Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-19055-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome
to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco
Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco
Cisco
Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step,
Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort
MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase,
SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx
Cisco
Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
This guide is for the networking professional using the Cisco IOS command-line interface (CLI) to
manage the Catalyst 2350 switch, referred to as the switch. Before using this guide, you should have
experience working with the Cisco IOS commands and the switch software features. Before using this
guide, you should have experience working with the concepts and terminology of Ethernet and local area
networking.
Purpose
This guide provides the information that you need about the Layer 2 commands that have been created
or changed for use with the Catalyst 2350 switch. For information about the standard Cisco IOS
Release
selecting Technical Support & Documentation > Documentation > Cisco IOS Software.
This guide does not provide procedures for configuring your switch. For detailed configuration
procedures, see the software configuration guide for this release.
This guide does not describe system messages you might encounter. For more information, see the
system message guide for this release.
For documentation updates, see the release notes for this release.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
•Commands and keywords are in boldface text.
•Arguments for which you supply values are in italic.
•Square brackets ([ ]) means optional elements.
•Braces ({}) group required choices, and vertical bars ( | ) separate the alternative elements.
•Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
12.2 commands, see the Cisco IOS documentation set available from the Cisco.com home page by
element.
OL-19055-01
Catalyst 2350 Switch Command Reference
xv
Page 16
Interactive examples use these conventions:
•Terminal sessions and system displays are in screen font.
•Information you enter is in boldface screen font.
•Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
Notes, cautions, and warnings use these conventions and symbols:
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Publications
Preface
These documents provide complete information about the switch and are available from these Cisco.com
sites:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
New in Cisco Product Documentation, which also lists all new and
OL-19055-01
Catalyst 2350 Switch Command Reference
xvii
Page 18
Preface
Catalyst 2350 Switch Command Reference
xviii
OL-19055-01
Page 19
CHAP T ER
1
Using the Command-Line Interface
The Catalyst 2350 switch is supported by Cisco IOS software. This chapter describes how to use the
switch command-line interface (CLI) to configure software features. You can connect to the switch
through the console port or Ethernet management port.
For a complete description of the commands that support these features, see Chapter 2, “Catalyst 2350
Switch Cisco IOS Commands.” For information on the boot loader commands, see Appendix A,
“Catalyst 2350 Switch Boot Loader Commands.” For information on the debug commands, see
Appendix B, “Catalyst 2350 Debug Commands.” For information on the show platform commands, see
Appendix C, “Catalyst 2350 Show Platform Commands.” For more information on Cisco IOS
Release 12.2, see the Cisco IOS Release 12.2 Command Summary.
For task-oriented configuration steps, see the software configuration guide for this release.
In this document, IP refers to IP version 4 (IPv4) unless there is a specific reference to IP version 6
(IPv6).
CLI Command Modes
This section describes the CLI command mode structure. Command modes support specific Cisco IOS
commands. For example, the interface interface-id command only works when entered in global
configuration mode.
These are the main command modes for the switch:
•User EXEC
•Privileged EXEC
•Global configuration
•Interface configuration
•Config-vlan
•VLAN configuration
•Line configuration
OL-19055-01
Catalyst 2350 Switch Command Reference
1-1
Page 20
Chapter 1 Using the Command-Line Interface
CLI Command Modes
Table 1-1 lists the main command modes, how to access each mode, the prompt you see in that mode,
and how to exit that mode. The prompts listed use the default name Switch.
Ta b l e 1-1Command Modes Summary
Command ModeAccess MethodPrompt Exit or Access Next Mode
User EXECThis is the first level of access.
Switch>
Enter the logout command.
(For the switch) Change terminal
settings, perform basic tasks, and
list system information.
Privileged EXECFrom user EXEC mode, enter the
enable command.
Global
configuration
Interface
configuration
From privileged EXEC mode,
enter the configure command.
From global configuration mode,
specify an interface by entering
the interface command followed
by an interface identification.
Config-vlanIn global configuration mode,
enter the vlan vlan-id command.
Line configurationFrom global configuration mode,
specify a line by entering the line
command.
Switch#
Switch(config)#
Switch(config-if)#
Switch(config-vlan)#
Switch(config-line)#
To enter privileged EXEC mode, enter
the enable command.
To exit to user EXEC mode, enter the
disable command.
To enter global configuration mode,
enter the configure command.
To exit to privileged EXEC mode,
enter the exit or end command, or
press Ctrl-Z.
To enter interface configuration mode,
enter the interface configuration
command.
To exit to privileged EXEC mode,
enter the end command, or press
Ctrl-Z.
To exit to global configuration mode,
enter the exit command.
To exit to global configuration mode,
enter the exit command.
To return to privileged EXEC mode,
enter the end command, or press
Ctrl-Z.
To exit to global configuration mode,
enter the exit command.
To return to privileged EXEC mode,
enter the end command, or press
Ctrl-Z.
User EXEC Mode
After you access the device, you are automatically in user EXEC command mode. The EXEC commands
available at the user level are a subset of those available at the privileged level. In general, use the user
EXEC commands to temporarily change terminal settings, perform basic tests, and list system
information.
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch> ?
Catalyst 2350 Switch Command Reference
1-2
OL-19055-01
Page 21
Chapter 1 Using the Command-Line Interface
Privileged EXEC Mode
Because many of the privileged commands configure operating parameters, privileged access should be
password-protected to prevent unauthorized use. The privileged command set includes those commands
contained in user EXEC mode, as well as the configure privileged EXEC command through which you
access the remaining command modes.
If your system administrator has set a password, you are prompted to enter it before being granted access
to privileged EXEC mode. The password does not appear on the screen and is case sensitive.
The privileged EXEC mode prompt is the device name followed by the pound sign (#).
Switch#
Enter the enable command to access privileged EXEC mode:
Switch> enable
Switch#
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch# ?
CLI Command Modes
To return to user EXEC mode, enter the disable privileged EXEC command.
Global Configuration Mode
Global configuration commands apply to features that affect the device as a whole. Use the configure
privileged EXEC command to enter global configuration mode. The default is to enter commands from
the management console.
When you enter the configure command, a message prompts you for the source of the configuration
commands:
Switch# configure
Configuring from terminal, memory, or network [terminal]?
You can specify either the terminal or NVRAM as the source of configuration commands.
This example shows you how to access global configuration mode:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config)# ?
To exit global configuration command mode and to return to privileged EXEC mode, enter the end or
exit command, or press Ctrl-Z.
OL-19055-01
Catalyst 2350 Switch Command Reference
1-3
Page 22
CLI Command Modes
Interface Configuration Mode
Interface configuration commands modify the operation of the interface. Interface configuration
commands always follow a global configuration command, which defines the interface type.
Use the interface interface-id command to access interface configuration mode. The new prompt means
interface configuration mode.
Switch(config-if)#
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-if)# ?
To exit interface configuration mode and to return to global configuration mode, enter the exit command.
To exit interface configuration mode and to return to privileged EXEC mode, enter the end command,
or press Ctrl-Z.
config-vlan Mode
Chapter 1 Using the Command-Line Interface
Use this mode to configure normal-range VLANs (VLAN IDs 1 to 1005) or, when VTP mode is
transparent, to configure extended-range VLANs (VLAN IDs 1006 to 4094). When VTP mode is
transparent, the VLAN and VTP configuration is saved in the running configuration file, and you can
save it to the switch startup configuration file by using the copy running-config startup-config
privileged EXEC command. The configurations of VLAN IDs 1 to 1005 are saved in the VLAN database
if VTP is in transparent or server mode. The extended-range VLAN configurations are not saved in the
VLAN database.
Enter the vlan vlan-id global configuration command to access config-vlan mode:
Switch(config)# vlan 2000
Switch(config-vlan)#
The supported keywords can vary but are similar to the commands available in VLAN configuration
mode. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-vlan)# ?
For extended-range VLANs, all characteristics except the MTU size must remain at the default setting.
To return to global configuration mode, enter exit; to return to privileged EXEC mode, enter end. All
the commands except shutdown take effect when you exit config-vlan mode.
Line Configuration Mode
Line configuration commands modify the operation of a terminal line. Line configuration commands
always follow a line command, which defines a line number. Use these commands to change terminal
parameter settings line-by-line or for a range of lines.
Use the line vty line_number [ending_line_number] command to enter line configuration mode. The
new prompt means line configuration mode. The following example shows how to enter line
configuration mode for virtual terminal line
Switch(config)# line vty 0 7
Catalyst 2350 Switch Command Reference
1-4
7:
OL-19055-01
Page 23
Chapter 1 Using the Command-Line Interface
The supported commands can vary depending on the version of software in use. To display a
comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-line)# ?
To exit line configuration mode and to return to global configuration mode, use the exit command. To
exit line configuration mode and to return to privileged EXEC mode, enter the end command, or press
Ctrl-Z.
CLI Command Modes
OL-19055-01
Catalyst 2350 Switch Command Reference
1-5
Page 24
CLI Command Modes
Chapter 1 Using the Command-Line Interface
Catalyst 2350 Switch Command Reference
1-6
OL-19055-01
Page 25
Catalyst 2350 Switch Cisco IOS Commands
aaa authorization network
Use the aaa authorization network global configuration command to the configure the switch to use
user-RADIUS authorization for all network-related service requests, such as VLAN assignment. Use the
no form of this command to disable RADIUS user authorization.
aaa authorization network default group radius
no aaa authorization network default
Syntax Description
default group
radius
Use the list of all RADIUS hosts in the server group as the default authorization
list.
CHAP T ER
2
DefaultsAuthorization is disabled.
Command ModesGlobal configuration
Command History
Usage GuidelinesUse the aaa authorization network default group radius global configuration command to allow the
ReleaseModification
12.2(46)EYThis command was introduced.
switch to download authorization parameters from the RADIUS servers in the default authorization list.
The authorization parameters are used by features such as VLAN assignment to get parameters from the
RADIUS servers.
Use the show running-config privileged EXEC command to display the configured lists of authorization
methods.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-1
Page 26
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
aaa authorization network
ExamplesThis example shows how to configure the switch for user RADIUS authorization for all network-related
service requests:
Switch(config)# aaa authorization network default group radius
You can verify your settings by entering the show running-config privileged EXEC command.
Related CommandsCommandDescription
show running-configDisplays the operating configuration. For syntax information, use this link to
the Cisco IOS Release 12.2 Command Reference listing page:
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to
the command.
