Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-13019-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way
We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA,
CCNP, CCSP, CCVP, Cisco, the Cisco
Cisco
Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, iQ Expertise, the iQ logo, iQ
Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The
Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx
States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0805R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
This guide is for the networking professional using the Cisco IOS command-line interface (CLI) to
manage the Cisco IE 3000 switch, hereafter referred to as the switch. Before using this guide, you should
have experience working with the Cisco IOS commands and the switch software features. Before using
this guide, you should have experience working with the concepts and terminology of Ethernet and local
area networking.
Purpose
This guide provides the information that you need about the Layer 2 commands that have been created
or changed for use with the IE 3000 switches. For information about the standard Cisco IOS Release 12.2
commands, see the Cisco IOS documentation set available from the Cisco.com home page by selecting
Technical Support & Documentation > Cisco IOS Software.
This guide does not provide procedures for configuring your switch. For detailed configuration
procedures, see the software configuration guide for this release.
This guide does not describe system messages you might encounter. For more information, see the
system message guide for this release.
For documentation updates, see the release notes for this release.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
•Commands and keywords are in boldface text.
•Arguments for which you supply values are in italic.
•Square brackets ([ ]) means optional elements.
•Braces ({}) group required choices, and vertical bars ( | ) separate the alternative elements.
•Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
OL-13019-01
Cisco IE 3000 Switch Command Reference
xvii
Page 18
Interactive examples use these conventions:
•Terminal sessions and system displays are in screen font.
•Information you enter is in boldface screen font.
•Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
Notes, cautions, and warnings use these conventions and symbols:
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Publications
Preface
These documents provide complete information about the switch and are available from this Cisco.com
site:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
New in Cisco Product Documentation, which also lists all new and
OL-13019-01
Cisco IE 3000 Switch Command Reference
xix
Page 20
Preface
Cisco IE 3000 Switch Command Reference
xx
OL-13019-01
Page 21
CHAPTER
1
Using the Command-Line Interface
The IE 3000 switch is supported by Cisco IOS software. This chapter describes how to use the switch
command-line interface (CLI) to configure software features.
•For a complete description of the commands that support these features, see Chapter 2, “IE 3000
Switch Cisco IOS Commands.”
•For information on the bootloader commands, see Appendix A, “IE 3000 Switch Bootloader
Commands.”
•For information on the debug commands, see Appendix B, “IE 3000 Switch Debug Commands.”
•For information on the show platform commands, see Appendix C, “IE 3000 Switch Show Platform
Commands.”
•For more information on Cisco IOS Release 12.2, see the Cisco IOS Release 12.2 Command
Summary.
•For task-oriented configuration steps, see the software configuration guide for this release.
In this document, IP refers to IP version 4 (IPv4).
CLI Command Modes
This section describes the CLI command mode structure. Command modes support specific Cisco IOS
commands. For example, the interface interface-id command only works when entered in global
configuration mode.
These are the main command modes for the switch:
•User EXEC
•Privileged EXEC
•Global configuration
•Interface configuration
•Config-vlan
•VLAN configuration
•Line configuration
OL-13019-01
Cisco IE 3000 Switch Command Reference
1-1
Page 22
Chapter 1 Using the Command-Line Interface
CLI Command Modes
Table 1-1 lists the main command modes, how to access each mode, the prompt you see in that mode,
and how to exit that mode. The prompts listed use the default name Switch.
Ta b l e 1-1Command Modes Summary
Command ModeAccess MethodPrompt Exit or Access Next Mode
User EXECThis is the first level of access.
Switch>
Enter the logout command.
(For the switch) Change terminal
settings, perform basic tasks, and
list system information.
Privileged EXECFrom user EXEC mode, enter the
enable command.
Global
configuration
Interface
configuration
From privileged EXEC mode,
enter the configure command.
From global configuration mode,
specify an interface by entering
the interface command followed
by an interface identification.
Config-vlanIn global configuration mode,
enter the vlan vlan-id command.
VLAN
configuration
From privileged EXEC mode,
enter the vlan database
command.
Line configurationFrom global configuration mode,
specify a line by entering the line
command.
Switch#
Switch(config)#
Switch(config-if)#
Switch(config-vlan)#
Switch(vlan)#
Switch(config-line)#
To enter privileged EXEC mode, enter
the enable command.
To exit to user EXEC mode, enter the
disable command.
To enter global configuration mode,
enter the configure command.
To exit to privileged EXEC mode,
enter the exit or end command, or
press Ctrl-Z.
To enter interface configuration mode,
enter the interface configuration
command.
To exit to privileged EXEC mode,
enter the end command, or press
Ctrl-Z.
To exit to global configuration mode,
enter the exit command.
To exit to global configuration mode,
enter the exit command.
To return to privileged EXEC mode,
enter the end command, or press
Ctrl-Z.
To exit to privileged EXEC mode,
enter the exit command.
To exit to global configuration mode,
enter the exit command.
To return to privileged EXEC mode,
enter the end command, or press
Ctrl-Z.
Cisco IE 3000 Switch Command Reference
1-2
OL-13019-01
Page 23
Chapter 1 Using the Command-Line Interface
User EXEC Mode
After you access the device, you are automatically in user EXEC command mode. The EXEC commands
available at the user level are a subset of those available at the privileged level. In general, use the user
EXEC commands to temporarily change terminal settings, perform basic tests, and list system
information.
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch> ?
Privileged EXEC Mode
Because many of the privileged commands configure operating parameters, privileged access should be
password-protected to prevent unauthorized use. The privileged command set includes those commands
contained in user EXEC mode, as well as the configure privileged EXEC command through which you
access the remaining command modes.
If your system administrator has set a password, you are prompted to enter it before being granted access
to privileged EXEC mode. The password does not appear on the screen and is case sensitive.
The privileged EXEC mode prompt is the device name followed by the pound sign (#).
Switch#
CLI Command Modes
Enter the enable command to access privileged EXEC mode:
Switch> enable
Switch#
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch# ?
To return to user EXEC mode, enter the disable privileged EXEC command.
Global Configuration Mode
Global configuration commands apply to features that affect the device as a whole. Use the configure
privileged EXEC command to enter global configuration mode. The default is to enter commands from
the management console.
When you enter the configure command, a message prompts you for the source of the configuration
commands:
Switch# configure
Configuring from terminal, memory, or network [terminal]?
You can specify either the terminal or NVRAM as the source of configuration commands.
This example shows you how to access global configuration mode:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
OL-13019-01
Cisco IE 3000 Switch Command Reference
1-3
Page 24
CLI Command Modes
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config)# ?
To exit global configuration command mode and to return to privileged EXEC mode, enter the end or
exit command, or press Ctrl-Z.
Interface Configuration Mode
Interface configuration commands modify the operation of the interface. Interface configuration
commands always follow a global configuration command, which defines the interface type.
Use the interface interface-id command to access interface configuration mode. The new prompt means
interface configuration mode.
Switch(config-if)#
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-if)# ?
Chapter 1 Using the Command-Line Interface
To exit interface configuration mode and to return to global configuration mode, enter the exit command.
To exit interface configuration mode and to return to privileged EXEC mode, enter the end command,
or press Ctrl-Z.
config-vlan Mode
Use this mode to configure normal-range VLANs (VLAN IDs 1 to 1005) or, when VTP mode is
transparent, to configure extended-range VLANs (VLAN IDs 1006 to 4094). When VTP mode is
transparent, the VLAN and VTP configuration is saved in the running configuration file, and you can
save it to the switch startup configuration file by using the copy running-config startup-config
privileged EXEC command. The configurations of VLAN IDs 1 to 1005 are saved in the VLAN database
if VTP is in transparent or server mode. The extended-range VLAN configurations are not saved in the
VLAN database.
Enter the vlan vlan-id global configuration command to access config-vlan mode:
Switch(config)# vlan 2000
Switch(config-vlan)#
The supported keywords can vary but are similar to the commands available in VLAN configuration
mode. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-vlan)# ?
For extended-range VLANs, all characteristics except the MTU size must remain at the default setting.
To return to global configuration mode, enter exit; to return to privileged EXEC mode, enter end. All
the commands except shutdown take effect when you exit config-vlan mode.
Cisco IE 3000 Switch Command Reference
1-4
OL-13019-01
Page 25
Chapter 1 Using the Command-Line Interface
VLAN Configuration Mode
You can use the VLAN configuration commands to create or modify VLAN parameters for VLAN IDs
1 to 1005.
Enter the vlan database privileged EXEC command to access VLAN configuration mode:
Switch# vlan database
Switch(vlan)#
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(vlan)# ?
To return to privileged EXEC mode, enter the abort VLAN configuration command to abandon the
proposed database. Otherwise, enter exit to implement the proposed new VLAN database and to return
to privileged EXEC mode. When you enter exit or apply, the configuration is saved in the VLAN
database; configuration from VLAN configuration mode cannot be saved in the switch configuration file.
Line Configuration Mode
CLI Command Modes
Line configuration commands modify the operation of a terminal line. Line configuration commands
always follow a line command, which defines a line number. Use these commands to change terminal
parameter settings line-by-line or for a range of lines.
Use the line vty line_number [ending_line_number] command to enter line configuration mode. The
new prompt means line configuration mode. The following example shows how to enter line
configuration mode for virtual terminal line
Switch(config)# line vty 0 7
7:
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-line)# ?
To exit line configuration mode and to return to global configuration mode, use the exit command. To
exit line configuration mode and to return to privileged EXEC mode, enter the end command, or press
Ctrl-Z.
OL-13019-01
Cisco IE 3000 Switch Command Reference
1-5
Page 26
CLI Command Modes
Chapter 1 Using the Command-Line Interface
Cisco IE 3000 Switch Command Reference
1-6
OL-13019-01
Page 27
CHAPTER
2
IE 3000 Switch Cisco IOS Commands
aaa accounting dot1x
Use the aaa accounting dot1x global configuration command to enable authentication, authorization,
and accounting (AAA) accounting and to create method lists defining specific accounting methods on a
per-line or per-interface basis for IEEE 802.1x sessions. Use the no form of this command to disable
IEEE
Syntax DescriptionnameName of a server group. This is optional when you enter it after the
broadcast group and group keywords.
defaultUse the accounting methods that follow as the default list for accounting
services.
start-stopSend a start accounting notice at the beginning of a process and a stop
accounting notice at the end of a process. The start accounting record is sent
in the background. The requested-user process begins regardless of whether
or not the start accounting notice was received by the accounting server.
broadcastEnable accounting records to be sent to multiple AAA servers and send
accounting records to the first server in each group. If the first server is
unavailable, the switch uses the list of backup servers to identify the first
server.
groupSpecify the server group to be used for accounting services. These are valid
server group names:
radius(Optional) Enable RADIUS authorization.
tacacs+(Optional) Enable TACACS+ accounting.
