Cisco WS-C2350-48TD-S, Catalyst 2350 Command Reference Manual

Page 1
Catalyst 2350 Switch Command Reference
Cisco IOS Release 12.2(46)EY February 2009
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 527-0883
Text Part Number: OL-19055-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Cisco
Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx Cisco
Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Catalyst 2350 Switch Command Reference
©2009 Cisco Systems, Inc. All rights reserved.
Store are service marks; and Access Registrar, Aironet, AsyncOS,
IMPLIED, INCLUDING, WITHOUT
Certified Internetwork Expert logo, Cisco IOS,
logo, LightStream, Linksys, MediaTone,
logo are registered trademarks of
Page 3
CONTENTS
Preface xv
Audience xv
Purpose xv
Conventions xv
Related Publications xvi
Obtaining Documentation and Submitting a Service Request xvii
CHAPTER
CHAPTER
1 Using the Command-Line Interface 1-1
CLI Command Modes 1-1
User EXEC Mode 1-2 Privileged EXEC Mode 1-3 Global Configuration Mode 1-3 Interface Configuration Mode 1-4 config-vlan Mode 1-4 Line Configuration Mode 1-4
2 Catalyst 2350 Switch Cisco IOS Commands 2-1
aaa authorization network 2-1
archive download-sw 2-3
archive tar 2-6
archive upload-sw 2-9
boot config-file 2-11
boot enable-break 2-12
boot helper 2-13
boot helper-config-file 2-14
boot manual 2-15
boot private-config-file 2-16
boot system 2-17
channel-group 2-18
channel-protocol 2-21
class 2-22
class-map 2-24
OL-19055-01
Catalyst 2350 Switch Command Reference
iii
Page 4
Contents
clear eap 2-26
clear errdisable interface 2-27
clear lacp 2-28
clear logging onboard 2-29
clear mac address-table 2-30
clear pagp 2-31
clear spanning-tree counters 2-32
clear spanning-tree detected-protocols 2-33
clear vtp counters 2-34
cluster commander-address 2-35
cluster discovery hop-count 2-37
cluster enable 2-38
cluster holdtime 2-40
cluster member 2-41
cluster outside-interface 2-43
cluster run 2-44
cluster timer 2-45
copy logging onboard 2-46
define interface-range 2-48
delete 2-50
diagnostic monitor 2-51
diagnostic schedule 2-53
diagnostic start 2-55
duplex 2-57
errdisable detect cause 2-59
errdisable detect cause small-frame 2-61
errdisable recovery 2-62
errdisable recovery cause small-frame 2-64
exception crashinfo 2-65
flowcontrol 2-66
hw-module 2-68
interface port-channel 2-69
interface range 2-71
interface vlan 2-74
ip access-group 2-76
Catalyst 2350 Switch Command Reference
iv
OL-19055-01
Page 5
ip address 2-78
ip admission 2-80
ip admission name proxy http 2-81
ip igmp filter 2-82
ip igmp max-groups 2-83
ip igmp profile 2-85
ip igmp snooping 2-87
ip igmp snooping last-member-query-interval 2-89
ip igmp snooping querier 2-91
ip igmp snooping report-suppression 2-93
ip igmp snooping tcn 2-95
ip igmp snooping tcn flood 2-97
ip igmp snooping vlan immediate-leave 2-98
Contents
ip igmp snooping vlan static 2-99
ip ssh 2-101
ipv6 mld snooping 2-103
ipv6 mld snooping last-listener-query-count 2-105
ipv6 mld snooping last-listener-query-interval 2-107
ipv6 mld snooping listener-message-suppression 2-109
ipv6 mld snooping robustness-variable 2-111
ipv6 mld snooping tcn 2-113
ipv6 mld snooping vlan 2-115
lacp port-priority 2-117
lacp system-priority 2-119
link state group 2-121
link state track 2-123
location (global configuration) 2-124
location (interface configuration) 2-126
logging file 2-128
mac address-table aging-time 2-130
mac address-table static 2-131
mac address-table static drop 2-132
match (class-map configuration) 2-134
mdix auto 2-137
mls qos 2-139
OL-19055-01
Catalyst 2350 Switch Command Reference
v
Page 6
Contents
mls qos aggregate-policer 2-141
mls qos cos 2-143
mls qos dscp-mutation 2-145
mls qos map 2-147
mls qos queue-set output buffers 2-151
mls qos queue-set output threshold 2-153