Catalyst 2350 Switch Command Reference
2-2
OL-19055-01
Page 27
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive download-sw
archive download-sw
Use the archive download-sw privileged EXEC command to download a new image from a TFTP server
to the switch and to overwrite or keep the existing image.
DefaultsThe current software image is not overwritten with the downloaded image.
Both the software image and HTML files are downloaded.
The new image is downloaded to the flash: file system.
The BOOT environment variable is changed to point to the new software image on the flash: file system.
Image names are case sensitive; the image file is provided in tar format.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesUse the /allow-feature-upgrade option to allow installation of an image with a different feature set, for
example, upgrading from the IP base feature set to the IP services feature.
You can use the archive download-sw /directory command to specify a directory only once, followed
by a tar file or list of tar files to be downloaded, instead of specifying complete paths with each tar file.
The /imageonly option removes the HTML files for the existing image if the existing image is being
removed or replaced. Only the Cisco IOS image (without the HTML files) is downloaded.
Catalyst 2350 Switch Command Reference
2-4
OL-19055-01
Page 29
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive download-sw
Using the /safe or /leave-old-sw option can cause the new image download to fail if there is insufficient
flash memory. If leaving the software in place prevents the new image from fitting in flash memory due
to space constraints, an error results.
If you used the /leave-old-sw option and did not overwrite the old image when you downloaded the new
one, you can remove the old image by using the delete privileged EXEC command. For more
information, see the
Use the /overwrite option to overwrite the image on the flash device with the downloaded one.
If you specify the command without the /overwrite option, the download algorithm verifies that the new
image is not the same as the one on the switch flash device. If the images are the same, the download
does not occur. If the images are different, the old image is deleted, and the new one is downloaded.
After downloading a new image, enter the reload privileged EXEC command to begin using the new
image, or specify the /reload or /force-reload option in the archive download-sw command.
Use the /directory option to specify a directory for the images.
ExamplesThis example shows how to download a new image from a TFTP server at 172.20.129.10 and to
Create a new tar file on the local or network file system.
For destination-url, specify the destination URL alias for the local or
network file system and the name of the tar file to create. These options
are supported:
The tar-filename.tar is the tar file to be created.
For flash:/file-url, specify the location on the local flash file system from
which the new tar file is created.
Catalyst 2350 Switch Command Reference
2-6
An optional list of files or directories within the source directory can be
specified to write to the new tar file. If none are specified, all files and
directories at this level are written to the newly created tar file.
OL-19055-01
Page 31
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
/table source-urlDisplay the contents of an existing tar file to the screen.
archive tar
For source-url, specify the source URL alias for the local or network file
system. These options are supported:
The tar-filename.tar is the tar file from which to extract.
For flash:/file-url [dir/file...], specify the location on the local flash file
system into which the tar file is extracted. Use the dir/file... option to
specify an optional list of files or directories within the tar file to be
extracted. If none are specified, all files and directories are extracted.
DefaultsThere is no default setting.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-7
Page 32
archive tar
Command ModesPrivileged EXEC
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesFilenames and directory names are case sensitive.
Image names are case sensitive.
ExamplesThis example shows how to create a tar file. The command writes the contents of the new-configs
directory on the local flash device to a file named saved.tar on the TFTP server at 172.20.10.30:
Switch# archive tar /create tftp:172.20.10.30/saved.tar flash:/new-configs
This example shows how to display the contents of the c2350-lanlite-tar.122-46.EY.tar file that is in
flash memory. The contents of the tar file appear on the screen:
Switch# archive tar /table flash:c2350-lanlite-tar.122-46.EY.tar
info (219 bytes)
This example shows how to extract the contents of a tar file on the TFTP server at 172.20.10.30. This
command extracts just the new-configs directory into the root directory on the local flash file system.
The remaining files in the saved.tar file are ignored.
Switch# archive tar /xtract tftp://172.20.10.30/saved.tar flash:/ new-configs
Related Commands
CommandDescription
archive download-swDownloads a new image from a TFTP server to the switch.
archive upload-swUploads an existing image on the switch to a server.
Catalyst 2350 Switch Command Reference
2-8
OL-19055-01
Page 33
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive upload-sw
Use the archive upload-sw privileged EXEC command to upload an existing switch image to a server.
DefaultsUploads the currently running image from the flash: file system.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesUse the upload feature only if the HTML files associated with the embedded device manager have been
installed with the existing image.
The files are uploaded in this sequence: the Cisco IOS image, the HTML files, and info. After these files
are uploaded, the software creates the tar file.
Image names are case sensitive.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-9
Page 34
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive upload-sw
ExamplesThis example shows how to upload the currently running image to a TFTP server at 172.20.140.2:
archive download-swDownloads a new image to the switch.
archive tarCreates a tar file, lists the files in a tar file, or extracts the files from a tar file.
Catalyst 2350 Switch Command Reference
2-10
OL-19055-01
Page 35
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot config-file
Use the boot config-file global configuration command on a standalone switch to specify the filename
that Cisco IOS uses to read and write a nonvolatile copy of the system configuration. Use the no form
of this command to return to the default setting.
boot config-file flash:/file-url
no boot config-file
boot config-file
Syntax Description
DefaultsThe default configuration file is flash:config.text.
Command ModesGlobal configuration
Command History
Usage GuidelinesFilenames and directory names are case sensitive.
Related Commands
flash:/file-urlThe path (directory) and name of the configuration file.
ReleaseModification
12.2(46)EYThis command was introduced.
This command changes the setting of the CONFIG_FILE environment variable. For more information,
see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
CommandDescription
show bootDisplays the settings of the boot environment variables.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-11
Page 36
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot enable-break
boot enable-break
Use the boot enable-break global configuration command on a standalone switch to enable interrupting
the automatic boot process. Use the no form of this command to return to the default setting.
boot enable-break
no boot enable-break
Syntax DescriptionThis command has no arguments or keywords.
DefaultsDisabled. The automatic boot process cannot be interrupted by pressing the Break key on the console.
Command ModesGlobal configuration
Command History
Usage GuidelinesWhen you enter this command, you can interrupt the automatic boot process by pressing the Break key
NoteDespite the setting of this command, you can interrupt the automatic boot process at any time by pressing
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
on the console after the flash file system is initialized.
the MODE button on the switch front panel.
This command changes the setting of the ENABLE_BREAK environment variable. For more
information, see
CommandDescription
show bootDisplays the settings of the boot environment variables.
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Catalyst 2350 Switch Command Reference
2-12
OL-19055-01
Page 37
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot helper
Use the boot helper global configuration command to dynamically load files during boot loader
initialization to extend or patch the functionality of the boot loader. Use the no form of this command
to return to the default.
boot helper filesystem:/file-url ...
no boot helper
boot helper
Syntax Description
DefaultsNo helper files are loaded.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis variable is used only for internal development and testing.
filesystem:Alias for a flash file system. Use flash: for the system board flash device.
/file-urlThe path (directory) and a list of loadable files to dynamically load during
loader initialization. Separate each image name with a semicolon.
ReleaseModification
12.2(46)EYThis command was introduced.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER environment variable. For more information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Related Commands
OL-19055-01
CommandDescription
show bootDisplays the settings of the boot environment variables.
Catalyst 2350 Switch Command Reference
2-13
Page 38
boot helper-config-file
boot helper-config-file
Use the boot helper-config-file global configuration command to specify the name of the configuration
file to be used by the Cisco IOS helper image. If this is not set, the file specified by the CONFIG_FILE
environment variable is used by all versions of Cisco IOS that are loaded. Use the no form of this
command to return to the default setting.
boot helper-config-file filesystem:/file-url
no boot helper-config file
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
DefaultsNo helper configuration file is specified.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis variable is used only for internal development and testing.
filesystem:Alias for a flash file system. Use flash: for the system board flash
device.
/file-urlThe path (directory) and helper configuration file to load.
ReleaseModification
12.2(46)EYThis command was introduced.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER_CONFIG_FILE environment variable. For more
information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Related Commands
Catalyst 2350 Switch Command Reference
2-14
CommandDescription
show bootDisplays the settings of the boot environment variables.
OL-19055-01
Page 39
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot manual
Use the boot manual global configuration command on a standalone switch to enable manually booting
the switch during the next boot cycle. Use the no form of this command to return to the default setting.
boot manual
no boot manual
Syntax DescriptionThis command has no arguments or keywords.
DefaultsManual booting is disabled.
Command ModesGlobal configuration
boot manual
Command History
Usage GuidelinesThe next time you reboot the system, the switch is in boot loader mode, which is shown by the switch:
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
prompt. To boot up the system, use the boot boot loader command, and specify the name of the bootable
image.
This command changes the setting of the MANUAL_BOOT environment variable. For more
information, see
CommandDescription
show bootDisplays the settings of the boot environment variables.
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
OL-19055-01
Catalyst 2350 Switch Command Reference
2-15
Page 40
boot private-config-file
boot private-config-file
Use the boot private-config-file global configuration command on a standalone switch to specify the
filename that Cisco IOS uses to read and write a nonvolatile copy of the private configuration. Use the
no form of this command to return to the default setting.
boot private-config-file filename
no boot private-config-file
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
DefaultsThe default configuration file is private-config.
Command ModesGlobal configuration
Command History
Usage GuidelinesFilenames are case sensitive.
ExamplesThis example shows how to specify the name of the private configuration file to be pconfig:
Related Commands
filenameThe name of the private configuration file.
ReleaseModification
12.2(46)EYThis command was introduced.
Switch(config)# boot private-config-file pconfig
CommandDescription
show bootDisplays the settings of the boot environment variables.
Catalyst 2350 Switch Command Reference
2-16
OL-19055-01
Page 41
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot system
Use the boot system global configuration command to specify the Cisco IOS image to load during the
next boot cycle. Use the no form of this command to return to the default setting.
boot system {filesystem:/file-url ...}
no boot system
no boot system switch {number | all}
boot system
Syntax Description
DefaultsThe switch attempts to automatically boot up the system by using information in the BOOT environment
Command ModesGlobal configuration
Command History
Usage GuidelinesFilenames and directory names are case sensitive.
filesystem:Alias for a flash file system. Use flash: for the system board flash device.
/file-urlThe path (directory) and name of a bootable image. Separate image names
with a semicolon.
variable. If this variable is not set, the switch attempts to load and execute the first executable image it
can by performing a recursive, depth-first search throughout the flash file system. In a depth-first search
of a directory, each encountered subdirectory is completely searched before continuing the search in the
original directory.
ReleaseModification
12.2(46)EYThis command was introduced.