OL-13019-01
•name—Name of a server group.
•radius—List of all RADIUS hosts.
•tacacs+—List of all TACACS+ hosts.
The group keyword is optional when you enter it after the broadcast group
and group keywords. You can enter more than optional group keyword.
Cisco IE 3000 Switch Command Reference
2-1
Page 28
aaa accounting dot1x
DefaultsAAA accounting is disabled.
Command ModesGlobal configuration
Chapter 2 IE 3000 Switch Cisco IOS Commands
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesThis command requires access to a RADIUS server.
We recommend that you enter the dot1x reauthentication interface configuration command before
configuring IEEE 802.1x RADIUS accounting on an interface.
ExamplesThis example shows how to configure IEEE 802.1x accounting:
dot1x reauthenticationEnables or disables periodic reauthentication.
dot1x timeout
Sets the number of seconds between re-authentication attempts.
reauth-period
Cisco IE 3000 Switch Command Reference
2-2
OL-13019-01
Page 29
Chapter 2 IE 3000 Switch Cisco IOS Commands
aaa authentication dot1x
Use the aaa authentication dot1x global configuration command to specify the authentication,
authorization, and accounting (AAA) method to use on ports complying with the IEEE 802.1x
authentication. Use the no form of this command to disable authentication.
aaa authentication dot1x {default} method1
no aaa authentication dot1x {default}
aaa authentication dot1x
Syntax Description
defaultUse the listed authentication method that follows this argument as the default
method when a user logs in.
method1Enter the group radius keywords to use the list of all RADIUS servers for
authentication.
NoteThough other keywords are visible in the command-line help strings, only the default and group radius
keywords are supported.
DefaultsNo authentication is performed.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesThe method argument identifies the method that the authentication algorithm tries in the given sequence
to validate the password provided by the client. The only method that is truly IEEE 802.1x-compliant is
the group radius method, in which the client data is validated against a RADIUS authentication server.
If you specify group radius, you must configure the RADIUS server by entering the radius-server host
global configuration command.
Use the show running-config privileged EXEC command to display the configured lists of
authentication methods.
ExamplesThis example shows how to enable AAA and how to create an IEEE 802.1x-compliant authentication
list. This authentication first tries to contact a RADIUS server. If this action returns an error, the user is
not allowed access to the network.
Switch(config)# aaa new-model
Switch(config)# aaa authentication dot1x default group radius
You can verify your settings by entering the show running-config privileged EXEC command.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-3
Page 30
aaa authentication dot1x
Related CommandsCommandDescription
aaa new-modelEnables the AAA access control model. For syntax information, see the
Use the aaa authorization network global configuration command to the configure the switch to use
user-RADIUS authorization for all network-related service requests, such as IEEE 802.1x VLAN
assignment. Use the no form of this command to disable RADIUS user authorization.
aaa authorization network default group radius
no aaa authorization network default
aaa authorization network
Syntax Description
DefaultsAuthorization is disabled.
Command ModesGlobal configuration
Command History
Usage GuidelinesUse the aaa authorization network default group radius global configuration command to allow the
default group
radius
ReleaseModification
12.2(44)EXThis command was introduced.
switch to download IEEE 802.1x authorization parameters from the RADIUS servers in the default
authorization list. The authorization parameters are used by features such as VLAN assignment to get
parameters from the RADIUS servers.
Use the show running-config privileged EXEC command to display the configured lists of authorization
methods.
Use the list of all RADIUS hosts in the server group as the default authorization
list.
ExamplesThis example shows how to configure the switch for user RADIUS authorization for all network-related
service requests:
Switch(config)# aaa authorization network default group radius
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands
OL-13019-01
CommandDescription
show running-configDisplays the current operating configuration. For syntax information, select
Use the alarm facility fcs-hysteresis global configuration command to set the frame check sequence
(FCS) error hysteresis threshold as a percentage of fluctuation from the FCS bit-error rate. Use the no
form of this command to set the FCS error hysteresis threshold to its default value.
alarm facility fcs-hysteresis percentage
no alarm facility fcs-hysteresis percentage
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
DefaultsThe default threshold-value is 10 percent.
Command ModesGlobal configuration
Command History
Usage GuidelinesSet a hysteresis threshold to cause an alarm to trigger when the FCS bit-error rate fluctuates near the
percentageHysteresis threshold fluctuation. The range is 1 to 10 percent.
ReleaseModification
12.2(44)EXThis command was introduced.
configured rate.
You set the FCS hysteresis threshold for all ports on the switch. You set the FCS error rate on a per-port
basis by using the fcs-threshold interface configuration command.
If the threshold is not the default, it appears in the output of the show running-config privileged EXEC
command.
ExamplesThis example shows how to set the FCS error hysteresis to 5 percent. The alarm is not triggered unless
the bit error rate is more than 5 percent from the configured FCS bit-error rate.
Switch(config)# alarm facility fcs-hysteresis 5
Related Commands
Cisco IE 3000 Switch Command Reference
2-6
CommandDescription
fcs-thresholdSets an FCS error rate for an interface.
show running-configDisplays the running configuration on the switch, including FCS hysteresis
threshold if it is not set at the default.
OL-13019-01
Page 33
Chapter 2 IE 3000 Switch Cisco IOS Commands
alarm facility power-supply
Use the alarm facility power-supply global configuration command to set the alarm options for a
missing or failing power supply when the system is operating in dual power-supply mode. Use the no
form of the command to disable the specified setting.
DefaultsA power supply alarm message is stored but not sent to an SNMP server, to a relay, or to a syslog server.
Command ModesGlobal configuration
Command History
Usage GuidelinesPower supply alarms are generated only when the system is in dual power-supply mode. When a second
disable Disable the power supply alarm.
notifiesSend power supply alarm traps to an SNMP server.
relay majorSend the alarm to the major relay circuitry.
relay minorSend the alarm to the minor relay circuitry.
syslogSend power supply alarm traps to a syslog server.
ReleaseModification
12.2(44)EXThis command was introduced.
power supply is connected, you must use the power-supply dual global configuration command to set
dual power-mode operation.
Before you use the notifies keyword to send alarm traps to an SNMP host, you need to set up an SNMP
server by using the snmp-server enable traps global configuration command.
ExamplesThis example shows how to set the power-supply monitoring alarm to go to the minor relay circuitry:
Switch(config)# alarm facility power-supply relay minor
Related Commands
OL-13019-01
CommandDescription
power-supply dualSets the switch to operate in dual power-supply mode.
show alarm settingsDisplays environmental alarm settings and options.
snmp-server enable trapsEnables the switch to send SNMP notification for various trap types to
the network management system (NMS).
Cisco IE 3000 Switch Command Reference
2-7
Page 34
alarm facility temperature
alarm facility temperature
Use the alarm facility temperature global configuration command to configure a primary temperature
monitoring alarm or to configure a secondary temperature alarm threshold with a lower maximum
temperature threshold. Use the no form of this command to delete the temperature monitoring alarm
configuration or to disable the secondary temperature alarm.
DefaultsThe primary temperature alarm is enabled for a –4 to 203ºF (–20 to 95oC) range and cannot be disabled.
Command ModesGlobal configuration
Command History
highSet the high temperature threshold for the primary or secondary temperature
alarm. The range is –238 to 572ºF (–150 to 300ºC).
lowSet the low temperature threshold for the primary or secondary temperature
alarm. The range is –328 to 482ºF (–200 to 250ºC).
notifiesSend primary or secondary temperature alarm traps to an SNMP server.
relay majorSend the primary or secondary temperature alarm to the major relay circuitry.
relay minorSend the primary or secondary temperature alarm to the minor relay circuitry.
syslogSend primary or secondary temperature alarm traps to a syslog server.
It is associated with a major relay. The secondary temperature alarm is disabled by default.
ReleaseModification
12.2(44)EX1This command was introduced.
Usage GuidelinesThe primary temperature alarm is automatically enabled. It cannot be disabled, but you can configure
alarm options.
You can modify the primary temperature alarm range by using the high and low keywords.
You can use the secondary temperature alarm to trigger a high temperature alarm that is lower than the
maximum primary temperature threshold, which is 203
threshold and alarm options.
Before you use the notifies keyword to send alarm traps to an SNMP host, you need to set up an SNMP
server by using the snmp-server enable traps global configuration command.
Cisco IE 3000 Switch Command Reference
2-8
oF
(95oC). You can configure the temperature
OL-13019-01
Page 35
Chapter 2 IE 3000 Switch Cisco IOS Commands
alarm facility temperature
ExamplesThis example shows how to set the secondary temperature with a high threshold value of 113oF (45oC)
with alarms and how to send traps to the minor relay circuitry, to the syslog, and to an SNMP server:
Switch(config)# alarm facility temperature secondary high 45
Switch(config)# alarm facility temperature secondary relay minor
Switch(config)# alarm facility temperature secondary syslog
Switch(config)# alarm facility temperature secondary notifies
This example shows how to disable the secondary temperature alarm:
Switch(config)# no alarm facility temperature secondary 45
This example shows how to set the primary temperature alarm with alarms and traps to go to the syslog
and to the major relay circuitry:
Switch(config)# alarm facility temperature primary syslog
Switch(config)# alarm facility temperature primary relay major
Related CommandsCommandDescription
show alarm settingsDisplays environmental alarm settings and options.
snmp-server enable trapsEnables the switch to send SNMP notification for various trap types to
the network management system (NMS).
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-9
Page 36
alarm profile (global configuration)
alarm profile (global configuration)
Use the alarm profile global configuration command to create an alarm profile and to enter alarm profile
configuration mode. Use the no form of this command to delete an alarm profile.
alarm profile name
no alarm profile name
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
nameAlarm profile name
DefaultsNo alarm profiles are created. However, there is a default profile for all interfaces called defaultPort.
When a profile is created, none of the alarms are enabled.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesIn alarm-profile configuration mode, these commands are available:
•alarm alarm-id: enables the specified alarm.
•exit: exits from alarm-profile configuration mode.
•help: displays a description of the interactive help system.
•no: negates or sets the default values of a command.
•notifies alarm-id: enables notification for the alarm, which means sending a Simple Network
Management Protocol (SNMP) trap to an SNMP server.
•relay-major alarm-id: enables sending the alarm to the major relay circuitry.
•relay-minor alarm-id: enables sending the alarm to the minor relay circuitry.
•syslog alarm-id: enables sending the alarm to a syslog file.
For alarm-id, you can enter one or more alarm IDs separated by a space.