mls qos rewrite ip dscp 2-155
mls qos srr-queue input bandwidth 2-157
mls qos srr-queue input buffers 2-159
mls qos srr-queue input cos-map 2-161
mls qos srr-queue input dscp-map 2-163
mls qos srr-queue input priority-queue 2-165
mls qos srr-queue input threshold 2-167
mls qos srr-queue output cos-map 2-169
mls qos srr-queue output dscp-map 2-171
mls qos trust 2-173
mls qos vlan-based 2-175
monitor session 2-176
pagp learn-method 2-180
pagp port-priority 2-182
police 2-184
police aggregate 2-186
policy-map 2-188
port-channel load-balance 2-191
priority-queue 2-193
queue-set 2-195
radius-server dead-criteria 2-196
radius-server host 2-198
rcommand 2-200
reload 2-202
remote-span 2-203
rmon collection stats 2-205
sdm prefer 2-206
service password-recovery 2-209
service-policy 2-211
Catalyst 2350 Switch Command Reference
vi
OL-19055-01
Page 7
set 2-214
setup 2-216
setup express 2-219
show access-lists 2-221
show archive status 2-224
show boot 2-225
show class-map 2-228
show cluster 2-229
show cluster candidates 2-231
show cluster members 2-233
show controllers cpu-interface 2-235
show controllers ethernet-controller 2-237
show controllers ethernet-controller fastethernet 2-245
Contents
show controllers tcam 2-247
show controllers utilization 2-249
show diagnostic 2-251
show dtp 2-255
show eap 2-257
show env 2-260
show errdisable detect 2-262
show errdisable flap-values 2-264
show errdisable recovery 2-265
show etherchannel 2-267
show fallback profile 2-270
show flowcontrol 2-272
show idprom 2-274
show interfaces 2-276
show interfaces counters 2-285
show interfaces transceivers 2-287
show inventory 2-291
show ip igmp profile 2-292
show ip igmp snooping 2-293
show ip igmp snooping groups 2-296
show ip igmp snooping mrouter 2-298
show ip igmp snooping querier 2-300
OL-19055-01
Catalyst 2350 Switch Command Reference
vii
Page 8
Contents
show ipv6 mld snooping 2-302
show ipv6 mld snooping address 2-304
show ipv6 mld snooping mrouter 2-306
show ipv6 mld snooping querier 2-308
show lacp 2-310
show link state group 2-314
show location 2-316
show mac address-table 2-319
show mac address-table address 2-321
show mac address-table aging-time 2-323
show mac address-table count 2-325
show mac address-table dynamic 2-327
show mac address-table interface 2-329
show mac address-table static 2-331
show mac address-table vlan 2-333
show mls qos 2-335
show mls qos aggregate-policer 2-336
show mls qos input-queue 2-337
show mls qos interface 2-339
show mls qos maps 2-343
show mls qos queue-set 2-346
show mls qos vlan 2-348
show monitor 2-349
show pagp 2-351
show policy-map 2-353
show sdm prefer 2-355
show setup express 2-358
show spanning-tree 2-359
show system mtu 2-365
show udld 2-366
show version 2-369
show vlan 2-371
show vtp 2-375
shutdown 2-379
shutdown vlan 2-380
Catalyst 2350 Switch Command Reference
viii
OL-19055-01
Page 9
small-frame violation rate 2-381
snmp-server enable traps 2-383
snmp-server host 2-386
snmp trap mac-notification 2-390
spanning-tree backbonefast 2-392
spanning-tree bpdufilter 2-393
spanning-tree bpduguard 2-395
spanning-tree cost 2-397
spanning-tree etherchannel guard misconfig 2-399
spanning-tree extend system-id 2-401
spanning-tree guard 2-403
spanning-tree link-type 2-405
spanning-tree loopguard default 2-407
Contents
spanning-tree mode 2-409
spanning-tree mst configuration 2-411
spanning-tree mst cost 2-413
spanning-tree mst forward-time 2-415
spanning-tree mst hello-time 2-416
spanning-tree mst max-age 2-417
spanning-tree mst max-hops 2-418
spanning-tree mst port-priority 2-419
spanning-tree mst pre-standard 2-421
spanning-tree mst priority 2-422
spanning-tree mst root 2-423
spanning-tree port-priority 2-425
spanning-tree portfast (global configuration) 2-427
spanning-tree portfast (interface configuration) 2-430