If you enter the boot system filesystem:/file-url command the specified software image is loaded during
the next boot cycle.
If you are using the archive download-sw privileged EXEC command to maintain system images, you
never need to use the boot system command. The boot system command is automatically manipulated
to load the downloaded image.
This command changes the setting of the BOOT environment variable. For more information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Related Commands
OL-19055-01
CommandDescription
show bootDisplays the settings of the boot environment variables.
Catalyst 2350 Switch Command Reference
2-17
Page 42
channel-group
channel-group
Use the channel-group interface configuration command to assign an Ethernet port to an EtherChannel
group, to enable an EtherChannel mode, or both. Use the no form of this command to remove an Ethernet
port from an EtherChannel group.
channel-group-numberSpecify the channel group number. The range is 1 to 48.
modeSpecify the EtherChannel mode.
activeActive mode places a port into a negotiating state in which the port initiates
negotiations with other ports by sending LACP packets. A channel is
formed with another port group in either the active or passive mode.
autoEnable the Port Aggregation Protocol (PAgP) only if a PAgP device is
detected.
Auto mode places a port into a passive negotiating state in which the port
responds to PAgP packets it receives but does not start PAgP packet
negotiation. A channel is formed only with another port group in desirable
mode. When auto is enabled, silent operation is the default.
desirableUnconditionally enable PAgP.
Desirable mode places a port into an active negotiating state in which the
port starts negotiations with other ports by sending PAgP packets. An
EtherChannel is formed with another port group that is in the desirable or
auto mode. When desirable is enabled, silent operation is the default.
non-silent(Optional) Use in PAgP mode with the auto or desirable keyword when
traffic is expected from the other device.
onEnable on mode.
In on mode, a usable EtherChannel exists only when both connected port
groups are in the on mode.
passivePassive mode places a port into a negotiating state in which the port
responds to received LACP packets but does not initiate LACP packet
negotiation. A channel is formed only with another port group in active
mode.
DefaultsNo channel groups are assigned.
No mode is configured.
Catalyst 2350 Switch Command Reference
2-18
OL-19055-01
Page 43
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command ModesInterface configuration
channel-group
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesFor Layer 2 EtherChannels, you do not have to create a port-channel interface first by using the interface
port-channel global configuration command before assigning a physical port to a channel group.
Instead, you can use the channel-group interface configuration command. It automatically creates the
port-channel interface when the channel group gets its first physical port if the logical interface is not
already created. If you create the port-channel interface first, the channel-group-number can be the same
as the port-channel-number, or you can use a new number. If you use a new number, the channel-group
command dynamically creates a new port channel.
You do not have to disable the IP address that is assigned to a physical port that is part of a channel group,
but we strongly recommend that you do so.
After you configure an EtherChannel, configuration changes that you make on the port-channel interface
apply to all the physical ports assigned to the port-channel interface. Configuration changes applied to
the physical port affect only the port where you apply the configuration. To change the parameters of all
ports in an EtherChannel, apply configuration commands to the port-channel interface, for example,
spanning-tree commands or commands to configure a Layer 2 EtherChannel as a trunk.
If you do not specify non-silent with the auto or desirable mode, silent is assumed. The silent mode is
used when the switch is connected to a device that is not PAgP-capable and seldom, if ever, sends
packets. A example of a silent partner is a file server or a packet analyzer that is not generating traffic.
In this case, running PAgP on a physical port prevents that port from ever becoming operational.
However, it allows PAgP to operate, to attach the port to a channel group, and to use the port for
transmission. Both ends of the link cannot be set to silent.
In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another
port group in the on mode.
CautionYou should use care when using the on mode. This is a manual configuration, and ports on both ends of
the EtherChannel must have the same configuration. If the group is misconfigured, packet loss or
spanning-tree loops can occur.
Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running
PAgP and LACP can coexist on the same switch. Individual EtherChannel groups can run either PAgP
or LACP, but they cannot interoperate.
If you set the protocol by using the channel-protocol interface configuration command, the setting is
not overridden by the channel-group interface configuration command.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the
software configuration guide for this release.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-19
Page 44
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
channel-group
ExamplesThis example shows how to configure an EtherChannel that assigns two static-access ports in VLAN 10
Select the Cisco IOS Commands Master List, Release 12.2 to
navigate to the command.
Catalyst 2350 Switch Command Reference
2-20
OL-19055-01
Page 45
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
channel-protocol
Use the channel-protocol interface configuration command to restrict the protocol used on a port to
manage channeling. Use the no form of this command to return to the default setting.
channel-protocol {lacp | pagp}
no channel-protocol
channel-protocol
Syntax Description
DefaultsNo protocol is assigned to the EtherChannel.
Command ModesInterface configuration
Command History
Usage GuidelinesUse the channel-protocol command only to restrict a channel to LACP or PAgP. If you set the protocol
lacpConfigure an EtherChannel with the Link Aggregation Control Protocol (LACP).
pagpConfigure an EtherChannel with the Port Aggregation Protocol (PAgP).
ReleaseModification
12.2(46)EYThis command was introduced.
by using the channel-protocol command, the setting is not overridden by the channel-group interface
configuration command.
You must use the channel-group interface configuration command to configure the EtherChannel
parameters. The channel-group command also can set the mode for the EtherChannel.
You cannot enable both the PAgP and LACP modes on an EtherChannel group.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
ExamplesThis example shows how to specify LACP as the protocol that manages the EtherChannel:
Switch(config-if)# channel-protocol lacp
You can verify your settings by entering the show etherchannel [channel-group-number] protocol
privileged EXEC command.
Related Commands
OL-19055-01
CommandDescription
channel-groupAssigns an Ethernet port to an EtherChannel group.
show etherchannel protocolDisplays protocol information the EtherChannel.
Catalyst 2350 Switch Command Reference
2-21
Page 46
class
class
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the class policy-map configuration command to define a traffic classification match criteria (through
the police, set, and trust policy-map class configuration commands) for the specified class-map name.
Use the no form of this command to delete an existing class map.
class class-map-name
no class class-map-name
Syntax Description
class-map-nameName of the class map.
DefaultsNo policy map class-maps are defined.
Command ModesPolicy-map configuration
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesBefore using the class command, you must use the policy-map global configuration command to
identify the policy map and to enter policy-map configuration mode. After specifying a policy map, you
can configure a policy for new classes or modify a policy for any existing classes in that policy map. You
attach the policy map to a port by using the service-policy interface configuration command.
After entering the class command, you enter policy-map class configuration mode, and these
configuration commands are available:
•exit: exits policy-map class configuration mode and returns to policy-map configuration mode.
•no: returns a command to its default setting.
•police: defines a policer or aggregate policer for the classified traffic. The policer specifies the
bandwidth limitations and the action to take when the limits are exceeded. For more information,
see the
•set: specifies a value to be assigned to the classified traffic. For more information, see the set
police and police aggregate policy-map class commands.
command.
•trust: defines a trust state for traffic classified with the class or the class-map command. For more
information, see the
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode,
use the end command.
The class command performs the same function as the class-map global configuration command. Use
the class command when a new classification, which is not shared with any other ports, is needed. Use
the class-map command when the map is shared among many ports.
Catalyst 2350 Switch Command Reference
2-22
trust command.
OL-19055-01
Page 47
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
class
ExamplesThis example shows how to create a policy map called policy1. When attached to the ingress direction,
it matches all the incoming traffic defined in class1, sets the IP Differentiated Services Code Point
(DSCP) to 10, and polices the traffic at an average rate of 1 Mb/s and bursts at 20 KB. Traffic exceeding
the profile is marked down to a DSCP value gotten from the policed-DSCP map and then sent.
Switch(config)# policy-map policy1
Switch(config-pmap)# class class1
Switch(config-pmap-c)# set dscp 10
Switch(config-pmap-c)# police 1000000 20000 exceed-action policed-dscp-transmit
Switch(config-pmap-c)# exit
You can verify your settings by entering the show policy-map privileged EXEC command.
Related CommandsCommandDescription
class-mapCreates a class map to be used for matching packets to the class whose name
you specify.
policeDefines a policer for classified traffic.
policy-mapCreates or modifies a policy map that can be attached to multiple ports to
specify a service policy.
setClassifies IP traffic by setting a DSCP or IP-precedence value in the packet.
show policy-mapDisplays quality of service (QoS) policy maps.
trustDefines a trust state for the traffic classified through the class policy-map
configuration command or the class-map global configuration command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-23
Page 48
class-map
class-map
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the class-map global configuration command to create a class map to be used for matching packets
to the class whose name you specify and to enter class-map configuration mode. Use the no form of this
command to delete an existing class map and to return to global configuration mode.
class-map [match-all | match-any] class-map-name
no class-map [match-all | match-any] class-map-name
Syntax Description
match-all(Optional) Perform a logical-AND of all matching statements under this class
map. All criteria in the class map must be matched.
match-any(Optional) Perform a logical-OR of the matching statements under this class
map. One or more criteria must be matched.
class-map-nameName of the class map.
DefaultsNo class maps are defined.
If neither the match-all or match-any keyword is specified, the default is match-all.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesUse this command to specify the name of the class for which you want to create or modify class-map
match criteria and to enter class-map configuration mode.
The class-map command and its subcommands are used to define packet classification, marking, and
aggregate policing as part of a globally named service policy applied on a per-port basis.
After you are in quality of service (QoS) class-map configuration mode, these configuration commands
are available:
•description: describes the class map (up to 200 characters). The show class-map privileged EXEC
command displays the description and the name of the class-map.
•exit: exits from QoS class-map configuration mode.
•match: configures classification criteria. For more information, see the match (class-map
configuration) command.
•no: removes a match statement from a class map.
•rename: renames the current class map. If you rename a class map with a name that is already used,
the message
Catalyst 2350 Switch Command Reference
A class-map with this name already exists appears.
2-24
OL-19055-01
Page 49
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
class-map
If you enter the match-all or match-any keyword, you can only use it to specify an extended named
access control list (ACL) with the match access-groupacl-index-or-name class-map configuration
command.
To define packet classification on a physical-port basis, only one match command per class map is
supported. In this situation, the match-all and match-any keywords are equivalent.
Only one ACL can be configured in a class map. The ACL can have multiple access control entries
(ACEs).
ExamplesThis example shows how to configure the class map called class1 with one match criterion, which is an
access list called 103:
Switch(config)# access-list 103 permit ip any any dscp 10
Switch(config)# class-map class1
Switch(config-cmap)# match access-group 103
Switch(config-cmap)# exit
This example shows how to delete the class map class1:
Switch(config)# no class-map class1
You can verify your settings by entering the show class-map privileged EXEC command.