Before you use the notifies keyword to send alarm traps to a SNMP host, you need to set up an SNMP
server by using the snmp-server enable traps global configuration command.
There is a default profile for all interfaces. Enter the show alarm profile user EXEC command and see
the output for defaultPort.
Table 2-1 lists the alarm IDs and the corresponding alarm descriptions.
Cisco IE 3000 Switch Command Reference
2-10
OL-13019-01
Page 37
Chapter 2 IE 3000 Switch Cisco IOS Commands
alarm profile (global configuration)
Ta b l e 2-1AlarmList ID Numbers and Alarm Descriptions
AlarmList ID Alarm Description
1Link Fault.
2Port not Forwarding.
3Port not Operating.
4FCS Error Rate exceeds threshold.
After you have created an alarm profile, you can attach the profile to an interface by using the
alarm-profile interface configuration command.
By default, the defaultPort profile is applied to all interfaces. This profile enables only the Port Not
Operating (3) alarm. You can modify this profile by using the alarm profile defaultPort global
configuration command to enter alarm profile configuration mode for this profile.
ExamplesThis example shows how to create the alarm profile fastE for a port with the link-down (alarm 1) and
port not forwarding (alarm 2) alarms enabled. The link-down alarm is connected to the minor relay
circuitry, and the port not forwarding alarm is connected to the major relay circuitry. These alarms are
sent to an SNMP server and written to the system log file (syslog).
This example shows how to delete the alarm relay profile named my-profile:
Switch(config)# no alarm profile my-profile
Command Description
alarm profile (interface
Attaches an alarm profile to an interface.
configuration)
show alarm profileDisplays all alarm profiles or a specified alarm profile and lists the
interfaces to which each profile is attached.
snmp-server enable trapsEnables the switch to send SNMP notification for various trap types
to the network management system (NMS).
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-11
Page 38
alarm profile (interface configuration)
alarm profile (interface configuration)
Use the alarm profile interface configuration command to attach an alarm profile to a port. Use the no
form of this command to detach the profile from the port.
alarm profile name
no alarm profile
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
nameAlarm profile name
DefaultsThe alarm profile defaultPort is applied to all interfaces. In this profile, only the Port Not Operating
alarm is enabled.
Command ModesInterface configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesUse the alarm profile global configuration command to create the alarm profile, enabling one or more
alarms and specifying the alarm options.
You can attach only one alarm profile to an interface.
When you attach an alarm profile to an interface, it overwrites any previous alarm profile that was
attached to the interface (including the defaultPort profile).
ExamplesThis example shows how to attach an alarm profile named fastE to a port:
This example shows how to detach the alarm profile from a port and return it to the defaultPort profile:
Switch(config)# interface fastethernet1/2
Switch(config-if)# no alarm profile
Related Commands
CommandDescription
alarm profile (global
configuration)
show alarm profileDisplays all alarm profiles or a specified alarm profile and lists the interfaces
Cisco IE 3000 Switch Command Reference
2-12
Creates or identifies an alarm profile and enters alarm-profile configuration
mode.
to which each profile is attached.
OL-13019-01
Page 39
Chapter 2 IE 3000 Switch Cisco IOS Commands
alarm relay-mode
Use the alarm relay-mode global configuration command to set the alarm relay mode for the switch to
positive or negative. Use the no form of the command to set the alarm relay mode to the default mode.
alarm relay-mode {negative}
no alarm relay-mode {negative}
alarm relay-mode
Syntax Description
DefaultsBy default, the alarm relays are in positive mode when they are open. When there is no power to the
Command ModesGlobal configuration
Command History
Usage GuidelinesUse this command to invert the behavior of the alarm relays. When the alarm relay mode is set to
ExamplesThis example shows how to set the alarm relays to negative mode:
negativeSet the alarm relay mode to negative.
switch, all alarm relays are open. The alarm relays close when one or more alarm events are detected.
ReleaseModification
12.2(44)EXThis command was introduced.
negative, alarm relays are normally closed. When one or more alarm events are detected, the appropriate
alarm relay opens.
Switch(config)# alarm relay-mode negative
Related Commands
OL-13019-01
CommandDescription
alarm profile (global
configuration)
show alarm profileDisplays all alarm profiles or a specified alarm profile and lists the interfaces
show alarm settingsDisplays environmental alarm settings and options.
Creates or identifies an alarm profile and enters alarm-profile configuration
mode.
to which each profile is attached.
Cisco IE 3000 Switch Command Reference
2-13
Page 40
archive download-sw
archive download-sw
Use the archive download-sw privileged EXEC command to download a new image from a TFTP server
to the switch and to overwrite or keep the existing image.
The image-name.tar is the software image to download and install on the
switch.
DefaultsThe current software image is not overwritten with the downloaded image.
Both the software image and HTML files are downloaded.
The new image is downloaded to the flash: file system.
The BOOT environment variable is changed to point to the new software image on the flash: file system.
Image names are case sensitive; the image file is provided in tar format.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesThe /imageonly option removes the HTML files for the existing image if the existing image is being
removed or replaced. Only the Cisco IOS image (without the HTML files) is downloaded.
Using the /safe or /leave-old-sw option can cause the new image download to fail if there is insufficient
flash memory. If leaving the software in place prevents the new image from fitting in flash memory due
to space constraints, an error results.
If you used the /leave-old-sw option and did not overwrite the old image when you downloaded the new
one, you can remove the old image by using the delete privileged EXEC command. For more
information, see the
OL-13019-01
“delete” section on page 2-72.
Cisco IE 3000 Switch Command Reference
2-15
Page 42
Chapter 2 IE 3000 Switch Cisco IOS Commands
archive download-sw
Use the /overwrite option to overwrite the image on the flash device with the downloaded one.
If you specify the command without the /overwrite option, the download algorithm verifies that the new
image is not the same as the one on the switch flash device. If the images are the same, the download
does not occur. If the images are different, the old image is deleted, and the new one is downloaded.
After downloading a new image, enter the reload privileged EXEC command to begin using the new
image, or specify the /reload or /force-reload option in the archive download-sw command.
ExamplesThis example shows how to download a new image from a TFTP server at 172.20.129.10 and to
Create a new tar file on the local or network file system.
For destination-url, specify the destination URL alias for the local or
network file system and the name of the tar file to create. These options
are supported:
The tar-filename.tar is the tar file to be created.
For flash:/file-url, specify the location on the local flash file system from
which the new tar file is created.
OL-13019-01
An optional list of files or directories within the source directory can be
specified to write to the new tar file. If none are specified, all files and
directories at this level are written to the newly created tar file.
Cisco IE 3000 Switch Command Reference
2-17
Page 44
archive tar
Chapter 2 IE 3000 Switch Cisco IOS Commands
/tablesource-urlDisplay the contents of an existing tar file to the screen.
For source-url, specify the source URL alias for the local or network file
system. These options are supported:
The tar-filename.tar is the tar file from which to extract.
For flash:/file-url [dir/file...], specify the location on the local flash file
system into which the tar file is extracted. Use the dir/file... option to
specify an optional list of files or directories within the tar file to be
extracted. If none are specified, all files and directories are extracted.
DefaultsThere is no default setting.
Cisco IE 3000 Switch Command Reference
2-18
OL-13019-01
Page 45
Chapter 2 IE 3000 Switch Cisco IOS Commands
Command ModesPrivileged EXEC
archive tar
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesFilenames and directory names are case sensitive.
Image names are case sensitive.
ExamplesThis example shows how to create a tar file. The command writes the contents of the new-configs
directory on the local flash device to a file named saved.tar on the TFTP server at 172.20.10.30:
Switch# archive tar /create tftp:172.20.10.30/saved.tar flash:/new_configs
This example shows how to display the contents of the ies-lanbase-tar.12-44.EX file that is in flash
memory. The contents of the tar file appear on the screen:
Switch# archive tar /table flash:ies-lanbase-tar.12-44.EX.tar
info (219 bytes)
This example shows how to extract the contents of a tar file on the TFTP server at 172.20.10.30. This
command extracts just the new-configs directory into the root directory on the local flash file system.
The remaining files in the saved.tar file are ignored.
Switch# archive tar /xtract tftp://172.20.10.30/saved.tar flash:/new_configs
Related Commands
CommandDescription
archive download-swDownloads a new image from a TFTP server to the switch.
archive upload-swUploads an existing image on the switch to a server.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-19
Page 46
archive upload-sw
archive upload-sw
Use the archive upload-sw privileged EXEC command to upload an existing switch image to a server.
The image-name.tar is the name of software image to be stored on the
server.
DefaultsUploads the currently running image from the flash file system.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesUse the upload feature only if the HTML files associated with the embedded device manager have been
installed with the existing image.
The files are uploaded in this sequence: the Cisco IOS image, the HTML files, and info. After these files
are uploaded, the software creates the tar file.
Image names are case sensitive.
Cisco IE 3000 Switch Command Reference
2-20
OL-13019-01
Page 47
Chapter 2 IE 3000 Switch Cisco IOS Commands
archive upload-sw
ExamplesThis example shows how to upload the currently running image to a TFTP server at 172.20.140.2:
archive download-swDownloads a new image to the switch.
archive tarCreates a tar file, lists the files in a tar file, or extracts the files from a tar file.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-21
Page 48
auto qos voip
auto qos voip
Use the auto qos voip interface configuration command to automatically configure quality of service
(QoS) for voice over IP (VoIP) within a QoS domain. Use the no form of this command to return to the
default setting.
Chapter 2 IE 3000 Switch Cisco IOS Commands
auto qos voip {cisco-phone | cisco-softphone | trust}
no auto qos voip [cisco-phone | cisco-softphone | trust]
Syntax Description
cisco-phoneIdentify this port as connected to a Cisco IP Phone, and automatically configure QoS
for VoIP. The QoS labels of incoming packets are trusted only when the telephone
is detected.
cisco-softphone Identify this port as connected to a device running the Cisco SoftPhone, and
automatically configure QoS for VoIP.
trustIdentify this port as connected to a trusted switch or router, and automatically
configure QoS for VoIP. The QoS labels of incoming packets are trusted. For
nonrouted ports, the CoS value of the incoming packet is trusted.
DefaultsAuto-QoS is disabled on the port.
When auto-QoS is enabled, it uses the ingress packet label to categorize traffic, to assign packet labels,
and to configure the ingress and egress queues as shown in
Ta b l e 2-2Traffic Types, Packet Labels, and Queues
3
DSCP
4
CoS
CoS-to-ingress
VoIP Data
Traffic
4624, 26485634–
53673–
2, 3, 4, 5, 6, 7 (queue 2)0, 1 (queue 1)
VoIP Control
Traffic
Routing Protocol
Traffic
queue map
CoS-to-egress
5 (queue 1)3, 6, 7 (queue 2)4 (queue 3) 2
queue map
1. STP = Spanning Tree Protocol
2. BPDU = bridge protocol data unit
3. DSCP = Differentiated Services Code Point
4. CoS = class of service
STP1 BPDU2
Traffic
Table 2-2.
