted from the configuration and converted into dynamic secure addresses.
When port security is disabled, disabling the sticky feature causes all configured and learned sticky
addresses to be deleted from the configuration.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1200

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport port-security mac-address

Examples

This example shows how to configure a secure MAC address:
Router(config-if)# switchport port-security mac-address 1000.2000.3000
Router(config-if)#

This example shows how to delete a secure MAC address from the address table:
Router(config-if)# no switchport port-security mac-address 1000.2000.3000
Router(config-if)#

This example shows how to enable the sticky feature on an interface:
Router(config-if)# switchport port-security mac-address sticky
Router(config-if)#

This example shows how to disable the sticky feature on an interface:
Router(config-if)# no switchport port-security mac-address sticky
Router(config-if)#

This example shows how to make a specific MAC address as a sticky address:
Router(config-if)# switchport port-security mac-address sticky 0000.0000.0001
Router(config-if)#

This example shows how to delete a specific sticky address:
Router(config-if)# no switchport port-security mac-address sticky 0000.0000.0001
Router(config-if)#

This example shows how to delete all sticky and static addresses that are configured on an interface:
Router(config-if)# no switchport port-security mac-address
Router(config-if)#

Related Commands

Command

Description

show port-security

Displays information about the port-security setting.

clear port-security

Deletes configured secure MAC addresses and sticky MAC addresses
from the MAC-address table.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1201

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport port-security maximum

switchport port-security maximum
To set the maximum number of secure MAC addresses on a port, use the switchport port-security
maximum command. To return to the default settings, use the no form of this command.
switchport port-security maximum maximum [vlan vlan | vlan-list]
no switchport port-security maximum

Syntax Description

maximum

Maximum number of secure MAC addresses for the interface; valid values are
from 1 to 4097.

vlan vlan |
vlan-list

(Optional) Specifies a VLAN or range of VLANs; see the “Usage Guidelines”
section for additional information.

Defaults

vlan is 1.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter this command more than once, subsequent use of this command overrides the previous value
of maximum. If the new maximum argument is larger than the current number of the secured addresses
on this port, there is no effect except to increase the value of the maximum.
If the new maximum is smaller than the old maximum and there are more secure addresses on the old
maximum, the command is rejected.
If you configure fewer secure MAC addresses than the maximum number of secure MAC addresses on
the port, the remaining MAC addresses are dynamically learned.
Once the maximum number of secure MAC addresses for the port is reached, no more addresses are
learned on that port even if the per-VLAN port maximum is different from the aggregate maximum
number.
You can override the maximum number of secure MAC addresses for the port for a specific VLAN or
VLANs by entering the switchport port-security maximum maximum vlan vlan | vlan-list command.
The vlan-list argument allows you to enter ranges, commas, and delimited entries such as 1,7,9-15,17.
The vlan-list argument is visible only if the port has been configured and is operational as a trunk. Enter
the switchport mode trunk command and then enter the switchport nonegotiate command.

Examples

This example shows how to set the maximum number of secure MAC addresses that are allowed on this
port:
Router(config-if)# switchport port-security maximum 5

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1202

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport port-security maximum

Router(config-if)#

This command shows how to override the maximum set for a specific VLAN:
Router(config-if)# switchport port-security maximum 3 vlan 102
Router(config-if)#

Related Commands

Command

Description

show port-security

Displays information about the port-security setting.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1203

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport port-security violation

switchport port-security violation
To set the action to be taken when a security violation is detected, use the switchport port-security
violation command. To return to the default settings, use the no form of this command.
switchport port-security violation {shutdown | restrict | protect}

Syntax Description

shutdown

Shuts down the port if there is a security violation.

restrict

Drops all the packets from the insecure hosts at the port-security process
level and increments the security-violation count.

protect

Drops all the packets from the insecure hosts at the port-security process
level but does not increment the security-violation count.

Defaults

shutdown

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Port-security violations occur because of the following reasons:
•

If the number of source MAC addresses seen on an interface is more than the port-security limit.

•

If a source MAC address secured on one port appears on another secure port. The violation occurs
in this situation because in restrict/protect mode the software is hit by the violation traffic. The
software can be protected from this condition by using mls rate-limit layer2 port-security
command.

When a security violation is detected, one of the following actions occurs:

Note

•

Protect—When the number of port-secure MAC addresses reaches the maximum limit that is
allowed on the port, the packets with unknown source addresses are dropped until you remove a
sufficient number of secure MAC addresses.

•

Restrict—A port-security violation restricts data and causes the security-violation counter to
increment.

•

Shutdown—The interface is error disabled when a security violation occurs.

When a secure port is in the error-disabled state, you can bring it out of this state by entering the
errdisable recovery cause psecure-violation global configuration command or you can manually
reenable it by entering the shutdown and no shutdown commands in interface-configuration mode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1204

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport port-security violation

Examples

This example shows how to set the action to be taken when a security violation is detected:
Router(config-if)# switchport port-security violation restrict
Router(config-if)#

Related Commands

Command

Description

show port-security

Displays information about the port-security setting.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1205

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport private-vlan host-association

switchport private-vlan host-association
To define a PVLAN association for an isolated or community port, use the switchport private-vlan
host-association command. To remove the PVLAN mapping from the port, use the no form of this
command.
switchport private-vlan host-association {primary-vlan-id} {secondary-vlan-id}
no switchport private-vlan host-association

Syntax Description

primary-vlan-id

Number of the primary VLAN of the PVLAN relationship; valid values are from
1 to 4094.

secondary-vlan-id

Number of the secondary VLAN of the private VLAN relationship; valid values
are from 1 to 4094.

Defaults

No PVLAN is configured.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

There is no run-time effect on the port unless it is in PVLAN-host mode. If the port is in PVLAN-host
mode but neither of the VLANs exist, the command is allowed but the port is made inactive.
The secondary VLAN may be an isolated or community VLAN.

Examples

This example shows how to configure a port with a primary VLAN (VLAN 18) and secondary VLAN
(VLAN 20):
Router(config-if)# switchport private-vlan host-association 18 20
Router(config-if)#

This example shows how to remove the PVLAN association from the port:
Router(config-if)# no switchport private-vlan host-association
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

switchport mode

Sets the interface type for this command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1206

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport private-vlan mapping

switchport private-vlan mapping
To define the PVLAN mapping for a promiscuous port, use the switchport private-vlan mapping
command. To clear all mappings from the primary VLAN, use the no form of this command.
switchport private-vlan mapping {primary-vlan-id} {secondary-vlan-list} |
{add secondary-vlan-list} | {remove secondary-vlan-list}
no switchport private-vlan mapping

Syntax Description

primary-vlan-id

Number of the primary VLAN of the PVLAN relationship; valid values
are from 1 to 4094.

secondary-vlan-id

Number of the secondary VLAN of the private VLAN relationship;
valid values are from 1 to 4094.

add

Maps the secondary VLANs to the primary VLAN.

remove

Clears mapping between the secondary VLANs and the primary
VLAN.

Defaults

No PVLAN mappings are configured.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

There is no run-time effect on the port unless it is in PVLAN-promiscuous mode. If the port is in
PVLAN-promiscuous mode but the VLANs do not exist, the command is allowed but the port is made
inactive.
The secondary VLAN may be an isolated or community VLAN.

Examples

This example shows how to configure the mapping of primary VLAN 18 to secondary isolated VLAN 20
on a port:
Router(config-if)# switchport private-vlan mapping 18 20
Router(config-if)#

This example shows how to add a VLAN to the mapping:
Router(config-if)# switchport private-vlan mapping 18 add 21
Router(config-if)#

This example shows how to remove the PVLAN mapping from the port:
Router(config-if)# no switchport private-vlan mapping
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1207

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport private-vlan mapping

Related Commands

Command

Description

show interfaces
private-vlan mapping

Displays the information about the PVLAN mapping for VLAN SVIs.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1208

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport trunk

switchport trunk
To set the trunk characteristics when the interface is in trunking mode, use the switchport trunk
command. To reset all of the trunking characteristics back to the default settings, use the no form of this
command.
switchport trunk encapsulation {isl | {dot1q [ethertype value]} | negotiate}
switchport trunk native vlan vlan-id
switchport trunk allowed vlan vlan-list
switchport trunk pruning vlan vlan-list
no switchport trunk {encapsulation {isl | dot1q | negotiate}} | {native vlan} | {allowed vlan} |
{pruning vlan}

Syntax Description

Defaults

Command Modes

encapsulation isl

Sets the trunk-encapsulation format to ISL.

encapsulation
dot1q

Sets the switch port-encapsulation format to 802.1Q.

ethertype value

Sets the EtherType value; valid values are from 0x0 to 0x5EF-0xFFFF.

encapsulation
negotiate

Specifies that if DISL and DTP negotiations do not resolve the
encapsulation format, then ISL is the selected format.

native vlan
vlan-id

Sets the native VLAN for the trunk in 802.1Q trunking mode; valid values
are from 1 to 4094.

allowed vlan
vlan-list

Allowed VLANs that transmit this interface in tagged format when in
trunking mode; valid values are from 1 to 4094.

pruning vlan
vlan-list

List of VLANs that are enabled for VTP pruning when in trunking mode;
valid values are from 1 to 4094.

The defaults are as follows:
•

The encapsulation type is dependent on the platform or interface hardware.

•

The access VLAN and trunk-interface native VLAN are default VLANs that correspond to the
platform or interface hardware.

•

All VLAN lists include all VLANs.

•

ethertype value for 802.1Q encapsulation is 0x8100.

Interface configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1209

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport trunk

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

This command is not supported on GE Layer 2 WAN ports.
The switchport trunk encapsulation command is supported only for platforms and interface hardware
that can support both ISL and 802.1Q formats.
If you enter the switchport trunk encapsulation isl command on a port channel containing an interface
that does not support ISL-trunk encapsulation, the command is rejected.
You can enter the switchport trunk allowed vlan command on interfaces where the span destination
port is either a trunk or an access port.

Note

The switchport trunk pruning vlan vlan-list command does not support extended-range VLANs; valid
vlan-list values are from 1 to 1005.
The dot1q ethertype value keyword and argument are not supported on port-channel interfaces. You
can enter the command on the individual port interface only. Also, you can configure the ports in a
channel group to have different EtherType configurations.

Caution

Be careful when configuring the custom EtherType value on a port. If you enter the negotiate keywords
and DISL and DTP negotiation do not resolve the encapsulation format, then ISL is the selected format
and may pose as a security risk. The no form of this command resets the trunk-encapsulation format back
to the default.
The no form of the native vlan command resets the native mode VLAN to the appropriate default VLAN
for the device.
The no form of the allowed vlan command resets the list to the default list, which allows all VLANs.
The no form of the pruning vlan command resets the list to the default list, which enables all VLANs
for VTP pruning.
The no form of the dot1q ethertype value command resets the list to the default value.
The vlan-list format is all | none | add | remove | except vlan-list[,vlan-list...] and is described as
follows:
•

all specifies all the appropriate VLANs. This keyword is not supported in the switchport trunk
pruning vlan command.

•

none indicates an empty list. This keyword is not supported in the switchport trunk allowed vlan
command.

•

add adds the defined list of VLANs to those currently set instead of replacing the list.

•

remove removes the defined list of VLANs from those currently set instead of replacing the list.
You can remove VLAN 1. If you remove VLAN 1 from a trunk, the trunk interface continues to send
and receive management traffic (for example, CDP3, VTP, PAgP4, and DTP) in VLAN 1.

Note

You can remove any of the default VLANs (1002 to 1005) from a trunk; this action is not
allowed in earlier releases.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1210

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport trunk

•

except lists the VLANs that should be calculated by inverting the defined list of VLANs.

•

vlan-list is either a single VLAN number from 1 to 4094 or a continuous range of VLANs that are
described by two VLAN numbers. The smaller number is first, separated by a hyphen that represents
the VLAN IDs of the allowed VLANs when this port is in trunking mode.

Do not enable the reserved VLAN range (1006 to 1024) on trunks when connecting a Catalyst 6500
series switch running the Cisco IOS software on both the supervisor engine and the PISA to a
Catalyst 6500 series switch running the Catalyst operating system. These VLANs are reserved in
Catalyst 6500 series switches running the Catalyst operating system. If enabled, Catalyst 6500 series
switches running the Catalyst operating system may error disable the ports if there is a trunking channel
between these systems.

Examples

This example shows how to cause a port interface that is configured as a switched interface to
encapsulate in 802.1Q-trunking format regardless of its default trunking format in trunking mode:
Router(config-if)# switchport trunk encapsulation dot1q
Router(config-if)#

Related Commands

Command

Description

show interfaces
switchport

Displays the administrative and operational status of a switching
(nonrouting) port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1211

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport vlan mapping

switchport vlan mapping
To map the traffic arriving on the VLAN original-vlan-id to the VLAN translated-vlan-id and the traffic that
is internally tagged with the VLAN translated-vlan-id with the VLAN original-vlan-id before leaving the
port, use the switchport vlan mapping command. To clear the mapping between a pair of VLANs or clear
all the mappings that are configured on the switch port, use the no form of this command.
switchport vlan mapping original-vlan-id translated-vlan-id
no switchport vlan mapping {{original-vlan-id translated-vlan-id} | all}

Syntax Description

original-vlan-id

Original VLAN number; valid values are from 1 to 4094.

translated-vlan-id

Translated VLAN number; valid values are from 1 to 4094.

all

Clears all the mappings that are configured on the switch port.

Defaults

No mappings are configured on any switch port.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is not supported on GE Layer 2 WAN ports.
You must enable VLAN translation on the port where you want VLAN translation to work. Use the
switchport vlan mapping enable command to enable VLAN translation.
Do not remove the VLAN that you are translating from the trunk. When you map VLANs, make sure
that both VLANs are allowed on the trunk that carries the traffic.
Table 2-95 lists the VLAN translation, the type of VLAN translation support, the number of ports that
you can configure per port group, and the trunk type for each module that supports VLAN translation.

Table 2-95 Modules that Support VLAN Translation

Product Number

VLAN Translation
Support Type

Number of
Port Groups

Port Ranges per
Port Group

Translations per VLAN Translation
Port Group
Trunk-Type Support

WS-SUP720

Per port group

1

1-2

32

802.1Q

WS-X6501-10GEX4

Per port

1

1 port in 1 group

32

802.1Q

WS-X6502-10GE

Per port

1

1 port in 1 group

32

802.1Q

WS-X6516A-GBIC

Per port group

2

1-8, 9-16

32

802.1Q

WS-X6516-GBIC

Per port group

2

1-8, 9-16

32

802.1Q

WS-X6516-GE-TX

Per port group

2

1-8, 9-16

32

802.1Q

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1212

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport vlan mapping

Table 2-95 Modules that Support VLAN Translation (continued)

Product Number

VLAN Translation
Support Type

Number of
Port Groups

Port Ranges per
Port Group

Translations per VLAN Translation
Port Group
Trunk-Type Support

WS-X6524-100FX-MM

Per port group

1

1-24

32

ISL and 802.1Q

WS-X6548-RJ-45

Per port group

1

1-48

32

ISL and 802.1Q

WS-X6548-RJ-21

Per port group

1

1-48

32

ISL and 802.1Q

The mapping that you configured using the switchport vlan mapping command does not become
effective until the switch port becomes an operational trunk port.
The VLAN mapping that is configured on a port may apply to all the other ports on the same ASIC. In
some cases, a mapping that is configured on one of the ports on an ASIC can overwrite a mapping that
is already configured on another port on the same ASIC.
The port VLAN mapping is applied to all the ports on a port ASIC if that ASIC does not support per-port
VLAN mapping.
If you configure VLAN mapping on the port ASIC that is a router port, the port-VLAN mapping does
not take effect until the port becomes a switch port.
You can map any two VLANs regardless of the trunk types carrying the VLANs.

Examples

This example shows how to map the original VLAN to the translated VLAN:
Router(config-if)# switchport vlan mapping 100 201
Router(config-if)#

This example shows how to clear the mappings that are between a pair of VLANs:
Router(config-if)# no switchport vlan mapping 100 201
Router(config-if)#

This example shows how to clear all the mappings that are configured on the switch port:
Router(config-if)# no switchport vlan mapping 100 201
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1213

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport vlan mapping

Related Commands

Command

Description

show interfaces vlan
mapping

Displays the status of a VLAN mapping on a port.

show vlan mapping

Registers a mapping of an 802.1Q VLAN to an ISL VLAN.

switchport vlan
mapping enable

Enables VLAN mapping per switch port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1214

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport vlan mapping enable

switchport vlan mapping enable
To enable VLAN mapping per switch port, use the switchport vlan mapping enable command. To
disable VLAN mapping per switch port, use the no form of this command.
switchport vlan mapping enable
no switchport vlan mapping enable

Defaults

VLAN mapping is disabled on all switch ports.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

You must enter the switchport vlan mapping enable command on the port where you want the mapping
to take place.
See Table 2-95 for a list of modules that support this command.
The switchport vlan mapping enable command enables or disables VLAN-mapping lookup in the
hardware regardless of whether the mapping is configured by the global VLAN mapping command or
the switchport VLAN mapping command.
This command is useful on the hardware that supports VLAN mapping per ASIC only because you can
turn on or off VLAN translation selectively on ports that are connected to the same port ASIC.

Examples

This example shows how to enable VLAN mapping per switch port:
Router(config-if)# switchport vlan mapping enable
Router(config-if)#

This example shows how to disable VLAN mapping per switch port:
Router(config-if)# no switchport vlan mapping enable
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1215

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport vlan mapping enable

Related Commands

Command

Description

show interfaces vlan
mapping

Displays the status of a VLAN mapping on a port.

show vlan mapping

Registers a mapping of an 802.1Q VLAN to an ISL VLAN.

switchport vlan
mapping

Maps the traffic arriving on the VLAN original-vlan-id to the VLAN
translated-vlan-id and the traffic that is internally tagged with the VLAN
translated-vlan-id with the VLAN original-vlan-id before leaving the port.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1216

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
switchport voice vlan

switchport voice vlan
To configure a voice VLAN on a multiple-VLAN access port, use the switchport voice vlan command.
To remove the voice VLAN from the switch port, use the no form of this command.
switchport voice vlan {dot1p | none | untagged | vvid}
no switchport voice vlan

Syntax Description

dot1p

Sends CDP packets that configure the IP phone to transmit voice traffic in
the default VLAN in 802.1p frames that are tagged with a Layer 2 CoS
value.

none

Allows the IP phone to use its own configuration and transmit untagged
voice traffic in the default VLAN.

untagged

Sends CDP packets that configure the IP phone to transmit untagged voice
traffic in the default VLAN.

vvid

Voice VLAN identifier; valid values are from 1 to 4094. Sends CDP packets
that configure the IP phone to transmit voice traffic in the voice VLAN in
802.1Q frames that are tagged with a Layer 2 CoS value.

Defaults

none

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The default Layer 2 CoS is 5. The default Layer 3 IP-precedence value is 5.
This command does not create a voice VLAN. You can create a voice VLAN in VLAN-configuration
mode by entering the vlan (global configuration mode) command. If you configure both the native
VLAN and the voice VLAN in the VLAN database and set the switch port to multiple-VLAN access
mode, this command brings up the switch port as operational.
If you enter dot1p, the switch port is enabled to receive 802.1p packets only.
If you enter none, the switch port does not send CDP packets with VVID TLVs.
If you enter untagged, the switch port is enabled to receive untagged packets only.
If you enter vvid, the switch port receives packets that are tagged with the specified vvid.

Examples

This example shows how to create an operational multiple-VLAN access port:
Router(config-if)# switchport
Router(config-if)# switchport mode access

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1217

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

switchport voice vlan

Router(config-if)# switchport access vlan 100
Router(config-if)# switchport voice vlan 101
Router(config-if)

This example shows how to change the multiple-VLAN access port to a normal access port:
Router(config-if)# interface fastethernet5/1
Router(config-if)# no switchport voice vlan
Router(config-if)

Related Commands

Command

Description

switchport access vlan Sets the VLAN when the interface is in access mode.
switchport mode

Sets the interface type.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1218

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
sync-restart-delay

sync-restart-delay
To set the synchronization-restart delay timer to ensure accurate status reporting, use the
sync-restart-delay command.
sync-restart-delay timer

Syntax Description

timer

Defaults

timer is 210 milliseconds.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interval between status-register resets; valid values are from 200 to
60000 milliseconds.

This command is supported on Gigabit Ethernet fiber ports only.
The status register records the current status of the link partner.

Examples

This example shows how to set the Gigabit Ethernet synchronization-restart delay timer:
Router(config-if)# sync-restart-delay 2000
Router(config-if)#

Related Commands

Command

Description

show running-config

Displays the status and configuration of the module or Layer 2 VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1219

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

system flowcontrol bus

system flowcontrol bus
To set the FIFO overflow error count, use the system flowcontrol bus command. To return to the
original FIFO threshold settings, use the no form of this command.
[default] system flowcontrol bus {auto | on}
no system flowcontrol bus

Syntax Description

default

(Optional) Specifies the default settings.

auto

Monitors the FIFO overflow error count and sends a warning message if the FIFO
overflow error count exceeds a configured error threshold in 5-second intervals.

on

(Optional) Specifies the original FIFO threshold settings.

Defaults

auto

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

Examples

We recommend that you leave the system flow control in auto mode and use the other modes under the
advice of Cisco TAC only.

This example shows how to monitor the FIFO overflow error count and send a warning message if the
FIFO overflow error count exceeds a configured error threshold in 5-second intervals:
Router(config)# system flowcontrol bus auto
Router(config)#

This example shows how to specify the original FIFO threshold settings:
Router(config)# system flowcontrol bus on
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1220

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
system jumbomtu

system jumbomtu
To set the maximum size of the Layer 2 and Layer 3 packets, use the system jumbomtu command. To
revert to the default MTU setting, use the no form of this command.
system jumbomtu mtu-size
no system jumbomtu

Syntax Description

mtu-size

Defaults

mtu-size is 9216 bytes.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Maximum size of the Layer 2 and Layer 3 packets; valid values are from
1500 to 9216 bytes.

The mtu-size parameter specifies the Ethernet packet size, not the total Ethernet frame size. The Layer 3
MTU is changed as a result of entering the system jumbomtu command.
The system jumbomtu command enables the global MTU for port ASICs. On a port ASIC after jumbo
frames are enabled, the port ASIC accepts any size packet on the ingress side and checks the outgoing
packets on the egress side. The packets on the egress side that exceed the global MTU are dropped by
the port ASIC.
For example, if you have port A in VLAN 1 and Port B in VLAN 2, and if VLAN 1 and VLAN 2 are
configured for mtu 9216 and you enter the system jumbomtu 4000 command, the packets that are larger
than 4000 bytes are not transmitted out because Ports B and A drop packets that are larger than
4000 bytes.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1221

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

system jumbomtu

Examples

This example shows how to set the global MTU size to 1550 bytes:
Router(config)# system jumbomtu 1550
Router(config)# end
Router#

This example shows how to revert to the default MTU setting:
Router(config)# no system jumbomtu
Router(config)#

Related Commands

Command

Description

mtu

Adjusts the maximum packet size or MTU size.

show interfaces

Displays traffic that is seen by a specific interface.

show system
jumbomtu

Displays the global MTU setting.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1222

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
tcam priority

tcam priority
To prioritize the interfaces that are forwarded to the software in the event of TCAM entry or label exhaustion,
use the tcam priority command.
tcam priority {high | normal | low}

Syntax Description

high

Sets priority to high.

normal

Sets priority to normal.

low

Sets priority to low.

Defaults

normal

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The interfaces are chosen in this order:
1.

Low-priority interfaces without VACLs and without multicast

2.

Low-priority interfaces without VACLs and approved by multicast

3.

Low-priority interfaces with VACLs and approved by multicast

4.

Low-priority interfaces (not approved by multicast)

5.

Normal-priority interfaces without VACLs and without multicast

6.

Normal-priority interfaces without VACLs and approved by multicast

7.

Normal-priority interfaces with VACLs and approved by multicast

8.

Normal-priority interfaces (not approved by multicast)

9.

High-priority interfaces without VACLs and without multicast

10. High-priority interfaces without VACLs and approved by multicast
11. High-priority interfaces with VACLs and approved by multicast
12. High-priority interfaces (not approved by multicast)

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1223

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

tcam priority

Examples

This example shows how to set the priority:
Router(config-if)# tcam priority low
Router(config-if)#

Related Commands

Command

Description

show tcam interface

Displays information about the interface-based TCAM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1224

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
test cable-diagnostics

test cable-diagnostics
To test the condition of 10-Gigabit Ethernet links or copper cables on 48-port 10/100/1000 BASE-T
modules, use the test cable-diagnostics command.
test cable-diagnostics tdr interface {interface interface-number}

Syntax Description

tdr

Activates the TDR test for copper cables on 48-port 10/100/1000 BASE-T
modules.

interface interface Specifies the interface type; see the “Usage Guidelines” section for valid
values.
interface-number

Module and port number.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Cable diagnostics can help you detect whether your cable has connectivity problems.
The TDR test guidelines are as follows:
•

TDR can test cables up to a maximum length of 115 meters.

•

See the Release Notes for Cisco IOS Release 12.2 ZY for the list of the modules that support TDR.

•

The valid values for interface interface are fastethernet and gigabitethernet.

•

Do not start the test at the same time on both ends of the cable. Starting the test at both ends of the
cable at the same time can lead to false test results.

•

Do not change the port configuration during any cable diagnostics test. This action may result in
incorrect test results.

•

The interface must be up before running the TDR test. If the port is down, the test cable-diagnostics
tdr command is rejected and the following message is displayed:
Router# test cable-diagnostics tdr interface gigabitethernet2/12
% Interface Gi2/12 is administratively down
% Use 'no shutdown' to enable interface before TDR test start.

•

If the port speed is 1000 and the link is up, do not disable the auto-MDIX feature.

•

For fixed 10/100 ports, before running the TDR test, disable auto-MDIX on both sides of the cable.
Failure to do so can lead to misleading results.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1225

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

test cable-diagnostics

Examples

•

For all other conditions, you must disable the auto-MDIX feature on both ends of the cable (use the
no mdix auto command). Failure to disable auto-MDIX will interfere with the TDR test and
generate false results.

•

If a link partner has auto-MDIX enabled, this action will interfere with the TDR-cable diagnostics
test and test results will be misleading. The workaround is to disable auto-MDIX on the link partner.