Related CommandsCommandDescription
classDefines a traffic classification match criteria (through the police,
set, and trust policy-map class configuration commands) for the
specified class-map name.
match (class-map
Defines the match criteria to classify traffic.
configuration)
policy-mapCreates or modifies a policy map that can be attached to multiple
ports to specify a service policy.
show class-mapDisplays QoS class maps.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-25
Page 50
clear eap
clear eap
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the clear eap privileged EXEC command to clear Extensible Authentication Protocol (EAP) session
information for the switch or for the specified port.
channel-group-number(Optional) Channel group number. The range is 1 to 48.
countersClear traffic counters.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesYou can clear all counters by using the clear lacp counters command, or you can clear only the counters
for the specified channel group by using the clear lacpchannel-group-number counters command.
ExamplesThis example shows how to clear all channel-group information:
Switch# clear lacp counters
Related Commands
Catalyst 2350 Switch Command Reference
2-28
This example shows how to clear LACP traffic counters for group 4:
Switch# clear lacp 4 counters
You can verify that the information was deleted by entering the show lacp counters or the show lacp 4
counters privileged EXEC command.
CommandDescription
show lacpDisplays LACP channel-group information.
OL-19055-01
Page 53
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
clear logging onboard
Use the clear logging onboard privileged EXEC command to clear all of the on-board failure logging
(OBFL) data except for the uptime and CLI-command information stored in the flash memory.
clear logging onboard
Syntax DescriptionThis command has no arguments or keywords.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
clear logging onboard
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesWe recommend that you keep OBFL enabled and do not erase the data stored in the flash memory.
ExamplesThis example shows how to clear all the OBFL information except for the uptime and CLI-command
Use the clear mac address-table privileged EXEC command to delete from the MAC address table a
specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a
particular VLAN. This command also clears the MAC address notification global counters.
Usage GuidelinesIf the interface-id is not specified, spanning-tree counters are cleared for all interfaces.
ExamplesThis example shows how to clear spanning-tree counters for all interfaces:
interfaceinterface-id(Optional) Clear all spanning-tree counters on the specified interface. Valid
interfaces include physical ports, VLANs, and port channels. The VLAN
range is 1 to 4094. The port-channel range is 1 to 48.
ReleaseModification
12.2(46)EYThis command was introduced.
Switch# clear spanning-tree counters
Related Commands
Catalyst 2350 Switch Command Reference
2-32
CommandDescription
show spanning-treeDisplays spanning-tree state information.
OL-19055-01
Page 57
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
clear spanning-tree detected-protocols
Use the clear spanning-tree detected-protocols privileged EXEC command to restart the protocol
migration process (force the renegotiation with neighboring switches) on all interfaces or on the
specified interface.
Usage GuidelinesA switch running the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol or the Multiple
interface interface-id(Optional) Restart the protocol migration process on the specified interface.
Valid interfaces include physical ports, VLANs, and port channels. The
VLAN range is 1 to 4094. The port-channel range is 1 to 48.
ReleaseModification
12.2(46)EYThis command was introduced.
Spanning Tree Protocol (MSTP) supports a built-in protocol migration mechanism that enables it to
interoperate with legacy IEEE 802.1D switches. If a rapid-PVST+ switch or an MSTP switch receives a
legacy IEEE 802.1D configuration bridge protocol data unit (BPDU) with the protocol version set to 0,
it sends only IEEE 802.1D BPDUs on that port. A multiple spanning-tree (MST) switch can also detect
that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (Version 3)
associated with a different region, or a rapid spanning-tree (RST) BPDU (Version 2).
However, the switch does not automatically revert to the rapid-PVST+ or the MSTP mode if it no longer
receives IEEE 802.1D BPDUs because it cannot learn whether the legacy switch has been removed from
the link unless the legacy switch is the designated switch. Use the clear spanning-tree detected-protocols command in this situation.
ExamplesThis example shows how to restart the protocol migration process on a port:
show spanning-treeDisplays spanning-tree state information.
spanning-tree link-typeOverrides the default link-type setting and enables rapid spanning-tree
changes to the forwarding state.
Catalyst 2350 Switch Command Reference
2-33
Page 58
clear vtp counters
clear vtp counters
Use the clear vtp counters privileged EXEC command to clear the VLAN Trunking Protocol (VTP) and
pruning counters.
clear vtp counters
Syntax DescriptionThis command has no arguments or keywords.
DefaultsNo default is defined.
Command ModesPrivileged EXEC
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
ExamplesThis example shows how to clear the VTP counters:
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
Switch# clear vtp counters
You can verify that information was deleted by entering the show vtp counters privileged EXEC
command.
CommandDescription
show vtpDisplays general information about the VTP management domain, status,
and counters.
Catalyst 2350 Switch Command Reference
2-34
OL-19055-01
Page 59
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster commander-address
You do not need to enter this command from a standalone cluster member switch. The cluster command
switch automatically provides its MAC address to cluster member switches when these switches join the
cluster. The cluster member switch adds this information and other cluster information to its running
configuration file. Use the no form of this global configuration command from the cluster member
switch console port or Ethernet management port to remove the switch from a cluster only during
debugging or recovery procedures.
cluster commander-address mac-address [member number name name]
no cluster commander-address
cluster commander-address
Syntax Description
DefaultsThe switch is not a member of any cluster.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis command is available only on the cluster command switch.
mac-addressMAC address of the cluster command switch.
member number(Optional) Number of a configured cluster member switch. The range is 0
to
15.
name name(Optional) Name of the configured cluster up to 31 characters.
ReleaseModification
12.2(46)EY This command was introduced.
A cluster member can have only one cluster command switch.
The cluster member switch retains the identity of the cluster command switch during a system reload by
using the mac-address parameter.
You can enter the no form on a cluster member switch to remove it from the cluster during debugging or
recovery procedures. You would normally use this command from the cluster member switch console
port or Ethernet management port only when the member has lost communication with the cluster
command switch. With normal switch configuration, we recommend that you remove cluster member
switches only by entering the no cluster membern global configuration command on the cluster
command switch.
When a standby cluster command switch becomes active (becomes the cluster command switch), it
removes the cluster commander address line from its configuration.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-35
Page 60
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster commander-address
ExamplesThis is partial sample output from the running configuration of a cluster member.
Switch(config)# show running-configuration
<output truncated>
cluster commander-address 00e0.9bc0.a500 member 4 name my_cluster
<output truncated>
This example shows how to remove a member from the cluster by using the cluster member console.
Switch # configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# no cluster commander-address
You can verify your settings by entering the show cluster privileged EXEC command.
Related CommandsCommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
belongs.
Catalyst 2350 Switch Command Reference
2-36
OL-19055-01
Page 61
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster discovery hop-count
Use the cluster discovery hop-count global configuration command on the cluster command switch to
set the hop-count limit for extended discovery of candidate switches. Use the no form of this command
to return to the default setting.
cluster discovery hop-count number
no cluster discovery hop-count
cluster discovery hop-count
Syntax Description
DefaultsThe hop count is set to 3.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis command is available only on the cluster command switch. This command does not operate on
numberNumber of hops from the cluster edge that the cluster command switch limits
the discovery of candidates. The range is 1 to 7.
ReleaseModification
12.2(46)EYThis command was introduced.
cluster member switches.
If the hop count is set to 1, it disables extended discovery. The cluster command switch discovers only
candidates that are one hop from the edge of the cluster. The edge of the cluster is the point between the
last discovered cluster member switch and the first discovered candidate switch.
ExamplesThis example shows how to set hop count limit to 4. This command is executed on the cluster command
switch.
Switch(config)# cluster discovery hop-count 4
You can verify your setting by entering the show cluster privileged EXEC command.
Related Commands
OL-19055-01
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the
show cluster candidatesDisplays a list of candidate switches.
switch belongs.
Catalyst 2350 Switch Command Reference
2-37
Page 62
cluster enable
cluster enable
Use the cluster enable global configuration command on a command-capable switch to enable it as the
cluster command switch, assign a cluster name, and to optionally assign a member number to it. Use the
no form of the command to remove all members and to make the cluster command switch a candidate
switch.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster enable name [command-switch-member-number]
no cluster enable
Syntax Description
DefaultsThe switch is not a cluster command switch.
Command ModesGlobal configuration
Command History
Usage GuidelinesEnter this command on any command-capable switch that is not part of any cluster. This command fails
nameName of the cluster up to 31 characters. Valid characters include
only alphanumerics, dashes, and underscores.
command-switch-member-number(Optional) Assign a member number to the cluster command
switch of the cluster. The range is 0 to 15.
No cluster name is defined.
The member number is 0 when the switch is the cluster command switch.
ReleaseModification
12.2(46)EYThis command was introduced.
if a device is already configured as a member of the cluster.
You must name the cluster when you enable the cluster command switch. If the switch is already
configured as the cluster command switch, this command changes the cluster name if it is different from
the previous cluster name.
ExamplesThis example shows how to enable the cluster command switch, name the cluster, and set the cluster
command switch member number to 4.
Switch(config)# cluster enable Engineering-IDF4 4
You can verify your setting by entering the show cluster privileged EXEC command on the cluster
command switch.
Catalyst 2350 Switch Command Reference
2-38
OL-19055-01
Page 63
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Related CommandsCommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
belongs.
cluster enable
OL-19055-01
Catalyst 2350 Switch Command Reference
2-39
Page 64
cluster holdtime
cluster holdtime
Use the cluster holdtime global configuration command on the cluster command switch to set the
duration in seconds before a switch (either the command or cluster member switch) declares the other
switch down after not receiving heartbeat messages. Use the no form of this command to set the duration
to the default value.
cluster holdtime holdtime-in-secs
no cluster holdtime
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
holdtime-in-secsDuration in seconds before a switch (either a command or cluster member
switch) declares the other switch down. The range is 1 to 300 seconds.
DefaultsThe default holdtime is 80 seconds.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesEnter this command with the cluster timer global configuration command only on the cluster command
switch. The cluster command switch propagates the values to all its cluster members so that the setting
is consistent among all switches in the cluster.
The holdtime is typically set as a multiple of the interval timer (cluster timer). For example, it takes
(holdtime-in-secs divided by the interval-in-secs) number of heartbeat messages to be missed in a row
to declare a switch down.