Real-Time
Video TrafficAll Other Traffic
(queue 3)
0, 1
(queue 4)
Cisco IE 3000 Switch Command Reference
2-22
OL-13019-01
Page 49
Chapter 2 IE 3000 Switch Cisco IOS Commands
Table 2-3 shows the generated auto-QoS configuration for the ingress queues.
Ta b l e 2-3Auto-QoS Configuration for the Ingress Queues
12.2(40)SEThe information in the command output changed.
12.2(44)EXThis command was introduced.
Usage GuidelinesUse this command to configure the QoS appropriate for VoIP traffic within the QoS domain. The QoS
domain includes the switch, the interior of the network, and edge devices that can classify incoming
traffic for QoS.
Auto-QoS configures the switch for VoIP with Cisco IP Phones on switch and routed ports and for VoIP
with devices running the Cisco SoftPhone application. These releases support only Cisco IP SoftPhone
Version 1.3(3) or later. Connected devices must use Cisco Call Manager Version 4 or later.
The show auto qos command output shows the service policy information for the Cisco IP phone.
To take advantage of the auto-QoS defaults, you should enable auto-QoS before you configure other QoS
commands. You can fine-tune the auto-QoS configuration after you enable auto-QoS.
NoteThe switch applies the auto-QoS-generated commands as if the commands were entered from the
command-line interface (CLI). An existing user configuration can cause the application of the generated
commands to fail or to be overridden by the generated commands. These actions occur without warning.
If all the generated commands are successfully applied, any user-entered configuration that was not
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-23
Page 50
auto qos voip
Chapter 2 IE 3000 Switch Cisco IOS Commands
overridden remains in the running configuration. Any user-entered configuration that was overridden can
be retrieved by reloading the switch without saving the current configuration to memory. If the generated
commands fail to be applied, the previous running configuration is restored.
If this is the first port on which you have enabled auto-QoS, the auto-QoS-generated global configuration
commands are executed followed by the interface configuration commands. If you enable auto-QoS on
another port, only the auto-QoS-generated interface configuration commands for that port are executed.
When you enable the auto-QoS feature on the first port, these automatic actions occur:
•QoS is globally enabled (mls qos global configuration command), and other global configuration
commands are added.
•When you enter the auto qos voip cisco-softphone interface configuration command on a port at
the edge of the network that is connected to a device running the Cisco SoftPhone, the switch uses
policing to decide whether a packet is in or out of profile and to specify the action on the packet. If
the packet does not have a DSCP value of 24, 26, or 46 or is out of profile, the switch changes the
DSCP value to 0. The switch configures ingress and egress queues on the port according to the
settings in
•When you enter the auto qos voip trust interface configuration command on a port connected to the
interior of the network, the switch trusts the CoS value for nonrouted ports in ingress packets (the
assumption is that traffic has already been classified by other edge devices). The switch configures
the ingress and egress queues on the port according to the settings in
You can enable auto-QoS on static, dynamic-access, and voice VLAN access, and trunk ports. When
enabling auto-QoS with a Cisco IP Phone on a routed port, you must assign a static IP address to the
IP
phone.
Table 2-3 and Ta ble 2-4.
Table 2-3 and Table 2-4.
NoteWhen a device running Cisco SoftPhone is connected to a switch or routed port, the switch supports only
one Cisco SoftPhone application per port.
After auto-QoS is enabled, do not modify a policy map or aggregate policer that includes AutoQoS in its
name. If you need to modify the policy map or aggregate policer, make a copy of it, and change the
copied policy map or policer. To use the new policy map instead of the generated one, remove the
generated policy map from the interface, and apply the new policy map.
To display the QoS configuration that is automatically generated when auto-QoS is enabled, enable
debugging before you enable auto-QoS. Use the debug auto qos privileged EXEC command to enable
auto-QoS debugging. For more information, see the
debug auto qos command.
To disable auto-QoS on a port, use the no auto qos voip interface configuration command. Only the
auto-QoS-generated interface configuration commands for this port are removed. If this is the last port
on which auto-QoS is enabled and you enter the no auto qos voip command, auto-QoS is considered
disabled even though the auto-QoS-generated global configuration commands remain (to avoid
disrupting traffic on other ports affected by the global configuration). You can use the no mls qos global
configuration command to disable the auto-QoS-generated global configuration commands. With QoS
disabled, there is no concept of trusted or untrusted ports because the packets are not modified (the CoS,
DSCP, and IP precedence values in the packet are not changed). Traffic is switched in pass-through mode
(packets are switched without any rewrites and classified as best effort without any policing).
Cisco IE 3000 Switch Command Reference
2-24
OL-13019-01
Page 51
Chapter 2 IE 3000 Switch Cisco IOS Commands
auto qos voip
ExamplesThis example shows how to enable auto-QoS and to trust the QoS labels received in incoming packets
when the switch or router connected to the port is a trusted device:
Switch(config)# interface gigabitethernet1/1
Switch(config-if)# auto qos voip trust
You can verify your settings by entering the show auto qos interfaceinterface-id privileged EXEC
command.
Related CommandsCommandDescription
debug auto qosEnables debugging of the auto-QoS feature.
mls qos cosDefines the default CoS value of a port or assigns the default
CoS to all incoming packets on the port.
mls qos map {cos-dscp dscp1 ... dscp8
| dscp-cos dscp-list to cos}
mls qos queue-set output buffersAllocates buffers to a queue-set.
mls qos srr-queue input bandwidthAssigns shaped round robin (SRR) weights to an ingress
mls qos srr-queue input buffersAllocates the buffers between the ingress queues.
mls qos srr-queue input cos-mapMaps CoS values to an ingress queue or maps CoS values to
mls qos srr-queue input dscp-mapMaps DSCP values to an ingress queue or maps DSCP values
mls qos srr-queue input
priority-queue
mls qos srr-queue output cos-mapMaps CoS values to an egress queue or maps CoS values to
mls qos srr-queue output dscp-mapMaps DSCP values to an egress queue or maps DSCP values
mls qos trustConfigures the port trust state.
queue-setMaps a port to a queue-set.
show auto qosDisplays auto-QoS information.
show mls qos interfaceDisplays QoS information at the port level.
srr-queue bandwidth shapeAssigns the shaped weights and enables bandwidth shaping
srr-queue bandwidth shareAssigns the shared weights and enables bandwidth sharing
Defines the CoS-to-DSCP map or the DSCP-to-CoS map.
queue.
a queue and to a threshold ID.
to a queue and to a threshold ID.
Configures the ingress priority queue and guarantees
bandwidth.
a queue and to a threshold ID.
to a queue and to a threshold ID.
on the four egress queues mapped to a port.
on the four egress queues mapped to a port.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-25
Page 52
boot config-file
boot config-file
Use the boot config-file global configuration command to specify the filename that Cisco IOS uses to
read and write a nonvolatile copy of the system configuration. Use the no form of this command to return
to the default setting.
boot config-file flash:/file-url
no boot config-file
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
DefaultsThe default configuration file is flash:config.text.
Command ModesGlobal configuration
Command History
Usage GuidelinesFilenames and directory names are case sensitive.
Related Commands
flash:/file-urlThe path (directory) and name of the configuration file.
ReleaseModification
12.2(44)EXThis command was introduced.
This command changes the setting of the CONFIG_FILE environment variable. For more information,
see
Appendix A, “IE 3000 Switch Bootloader Commands.”
CommandDescription
show bootDisplays the settings of the boot environment variables.
Cisco IE 3000 Switch Command Reference
2-26
OL-13019-01
Page 53
Chapter 2 IE 3000 Switch Cisco IOS Commands
boot enable-break
boot enable-break
Use the boot enable-break global configuration command to enable interrupting the automatic boot
process. Use the no form of this command to return to the default setting.
boot enable-break
no boot enable-break
Syntax DescriptionThis command has no arguments or keywords.
DefaultsDisabled. The automatic boot process cannot be interrupted by pressing the Break key on the console.
Command ModesGlobal configuration
Command History
Usage GuidelinesWhen you enter this command, you can interrupt the automatic boot process by pressing the Break key
NoteDespite the setting of this command, you can interrupt the automatic boot process at any time by pressing
Related Commands
ReleaseModification
12.2(44)EXThis command was introduced.
on the console after the flash file system is initialized.
the MODE button on the switch front panel.
This command changes the setting of the ENABLE_BREAK environment variable. For more
information, see
CommandDescription
show bootDisplays the settings of the boot environment variables.
Appendix A, “IE 3000 Switch Bootloader Commands.”
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-27
Page 54
boot helper
boot helper
Chapter 2 IE 3000 Switch Cisco IOS Commands
Use the boot helper global configuration command to dynamically load files during boot loader
initialization to extend or patch the functionality of the boot loader. Use the no form of this command
to return to the default.
boot helper filesystem:/file-url ...
no boot helper
Syntax Description
DefaultsNo helper files are loaded.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis variable is used only for internal development and testing.
filesystem:Alias for a flash file system. Use flash: for the system board flash device.
/file-urlThe path (directory) and a list of loadable files to dynamically load during
loader initialization. Separate each image name with a semicolon.
ReleaseModification
12.2(44)EXThis command was introduced.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER environment variable. For more information, see
Appendix A, “IE 3000 Switch Bootloader Commands.”
Related Commands
Cisco IE 3000 Switch Command Reference
2-28
CommandDescription
show bootDisplays the settings of the boot environment variables.
OL-13019-01
Page 55
Chapter 2 IE 3000 Switch Cisco IOS Commands
boot helper-config-file
Use the boot helper-config-file global configuration command to specify the name of the configuration
file to be used by the Cisco IOS helper image. If this is not set, the file specified by the CONFIG_FILE
environment variable is used by all versions of Cisco IOS that are loaded. Use the no form of this
command to return to the default setting.
boot helper-config-file filesystem:/file-url
no boot helper-config file
boot helper-config-file
Syntax Description
DefaultsNo helper configuration file is specified.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis variable is used only for internal development and testing.
filesystem:Alias for a flash file system. Use flash: for the system board flash
device.
/file-urlThe path (directory) and helper configuration file to load.
ReleaseModification
12.2(44)EXThis command was introduced.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER_CONFIG_FILE environment variable. For more
information, see
Appendix A, “IE 3000 Switch Bootloader Commands.”