•

If you change the port speed from 1000 to 10/100, enter the no mdix auto command before running
the TDR test. Note that entering the speed 1000 command enables auto-MDIX regardless of whether
the no mdix auto command has been run.

This example shows how to run the TDR-cable diagnostics:
Router # test cable-diagnostics tdr interface gigabitethernet2/1
TDR test started on interface Gi2/1
A TDR test can take a few seconds to run on an interface
Use 'show cable-diagnostics tdr' to read the TDR results.
Router #

Related Commands

Command

Description

clear cable-diagnostics tdr

Clears a specific interface or clears all interfaces that support TDR.

show cable-diagnostics tdr

Displays the test results for the TDR cable diagnostics.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1226

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
time-range

time-range
To enable time-range configuration mode and define time ranges for functions (such as extended access
lists), use the time-range command. To remove the time limitation, use the no form of this command.
time-range time-range-name
no time-range time-range-name

Syntax Description

time-range-name

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Name for the time range.

The time-range entries are identified by a name, which is referred to by one or more other configuration
commands. Multiple time ranges can occur in a single access list or other feature.
The time-range-name cannot contain a space or quotation mark and must begin with an alphabetical
character.

Note

IP and IPX-extended access lists are the only types of access lists that can use time ranges.
After you use the time-range command, use the periodic time-range configuration command, the
absolute time-range configuration command, or some combination of those commands to define when
the feature is in effect. Multiple periodic commands are allowed in a time range; only one absolute
command is allowed.

Tips

Examples

To avoid confusion, use different names for time ranges and named access lists.

This example shows how to deny HTTP traffic on Monday through Friday from 8:00 a.m. to 6:00 p.m.
and allow UDP traffic on Saturday and Sunday from noon to midnight only:
Router(config)#
Router(config)#
!
Router(config)#
Router(config)#
!
Router(config)#

time-range no-http
periodic weekdays 8:00 to 18:00
time-range udp-yes
periodic weekend 12:00 to 24:00
ip access-list extended strict

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1227

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

time-range

Router(config)#
Router(config)#
!
Router(config)#
Router(config)#

Related Commands

deny tcp any any eq http time-range no-http
permit udp any any time-range udp-yes
interface ethernet 0
ip access-group strict in

Command

Description

absolute

Specifies an absolute time when a time range is in effect.

ip access-list

Defines an IP access list by name.

periodic

Specifies a recurring (weekly) time range for functions that support the
time-range feature.

permit (IP)

Sets conditions for a named IP access list.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1228

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
traceroute mac

traceroute mac
To display the Layer 2 path taken by the packets from the specified source to the specified destination,
use the traceroute mac command.
traceroute mac source-mac-address {destination-mac-address | {interface type interface-number
destination-mac-address}} [vlan vlan-id] [detail]
traceroute mac interface type interface-number source-mac-address {destination-mac-address |
{interface type interface-number destination-mac-address}} [vlan vlan-id] [detail]
traceroute mac ip {source-ip-address | source-hostname} {destination-ip-address |
destination-hostname} [detail]

Syntax Description

source-mac-address

MAC address of the source switch in hexadecimal format.

destination-mac-address

MAC address of the destination switch in hexadecimal format.

interface type

Specifies the interface where the MAC address resides; valid values are
FastEthernet, GigabitEthernet, and Port-channel.

interface-number

Module and port number or the port-channel number; valid values for the
port channel are from 1 to 282.

vlan vlan-id

(Optional) Specifies the VLAN on which to trace the Layer 2 path that the
packets take from the source switch to the destination switch; valid values
are from 1 to 4094.

detail

(Optional) Displays detailed information about the Layer 2 trace.

ip

Specifies the IP address where the MAC address resides.

source-ip-address

IP address of the source switch as a 32-bit quantity in dotted-decimal
format.

source-hostname

IP hostname of the source switch.

destination-ip-address

IP address of the destination switch as a 32-bit quantity in dotted-decimal
format.

destination-hostname

IP hostname of the destination switch.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Do not use leading zeros when entering a VLAN ID.
You must enable CDP on all of the switches in the network. Do not disable CDP so that Layer 2
traceroute can function properly.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1229

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

traceroute mac

When the switch detects a device in the Layer 2 path that does not support Layer 2 traceroute, the switch
continues to send Layer 2 trace queries and lets them time out.
The maximum number of hops identified in the path is ten.
Layer 2 traceroute supports unicast traffic only. If you specify a multicast source or destination MAC
address, the physical path is not identified, and a message appears.
The traceroute mac command output shows the Layer 2 path when the specified source and destination
addresses belong to the same VLAN. If you specify source and destination addresses that belong to
different VLANs, the Layer 2 path is not identified, and a message appears.
If the source or destination MAC address belongs to multiple VLANs, you must specify the VLAN to
which both the source and destination MAC addresses belong. If the VLAN is not specified, the path is
not identified, and a message appears.
When multiple devices are attached to one port through hubs (for example, multiple CDP neighbors are
detected on a port), the Layer 2 traceroute utility terminates at that hop and displays an error message.
This feature is not supported in Token Ring VLANs.

Examples

This example shows how to display detailed information about the Layer 2 path:
Router# traceroute mac 0001.0000.0204 0001.0000.0304 detail
Source 0001.0000.0204 found on VAYU[WS-C6509] (2.1.1.10)
1 VAYU / WS-C6509 / 2.1.1.10 :
Gi6/1 [full, 1000M] => Po100 [auto, auto]
2 PANI / WS-C6509 / 2.1.1.12 :
Po100 [auto, auto] => Po110 [auto, auto]
3 BUMI / WS-C6509 / 2.1.1.13 :
Po110 [auto, auto] => Po120 [auto, auto]
4 AGNI / WS-C6509 / 2.1.1.11 :
Po120 [auto, auto] => Gi8/12 [full, 1000M]
Destination 0001.0000.0304 found on AGNI[WS-C6509] (2.1.1.11)
Layer 2 trace completed.
Router#

This example shows the output when the switch is not connected to the source switch:
Router# traceroute mac 0000.0201.0501 0000.0201.0201 detail
Source not directly connected, tracing source .....
Source 0000.0201.0501 found on con5[WS-C6509] (2.2.5.5)
con5 / WS-C6509 / 2.2.5.5 :
Fa0/1 [auto, auto] =>Gi0/1 [auto, auto]
con1 / WS-C6509 / 2.2.1.1 :
Gi0/1 [auto, auto] =>Gi0/2 [auto, auto]
con2 / WS-C6509 / 2.2.2.2 :
Gi0/2 [auto, auto] =>Fa0/1 [auto, auto]
Destination 0000.0201.0201 found on con2[WS-C6509] (2.2.2.2)
Layer 2 trace completed.
Router#

This example shows the output when the switch cannot find the destination port for the source MAC
address:
Router# traceroute mac 0000.0011.1111 0000.0201.0201
Error:Source Mac address not found.
Layer2 trace aborted.
Router#

This example shows the output when the source and destination devices are in different VLANs:
Router# traceroute mac 0000.0201.0601 0000.0301.0201

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1230

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
traceroute mac

Error:Source and destination macs are on different vlans.
Layer2 trace aborted.
Router#

This example shows the output when the destination MAC address is a multicast address:
Router# traceroute mac 0000.0201.0601 0100.0201.0201
Invalid destination mac address
Router#

This example shows the output when the source and destination switches belong to multiple VLANs:
Router# traceroute mac 0000.0201.0601 0000.0201.0201
Error:Mac found on multiple vlans.
Layer2 trace aborted.
Router#

This example shows how to display the Layer 2 path by specifying the interfaces on the source and
destination switches:
Router# traceroute mac interface fastethernet0/1 0000.0201.0601 interface fastethernet0/3 0000.0201.0201
Source 0000.0201.0601 found on con6[WS-C6509] (2.2.6.6)
con6 (2.2.6.6) :Fa0/1 =>Fa0/3
con5
(2.2.5.5
) :
Fa0/3 =>Gi0/1
con1
(2.2.1.1
) :
Gi0/1 =>Gi0/2
con2
(2.2.2.2
) :
Gi0/2 =>Fa0/1
Destination 0000.0201.0201 found on con2[WS-C6509] (2.2.2.2)
Layer 2 trace completed
Router#

This example shows how to display detailed traceroute information:
Router# traceroute mac ip 2.2.66.66 2.2.22.22 detail
Translating IP to mac.....
2.2.66.66 =>0000.0201.0601
2.2.22.22 =>0000.0201.0201
Source 0000.0201.0601 found on con6[WS-C6509] (2.2.6.6)
con6 / WS-C6509 / 2.2.6.6 :
Fa0/1 [auto, auto] =>Fa0/3 [auto, auto]
con5 / WS-C6509 / 2.2.5.5 :
Fa0/3 [auto, auto] =>Gi0/1 [auto, auto]
con1 / WS-C6509 / 2.2.1.1 :
Gi0/1 [auto, auto] =>Gi0/2 [auto, auto]
con2 / WS-C6509 / 2.2.2.2 :
Gi0/2 [auto, auto] =>Fa0/1 [auto, auto]
Destination 0000.0201.0201 found on con2[WS-C6509] (2.2.2.2)
Layer 2 trace completed.
Router#

This example shows how to display the Layer 2 path by specifying the source and destination hostnames:
Router# traceroute mac ip con6 con2
Translating IP to mac .....
2.2.66.66 =>0000.0201.0601
2.2.22.22 =>0000.0201.0201
Source 0000.0201.0601 found on con6
con6 (2.2.6.6) :Fa0/1 =>Fa0/3
con5
(2.2.5.5
) :
con1
(2.2.1.1
) :
con2
(2.2.2.2
) :
Destination 0000.0201.0201 found on con2
Layer 2 trace completed
Router#

Fa0/3 =>Gi0/1
Gi0/1 =>Gi0/2
Gi0/2 =>Fa0/1

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1231

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

traceroute mac

This example shows the output when ARP cannot associate the source IP address with the corresponding
MAC address:
Router# traceroute mac ip 2.2.66.66 2.2.77.77
Arp failed for destination 2.2.77.77.
Layer2 trace aborted.
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1232

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
track interface

track interface
To configure an interface to be tracked and to enter tracking configuration mode, use the track interface
command in global configuration mode. To remove the tracking, use the no form of this command.
track object-number interface type number {line-protocol | ip routing}
no track object-number interface type number {line-protocol | ip routing}

Syntax Description

object-number

Object number that represents the interface to be tracked; valid values are
from 1 to 500.

type number

Interface type and number to be tracked.

line-protocol

Tracks the state of the interface line protocol.

ip routing

Tracks if IP routing is enabled, if an IP address is configured on the interface,
and if the interface state is up before reporting to the tracking client that the
interface is up.

Defaults

No interface is tracked.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command reports a state value to clients. A tracked IP-routing object is considered up when the
following exists:
•

IP routing is enabled and active on the interface.

•

The interface line-protocol state is up.

•

The interface IP address is known. The IP address is configured or received through the Dynamic
Host Configuration Protocol (DHCP) or IP Control Protocol (IPCP) negotiation.

Interface IP routing will go down when one of the following exists:
•

IP routing is disabled globally.

•

The interface line-protocol state is down.

•

The interface IP address is unknown. The IP address is not configured or received through DHCP
or IPCP negotiation.

No space is required between the type number values.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1233

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

track interface

Tracking the IP-routing state of an interface using the track interface ip routing command can be more
useful in some situations than just tracking the line-protocol state using the track interface
line-protocol command, especially on interfaces for which IP addresses are negotiated. For example, on
a serial interface that uses the Point-to-Point Protocol (PPP), the line protocol could be up [link control
protocol (LCP) negotiated successfully], but IP could be down (IPCP negotiation failed).
The track interface ip routing command supports the tracking of an interface with an IP address
acquired through any of the following methods:

Examples

•

Conventional IP address configuration

•

PPP/IPCP

•

DHCP

•

Unnumbered interface

This example shows how to configure the tracking process to track the IP-routing capability of serial
interface 1/0:
Router(config)# track 1 interface serial1/0 ip routing
Router(config)#

Related Commands

Command

Description

show track

Displays HSRP tracking information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1234

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
transceiver type all monitoring

transceiver type all monitoring
To enable monitoring on all transceivers, use the transceiver type all monitoring command. To disable
monitoring, use the no form of this command.
transceiver type all monitoring
no transceiver type all monitoring

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Note

Examples

You can use the transceiver type all monitoring command to enable monitoring (for example,
collecting DOM information and evaluating threshold violations) for all transceiver types.

The no transceiver type all monitoring command overrides the snmp-server enable traps tranceiver
type all command and will not permit the generation of SNMP traps.

This example shows how to enable monitoring for all transceiver types:
Router(config)# transceiver type all monitoring
Router(config)#

This example shows how to disable monitoring for all transceiver types:
Router(config)# no transceiver type all monitoring
Router(config)#

Related Commands

Command

Description

snmp-server enable traps
transceiver type all

Enables all supported SNMP transceiver traps for all transceiver
types.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1235

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

tunnel udlr address-resolution

tunnel udlr address-resolution
To enable the forwarding of the ARP and NHRP over a UDL, use the tunnel udlr address-resolution
command. To disable forwarding, use the no form of this command.
tunnel udlr address-resolution
no tunnel udlr address-resolution

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the following modules only:
•

WS-X6704-10GE 4-port 10-Gigabit Ethernet

•

WS-X6816-GBIC 16-port Gigabit Ethernet

•

WS-X6516A-GBIC 16-port Gigabit Ethernet

•

WS-X6516-GBIC 16-port Gigabit Ethernet

UDLR back-channel tunnels do not support IPv6.
This command is supported on the send-only tunnel interface of a downstream router only.
You cannot configure software-based UDE on non-physical interfaces.
An ARP address resolution request that is received from the upstream router on the UDL (Ethernet
interface 0) is replied to over the send-only tunnel of the receiver. An ARP request may be sent by the
downstream router over the send-only tunnel, and the response is received over the UDL.

Examples

This example shows how to enable ARP and NHRP forwarding over a send-only tunnel:
Router(config-if)# tunnel udlr address-resolution
Router(config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1236

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
tunnel udlr address-resolution

Related Commands

Command

Description

show ip igmp udlr

Displays UDLR information for the connected multicast groups on the
interfaces that have a UDL helper address configured.

tunnel udlr
receive-only

Configures a unidirectional GRE tunnel to act as a back channel that can
receive messages from an interface that is configured for unidirectional link
routing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1237

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

tunnel udlr receive-only

tunnel udlr receive-only
To configure a unidirectional GRE tunnel to act as a back channel that can receive messages from an
interface that is configured for unidirectional link routing, use the tunnel udlr receive-only command.
To remove the tunnel, use the no form of this command.
tunnel udlr receive-only interface-type interface-number
no tunnel udlr receive-only interface-type interface-number

Syntax Description

interface-type
interface-number

Defaults

No UDLR tunnel is configured.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interface type and number.

This command is supported on the following modules only:
•

WS-X6704-10GE 4-port 10-Gigabit Ethernet

•

WS-X6816-GBIC 16-port Gigabit Ethernet

•

WS-X6516A-GBIC 16-port Gigabit Ethernet

•

WS-X6516-GBIC 16-port Gigabit Ethernet

The UDLR back-channel tunnels do not support IPv6.
Use this command to configure a router that has a unidirectional interface with send-only capabilities.
For example, you can use this command if you have traffic traveling through a satellite.
The interface-type and interface-number arguments must match the send-only interface type and number
specified by the interface command.
The interface-type and interface-number arguments must match the unidirectional send-only interface
type and number specified by the interface command. When the packets are received over the tunnel,
the upper layer protocols treat the packets as if they are received over the unidirectional send-only
interface.
You must configure the tunnel udlr send-only command at the opposite end of the tunnel.
For a description of the ip igmp unidirectional-link command, refer to the Cisco IOS Release 12.2
Command Reference.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1238

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
tunnel udlr receive-only

Examples

This example shows how to configure a unidirectional GRE tunnel to act as a back channel that can
receive messages from an interface that is configured for unidirectional link routing:
Router(config-if)# tunnel udlr receive-only serial 0
Router(config-if)#

Related Commands

Command

Description

interface

Selects an interface to configure and enters interface configuration mode.

ip igmp
unidirectional-link

Configures an interface to be unidirectional and enables it for IGMP UDLR.

show ip igmp udlr

Displays UDLR information for the connected multicast groups on the
interfaces that have a UDL helper address configured.

tunnel udlr send-only

Configures a unidirectional GRE tunnel to act as a back channel that can
send messages from an interface that is configured for unidirectional link
routing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1239

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

tunnel udlr send-only

tunnel udlr send-only
To configure a unidirectional GRE tunnel to act as a back channel that can send messages from an
interface that is configured for unidirectional link routing, use the tunnel udlr send-only command. To
remove the tunnel, use the no form of this command.
tunnel udlr send-only interface-type interface-number
no tunnel udlr send-only interface-type interface-number

Syntax Description

interface-type
interface-number

Defaults

No UDLR tunnel is configured.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Interface type and number.

This command is supported on the following modules only:
•

WS-X6704-10GE 4-port 10-Gigabit Ethernet

•

WS-X6816-GBIC 16-port Gigabit Ethernet

•

WS-X6516A-GBIC 16-port Gigabit Ethernet

•

WS-X6516-GBIC 16-port Gigabit Ethernet

The UDLR back-channel tunnels do not support IPv6.
Use this command to configure a router that has a unidirectional interface with receive-only capabilities.
The UDLR tunnel will act as a back channel. For example, you can use this command if you have traffic
traveling through a satellite.
The interface-type and interface-number arguments must match the unidirectional receive-only interface
type and number specified by the interface command.When packets are sent by the upper layer protocols
over the interface, they are redirected and sent over this GRE tunnel.
The interface-type and interface-number arguments must match the receive-only interface type and
number specified by the interface command.
You must configure the tunnel udlr receive-only command at the opposite end of the tunnel.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1240

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
tunnel udlr send-only

Examples

This example shows how to configure a unidirectional GRE tunnel to act as a back channel that can send
messages from an interface that is configured for unidirectional link routing:
Router(config-if)# tunnel udlr send-only serial 1
Router(config-if)#

Related Commands

Command

Description

interface

Selects an interface to configure and enters interface configuration mode.

show ip igmp udlr

Displays UDLR information for the connected multicast groups on the
interfaces that have a UDL helper address configured.

tunnel udlr
address-resolution

Enables the forwarding of the ARP and NHRP over a UDL.

tunnel udlr
receive-only

Configures a unidirectional GRE tunnel to act as a back channel that can
receive messages from an interface that is configured for unidirectional link
routing.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1241

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

udld

udld
To enable aggressive or normal mode in UDLD and set the configurable message time, use the udld
command. To disable aggressive or normal mode in UDLD, use the no form of this command.
udld {enable | aggressive}
no udld {enable | aggressive}
udld message time message-timer-time
no udld message time

Syntax Description

Defaults

udld enable

Enables UDLD in normal mode by default on all fiber interfaces.

udld aggressive

Enables UDLD in aggressive mode by default on all fiber interfaces.

message time
message-timer-time

Sets the period of time between UDLD probe messages on ports that are in
advertisement mode and are currently determined to be bidirectional; valid
values are from 7 to 90 seconds.

The defaults are as follows:
•

UDLD is disabled on all fiber interfaces.

•

message-timer-time is 15 seconds.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the no form of this command to do the following:
•

Disable normal-mode UDLD on all fiber ports by default.

•

Disable aggressive-mode UDLD on all fiber ports by default.

•

Disable the message timer.

If you enable aggressive mode, after all the neighbors of a port age out either in the advertisement or in
the detection phase, UDLD restarts the linkup sequence to resynchronize with any potentially
out-of-sync neighbor and shuts down the port if the message from the link is still undetermined.
This command affects fiber interfaces only. Use the udld port command in interface-configuration
mode to enable UDLD on other interface types.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1242

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
udld

Examples

This example shows how to enable UDLD on all fiber interfaces:
Router (config)# udld enable
Router (config)#

Related Commands

Command

Description

show udld

Displays the administrative and operational UDLD status.

udld port

Enables UDLD on the interface or enables UDLD in aggressive mode on the
interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1243

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

udld port

udld port
To enable UDLD on the interface or enable UDLD in aggressive mode on the interface, use the udld
port command. To return to the default settings, use the no form of this command.
udld port [aggressive]
no udld port [aggressive]

Syntax Description

aggressive

Defaults

The defaults are as follows:

(Optional) Enables UDLD in aggressive mode on this interface; see the
“Usage Guidelines” section for additional information.

•

Fiber interfaces are in the state of the global udld (enable or aggressive) command.

•

Nonfiber interfaces have UDLD disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command does not appear in the CLI unless a GBIC is in the port that you are trying to enable.
Use the udld port and udld port aggressive commands on fiber ports to override the setting of the global
udld (enable or aggressive) command. Use the no form on fiber ports to remove this setting and return
control of UDLD enabling back to the global udld command, or in the case of nonfiber ports, to disable
UDLD.
If you enable aggressive mode, after all the neighbors of a port age out either in the advertisement or in
the detection phase, UDLD restarts the linkup sequence to resynchronize with any potentially
out-of-sync neighbor and shuts down the port if the message from the link is still undetermined.
If the port changes from fiber to nonfiber or nonfiber to fiber, all configurations are maintained because
the platform software detects a change of module or a GBIC change.

Examples

This example shows how to cause any port interface to enable UDLD regardless of the current global
udld setting:
Router (config-if)# udld port
Router (config-if)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1244

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
udld port

This example shows how to cause any port interface to enable UDLD in aggressive mode regardless of
the current global udld (enable or aggressive) setting:
Router (config-if)# udld port aggressive
Router (config-if)#

This example shows how to cause a fiber port interface to disable UDLD regardless of the current global
udld setting:
Router (config-if)# no udld port
Router (config-if)#

Related Commands

Command

Description

show udld

Displays the administrative and operational UDLD status.

udld

Enables aggressive or normal mode in UDLD and sets the configurable
message time.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1245

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

udld reset

udld reset
To reset all the ports that are shut down by UDLD and permit traffic to begin passing through them again
(although other features, such as spanning tree, PAgP, and DTP, will behave normally if enabled), use
the udld reset command.
udld reset

Syntax Description

This command has no keywords or arguments.

Defaults

This command has no default settings.

Command Modes

EXEC mode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If the interface configuration is still enabled for UDLD, these ports will begin to run UDLD again and
may shut down for the same reason if the reason for the shutdown has not been corrected.

Examples

This example shows how to reset all ports that are shut down by UDLD:
Router# udld reset
Router#

Related Commands

Command

Description

show udld

Displays the administrative and operational UDLD status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1246

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
udp-port

udp-port
To change the UDP port numbers to which a test sender sends test packets or a test receiver sends status
reports, use the udp-port command. To remove the port numbers, use the no form of this command.
udp-port [test-packet port-number] [status-report port-number]
no udp-port [test-packet port-number] [status-report port-number]

Syntax Description

Defaults

test-packet port-number

(Optional) Specifies the UDP port number to which test packets are sent
by a test sender.

status-report port-number

(Optional) Specifies the UDP port number to which status reports are
sent by a test receiver.

The defaults are as follows:
•

test-packet port-number—16384, the minimum value of an audio port

•

status-report port-number—65535, the maximum value of a video port

Command Modes

Manager configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

This command is supported on the following modules only:
•

WS-X6704-10GE 4-port 10-Gigabit Ethernet

•

WS-X6816-GBIC 16-port Gigabit Ethernet

•

WS-X6516A-GBIC 16-port Gigabit Ethernet

•

WS-X6516-GBIC 16-port Gigabit Ethernet

The test-packet port-number must be even if the packets are RTP encapsulated.
The status-report port-number must be odd if the packets are RTP encapsulated.

Examples

This example shows how to change the UDP port number to which test packets are targeted to 20000:
Router(config-mrm-manager)# udp-port test-packet 20000
Router(config-mrm-manager)#

Related Commands

Command

Description

ip mrm

Configures an interface to operate as a test sender or test receiver, or both, for MRM.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1247

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

undelete

undelete
To recover a file that is marked “deleted” on a flash file system, use the undelete command.
undelete index [filesystem:]

Syntax Description

index

Number to index the file in the dir command output; valid values are from
1 to 1024.

filesystem:

(Optional) File system containing the file to undelete, followed by a colon;
valid values are bootflash:, disk0:, disk1: , flash:, slot0:, or
sup-bootflash:.

Defaults

The default file system is specified when you enter the cd command.

Command Modes

EXEC mode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

On Class A flash file systems, when you delete a file, Cisco IOS software marks the file as deleted but
does not erase the file. This command allows you to recover a deleted file on a specified flash-memory
device. You must undelete a file by its index because you could have multiple deleted files with the same
name. For example, the “deleted” list could contain multiple configuration files with the name
router-config. You undelete by the index to indicate which of the many router-config files from the list
to undelete. Use the dir command to learn the index number of the file that you want to undelete.
bootflash:, flash:, disk0:, disk1:, and sup-bootflash: are Class A file systems.
You cannot undelete a file if a valid (undeleted) file with the same name exists. Instead, you first delete
the existing file and then undelete the file that you want. For example, if you had an undeleted version
of the router-config file and you wanted to use a previous, deleted version instead, you could not simply
undelete the previous version by index. You must first delete the existing router-config file and then
undelete the previous router-config file by index. You can delete and undelete a file up to 15 times.
On Class A flash file systems, if you try to recover the configuration file that is pointed to by the
CONFIG_FILE environment variable, you are prompted to confirm recovery of the file. This prompt
reminds you that the CONFIG_FILE environment variable points to an undeleted file. To delete all files
that are marked “deleted” on a flash-memory device permanently, use the squeeze command in EXEC
mode.

Examples

This example shows how to recover the deleted file whose index number is 1 to the flash PC card that
is inserted in disk 0:
Router# undelete 1 disk0:
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1248

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
undelete

Related Commands

Command

Description

delete

Deletes a file from a flash memory device or NVRAM.

dir

Displays a list of files on a file system.

squeeze

Deletes flash files permanently by squeezing a flash file system.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1249

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

unidirectional

unidirectional
To configure the software-based UDE, use the unidirectional command. To remove the software-based
UDE configuration, use the no form of this command.
unidirectional {send-only | receive-only}
no unidirectional

Syntax Description

send-only

Specifies that the unidirectional transceiver transmits traffic only.

receive-only

Specifies that the unidirectional transceiver receives traffic only.