ExamplesThis example shows how to change the interval timer and the duration on the cluster command switch.
You can verify your settings by entering the show cluster privileged EXEC command.
Related Commands
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
Catalyst 2350 Switch Command Reference
2-40
belongs.
OL-19055-01
Page 65
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster member
Use the cluster member global configuration command on the cluster command switch to add
candidates to a cluster. Use the no form of the command to remove members from the cluster.
cluster member [n] mac-address H.H.H
no cluster member n
cluster member
Syntax Description
DefaultsA newly enabled cluster command switch has no associated cluster members.
Command ModesGlobal configuration
Command History
Usage GuidelinesEnter this command only on the cluster command switch to add a candidate to or remove a member from
nThe number that identifies a cluster member. The range is 0 to 15.
mac-address H.H.HMAC address of the cluster member switch in hexadecimal format.
ReleaseModification
12.2(46)EYThis command was introduced.
the cluster. If you enter this command on a switch other than the cluster command switch, the switch
rejects the command and displays an error message.
You must enter a member number to remove a switch from the cluster. However, you do not need to enter
a member number to add a switch to the cluster. The cluster command switch selects the next available
member number and assigns it to the switch that is joining the cluster.
You must enter the enable password of the candidate switch for authentication when it joins the cluster.
The password is not saved in the running or startup configuration. After a candidate switch becomes a
member of the cluster, its password becomes the same as the cluster command-switch password.
If a switch does not have a configured hostname, the cluster command switch appends a member number
to the cluster command-switch hostname and assigns it to the cluster member switch.
If you do not specify a VLAN ID, the cluster command switch automatically chooses a VLAN and adds
the candidate to the cluster.
ExamplesThis example shows how to add a switch as member 2 with MAC address 00E0.1E00.2222 and the
password key to a cluster. The cluster command switch adds the candidate to the cluster through
VLAN
3.
Switch(config)# cluster member 2 mac-address 00E0.1E00.2222 password key vlan 3
OL-19055-01
Catalyst 2350 Switch Command Reference
2-41
Page 66
cluster member
This example shows how to add a switch with MAC address 00E0.1E00.3333 to the cluster. This switch
does not have a password. The cluster command switch selects the next available member number and
assigns it to the switch that is joining the cluster.
Switch(config)# cluster member mac-address 00E0.1E00.3333
You can verify your settings by entering the show cluster members privileged EXEC command on the
cluster command switch.
Related CommandsCommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the
switch belongs.
show cluster candidatesDisplays a list of candidate switches.
show cluster membersDisplays information about the cluster members.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Catalyst 2350 Switch Command Reference
2-42
OL-19055-01
Page 67
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster outside-interface
Use the cluster outside-interface global configuration command on the a cluster command switch to
configure the outside interface for cluster Network Address Translation (NAT) so that a member without
an IP address can communicate with devices outside the cluster. Use the no form of this command to
return to the default setting.
cluster outside-interface interface-id
no cluster outside-interface
cluster outside-interface
Syntax Description
DefaultsThe default outside interface is automatically selected by the cluster command switch.
Command ModesGlobal configuration
Command History
Usage GuidelinesEnter this command only on the cluster command switch. If you enter this command on a cluster member
ExamplesThis example shows how to set the outside interface to VLAN 1:
interface-idInterface to serve as the outside interface. Valid interfaces include
physical interfaces, port-channels, or VLANs. The port-channel
range is 1 to 48. The VLAN range is 1 to 4094.
ReleaseModification
12.2(46)EYThis command was introduced.
switch, an error message appears.
Switch(config)# cluster outside-interface vlan 1
You can verify your setting by entering the show running-config privileged EXEC command.
Related Commands
OL-19055-01
CommandDescription
show running-configDisplays the operating configuration. For syntax information, use this
link to the Cisco IOS Release 12.2 Command Reference listing page:
Select the Cisco IOS Commands Master List, Release 12.2 to
navigate to the command.
Catalyst 2350 Switch Command Reference
2-43
Page 68
cluster run
cluster run
Use the cluster run global configuration command to enable clustering on a switch. Use the no form of
this command to disable clustering on a switch.
cluster run
no cluster run
Syntax DescriptionThis command has no arguments or keywords.
DefaultsClustering is enabled on all switches.
Command ModesGlobal configuration
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
Usage GuidelinesWhen you enter the no cluster run command on a cluster command switch, the cluster command switch
ExamplesThis example shows how to disable clustering on the cluster command switch:
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
is disabled. Clustering is disabled, and the switch cannot become a candidate switch.
When you enter the no cluster run command on a cluster member switch, it is removed from the cluster.
Clustering is disabled, and the switch cannot become a candidate switch.
When you enter the no cluster run command on a switch that is not part of a cluster, clustering is
disabled on this switch. This switch cannot then become a candidate switch.
Switch(config)# no cluster run
You can verify your setting by entering the show cluster privileged EXEC command.
CommandDescription
show clusterDisplays the cluster status and a summary of the cluster to which the switch
belongs.
Catalyst 2350 Switch Command Reference
2-44
OL-19055-01
Page 69
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster timer
Use the cluster timer global configuration command on the a cluster command switch to set the interval
in seconds between heartbeat messages. Use the no form of this command to set the interval to the
default value.
cluster timer interval-in-secs
no cluster timer
cluster timer
Syntax Description
interval-in-secsInterval in seconds between heartbeat messages. The range is 1 to 300
seconds.
DefaultsThe interval is 8 seconds.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesEnter this command with the cluster holdtime global configuration command only on the cluster
command switch. The cluster command switch propagates the values to all its cluster members so that
the setting is consistent among all switches in the cluster.
The holdtime is typically set as a multiple of the heartbeat interval timer (cluster timer). For example,
it takes (holdtime-in-secs divided by the interval-in-secs) number of heartbeat messages to be missed in
a row to declare a switch down.
ExamplesThis example shows how to change the heartbeat interval timer and the duration on the cluster command
Use the define interface-range global configuration command to create an interface-range macro. Use
the no form of this command to delete the defined macro.
define interface-range macro-name interface-range
no define interface-range macro-name interface-range
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
macro-nameName of the interface-range macro; up to 32 characters.
interface-range Interface range; for valid values for interface ranges, see “Usage Guidelines.”
DefaultsThis command has no default setting.
Command ModesGlobal configuration
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesThe macro name is a 32-character maximum character string.
A macro can contain up to five ranges.
All interfaces in a range must be the same type; that is, all Fast Ethernet ports, all Gigabit Ethernet ports,
all EtherChannel ports, or all VLANs, but you can combine multiple interface types in a macro.
When entering the interface-range, use this format:
•type {first-interface} - {last-interface}
•You must add a space between the first interface number and the hyphen when entering an
interface-range. For example, gigabitethernet 0/1
- 2 is a valid range; gigabitethernet0/1-2 is not
a valid range
Valid values for type and interface:
•vlan vlan-id - vlan-ID, where the VLAN ID is 1 to 4094
VLAN interfaces must have been configured with the interface vlan command (the show running-config privileged EXEC command displays the configured VLAN interfaces). VLAN
interfaces not displayed by the show running-config command cannot be used in interface-ranges.
•port-channel port-channel-number, where port-channel-number is from 1 to 48
Select the Cisco IOS Commands Master List, Release 12.2 to
navigate to the command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-49
Page 74
delete
delete
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the delete privileged EXEC command to delete a file or directory on the flash memory device.
delete [/force] [/recursive] filesystem:/file-url
Syntax Description
Command ModesPrivileged EXEC
Command History
Usage GuidelinesIf you use the /force keyword, you are prompted once at the beginning of the deletion process to confirm
/force(Optional) Suppress the prompt that confirms the deletion.
/recursive(Optional) Delete the named directory and all subdirectories and the files contained in
it.
filesystem:Alias for a flash file system.
The syntax for the local flash file system:
flash:
/file-url The path (directory) and filename to delete.
ReleaseModification
12.2(46)EYThis command was introduced.
the deletion.
If you use the /recursive keyword without the /force keyword, you are prompted to confirm the deletion
of every file.
The prompting behavior depends on the setting of the file prompt global configuration command. By
default, the switch prompts for confirmation on destructive file operations. For more information about
this command, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2.
ExamplesThis example shows how to remove the directory that contains the old software image after a successful
download of a new image:
Switch# delete /force /recursive flash:/old-image
You can verify that the directory was removed by entering the dir filesystem: privileged EXEC
command.
Related Commands
Catalyst 2350 Switch Command Reference
2-50
CommandDescription
archive download-swDownloads a new image to the switch and overwrites or keeps the existing
image.
OL-19055-01
Page 75
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic monitor
Use the diagnostic monitor global configuration command to configure health-monitoring diagnostic
testing. Use the no form of this command to disable testing and to return to the default settings.
no diagnostic monitor interval test {name | test-id | test-id-range | all}
no diagnostic monitor test {name | test-id | test-id-range | all}
no diagnostic monitor syslog
no diagnostic monitor threshold test {name | test-id | test-id-range | all} failure count count
diagnostic monitor
Syntax Description
intervalConfigure the interval between tests.
testSpecify the tests to be run.
nameSpecify the name of the test. For more information, see the “Usage
Guidelines” section.
test-idSpecify the ID number of the test. The range is from 1 to 7. For more
information, see the “Usage Guidelines” section.
test-id-rangeSpecify more than one test with the range of test ID numbers. For more
information, see the “Usage Guidelines” section.
allSpecify all of the diagnostic tests.
hh:mm:ssConfigure the monitoring interval in hours, minutes, and seconds. For
formatting information, see the “Usage Guidelines” section.
millisecondsConfigure the monitoring interval in milliseconds (ms). The range is from
0 to 999
dayConfigure the monitoring interval in the number of days. The range is from
0 to 20 days. For formatting information, see the “Usage Guidelines”
section.
syslogEnable the generation of a syslog message when a health-monitoring test
fails.
thresholdConfigure the failure threshold.
failure count
count
Set the failure threshold count. The range for count is from 0 to 99.
ms.
DefaultsMonitoring is disabled, and a failure threshold value is not set.
Command ModesGlobal configuration
OL-19055-01
Catalyst 2350 Switch Command Reference
2-51
Page 76
diagnostic monitor
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesFollow these guidelines when configuring health-monitoring diagnostic testing:
•name—Enter the show diagnostic content privileged EXEC command to display the test names in
the test ID list.
•test-id—Enter the show diagnostic content command to display the test numbers in the test ID list.