Related Commands
OL-13019-01
CommandDescription
show bootDisplays the settings of the boot environment variables.
Cisco IE 3000 Switch Command Reference
2-29
Page 56
boot manual
boot manual
Use the boot manual global configuration command to enable manually booting the switch during the
next boot cycle. Use the no form of this command to return to the default setting.
boot manual
no boot manual
Syntax DescriptionThis command has no arguments or keywords.
DefaultsManual booting is disabled.
Command ModesGlobal configuration
Chapter 2 IE 3000 Switch Cisco IOS Commands
Command History
Usage GuidelinesThe next time you reboot the system, the switch is in boot loader mode, which is shown by the switch:
Related Commands
ReleaseModification
12.2(44)EXThis command was introduced.
prompt. To boot up the system, use the boot boot loader command, and specify the name of the bootable
image.
This command changes the setting of the MANUAL_BOOT environment variable. For more
information, see
CommandDescription
show bootDisplays the settings of the boot environment variables.
Appendix A, “IE 3000 Switch Bootloader Commands.”
Cisco IE 3000 Switch Command Reference
2-30
OL-13019-01
Page 57
Chapter 2 IE 3000 Switch Cisco IOS Commands
boot private-config-file
Use the boot private-config-file global configuration command to specify the filename that Cisco IOS
uses to read and write a nonvolatile copy of the private configuration. Use the no form of this command
to return to the default setting.
boot private-config-file filename
no boot private-config-file
boot private-config-file
Syntax Description
DefaultsThe default configuration file is private-config.
Command ModesGlobal configuration
Command History
Usage GuidelinesFilenames are case sensitive.
ExamplesThis example shows how to specify the name of the private configuration file to be pconfig:
Related Commands
filenameThe name of the private configuration file.
ReleaseModification
12.2(44)EXThis command was introduced.
Switch(config)# boot private-config-file pconfig
CommandDescription
show bootDisplays the settings of the boot environment variables.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-31
Page 58
boot system
boot system
Chapter 2 IE 3000 Switch Cisco IOS Commands
Use the boot system global configuration command to specify the Cisco IOS image to load during the
next boot cycle. Use the no form of this command to return to the default setting.
boot system filesystem:/file-url ...
no boot system
Syntax Description
DefaultsThe switch attempts to automatically boot up the system by using information in the BOOT environment
Command ModesGlobal configuration
Command History
Usage GuidelinesFilenames and directory names are case sensitive.
filesystem:Alias for a flash file system. Use flash: for the system board flash device.
/file-urlThe path (directory) and name of a bootable image. Separate image names
with a semicolon.
variable. If this variable is not set, the switch attempts to load and execute the first executable image it
can by performing a recursive, depth-first search throughout the flash file system. In a depth-first search
of a directory, each encountered subdirectory is completely searched before continuing the search in the
original directory.
ReleaseModification
12.2(44)EXThis command was introduced.
If you are using the archive download-sw privileged EXEC command to maintain system images, you
never need to use the boot system command. The boot system command is automatically manipulated
to load the downloaded image.
This command changes the setting of the BOOT environment variable. For more information, see
Appendix A, “IE 3000 Switch Bootloader Commands.”
Related Commands
Cisco IE 3000 Switch Command Reference
2-32
CommandDescription
show bootDisplays the settings of the boot environment variables.
OL-13019-01
Page 59
Chapter 2 IE 3000 Switch Cisco IOS Commands
channel-group
Use the channel-group interface configuration command to assign an Ethernet port to an EtherChannel
group, to enable an EtherChannel mode, or both. Use the no form of this command to remove an Ethernet
port from an EtherChannel group.
Syntax Descriptionchannel-group-numberSpecify the channel group number. The range is 1 to 6.
modeSpecify the EtherChannel mode.
activeUnconditionally enable Link Aggregation Control Protocol (LACP).
Active mode places a port into a negotiating state in which the port initiates
negotiations with other ports by sending LACP packets. A channel is
formed with another port group in either the active or passive mode.
autoEnable the Port Aggregation Protocol (PAgP) only if a PAgP device is
detected.
Auto mode places a port into a passive negotiating state in which the port
responds to PAgP packets it receives but does not start PAgP packet
negotiation. A channel is formed only with another port group in desirable
mode. When auto is enabled, silent operation is the default.
desirableUnconditionally enable PAgP.
Desirable mode places a port into an active negotiating state in which the
port starts negotiations with other ports by sending PAgP packets. An
EtherChannel is formed with another port group that is in the desirable or
auto mode. When desirable is enabled, silent operation is the default.
non-silent(Optional) Use in PAgP mode with the auto or desirable keyword when
traffic is expected from the other device.
onEnable on mode.
In on mode, a usable EtherChannel exists only when both connected port
groups are in the on mode.
passiveEnable LACP only if a LACP device is detected.
Passive mode places a port into a negotiating state in which the port
responds to received LACP packets but does not initiate LACP packet
negotiation. A channel is formed only with another port group in active
mode.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-33
Page 60
channel-group
DefaultsNo channel groups are assigned.
No mode is configured.
Command ModesInterface configuration
Chapter 2 IE 3000 Switch Cisco IOS Commands
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesFor Layer 2 EtherChannels, you do not have to create a port-channel interface first by using the interface
port-channel global configuration command before assigning a physical port to a channel group.
Instead, you can use the channel-group interface configuration command. It automatically creates the
port-channel interface when the channel group gets its first physical port if the logical interface is not
already created. If you create the port-channel interface first, the channel-group-number can be the same
as the port-channel-number, or you can use a new number. If you use a new number, the channel-group
command dynamically creates a new port channel.
After you configure an EtherChannel, configuration changes that you make on the port-channel interface
apply to all the physical ports assigned to the port-channel interface. Configuration changes applied to
the physical port affect only the port where you apply the configuration. To change the parameters of all
ports in an EtherChannel, apply configuration commands to the port-channel interface, for example,
spanning-tree commands or commands to configure a Layer 2 EtherChannel as a trunk.
If you do not specify non-silent with the auto or desirable mode, silent is assumed. The silent mode is
used when the switch is connected to a device that is not PAgP-capable and seldom, if ever, sends
packets. A example of a silent partner is a file server or a packet analyzer that is not generating traffic.
In this case, running PAgP on a physical port prevents that port from ever becoming operational.
However, it allows PAgP to operate, to attach the port to a channel group, and to use the port for
transmission. Both ends of the link cannot be set to silent.
2-34
In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another
port group in the on mode.
CautionYou should use care when using the on mode. This is a manual configuration, and ports on both ends of
the EtherChannel must have the same configuration. If the group is misconfigured, packet loss or
spanning-tree loops can occur.
Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running
PAgP and LACP can coexist on the same switch. Individual EtherChannel groups can run either PAgP
or LACP, but they cannot interoperate.
If you set the protocol by using the channel-protocol interface configuration command, the setting is
not overridden by the channel-group interface configuration command.
Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an
IEEE
802.1x port. If you try to enable IEEE 802.1x authentication on an EtherChannel port, an error
message appears, and IEEE 802.1x authentication is not enabled.
Do not configure a secure port as part of an EtherChannel or an EtherChannel port as a secure port.
Cisco IE 3000 Switch Command Reference
OL-13019-01
Page 61
Chapter 2 IE 3000 Switch Cisco IOS Commands
channel-group
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the
software configuration guide for this release.
ExamplesThis example shows how to configure an EtherChannel. It assigns two static-access ports in VLAN 10
Use the channel-protocol interface configuration command to restrict the protocol used on a port to
manage channeling. Use the no form of this command to return to the default setting.
channel-protocol {lacp | pagp}
no channel-protocol
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
DefaultsNo protocol is assigned to the EtherChannel.
Command ModesInterface configuration
Command History
Usage GuidelinesUse the channel-protocol command only to restrict a channel to LACP or PAgP. If you set the protocol
lacpConfigure an EtherChannel with the Link Aggregation Control Protocol (LACP).
pagpConfigure an EtherChannel with the Port Aggregation Protocol (PAgP).
ReleaseModification
12.2(44)EXThis command was introduced.
by using the channel-protocol command, the setting is not overridden by the channel-group interface
configuration command.
You must use the channel-group interface configuration command to configure the EtherChannel
parameters. The channel-group command also can set the mode for the EtherChannel.
You cannot enable both the PAgP and LACP modes on an EtherChannel group.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
ExamplesThis example shows how to specify LACP as the protocol that manages the EtherChannel:
Switch(config-if)# channel-protocol lacp
You can verify your settings by entering the show etherchannel [channel-group-number] protocol
privileged EXEC command.
Related Commands
Cisco IE 3000 Switch Command Reference
2-36
CommandDescription
channel-groupAssigns an Ethernet port to an EtherChannel group.
show etherchannel protocolDisplays protocol information the EtherChannel.
OL-13019-01
Page 63
Chapter 2 IE 3000 Switch Cisco IOS Commands
cip
Use the cip global configuration command to enable the Common Industrial Protocol (CIP), and set the
CIP security options on the switch. Use the no form of the command to disable CIP.
no cip {enable | security {password | window timeout value}}
cip
Syntax Description
enableEnable the CIP stack on the switch.
securitySpecify the CIP security options.
passwordConfigure an ASCII password for CIP security.
window timeoutSet the timeout for the CIP security window.
valueSet the value for the CIP security window timeout. The range is 1 to 3600
seconds. The default setting is 600 seconds.
DefaultsBy default, CIP is disabled. No password is configured.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesWe recommend that you configure a CIP security password when enabling CIP. If you enable CIP
without configuring a security password, any CIP user can configure the switch.
ExamplesThis example shows how to enable CIP on the switch:
Switch(config)# cip enable
This example shows how to set the CIP security window timeout value to 1 hour:
Switch(config)# cip security window timeout 3600
This example shows how to set the CIP security password to abc123:
Switch(config)# cip security password abc123
Related Commands
CommandDescription
show cipDisplays information about the CIP subsystem.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-37
Page 64
class
class
Chapter 2 IE 3000 Switch Cisco IOS Commands
Use the class policy-map configuration command to define a traffic classification match criteria (through
the police, set, and trust policy-map class configuration commands) for the specified class-map name.
Use the no form of this command to delete an existing class map.
class class-map-name
no class class-map-name
Syntax Description
class-map-nameName of the class map.
DefaultsNo policy map class-maps are defined.
Command ModesPolicy-map configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesBefore using the class command, you must use the policy-map global configuration command to
identify the policy map and to enter policy-map configuration mode. After specifying a policy map, you
can configure a policy for new classes or modify a policy for any existing classes in that policy map. You
attach the policy map to a port by using the service-policy interface configuration command.