spanning-tree transmit hold-count 2-432
spanning-tree uplinkfast 2-433
spanning-tree vlan 2-435
speed 2-438
srr-queue bandwidth limit 2-440
srr-queue bandwidth shape 2-442
srr-queue bandwidth share 2-444
switchport access 2-446
OL-19055-01
Catalyst 2350 Switch Command Reference
ix
Page 10
Contents
switchport autostate exclude 2-447
switchport host 2-449
switchport mode 2-450
switchport nonegotiate 2-452
switchport trunk 2-454
system env temperature threshold yellow 2-457
system mtu 2-459
traceroute mac 2-461
traceroute mac ip 2-464
trust 2-466
udld 2-468
udld port 2-470
udld reset 2-472
APPENDIX
vlan (global configuration) 2-473
vtp (global configuration) 2-478
vtp (VLAN configuration) 2-482
A Catalyst 2350 Switch Boot Loader Commands A-1
arp A-2
boot A-3
cat A-5
copy A-6
delete A-7
dir A-8
flash_init A-10
format A-11
fsck A-12
help A-13
memory A-14
mgmt_clr A-16
mgmt_init A-17
mgmt_show A-18
mkdir A-19
more A-20
rename A-21
reset A-22
Catalyst 2350 Switch Command Reference
x
OL-19055-01
Page 11
rmdir A-23
set A-24
type A-27
unset A-28
version A-30
Contents
APPENDIX
B Catalyst 2350 Debug Commands B-1
debug cluster B-2
debug dtp B-4
debug eap B-5
debug etherchannel B-6
debug fastethernet B-7
debug interface B-8
debug ip igmp filter B-9
debug ip igmp max-groups B-10
debug ip igmp snooping B-11
debug lacp B-12
debug matm B-13
debug matm move update B-14
debug monitor B-15
debug nvram B-16
debug pagp B-17
debug platform acl B-18
debug platform cpu-queues B-20
debug platform etherchannel B-22
debug platform frontend-controller B-23
debug platform ip igmp snooping B-24
debug platform led B-26
debug platform matm B-27
debug platform messaging application B-28
debug platform phy B-29
debug platform pm B-31
debug platform port-asic B-33
debug platform qos-acl-tcam B-34
debug platform resource-manager B-35
debug platform snmp B-36
OL-19055-01
Catalyst 2350 Switch Command Reference
xi
Page 12
Contents
debug platform span B-37
debug platform supervisor-asic B-38
debug platform sw-bridge B-39
debug platform tcam-driver B-40
debug platform udld B-42
debug platform vlan B-43
debug pm B-44
debug qos B-46
debug spanning-tree B-47
debug spanning-tree backbonefast B-49
debug spanning-tree bpdu B-50
debug spanning-tree bpdu-opt B-51
debug spanning-tree mstp B-52
APPENDIX
debug spanning-tree switch B-54
debug spanning-tree uplinkfast B-56
debug sw-vlan B-57
debug sw-vlan ifs B-59
debug sw-vlan notification B-60
debug sw-vlan vtp B-61
debug udld B-63
debug vqpc B-65
C Catalyst 2350 Show Platform Commands C-1
show platform acl C-2
show platform dl C-3
show platform etherchannel C-4
show platform forward C-5
show platform frontend-controller C-7
show platform ip igmp snooping C-8
show platform layer4op C-10
show platform mac-address-table C-11
show platform messaging C-12
show platform monitor C-13
show platform pm C-14
show platform port-asic C-15
show platform qos C-20
Catalyst 2350 Switch Command Reference
xii
OL-19055-01
Page 13
show platform resource-manager C-21
show platform snmp counters C-23
show platform spanning-tree synchronization C-24
show platform stp-instance C-25
show platform tcam C-26
show platform vlan C-28
Contents
APPENDIX
I
NDEX
D Acknowledgments for Open-Source Software D-1
OL-19055-01
Catalyst 2350 Switch Command Reference
xiii
Page 14
Contents
Catalyst 2350 Switch Command Reference
xiv
OL-19055-01
Page 15
Audience
Preface
This guide is for the networking professional using the Cisco IOS command-line interface (CLI) to manage the Catalyst 2350 switch, referred to as the switch. Before using this guide, you should have experience working with the Cisco IOS commands and the switch software features. Before using this guide, you should have experience working with the concepts and terminology of Ethernet and local area networking.