Defaults

UDE is disabled.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

UDE is supported on the interfaces of these switching modules:
•

WS-X6704-10GE 4-port 10-Gigabit Ethernet

•

WS-X6816-GBIC 16-port Gigabit Ethernet

•

WS-X6516A-GBIC 16-port Gigabit Ethernet

•

WS-X6516-GBIC 16-port Gigabit Ethernet

You do not need to configure software-based UDE on ports where you implement hardware-based UDE.
If an interface is configured with Unidirectional Ethernet or has a receive-only transceiver, UDLD is
operationally disabled. Use the show udld command to display the configured and operational states of
this interface.
When you apply the UDE configuration to an interface, the following warning message is displayed:
Warning!
Enable port unidirectional mode will automatically disable port udld. You must manually
ensure that the unidirectional link does not create a spanning tree loop in the network.
Enable l3 port unidirectional mode will automatically disable ip routing on the port. You
must manually configure static ip route and arp entry in order to route ip traffic.

Examples

This example shows how to configure 10-Gigabit Ethernet port 1/1 as a UDE send-only port:
Router(config-if)# unidirectional send-only
Warning!

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1250

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
unidirectional

Enable port unidirectional mode will automatically disable port udld. You must manually
ensure that the unidirectional link does not create a spanning tree loop in the network.

Enable l3 port unidirectional mode will automatically disable ip routing on the port. You
must manually configure static ip route and arp entry in order to route ip traffic.
Router(config-if)#

This example shows how to configure 10-Gigabit Ethernet port 1/2 as a UDE receive-only port:
Router(config-if)# unidirectional receive-only
Warning!
Enable port unidirectional mode will automatically disable port udld. You must manually
ensure that the unidirectional link does not create a spanning tree loop in the network.
Enable l3 port unidirectional mode will automatically disable ip routing on the port. You
must manually configure static ip route and arp entry in order to route ip traffic.
Router(config-if)#

Related Commands

Command

Description

show interfaces status

Displays the interface status or a list of interfaces in an error-disabled state
on LAN ports only.

show interfaces
unidirectional

Displays the operational state of an interface with a receive-only
transceiver.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1251

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

upgrade rom-monitor

upgrade rom-monitor
To set the execution preference on a ROMMON, use the upgrade rom-monitor command.
upgrade rom-monitor {slot num} {sp | rp} {file filename}
upgrade rom-monitor {slot num} {sp | rp} {{invalidate | preference} {region1 | region2}}

Syntax Description

slot num

Specifies the slot number of the ROMMON to be upgraded.

sp

Upgrades the ROMMON of the switch processor.

rp

Upgrades the ROMMON of the route processor.

file filename

Specifies the name of the SREC file; see the “Usage Guidelines”
section for valid values.

invalidate

Invalidates the ROMMON of the selected region.

preference

Sets the execution preference on a ROMMON of the selected region.

region1

Selects the ROMMON in region 1.

region2

Selects the ROMMON in region 2.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC mode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Caution

If you enter the upgrade rom-monitor command with no parameters, service may be interrupted.

Caution

If you enter the upgrade rom-monitor command from a Telnet session instead of a console connection,
service may be interrupted.
The slot num is required for this command to function properly.
The sp or rp keyword is required if you installed a supervisor engine in the specified slot.
Valid values for file filename include the following:
•

bootflash:

•

disk0:

•

disk1:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1252

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
upgrade rom-monitor

Examples

This example shows how to upgrade the new ROMMON image to the flash device:
Router# upgrade rom-monitor slot 1 sp file tftp://dirt/tftpboot-users/A2_71059.srec
ROMMON image upgrade in progress
Erasing flash
Programming flash
Verifying new image
ROMMON image upgrade complete
The card must be reset for this to take effect
Router#

Related Commands

Command

Description

show rom-monitor

Displays the ROMMON status.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1253

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

username secret

username secret
To establish a username-based authentication system, use the username secret command.
username name secret {0 | 5} password

Syntax Description

name

User ID.

secret 0 | 5

Specifies the secret; valid values are 0 (text immediately following is not encrypted)
and 5 (text immediately following is encrypted using an MD5-type encryption method).

password

Password.

Defaults

No username-based authentication system is established.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use this command to enable Enhanced Password Security for the specified, unretrievable username. This
command enables MD5 encryption on the password. MD5 encryption is a strong encryption method.
You cannot use MD5 encryption with protocols, such as CHAP, that require clear-text passwords.
This command can be useful for defining usernames that get special treatment. For example, you can use
this command to define an “info” username that does not require a password but connects the user to a
general-purpose information service.
The username secret command provides a username and/or a secret authentication for login purposes
only. The name argument can be one word only. White spaces and quotation marks are not allowed. You
can use multiple username secret commands to specify options for a single user.

Examples

This example shows how to configure a username xena and enter an MD5 encrypted text string that is
stored as the username password:
Router(config)# username xena secret 5 $1$feb0$a104Qd9UZ./Ak00KTggPD0
Router(config)#

Related Commands

Command

Description

enable password

Sets a local password to control access to various privilege levels.

enable secret

Specifies an additional layer of security over the enable password command.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1254

OL-11437-01

2rd2
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
verify

verify
To verify the checksum of a file on a flash memory file system or compute an MD5 signature for a file,
use the verify command.
verify {{{/md5 flash-filesystem} [expected-md5-signature]} | {/ios flash-filesystem} |
flash-filesystem}

Syntax Description

/md5 flash-filesystem

Computes an MD5 signature for a file; valid values are bootflash:,
disk0:, disk1:, flash:, or sup-bootflash:.

expected-md5-signature

(Optional) MD5 signature.

/ios flash-filesystem

Verifies the compressed Cisco IOS image checksum; valid values are
bootflash:, disk0:, disk1:, flash:, or sup-bootflash:.

flash-filesystem

Device where the flash memory resides; valid values are bootflash:,
disk0:, disk1:, flash:, or sup-bootflash:.

Defaults

The default device is the current working device.

Command Modes

Privileged EXEC mode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Each software image that is distributed on disk uses a single checksum for the entire image. This
checksum is displayed only when the image is copied into the flash memory.
The Readme file, which is included with the image on the disk, lists the name, file size, and checksum
of the image. Review the contents of the Readme file before loading or duplicating the new image so
that you can verify the checksum when you copy it into the flash memory or onto a server.
Use the verify /md5 command to verify the MD5 signature of a file before using it. This command
validates the integrity of a copied file by comparing a precomputed MD5 signature with the signature
that is computed by this command. If the two MD5 signatures match, the copied file is identical to the
original file.
You can find the MD5 signature that is posted on the Cisco.com page with the image.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1255

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

verify

You can use the verify /md5 command in one of the following ways:
•

Verify the MD5 signatures manually by entering the verify /md5 filename command.
Check the displayed signature against the MD5 signature that is posted on the Cisco.com page.

•

Allow the system to compare the MD5 signatures by entering the verify /md5
{flash-filesystem:filename} {expected-md5-signature} command.
After completing the comparison, the system returns with a verified message. If an error is detected,
the output is similar to the following:
Router# verify /md5 disk0:c6msfc2-jsv-mz 0f
..................................
..................................
..................................
..................................
...............................Done!
%Error verifying disk0:c6msfc2-jsv-mz
Computed signature = 0f369ed9e98756f179d4f29d6e7755d3
Submitted signature = 0f

To display the contents of the flash memory, enter the show flash command. The listing of the flash
contents does not include the checksum of the individual files. To recompute and verify the image
checksum after the image has been copied into the flash memory, enter the verify command.
A colon (:) is required after the specified device.

Examples

This example shows how to use the verify command:
Router# verify cat6k_r47_1.cbi
..........................................................
File cat6k_r47_1.cbi verified OK.
Router#

This example shows how to check the MD5 signature manually:
Router# verify /md5 c6msfc2-jsv-mz
.................................................
.................................................
.................................................
.................................................
............................................Done!
verify /md5 (disk0:c6msfc2-jsv-mz) = 0f369ed9e98756f179d4f29d6e7755d3
Router#

This example shows how to allow the system to compare the MD5 signatures:
Router# verify /md5 disk0:c6msfc2-jsv-mz 0f369ed9e98756f179d4f29d6e7755d3
.................................................
.................................................
.................................................
.................................................
............................................Done!
verified /md5 (disk0:c6sup12-jsv-mz) = 0f369ed9e98756f179d4f29d6e7755d3
Router#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1256

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
verify

This example shows how to verify the compressed checksum of the Cisco IOS image:
Router# verify /ios disk0:c6k222-jsv-mz
Verified compressed IOS image checksum for disk0:c6k222-jsv-mz
Router#

Related Commands

Command

Description

copy /noverify

Disables the automatic image verification for the current copy operation.

file verify auto

Verifies the compressed Cisco IOS image checksum.

show file systems
(flash file system)

Lists available file systems.

show flash

Displays the layout and contents of flash memory.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1257

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan (config-VLAN submode)

vlan (config-VLAN submode)
To configure a specific VLAN, use the vlan command in config-VLAN submode. To delete a VLAN,
use the no form of this command.
vlan vlan-id
no vlan vlan

Syntax Description

vlan-id

Defaults

The defaults are as follows:

Number of the VLAN; valid values are from 1 to 4094.

•

vlan-name is “VLANxxxx” where “xxxx” represents four numeric digits (including leading zeroes)
equal to the VLAN ID number.

•

media type is ethernet.

•

state is active.

•

said-value is 100000 plus the VLAN ID number.

•

mtu-size default is dependent upon the VLAN type:
– ethernet—1500
– fddi—1500
– trcrf—1500 if V2 is not enabled, 4472 if it is enabled
– fd-net—1500
– trbrf—1500 if V2 is not enabled, 4472 if it is enabled

•

ring-number is that no ring number is specified.

•

bridge-number is that no bridge number is specified.

•

parent-vlan-id is that no parent VLAN is specified.

•

type is that no STP type is specified.

•

tb-vlan1 and tb-vlan2 is 0, which means that no translational-bridge VLAN is specified.

Command Modes

config-VLAN submode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1258

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan (config-VLAN submode)

Usage Guidelines

VLAN 1 parameters are factory configured and cannot be changed. You cannot delete VLAN 1.
Once you are in the config-VLAN submode, this syntax is available:
{are hops} {backupcrf mode} {bridge type | bridge-num} {exit} {media type} {mtu mtu-size}
{name vlan-name} {parent parent-vlan-id} {private-vlan} {remote-span} {ring
ring-number} {said said-value} {shutdown} {state {suspend | active}} {stp type type} {ste
hops} {tb-vlan1 tb-vlan1-id} {tb-vlan2 tb-vlan2-id}
no {are | backupcrf | {bridge type} | exit | media | mtu | name | parent | private-vlan |
remote-span | ring | said | shutdown | state | {stp type type} | {ste hops}}
are hops

Specifies the maximum number of All Route Explorer hops for this VLAN.
Valid values are from 0 to 13; 0 is assumed if no value is specified.

backupcrf mode

Enables or disables the backup CRF mode of the VLAN; valid values are
enable or disable.

bridge type |
bridge-num

Specifies the bridging characteristics of the VLAN or identification number of
the bridge; valid type values are srb or srt. Valid bridge-num values are from
0 to 15.

exit

Applies changes, increments the revision number, and exits config-VLAN
submode.

media type

Specifies the media type of the VLAN; valid values are ethernet, fd-net, fddi,
trcrf, and trbrf.

mtu mtu-size

Specifies the maximum transmission unit (packet size in bytes) that the VLAN
can use; valid values are from 1500 to 18190.

name vlan-name

Defines a text string that is used as the name of the VLAN (1 to 32 characters).

parent
parent-vlan-id

Specifies the ID number of the parent VLAN of FDDI or Token Ring-type
VLANs; valid values are from 1 to 1005.

private-vlan

(Optional) Configures the VLAN as a PVLAN; see the private-vlan
command.

remote-span

Configures the VLAN as an RSPAN VLAN.

ring ring-number

Specifies the ring number of FDDI or Token Ring-type VLANs; valid values
are from 0 to 65535.

said said-value

Specifies the security-association identifier; valid values are from 1 to
4294967294.

shutdown

Shuts down VLAN switching.

state {suspend |
active}

Specifies whether the state of the VLAN is active or suspended.

stp type type

Specifies the STP type; valid values are ieee, ibm, and auto.

ste hops

Specifies the maximum number of hops for Spanning Tree Explorer frames;
valid values are from 0 to 13.

tb-vlan1 tb-vlan1-id Specifies the ID number of the first translational VLAN for this VLAN. Valid
values are from 1 to 1005; 0 is assumed if no value is specified.
tb-vlan2 tb-vlan2-id Specifies the ID number of the second translational VLAN for this VLAN.
Valid values are from 1 to 1005; 0 is assumed if no value is specified.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1259

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan (config-VLAN submode)

Caution

If you enter the shutdown command and then the no shutdown command in the config-vlan mode on a
PVLAN (primary or secondary), the PVLAN type and association information is deleted. You will have to
reconfigure the VLAN to be a PVLAN.
The VLANs in the suspended state do not pass packets.
The VLANs that are created or modified are not committed until you exit config-VLAN submode.
If you define vlan-range in global configuration mode, you are not allowed to set the vlan-name in
config-vlan submode.
The maximum length of a Layer 2 VLAN name is 32 characters.

Note

If you attempt to add a new VLAN and the VLAN already exists, no action occurs.
For extended-range VLANs (1006 to 4094), only the private-vlan, rspan, and mtu VLAN parameters
are configurable. The rest of the VLAN parameters for extended-range VLANs are set to default.
When you define vlan-name, the name must be unique within the administrative domain.
The SAID is documented in 802.10. When the no form is used, the VLAN’s SAID is returned to the
default. When you define the said-value, the name must be unique within the administrative domain.
The bridge bridge-number argument is used only for Token Ring-net and FDDI-net VLANs and is
ignored in other types of VLANs. When the no form is used, the VLAN’s source-routing bridge number
returns to the default.
The parent VLAN resets to the default if the parent VLAN is deleted or the media keyword changes the
VLAN type or the VLAN type of the parent VLAN.
The tb-vlan1 and tb-vlan2 are used to configure translational-bridge VLANs of a specified type of
VLAN and are not allowed in other VLAN types. Translational-bridge VLANs must be different VLAN
types than the affected VLAN; if two VLANs are specified, the two must be different VLAN types.
A translational-bridge VLAN resets to the default if you delete the translational-bridge VLAN or if you
enter the media keyword to change the VLAN type or the VLAN type of the corresponding
translational-bridge VLAN.
The shutdown keyword does not support extended-range VLANs.
To find out if a VLAN has been shut down internally, check the Status field in the show vlan command
output. If a VLAN is shut down internally, these values appear in the Status field:

Examples

•

act/ishut—VLAN status is active but shut down internally.

•

sus/ishut—VLAN status is suspended but shut down internally.

This example shows how to add a new VLAN with all default parameters to the new VLAN database:
Router(config-vlan)# vlan 2
Router(config-vlan)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1260

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan (config-VLAN submode)

This example shows how to cause the device to add a new VLAN, specify the media type and parent
VLAN ID number 3, and set all other parameters to the defaults:
Router(config-vlan)# media ethernet parent 3
VLAN 2 modified:
Media type ETHERNET
Parent VLAN 3
Router(config-vlan)#

This example shows how to delete VLAN 2:
Router(config-vlan)# no vlan 2
Router(config-vlan)#

This example shows how to return to the default settings for the MTU for its type and
translational-bridge VLANs:
Router(config-vlan)# no mtu tb-vlan1 tb-vlan2
Router(config-vlan)#

Related Commands

Command

Description

show vlan

Displays VLAN information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1261

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan (global configuration mode)

vlan (global configuration mode)
To add a VLAN and enter config-VLAN submode, use the vlan command. To delete the VLAN,use the
no form of this command.
vlan {vlan-id | vlan-range}
no vlan {vlan-id | vlan-range}

Syntax Description

vlan-id

Number of the VLAN; valid values are from 1 to 4094.

vlan-range

Range of configured VLANs; see the “Usage Guidelines” section for a list
of valid values.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

VLAN 1 parameters are factory configured and cannot be changed.
The specified VLAN is added or modified in the VLAN database when you exit config-VLAN submode.
When you enter the vlan vlan-id command, a new VLAN is created with all default parameters in a
temporary buffer and causes the CLI to enter config-VLAN submode. If the vlan-id that you entered
matches an existing VLAN, nothing happens except that you enter config-VLAN submode.
If you define vlan-range, you are not allowed to set the vlan-name in config-VLAN submode.
You can enter the vlan-range using a comma (,), a dash (-), and the number.
See the vlan (config-VLAN submode) command for information on the commands that are available in
the config-VLAN submode.

Examples

This example shows how to add a new VLAN and enter config-VLAN submode:
Router (config)# vlan 2
Router (config-vlan)#

This example shows how to add a range of new VLANs and enter config-VLAN submode:
Router (config)# vlan 2,5,10-12,20,25,4000
Router (config-vlan)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1262

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan (global configuration mode)

This example shows how to delete a VLAN:
Router (config)# no vlan 2
Router (config)#

Related Commands

Command

Description

vlan (config-VLAN
submode)

Configures a specific VLAN.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1263

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan access-log

vlan access-log
To configure the VACL-logging properties, including the log-table size, redirect-packet rate, and
logging threshold, use the vlan access-log command. To return to the default settings,use the no form
of this command.
vlan access-log {{maxflow max-number} | {ratelimit pps} | {threshold pkt-count}}
no vlan access-log {maxflow | ratelimit | threshold}

Syntax Description

Defaults

maxflow
max-number

Specifies the maximum log-table size. Valid values are from 0 to 2048;
0 deletes the contents of the log table.

ratelimit pps

Specifies the maximum redirect VACL-logging packet rate; valid values
are from 0 to 5000.

threshold pkt-count

Specifies the logging-update threshold; valid values are from 0 to
2147483647. 0 means that the threshold is not set.

The defaults are as follows:
•

max-number is 500.

•

pps is 2000 pps.

•

pkt-count is not set.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Due to the rate-limiting function for redirected packets, VACL-logging counters may not be accurate.
Only denied IP packets are logged.
When the log-table size is full, the logging packets from the new flows are dropped by the software.
The packets that exceed the maximum redirect VACL-logging packet rate limit are dropped by the
hardware.
A logging message is displayed if the flow threshold is reached before the 5-minute interval.
If you do not configure the maximum log-table size, maximum packet rate, or threshold, or if you enter
the no form of the commands, the default values are assumed.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1264

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan access-log

Examples

This example shows how to set the maximum log-table size:
Router(config)# vlan access-log maxflow 500
Router(config)#

This example shows how to set the maximum redirect VACL-logging packet rate after which packets are
dropped:
Router(config)# vlan access-log ratelimit 200
Router(config)#

This example shows how to set the logging-update threshold:
Router(config)# vlan access-log threshold 3500
Router(config)#

Related Commands

Command

Description

show vlan access-log

Displays information about the VACL logging including the configured
logging properties.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1265

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan access-map

vlan access-map
To create a VLAN access map or enter VLAN access-map command mode, use the vlan access-map
command. To remove a mapping sequence or the entire map,use the no form of this command.
vlan access-map name [seq#]
no vlan access-map name [seq#]

Syntax Description

name

VLAN access-map tag.

seq#

(Optional) Map sequence number; valid values are 0 to 65535.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

If you enter the sequence number of an existing map sequence, you enter VLAN access-map mode.
If you do not specify a sequence number, a number is automatically assigned. You can enter one match
clause and one action clause per map sequence.
If you enter the no vlan access-map name [seq#] command without entering a sequence number, the
whole map is removed.
Once you enter VLAN access-map mode, the following commands are available:
•

action—Specifies the packet action clause; see the action command section.

•

default—Sets a command to its defaults.

•

end—Exits from configuration mode.

•

exit—Exits from VLAN access-map configuration mode.

•

match—Specifies the match clause; see the match command section.

•

no—Negates a command or sets its defaults.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1266

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan access-map

Examples

This example shows how to enter VLAN access-map mode:
Router(config)# vlan access-map Bob
Router(config-access-map)#

Related Commands

Command

Description

action

Sets the packet action clause.

match

Specifies the match clause by selecting one or more ACLs for a VLAN
access-map sequence.

show vlan access-map

Displays the contents of a VLAN-access map.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1267

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan database

vlan database
To enter VLAN-configuration submode, use the vlan database command.
vlan database

Syntax Description

This command has no arguments or keywords.

Defaults

This command has no default settings.

Command Modes

Privileged EXEC mode

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Examples

After you are in VLAN-configuration submode, you can access the manipulation commands in the
VLAN-database editing buffer, including:
•

abort—Exits mode without applying the changes.

•

apply—Applies current changes and increments the revision number.

•

exit—Applies changes, increments the revision number, and exits mode.

•

no—Negates a command or sets its defaults; valid keywords are vlan and vtp.

•

reset—Abandons current changes and releases the current database.

•

show—Displays database information.

•

vlan—Accesses subcommands to add, delete, or modify values that are associated with a single
VLAN. For information about the vlan subcommands, see the vlan (config-VLAN submode)
command.

•

vtp—Accesses subcommands to perform VTP administrative functions. For information about the
vtp subcommands, see the vtp command.

This example shows how to enter VLAN-configuration mode:
Router# vlan database
Router(vlan)#

This example shows how to exit VLAN-configuration mode without applying changes after you are in
VLAN-configuration mode:
Router(vlan)# abort
Aborting....
Router#

This example shows how to delete a VLAN after you are in VLAN-configuration mode:

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1268

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan database

Router(vlan)# no vlan 100
Deleting VLAN 100...
Router(vlan)#

This example shows how to turn off pruning after you are in VLAN-configuration mode:
Router(vlan)# no vtp pruning
Pruning switched OFF
Router(vlan)#

Related Commands

Command

Description

show vlan

Displays VLAN information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1269

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan dot1q tag native

vlan dot1q tag native
To enable dot1q tagging for all VLANs in a trunk, use the vlan dot1q tag native command. To clear the
configuration,use the no form of this command.
vlan dot1q tag native
no vlan dot1q tag native

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

The vlan dot1q tag native command configures the switch to tag native-VLAN traffic and admit only
802.1Q-tagged frames on 802.1Q trunks, dropping any untagged traffic, including untagged traffic in
the native VLAN.
Follow these configuration guidelines when configuring Layer 2-protocol tunneling:
•

On all the service-provider edge switches, you must enable spanning-tree BPDU filtering on the
802.1Q-tunnel ports by entering the spanning-tree bpdufilter enable command.

•

Ensure that at least one VLAN is available for native-VLAN tagging. If you use all the available
VLANs and then enter the vlan dot1q tag native command, native-VLAN tagging is not enabled.

•

On all the service-provider core switches, enter the vlan dot1q tag native command to tag
native-VLAN egress traffic and drop untagged native-VLAN ingress traffic.

•

On all the customer switches, either enable or disable native-VLAN tagging on each switch.

Note

If you enable dot1q tagging on one switch and disable it on another switch, all traffic is
dropped; you must identically configure dot1q tagging on each switch.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1270

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan dot1q tag native

Examples

This example shows how to enable dot1q tagging for all VLANs in a trunk:
Router(config)# vlan dot1q tag native
Router(config)#

Related Commands

Command

Description

show vlan dot1q tag
native

Displays native VLAN-tagging information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1271

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan filter

vlan filter
To apply a VLAN access map, use the vlan filter command. To clear the VLAN access maps from
VLANs or interfaces,use the no form of this command.
vlan filter map-name {vlan-list vlan-list | interface interface number}
no vlan filter map-name {vlan-list [vlan-list] | interface [interface interface-number]}

Syntax Description

map-name

VLAN access-map tag.

vlan-list

VLAN list; valid values are from 1 to 4094.

interface interface Specifies the interface type; valid values are pos, atm, or serial. See the
“Usage Guidelines” section for additional information.
interface-number

Interface number; see the “Usage Guidelines” section for additional
information.

Defaults

This command has no default settings.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

When configuring an action clause in a VLAN access map, note the following:
•

You can apply the VLAN access map to one or more VLANs or WAN interfaces.

•

The vlan-list argument can be a single VLAN ID, a list of VLAN IDs, or VLAN ID ranges
(vlan-id-vlan-id). Multiple entries are separated by a hyphen (-) or a comma (,).

•

If you delete a WAN interface that has a VACL applied, the VACL configuration on the interface
is also removed.

•

You can apply only one VLAN access map to each VLAN or WAN interface.

•

VACLs that are applied to VLANs are active only for VLANs with a Layer 3-VLAN interface
configured. VACLs that are applied to VLANs without a Layer 3-VLAN interface are inactive.
Applying a VLAN access map to a VLAN without a Layer 3-VLAN interface creates an
administratively down Layer 3-VLAN interface to support the VLAN access map. If creation of the
Layer 3-VLAN interface fails, the VACL is inactive.

When entering the no form of this command, the vlan-list argument is optional (but the keyword
vlan-list is required). If you do not enter the vlan-list argument, the VACL is removed from all VLANs
where the map-name argument is applied.
When entering the no form of this command for WAN interfaces, the interface argument is optional (but
the interface keyword is required). If you do not enter the interface argument, the VACL is removed
from interfaces where the map-name is applied.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1272

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan filter

The vlan filter map-name interface command accepts only ATM, POS, or serial interface types. If your
Catalyst 6500 series switch is not configured with any of these interface types, the interface interface
interface-number keyword and argument are not provided.
The interface-number format can be mod/port or slot/port-adapter/port; it can include a subinterface or
channel-group descriptor.

Examples

This example shows how to apply a VLAN access map on VLANs 7 through 9:
Router(config)# vlan filter ganymede vlan-list 7-9
Router(config)#

Related Commands

Command

Description

action

Sets the packet action clause.

match

Specifies the match clause by selecting one or more ACLs for a VLAN
access-map sequence.

show vlan filter

Displays information about the VLAN filter.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1273

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan internal allocation policy

vlan internal allocation policy
To configure the allocation direction of the internal VLAN, use the vlan internal allocation policy
command. To return to the default settings,use the no form of this command.
vlan internal allocation policy {ascending | descending}
no vlan internal allocation policy

Syntax Description

ascending

Allocates internal VLANs from 1006 to 4094.

descending

Allocates internal VLANs from 4094 to 1006.