After entering the class command, you enter policy-map class configuration mode, and these
configuration commands are available:
•exit: exits policy-map class configuration mode and returns to policy-map configuration mode.
•no: returns a command to its default setting.
•police: defines a policer or aggregate policer for the classified traffic. The policer specifies the
bandwidth limitations and the action to take when the limits are exceeded. For more information,
see the
•set: specifies a value to be assigned to the classified traffic. For more information, see the set
police and police aggregate policy-map class commands.
command.
•trust: defines a trust state for traffic classified with the class or the class-map command. For more
information, see the
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode,
use the end command.
The class command performs the same function as the class-map global configuration command. Use
the class command when a new classification, which is not shared with any other ports, is needed. Use
the class-map command when the map is shared among many ports.
Cisco IE 3000 Switch Command Reference
2-38
trust command.
OL-13019-01
Page 65
Chapter 2 IE 3000 Switch Cisco IOS Commands
class
ExamplesThis example shows how to create a policy map called policy1. When attached to the ingress direction,
it matches all the incoming traffic defined in class1, sets the IP Differentiated Services Code Point
(DSCP) to 10, and polices the traffic at an average rate of 1 Mb/s and bursts at 20 KB. Traffic exceeding
the profile is marked down to a DSCP value gotten from the policed-DSCP map and then sent.
Switch(config)# policy-map policy1
Switch(config-pmap)# class class1
Switch(config-pmap-c)# set dscp 10
Switch(config-pmap-c)# police 1000000 20000 exceed-action policed-dscp-transmit
Switch(config-pmap-c)# exit
You can verify your settings by entering the show policy-map privileged EXEC command.
Related CommandsCommandDescription
class-mapCreates a class map to be used for matching packets to the class whose name
you specify.
policeDefines a policer for classified traffic.
policy-mapCreates or modifies a policy map that can be attached to multiple ports to
specify a service policy.
setClassifies IP traffic by setting a DSCP or IP-precedence value in the packet.
show policy-mapDisplays quality of service (QoS) policy maps.
trustDefines a trust state for the traffic classified through the class policy-map
configuration command or the class-map global configuration command.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-39
Page 66
class-map
class-map
Chapter 2 IE 3000 Switch Cisco IOS Commands
Use the class-map global configuration command to create a class map to be used for matching packets
to the class name you specify and to enter class-map configuration mode. Use the no form of this
command to delete an existing class map and to return to global configuration mode.
class-map [match-all | match-any] class-map-name
no class-map [match-all | match-any] class-map-name
Syntax Description
match-all(Optional) Perform a logical-AND of all matching statements under this class
map. All criteria in the class map must be matched.
match-any(Optional) Perform a logical-OR of the matching statements under this class
map. One or more criteria must be matched.
class-map-nameName of the class map.
DefaultsNo class maps are defined.
If neither the match-all or match-any keyword is specified, the default is match-all.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesUse this command to specify the name of the class for which you want to create or modify class-map
match criteria and to enter class-map configuration mode.
The class-map command and its subcommands are used to define packet classification, marking, and
aggregate policing as part of a globally named service policy applied on a per-port basis.
After you are in quality of service (QoS) class-map configuration mode, these configuration commands
are available:
•description: describes the class map (up to 200 characters). The show class-map privileged EXEC
command displays the description and the name of the class-map.
•exit: exits from QoS class-map configuration mode.
•match: configures classification criteria. For more information, see the match (class-map
configuration) command.
•no: removes a match statement from a class map.
•rename: renames the current class map. If you rename a class map with a name that is already used,
the message
Cisco IE 3000 Switch Command Reference
A class-map with this name already exists appears.
2-40
OL-13019-01
Page 67
Chapter 2 IE 3000 Switch Cisco IOS Commands
class-map
To define packet classification on a physical-port basis, only one match command per class map is
supported. In this situation, the match-all and match-any keywords are equivalent.
Only one access control list (ACL) can be configured in a class map. The ACL can have multiple access
control entries (ACEs).
ExamplesThis example shows how to configure the class map called class1 with one match criterion, which is an
access list called 103:
Switch(config)# access-list 103 permit ip any any dscp 10
Switch(config)# class-map class1
Switch(config-cmap)# match access-group 103
Switch(config-cmap)# exit
This example shows how to delete the class map class1:
Switch(config)# no class-map class1
You can verify your settings by entering the show class-map privileged EXEC command.
Related CommandsCommandDescription
classDefines a traffic classification match criteria (through the police,
set, and trust policy-map class configuration commands) for the
specified class-map name.
match (class-map
Defines the match criteria to classify traffic.
configuration)
policy-mapCreates or modifies a policy map that can be attached to multiple
ports to specify a service policy.
show class-mapDisplays QoS class maps.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-41
Page 68
clear dot1x
clear dot1x
Chapter 2 IE 3000 Switch Cisco IOS Commands
Use the clear dot1x privileged EXEC command to clear IEEE 802.1x information for the switch or for
the specified port.
clear dot1x {all | interfaceinterface-id}
Syntax Description
allClear all IEEE 802.1x information for the switch.
interface interface-idClear IEEE 802.1x information for the specified interface.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesYou can clear all the information by using the clear dot1x all command, or you can clear only the
information for the specified interface by using the clear dot1x interface interface-id command.
ExamplesThis example shows how to clear all IEEE 8021.x information:
Switch# clear dot1x all
Related Commands
Cisco IE 3000 Switch Command Reference
2-42
This example shows how to clear IEEE 8021.x information for the specified interface:
Switch# clear dot1x interface gigabithethernet1/1
You can verify that the information was deleted by entering the show dot1x privileged EXEC command.
CommandDescription
show dot1xDisplays IEEE 802.1x statistics, administrative status, and operational
status for the switch or for the specified port.
OL-13019-01
Page 69
Chapter 2 IE 3000 Switch Cisco IOS Commands
clear eap sessions
Use the clear eap sessions privileged EXEC command to clear Extensible Authentication Protocol
(EAP) session information for the switch or for the specified port.
errdisable detect causeEnables error-disabled detection for a specific cause or all
errdisable recoveryConfigures the recovery mechanism variables.
show errdisable detectDisplays error-disabled detection status.
show errdisable recoveryDisplay error-disabled recovery timer information.
show interfaces status err-disabled Displays interface status of a list of interfaces in
causes.
error-disabled state.
OL-13019-01
Page 71
Chapter 2 IE 3000 Switch Cisco IOS Commands
clear ip dhcp snooping
Use the clear ip dhcp snooping privileged EXEC command to clear the DHCP snooping binding
database, the DHCP snooping binding database agent statistics, or the DHCP snooping statistics
counters.
channel-group-number(Optional) Channel group number. The range is 1 to 6.
countersClear traffic counters.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesYou can clear all counters by using the clear lacp counters command, or you can clear only the counters
for the specified channel group by using the clear lacpchannel-group-numbercounters command.
ExamplesThis example shows how to clear all channel-group information:
Switch# clear lacp counters
Related Commands
OL-13019-01
This example shows how to clear LACP traffic counters for group 4:
Switch# clear lacp 4 counters
You can verify that the information was deleted by entering the show lacp counters or the show lacp 4
counters privileged EXEC command.
CommandDescription
show lacpDisplays LACP channel-group information.
Cisco IE 3000 Switch Command Reference
2-47
Page 74
clear mac address-table
clear mac address-table
Use the clear mac address-table privileged EXEC command to delete from the MAC address table a
specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a
particular VLAN. This command also clears the MAC address notification global counters.
channel-group-number(Optional) Channel group number. The range is 1 to 6.
countersClear traffic counters.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesYou can clear all counters by using the clear pagp counters command, or you can clear only the counters
for the specified channel group by using the clear pagpchannel-group-numbercounters command.
ExamplesThis example shows how to clear all channel-group information:
Switch# clear pagp counters
Related Commands
Cisco IE 3000 Switch Command Reference
2-50
This example shows how to clear PAgP traffic counters for group 10:
Switch# clear pagp 10 counters
You can verify that information was deleted by entering the show pagp privileged EXEC command.
CommandDescription
show pagpDisplays PAgP channel-group information.
OL-13019-01
Page 77
Chapter 2 IE 3000 Switch Cisco IOS Commands
clear port-security
Use the clear port-security privileged EXEC command to delete from the MAC address table all secure
addresses or all secure addresses of a specific type (configured, dynamic, or sticky) on the switch or on
an interface.
Usage GuidelinesIf the interface-id is not specified, spanning-tree counters are cleared for all interfaces.
ExamplesThis example shows how to clear spanning-tree counters for all interfaces:
interfaceinterface-id(Optional) Clear all spanning-tree counters on the specified interface. Valid
interfaces include physical ports, VLANs, and port channels. The VLAN
range is 1 to 4094. The port-channel range is 1 to 6.
ReleaseModification
12.2(44)EXThis command was introduced.
Switch# clear spanning-tree counters
Related Commands
OL-13019-01
CommandDescription
show spanning-treeDisplays spanning-tree state information.
Cisco IE 3000 Switch Command Reference
2-53
Page 80
clear spanning-tree detected-protocols
clear spanning-tree detected-protocols
Use the clear spanning-tree detected-protocols privileged EXEC command to restart the protocol
migration process (force the renegotiation with neighboring switches) on all interfaces or on the
specified interface.
Usage GuidelinesA switch running the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol or the Multiple
interface interface-id(Optional) Restart the protocol migration process on the specified interface.
Valid interfaces include physical ports, VLANs, and port channels. The
VLAN range is 1 to 4094. The port-channel range is 1 to 6.
ReleaseModification
12.2(44)EXThis command was introduced.
Spanning Tree Protocol (MSTP) supports a built-in protocol migration mechanism that enables it to
interoperate with legacy IEEE 802.1D switches. If a rapid-PVST+ switch or an MSTP switch receives a
legacy IEEE 802.1D configuration bridge protocol data unit (BPDU) with the protocol version set to 0,
it sends only IEEE 802.1D BPDUs on that port. A multiple spanning-tree (MST) switch can also detect
that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (Version 3)
associated with a different region, or a rapid spanning-tree (RST) BPDU (Version 2).
However, the switch does not automatically revert to the rapid-PVST+ or the MSTP mode if it no longer
receives IEEE 802.1D BPDUs because it cannot learn whether the legacy switch has been removed from
the link unless the legacy switch is the designated switch. Use the clear spanning-tree detected-protocols command in this situation.
ExamplesThis example shows how to restart the protocol migration process on a port:
show spanning-treeDisplays spanning-tree state information.
spanning-tree link-typeOverrides the default link-type setting and enables rapid spanning-tree
changes to the forwarding state.