•test-id-range—Enter the show diagnostic content command to display the test numbers in the test
ID list. Enter the range as integers separated by a comma and a hyphen (for example, 1,3-6 specifies
test IDs 1, 3, 4, 5, and 6).
•hh—Enter the hours from 0 to 24.
•mm—Enter the minutes from 0 to 60.
•ss—Enter the seconds from 0 to 60.
•milliseconds—Enter the test time in milliseconds from 0 to 999.
•day—Enter the number of days between test from 0 to 20.
•Enter the diagnostic monitor test 1 command to enable diagnostic monitoring.
You must configure the failure threshold and the interval between tests before enabling diagnostic
monitoring.
When entering the diagnostic monitor switchnumbertest {name | test-id | test-id-range | all}
command, you must isolate network traffic by disabling all connected ports, and do not send test packets
during the test.
ExamplesThis example shows how to configure a health-monitoring test:
show diagnosticDisplays online diagnostic test results.
Catalyst 2350 Switch Command Reference
2-52
OL-19055-01
Page 77
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic schedule
Use the diagnostic schedule global configuration command to configure the diagnostic test schedule. Use
the no form of this command to remove the schedule.
diagnostic schedule test {name | test-id | test-id-range | all | basic | non-disruptive} {daily hh:mm
| on
mmddyyyyhh:mm | weekly day-of-weekhh:mm}
no diagnostic schedule test {name | test-id | test-id-range | all | basic | non-disruptive} {daily
hh:mm | on
diagnostic schedule
mmddyyyyhh:mm | weekly day-of-weekhh:mm}
Syntax Description
DefaultsThis command has no default settings.
test Specify the tests to be scheduled.
nameSpecify the name of the test. For more information, see the “Usage
Guidelines” section.
test-idSpecify the ID number of the test. The range is from 1 to 7. For more
information, see the “Usage Guidelines” section.
test-id-rangeSpecify more than one test with the range of test ID numbers. For more
information, see the “Usage Guidelines” section.
allSpecify all of the diagnostic tests.
basicSpecify the basic on-demand diagnostic tests.
non-disruptiveSpecify the nondisruptive health-monitoring tests.
daily hh:mmSpecify the daily scheduling of the diagnostic tests. For formatting
information, see the “Usage Guidelines” section.
on mm dd yyyy
hh:mm
weekly day-of-week
hh:mm
Specify the scheduling of the diagnostic tests on a specific day and time.
For formatting information, see the “Usage Guidelines” section.
Specify the weekly scheduling of the diagnostic tests. For formatting
information, see the “Usage Guidelines” section.
Command ModesGlobal configuration
Command History
Usage GuidelinesUse these guidelines when scheduling testing:
OL-19055-01
ReleaseModification
12.2(46)EYThis command was introduced.
•name—Enter the show diagnostic content privileged EXEC command to display the test names in
the test ID list.
•test-id—Enter the show diagnostic content command to display the test numbers in the test ID list.
Catalyst 2350 Switch Command Reference
2-53
Page 78
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic schedule
•test-id-range—Enter the show diagnostic content command to display the test numbers in the test
ID list. Enter the range as integers separated by a comma and a hyphen (for example, 1,3-6 specifies
test IDs 1, 3, 4, 5, and 6).
•hh:mm—Enter the time as a 2-digit number (for a 24-hour clock) for hours:minutes; the colon (:) is
required, such as 12:30.
•For mm dd yyyy:
–
mm—Spell out the month, such as January, February, and so on, with upper case or lower case
characters.
–
dd—Enter the day as a 2-digit number, such as 03 or 16.
–
yyyy—Enter the year as a 4-digit number, such as 2006.
•day-of-week—Spell out the day of the week, such as Monday, Tuesday, and so on, with upper case
or lower case characters.
ExamplesThis example shows how to schedule diagnostic testing for a specific day and time:
Switch(config)# diagnostic schedule test 1,2,4-6 on november 3 2006 23:10
This example shows how to schedule diagnostic testing to occur weekly at a specific time on a switch:
Switch(config)# diagnostic schedule test TestPortAsicMem weekly friday 09:23
Related CommandsCommandDescription
show diagnosticDisplays online diagnostic test results.
Catalyst 2350 Switch Command Reference
2-54
OL-19055-01
Page 79
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic start
Use the diagnostic start privileged EXEC command to run an online diagnostic test.
diagnostic start test {name | test-id | test-id-range | all | basic | non-disruptive}
diagnostic start
Syntax Description
testSpecify the tests to run.
nameSpecify the name of a test. For more information, see the “Usage
Guidelines” section.
test-idSpecify the ID number of a test. The range is from 1 to 7. For more
information, see the “Usage Guidelines” section.
test-id-rangeSpecify more than one test with the range of test ID numbers. For more
information, see the “Usage Guidelines” section.
allSpecify all the diagnostic tests.
basicSpecify the basic on-demand diagnostic tests.
non-disruptiveSpecify the nondisruptive health-monitoring tests.
When specifying a test name, use the show diagnostic content privileged EXEC command to display
the test ID list. To specify test 3 by using the test name, enter the diagnostic start switch number test Test Po rt As ic Ca m privileged EXEC command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-55
Page 80
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic start
If specifying more than one test to run, use the test-id-range parameter, and enter integers separated by
a comma and a hyphen. For example, to specify tests 2, 3, and 4, enter the diagnostic startswitch
number test 2-4 command. To specify tests 1, 3, 4, 5, and 6, enter the diagnostic startswitchnumber
test 1,3-6 command.
After starting the tests by using the diagnostic start command, you cannot stop the testing process.
ExamplesThis example shows how to start diagnostic test 1 on the switch:
Switch# diagnostic start test 1
Switch#
06:27:50: %DIAG-6-TEST_RUNNING: Switch: Running TestPortAsicStackPortLoopback{ID=1} ...
(switch-1)
06:27:51: %DIAG-6-TEST_OK: Switch: TestPortAsicStackPortLoopback{ID=1} has completed
successfully
Related CommandsCommandDescription
show diagnosticDisplays online diagnostic test results.
Catalyst 2350 Switch Command Reference
2-56
OL-19055-01
Page 81
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
duplex
Use the duplex interface configuration command to specify the duplex mode of operation for a port. Use
the no form of this command to return the port to its default value.
duplex {auto | full | half}
no duplex
duplex
Syntax Description
DefaultsThe default is auto for Gigabit Ethernet ports.
Command ModesInterface configuration
autoEnable automatic duplex configuration; port automatically detects whether it
should run in full- or half-duplex mode, depending on the attached device mode.
fullEnable full-duplex mode.
halfEnable half-duplex mode (only for interfaces operating at 10 or 100 Mb/s). You
cannot configure half-duplex mode for interfaces operating at 1000 or
10,000
Mb/s.
You cannot configure the duplex mode on 10-Gigabit Ethernet ports; it is always full.
The default is full for the 100BASE- LX small form-factor pluggable (SFP) modules.
The default is half for the 100BASE-FX SFP modules.
Duplex options are not supported on the 1000BASE-x (where -x is -BX, -CWDM, -LX, -SX, or -ZX)
SFP modules.
For information about which SFP modules are supported on your switch, see the product release notes.
Command History
Usage GuidelinesFor Gigabit Ethernet ports, setting the port to auto has the same effect as specifying full if the attached
OL-19055-01
ReleaseModification
12.2(46)EYThis command was introduced.
device does not autonegotiate the duplex parameter.
NoteHalf-duplex mode is supported on Gigabit Ethernet interfaces if the duplex mode is auto and the
connected device is operating at half duplex. However, you cannot configure these interfaces to
operate in half-duplex mode.
Certain ports can be configured to be either full duplex or half duplex. Applicability of this command
depends on the device to which the switch is attached.
Catalyst 2350 Switch Command Reference
2-57
Page 82
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
duplex
If both ends of the line support autonegotiation, we highly recommend using the default autonegotiation
settings. If one interface supports autonegotiation and the other end does not, configure duplex and speed
on both interfaces; do use the auto setting on the supported side.
If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed
setting and then forces the speed setting to the negotiated value. The duplex setting remains as
configured on each end of the link, which could result in a duplex setting mismatch.
You can configure the duplex setting when the speed is set to auto.
CautionChanging the interface speed and duplex mode configuration might shut down and re-enable the
interface during the reconfiguration.
For guidelines on setting the switch speed and duplex parameters, see the “Configuring Interface
Characteristics” chapter in the software configuration guide for this release.
ExamplesThis example shows how to configure an interface for full-duplex operation:
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# duplex full
You can verify your setting by entering the show interfaces privileged EXEC command.
Related CommandsCommandDescription
show interfacesDisplays the interface settings on the switch.
speedSets the speed on a 10/100 or 10/100/1000 Mb/s interface.
Catalyst 2350 Switch Command Reference
2-58
OL-19055-01
Page 83
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
errdisable detect cause
Use the errdisable detect cause global configuration command to enable error-disabled detection for a
specific cause or all causes. Use the no form of this command to disable the error-disabled detection
feature.
For the BPDU guard feature, you can use this command to globally configure the switch to shut down
just the offending VLAN on the port when a violation occurs, instead of shutting down the entire port.
When the per-VLAN error-disable feature is turned off and a BPDU guard violation occurs, the entire
port is disabled. Use the no form of this command to disable the per-VLAN error-disable feature.
errdisable detect cause bpduguard shutdown vlan
no errdisable detect cause bpduguard shutdown vlan
errdisable detect cause
Syntax Description
Command DefaultDetection is enabled for all causes. All causes, except for per-VLAN error disabling, are configured to
allEnable error detection for all error-disabled causes.
bpduguard shutdown vlanEnable per-VLAN error-disable for BPDU guard.
dtp-flapEnable error detection for the Dynamic Trunking Protocol (DTP)
flapping.
gbic-invalidEnable error detection for an invalid Gigabit Interface Converter
(GBIC) module.
NoteThis error refers to an invalid small form-factor pluggable
(SFP) module.
l2ptguardEnable error detection for a Layer 2 protocol-tunnel error-disabled
cause.
link-flapEnable error detection for link-state flapping.
loopbackEnable error detection for detected loopbacks.
pagp-flapEnable error detection for the Port Aggregation Protocol (PAgP) flap
error-disabled cause.
sfp-config-mismatchEnable error detection on an SFP configuration mismatch.
small-frameSee the errdisable detect cause small-frame command.
shut down the entire port.