Purpose
This guide provides the information that you need about the Layer 2 commands that have been created or changed for use with the Catalyst 2350 switch. For information about the standard Cisco IOS Release selecting Technical Support & Documentation > Documentation > Cisco IOS Software.
This guide does not provide procedures for configuring your switch. For detailed configuration procedures, see the software configuration guide for this release.
This guide does not describe system messages you might encounter. For more information, see the system message guide for this release.
For documentation updates, see the release notes for this release.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Commands and keywords are in boldface text.
Arguments for which you supply values are in italic.
Square brackets ([ ]) means optional elements.
Braces ({}) group required choices, and vertical bars ( | ) separate the alternative elements.
Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
12.2 commands, see the Cisco IOS documentation set available from the Cisco.com home page by
element.
OL-19055-01
Catalyst 2350 Switch Command Reference
xv
Page 16
Interactive examples use these conventions:
Terminal sessions and system displays are in screen font.
Information you enter is in boldface screen font.
Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
Notes, cautions, and warnings use these conventions and symbols:
Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Publications
Preface
These documents provide complete information about the switch and are available from these Cisco.com sites:
http://www.cisco.com/en/US/products/ps10116/tsd_products_support_series_home.html
Note Before installing, configuring, or upgrading the switch, see these documents:
For initial configuration information, see the “Using Express Setup” section in the getting started
guide or the “Configuring the Switch with the CLI-Based Setup Program” appendix in the hardware installation guide.
For device manager requirements, see the “System Requirements” section in the release notes.
For Network Assistant requirements, see the Getting Started with Cisco Network Assistant.
For cluster requirements, see the Release Notes for Cisco Network Assistant.
For upgrade information, see the “Downloading Software” section in the release notes.
For more information, see these documents on Cisco.com.
Release Notes for the Catalyst 2350 Switch
Catalyst 2350 Switch Software Configuration Guide
Catalyst 2350 Switch Command Reference
Catalyst 2350 Switch System Message Guide
Device manager online help (available on the switch)
Catalyst 2350 Switch Hardware Installation Guide
Getting Started Guide for the Catalyst 2350 Switch
Regulatory Compliance and Safety Information for the Catalyst 2350 Switch
Getting Started with Cisco Network Assistant
Release Notes for Cisco Network Assistant
Catalyst 2350 Switch Command Reference
xvi
OL-19055-01
Page 17
Preface
Installation Note for the Catalyst 2350 Switch Power Supply Modules
Installation Note for the Catalyst 2350 Switch Fan Modules
Installation Note for the Cisco TwinGig Converter Module
Cisco 10-Gigabit Ethernet X2 Transceiver Modules Installation Note
Cisco Small Form-Factor Pluggable Modules Installation Notes
These compatibility matrix documents are available from this Cisco.com site:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list. html
Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix
Cisco Digital Optical Monitoring Compatibility Matrix
Cisco Gigabit Ethernet Transceiver Modules Compatibility Matrix
Cisco Small Form-Factor Pluggable Modules Compatibility Matrix
Compatibility Matrix for 1000BASE-T Small Form-Factor Pluggable Modules
For information about the Network Admission Control (NAC) features, see the Network Admission
Control Software Configuration Guide
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s revised Cisco
technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
New in Cisco Product Documentation, which also lists all new and
OL-19055-01
Catalyst 2350 Switch Command Reference
xvii
Page 18
Preface
Catalyst 2350 Switch Command Reference
xviii
OL-19055-01
Page 19
CHAP T ER
1
Using the Command-Line Interface
The Catalyst 2350 switch is supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure software features. You can connect to the switch through the console port or Ethernet management port.