OL-13019-01
Page 81
Chapter 2 IE 3000 Switch Cisco IOS Commands
clear vmps statistics
Use the clear vmps statistics privileged EXEC command to clear the statistics maintained by the VLAN
Query Protocol (VQP) client.
clear vmps statistics
Syntax DescriptionThis command has no arguments or keywords.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
clear vmps statistics
Command History
ExamplesThis example shows how to clear VLAN Membership Policy Server (VMPS) statistics:
Related Commands
ReleaseModification
12.2(44)EXThis command was introduced.
Switch# clear vmps statistics
You can verify that information was deleted by entering the show vmps statistics privileged EXEC
command.
CommandDescription
show vmpsDisplays the VQP version, reconfirmation interval, retry count, VMPS IP
addresses, and the current and primary servers.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-55
Page 82
clear vtp counters
clear vtp counters
Use the clear vtp counters privileged EXEC command to clear the VLAN Trunking Protocol (VTP) and
pruning counters.
clear vtp counters
Syntax DescriptionThis command has no arguments or keywords.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
Chapter 2 IE 3000 Switch Cisco IOS Commands
Command History
ExamplesThis example shows how to clear the VTP counters:
Related Commands
ReleaseModification
12.2(44)EXThis command was introduced.
Switch# clear vtp counters
You can verify that information was deleted by entering the show vtp counters privileged EXEC
command.
CommandDescription
show vtpDisplays general information about the VTP management domain, status,
and counters.
Cisco IE 3000 Switch Command Reference
2-56
OL-13019-01
Page 83
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster commander-address
You do not need to enter this command from a standalone cluster member switch. The cluster command
switch automatically provides its MAC address to cluster member switches when these switches join the
cluster. The cluster member switch adds this information and other cluster information to its running
configuration file. Use the no form of this global configuration command from the cluster member
switch console port to remove the switch from a cluster only during debugging or recovery procedures.
cluster commander-address mac-address [member number name name]
no cluster commander-address
cluster commander-address
Syntax Description
mac-addressMAC address of the cluster command switch.
member number(Optional) Number of a configured cluster member switch. The range is 0
to
15.
name name(Optional) Name of the configured cluster up to 31 characters.
DefaultsThe switch is not a member of any cluster.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesThis command is available only on the cluster command switch.
A cluster member can have only one cluster command switch.
The cluster member switch retains the identity of the cluster command switch during a system reload by
using the mac-address parameter.
You can enter the no form on a cluster member switch to remove it from the cluster during debugging or
recovery procedures. You would normally use this command from the cluster member switch console
port only when the member has lost communication with the cluster command switch. With normal
switch configuration, we recommend that you remove cluster member switches only by entering the no cluster membern global configuration command on the cluster command switch.
When a standby cluster command switch becomes active (becomes the cluster command switch), it
removes the cluster commander address line from its configuration.
ExamplesThis is partial sample output from the running configuration of a cluster member.
Switch(config)# show running-configuration
<output truncated>
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-57
Page 84
cluster commander-address
cluster commander-address 00e0.9bc0.a500 member 4 name my_cluster
<output truncated>
This example shows how to remove a member from the cluster by using the cluster member console.
Switch # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# no cluster commander-address
You can verify your settings by entering the show cluster privileged EXEC command.
Related CommandsCommandDescription
debug clusterDisplays the cluster status and a summary of the cluster to which the switch
belongs.
Chapter 2 IE 3000 Switch Cisco IOS Commands
Cisco IE 3000 Switch Command Reference
2-58
OL-13019-01
Page 85
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster discovery hop-count
Use the cluster discovery hop-count global configuration command on the cluster command switch to
set the hop-count limit for extended discovery of candidate switches. Use the no form of this command
to return to the default setting.
cluster discovery hop-count number
no cluster discovery hop-count
cluster discovery hop-count
Syntax Description
DefaultsThe hop count is set to 3.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis command is available only on the cluster command switch. This command does not operate on
numberNumber of hops from the cluster edge that the cluster command switch limits
the discovery of candidates. The range is 1 to 7.
ReleaseModification
12.2(44)EXThis command was introduced.
cluster member switches.
If the hop count is set to 1, it disables extended discovery. The cluster command switch discovers only
candidates that are one hop from the edge of the cluster. The edge of the cluster is the point between the
last discovered cluster member switch and the first discovered candidate switch.
ExamplesThis example shows how to set hop count limit to 4. This command is executed on the cluster command
switch.
Switch(config)# cluster discovery hop-count 4
You can verify your setting by entering the show cluster privileged EXEC command.
Related Commands
OL-13019-01
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the
show cluster candidatesDisplays a list of candidate switches.
switch belongs.
Cisco IE 3000 Switch Command Reference
2-59
Page 86
cluster enable
cluster enable
Use the cluster enable global configuration command on a command-capable switch to enable it as the
cluster command switch, assign a cluster name, and to optionally assign a member number to it. Use the
no form of the command to remove all members and to make the cluster command switch a candidate
switch.
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster enable name [command-switch-member-number]
no cluster enable
Syntax Description
DefaultsThe switch is not a cluster command switch.
Command ModesGlobal configuration
Command History
Usage GuidelinesEnter this command on any command-capable switch that is not part of any cluster. This command fails
nameName of the cluster up to 31 characters. Valid characters include
only alphanumerics, dashes, and underscores.
command-switch-member-number(Optional) Assign a member number to the cluster command
switch of the cluster. The range is 0 to 15.
No cluster name is defined.
The member number is 0 when the switch is the cluster command switch.
ReleaseModification
12.2(44)EXThis command was introduced.
if a device is already configured as a member of the cluster.
You must name the cluster when you enable the cluster command switch. If the switch is already
configured as the cluster command switch, this command changes the cluster name if it is different from
the previous cluster name.
ExamplesThis example shows how to enable the cluster command switch, name the cluster, and set the cluster
command switch member number to 4.
Switch(config)# cluster enable Engineering-IDF4 4
You can verify your setting by entering the show cluster privileged EXEC command on the cluster
command switch.
Cisco IE 3000 Switch Command Reference
2-60
OL-13019-01
Page 87
Chapter 2 IE 3000 Switch Cisco IOS Commands
Related CommandsCommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch belongs.
cluster enable
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-61
Page 88
cluster holdtime
cluster holdtime
Use the cluster holdtime global configuration command to set the duration in seconds before a switch
(either the command or cluster member switch) declares the other switch down after not receiving
heartbeat messages. Use the no form of this command to set the duration to the default value.
cluster holdtime holdtime-in-secs
no cluster holdtime
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
holdtime-in-secsDuration in seconds before a switch (either a command or cluster member
switch) declares the other switch down. The range is 1 to 300 seconds.
DefaultsThe default holdtime is 80 seconds.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesEnter this command with the cluster timer global configuration command only on the cluster command
switch. The cluster command switch propagates the values to all its cluster members so that the setting
is consistent among all switches in the cluster.
The holdtime is typically set as a multiple of the interval timer (cluster timer). For example, it takes
(holdtime-in-secs divided by the interval-in-secs) number of heartbeat messages to be missed in a row
to declare a switch down.
ExamplesThis example shows how to change the interval timer and the duration on the cluster command switch.
You can verify your settings by entering the show cluster privileged EXEC command.
Related Commands
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
Cisco IE 3000 Switch Command Reference
2-62
belongs.
OL-13019-01
Page 89
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster member
Use the cluster member global configuration command on the cluster command switch to add
candidates to a cluster. Use the no form of the command to remove members from the cluster.
cluster member [n] mac-address H.H.H [password enable-password] [vlan vlan-id]
no cluster member n
cluster member
Syntax Description
DefaultsA newly enabled cluster command switch has no associated cluster members.
Command ModesGlobal configuration
Command History
Usage GuidelinesEnter this command only on the cluster command switch to add a candidate to or remove a member from
nThe number that identifies a cluster member. The range is 0 to 15.
mac-address H.H.HMAC address of the cluster member switch in hexadecimal format.
password enable-passwordEnable password of the candidate switch. The password is not
required if there is no password on the candidate switch.
vlan vlan-id(Optional) VLAN ID through which the candidate is added to the
cluster by the cluster command switch. The range is 1 to 4094.
ReleaseModification
12.2(44)EXThis command was introduced.
the cluster. If you enter this command on a switch other than the cluster command switch, the switch
rejects the command and displays an error message.
You must enter a member number to remove a switch from the cluster. However, you do not need to enter
a member number to add a switch to the cluster. The cluster command switch selects the next available
member number and assigns it to the switch that is joining the cluster.
You must enter the enable password of the candidate switch for authentication when it joins the cluster.
The password is not saved in the running or startup configuration. After a candidate switch becomes a
member of the cluster, its password becomes the same as the cluster command-switch password.
If a switch does not have a configured hostname, the cluster command switch appends a member number
to the cluster command-switch hostname and assigns it to the cluster member switch.
If you do not specify a VLAN ID, the cluster command switch automatically chooses a VLAN and adds
the candidate to the cluster.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-63
Page 90
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster member
ExamplesThis example shows how to add a switch as member 2 with MAC address 00E0.1E00.2222 and the
password key to a cluster. The cluster command switch adds the candidate to the cluster through
VLAN
3.
Switch(config)# cluster member 2 mac-address 00E0.1E00.2222 password key vlan 3
This example shows how to add a switch with MAC address 00E0.1E00.3333 to the cluster. This switch
does not have a password. The cluster command switch selects the next available member number and
assigns it to the switch that is joining the cluster.
Switch(config)# cluster member mac-address 00E0.1E00.3333
You can verify your settings by entering the show cluster members privileged EXEC command on the
cluster command switch.
Related CommandsCommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the
switch belongs.
show cluster candidatesDisplays a list of candidate switches.
show cluster membersDisplays information about the cluster members.
Cisco IE 3000 Switch Command Reference
2-64
OL-13019-01
Page 91
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster outside-interface
Use the cluster outside-interface global configuration command to configure the outside interface for
cluster Network Address Translation (NAT) so that a member without an IP address can communicate
with devices outside the cluster. Use the no form of this command to return to the default setting.
cluster outside-interface interface-id
no cluster outside-interface
cluster outside-interface
Syntax Description
DefaultsThe default outside interface is automatically selected by the cluster command switch.
Command ModesGlobal configuration
Command History
Usage GuidelinesEnter this command only on the cluster command switch. If you enter this command on a cluster member
ExamplesThis example shows how to set the outside interface to VLAN 1:
interface-idInterface to serve as the outside interface. Valid interfaces include
physical interfaces, port-channels, or VLANs. The port-channel
range is 1 to 6. The VLAN range is 1 to 4094.