Defaults

ascending

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

You can configure internal VLAN allocation to be from 1006 and up or from 4094 and down.
Internal VLANs and user-configured VLANs share the 1006 to 4094 VLAN spaces. A first in, first out
(FIFO) policy is used in allocating these spaces.
You must perform a system reboot before the vlan internalallocation policy com m and changes can
take effect. During system bootup, internal VLANs that are required for features in the startup-config
file are allocated first. The user-configured VLANs in the startup-config file are configured next. If you
configure a VLAN that conflicts with an existing internal VLAN, the VLAN that you configured is put
into a nonoperational status until the internal VLAN is freed and becomes available.
After you enter the write memory command and the system reloads, the reconfigured allocation is used
by the port manager.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1274

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan internal allocation policy

Examples

This example shows how to configure VLANs in a descending order as the internal VLAN-allocation
policy:
Router(config)# vlan internal allocation policy descending
Router(config)#

Related Commands

Command

Description

show vlan internal usage

Displays information about the internal VLAN allocation.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1275

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vlan mapping dot1q

vlan mapping dot1q
To map an 802.1Q VLAN to an ISL VLAN, use the vlan mapping dot1q command. To remove a
specified mapping or all 802.1Q VLAN-to-ISL VLAN mappings,use the no form of this command.
vlan mapping {dot1q dot1q-vlan-id} {isl isl-vlan-id}
no vlan mapping {dot1q dot1q-vlan-id | all}

Syntax Description

dot1q dot1q-vlan-id

Specifies the VLAN ID of the 802.1Q VLAN from which the mapping
occurs as traffic leaves and enters 802.1Q trunks on the local device;
valid values are from 1 to 4094.

isl isl-vlan-id

Specifies the VLAN ID of the ISL VLAN onto which the mapping
occurs as traffic leaves and enters 802.1Q trunks on the local device
and specifies the VLAN ID of the 802.1Q VLAN for which to discard
traffic as it arrives at a local device; valid values are from 1 to 4094.

all

Removes all 802.1Q VLAN-to-ISL VLAN mappings.

Defaults

The default for 802.1Q VLAN IDs 1 to 4094 is an identity mapping.

Command Modes

Global configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

VLAN 1 parameters are factory configured and cannot be changed.
You can map up to eight VLANs. You can map only one 802.1Q VLAN to an ISL VLAN. For example,
if 802.1Q VLAN 800 has been automatically mapped to ISL VLAN 800, do not manually map any other
802.1Q VLANs to ISL VLAN 800.
You cannot overwrite existing 802.1Q-VLAN mapping. If the 802.1Q-VLAN number already exists, the
command is aborted. You must first clear that mapping.
If the table is full, the command is aborted with an error message indicating that the table is full.

Examples

This example shows how to map traffic arriving on 802.1Q trunks on VLAN 1001 to ISL VLAN 888 on
the local device, discard traffic arriving on 802.1Q trunks on VLAN 888, and map traffic on ISL
VLAN 888 on the local device to 802.1Q VLAN 1001 as it leaves the device:
Router(config)# vlan mapping dot1q 1001 isl 888
Router(config)#

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1276

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vlan mapping dot1q

This example shows how to clear the mapping of 802.1Q VLAN 1001 to ISL VLAN 888. The result is
that 802.1Q VLAN 1001 traffic is discarded when it arrives on the local device, and 802.1Q VLAN 888
traffic is mapped to ISL VLAN 888 (both are their default states):
Router(config)# no vlan mapping dot1q 1001
No mapping for 1022
Router(config)#

Related Commands

Command

Description

show vlan

Displays VLAN information.

vlan (config-VLAN
submode)

Configures a specific VLAN.

vlan database

Enters VLAN-configuration submode.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1277

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vtp

vtp
To configure the global VTP state, use the vtp command. To return to the default value.
vtp {domain domain-name}
vtp {file filename}
vtp {interface interface-name} [only]
vtp {mode {client | server | transparent}}
vtp {password password-value}
vtp pruning
vtp {version {1 | 2}}

Syntax Description

Defaults

domain
domain-name

Sets the VTP-administrative domain name.

file filename

Sets the ASCII name of the IFS-file system file where the VTP
configuration is stored.

interface
interface-name

Sets the name of the preferred source for the VTP-updater ID for this
device.

only

(Optional) Specifies to use only this interface’s IP address as the VTP-IP
updater address.

mode client

Sets the type of VTP-device mode to client mode.

mode server

Sets the type of VTP-device mode to server mode.

mode
transparent

Sets the type of VTP-device mode to transparent mode.

password
password-value

Specifies the adminstrative-domain password.

pruning

Enables the adminstrative domain to permit pruning.

version 1 | 2

Specifies the adminstrative-domain VTP-version number.

The defaults are as follows:

Command Modes

•

vtp domain and vtp interface commands have no default settings.

•

filename is const-nvram:vlan.dat.

•

VTP mode is mode server.

•

No password is configured.

•

Pruning is disabled.

•

version 1.

Global configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1278

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
vtp

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

The vtp pruning, vtp password, and vtp version commands are also available in privileged EXEC
mode. We recommend that you use these commands in global configuration mode only; do not use these
commands in privileged EXEC mode.
Extended-range VLANs are not supported by VTP.
When you define the domain-name, the domain name is case sensitive and can be from 1 to
32 characters.
The filename and interface-name are ASCII strings from 1 to 255 characters.
You must configure a password on each network device in the management domain when the switch is
in secure mode.

Caution

If you configure VTP in secure mode, the management domain does not function properly if you do not
assign a management domain password to each network device in the domain.
A VTP version 2-capable network device can operate in the same VTP domain as a network device
running VTP version 1 if VTP version 2 is disabled on the VTP version 2-capable network device (VTP
version 2 is disabled by default).
Do not enable VTP version 2 on a network device unless all of the network devices in the same VTP
domain are version 2 capable. When you enable VTP version 2 on a network device, all of the
version 2-capable network devices in the domain enable VTP version 2.
In a Token Ring environment, you must enable VTP version 2 for VLAN switching to function properly.
Enabling or disabling VTP pruning on a VTP server enables or disables VTP pruning for the entire
management domain.
Configuring VLANs as pruning eligible or pruning ineligible on a Catalyst 6500 series switch affects
pruning eligibility for those VLANs on that switch only; it does not affect pruning eligibility on all
network devices in the VTP domain.
The vtp password, vtp pruning, and vtp version commands are not placed in NVGEN but are included
in the VTP transparent-mode startup configuration file.
Extended-range VLANs are not supported by VTP.
You can configure pruning in VTP-server mode; version is configurable in VTP-server mode or VTP
transparent mode.
The password-value is an ASCII string from 8 to 64 characters identifying the administrative domain
for the device.
VTP pruning causes information about each pruning-eligible VLAN to be removed from VTP updates
if there are no stations belonging to that VLAN.
All Catalyst 6500 series switches in a VTP domain must run the same version of VTP. VTP version 1
and VTP version 2 do not operate on Catalyst 6500 series switches in the same VTP domain.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1279

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

vtp

If all Catalyst 6500 series switches in a domain are VTP version 2 capable, you need to enable VTP
version 2 on one Catalyst 6500 series switch; the version number is then propagated to the other
version 2-capable Catalyst 6500 series switch in the VTP domain.
If you toggle the version 2 mode, certain default VLAN parameters are modified. See the Catalyst
Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for additional
information.

Examples

This example shows how to set the device’s management domain:
Router(config)# vtp domain DomainChandon
Router(config)#

This example shows how to specify the file in the IFS-file system where the VTP configuration is stored:
Router(config)# vtp file vtpconfig
Setting device to store VLAN database at filename vtpconfig.
Router(config)#

This example shows how to set the VTP mode to client:
Router(config)# vtp mode client
Setting device to VTP CLIENT mode.
Router(config)#

Related Commands

Command

Description

show vtp

Displays the VTP statistics and domain information.

22

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1280

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue

wrr-queue
To allocate the bandwidth between the standard transmit SRR, DWRR, or WRR queues, use the
wrr-queue command. To return to the default settings,use the no form of this command.
wrr-queue [bandwidth | shape] {percent low-priority-queue-percentage
[intermediate-priority-queue-percentages] high-priority-queue-percentage}
wrr-queue [bandwidth | shape] {percent low-priority-queue-weight
[intermediate-priority-queue-weight] high-priority-queue-weight}
no wrr-queue [bandwidth | shape]

Syntax Description

Defaults

bandwidth

(Optional) Enters the bandwidth keyword to configure
DWRR or WRR.

shape

(Optional) Enters the shape keyword to configure SRR.

percent low-priority-queue-percentage

(Optional) Specifies the minimum percentage; valid values
are from 1 to 100.

intermediate-priority-queue-percentage

(Optional) Intermediate percentage; valid values are from 1
to 100.

high-priority-queue-percentage

Maximum percentage; valid values are from 1 to 100.

low-priority-queue-weight

Minimum weight; valid values are from 1 to 255.

intermediate-priority-queue-weight

(Optional) Intermediate weight; valid values are from 1 to
255.

high-priority-queue-weight

Maximum weight; valid values are from 1 to 255.

The defaults are listed in Table 2-96.
Table 2-96 Bandwidth Default Values

Command Modes

Port Types

Default Value

2q8t

90:10

8q4t

90:0:0:0:0:0:0:10

8q8t

90:0:0:0:0:0:0:10

1p7q8t

22:33:45:0:0:0:0

1p2q1t

100:255

2q2t, 1p2q2t, and 1p2q1t

5:255

1p3q1t

100:150:255

Interface configuration

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1281

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue

Command History

Usage Guidelines

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Shaped round robin (SRR) allows a queue to use only the allocated bandwidth. SRR is supported as an
option on Supervisor Engine 32 SFP 1p3q8t ports and on 1p7q4t ports. Use of SRR prevents use of the
strict priority queue. To configure SRR, any CoS or DSCP values mapped to a strict-priority queue must
be remapped to a standard queue.
DWRR keeps track of any lower-priority queue under-transmission caused by traffic in a higher-priority
queue and compensates in the next round. DWRR is the dequeuing algorithm on 1p3q1t, 1p2q1t, 1p3q8t,
1p7q4t, and 1p7q8t ports.
WRR allows a queue to use more than the allocated bandwidth if the other queues are not using any, up
to the total bandwidth of the port. WRR is the dequeuing algorithm on all other ports.
The higher the percentage or weight that is assigned to a queue, the more transmit bandwidth is allocated
to it. If you enter weights, the ratio of the weights divides the total bandwidth of the queue. For example,
for three queues on a Gigabit Ethernet port, weights of 25:25:50 provide this division:
•

Queue 1—250 Mbps

•

Queue 2—250 Mbps

•

Queue 3—500 Mbps

WRR allows bandwidth sharing at the egress port. This command defines the bandwidths for egress
WRR through scheduling weights.
The WRR weights are used to partition the bandwidth between the queues if all queues are nonempty.
For example, entering weights of 1:3 means that one queue gets 25 percent of the bandwidth and the
other queue gets 75 percent.
Entering weights of 1:3 do not necessarily lead to the same results as entering weights at 10:30. Weights
at 10:30 mean that more data is serviced from each queue and the latency of packets being serviced from
the other queue goes up. You should set the weights so that at least one packet (maximum size) can be
serviced from the lower priority queue at a time. For the higher priority queue, set the weights so that
multiple packets are serviced at any one time.
Percentages should add up to 100. You must enter percentages for all the standard transmit queues on
the port.
The valid values for weight range from 1 to 255. You must enter weights for all the standard transmit
queues on the port.

Examples

This example shows how to allocate a three-to-one bandwidth ratio:
Router(config-if)# wrr-queue bandwidth 3 1
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

wrr-queue queue-limit Sets the transmit-queue size ratio on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1282

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1283

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1284

OL-11437-01

22
Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue cos-map

wrr-queue cos-map
To map CoS values to drop thresholds for a queue, use the wrr-queue cos-map command. To return to
the default settings,use the no form of this command.
wrr-queue cos-map queue-id threshold-id cos-1 ... cos-n
no wrr-queue cos-map

Syntax Description

Defaults

queue-id

Queue number; the valid value is 1.

threshold-id

Threshold ID; valid values are from 1 to 4.

cos-1 ... cos-n

CoS value; valid values are from 0 to 7.

The defaults are as follows:
•

Receive queue 1/drop threshold 1 and transmit queue 1/drop threshold 1: CoS 0 and 1.

•

Receive queue 1/drop threshold 2 and transmit queue 1/drop threshold 2: CoS 2 and 3.

•

Receive queue 2/drop threshold 3 and transmit queue 2/drop threshold 1: CoS 4 and 6.

•

Receive queue 2/drop threshold 4 and transmit queue 2/drop threshold 2: CoS 7.

•

On 1p1q4t, 1p2q2t, and 1p3q1t interfaces, CoS 5 is mapped to the strict-priority queues.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Enter up to eight CoS values to map to the threshold.
The threshold for 1p3q1t is always 1.

Examples

This example shows how to map the CoS values 0 and 1 to standard transmit queue 1/threshold 1:
Router(config-if)# wrr-queue cos-map 1 1 0 1
Router(config-if)#

Related Commands

show queueing interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1285

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue dscp-map

wrr-queue dscp-map
To map the hardware DSCP values to the drop threshold values for a queue, use the wrr-queue
dscp-map command. To return to the default settings,use the no form of this command.
wrr-queue dscp-map queue-id threshold-id dscp-1 ... dscp-n
no wrr-queue dscp-map queue-id

Syntax Description

queue-id

Queue number; valid values are from 1 to 8.

threshold-id

Threshold ID; valid values are from 1 to 4.

dscp-1 ... dscp-n

DSCP value; valid values are from 0 to 7.

Defaults

CoS mode

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines
Note

To enter the wrr-queue dscp-map command, the interface must be in DSCP-queuing mode. Use the mls
qos queue-mode mode-dscp command to set the mode to DSCP.
This command is supported on 10-Gigabit Ethernet ports only.
When mapping DSCP values, follow these guidelines:

Examples

•

You can enter up to eight DSCP values that map to a queue and threshold.

•

You can enter multiple commands to map additional DSCP values to the queue and threshold.

•

You must enter a separate command for each queue and threshold.

This example shows how to map the hardware DSCP values to the drop threshold values for a queue:
Router(config-if)# wrr-queue dscp-map 8 1 0 1 2 3
Router(config-if)#

Related Commands

show queueing interface

Displays queueing information.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1286

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue queue-limit

wrr-queue queue-limit
To set the transmit-queue size ratio on an interface, use the wrr-queue queue-limit command. To return
to the default settings,use the no form of this command.
wrr-queue queue-limit {queue1-weight [queue2-weight] queue3-weight}
no wrr-queue queue-limit
wrr-queue queue-limit {queue1-weight [queue2-weight] queue3-weight}
no wrr-queue queue-limit

Syntax Description

Defaults

queue1-weight

Ratio of the low-priority queue weight; valid values are from 1 and
100 percent.

queue2-weight

(Optional) Ratio of the medium-priority queue weight; valid values are
from 1 and 100 percent.

queue3-weight

Ratio of the high-priority queue weight; see the “Usage Guidelines”
section for valid values.

The defaults are as follows:
•

90 percent for low priority

•

10 percent for high priority

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Valid high-priority weight values are from 1 to 100 percent, except on 1p2q1t egress LAN ports, where
valid values for the high-priority queue are from 5 to 100 percent.
On LAN ports that have an egress strict priority queue, PFC QoS sets the egress strict-priority queue size
equal to the high-priority queue size.
Estimate the mix of low priority-to-high priority traffic on your network (for example, estimate
80 percent to low-priority traffic and 20 percent to high-priority traffic). Use the estimated percentages
as queue weights.
Due to the granularity of programming the hardware, the values that are set in the hardware are close
approximations of the provided values. For example, if you specify 0 percent, the actual value that is
programmed is not necessarily 0.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1287

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue queue-limit

Examples

This example shows how to configure the transmit-queue size ratio:
Router (config-if)# wrr-queue queue-limit 75 25
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

wrr-queue

Allocates the bandwidth between the standard transmit queues.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1288

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue random-detect

wrr-queue random-detect
To enable WRED or specify the minimum and maximum WRED threshold for the specified queues on
1p2q2t and 1p3q1t interfaces, use the wrr-queue random-detect command. To return to the default
settings,use the no form of this command.
wrr-queue random-detect queue-id
wrr-queue random-detect {max-threshold | min-threshold} queue-id threshold-percent-1 ...
threshold-percent-n
no wrr-queue random-detect queue-id
no wrr-queue random-detect {max-threshold | min-threshold} queue-id

Syntax Description

Defaults

queue-id

Queue number; valid values are 1, 2, or 3.

max-threshold

Specifies the maximum WRED-drop threshold.

min-threshold

Specifies the minimum WRED-drop threshold.

threshold-percent-1
threshold-percent-n

Threshold weights; valid values are from 1 to 100 percent.

The default is that WRED is disabled. When WRED is enabled, the defaults are as follows:
•

The maximum threshold is (low) 40 percent and (high) 100 percent.

•

The minimum thresholds are both set to zero.

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

1p2q1t and 1p3q1t interfaces have WRED-drop thresholds in their standard transmit queues. You can
configure 1p3q1t transmit queues to use a WRED-drop threshold or a tail-drop threshold.
To enable WRED-drop thresholds on 1p2p1t interfaces, enter the wrr-queue random-detect queue-id
command. Use the no form of this command to disable WRED.
To enable WRED-drop thresholds on 1p3q1t interfaces, enter the wrr-queue random-detect queue-id
command. To return to the tail-drop threshold, enter the no wrr-queue random-detect queue-id
command.
The queue-id is 1 for the standard low-priority queue, 2 is for the standard high-priority queue, and 3 is
for strict priority.
The threshold in the strict-priority queue is not configurable.
Each queue on a 1p2q2t interface has two thresholds; 1p3q1t interfaces have one threshold.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1289

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue random-detect

Each threshold has a low and a high WRED value.
WRED values are a percentage of the queue capacity.
For additional information on configuring WRED thresholds, refer to the QoS chapter in the Catalyst
Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY.

Examples

This example shows how to configure the low-priority transmit-queue high-WRED drop thresholds:
Router (config-if)# wrr-queue random-detect max-threshold 1 60 100
Router (config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

wrr-queue queue-limit Sets the transmit-queue size ratio on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1290

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue shape

wrr-queue shape
To configure the SRR maximum queue bandwidth with percentages or weights, use the wrr-queue
shape command. To return to the default settings,use the no form of this command.
wrr-queue shape {percent low-priority-queue-percentage
[intermediate-priority-queue-percentage] high-priority-queue-percentage}
wrr-queue shape {low-priority-queue-weight [intermediate-priority-queue-weight]
high-priority-queue-weight}
no wrr-queue shape

Syntax Description

Defaults

percent low-priority-queue-percentage

Specifies the minimum SRR percentage; valid values
are from 1 to 100.

intermediate-priority-queue-percentage

(Optional) Intermediate SRR percentage; valid values
are from 1 to 100.

high-priority-queue-percentage

Maximum SRR percentage; valid values are from 1 to
100.

low-priority-queue-weight

Minimum SRR weight; valid values are from 1 to 255.

intermediate-priority-queue-weight

(Optional) Intermediate SRR weight; valid values are
from 1 to 255.

high-priority-queue-weight

Maximum SRR weight; valid values are from 1 to 255.

The defaults are as follows:
•

1p3q8t—22:33:45

•

1p7q4t—100:150:200:0:0:0:0:0

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

SRR allows a queue to use only the allocated bandwidth.
This command is supported on SFP 1p3q8t ports and on 1p7q4t ports only.
You can configure up to seven queue weights.
Enter the shape keyword to configure SRR. If you use SRR, you cannot use the strict priority queue. To
configure SRR, you must remap any CoS or DSCP values that are mapped to a strict-priority queue to a
standard queue.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1291

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue shape

The higher the percentage or weight that is assigned to a queue, the more transmit bandwidth is allocated
to it. If you enter weights, the ratio of the weights divides the total bandwidth of the queue. For example,
for three queues on a Gigabit Ethernet port, weights of 25:25:50 provide this division:
•

Queue 1—250 Mbps

•

Queue 2—250 Mbps

•

Queue 3—500 Mbps

Percentages should add up to 100. You must enter percentages for all the standard transmit queues on
the port.
The valid values for weight range are from 1 to 255. You must enter weights for all the standard transmit
queues on the port.

Examples

This example shows how to allocate a three-to-one bandwidth ratio:
Router(config-if)# wrr-queue shape 3 1
Router(config-if)#

Related Commands

Command

Description

show queueing
interface

Displays queueing information.

wrr-queue

Allocates the bandwidth between the DWRR or WRR standard transmit
queues.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1292

OL-11437-01

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA
wrr-queue threshold

wrr-queue threshold
To configure the drop-threshold percentages for the standard receive and transmit queues on 1q4t and
2q2t interfaces, use the wrr-queue threshold command. To return to the default settings,use the no form
of this command.
wrr-queue threshold queue-id threshold-percent-1 ... threshold-percent-n
no wrr-queue threshold queue-id

Syntax Description

Defaults

queue-id

Queue number; valid values are 1 and 2.

threshold-percent-1
threshold-percent-n

Number of weights for queues 1 and 2; valid values are from 1 to
100 percent.

When you enable QoS, the default values are as follows:
•

100 percent for threshold 1

•

60 percent for threshold 2

Command Modes

Interface configuration

Command History

Release

Modification

12.2(18)ZY

Support for this command was introduced.

Usage Guidelines

Use the transmit queue and threshold numbers.
The queue-id is 1 for the standard low-priority queue and 2 for the standard high-priority queue.
Always set threshold 2 to 100 percent.
Receive-queue drop thresholds are supported only on Gigabit Ethernet interfaces that are configured to
trust CoS.

Examples

This example shows how to configure receive queue 1/threshold 1 and transmit queue 1/threshold 1:
Router(config-if)# wrr-queue threshold 1 60 100
Router(config-if)#

Related Commands

Command

Description

show queueing interface

Displays queueing information.

wrr-queue queue-limit

Sets the transmit-queue size ratio on an interface.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY
OL-11437-01

2-1293

Chapter 2

Cisco IOS Commands for the Catalyst 6500 Series Switches with the Supervisor Engine 32 PISA

wrr-queue threshold

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference—Release 12.2ZY

2-1294

OL-11437-01

A P P E N D I X

A

Acronyms
Table A-1 defines the acronyms that are used in this publication.
Table A-1

List of Acronyms

Acronym

Expansion

AAL

ATM adaptation layer

ACE

access control entry

ACL

access control list

ACNS

Application and Content Networking System

AFI

authority and format identifier

Agport

aggregation port

ALPS

Airline Protocol Support

AMP

Active Monitor Present

APaRT

Automated Packet Recognition and Translation

ARP

Address Resolution Protocol

ATA

Analog Telephone Adaptor or Advanced Technology Attachment

ATM

Asynchronous Transfer Mode

AV

attribute value

BDD

binary decision diagrams

BECN

backward explicit congestion notification

BGP

Border Gateway Protocol

Bidir-PIM

bidirectional PIM

BMA

broadcast multiaccess

BPDU

bridge protocol data unit

BRF

bridge relay function

BSC

Bisync

BSR

bootstrap router

BSTUN

Block Serial Tunnel

BUS

broadcast and unknown server

BVI

bridge-group virtual interface

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX
OL-11437-01

A-1

Appendix A

Table A-1

Acronyms

List of Acronyms (continued)

Acronym

Expansion

CAM

content-addressable memory

CAR

committed access rate

CASA

Cisco Appliance Services Architecture

CBAC

context based access control

CCA

circuit card assembly

CDP

Cisco Discovery Protocol

CE

customer edge

CEF

Cisco Express Forwarding

CHAP

Challenge Handshake Authentication Protocol

CIR

committed information rate

CIST

Common and Internal Spanning Tree

CLI

command-line interface

CLNS

Connection-Less Network Service

CMM

Communication Media Module

CMNS

Connection-Mode Network Service

CNS

Cisco Networking Services

CoPP

control plane policing

COPS

Common Open Policy Server

COPS-DS

Common Open Policy Server Differentiated Services

CoS

class of service

CPLD

Complex Programmable Logic Device

CRC

cyclic redundancy check

CRF

concentrator relay function

CSM

Content Switching Module

CST

Common Spanning Tree

CUDD

University of Colorado Decision Diagram

CBWFQ

class-based weighted fair queueing

DAI

dynamic ARP inspection

DCC

Data Country Code

dCEF

distributed Cisco Express Forwarding

DDR

dial-on-demand routing

DE

discard eligibility

DEC

Digital Equipment Corporation

DF

designated forwarder

DFC

Distributed Forwarding Card

DFI

Domain-Specific Part Format Identifier

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX

A-2

OL-11437-01

Appendix A

Acronyms

Table A-1

List of Acronyms (continued)

Acronym

Expansion

DFP

Dynamic Feedback Protocol

DHCP

Dynamic Host Configuration Protocol

DISL

Dynamic Inter-Switch Link

DLC

Data Link Control

DLCI

data-link connection identifier

DLSw

Data Link Switching

DMP

data movement processor

DNS

Domain Name System

DoD

Department of Defense

DOM

digital optical monitoring

DoS

denial of service

dot1q

802.1Q

dot1x

802.1x

DRAM

dynamic RAM

DRiP

Dual Ring Protocol

DSAP

destination service access point

DSCP

differentiated services code point

DSPU

downstream SNA Physical Units

DSS

Digital Signature Standard

DTP

Dynamic Trunking Protocol

DTR

data terminal ready

DVMRP

Distance Vector Multicast Routing Protocol

DWRR

deficit weighted round robin

DXI

data exchange interface

EAP

Extensible Authentication Protocol

EAPoUDP

Extensible Authentication Protocol over User Datagram Protocol

EARL

Enhanced Address Recognition Logic

EEPROM

electrically erasable programmable read-only memory

EHSA

enhanced high system availability

EIA

Electronic Industries Association

ELAN

Emulated Local Area Network

EOBC

Ethernet out-of-band channel

EOF

end of file

EoMPLS

Ethernet over Multiprotocol Label Switching

ERM

Exception Recovery Manager

ESI

end-system identifier

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX
OL-11437-01

A-3

Appendix A

Table A-1

Acronyms

List of Acronyms (continued)