Command ModesGlobal configuration
OL-19055-01
Catalyst 2350 Switch Command Reference
2-59
Page 84
errdisable detect cause
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesA cause (link-flap, dhcp-rate-limit, and so forth) is the reason for the error-disabled state. When a
cause is detected on an interface, the interface is placed in an error-disabled state, an operational state
that is similar to a link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For the
BPDU guard feature, you can configure the switch to shut down just the offending VLAN on the port
when a violation occurs, instead of shutting down the entire port.
If you set a recovery mechanism for the cause by entering the errdisable recovery global configuration
command for the cause, the interface is brought out of the error-disabled state and allowed to retry the
operation when all causes have timed out. If you do not set a recovery mechanism, you must enter the
shutdown and then the no shutdown commands to manually recover an interface from the
error-disabled state.
ExamplesThis example shows how to enable error-disabled detection for the link-flap error-disabled cause:
Switch(config)# errdisable detect cause link-flap
This command shows how to globally configure BPDU guard for per-VLAN error disable:
Switch(config)# errdisable detect cause bpduguard shutdown vlan
Related Commands
You can verify your setting by entering the show errdisable detect privileged EXEC command.
CommandDescription
show errdisable detectDisplays error-disabled detection information.
show interfaces status err-disabledDisplays interface status or a list of interfaces in the
error-disabled state.
clear errdisable interfaceClears the error-disabled state from a port or VLAN that
was error disabled by the per-VLAN error disable feature.
Catalyst 2350 Switch Command Reference
2-60
OL-19055-01
Page 85
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
errdisable detect cause small-frame
Use the errdisable detect cause small-frame global configuration command to allow any switch port
to be error disabled if incoming VLAN-tagged packets are small frames (67 bytes or less) and arrive at
the minimum configured rate (the threshold). Use the no form of this command to return to the default
setting.
errdisable detect cause small-frame
no errdisable detect cause small-frame
Syntax DescriptionThis command has no arguments or keywords.
DefaultsThis feature is disabled.
errdisable detect cause small-frame
Command ModesGlobal configuration
Command History
Usage GuidelinesThis command globally enables the small-frame arrival feature. Use the small violation-rate interface
ExamplesThis example shows how to enable the switch ports to be put into the error-disabled mode if incoming
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
configuration command to set the threshold for each port.
You can configure the port to be automatically re-enabled by using the errdisable recovery cause
small-frame global configuration command. You configure the recovery time by using the errdisable
recovery interval interval global configuration command.
small frames arrive at the configured threshold:
Switch(config)# errdisable detect cause small-frame
You can verify your setting by entering the show interfaces privileged EXEC command.
CommandDescription
errdisable recovery cause
small-frame
errdisable recovery interval Specifies the time to recover from the specified error-disabled state.
show interfacesDisplays the interface settings on the switch, including input and
small-frame violation rateConfigures the rate (threshold) for incoming small frames to cause a
Enables the recovery timer.
output flow control.
port to be put into the error-disabled state.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-61
Page 86
errdisable recovery
errdisable recovery
Use the errdisable recovery global configuration command to configure the recovery mechanism
variables. Use the no form of this command to return to the default setting.
causeEnable the error-disabled mechanism to recover from a specific cause.
allEnable the timer to recover from all error-disabled causes.
bpduguardEnable the timer to recover from the bridge protocol data unit (BPDU) guard
error-disabled state.
channel-misconfigEnable the timer to recover from the EtherChannel misconfiguration
error-disabled state.
dtp-flapEnable the timer to recover from the Dynamic Trunking Protocol (DTP) flap
error-disabled state.
gbic-invalidEnable the timer to recover from an invalid Gigabit Interface Converter
(GBIC) module error-disabled state.
NoteThis error refers to an invalid small form-factor pluggable (SFP)
error-disabled state.
l2ptguardEnable the timer to recover from a Layer 2 protocol tunnel error-disabled
state.
link-flapEnable the timer to recover from the link-flap error-disabled state.
loopbackEnable the timer to recover from a loopback error-disabled state.
pagp-flapEnable the timer to recover from the Port Aggregation Protocol (PAgP)-flap
error-disabled state.
sfp-config-mismatchEnable error detection on an SFP configuration mismatch.
small-frameSee the errdisable recovery cause small-frame command.
udldEnable the timer to recover from the UniDirectional Link Detection (UDLD)
error-disabled state.
interval intervalSpecify the time to recover from the specified error-disabled state. The range
is 30 to 86400 seconds. The same interval is applied to all causes. The default
interval is 300 seconds.
NoteThe error-disabled recovery timer is initialized at a random
differential from the configured interval value. The difference
between the actual timeout value and the configured value can be up
to 15 percent of the configured interval.
DefaultsRecovery is disabled for all causes.
The default recovery interval is 300 seconds.
Catalyst 2350 Switch Command Reference
2-62
OL-19055-01
Page 87
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command ModesGlobal configuration
errdisable recovery
Command History
ReleaseModification
12.246)EYThis command was introduced.
Usage GuidelinesA cause (all, bpduguard, and so forth) is defined as the reason that the error-disabled state occurred.
When a cause is detected on an interface, the interface is placed in the error-disabled state, an operational
state similar to link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For the
BPDU guard and port-security features, you can configure the switch to shut down just the offending
VLAN on the port when a violation occurs, instead of shutting down the entire port.
If you do not enable the recovery for the cause, the interface stays in the error-disabled state until you
enter the shutdown and the no shutdown interface configuration commands. If you enable the recovery
for a cause, the interface is brought out of the error-disabled state and allowed to retry the operation again
when all the causes have timed out.
Otherwise, you must enter the shutdown and then the no shutdown commands to manually recover an
interface from the error-disabled state.
ExamplesThis example shows how to enable the recovery timer for the BPDU guard error-disabled cause:
Switch(config)# errdisable recovery cause bpduguard
This example shows how to set the timer to 500 seconds:
Switch(config)# errdisable recovery interval 500
Related Commands
You can verify your settings by entering the show errdisable recovery privileged EXEC command.
CommandDescription
show errdisable recoveryDisplays error-disabled recovery timer information.
show interfaces status
err-disabled
Displays interface status or a list of interfaces in error-disabled
state.
clear errdisable interfaceClears the error-disabled state from a port or VLAN that was error
disabled by the per-VLAN error disable feature.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-63
Page 88
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
errdisable recovery cause small-frame
errdisable recovery cause small-frame
Use the errdisable recovery cause small-frame global configuration command to enable the recovery
timer for ports to be automatically re-enabled after they are error disabled by the arrival of small frames.
Use the no form of this command to return to the default setting.
errdisable recovery cause small-frame
no errdisable recovery cause small-frame
Syntax DescriptionThis command has no arguments or keywords.
DefaultsThis feature is disabled.
Command ModesGlobal configuration
Command History
Usage GuidelinesThis command enables the recovery timer for error-disabled ports. You configure the recovery time by
ExamplesThis example shows how to set the recovery timer:
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
using the errdisable recovery interval interval interface configuration command.
Switch(config)# errdisable recovery cause small-frame
You can verify your setting by entering the show interfaces user EXEC command.
CommandDescription
errdisable detect cause small-frameAllows any switch port to be put into the error-disabled
state if an incoming frame is smaller than the configured
minimum size and arrives at the specified rate (threshold).
show interfacesDisplays the interface settings on the switch, including
input and output flow control.
small-frame violation rateConfigures the size for an incoming (small) frame to cause
a port to be put into the error-disabled state.
Catalyst 2350 Switch Command Reference
2-64
OL-19055-01
Page 89
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
exception crashinfo
Use the exception crashinfo global configuration command to configure the switch to create the
extended crashinfo file when the Cisco IOS image fails. Use the no form of this command to disable this
feature.
exception crashinfo
no exception crashinfo
Syntax DescriptionThis command has no arguments or keywords.
DefaultsThe switch creates the extended crashinfo file.
Command ModesGlobal configuration
exception crashinfo
Command History
Usage GuidelinesThe basic crashinfo file includes the Cisco IOS image name and version that failed and a list of the
ExamplesThis example shows how to configure the switch to not create the extended crashinfo file:
Related Commands
ReleaseModification
12.2(46)EYThis command was introduced.
processor registers, and a stack trace. The extended crashinfo file includes additional information that
can help determine the cause of the switch failure.
Use the no exception crashinfo global configuration command to configure the switch to not create the
extended crashinfo file.
Switch(config)# noexception crashinfo
You can verify your settings by entering the show running-config privileged EXEC command.
CommandDescription
show running-configDisplays the operating configuration. For syntax information, use this
link to the Cisco IOS Release 12.2 Command Reference listing page:
Select the Cisco IOS Commands Master List, Release 12.2 to navigate
to the command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-65
Page 90
flowcontrol
flowcontrol
NoteThe switch can receive, but not send, pause frames.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the flowcontrol interface configuration command to set the receive flow-control state for an
interface. When flow control send is operable and on for a device and it detects any congestion at its
end, it notifies the link partner or the remote device of the congestion by sending a pause frame. When
flow control receive is on for a device and it receives a pause frame, it stops sending any data packets.
This prevents any loss of data packets during the congestion period.
Use the receive off keywords to disable flow control.
flowcontrol receive {desired | off | on}
Syntax Description
DefaultsThe default is flowcontrol receive off.
Command ModesInterface configuration
Command History
Usage GuidelinesThe switch does not support sending flow-control pause frames.
receiveSet whether the interface can receive flow-control packets from a remote device.
desiredAllow an interface to operate with an attached device that is required to send
flow-control packets or with an attached device that is not required to but can send
flow-control packets.
offTurn off the ability of an attached device to send flow-control packets to an interface.
onAllow an interface to operate with an attached device that is required to send
flow-control packets or with an attached device that is not required to but can send
flow-control packets.
ReleaseModification
12.2(46)EYThis command was introduced.
Note that the on and desired keywords have the same result.
When you use the flowcontrol command to set a port to control traffic rates during congestion, you are
setting flow control on a port to one of these conditions:
•receive on or desired: The port cannot send pause frames, but can operate with an attached device
that is required to or is able to send pause frames. The port can receive pause frames.
•receive off: Flow control does not operate in either direction. In case of congestion, no indication is
given to the link partner, and no pause frames are sent or received by either device.
Catalyst 2350 Switch Command Reference
2-66
OL-19055-01
Page 91
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Table 2-1 shows the flow control results on local and remote ports for a combination of settings. The
table assumes that receive desired has the same results as using the receive on keywords.