For a complete description of the commands that support these features, see Chapter 2, “Catalyst 2350
Switch Cisco IOS Commands.” For information on the boot loader commands, see Appendix A, “Catalyst 2350 Switch Boot Loader Commands.” For information on the debug commands, see Appendix B, “Catalyst 2350 Debug Commands.” For information on the show platform commands, see Appendix C, “Catalyst 2350 Show Platform Commands.” For more information on Cisco IOS
Release 12.2, see the Cisco IOS Release 12.2 Command Summary.
For task-oriented configuration steps, see the software configuration guide for this release.
In this document, IP refers to IP version 4 (IPv4) unless there is a specific reference to IP version 6 (IPv6).
CLI Command Modes
This section describes the CLI command mode structure. Command modes support specific Cisco IOS commands. For example, the interface interface-id command only works when entered in global configuration mode.
These are the main command modes for the switch:
User EXEC
Privileged EXEC
Global configuration
Interface configuration
Config-vlan
VLAN configuration
Line configuration
OL-19055-01
Catalyst 2350 Switch Command Reference
1-1
Page 20
Chapter 1 Using the Command-Line Interface
CLI Command Modes
Table 1-1 lists the main command modes, how to access each mode, the prompt you see in that mode,
and how to exit that mode. The prompts listed use the default name Switch.
Ta b l e 1-1 Command Modes Summary
Command Mode Access Method Prompt Exit or Access Next Mode
User EXEC This is the first level of access.
Switch>
Enter the logout command.
(For the switch) Change terminal settings, perform basic tasks, and list system information.
Privileged EXEC From user EXEC mode, enter the
enable command.
Global configuration
Interface configuration
From privileged EXEC mode, enter the configure command.
From global configuration mode, specify an interface by entering the interface command followed by an interface identification.
Config-vlan In global configuration mode,
enter the vlan vlan-id command.
Line configuration From global configuration mode,
specify a line by entering the line command.
Switch#
Switch(config)#
Switch(config-if)#
Switch(config-vlan)#
Switch(config-line)#
To enter privileged EXEC mode, enter the enable command.
To exit to user EXEC mode, enter the disable command.
To enter global configuration mode, enter the configure command.
To exit to privileged EXEC mode, enter the exit or end command, or press Ctrl-Z.
To enter interface configuration mode, enter the interface configuration command.
To exit to privileged EXEC mode, enter the end command, or press Ctrl-Z.
To exit to global configuration mode, enter the exit command.
To exit to global configuration mode, enter the exit command.
To return to privileged EXEC mode, enter the end command, or press Ctrl-Z.
To exit to global configuration mode, enter the exit command.
To return to privileged EXEC mode, enter the end command, or press Ctrl-Z.
User EXEC Mode
After you access the device, you are automatically in user EXEC command mode. The EXEC commands available at the user level are a subset of those available at the privileged level. In general, use the user EXEC commands to temporarily change terminal settings, perform basic tests, and list system information.
The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch> ?
Catalyst 2350 Switch Command Reference
1-2
OL-19055-01
Page 21
Chapter 1 Using the Command-Line Interface
Privileged EXEC Mode
Because many of the privileged commands configure operating parameters, privileged access should be password-protected to prevent unauthorized use. The privileged command set includes those commands contained in user EXEC mode, as well as the configure privileged EXEC command through which you access the remaining command modes.
If your system administrator has set a password, you are prompted to enter it before being granted access to privileged EXEC mode. The password does not appear on the screen and is case sensitive.
The privileged EXEC mode prompt is the device name followed by the pound sign (#).
Switch#
Enter the enable command to access privileged EXEC mode:
Switch> enable Switch#
The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch# ?
CLI Command Modes
To return to user EXEC mode, enter the disable privileged EXEC command.
Global Configuration Mode
Global configuration commands apply to features that affect the device as a whole. Use the configure privileged EXEC command to enter global configuration mode. The default is to enter commands from the management console.
When you enter the configure command, a message prompts you for the source of the configuration commands:
Switch# configure Configuring from terminal, memory, or network [terminal]?