Acronym

Expansion

FAT

File Allocation Table

FIB

Forwarding Information Base

FIE

Feature Interaction Engine

FECN

forward explicit congestion notification

FM

feature manager

FPD

field programmable devices

FRU

field replaceable unit

fsck

file system consistency check

FSM

feasible successor metrics

FSU

fast software upgrade

FTP

file transfer protocol

FWSM

Firewall Services Module

GARP

General Attribute Registration Protocol

GBIC

Gigabit Interface Converter

GBTE

guaranteed bandwidth traffic engineering

GE-WAN

Gigabit Ethernet WAN

GMRP

GARP Multicast Registration Protocol

GVRP

GARP VLAN Registration Protocol

HSRP

Hot Standby Routing Protocol

ICC

Inter-card Communication or interface controller card

ICD

International Code Designator

ICMP

Internet Control Message Protocol

IDB

interface descriptor block

IDP

initial domain part or Internet Datagram Protocol

IDSM

Intrusion Detection System Module

IFS

IOS File System

IGMP

Internet Group Management Protocol

IGMPv2

IGMP version 2

IGMPv3

IGMP version 3

IGP

Interior Gateway Protocol

IGRP

Interior Gateway Routing Protocol

ILMI

Integrated Local Management Interface

IP

Internet Protocol

IPC

interprocessor communication

IPG

inter packet gap

IPX

Internetwork Packet Exchange

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX

A-4

OL-11437-01

Appendix A

Acronyms

Table A-1

List of Acronyms (continued)

Acronym

Expansion

IS-IS

Intermediate System-to-Intermediate System Intradomain Routing
Protocol

ISL

Inter-Switch Link

ISL VLANs

Inter-Switch Link VLANs

ISO

International Organization of Standardization

ISR

Integrated SONET router

LACP

Link Aggregation Control Protocol

LACPDU

Link Aggregation Control Protocol data unit

LAN

local area network

LANE

LAN Emulation

LAPB

Link Access Procedure, Balanced

LCP

Link Control Protocol

LDA

Local Director Acceleration

LEC

LAN Emulation Client

LECS

LAN Emulation Configuration Server

LEM

link error monitor

LER

link error rate

LES

LAN Emulation Server

LLC

Logical Link Control

LOU

logical operation units

LTL

Local Target Logic

MAC

Media Access Control

MD5

message digest 5

MDIX

media-dependent interface crossover

MDS

multicast distributed switching

MDSS

Multicast Distributed Shortcut Switching

MDT

multicast distribution tree

MFD

multicast fast drop

MFIB

multicast forwarding information base

mGRE

multipoint generic routing encapsulation

MIB

Management Information Base

MII

media-independent interface

MLDv2

multicast listener discovery version 2

MLS

Multilayer Switching

MLSE

maintenance loop signaling entity

MLSM

multilayer switching for multicast

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX
OL-11437-01

A-5

Appendix A

Table A-1

Acronyms

List of Acronyms (continued)

Acronym

Expansion

MN

mobil node

MOP

Maintenance Operation Protocol

MOTD

message-of-the-day

MPLS

Multiprotocol Label Switching

MQC

modular QoS CLI

mrinfo

multicast router information

MRM

multicast routing monitor

mroute

multicast route

mrouter

multicast router

MSDP

Multicast Source Discovery Protocol

MSM

Multilayer Switch Module

MSS

maximum segment size

MST

Multiple Spanning Tree (802.1s)

MSTCI

MST configuration identifier

MTU

maximum transmission unit

MVAP

multiple VLAN access port

NAM

Network Analysis Module

NAT

network address translation

NBMA

nonbroadcast multiaccess

NBP

Name Binding Protocol

NCIA

Native Client Interface Architecture

NDE

NetFlow Data Export

NDR

no drop rate

NET

network entity title

NetBIOS

Network Basic Input/Output System

NFFC

NetFlow Feature Card

NHRP

Next Hop Resolution Protocol

NMP

Network Management Processor

NSAP

network service access point

NSF

non-stop forwarding

NTP

Network Time Protocol

NVGEN

nonvolatile generation

NVRAM

nonvolatile RAM

OAL

optimized ACL logging

OAM

Operation, Administration, and Maintenance

ODM

order dependent merge

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX

A-6

OL-11437-01

Appendix A

Acronyms

Table A-1

List of Acronyms (continued)

Acronym

Expansion

OIF

Outgoing interface of a multicast {*,G} or {source, group} flow

OSI

Open System Interconnection

OSPF

open shortest path first

PAE

port access entity

PAgP

Port Aggregation Protocol

PBD

packet buffer daughterboard

P bits

prioritization bits

PBR

policy-based routing

PC

Personal Computer (formerly PCMCIA)

PCM

pulse code modulation

PCR

peak cell rate

PDP

policy decision point

PDU

protocol data unit

PE

provider edge

PEP

policy enforcement point

PE router

provider edge router

PFC

Policy Feature Card

PGM

Pragmatic General Multicast

PHY

physical sublayer

PIB

policy information base

PIR

peak information rate

PIM

protocol independent multicast

PIM-SM

Protocol Independent Multicast sparse mode

PISA

Programmable Intelligent Services Accelerator

PoS

Packet over Sonet

PPP

Point-to-Point Protocol

ppsec

packets per second

PRID

Policy Rule Identifiers

psecure

port security

PVL

per VLAN learning

PVLANs

private VLANs

PVST+

Per-VLAN Spanning Tree+

QDM

QoS device manager

QM

QoS manager

QM-SP

SP QoS manager

QoS

quality of service

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX
OL-11437-01

A-7

Appendix A

Table A-1

Acronyms

List of Acronyms (continued)

Acronym

Expansion

QinQ

IEEE 802.1Q in 802.1Q

RACL

router interface access control list

RADIUS

Remote Access Dial-In User Service

RAM

random-access memory

RCP

Remote Copy Protocol

RF

Redundancy Facility

RGMP

Router-Ports Group Management Protocol

RIB

routing information base

RIF

Routing Information Field

RM

routed MAC

RMON

rem ote netw ork m onitor

ROM

read-only memory

ROMMON

ROM monitor

RP

route processor or rendezvous point

RPC

remote procedure call

RPF

reverse path forwarding

RPR

Route ProcessorRedundancy

RSPAN

remote SPAN

RST

reset

RSTP

Rapid Spanning Tree Protocol

RSTP+

Rapid Spanning Tree Protocol plus

RSVP

ReSerVation Protocol

RTP

Real-Time Transport Protocol

SA

source active

SAID

Security Association Identifier

SAP

service access point

SCM

service connection manager

SCP

Switch-Module Configuration Protocol or Serial Control Protocol

SDLC

Synchronous Data Link Control

SFP

small form factor pluggable

SGBP

Stack Group Bidding Protocol

SIMM

single in-line memory module

SLB

server load balancing

SLCP

Supervisor Line-Card Processor

SLIP

Serial Line Internet Protocol

SMDS

Software Management and Delivery Systems

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX

A-8

OL-11437-01

Appendix A

Acronyms

Table A-1

List of Acronyms (continued)

Acronym

Expansion

SMF

software MAC filter

SMP

Standby Monitor Present

SMRP

Simple Multicast Routing Protocol

SMT

Station Management

SNAP

Subnetwork Access Protocol

SNMP

Simple Network Management Protocol

SPAN

Switched Port Analyzer

SREC

S-Record form at,M otorola defined form atforRO M contents

SRR

shaped round robin

SSL

Secure Sockets Layer

SSM

Source Specific M ulticast

SSO

Stateful Switch Over

SSTP

Cisco Shared Spanning Tree

STP

Spanning Tree Protocol

SVC

switched virtual circuit

SVI

switched virtual interface

TACACS+

Terminal Access Controller Access Control System Plus

TARP

Target Identifier Address Resolution Protocol

TCAM

Ternary Content Addressable Memory

TCL

table contention level

TCP/IP

Transmission Control Protocol/Internet Protocol

TDR

Time Domain Reflectometery

TFTP

Trivial File Transfer Protocol

TIA

Telecommunications Industry Association

TopN

Utility that allows the user to analyze port traffic by reports

ToS

type of service

TLV

type-length-value

TTL

Time To Live

TVX

valid transmission

UDE

unidirectional Ethernet

UDL

unidirectional link

UDLD

UniDirectional Link Detection Protocol

UDLR

UniDirectional Link Routing

UDP

User Datagram Protocol

UNI

User-Network Interface

uRPF

unicast reverse path forwarding

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX
OL-11437-01

A-9

Appendix A

Table A-1

Acronyms

List of Acronyms (continued)

Acronym

Expansion

UTC

Coordinated Universal Time

VACL

VLAN access control list

VCC

virtual channel circuit

VCI

virtual circuit identifier

VCR

Virtual Configuration Register

VFI

virtual forwarding instance

VINES

Virtual Network System

VLAN

virtual LAN

VMPS

VLAN Membership Policy Server

VMR

value mask result

VPLS

Virtual Private LAN Service

VPN

virtual private network

VRF

VPN routing and forwarding

VTP

VLAN Trunking Protocol

VVID

voice VLAN ID

WAN

wide area network

WCCP

Web Cache Coprocessor Protocol

WFQ

weighted fair queueing

WLSM

Wireless LAN Services Module

WRED

weighted random early detection

WRR

weighted round-robin

XCM

external column memory

XNS

Xerox Network System

Catalyst 6500 Series Switch Cisco IOS Command Reference—Release 12.2 SX

A-10

OL-11437-01

A P P E N D I X

B

Acknowledgments for Open-Source Software
The Cisco IOS software on the Catalyst 6500 series switches software pipe command uses Henry
Spencer’s regular expression library (regex).
Henry Spencer’s regular expression library (regex). Copyright 1992, 1993, 1994, 1997 Henry Spencer.
All rights reserved. This software is not subject to any license of the American Telephone and Telegraph
Company or of the Regents of the University of California.
Permission is granted to anyone to use this software for any purpose on any computer system, and to
alter it and redistribute it, subject to the following restrictions:
1.

The author is not responsible for the consequences of use of this software, no matter how awful, even
if they arise from flaws in it.

2.

The origin of this software must not be misrepresented, either by explicit claim or by omission.
Since few users ever read sources, credits must appear in the documentation.

3.

Altered versions must be plainly marked as such, and must not be misrepresented as being the
original software. Since few users ever read sources, credits must appear in the documentation.

4.

This notice may not be removed or altered.

The Cisco IOS software on the Catalyst 6500 series switches software pipe command uses Softfloat.
Softfloat was written by John R. Hauser. This work was made possible in part by the International
Computer Science Institute, located at Suite 600, 1947 Center Street, Berkeley, California 94704.
Funding was partially provided by the National Science Foundation under grant MIP-9311980. The
original version of this code was written as part of a project to build a fixed-point vector processor in
collaboration with the University of California at Berkeley, overseen by Profs. Nelson Morgan and John
Wawrzynek. More information is available through the Web page
http://www.cs.berkeley.edu/~jhauser/arithmetic/SoftFloat.html.
THIS SOFTWARE IS DISTRIBUTED AS IS, FOR FREE. Although reasonable effort has been made to
avoid it, THIS SOFTWARE MAY CONTAIN FAULTS THAT WILL AT TIMES RESULT IN
INCORRECT BEHAVIOR. USE OF THIS SOFTWARE IS RESTRICTED TO PERSONS AND
ORGANIZATIONS WHO CAN AND WILL TAKE FULL RESPONSIBILITY FOR ALL LOSSES,
COSTS, OR OTHER PROBLEMS THEY INCUR DUE TO THE SOFTWARE, AND WHO
FURTHERMORE EFFECTIVELY INDEMNIFY JOHN HAUSER AND THE INTERNATIONAL
COMPUTER SCIENCE INSTITUTE (possibly via similar legal warning) AGAINST ALL LOSSES,
COSTS, OR OTHER PROBLEMS INCURRED BY THEIR CUSTOMERS AND CLIENTS DUE TO
THE SOFTWARE.
Derivative works of Softfloat are acceptable, even for commercial purposes, so long as (1) the source
code for the derivative work includes prominent notice that the work is derivative, and (2) the source
code includes prominent notice with these four paragraphs for those parts of this code that are retained.

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference
OL-11437-01

B-1

Appendix B

Acknowledgments for Open-Source Software

Catalyst Supervisor Engine 32 PISA Cisco IOS Software Command Reference

B-2

OL-11437-01

INDEX

port interface type

Symbols

2-1195

setting trunk encapsulation characteristics
# character (privileged EXEC mode prompt)
$ character

1-8, 1-10

* (asterisk)

1-8

+ (plus sign)
. (period)

specifying
EtherType values

2-1193

802.1Q tagging

1-8

disabling on VLANs

1-8

? command
^ (caret)

1-6

2-1270

displaying information

1-2

enabling on VLANs

1-8, 1-10

_ (underscore)

2-1209

2-1101

2-1270

802.1s

1-8, 1-11

See MST

| (pipe or vertical bar)

802.1w

specifying alternative patterns

1-10

See RSTP+
802.1X
allowing multiple hosts

Numerics

default settings

2-116

disabling

802.1Q

globally

disabling
tunneling

2-122

periodic authentication of client

2-333

disallowing multiple hosts

displaying
enabled ports

2-121

2-118

displaying

2-694

tunneled protocols

information for all interfaces

2-875

2-695

enabling

enabling
tunneling

globally

2-333

2-122

periodic authentication of client

encapsulation
disabling

2-128

resetting to defaults

enabling

2-128

setting

mapping ISL VLANs

port control values

CoS value

drop threshold globally

2-119
2-117

802.3ad

2-338

drop threshold on an interface

See LACP

2-336

maximum processed protocol packets
2-1195

2-123

reauthentication count

2-335

2-121

2-116

authentication timer

2-1276

setting

mode

2-118

2-339

802.3af
configuring administrative mode

2-604

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-1

Index

acronyms, list of

A

A-1

Address Resolution Protocol
abbreviating commands

See ARP

context-sensitive help

1-1

adjacency

access control lists

displaying

See ACLs
accessing
DFC-equipped modules
module-specific CLI

2-632

2-661

missed flows

2-1227

2-988

clearing statistics and token counts in high-rate and
low-rate policer buckets 2-76

access maps

defining

2-1272

specifying sequence

regular expression library

2-458

MLS QoS

2-380

enabling

acknowledgments for open-source software

removing

B-1

2-495
2-458

aggregate policers

B-1

removing

ACL counters
displaying for packetsswitched in hardware

2-1081

from current class

2-587

specifying

ACLs

for current class

clearing
counters

table information

aggregate policer

IPX, time ranges

Softfloat

2-902

aggregate counts

2-650

access lists

applying

node information

2-587

aggressive UDLD

2-65

clearing statistical information

See UDLD, aggressive mode

2-40

aging time

defining
time ranges

MAC address table

2-1227

2-364

ARP

enabling
time-based ACLs

displaying table

2-1227

2-664

ARP ACL

merge
displaying current method

adding clauses

2-733

defining

port access map
creating

2-595

deleting

2-595

2-5

access list

2-5

entering submode
removing from list

removing
time limitation

2-5
2-5

ASIC

2-1227

displaying

selecting
BDD-based merge method

2-393

type

ODM-based merge method

2-393

version

2-665
2-665

assigning an interface to a channel group

TCAM
setting default action during update

2-395

2-22

ATA flash

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-2

OL-11437-01

Index

restrictions
audience

configuring administrative mode

2-1171, 2-1248

2-604

bidirectional PIM

xxv

See BIDIR

authentication
setting username

binary decision diagrams

2-1254

See BDD

authentication proxy

boot configuration file

watch list
adding IP address
clearing entries
configuring
disabling

displaying information
specifying

2-782

setting maximum login attempts

2-1129

2-15

file system, displaying information

2-179

authorization traps during unknown context error
enabling

2-668

bootflash

2-181

2-1129

2-13

BOOT environment variable

2-181

disabling

2-13

specifying device and filename

2-43

2-181

displaying
enabling

returning to default location

2-181

2-666

booting
from Flash

2-15

boot system command

autonegotiation

2-15

Border Gateway Protocol

setting delay timer

See BGP

2-1219

BPDU
conversion over protocol tunneling links

B

2-18

BPDU filtering
disabling

BDD
selecting ACL merge method

by default

2-393

on an interface

BGP
configuring maximum number of parallel routes
deterministic processing time regular expression
engine 2-11
regular expression engine

2-11

enabling
2-1158

on an interface

2-1160

on an interface
2-425

by default

DF interface information

2-858

2-1160

on an interface

2-848

2-1134

bridged flows

2-947

disabling

IP multicast routing table information
IP multicast table information

2-1134

enabling

displaying
cached rendezvous points

2-1132

BPDU guard
by default

configuring
RP RPF scan interval

2-1132

disabling

Bidir

bidirectional CDP

2-385

by default

enabling

information

2-1158

2-834

2-829, 2-834

globally for NDE
inbound NDE

2-216

2-215

enabling
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

OL-11437-01

IN-3

Index

globally for NDE
inbound NDE

rate-limiting

2-216

2-413

tunnel fragmentation

2-215

bridged traffic

2-402

displaying

microflow policing

IPv4 unicast address

2-460

bridge protocol data unit

2-914, 2-929

maximum route system configuration

See BPDU

next-hop information

byte count, displaying

2-798

VLAN configuration information

2-750

2-930

VLAN interface status

2-798

2-798

enabling

C

missing prefix detection

MLS per-prefix accounting

cable diagnostics

rate-limiting

TDR
clearing all interfaces
displaying test results

2-371

enabling

2-371

2-402

epoch

2-33

beginning new epoch

2-671

2-44

displaying information

2-1225

incrementing

CAM table usage monitoring
disabling

2-410

2-413

tunnel fragmentation

2-33

clearing specific interface
running test

2-185

2-793

2-44

inconsistencies
clearing

2-46

displaying

CASA

2-795

selecting

configuring
function as a forwarding agent

load-balancing algorithm

2-183

2-184

setting

disabling
function as a forwarding agent

2-183

CDP

checker type

2-185

elapsed time

2-185

load balancing

displaying
neighbor information

2-411

period between scans

2-675

rate-limiting

CEF

2-185

2-413

route limiting per protocol

clearing
IP per-prefix accounting statistics
IPv6 per-prefix accounting statistics

2-67
2-68

specifying
maximum number of prefixes to check per scan
passive scan check

consistency checker parameters

2-400

2-185

disabling

2-185

changing to untrusted port state

enabling

2-185

chassis

2-484, 2-503

displaying

consistency checker types
disabling

2-185

chassis MAC address ranges

enabling

2-185

current and peak traffic meter readings
model type

disabling
MLS per-prefix accounting

2-185

2-410

2-673
2-673

2-740

percentage of backplane utilization

2-673

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-4

OL-11437-01

Index

product number
serial number

module-specific CLI

2-740

remote login

2-740

switching clock failure recovery mode
chassis serial number, displaying

2-632

string search

2-673

alternation

2-738

checksum

1-10

anchoring

computing

1-10

expressions

MD5 signature

filtering

2-1255

verifying

1-7

1-7

multiple-character patterns

compressed image

2-138

multipliers

Flash memory file

2-1255

parentheses for recall

CIR
circular cache-header buffer, displaying contents
Cisco Appliance Services Architecture

displaying information

2-1048

command-line interface
See CLI

2-1110

class (policy-map) command

command modes

2-30

accessing

class map
configuring

exiting

match criteria on IP packets

2-382

match criteria on IPv6 packets
match criteria per protocol
displaying information

2-382

1-5

1-5

understanding

1-5

commands
executing multiple interfaces simultaneously

2-382

mode types

2-679

MLS QoS

2-162

1-5

committed information rate
See CIR

2-497

compression mode

removing
match criteria per protocol

2-382

class maps
configuration mode

turning off

2-439

turning on

2-439

configuration
entering line configuration collection mode

2-26

class policies

specifying terminal line
configuration, saving

2-30

default class, configuring

2-30, 2-593

clearing a Gigabit Ethernet interface
accessing

1-7

See online diagnostics

Cisco IOS VLAN subinterface

CLI

using

1-8

Cisco Networking Services

See CEF

configuring

1-7

CNS

Cisco Express Forwarding

accessing

2-827

client ID

See CASA

enabling

1-11

single-character patterns

2-458

1-9

1-9

searching outputs

setting rate

2-632

2-38

2-346

2-346

1-11

connection attempted by a failed server
changing to defaults
defining elapsed times

2-636
2-636

consistency checker
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

OL-11437-01

IN-5

Index

configuring
disabling

CoS mutation map from interface

2-428

CoS to CoS mapping

2-428

configuring

displaying
information
enabling

2-463

2-468

CoS value

2-944

defining default value

2-428

Content Switching Module

2-462

CoS values

See CSM

mapping to strict-priority queue

control plane policing

returning to default mappings

See CoPP

2-606
2-606

counters

cooling

clearing hardware interface counters

displaying information

2-702

CoPP
attaching

clearing interface counters

2-35

clearing NetFlow counters

2-37

2-35

displaying

policy map to control plane

interface counter information

2-648

configuring

2-680

CPU time

traffic policing

guaranteeing processing time

2-590

displaying

2-645

CSM

policy-map class information
entering configuration mode

shutting down

2-1038

2-153

custom EtherTypes

2-92

specifying EtherType values

removing
service policy from control plane
copying files

2-648

2-94

enabling automatic checksum verification
validating image

2-138

2-138

adding

2-468

deleting an entry

D
DAI

copy inner to out .1pbits
configuring

2-1193

clauses to ARP ACL
2-468

2-5

applying ARP ACL to VLAN

CoS

2-167

clearing

inner CoS to outer CoS translation

log buffer status

displaying configuration information
displaying runtime version information
mapping

2-468

statistics

2-42

configuring
2-171

defining
2-463

removing from interface

ARP ACL

2-463

2-5

disabling

CoS to CoS

globally

attaching

2-176

IP ARP inspection checks

CoS mutation map to interface
removing

2-975

IP ARP log buffer

CoS mutation maps
attaching to interface

2-975

2-41

2-463

2-174

displaying
log buffer status

2-780

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-6

OL-11437-01

Index

status for VLANs
DoS protection

disabling

2-777

all interfaces as trusted sources

2-169

enabling

interface as a trusted source

globally

IP ARP inspection checks

configured trusted interfaces

2-174

entering ARP ACL submode

all interfaces as trusted sources
interface as a trusted source

2-5

setting

2-187

2-188

snooping binding

per-port configurable trust state
dead process statistics, displaying

clearing table entries

2-173

configuring

2-47

snooping database

2-894

clearing table entries

debounce timer

2-47

snooping statistical

2-348

clearing table entries

2-348

displaying debounce timer configuration
enabling

2-799

enabling

2-5

removing

disabling

2-188

displaying

2-176

ARP ACL

2-187

specifying

2-753

connected routes

2-348

default form of a command, using

2-189

DHCP bindings

1-7

configuring bindings

delimiter
configuring for MLS QoS

2-47

2-191

DHCP snooping

2-499

configuring

denial of service

abort timeout interval

See DoS
designated forwarder

database

See DF

2-193

2-193

number of DHCP messages received

destination address

write-delay time

MLS QoS

2-197

2-193

disabling

setting statistics data export destination address

2-500

deterministic processing time regular expression engine

global

2-190

MAC address comparison

disabling

2-11

on a group of VLANs

enabling

2-11

on a VLAN

DF
2-848

remote login
remote login command

2-198

displaying
binding table entries

DFC

2-200

2-200

tunnel interface

displaying interface information

2-802

configuration information
2-632

DHCP
clearing
snooping binding entries
snooping database entries
snooping statistical entries

2-199

2-800

DHCP database status

2-805

statistical information

2-800

enabling
2-47
2-47
2-47

global

2-190

MAC address comparison
on a group of VLANs

2-199

2-200

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-7

Index

on a VLAN

enabling

2-200

tunnel interface

rate limiting

2-198

enabling option 82

entering

2-195

establishing binding configuration

CoPP configuration mode

2-191

specifying

rate limits

2-193

digital optical monitoring

2-413

DoS protection

See DOM

ARP broadcast

directed broadcasts
disabling

2-487

configuring

2-418

displaying information

2-902

IPv4 multicast rate limiters

2-511

IPv6 multicast rate limiters

2-513

configuring DAI

2-418

directories
creating

2-92

setting

URL for storing entries

enabling

2-413

2-169

disabling
2-392

setting the default

2-20

disabling DNS lookups

IPv4 multicast rate limiters

2-511

IPv6 multicast rate limiters

2-513

displaying information

2-240

Distributed Forwarding Card

2-982

rate limiters

See DFC

configuring CEF rate limiters

documentation

2-518

configuring for ACL-bridged rate limiters

2-516

conventions

xxvi

configuring for Layer 3 security rate limiters

organization

xxv

configuring for unicast packets

DOM

2-520

configuring for VACL-log cases

disabling

disabling

transceiver traps
displaying

2-524

2-508

disabling CEF rate limiters

2-1124

2-518

disabling for ACL-bridged rate limiters

transceivers operational information
transceivers threshold violations

disabling for unicast packets

2-768

enabling

displaying information

transceiver traps

enabling

2-1124

DoS
configuring

2-520

2-508
2-518

enabling for ACL-bridged rate limiters

CoPP

enabling for unicast packets

attaching policy map to control plane

2-1038

removing service policy from control plane

2-648

2-524

rate limiters for VACL-log cases
disabling for VACL-log cases

2-92

2-523

2-520

enabling for VACL-log cases

2-648

displaying policy-map class information
entering configuration mode

2-516

enabling for Layer 3 security rate limiters

2-590

2-523

2-982

enabling CEF rate limiters

traffic policing

2-516

disabling for Layer 3 security rate limiters

2-768

2-523

2-524

dot1q
See also 802.1Q

disabling
rate limiting

2-413

dot1x

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-8

OL-11437-01

Index

See 802.1x

DSCP mutation map to interface

double-tagged Q-in-Q

defining

See QinQ

DSCP mutation mapping

DSCP

DSCP-to-CoS mapping

attaching
DSCP mutation map to interface

2-464

defining
displaying

EXP mutation mapping

2-476
2-476

DSCP-to-CoS mapping

DSCP mutation map from interface

2-464

DSCP mutation maps
attaching to interface

2-470

DSCP-to-DSCP mapping
DSCP-to-EXP mapping
EXP-to-EXP mapping

2-464

removing from interface

2-475

deleting

2-970

removing

2-473
2-472

2-476

ingress-EXP-to-DSCP mapping

2-464

DSS

2-475

displaying

displaying range invalidation profile
dualmode uplink

2-698

DSCP mutation mapping
mode information

selecting connector type

2-391

duplex mode

2-970

2-944

queueing information

2-1051

removing

configuring

2-125

DWRR queues

DSCP mutation map from interface
egress replication capability

configuring

2-464

2-422

EIGRP

bandwidth

2-1281

dynamic ARP inspection
See DAI

setting
event log size

2-127

enabling

Dynamic Host Configuration Protocol
See DHCP snooping
dynamic MAC address entries
2-63

dynamic SVI
accessing

2-472

ingress-EXP-to-DSCP mapping

mutation mapping

clearing

2-473

DSCP-to-EXP mapping
EXP-to-EXP mapping

2-473

2-473
2-470

DSCP-to-DSCP mapping

mutation mapping

2-464

2-164

routing

2-277

encapsulation
802.1Q
disabling

2-128

enabling

2-128

ISL

creating

2-164

disabling

2-129

deleting

2-164

enabling

2-129

Enhanced Address Recognition Logic
See EARL

E

enhanced password security

egress
attaching

establishing

2-1254

entering VLAN-configuration submode

2-1268

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-9

Index

environmental alarms

deleting session

displaying information

displaying

2-699

session information

environment variables
BOOT, specifying

2-560

ending session

2-15

EOBC interface

2-555

entering destination-session configuration mode

displaying information

entering source-session configuration mode

2-708

EoMPLS

starting new session

disabling

starting session

routing

VLAN based forwarding

2-565

enabling

2-555

2-560

2-555

destination session configuration mode
syntaxes 2-561
source session configuration mode syntaxes