ReleaseModification
12.2(44)EXThis command was introduced.
switch, an error message appears.
Switch(config)# cluster outside-interface vlan 1
You can verify your setting by entering the show running-config privileged EXEC command.
Related Commands
OL-13019-01
CommandDescription
show running-configDisplays the current operating configuration. For syntax information,
select the Cisco IOS Configuration Fundamentals Command
Use the cluster run global configuration command to enable clustering on a switch. Use the no form of
this command to disable clustering on a switch.
cluster run
no cluster run
Syntax DescriptionThis command has no arguments or keywords.
DefaultsClustering is enabled on all switches.
Command ModesGlobal configuration
Chapter 2 IE 3000 Switch Cisco IOS Commands
Command History
Usage GuidelinesWhen you enter the no cluster run command on a cluster command switch, the cluster command switch
ExamplesThis example shows how to disable clustering on the cluster command switch:
Related Commands
ReleaseModification
12.2(44)EXThis command was introduced.
is disabled. Clustering is disabled, and the switch cannot become a candidate switch.
When you enter the no cluster run command on a cluster member switch, it is removed from the cluster.
Clustering is disabled, and the switch cannot become a candidate switch.
When you enter the no cluster run command on a switch that is not part of a cluster, clustering is
disabled on this switch. This switch cannot then become a candidate switch.
Switch(config)# no cluster run
You can verify your setting by entering the show cluster privileged EXEC command.
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
belongs.
Cisco IE 3000 Switch Command Reference
2-66
OL-13019-01
Page 93
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster standby-group
Use the cluster standby-group global configuration command to enable cluster command-switch
redundancy by binding the cluster to an existing Hot Standby Router Protocol (HSRP). Entering the
routing-redundancy keyword enables the same HSRP group to be used for cluster command-switch
redundancy and routing redundancy. Use the no form of this command to return to the default setting.
HSRP-group-nameName of the HSRP group that is bound to the cluster. The group name is
limited to 32 characters.
routing-redundancy(Optional) Enable the same HSRP standby group to be used for cluster
command-switch redundancy and routing redundancy.
DefaultsThe cluster is not bound to any HSRP group.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesEnter this command only on the cluster command switch. If you enter it on a cluster member switch, an
error message appears.
The cluster command switch propagates the cluster-HSRP binding information to all cluster-HSRP
capable members. Each cluster member switch stores the binding information in its NVRAM. The HSRP
group name must be a valid standby group; otherwise, the command exits with an error.
The same group name should be used on all members of the HSRP standby group that is to be bound to
the cluster. The same HSRP group name should also be used on all cluster-HSRP capable members for
the HSRP group that is to be bound. (When not binding a cluster to an HSRP group, you can use different
names on the cluster commander and the members.)
ExamplesThis example shows how to bind the HSRP group named my_hsrp to the cluster. This command is
executed on the cluster command switch.
Switch(config)# cluster standby-group my_hsrp
This example shows how to use the same HSRP group named my_hsrp for routing redundancy and
cluster redundancy.
This example shows the error message when this command is executed on a cluster command switch and
the specified HSRP standby group does not exist:
Switch(config)# cluster standby-group my_hsrp
%ERROR: Standby (my_hsrp) group does not exist
This example shows the error message when this command is executed on a cluster member switch:
Switch(config)# cluster standby-group my_hsrp routing-redundancy
%ERROR: This command runs on a cluster command switch
You can verify your settings by entering the show cluster privileged EXEC command. The output shows
whether redundancy is enabled in the cluster.
Related CommandsCommandDescription
standby ipEnables HSRP on the interface. For syntax information, select Cisco IOS IP
Command Reference, Volume 1 of 3:Addressing and Services, Release
12.2 > IP Services Commands.
show clusterDisplays the cluster status and a summary of the cluster to which the switch
belongs.
show standbyDisplays standby group information. For syntax information, select Cisco
IOS IP Command Reference, Volume 1 of 3:Addressing and Services,
Release 12.2 > IP Services Commands.
Chapter 2 IE 3000 Switch Cisco IOS Commands
Cisco IE 3000 Switch Command Reference
2-68
OL-13019-01
Page 95
Chapter 2 IE 3000 Switch Cisco IOS Commands
cluster timer
Use the cluster timer global configuration command to set the interval in seconds between heartbeat
messages. Use the no form of this command to set the interval to the default value.
cluster timer interval-in-secs
no cluster timer
cluster timer
Syntax Description
interval-in-secsInterval in seconds between heartbeat messages. The range is 1 to 300
seconds.
DefaultsThe interval is 8 seconds.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesEnter this command with the cluster holdtime global configuration command only on the cluster
command switch. The cluster command switch propagates the values to all its cluster members so that
the setting is consistent among all switches in the cluster.
The holdtime is typically set as a multiple of the heartbeat interval timer (cluster timer). For example,
it takes (holdtime-in-secs divided by the interval-in-secs) number of heartbeat messages to be missed in
a row to declare a switch down.
ExamplesThis example shows how to change the heartbeat interval timer and the duration on the cluster command
You can verify your settings by entering the show cluster privileged EXEC command.
Related Commands
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
OL-13019-01
belongs.
Cisco IE 3000 Switch Command Reference
2-69
Page 96
define interface-range
define interface-range
Use the define interface-range global configuration command to create an interface-range macro. Use
the no form of this command to delete the defined macro.
define interface-range macro-name interface-range
no define interface-range macro-name interface-range
Chapter 2 IE 3000 Switch Cisco IOS Commands
Syntax Description
macro-nameName of the interface-range macro; up to 32 characters.
interface-range Interface range; for valid values for interface ranges, see “Usage Guidelines.”
DefaultsThis command has no default setting.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Usage GuidelinesThe macro name is a 32-character maximum character string.
A macro can contain up to five ranges.
All interfaces in a range must be the same type; that is, all Fast Ethernet ports, all Gigabit Ethernet ports,
all EtherChannel ports, or all VLANs, but you can combine multiple interface types in a macro.
When entering the interface-range, use this format:
•type {first-interface} - {last-interface}
•You must add a space between the first interface number and the hyphen when entering an
interface-range. For example, gigabitethernet 1/1
- 2 is a valid range; gigabitethernet 1/1-2 is not
a valid range.
Valid values for type and interface:
•vlan vlan-id, where the VLAN ID is 1 to 4094
NoteThough options exist in the command-line interface to set multiple VLAN IDs, it is not
supported.
VLAN interfaces must have been configured with the interface vlan command (the show running-config privileged EXEC command displays the configured VLAN interfaces). VLAN
interfaces not displayed by the show running-config command cannot be used in interface-ranges.
•port-channel port-channel-number, where port-channel-number is from 1 to 6
Use the delete privileged EXEC command to delete a file or directory on the flash memory device.
delete [/force] [/recursive] filesystem:/file-url
Syntax Description
Command ModesPrivileged EXEC
Command History
Usage GuidelinesIf you use the /force keyword, you are prompted once at the beginning of the deletion process to confirm
/force(Optional) Suppress the prompt that confirms the deletion.
/recursive(Optional) Delete the named directory and all subdirectories and the files contained in
it.
filesystem:Alias for a flash file system.
The syntax for the local flash file system:
flash:
/file-url The path (directory) and filename to delete.
ReleaseModification
12.2(44)EXThis command was introduced.
the deletion.
If you use the /recursive keyword without the /force keyword, you are prompted to confirm the deletion
of every file.
The prompting behavior depends on the setting of the file prompt global configuration command. By
default, the switch prompts for confirmation on destructive file operations. For more information about
this command, see the Cisco IOS Command Reference for Release 12.1.
ExamplesThis example shows how to remove the directory that contains the old software image after a successful
download of a new image:
Switch# delete /force /recursive flash:/old-image
You can verify that the directory was removed by entering the dir filesystem: privileged EXEC
command.
Related Commands
Cisco IE 3000 Switch Command Reference
2-72
CommandDescription
archive download-swDownloads a new image to the switch and overwrites or keeps the existing
image.
OL-13019-01
Page 99
Chapter 2 IE 3000 Switch Cisco IOS Commands
deny (MAC access-list configuration)
deny (MAC access-list configuration)
Use the deny MAC access-list configuration command to prevent non-IP traffic from being forwarded
if the conditions are matched. Use the no form of this command to remove a deny condition from the
named MAC access list.
Define a host MAC address and optional subnet mask. If the source
address for a packet matches the defined address, non-IP traffic from that
address is denied.
Define a destination MAC address and optional subnet mask. If the
destination address for a packet matches the defined address, non-IP
traffic to that address is denied.
SNAP encapsulation to identify the protocol of the packet.
The type is 0 to 65535, specified in hexadecimal.
The mask is a mask of don’t care bits applied to the Ethertype before
testing for a match.
maps a data-link address to a network address.
priority. Filtering on CoS can be performed only in hardware. A warning
message reminds the user if the cos option is configured.
spanning tree.
OL-13019-01
Cisco IE 3000 Switch Command Reference
2-73
Page 100
deny (MAC access-list configuration)
lsap lsap-numbermask(Optional) Use the LSAP number (0 to 65535) of a packet with 802.2
netbios(Optional) Select EtherType DEC- Network Basic Input/Output System
vines-echo(Optional) Select EtherType Virtual Integrated Network Service (VINES)
vines-ip(Optional) Select EtherType VINES IP.
xns-idp(Optional) Select EtherType Xerox Network Systems (XNS) protocol
Chapter 2 IE 3000 Switch Cisco IOS Commands
encapsulation to identify the protocol of the packet.
mask is a mask of don’t care bits applied to the LSAP number before
testing for a match.
(NETBIOS).
Echo from Banyan Systems.
suite (0 to 65535), an arbitrary Ethertype in decimal, hexadecimal, or
octal.
NoteThough visible in the command-line help strings, appletalk is not supported as a matching condition.
To filter IPX traffic, you use the type mask or lsap lsap mask keywords, depending on the type of IPX
encapsulation being used. Filter criteria for IPX encapsulation types as specified in Novell terminology
and Cisco IOS terminology are listed in
Ta b l e 2-5IPX Filtering Criteria
Tabl e 2-5.
IPX Encapsulation Type
Filter CriterionCisco IOS NameNovel Name
arpaEthernet IIEthertype 0x8137
snapEthernet-snapEthertype 0x8137
sapEthernet 802.2LSAP 0xE0E0
novell-etherEthernet 802.3LSAP 0xFFFF
DefaultsThis command has no defaults. However; the default action for a MAC-named ACL is to deny.
Command ModesMAC-access list configuration
Command History
ReleaseModification
12.2(44)EXThis command was introduced.
Cisco IE 3000 Switch Command Reference
2-74
OL-13019-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.