You can specify either the terminal or NVRAM as the source of configuration commands.
This example shows you how to access global configuration mode:
Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z.
The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config)# ?
To exit global configuration command mode and to return to privileged EXEC mode, enter the end or exit command, or press Ctrl-Z.
OL-19055-01
Catalyst 2350 Switch Command Reference
1-3
Page 22
CLI Command Modes
Interface Configuration Mode
Interface configuration commands modify the operation of the interface. Interface configuration commands always follow a global configuration command, which defines the interface type.
Use the interface interface-id command to access interface configuration mode. The new prompt means interface configuration mode.
Switch(config-if)#
The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-if)# ?
To exit interface configuration mode and to return to global configuration mode, enter the exit command. To exit interface configuration mode and to return to privileged EXEC mode, enter the end command, or press Ctrl-Z.
config-vlan Mode
Chapter 1 Using the Command-Line Interface
Use this mode to configure normal-range VLANs (VLAN IDs 1 to 1005) or, when VTP mode is transparent, to configure extended-range VLANs (VLAN IDs 1006 to 4094). When VTP mode is transparent, the VLAN and VTP configuration is saved in the running configuration file, and you can save it to the switch startup configuration file by using the copy running-config startup-config privileged EXEC command. The configurations of VLAN IDs 1 to 1005 are saved in the VLAN database if VTP is in transparent or server mode. The extended-range VLAN configurations are not saved in the VLAN database.
Enter the vlan vlan-id global configuration command to access config-vlan mode:
Switch(config)# vlan 2000 Switch(config-vlan)#
The supported keywords can vary but are similar to the commands available in VLAN configuration mode. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-vlan)# ?
For extended-range VLANs, all characteristics except the MTU size must remain at the default setting.
To return to global configuration mode, enter exit; to return to privileged EXEC mode, enter end. All the commands except shutdown take effect when you exit config-vlan mode.
Line Configuration Mode
Line configuration commands modify the operation of a terminal line. Line configuration commands always follow a line command, which defines a line number. Use these commands to change terminal parameter settings line-by-line or for a range of lines.
Use the line vty line_number [ending_line_number] command to enter line configuration mode. The new prompt means line configuration mode. The following example shows how to enter line configuration mode for virtual terminal line
Switch(config)# line vty 0 7
Catalyst 2350 Switch Command Reference
1-4
7:
OL-19055-01
Page 23
Chapter 1 Using the Command-Line Interface
The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.
Switch(config-line)# ?
To exit line configuration mode and to return to global configuration mode, use the exit command. To exit line configuration mode and to return to privileged EXEC mode, enter the end command, or press Ctrl-Z.
CLI Command Modes
OL-19055-01
Catalyst 2350 Switch Command Reference
1-5
Page 24
CLI Command Modes
Chapter 1 Using the Command-Line Interface
Catalyst 2350 Switch Command Reference
1-6
OL-19055-01
Page 25
Catalyst 2350 Switch Cisco IOS Commands
aaa authorization network
Use the aaa authorization network global configuration command to the configure the switch to use user-RADIUS authorization for all network-related service requests, such as VLAN assignment. Use the
no form of this command to disable RADIUS user authorization.
aaa authorization network default group radius
no aaa authorization network default
Syntax Description
default group radius
Use the list of all RADIUS hosts in the server group as the default authorization list.
CHAP T ER
2
Defaults Authorization is disabled.
Command Modes Global configuration
Command History
Usage Guidelines Use the aaa authorization network default group radius global configuration command to allow the
Release Modification
12.2(46)EY This command was introduced.
switch to download authorization parameters from the RADIUS servers in the default authorization list. The authorization parameters are used by features such as VLAN assignment to get parameters from the RADIUS servers.