2-565

VLAN based forwarding

2-565

displaying information

information

2-715

guard misconfiguration detection

2-44

error counters
displaying summary

2-22

displaying

2-793

2-44

rebuilding CEF table

2-562

EtherChannel
assigning interface to an EtherChannel group

epoch
incrementing

2-555

tables

2-565

routing

2-1002

2-1084

error detection

detecting

2-1136

disabling

2-1136

enabling

2-1136

error message

setting
module action during packet buffer memory
failures 2-136
error disable

2-1136

minimum links
setting

2-601

removing interface from an EtherChannel group

detection

2-22

Ethernet over Multiprotocol Label Switching

configuring timer

See EoMPLS

2-132

packet buffer errors

EtherTypes

2-132

specifying recovery cause

2-132

recovery

specifying values

2-1193

event tracing

configuring timer

configuring

2-134

displaying information

global configuration mode

2-714

specifying recovery cause

2-134

state

privileged EXEC mode

2-550

2-547

Exception Recovery Manager

displaying information

See ERM

2-760

EXEC-level commands

error disable detection
displaying information

2-712, 2-713

ERSPAN

issuing in other modes

2-115

executing remote switch command

adding interfaces or VLANs
deleting interfaces or VLANs

2-560
2-560

2-631

explicit host tracking
disabling

2-224

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-10

OL-11437-01

Index

enabling

ERSPAN session

2-224

explicit tracking

PVLAN association

disabling for MLDv2 snooping

RSPAN session

2-314

displaying

SPAN session

database

2-560
2-1206

2-555
2-555

disabling capture mode

2-873

displaying information

displaying

2-990

enabling for MLDv2 snooping

current operating information

2-314

IGMP snooping

filter information

limiting size of database

2-1189

2-1102

enabling capture mode

2-232

MLDv2 snooping

2-1189

entering config-VLAN mode

limiting size of database

2-1059

2-1262

executing a command on multiple interfaces

2-318

EXP MAP

2-162

setting

attaching

when in access mode

EXP mutation map to interface

starting

2-465

new ERSPAN session

removing
EXP mutation map from interface

new RSPAN session

2-465

EXP mutation maps
attaching to interface

new SPAN session

2-560
2-555

2-555

extended system ID display

2-465

removing from interface

2-465

export interval
MLS QoS
setting

2-1182

disabling

2-1138

enabling

2-1138

external column memory
See XCM

2-502

expressions
matching multiple expression occurrences
multiple-character patterns

1-9

multiplying pattern occurrence
single-character patterns

1-11

displaying part number
1-10

setting version

2-361

See FSU

configuring

feature interaction engine

characteristics in capture mode
2-1166

2-1191

See FIE
feature manager

creating dynamic SVI

2-164

defining

displaying
CBAC-configured ACL lists and ports

PVLAN association
deleting
dynamic SVI

2-150

fast software upgrade

extended-range VLANs

STP

2-703

fan-trays

extended MAC access list
defining

F
fan trays

1-8

specifying alternative patterns

1-9

2-164

2-1206

dynamic reflexive entries
general information

2-720

inband packet count

2-722

2-723, 2-731

2-732

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-11

Index

per-interface information
per-VLAN information
summaries

Flash memory

2-724, 2-727

booting automatically

2-734

formatting

2-733

FIB TCAM exception

disabling

Flexlink pairs
2-935

enabling

A-4

configuring send mode

field-replaceable unit

port guidelines

field upgradeable ROMMON

2-139

2-140

permit configuration
2-1252

switch processor

2-756

flow fragments

upgrading
route processor

2-139

displaying configuration information

See FRU

2-166

flow mask

2-1252

restoring

files

2-407

specifying
2-94

2-407

fm

disabling automatic image verification

2-94

enabling automatic checksum verification
validating image

2-138

2-138

See feature manager
Frame Relay
displaying traffic

file system

2-742

specifying

2-130

interval to calculate average load

file system consistency check

specifying

Firewall Services Module

interval to calculate average load

See FWSM

2-350

FRU

Flash file system

displaying IDPROM information

check and repair

2-144

checking for damage
directory recovery

displaying status information

2-144

creating new directory

2-738

2-703

fsck utility

2-392

2-1248

enabling fsck utility
file recovering

2-350

Frame Relay MIB enhancement

See fsck utility

format

2-1186

configuring receive mode

See FPD

copying

2-766

flow control

field programmable devices

erase

2-1186

displaying

FIB usage
field

2-141

Flexlink

displaying status for IPv4, IPv6, and MPLS
protocols 2-711
displaying

2-15

enabling

2-144

setting automatic mode

2-144

2-144

FSU

2-1248

redundancy force-switchover command

2-628

2-141

permanently deleting files
setting the default
verify checksum

2-20
2-1255

2-1171

G
GBIC

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-12

OL-11437-01

Index

displaying type

number of prefixes in hardware Layer 3 switching
table 2-935

2-747

GBTE
displaying tunnel information

packet information

2-1010

priority information

Gigabit Ethernet interface
clearing hardware logic

RPF information

2-38

2-908

2-933

statistical information

Gigabit Ethernet WAN

2-934

TCAM entry index information

See GE-WAN
global configuration mode, summary

2-914, 2-929

enabling

1-6

tunnel fragmentation

group cache entries
clearing

2-935

HSRP

2-49

2-402

2-1177

setting

Guaranteed Bandwidth TE

route limiting per protocol

See GBTE

2-400

hardware logic
clearing on VLANs

H

2-39

hardware resources
displaying information

half-duplex mode
configuring

hardware switching

2-125

configuring

hardware

consistency checker

displaying
FIB TCAM exception status
verifying programmed values

2-428

flow statistics message from SP to RP

2-711

checksum error checking

displaying information for packets switched in
hardware 2-1081

consistency checker
globally

2-536

Layer 3 error checking

2-35

length consistency check

hardware Layer 3 switching

unicast traffic

disabling

(*,G) shortcuts

2-538

2-918

2-902

Bidir information

adjacency table information

2-661

CEF table information

hardware table entry information

2-797

consistency checker information

2-908

hardware load-sharing information

2-918

CEF table information in compact format

2-897

IP entry information

2-538

2-537

adjacency node information

exception status

2-431

displaying

2-402

displaying

entry information

2-538

2-428

ingress replication mode

hardware interface counters

tunnel fragmentation

2-430

disabling

2-1049

hardware ACL counters

clearing

2-1020

2-907
2-910

2-944

information based on (*,G/m) entries

2-918

information based on (S,G) shortcuts

2-918

information based on Bidir (*,G/m) shortcuts

2-914

maximum route system configuration

2-918

2-930

information based on group address
information based on IP subnet prefix

2-918

2-918
2-918

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-13

Index

information based on RPF VLAN ID
information based on source IP

2-944

disabling globally

2-937

2-1125

disabling on an interface

enabling
checksum error checking
consistency checker
globally

enabling globally

2-538

Layer 3 error checking

clearing IGMP group cache entries

2-431

last member query interval

2-537

2-220

disabling
proxy reporting

2-104

helper addresses, IP

2-49

configuring

2-538

health monitoring diagnostic tests
configuring

2-1120

IGMP

2-536

unicast traffic

2-1120

2-1125

enabling on an interface

2-428

ingress replication mode

2-224

displaying

2-822

explicit tracking information

host connection
optimizing port configuration

explicit-tracking status

2-1180

2-990

2-812

interface configuration information

Hot Standby Router Protocol

interface status information

See HSRP

multicast groups

HSRP

2-812

2-812

2-809

snooping information for VLAN interface

configuring
hardware Layer 3 switching
initialization delay
tracking

ifIndex persistence
clearing previously interface configuration mode SNMP
ifIndex commands 2-1118

2-918

multicast replication capabilities
VRF CEF table information

2-918

status and configuration information

2-1177

2-812

status and configuration information for VLAN

2-1173

2-812

explicit host tracking

2-1175

disabling
delay period

2-812

2-1173

disabling

2-224

enabling

2-224

rate limit

displaying
delay period information

setting

2-1074

2-237, 2-318

snooping
clearing statistical information

I

2-51

configuring a Layer 2 port as a multicast router
port 2-233

ICC

configuring fast leave

displaying counter and status information
ICMPv6 neighbor-discovery ACLs

2-736

configuring last member query interval
disabling

disabling
2-583

enabling
TCAM support optimization
IDPROM

2-583

2-815

displaying rate limit information

2-816

displaying statistical information

2-817

enabling

2-230

2-222

displaying information

TCAM support optimization

2-226

2-222

enabling multicast support within a subnet

displaying information

2-235

2-738

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-14

OL-11437-01

Index

enabling querier function

removing

2-235

limiting size of explicit tracking database
maximum number of Layer 2 entries

2-229

periodic flooding of multicast packets
setting incoming message rate limit

2-232

2-239
2-237, 2-318

IGMP snooping

2-463

EXP mutation map from interface

2-465

inline power
configuring administrative mode
power consumed by module

last member query interval

status information

2-230

maximum number of Layer 2 entries

2-229

defining

2-222

displaying

2-975

fast leave processing

2-226

mapping

2-975

instance numbering

2-235

mapping

2-222

explicit host tracking

2-224

fast leave processing

2-226

2-155

inter-card communication
See ICC

2-235

interface accounting information, displaying

multicast router
learning method, configuring
next-hop interface, specifying

2-745

interface configuration mode

2-233
2-233

images
disabling verification for current operation

2-94

enabling automatic checksum verification

2-138

entering

2-157

summary

1-6

table defining modes

1-6

interface counters
displaying information

2-138

inactive state

2-680

interface-range macro

displaying reason for the inactive state
informs, enabling

2-155

returning to default

multicast support within a subnet

validating image

2-1044

2-468

2-224

multicast support within a subnet

2-1044

inner CoS to outer CoS translation

explicit host tracking

enabling

2-604

displaying

configuring

disabling

CoS mutation map from interface

2-760

creating

2-97

interfaces

2-1122

configuring

ingress

duplex mode

attaching

2-125

CoS mutation map to interface

2-463

half-duplex mode

EXP mutation map to interface

2-465

interface speeds

defining
CoS-to-DSCP mapping

accounting information

2-467
2-478

deleting

administrative status
description

displaying

2-478

2-745

2-764, 2-766

2-755

error counters

2-467

deleting IP precedence-to-DSCP mapping
queueing information

2-1168

displaying

defining IP precedence-to-DSCP mapping
CoS-to-DSCP mapping

2-125

2-750

error-disabled state

2-760

flow control information
2-1051

interface capabilities

2-756

2-747

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-15

Index

operation status
PVLAN mapping
status

IP

2-764, 2-766

clearing

2-759

access list statistical information

2-755

status summary

displaying interface usability status

2-762

total number of interface VLANs
total suppression discard counts
traffic

2-762
2-750

displaying IPv4 unicast address
enabling switching

2-157

DAI statistics

displaying administrative and operational
status 2-764
displaying Flexlink pairs

intermediate system-to-intermediate system

log buffer

2-171

controlling packet logging
DAI

2-176

inspection check

2-1274

2-174

displaying

2-1274

DAI status

displaying

2-777

log buffer status

allocation information

2-1104

2-780

enabling

internal VLANs

dynamic inspection

displaying status

2-177

disabling

internal VLAN allocation

2-1093

Internet Group Management Protocol
See IGMP

inspection check

2-176

2-174

limiting rate of incoming requests

2-169

log buffer

Internetwork Packet Exchange

clearing status

See IPX

2-41

displaying status

inter packet gap

2-780

setting

See IPG

per-port configurable trust state

interprocessor communication

setting

interrupt throttling
clearing

2-173

IPC
displaying cache flow entries

2-81

displaying

2-173

trust state

See IPC

counters

2-41

configuring

See IS-IS

default setting

2-42

log buffer status

2-766

2-764, 2-766

2-167

clearing

switching ports

configuring

2-304

applying ARP ACL to VLAN

2-771

entering interface configuration mode

displaying status

2-914, 2-929

IP ARP

2-750

trunk information

2-821

NetFlow

2-742

trunk counters

2-40

2-785

IP fast-switching cache, displaying contents

2-824

IPG

information

2-1016

Inter-Switch Link VLANs
See ISL VLANs

returning to default mode
setting mode

2-165

2-165

IP IGMP

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-16

OL-11437-01

Index

See IGMP
IP multicast

2-277

allocating circular buffer storage

2-295

filter RP announcements

2-290

PIM Version 2 candidate, advertising

2-269

allowing

2-291

See also mroute

routing between broadcast-only internetworks

2-271

IP output queue
limiting size

Bidir
clearing entries

2-267

deleting

disabling

2-309

enabling

2-309

IP-routing protocols

2-70

configuring maximum number of parallel routes

disabling
load splitting across multiple paths
2-277

load splitting across multiple paths

2-385

IP shortcuts to MSFC

2-274

enabling

disabling

2-526

enabling

2-526

IPv4

2-274

clearing

filtering
multicast router information request packets
filtering auto RP messages

2-273

software-installed entries

2-73

configuring

2-267

limiting number of routes added to table

2-276

removing

multicast rate limiters

2-511

disabling

administratively scoped boundary
circular buffer

2-267

multicast rate limiters

2-511

displaying

2-269

FIB TCAM exceptions

routing
displaying routing table

2-815

2-711

2-940

IPv6
ACLs

statistic counters

displaying hardware NetFlow IPv6
configuration 2-967

2-71

IP multicast routing

displaying NetFlow entries for reflexive ACLs

MRM
UDP port numbers
mroute, configuring

information

2-829, 2-834

displaying snooping information
resetting

2-147

IP processing

administratively scoped boundary

routing

2-147

restoring default size

2-69

configuring

group

Auto-RP, mapping agent

enabling compression mode

2-1247

2-269, 2-828

2-299

multicast rate limiters
NDE flow mask

RP

2-73

2-513

2-407

disabling

2-282

Auto-RP, groups covered

2-68

configuring

2-854

shortest path tree, delaying use
address, configuring

per-prefix accounting statistics
software-installed entries

PIM
neighbors, displaying

2-439

clearing

2-243

packet headers, storing

2-957

2-292, 2-293

CEF-based multicast forwarding

2-311

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-17

Index

compression mode

display statistics

2-439

denial of packets from source loopback address

2-441

denial of packets from source multicast address

2-441

hardware assist

2-925

preventing
installation of ACL entry

2-312

installation of multicast connected entry

2-311

multicast rate limiters

IPv6 hardware configuration information

2-513

displaying

2-312

2-967

IPv6 snooping

ACL entries

See MLDv2 snooping

2-1081

DSS IP range invalidation profile
DSS IPv6 range invalidation profile
exact route for

IPX (Internet Packet Exchange)

2-698

clearing entries

2-711

hardware NetFlow IPv6 configuration
MFIB information

microflow policing information

multicast entries

2-967

2-528

enabling

2-528

configuring network entity title

2-970

2-574

ISL

2-925

multicast hardware shortcut count
multicast shared adjacencies

disabling
IS-IS

2-940

MLS QoS information

2-73

IPX shortcuts to MSFC

2-967

2-867

MLS IP information

2-1227

IPX MLS

2-925

FIB TCAM exceptions

encapsulation

2-1033

2-1033

multicast subnet/connected hardware entries
NetFlow entries

access lists, time ranges

2-698

2-1033

per-prefix accounting statistics

enabling

2-129

mapping to 802.1Q VLANs

2-957

2-1276

2-925

platform software multicast information
switching table entry information

2-129

ISL VLANs

2-957

NetFlow hardware configuration

disabling

2-1033

J

2-925

enabling

jumbo frames

CEF-based multicast forwarding
compression mode

2-311

default value

2-439

2-569

restoring default value

2-569

denial of packets from source loopback address

2-441

setting maximum packet size

denial of packets from source multicast address

2-441

setting maximum transmission unit size

hardware assist

2-569
2-569

2-311

hardware assist
enabling

L

2-311

MLDv2 snooping

LACP

displaying explicit-tracking information
displaying multicast router interfaces
displaying report-suppression status
displaying statistics information

2-873

2-873
2-873

2-873

configuring
maximum port per bundle on port channel
configuring interface

2-342

2-22

deselecting channeling protocol

2-25

per-prefix accounting
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-18

OL-11437-01

Index

disabling

displaying
internal information
neighbor information
protocol setting

globally

2-879

on an interface

2-879

globally

setting
ingress packet rate
port priority

2-352

on an interface

2-25

configuring for IGMP

load balancing

2-220

configuring for IGMP snooping
configuring for MLDv2 snooping

2-1140

selecting

2-230

Catalyst 6500 series switch load-balancing
algorithm 2-411

2-316

Layer 2
configuring port as a multicast router port

Cisco IOS load-balancing algorithm

2-233

2-411

load-balancing algorithm

interface type

selecting

2-1195

logging

Layer 2 classification of IP packets
2-379

enabling

2-379

2-350

2-357

controlling IP ARP packets

2-377

disabling

2-184

load statistics interval

2-1195

configuring

2-352

link type

2-345

configuring

setting

2-355

on system initialization

last member query interval

resetting

2-354

on a subinterface

2-344

2-343

system priority

2-352

enabling

2-879

channeling protocol

2-355

on system initialization

2-879

system identification

2-354

on a subinterface

2-715

statistical information

2-352

2-177

logical virtual ports
displaying number required

2-1112

longest prefix match functionality

Layer 2 port-security

2-914, 2-929

loop guard

displaying
rate-limiter status information

2-982

rate-limiter usage information

2-982

disabling

2-1139

enabling

2-1139

Layer 3
manager

M

displaying information

2-877

MAC ACL filtering

Link Aggregation Control Protocol
See LACP
link debounce timer
configuring
disabling
enabling

link-status event messages

enabling VLAN field

2-379

classifying Layer 3 packets as Layer 2 packets

2-348

2-348

2-379

MAC ACL QoS filtering

2-348

displaying debounce timer configuration

disabling VLAN field

2-753

2-377

configuring
ARP ACL

2-5

deleting
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

OL-11437-01

IN-19

Index

ARP ACL

dynamic table entries

2-5

MAC addresses
counters
displaying multicast addresses

2-884

information

2-884

interface-specific information

2-884

enabling

MAC address learning state

MAC limit globally
MAC limit per port

2-884
2-890

2-884

multicast table entries only

2-368

2-884

number of manually configured entries

2-368

MAC limit per VLAN
sticky MAC

MAC move notification

2-368

MAC limit per interface

static table entries only

2-368

2-884

2-884

VLAN-specific information

2-1200

removing

2-884

enabling

sticky MAC

CAM table usage monitoring notification

2-1200

MAC address filtering
configuring

MAC address learning

2-373

enabling

2-373

removing static entries

2-366

displaying state

2-373

disabling

2-368

enabling

2-368

MAC move notification

2-890

2-366

MAC address table
configuring

disabling

2-370

enabling

2-370

mac-out-of-band synchronization

mac-out-of-band synchronization

configuring

2-376

MAC address tables
adding static entries
clearing static entries

2-376

macro
creating an interface-range macro

2-373

clearing dynamic entries

2-97

maintenance loop signaling entity

2-63

See MLSE

2-63

Maintenance Operation Protocol

configuring
aging time

2-370

MAC limit

MAC address learning
disabling

2-371

2-366

MAC move notification

2-373

disabling

enabling

entry count

2-884

See MOP

2-364

RM purging time

mapping

2-364

deleting secure or specific addresses

802.1Q VLANs to ISL VLANs

2-82

disabling

2-1276

accessing

CAM table usage monitoring notification

2-371

IGMP snooping on static MAC addresses

2-373

MAC address learning

2-366

MAC move notification

2-370

displaying

QoS policy map configuration mode
configuring
DSCP mutation map

2-473

egress DSCP-to-CoS mapping

2-470

egress DSCP-to-DSCP mapping

aging time

egress DSCP-to-EXP mapping

2-884

DFC-specific information

2-884

2-592

egress EXP-to-EXP mapping

2-473
2-472

2-476

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-20

OL-11437-01

Index

EXP mutation map

MDIX

2-476

ingress-EXP-to-DSCP mapping

2-475

ingress IP precedence-to-DSCP mapping

2-478

policed DSCP values to marked-down DSCP value
mapping 2-480
QoS class maps

2-26

QoS policy map

2-592

enabling

2-386

MDS
disabling
2-277

displaying
2-1266

interface information

defining

2-826

enabling

CoS to CoS map

2-468

IP multicast routing

deleting

2-277

MDSS

CoS-to-DSCP mapping

2-467

Multicast Distributed Shortcut Switching

egress DSCP-to-CoS mapping

2-470

egress DSCP-to-DSCP mapping
egress DSCP-to-EXP mapping
egress EXP-to-EXP mapping

MDT

2-473

configuring

2-472

default group

2-476

ingress-EXP-to-DSCP mapping

2-26

QoS policy map

2-592

2-388

disabling
2-478

policed DSCP values to marked-down DSCP value
mapping 2-480
QoS class maps

2-389

group address ranges

2-475

ingress IP precedence-to-DSCP mapping

recording of data MDT reuse
2-853

data reuse information

2-850

default group information

class map information
information

hardware accelerated information
received advertisements

2-1036

policy map interface information
removing VLAN access map

2-1266

2-851

2-1266

recording of data MDT reuse

2-390

Media Access Control
media dependent interface with crossover detection

2-26

maximum NetFlow table allocation

See MDIX
message digest 5

2-452

See MD5

maximum routes
maximum transmission unit

2-944

See MAC address table

match subcommand

displaying configuration

2-849

enabling

2-1040

entering VLAN access-map command mode

configuring

2-849

detailed BGP advertisement information

2-679

2-759

policy map information

2-390

displaying
advertisements sent

displaying

2-930

message-of-the-day
See MOTD
MFIB

See MTU

displaying entries and interfaces

MD5 signature
computing

2-386

IP multicast routing

creating VLAN access map

accessing

disabling

2-1255

2-867

mGRE
configuring
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

OL-11437-01

IN-21

Index

mobility

globally

2-540

wireless mGRE tunnels

report suppression

2-540

specifying

2-322

snooping querier

convert NBMA to BMA
network ID

2-321

limiting size of explicit tracking database

2-540

2-318

MLS

2-540

CEF

MIB
displaying SNMP interface index identification
numbers 2-1062
microflow policers

displaying CEF table information

displaying information for specific VRF
statistical information

flow mask type

2-587

fast-aging time

2-460

2-397

long-aging time

microflow policing statistics, displaying

2-960

minimum links

2-398

normal-aging time

2-399

port-security rate limiters

2-601

rate limiters

MLDv2

2-509

2-509

defining

disabling

exception priority

proxy reporting

2-314

2-403

directed broadcasts

displaying

displaying information

explicit-tracking information

2-873

MAC-address table information
multicast router interfaces
report-suppression status
statistics information

2-902

disabling

2-884

Layer 2 protocol-tunneling rate limiters

2-873

rate limiters

2-873

2-418

displaying
ACL merge method

configuring

2-733

aggregate count of all missed flows

Layer 2 port as a multicast router port
configuring last member query interval
disabling