Ta b l e 2-1Flow Control Settings and Local and Remote Port Flow Control Resolution
Flow Control SettingsFlow Control Resolution
Local DeviceRemote DeviceLocal DeviceRemote Device
send off/receive onsend on/receive on
Receives only
Sends and receives
flowcontrol
send on/receive off
send desired/receive on
send desired/receive off
send off/receive on
send off/receive off
send off/receive offsend on/receive on
send on/receive off
send desired/receive on
send desired/receive off
send off/receive on
send off/receive off
Receives only
Receives only
Receives only
Receives only
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Sends only
Sends and receives
Sends only
Receives only
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
ExamplesThis example shows how to configure the local port to not support flow control by the remote port:
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# flowcontrol receive off
You can verify your settings by entering the show interfaces privileged EXEC command.
Related Commands
CommandDescription
show interfacesDisplays the interface settings on the switch, including input and output flow
OL-19055-01
control.
Catalyst 2350 Switch Command Reference
2-67
Page 92
hw-module
hw-module
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the hw-module global configuration command to enable on-board failure logging (OBFL). Use the
no form of this command to disable this feature.
no hw-module module [switch-number] logging onboard [message level]
Syntax Description
DefaultsOBFL is enabled, and all messages appear.
Command ModesGlobal configuration
Command History
Usage GuidelinesWe recommend that you keep OBFL enabled and do not erase the data stored in the flash memory.
switch-numberThe switch number is always 1.
message level
level
ReleaseModification
12.2(46)EYThis command was introduced.
To ensure that the time stamps in the OBFL data logs are accurate, you should manually set the system
clock, or configure it by using Network Time Protocol (NTP).
If you do not enter the message levellevel parameter, all the hardware-related messages generated by
the switch are stored in the flash memory.
(Optional) Specify the severity of the hardware-related messages that are stored in
the flash memory. The range is from 1 to 7.
ExamplesThis example shows how to enable OBFL on a switch and to specify that only severity 1
hardware-related messages are stored in the flash memory of the switch:
You can verify your settings by entering the onboard privileged EXEC command.
Related Commands
Catalyst 2350 Switch Command Reference
2-68
CommandDescription
clear logging onboardRemoves the OBFL data in the flash memory.
onboardDisplays OBFL information.
OL-19055-01
Page 93
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface port-channel
Use the interface port-channel global configuration command to access or create the port-channel
logical interface. Use the no form of this command to remove the port-channel.
interface port-channel port-channel-number
no interface port-channel port-channel-number
interface port-channel
Syntax Description
DefaultsNo port-channel logical interfaces are defined.
Command ModesGlobal configuration
Command History
Usage GuidelinesFor Layer 2 EtherChannels, you do not have to create a port-channel interface first before assigning a
port-channel-numberPort-channel number. The range is 1 to 48.
ReleaseModification
12.2(46)EYThis command was introduced.
physical port to a channel group. Instead, you can use the channel-group interface configuration
command. It automatically creates the port-channel interface when the channel group gets its first
physical port. If you create the port-channel interface first, the channel-group-number can be the same
as the port-channel-number, or you can use a new number. If you use a new number, the channel-group
command dynamically creates a new port channel.
Only one port channel in a channel group is allowed.
Follow these guidelines when you use the interface port-channel command:
•If you want to use the Cisco Discovery Protocol (CDP), you must configure it only on the physical
port and not on the port-channel interface.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the
software configuration guide for this release.
ExamplesThis example shows how to create a port-channel interface with a port channel number of 5:
Switch(config)# interface port-channel 5
You can verify your setting by entering the show running-config privileged EXEC or show
etherchannel channel-group-number detail privileged EXEC command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-69
Page 94
interface port-channel
Related CommandsCommandDescription
channel-groupAssigns an Ethernet port to an EtherChannel group.
show etherchannelDisplays EtherChannel information for a channel.
show running-configDisplays the operating configuration. For syntax information, use this link to
the Cisco IOS Release 12.2 Command Reference listing page:
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to
the command.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Catalyst 2350 Switch Command Reference
2-70
OL-19055-01
Page 95
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface range
Use the interface range global configuration command to enter interface range configuration mode and
to execute a command on multiple ports at the same time. Use the no form of this command to remove
an interface range.
interface range {port-range | macro name}
no interface range {port-range | macro name}
interface range
Syntax Description
DefaultsThis command has no default setting.
Command ModesGlobal configuration
Command History
Usage GuidelinesWhen you enter interface range configuration mode, all interface parameters you enter are attributed to
port-rangePort range. For a list of valid values for port-range, see the “Usage Guidelines”
section.
macronameSpecify the name of a macro.
ReleaseModification
12.2(46)EYThis command was introduced.
all interfaces within the range.
For VLANs, you can use the interface range command only on existing VLAN switch virtual interfaces
(SVIs). To display VLAN SVIs, enter the show running-config privileged EXEC command. VLANs not
displayed cannot be used in the interface range command. The commands entered under interface range command are applied to all existing VLAN SVIs in the range.
All configuration changes made to an interface range are saved to NVRAM, but the interface range itself
is not saved to NVRAM.
You can enter the interface range in two ways:
•Specifying up to five interface ranges
•Specifying a previously defined interface-range macro
All interfaces in a range must be the same type; that is, all Fast Ethernet ports, all Gigabit Ethernet ports,
all EtherChannel ports, or all VLANs. However, you can define up to five interface ranges with a single
command, with each range separated by a comma.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-71
Page 96
interface range
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Valid values for port-range type and interface:
•vlan vlan-ID - vlan-ID, where VLAN ID is from 1 to 4094
•gigabitethernet module/{first port} - {last port}, where module is always 0
•tengigabitethernet module/{first port} - {last port}, where module is always 0
For physical interfaces:
–
module is always 0
–
the range is type 0/number - number (for example, gigabitethernet0/1 - 2)
•port-channel port-channel-number - port-channel-number, where port-channel-number is from 1
to 48
NoteWhen you use the interface range command with port channels, the first and last port
channel number in the range must be active port channels.
When you define a range, you must enter a space between the first entry and the hyphen (-):
interface range gigabitethernet0/1 -2
When you define multiple ranges, you must still enter a space after the first entry and before the
comma
interface range gigabitethernet0/1 - 2, gigabitethernet0/1 - 2
(,):
You cannot specify both a macro and an interface range in the same command.
You can also specify a single interface in port-range. The command is then similar to the interface interface-id global configuration command.
For more information about configuring interface ranges, see the software configuration guide for this
release.
ExamplesThis example shows how to use the interface range command to enter interface-range configuration
mode to apply commands to two ports:
Switch(config)# interface range gigabitethernet0/1 - 2
Switch(config-if-range)#
This example shows how to use a port-range macro macro1 for the same function. The advantage is that
you can reuse macro1 until you delete it.
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to
the command.
interface range
OL-19055-01
Catalyst 2350 Switch Command Reference
2-73
Page 98
interface vlan
interface vlan
Use the interface vlan global configuration command to create or access a dynamic switch virtual
interface (SVI) and to enter interface configuration mode. Use the no form of this command to delete an
SVI.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface vlan vlan-id
no interface vlan vlan-id
Syntax Description
DefaultsThe default VLAN interface is VLAN 1.
Command ModesGlobal configuration
Command History
Usage GuidelinesSVIs are created the first time that you enter the interface vlan vlan-id command for a particular VLAN.
NoteWhen you create an SVI, it does not become active until it is associated with a physical port.
vlan-idVLAN number. The range is 1 to 4094.
ReleaseModification
12.2(46)EYThis command was introduced.
The vlan-id corresponds to the VLAN-tag associated with data frames on an
encapsulated trunk or the VLAN ID configured for an access port.
If you delete an SVI by entering the no interface vlan vlan-id command, the deleted interface is no
longer visible in the output from the show interfaces privileged EXEC command.
ISL or IEEE 802.1Q
NoteYou cannot delete the VLAN 1 interface.
You can re-instate a deleted SVI by entering the interface vlan vlan-id command for the deleted
interface. The interface comes back up, but the previous configuration is gone.
The interrelationship between the number of SVIs configured on a switch and the number of other
features being configured might have an impact on CPU utilization due to hardware limitations. You can
use the sdm prefer global configuration command to reallocate system hardware resources based on
templates and feature tables. For more information, see the
Catalyst 2350 Switch Command Reference
2-74
sdm prefer command.
OL-19055-01
Page 99
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface vlan
ExamplesThis example shows how to create a new SVI with VLAN ID 23 and to enter interface configuration
You can verify your setting by entering the show interfaces and show interfaces vlanvlan-id privileged
EXEC commands.
Related CommandsCommandDescription
show interfaces vlan vlan-idDisplays the administrative and operational status of all
interfaces or the specified VLAN.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-75
Page 100
ip access-group
ip access-group
Use the ip access-group interface configuration command to control access to a Layer 2 interface. Use
the no form of this command to remove all access groups or the specified access group from the
interface.
ip access-group {access-list-number | name} {in}
no ip access-group [access-list-number | name] {in}
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
access-list-numberThe number of the IP access control list (ACL). The range is 1 to 199 or
1300 to 2699.
nameThe name of an IP ACL, specified in the ip access-list global configuration
command.
inSpecify filtering on inbound packets.
DefaultsNo access list is applied to the interface.
Command ModesInterface configuration
Command History
ReleaseModification
12.2(46)EYThis command was introduced.
Usage GuidelinesYou can apply named or numbered standard or extended IP access lists to an interface. To define an
access list by name, use the ip access-list global configuration command. To define a numbered access
list, use the access list global configuration command. You can used numbered standard access lists
ranging from 1 to 99 and 1300 to 1999 or extended access lists ranging from 100 to 199 and 2000
to
2699.
These are limitations for applying an access list to Layer 2 interfaces (port ACLs):
•You can only apply ACLs in the inbound direction; the out keyword is not supported for Layer 2
interfaces.
•You can only apply one IP ACL per interface.
•Layer 2 interfaces Port ACLs do not support logging; if the log keyword is specified in the IP ACL,
it is ignored.
•An IP ACL applied to a Layer 2 interface only filters IP packets.
For standard inbound access lists, after the switch receives a packet, it checks the source address of the
packet against the access list. IP extended access lists can optionally check other fields in the packet,
such as the destination IP address, protocol type, or port numbers. If the access list permits the packet,
the switch continues to process the packet. If the access list denies the packet, the switch discards the
packet. If the specified access list does not exist, all packets are passed.
Catalyst 2350 Switch Command Reference
2-76
OL-19055-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.