2-509

2-509

disabling directed broadcast

2-873

MLDv2 snooping
2-320
2-316

ASIC version

2-988

2-896

exception priority

2-908

last reading of corresponding registers

explicit tracking
globally

2-79

configuring

2-460

removing

2-937

2-78

statistical information (deprecated)

microflow policing for bridged traffic
enabling

2-937

clearing

defining

setting

2-313

2-314

packet error information

2-313

report suppression
snooping querier

statistical information
2-322

directed broadcast

enabling
explicit tracking

2-314

2-986
2-980

enabling

displaying
explicit tracking database

2-986

statistics data export information

2-321

2-988

2-873

2-418

NetFlow interface-based entry feature

2-451

NetFlow protocol-based entry feature

2-451

PDU rate limiters

2-509

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-22

OL-11437-01

Index

rate limiters

enabling for ACL-bridged rate limiters

2-509

exception priority
defining

2-403

displaying information
interface

removing a VLAN ID

2-524

2-508
2-518

setting for unicast packets

2-530

disabling population of additional fields
enabling export feature

selecting ACL merge method
specifying flow mask

2-448

2-988

VLAN
displaying statistical information

2-446

2-998

VTP domain

2-420

linking

QoS
disabling ToS to DSCP rewrite

2-490

enabling ToS to DSCP rewrite

2-490

2-533

removing

2-533

MLS CEF
displaying

2-490

consistency checker information

QoS statistics data export

2-912

MLS IP

2-495

clearing

2-497

entries

2-499

destination address

2-405

2-407

displaying information

2-446

specifying filter options

aggregate policer

2-393

TCL

2-531

ToS to DSCP rewrite

2-405

2-407

specifying excluded protocol port

2-531

removing filter options

permitting traffic

2-980

2-450

enabling population of additional fields

specifying address

restoring flow mask

2-448

displaying status and configuration information

removing address

2-524

removing excluded protocol port

2-72

2-523

2-520

setting for VACL-log cases

clearing counters

2-516

setting for Layer 3 security rate limiters

NDE

2-492

enabling globally

2-492

2-73

software-installed entries

2-500

disabling globally

OAL globally

2-357

OAL on an interface
2-493

per-port enabling

2-493

2-73

configuring

2-502

per-port disabling

2-359

deleting
ACL threshold

rate limiters

2-417

disabling

displaying information

2-982

displaying Layer 2 port-security information
enabling

2-508

setting for ACL-bridged rate limiters

2-530

2-532

specifying a management interface

interval

enabling for unicast and multicast packets

setting CEF rate limiters

2-532

removing a management interface

delimiter

2-523

setting

assigning a VLAN ID

class map

enabling for Layer 3 security rate limiters
enabling for VACL-log cases

2-908

2-516

egress replication mode

2-520

enabling CEF rate limiters

2-982

ACL logical operations expansion on Layer 4
ports 2-409

2-518

ingress replication mode

2-431
2-431

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-23

Index

OAL globally

disabling shortcuts

2-357

OAL on an interface

enabling external switches

2-359

shortcuts in TCAM

enabling internal router

2-438

displaying

2-527

2-408

enabling non-RPF multicast fastdrop

information

enabling shortcuts

2-940

mode information

NetFlow routing entries
OAL-cache entries

2-944

2-952

2-424

disabling

2-526

enabling

2-526

multicast

2-882

OAL configuration information

enabling egress capability

2-882

PIM group to active rendezvous point
mappings 2-948
2-951

software-installed static entry information

2-954

statistical information for NetFlow entries

2-955

enabling

disabling shortcuts in TCAM

2-438

enabling shortcuts in TCAM

2-438

replication mode
disabling egress mode
disabling ingress mode

ACL logical operations expansion on Layer 4
ports 2-409

OAL globally

enabling egress mode
enabling ingress mode

2-431

ingress replication mode

2-431
2-431
2-431
2-431

MLS IPX

2-431

interface

2-357

OAL on an interface
shortcuts in TCAM

2-422

reflexive NDR

software-installed non-static entry information

egress replication mode

2-433

IP shortcuts to MSFC

2-944

multicast replication capabilities

2-359
2-438

disabling external switches

2-529

enabling external switches

2-529

IPX shortcuts to MSFC

global
configuring Bidir RP RPF scan interval
configuring threshold
disabling

2-425

2-435

disabling

2-528

enabling

2-528

MLS per-prefix accounting

2-422

disabling consistency checker
disabling subnet download

2-428

2-426

disabling support for policy-routed packets
enabling

2-424

2-437

disabling

2-410

enabling

2-410

MLS QoS
aggregate policer

2-422

enabling consistency checker
enabling subnet download

clearing statistics and token counts in high-rate and
low-rate policer buckets 2-76

2-428

2-426

enabling support for policy-routed packets
installing

defining
2-437

removing

2-458
2-458

attaching

ACL threshold

2-421

CoS mutation map to interface

interface

DSCP mutation map to interface

disabling external switches
disabling internal router

2-527

2-408

EXP mutation map to interface

2-463
2-464
2-465

attaching a policy map to an interface

2-647

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-24

OL-11437-01

Index

clearing statistics and token counts in high-rate and
low-rate policer buckets 2-76

extended trust
configuring trust mode

default CoS value
defining

displaying trust mode

2-462

removing

disabling
2-475

enabling

disabling
2-483

policing ACL-redirected packets

2-485

port attribute checks on EtherChannel bundling
port queueing mode
port-trust ignore

2-455

defining

2-467

removing
2-461

2-488

2-482

displaying

2-467

ingress-EXP-to-DSCP mapping
defining

2-475

deleting

2-475

ingress IP precedence-to-DSCP mapping

information

2-970

IPv6 information

defining
2-970

MPLS interface summary

2-975

runtime version information

changing to untrusted port state

2-975

enabling

deleting

2-472

2-977

policed in-profile DSCP mapping

policer traffic class identification

2-483

policing ACL-redirected packets

2-485

port attribute checks on EtherChannel bundling
port queueing mode

2-488

2-482

EXP mutation mapping
2-476

2-460

displaying interface summary
defining

2-476

2-468

MPLS

enabling

port-trust ignore

2-484, 2-503

2-460

removing

egress DSCP-to-EXP mapping
2-472

2-457

microflow policing for bridged traffic

egress DSCP-to-CoS mapping

defining

enabling

defining CoS to CoS map

2-473

2-470

2-457

2-484, 2-503

mapping

2-473

deleting

disabling

setting trusted port state

DSCP mutation mapping

2-470

2-478

interface

2-977

number of free aggregate RAM indexes on the switch
processor and the DFCs 2-974

defining

2-478

removing

map configuration information

removing

2-455

ingress CoS-to-DSCP mapping

policer traffic class identification

defining

2-455

disabling PFC QoS and enabling port queueing

ingress-EXP-to-DSCP mapping

removing

2-1051

global

2-462

defining

defining

2-505

2-480

removing

2-480

policing
2-461

ACL-redirected packets

2-485

policy-map configuration mode
accessing
exiting

2-592

2-592

removing
CoS mutation map from interface
DSCP mutation map from interface

2-463
2-464

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-25

Index

EXP mutation map from interface

removing a policy map from an interface
2-507

enabling

2-507

burst duration for GB-TE flows
2-587, 2-593

2-444
2-444

defining

displaying

DSCP-to-EXP mapping

explicit tracking information
information
mobility

2-990

2-472

deleting
DSCP-to-EXP map

2-991

2-472

disabling

2-540

aggregated label recirculation

modes
See command modes

recirculation

modules

tunnel recirculation

oversubscription mode

2-151

displaying

disabling routing

2-567

2-444

2-565

displaying

provisioning information
status information

2-998

2-998

version information

2-998

enabling

control plane statistics

2-1010

FIB TCAM exceptions

2-711

information

2-940

interface summary

oversubscription mode
power cycling
powering on

2-977

IoMPLS enabled interface information
platform-specific information
state of currently routed VCs

aggregated label recirculation
recirculation

2-149

MOP (Maintenance Operation Protocol)
server
more commands

2-15

tag-to-tag load balancing
enabling routing

2-567

2-444

2-565

load distribution method
resetting to defaults

1-7

setting

1-7

--More-- prompt

2-444

2-442

tunnel recirculation

booting automatically

2-1010

enabling

2-153

specifying
boot options

2-1010

2-1006

VPN to VLAN mapping table

2-153

2-1010

2-1010

shared code between LAN and WAN

2-603

2-603

shutdown NAM
shutdown SSL

2-151

2-152

powering down

1-7

2-444

2-442

tag-to-tag load balancing

disabling

filter

global parameters

2-444

configuring DSCP map for GB-TE flows

2-592

MMLS

search

2-73

configuring

class option description, table

filter

MPLS
software-installed entries

MLS QoS policy maps
configuring

2-647

1-7

clearing

VLAN switch port
disabling

search

2-465

1-7

2-599

2-599

setting
experimental value

2-657

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-26

OL-11437-01

Index

redundancy mode

default peer

2-542

trusted state on Layer 2 WAN interface

2-658

use optimized MPLS tagging
use standard MPLS tagging

peer information

2-568

2-838

displaying peer status

specify using optimized tagging
specify using standard tagging

2-836

states learned from MSDP peers

2-568

tagging
2-568

2-840

2-842

enabling
administrative shut down of peer

2-568

tag switching

2-265

limiting

disabling load balancing
enabling load balancing

multicast data packets

2-567

displaying table information

2-266

removing

2-1013

2-567

MPLS EXP
MPLS experimental field

incoming filter list

2-259

outgoing filter list

2-261

peers

See MPLS

2-255

removing peer from mesh group

mroute

2-253

MSFC

configuring

displaying

static route

standby MSFC2 DRAM

2-243

MSDP

2-668

programing new ROMMON into Flash

adding

setting execution preference

descriptive text to configuration
bringing up the peer

2-250

statistics counters

name

2-55

2-54

configuring

show

2-155

2-571

revision

2-56

TCP connection to the MSDP peer

2-637

2-659

configuring

entries advertised in SA messages
for PIM sparse mode region
incoming filter list
outgoing filter list

2-257

max-age
max-hops

2-254

2-1148
2-1149
2-1150

root as primary
root as secondary

2-253

router to send SA request messages
router to send SA requests
creating

2-1147

port to transmit prestandard BPDUs

2-261

2-255

peer to mesh group

forward delay
hello-time

2-245

2-259

originator identification

SA state

2-1252

MST
instance

SA-cache entries

2-1252

configuration submode command

2-265

clearing

defining

displaying
number of sources and groups

specifying

peers

2-248

2-251

2-263

2-1153
2-1153

displaying
current configuration

2-659

MST protocol information
2-247

2-1151

2-1070

MST region configuration information
pending configuration

2-1070

2-659

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-27

Index

entering configuration submode

2-1145

instance

statistical information

2-949

multicast static route

mapping VLANs

See mroute

2-155

Multilayer Switching

mapping
PVLANs to instance
VLANs

See MLS

2-614

multiple-character patterns

2-155

restarting protocol migration

1-9

multiple NetFlow export destinations, configuring

2-84

setting

2-207

multiple path unicast RPF check

configuration revision number
MST region name

2-637

modes

2-571

path cost for instances

port priority for instances

2-416

creating

2-1143

switching to PVST mode

configuring

interface group

2-1143

deleting

2-1142

interface group

MTU
default values

2-415

interface group

2-569

displaying global MTU settings

2-1078

creating

2-415

displaying system MTU setting

2-1078

defining

2-415

deleting

2-415

restoring default value

2-415

2-569

setting

RPF mode

maximum Layer 2 payload size

2-1221

interface-group

maximum Layer 3 payload size

2-1221

pass

2-416

punt

2-416

maximum packet size
maximum size

2-569

2-416

Multiple Spanning Tree

2-569

See MST

multicast distributed switching

multipoint generic routing encapsulation

See MDS

See mGRE

multicast distribution tree

Multiprotocol Label Switching

See MDT
multicast forwarding information base

See MPLS
mVPN

See MFIB

adding

multicast router
displaying routing table

2-829, 2-834

displaying snooping information

2-815

multicast SSO

allocating circular buffer storage
bringing up the MSDP peer

configuring
leak interval

descriptive text to MSDP configuration

2-250

2-269

2-265

clearing
SA-cache entries

2-432

leak percentage

statistics counters

2-432

configuring convergence timer
displaying

2-432

2-55
2-56

TCP connection to the MSDP peer

2-54

configuring

information

2-949

advertising to the BSR

2-291

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-28

OL-11437-01

Index

BSR candidacy
default group

MDS interface information

2-286

MDT advertisement sent

2-389

entries advertised in SA messages
incoming filter list
outgoing filter list

peer information

2-254

2-261

2-255

peer to mesh group

2-851

rendezvous points for a group

2-856
2-840

2-864

administrative shut down of peer

router to send SA requests

bidir-PIM

2-295

router to send SA request messages

2-265

2-284

IP multicast routing

2-263

2-277

load splitting across multiple paths

2-251

shortest path tree, delaying use

2-274

filtering

2-299

Auto-RP messages

2-293

creating

2-290

multicast router information request packets
filtering PIM register messages

2-247

defining
default peer

2-273

2-281

limiting
multicast data packets

2-248

SSM range of IP multicast addresses

2-266

limiting number of routes added to table

2-300

deleting

2-276

removing

Auto-RP cache entries

Auto-RP message filter

2-57

entries from IGMP-group cache

circular buffer

2-49

entries from IP multicast routing table

2-52

disabling
bidir-PIM

received MDT advertisements

enabling

2-245

2-289

rendezvous point mapping agent

SA state

2-836

2-838

triggered RPF check events

2-282

PIM sparse mode region for MSDP

using Auto-RP

2-842

states learned from MSDP peers

2-253

PIM message acceptance
register source

2-853

number of sources and groups

2-259

originator identification
peers

MSDP peer status

2-257

2-826

IP multicast routing

2-269

incoming filter list

2-259

outgoing filter list

2-261

peers

2-284

2-290

2-255

removing peer from mesh group

2-277

load splitting across multiple paths
SSM range of IP multicast addresses

2-253

setting

2-274

register message limit

2-300

2-288

displaying
BSR information

2-846

cached rendezvous points

N

2-858

contents of circular cache-header buffer
contents of IP fast-switching cache
data MDT reuse information

2-827

2-824

clearing

2-850

counters

designated forwarder interface information
detailed BGP advertisement information
discovered neighbors

2-854

NDE

2-848

2-849

2-72

disabling
population of additional fields

2-448

sampled NetFlow on an interface

2-453

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-29

Index

displaying

sampled NetFlow globally

aging information

displaying

2-957

hardware status

2-957

sampled NetFlow status

2-985

status and configuration information
status information

2-980

2-967

aging information

2-957

cache flow entries

2-785

detailed statistics summary
hardware status
IP flow mask

2-448

sampled NetFlow on an interface
filter options
specifying

2-957

microflow policing statistics
statistical information

2-446

table information

disabling on an interface

2-453

enabling on an interface

2-453

specifying sampling method

2-986

2-940

enabling
globally for bridged flows

2-216

inbound NDE for bridged flows

2-534

interface-based entry creation

2-531

NDE interface export

interface-based NDE

2-275

protocol-based entry creation
sampled NetFlow globally

2-574

NetFlow

switching

aggregation

2-206

2-451

2-534

2-304

hardware switching

configuring specific aggregation caches
displaying cache flow entries
clearing counters

2-451

NDE for hardware-switched flows

2-446

NET
configuring

2-215

2-210

multicast ingress accounting

2-446

specifying filter options

2-965

2-940

switched packet counts

2-531

sampled NetFlow

specifying address

2-960

software-installed non-static entry information

2-446

removing address

flow masks

2-960

2-957

IP information

2-453

2-789

2-957

IP flow information

2-450

population of additional fields

removing

2-789

fragment offset information

2-956

enabling
export feature

2-534

2-785

2-202

disabling interface-based entry creation

2-451

disabling protocol-based entry creation

2-451

displaying CEF table information

2-37

configuring
aggregation caches—specific
maximum flow allocation

2-202

2-452

multiple export destination

enabling interface-based entry creation

2-451

enabling protocol-based entry creation

2-451

incorporating bridged/IntraVLAN traffic

2-460

interface

2-207

specifying source interface

disabling
globally for bridged flows
interface-based NDE

2-215

2-210

multicast ingress accounting

2-211

interface-based NDE

2-216

inbound NDE for bridged flows

2-797

2-210

enabling

2-210

IPv6

2-275

NDE for hardware-switched flows

disabling

2-206

displaying hardware configuration information

2-967

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-30

OL-11437-01

Index

cancelling OSPF restart

monitoring
NetFlow table usage on switch processor

disabling

2-454

software switching

2-576

2-576

BGP routing process

displaying information

2-644

EIGRP routing process

2-807

specifying
export flow version on Supervisor Engine 720
hardware-switched flow NDE version

2-209

2-213

IS-IS routing process

2-644

OSPF routing process

2-644

enabling
BGP routing process

switching
clearing statistics

exporting cache entries
setting cache size

2-785

2-207

2-644

IS-IS routing process

2-644

OSPF routing process

2-644

specifying

2-204

specifying source interface

Cisco proprietary IS-IS method

2-211

table usage on switch processor
monitoring

2-644

EIGRP routing process

2-48

displaying cache flow entries

2-644

failover interval

2-576

IETF IS-IS method

2-454

NetFlow Data Export

2-576

2-576

IS-IS database synchronization wait time

See NDE

route processor stabilizer interval

2-576

2-576

net processor
displaying
counter information

O

2-1026

network entity title

OAL

See NET

clearing entries

next-hop

configuring

displaying CEF VLAN information
Next Hop Resolution Protocol

2-357
2-359

cache entries

displaying

2-882

configuration information

2-843
2-642

no form of a command, using
non-RPF multicast fastdrop
2-433

selecting ACL merge method
1-7

2-393

ondemand diagnostics
configuring

2-107

execution action for test failure

non-stop forwarding

2-107

online diagnostics

See NSF

bypassing boot-up diagnostic testing

non-XL mode

2-99

configuring

definition
support modules

2-882

ODM

nodal NSF, configuring

NSF

global
displaying

NHRP

enabling

2-798

interface

See NHRP

cache

2-62

execution action for test failure
2-401

health monitoring diagnostic tests
ondemand diagnostics

2-107
2-104

2-107

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-31

Index

disabling

specifying

publishing to CNS event bus

health monitoring diagnostic tests

2-101

subscription to CNS diagnostic events

starting testing

2-101

displaying

2-104

2-111, 2-113

optimized ACL logging

CNS subject

See OAL

2-688

configured boot-up coverage level
current scheduled tasks
event logs

See ODD

2-683

OSPF

2-683

sanity check results

specifying

2-689

supported test suites
test ID

order-dependent merge algorithm

2-683

minimum percentage of CPU process time

2-683

2-615

2-683

test results

2-683

test statistics

P

2-683

enabling

packet buffer errors

publishing to CNS event bus
scheduling

2-101

displaying status

2-108

enabling error detection

subscription to CNS diagnostic events
syslog messages

2-712, 2-713

2-101

packet count, displaying

2-104

see --More-- prompt
PAgP

2-99

clearing test-based testing schedule
setting boot-up diagnostic level

2-108

2-99

setting health monitoring diagnostic testing
2-108

setting up health monitoring diagnostic test
schedule 2-104
setting up schedule

2-986

paging prompt

clearing health monitoring diagnostic test
schedule 2-104

setting test-based testing

2-750

packet error information, displaying

global configuration mode

clearing schedule

2-132

clearing information

2-80

configuring interface

2-22

deselecting channeling protocol
2-104

displaying
protocol information

2-715

hot standby mode
returning to defaults

2-99

setting up test-based testing

2-108

2-25

selecting ports

2-580

2-580

input interface of incoming packets

removing
scheduling

learning

2-108

returning to default setting
scheduled switchover
disabling

2-108

enabling

2-108

2-99

2-579

returning to defaults
port channels
displaying information

testing level

2-99

test interval

2-108

2-1014

setting
channeling protocol

setting

2-579

2-25

passwords
establishing enhanced password security
setting username

2-1254

2-1254

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-32

OL-11437-01

Index

pathcost

BSR information

setting STP default pathcost calculation method

2-1155

PBR

2-846

cached rendezvous points

2-858

data MDT reuse information

2-850

disabling

2-437

designated forwarder interface information

enabling

2-437

detailed BGP advertisement information

hardware support for null0 route maps

discovered neighbors

per-prefix accounting

IP multicast routing table information

2-410

MDT advertisement sent

enabling

2-410

PIM group to active rendezvous point
mappings 2-948

A-7

per-VLAN spanning tree
See PVST+

global statistical information

2-58

statistical VLAN information

2-59

rendezvous points for a group

2-856

2-860
2-864

enabling
bidir-PIM

2-284

flooding of packets to designated router

configuring
advertising to the BSR
BSR candidacy

snooping globally

2-282
2-245

2-289

shortest path tree, delaying use

2-295

2-290

filtering register messages

2-299

2-297

filtering
Auto-RP messages

rendezvous point mapping agent
using Auto-RP

2-296

snooping on an interface

PIM sparse mode region for MSDP
register source

2-298

processing and forwarding of PIM dense mode state
refresh control messages 2-301

2-291

2-286

message acceptance

2-281

removing

2-293

Auto-RP message filter

defining

2-290

setting

SSM range of IP multicast addresses

2-300

deleting

back-off interval
check interval

Auto-RP cache entries

2-57

2-278

2-280

register message limit

disabling
bidir-PIM

2-851

triggered RPF check events

clearing

2-834

2-853

received MDT advertisements
snooping information

PIM

2-849

2-854

disabling

per VLAN learning

2-288

triggered check interval
2-284

2-278

snooping

flooding of packets to designated router

2-298

clearing global statistical information

2-58

processing and forwarding of PIM dense mode state
refresh control messages 2-301

clearing statistical VLAN information

2-59

snooping globally

disabling globally

2-296

snooping on an interface
triggered RPF check

2-278

2-296

disabling on an interface

2-297

SSM range of IP multicast addresses
displaying

2-848

2-300

enabling globally

2-297

2-296

enabling on an interface

2-297

pipe symbol

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-33

Index

specifying alternative patterns

policy maps

1-10

clearing marking configuration

PIR
setting peak rate

defining aggregate policer

PISA

displaying information

displaying

2-1036

displaying per-interface information

counter information

2-1040

marking matched traffic with DSCP value

2-1026

platform

2-653

marking matched traffic with IP precedence value

clearing

2-655

port access maps

interrupt throttling counters

2-81

displaying
CPU EEPROM information
fault data

creating

2-595

deleting

2-595

port channels

2-1016

accessing

2-1016

interrupt throttling information
MSFC information

creating

2-1016

2-80

2-160

displaying

2-1016

net interrupt information

2-160

clearing information

2-1016

IP multicast-related information

channel group information

2-1016

processor TLB register information

counter information

2-1016

platforms

2-1014

2-750

interface capabilities

displaying

2-747

load distribution method

buffer allocation information
hardware resources

resetting to default

2-1016

configuring

2-602

resetting to defaults for bundled ports

2-1020

point-to-point link type

setting for bundled ports

2-597

setting on a per-module basis

See aggregate policer

2-597

2-597

setting for specific modules

2-1140

policer

2-602

setting

policers

load distribution method for MPLS packets

defining

minimum links

flow mask type

active mode

2-587

microflow

enabling

2-587

removing

2-601

2-88

automatic mode

defining

2-599

port-clocking mode

2-587

microflow policers

2-88

2-88

passive mode

2-587

removing

2-88

portName MIB objects

microflow policers

configuring

2-587

removing aggregate policer from current class

2-587

2-1172

port permit list
displaying destination list

specifying
aggregate policer for current class
policy-based routing
See PBR

2-653

2-587

2-1001

port ranges
executing

2-162

port security
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-34

OL-11437-01

Index

configuring

system

2-134

aging time

2-1198

aging type

2-1198

Protocol Independent Multicast
See PIM

deleting secure or specific addresses
disabling

protocol tunneling

2-82

disabling interfaces

2-1197

displaying setting information
enabling

enabling interfaces

2-1197

2-875
2-333

setting

MAC address from list

CoS value

2-1200

setting

2-335

drop threshold globally

maximum number of secured addresses
violation action

2-1202

2-338

drop threshold on an interface

2-336

specifying maximum processed protocol packets

2-1204

violation actions

converting PVST+ and 802.1d BPDUs

configuring
default

disabling

2-1168

port-trust ignore
2-482

enabling

2-482

turned on by default

2-224, 2-314

psecure

power cycling modules

See port security

2-152

powering down empty slots

PVL

2-603

power redundancy mode
2-605

power status

disabling

2-366

enabling

2-366

PVLANs
2-1044

power supplies
displaying

2-1107

defining association

2-1206

deleting association

2-1206

disabling

product number
serial number

global sticky ARP

2-739

2-306

per-interface sticky ARP

2-739

2-308

displaying

2-739

setting power redundancy mode

configuration information

2-605

private VLANs

2-764, 2-766

currently configured information

See PVLANs

mapping information

privileged EXEC mode, summary
See PISA

2-759

global sticky ARP

2-306

per-interface sticky ARP

promiscuous ports
2-1195

2-1107, 2-1112

enabling

1-6

Programmable Intelligent Services Accelerator

prompts

2-224, 2-314

enabling

disabling

setting mode

2-18

proxy reporting

2-1168

displaying

2-339

protocol tunneling links

2-1204

port speeds

type

2-333

displaying protocols

2-1042

removing

setting

1-6

2-308

mapping
for promiscuous port

2-1207

primary and secondary VLAN

2-612

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-35

Index

to an instance

removing

2-614

link bundle (port-channel) virtual interface

setting
host ports

setting

2-1195

interface type

prioritization bits

2-1195

promiscuous mode

displaying switch processor information

2-1049

QoS

2-612

primary and secondary VLAN mapping
removing mappings

2-612

accessing
class map configuration mode

2-612

VLAN submode
adding VLANs

2-651

QM

2-1195

VLAN interface configuration mode
mapping

2-160

2-26

avoidance of routing protocol packet policing
class map

2-609

configuring association
designating VLANs
removing VLANs

2-486

displaying information

2-609

2-679

clearing FM NetFlow counters

2-609

2-37

clearing global interface counters

2-609

PVST

2-35

configuring

switching to MST mode

class maps

2-1142

PVST+ BPDU and 802.1d BPDU conversion over protocol
tunneling links 2-18
PVST and PVST+ interoperability
ignore-bpdu-pid keyword
L2PT topologies

2-26

queueing mode

2-489

time-based ACLs

2-1227

control of routing protocol packet policing

2-18

2-486

defining

2-19

marking

2-486

displaying
protocol

Q

2-979

enabling
QDM

time-based ACLs

disconnecting a session

2-114

manager

displaying
client ID

2-1227

displaying information
2-1048

2-1049

policy maps

information and status about currently active QDM
clients 2-1048
QinQ

clearing marking configuration
displaying information

2-653

2-1036

displaying per-interface information

creating
link bundle (port-channel) virtual interface
disabling
double-tagged VLAN translation
enabling

2-160

2-1040

marking matched traffic with DSCP value

2-653

marking matched traffic with IP precedence
value 2-655
queueing mode

2-489

rcv-queue ratio limit

double-tagged VLAN translation
IEEE 802.1Q in 802.1Q
See 802.1Q tunneling

setting

2-620

removing
ACL time-range limitation

2-1227

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-36

OL-11437-01

Index

transmit-queue size ratio
setting

PDU rate limiters

2-509

port-security rate limiters

2-1287

QoS Device Manager

2-509

disabling for ACL-bridged rate limiters

See QDM

2-516

disabling for unicast and multicast packets

QoS filtering

disabling for unicast packets

enabling

disabling for VACL-log cases

DSCP-based egress

2-524

Layer 2 port-security information

2-581

QoS statistics data export

2-982

enabling

See MLS QoS statistics data export
question command

2-520

displaying

2-581

IP precedence based

2-508

Layer 2 protocol-tunneling rate limiters

2-509

Layer 3 security rate limiters for unicast
packets 2-523

1-2

queueing
displaying information

PDU rate limiters

2-1051

2-509

port-security rate limiters

2-509

enabling for ACL-bridged rate limiters

R

2-516

enabling for unicast and multicast packets
enabling for unicast packets

rapid per-VLAN spanning tree

2-520

enabling for VACL-log cases

See rapid PVST

2-508

2-524

MLS

rapid PVST
disabling

2-1142

enabling

2-1142

displaying

Layer 2 port-security information

Rapid Spanning Tree Protocol

displaying information

See RSTP

2-982

multicast

Rapid Spanning Tree Protocol+

displaying information

See RSTP+

2-982

setting

rate limiters

Layer 3 security rate limiters for unicast
packets 2-523

configuring
IPv4 multicast rate limiters

2-511

setting for ACL-bridged rate limiters

IPv6 multicast rate limiters

2-513

setting for CEF rate limiters

Layer 2 protocol-tunneling rate limiters
PDU rate limiters

2-509

2-509

port-security rate limiters

setting for unicast packets

2-509

2-508, 2-520

2-511

IPv6 multicast rate limiters

2-513

2-524

rate limits

2-518

IPv4 multicast rate limiters

2-516

2-518

setting for VACL-log cases

disabling
CEF rate limiters

2-982

MLS unicast

disabling rate limiting

2-413

enabling rate limiting

2-413

setting

2-413

rcv-queues

Layer 2 protocol-tunneling rate limiters
Layer 3 security rate limiters for unicast
packets 2-523

2-509

mapping CoS values

2-618

returning to default values

2-621

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-37

Index

setting drop threshold
setting ratio limit

regular expression library

2-623

acknowledgments for open-source software

2-620

specifying maximum threshold

related documentation

2-621

real servers

B-1

xxvi

relationship between duplex and speed commands

changing active connections

reloading switch

2-383

limiting active connections

2-629

remote access

2-383

supervisor engines

new connections
defining defaults

2-8

remote command

2-625

defining number of SYNs

executing directly to module

2-625

reboots

2-631

executing directly to route processor

restoring bindings across

remote login

2-191

receive queues

configuring

remote SPAN
See RSPAN

2-1238

removing an interface from a channel group

2-1238

recovering a file
displaying
information
RF client list

2-431

enabling

2-431

See RPF

2-1053

RF operational counters

RFC 1340

2-1053

2-785

RFC 1757, RMON alarm group

2-1053

reloading entire switch

disabling

Reverse Path Forwarding

2-1053

fast software upgrade

2-22

replication mode

2-1248

redundancy

setting alarm

2-628

2-638

RFC 1757, RMON MIB

2-629

route processor

2-639

RMON event table

synchronizing BOOTVAR

adding event

2-10

synchronizing BOOTVAR and configuration register
default settings 2-10
synchronizing configuration register
synchronizing startup config
setting mode

2-632

See RPC

receiving back channel

RF states

2-631

remote procedure call

See rcv-queues

removing

2-1169

2-10

2-542

removing event

turning off auto synchronization

2-626
2-10

reflexive NDR

RGMP
disabling

2-302

enabling

2-302

configuring
purging time

2-364

configuring purging interval

disabling shortcuts in TCAM

2-438

enabling shortcuts in TCAM

2-438

disabling purging time

2-364

2-364

RMON
adding events

See regular expression library

2-640

RM

synchronizing supervisor engines

regex

2-10

2-640

2-640

alarms, disabling

2-638

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-38

OL-11437-01

Index

alarms, enabling
disabling

check interval

2-638

PIM back-off interval

2-640

disabling MIB object alarms
removing events

ROM, booting automatically

adding interfaces or VLANs

2-638

deleting session

2-555

2-555

displaying

2-1056

session information

2-1252

programing new ROMMON into Flash
setting execution preference

displaying list

2-1252

2-1002

2-1109

starting new session

2-1252

ROM monitor mode,

2-555

RSTP+
configuring link type

1-6

root guard
disabling

2-555

deleting interfaces or VLANs

2-15

ROMMON
field upgrading

2-278

RSPAN

2-640

displaying status

2-278

triggered check interval

2-638

setting alarms on MIB objects

summary

2-280

2-1140

running configuration
displaying current operating information

2-1139

2-1059

displaying
root inconsistency status
enabling

2-1139

routed MAC

A-8

2-1064

sampled NetFlow

Route Processor Redundancy

disabling

See RPR

globally

routing protocol packet
policing
controlling

2-486

RPC

on an interface

2-453

displaying status

2-985

2-486

globally

2-534

on an interface

displaying information

2-1057

RPF

2-453

specifying
sampling method

disabling

2-534

sanity check results, displaying

exists-only checks

2-325

on an interface

2-323

triggered check

2-278

hardware information
triggered check events

saving configuration changes

2-933
2-864

enabling

disabling

2-108, 2-109

enabling

2-108, 2-109

2-325

2-323

1-11

SCP
disabling
fast retry

exists-only checks

2-689

scheduled switchover

displaying

on an interface

2-534

enabling

routing protocol packet policing

setting

S

2-585

displaying information

2-1061

enabling
fast retry

2-585

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-39

Index

setting

ifIndex persistence

fast-retry interval

clearing previously interface configuration mode
SNMP ifIndex commands 2-1118

2-585

Secure Sockets Layer

disabling globally

See SSL

2-1125

See PVL

disabling on an interface

See RM

enabling globally

sending back channel

enabling on an interface

configuring
removing

2-1240

disabling

2-1122

enabling

2-1122
2-1127

specifying

service module
disabling session

2-555

enabling session

2-555

setting trusted port state

source interface

SNMP
specifying
inform

2-484, 2-503

shaped round robin

source
designation

See SRR

trap source designation

2-937

2-1127

2-1127

traps

show commands
1-7

search

2-1120

removing source designation

See SLB

filter

2-1125

informs

2-1240

server load balancing

show

2-1120

1-7

disabling

2-1122

enabling

2-1122

Softfloat

simulating a link-up condition

2-154

acknowledgments for open-source software

single-character patterns
special characters, table

B-1

softlink
1-8

SLB
displaying inband packet count

2-722

disabling

2-154

enabling

2-154

source-only timers

SNMP

returning to default settings

disabling

2-239

setting periodic flooding of multicast packets

authorization traps during unknown context
error 2-1129
linkdown during a switch failover
transceiver traps

2-1130

2-1124

source specific multicast
See SSM
SPAN
disabling

displaying

service module session

interface index identification numbers

2-1062

enabling

2-555

displaying
destination port permit list

authorization traps during unknown context
error 2-1129
linkdown during a switch failover
transceiver traps

2-1124

2-239

2-1130

session information

2-1001

2-1002

enabling
service module session

2-555

service module session
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-40

OL-11437-01

Index

disabling

2-555

PortFast BPDU guard

enabling

2-555

PortFast by default

SPAN destination port permit list
displaying

PortFast on an interface

spanning tree

root guard mode

active states

2-1161

2-1156

2-1139

EtherChannel
guard misconfiguration detection

2-1064

configuring link type
BackboneFast

2-1131

BPDU filtering
BPDU guard

extended system ID display
loop guard as a default

PortFast BPDU guard

setting

2-1158

2-1161

2-84
2-1155

specifying
2-1163

UplinkFast

displaying
2-1064

disabling

2-1164

enabling

2-1164

VLANs

2-1064

BackboneFast status

configuring

2-1064

bridge status and configuration
default path cost method

2-1064

2-1166

reverting to defaults

2-1166

SPAN session

2-1064

adding interfaces or VLANs

2-1064

deleting interfaces or VLANs

2-1064

summary of interface information

2-1064

deleting session

2-555
2-555

2-555

starting new session

2-1064

enabling
BackboneFast

2-1162

transmit hold count

2-1156

2-1139

UplinkFast status

2-1162

setting default pathcost calculation method

2-1161

PortFast on an interface

status per VLAN

2-1135

restarting protocol migration

2-1160

active interfaces only

2-1135

reverting to default

PortFast by default on all access ports

status information

2-1156

port priority

2-1141

PortFast BPDU filtering

active states

portfast mode, enabling

setting

2-1138

2-1139

root guard mode

2-1156

reverting to default

2-1134

PortFast by default

portfast mode, disabling
path cost

2-1132

loop guard mode

2-1136

interface

2-1140

disabling

2-555

special characters
anchoring, table

2-1131

BPDU filtering
BPDU guard

2-1161

PortFast by default on all access ports

2-553

2-1001

displaying

2-1160

SP QoS manager

2-1132

See QM-SP

2-1134

extended system ID display
loop guard as a default
loop guard mode

2-1138

2-1141

SRM with SSO
configuring
route converge delay time interval

2-1139

PortFast BPDU filtering

1-10

2-1158

setting redundancy mode

2-642

2-542

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-41

Index

mapping CoS values

SRR queues
configuring

2-606

stub

bandwidth

enabling non-RPF multicast fastdrop

2-1291

SSL

2-433

subinterface configuration mode, summary

shutting down
SSM mapping

sup-bootflash

2-153

displaying file system information

2-240

configuring

switch console, accessing

static mapping database

switching, NetFlow

2-240

2-240

clearing statistics

2-48

enabling

2-240

setting cache size

2-204

SSO

switching characteristics

configuring

disabling

route converge delay time interval
setting redundancy mode

2-542

Stateful Switch Over

2-1189

2-1186

modifying

statistics retrieval
setting interval

2-1189

2-1186

excluding from link-up calculation

2-63

See MLS QoS statistics data export

2-1184

2-1180, 2-1182, 2-1184

capture function

2-1191

optimizing port configuration for host
connection 2-1180

2-646

returning to interfaces

sticky ARP

capture function

disabling

2-1180, 2-1184

switching interface

2-306

per-interface

displaying administrative and operational status

2-308

displaying Flexlink pairs

enabling

2-764

2-766

Switch-Module Configuration Protocol

2-306

per-interface

See SCP

2-308

switch ports

sticky MACs

clearing

2-1200

removing

VLAN mapping per port

2-1200

2-1212

configuring

sticky port
deleting

Flexlink

Flexlink

statistics data export

enabling

capture mode

capture function

static MAC address entries

global

2-642

enabling

See SSO

global

2-1075

2-632

disabling

clearing

1-6

capture ports

2-82

2-1189

VLAN mapping per port

storm control
disabling suppression mode

2-1178

enabling suppression mode

2-1178

setting suppression level
strict-priority queue

2-1178

voice VLANs

2-1212

2-1217

defining
PVLAN association

2-1206

disabling

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-42

OL-11437-01

Index

VLAN mapping per port

2-1215

T

enabling
VLAN mapping per port

Tab key

2-1215

command completion

mapping
PVLANs for promiscuous port
modifying characteristics

1-1

table contention level

2-1207

See TCL

2-1180

tables

port security
configuring aging time

2-1198

characters with special meaning

configuring aging type

2-1198

class syntax description

disabling

CoS-to-DSCP mapping table

2-1042

default bandwidth values

2-1197

removing MAC address from list

default MTU values

2-1200

setting maximum number of secured addresses
setting violation action
violation actions

2-1204

2-1188

2-467

2-1281

2-569

DSCP-to-CoS default mapping table

2-470

DSCP-to-EXP default mapping table

2-472

ERSPAN source session configuration mode
syntaxes 2-562

removing
mapping PVLANs for promiscuous port
PVLAN mapping
voice VLAN

2-1207

2-1206

EXP-to-DSCP default mapping table
fsck utility checks and actions
group syntax description

2-1195
2-1209

VLAN in access mode

specifying destination VLANs

match syntax description
2-1191

MFIB platform flags

synchronizing supervisor engines

2-626

2-362

2-27, 2-28

2-872

show cable-diagnostics tdr command output
fields 2-672

2-15

1-6

show cdp neighbors detail field descriptions

systems
configuring FIFO overflow error count

2-1220

show cdp neighbors field descriptions

2-677

2-676

show environment status command output fields

system software

2-704

show environment temperature command output
fields 2-707

2-15

displaying names and sources of configuration
files 2-1091
displaying uptime since active
displaying version of

2-868

relationship between duplex and speed
commands 2-126, 2-1170

system images
default filename

2-478

MFIB forwarding entries and interface flags

2-629

system prompts

2-28

mac access-list extended subcommands

2-1182

2-476

2-144

IP-Precedence-to-DSCP default mapping

trunk characteristics

switch reload

2-475

EXP-to-EXP mutation default mapping table

2-1217

setting

booting

2-1202

2-94

ERSPAN destination session configuration mode
syntaxes 2-561

2-1204

preventing packet forwarding

mode

2-587, 2-593

common keyword aliases to URLs

2-1197

displaying setting information
enabling

1-8

2-1091

2-1091

show interfaces accounting command output
fields 2-746
show ip cache flow command output fields—current
flow 2-788

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-43

Index

show ip cache flow command output fields—flow
switching cache 2-787

show mpls l2transport vc command field
descriptions 2-1007

show ip cache flow command output fields—NetFlow
activity by protocol 2-787

show policy-map control-plane field
descriptions 2-1039

show ip cache flow command output fields—packet size
distribution 2-786

show port flowcontrol command output fields

show ip cache verbose flow field descriptions in activity
by protocol display 2-791
show ip cache verbose flow field descriptions in the
NetFlow cache display 2-790
show ip cef inconsistency field descriptions
show ip dhcp snooping command output

show ip mcache field descriptions

2-1080

2-1092

show vlan command output fields

multipliers, table

2-1096

2-1111
2-1115

1-10

speed command options

2-818, 2-831
2-837
2-839

2-1168

supported duplex command options

2-125

supported speed command options

2-1169

show ip msdp sa-cache field descriptions

2-841

time-based sampling intervals

show ip msdp summary field descriptions

2-842

URL prefix aliases for local writable storage file
systems 2-95

show ip pim bsr field descriptions

2-846

show ip pim mdt bgp field descriptions

show ip pim mdt history field descriptions

2-850

show ip pim mdt receive field descriptions

2-851

show ip pim mdt send field descriptions

2-853

show ip pim neighbor field descriptions

2-854

2-870

show ipv6 mfib count field descriptions

2-871

show ipv6 mfib field descriptions

show mls cef command output fields

2-1084

tag-to-tag load balancing
disabling

2-567

enabling

2-567

ACLs

2-872

clearing match counters

2-395

clearing
ACL match counters

2-894
2-901, 2-916

show mls cef summary command output fields

2-65

setting default action during update

2-880

show memory dead field descriptions

2-157

TCAM

show ip wccp web-cache detail command output
fields 2-866
show lacp command output fields

2-95

2-146

displaying information

2-869

show ipv6 mfib verbose field descriptions

valid cluster numbers

2-95

TAC

2-859

show ipv6 mfib active field descriptions

URL prefix aliases for special file systems
valid interface types

2-857

show ip pim rp mapping field descriptions

2-534

URL prefix aliases for network file systems

2-849

show ip pim rp-hash field descriptions

2-1108

1-9

used for anchoring

2-828

show ip msdp peer field descriptions

show version field descriptions

2-1068

special characters
2-826

show ip msdp count field descriptions

show tcam counts command output fields

show vtp command output fields

2-824

show ip mds interface field descriptions
show ip mroute field descriptions

show spanning-tree vlan command output fields

show vlans command output fields

2-810

2-822, 2-891

show ip mpacket field descriptions

2-1065

show vlan private-vlan command output fields

2-803

show ip igmp groups field descriptions
show ip interface field descriptions

2-796

show spanning-tree command output fields

2-757

2-935

2-65

disabling
optimization for IPv6 ACLs

2-583

sharing of global default ACLs

2-396

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-44

OL-11437-01

Index

shortcuts

sampling interval

2-438

displaying

sorting by statistic type

interface-based information

2-1081

protocol-based information

2-1081

statistical information

2-90

enabling
processes and reports

2-90

traceroute MAC

2-1079

displaying

enabling
optimization for IPv6 ACLs
shortcuts

by interface

2-583

sharing of global default ACLs

2-1229

source IP to destination IP

2-396

2-1229

source MAC to destination MAC

2-438

prioritizing interfaces

2-1229

tracking

2-1223

configuring

setting
default action during update

designated router

2-395

update

2-1175

configuring interface

setting default action

2-1233

entering tracking configuration mode

2-395

TCAM ACL match counters, clearing

2-65

TCL

removing tracking

2-1233

2-1233

transceiver

displaying MLS information

disabling

2-988

monitoring

TDR
clearing

2-1235

enabling

all interfaces

monitoring

2-33

specific interface

running cable diagnostics

2-1225

temperature readings
2-706

Ternary Content Addressable Memory
See TCAM

traps

2-1124

operational information
threshold violations
traps

configuring

2-768

2-768

2-1124

transmit hold count
2-1227

spanning tree
specifying

2-1227

removing

2-1163

transmit-queue

time limitation

2-1227

time domain reflectometry
See TDR

setting size ratio
traps, enabling

2-1287

2-1122

troubleshooting

time-range command

2-1227

TopN
configuring

disabling

enabling

time-based ACLs

clearing reports

2-671

displaying

displaying information

time ranges

2-1235

transceivers

2-33

displaying cable diagnostic test results

enabling

2-90

displaying information

2-1084

trunk characteristics
2-86

adding VLANs

2-1209

displaying information

2-771

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU
OL-11437-01

IN-45

Index

removing VLANs
resetting to defaults
setting

GRE tunnel sending back channel

2-1209

UDP

2-1209

changing port numbers

2-1209

two-way VLANs
displaying

2-1240

2-1247

configuring
CASA queue length

2-1107

2-183

UDP datagrams
disabling flooding

U

2-217

flooding using spanning-tree algorithm

2-217

UDP checksums on all outgoing packets

UDE

2-217

unicast entries

displaying
operational status

fast-aging time

2-774

configuring

software based
configuring

2-397

restoring to defaults

2-1250

removing configuration

2-397

long-aging time

2-1250

configuring

UDLD

2-398

restoring to defaults

aggressive mode
disabling globally on fiber interfaces only
disabling on an interface

2-1242

enabling globally on fiber interfaces only
enabling on an interface

normal-aging time
configuring

2-1244
2-1242

2-398

2-399

restoring to defaults

2-399

unicast RPF

2-1244

See uRPF

disabling
on interface

unidirectional Ethernet

2-1244

See UDE

global configuration mode
enabling on fiber interfaces only

unidirectional link

2-1242

See UDLR

interface configuration mode
enabling on interface

unidirectional link routing

2-1244

resetting all ports shut down by UDLD

2-1246

See UDLR
unidirectional transceiver

UDLR
changing UDP port numbers

displaying

2-1247

type

configuring

displaying operational state

GRE tunnel as a message-sending back
channel 2-1240
GRE tunnel as a receiving back channel

2-760
2-774

unknown unicast flood blocking
2-1238

displaying

See UUFB
unknown unicast traffic, preventing

information

2-819

2-1188

uRPF

enabling

disabling

forwarding of ARP and NHRP

2-1236

removing

exists-only checks

2-325

hardware when RPF ACL enabled

GRE tunnel receiving back channel

2-1238

2-414

enabling

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-46

OL-11437-01

Index

exists-only checks

dropping

2-325

hardware when RPF ACL enabled
user EXEC mode, summary

2-414

1-6

usernames

forwarding

2-2

redirecting

2-2

setting

configuring

2-2

specifying

2-1254

setting password

2-2

access-map sequence

2-1254

setting privilege level

match clause

2-1254

UUFB

2-380

2-380

value mask result

switch ports

See VMR

preventing packet forwarding

VFI

2-1188

creating

2-341

entering manual configuration mode

V

2-341

virtual forwarding instance
See VFI

VACL logging

Virtual Private LAN Service

configuring
logging parameters
logging threshold
log table size
parameters

See VPLS

2-1264

VLAN 1 minimalization

2-1264

command

2-1264

2-1209

usage guideline

2-1264

redirect packet rate

2-1210

VLAN access control lists

2-1264

See VACL

displaying
configuration information
flow table contents
log table size

VLAN access-map command mode

2-1097

entering

2-1097

logging property information
2-1264

returning to default logging values
returning to default values

2-1264

2-1264

2-1264

entering

2-1268

resetting

2-635

VLAN link-up calculation
excluding a switch port

2-1184

including a switch port

2-1184

VLAN mapping per port

VACLs
applying VLAN access maps

clearing

2-1272

2-1212

configuring

creating
VLAN access map

2-1266

VLAN database

2-1097

2-1264

redirect packet rate

threshold

A-10

disabling

2-1266

defining extended MAC access lists

2-361

2-1212
2-1215

displaying

disabling capture function

2-1189

802.1Q VLAN to ISL VLAN mapping

enabling capture function

2-1189

mapping status
enabling

entering
VLAN access-map mode
packet action

2-1266

2-1106

2-776

2-1215

VLANs
adding
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

OL-11437-01

IN-47

Index

global configuration mode
applying an ARP ACL

DAI status

2-1262

2-777

dot1q tagging information

2-167

clearing

filter information

counters

DAI statistics

2-1097

internal VLAN allocation information

2-42

hardware logic

internal VLAN status

2-39

configuring
backup CRF mode

2-1258

per port mapping

config-VLAN submode

2-1258

RSPAN VLANs

FDDI ring number

twoway

2-1258

MTU size

parent VLAN ID

dot1q tagging

2-1258

enabling DAI

translational ID
VLAN name

2-1270
2-176

2-1268

erasing the VLAN database configuration file

2-1258

implementing database

2-1258

2-4

incrementing configuration number

deleting

2-1258

mapping to ISL VLANs

entering

2-1258

mapping to MST instance

deleting

restarting local traffic

config-VLAN submode

global configuration mode

2-155

2-1260

shutting down local traffic

2-1262

disabling

2-1276

2-1117

shutting down internally

2-1258

2-4

2-1276

removing ISL VLAN mapping

2-1258

2-130

2-4

implementing new database

2-1258

specifying RSPAN

2-1262

entering configuration submode

2-1258

config-VLAN submode
configuring

2-1104

entering configuration mode

2-1258

Token Ring number

2-762

enabling

2-1258

2-1258

STP type

2-1100

2-1107

workaround VLANs

2-1258

SAID identifier

2-1109

total number of interface VLANs

2-1274

2-1112

2-1106

software-cached counter values

2-1258

internal allocation scheme

2-1097

number of logical virtual ports required

2-1258

bridging characteristics

media type

2-1093

logging property information

2-1258

2-1104

2-1093

Layer 2 VLAN information

ARE hops

state

2-1102

flow table contents

2-87

2-1101

2-1117

VLAN translation

dot1q tagging
disabling DAI

configuring

2-1270

mapping per port

2-176

displaying

2-1212

disabling

CEF information

VLAN mapping per port

2-798

CEF next-hop information
configuration information

enabling

2-798

Cisco IOS VLAN subinterface information
2-1097

current operating information

2-1059

2-1215

2-1110

VLAN mapping per port
supported modules

2-1215

2-1212

VMR

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-48

OL-11437-01

Index

acronym for value mask result

specifying

voice VLANs

password

configuring on switch ports

VTP domain

2-1217

linking

removing
from switch ports

2-1278

2-533

removing

2-1217

2-533

VPLS
configuring VPN ID

2-341

creating Layer 2 VFIs

W

2-341

entering L2 VFI configuration mode

2-341

VRF

disabling

configuring

802.1Q transparency

default group

2-389

2-586

enabling

group address ranges

2-388

802.1Q transparency

disabling

2-586

watch list

recording of data MDT reuse

2-390

adding IP address

displaying

clearing entries

non-default entries

2-937

configuring

enabling

disabling

recording of data MDT reuse

2-390

enabling

displaying

2-181
2-43

2-181
2-181

displaying

VTP

2-782
2-181

setting

domain information

2-1114

statistics information

maximum login attempts

2-1114

setting domain name
setting IFS file
setting mode

disabling

2-1278

IP multicast packet reception

2-1278

packet redirection

setting preferred updater ID source
pruning

2-1278

enabling

2-1278

2-329

2-865

inband packet count

2-722

enabling

setting

IP multicast packet reception

client mode

2-1278

domain name

server mode

2-1278

transparent mode
2-1278

packet redirection

2-1278

preferred updater ID source
2-1278

2-327

mask assignment hardware acceleration

2-1278

IFS file system

2-331

displaying
global statistics

2-1278

2-327

mask assignment hardware acceleration

2-1278

disabling

2-179

WCCP

global configuration mode

version

WAN

2-331

2-329

Web Cache Coprocessor Protocol
2-1278

See WCCP
weighted random early detection
See WRED
weighted round robin
Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

OL-11437-01

IN-49

Index

See WRR
Wireless LAN Services Module
See WLSM
wireless network
configuring mGRE tunnels
displaying information

2-540

2-996

WLSM
configuring
mobility

2-540

wireless mGRE tunnels
displaying information

2-540

2-996

specifying
convert NBMA to BMA
network ID

2-540

2-540

workaround VLANs

2-1104

WRED
specifying maximum threshold

2-1289

write erase command
See erase command

2-130

WRR
queue mapping
CoS to drop thresholds
DSCP to drop thresholds

2-1285
2-1286

returning to default queue values
setting transmit queue size ratio

2-1289
2-1287

WRR queues
configuring
bandwidth

2-1281

specifying maximum threshold

2-1289

X
XL mode
definition

2-401

support modules

2-401

Catalyst Supervisor Engine 32 PISA IOS Software Command Reference—Release 12.2ZU

IN-50

OL-11437-01



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : Yes
Page Count                      : 1396
Page Mode                       : UseOutlines
XMP Toolkit                     : XMP toolkit 2.9.1-13, framework 1.6
About                           : uuid:33ccd995-354f-4f35-8994-41ce1add256c
Producer                        : Acrobat Distiller 6.0 (Windows)
Create Date                     : 2007:04:30 16:14:59-07:00
Creator Tool                    : FrameMaker 5.5.6p145
Modify Date                     : 2007:04:30 16:14:59-07:00
Document ID                     : uuid:a2642fea-8991-49a6-b92f-5d98ce5c514f
Format                          : application/pdf
Title                           : untitled
Creator                         : FrameMaker 5.5.6p145
EXIF Metadata provided by EXIF.tools

Navigation menu