Use the show running-config privileged EXEC command to display the configured lists of authorization methods.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-1
Page 26
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
aaa authorization network
Examples This example shows how to configure the switch for user RADIUS authorization for all network-related
service requests:
Switch(config)# aaa authorization network default group radius
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands Command Description
show running-config Displays the operating configuration. For syntax information, use this link to
the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_ reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
Catalyst 2350 Switch Command Reference
2-2
OL-19055-01
Page 27
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive download-sw
archive download-sw
Use the archive download-sw privileged EXEC command to download a new image from a TFTP server to the switch and to overwrite or keep the existing image.
archive download-sw [/allow-feature-upgrade | /directory | /force-reload | /imageonly |
/leave-old-sw | /no-set-boot | /no-version-check | /only-system-type system-type | /overwrite | /reload | /safe] source-url1 [source-url2 source-url3 source-url4]
archive download-sw [/allow-feature-upgrade | /directory | /force-reload | /imageonly |
/leave-old-sw | /no-set-boot | /overwrite | /reload | /safe] /directory source-url1 [source-url2
source-url3 source-url4]
Syntax Description /allow-feature-upgrade Allow installation of software images with different feature sets (for
example, upgrade from the IP base feature set to the IP services features set).
/directory Specify a directory for all of the images.
/force-reload Unconditionally force a system reload after successfully downloading the
software image.
/imageonly Download only the software image but not the HTML files associated with
the embedded device manager. The HTML files for the existing version are deleted only if the existing version is being overwritten or removed.
/leave-old-sw Keep the old software version after a successful download.
/no-set-boot Do not alter the setting of the BOOT environment variable to point to the
new software image after it is successfully downloaded.
/overwrite Overwrite the software image in flash memory with the downloaded one.
/reload Reload the system after successfully downloading the image unless the
configuration has been changed and not been saved.
/safe Keep the current software image; do not delete it to make room for the new
software image before the new image is downloaded. The current image is deleted after the download.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-3
Page 28
archive download-sw
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
source-url1 [sourceurl2 sourceurl3 sourceurl4]
The source URLs for the software images.
Enter one source URL for the software image that the switch supports.
The image-name.tar is the software image to download and install on the switch.
These options are supported:
Local flash file system syntax:
flash:
FTP syntax:
ftp:[[//username[:password]@location]/directory]/image-name.tar
HTTP server syntax:
http://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
Secure HTTP server syntax:
https://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
Remote Copy Protocol (RCP) syntax:
rcp:[[//username@location]/directory]/image-name.tar
Secure Copy Protocol (SCP) syntax for the:
scp:[[//username@location]/directory]/image-name.tar
The syntax for the TFTP:
tftp:[[//location]/directory]/image-name.tar
Defaults The current software image is not overwritten with the downloaded image.
Both the software image and HTML files are downloaded.
The new image is downloaded to the flash: file system.
The BOOT environment variable is changed to point to the new software image on the flash: file system.
Image names are case sensitive; the image file is provided in tar format.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Use the /allow-feature-upgrade option to allow installation of an image with a different feature set, for
example, upgrading from the IP base feature set to the IP services feature.
You can use the archive download-sw /directory command to specify a directory only once, followed by a tar file or list of tar files to be downloaded, instead of specifying complete paths with each tar file.
The /imageonly option removes the HTML files for the existing image if the existing image is being removed or replaced. Only the Cisco IOS image (without the HTML files) is downloaded.
Catalyst 2350 Switch Command Reference
2-4
OL-19055-01
Page 29
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive download-sw
Using the /safe or /leave-old-sw option can cause the new image download to fail if there is insufficient flash memory. If leaving the software in place prevents the new image from fitting in flash memory due to space constraints, an error results.
If you used the /leave-old-sw option and did not overwrite the old image when you downloaded the new one, you can remove the old image by using the delete privileged EXEC command. For more information, see the
Use the /overwrite option to overwrite the image on the flash device with the downloaded one.
If you specify the command without the /overwrite option, the download algorithm verifies that the new image is not the same as the one on the switch flash device. If the images are the same, the download does not occur. If the images are different, the old image is deleted, and the new one is downloaded.
After downloading a new image, enter the reload privileged EXEC command to begin using the new image, or specify the /reload or /force-reload option in the archive download-sw command.
Use the /directory option to specify a directory for the images.
Examples This example shows how to download a new image from a TFTP server at 172.20.129.10 and to
overwrite the image on the switch:
Switch# archive download-sw /overwrite tftp://172.20.129.10/test-image.tar
“delete” section on page 2-50.
This example shows how to download only the software image from a TFTP server at 172.20.129.10 to the switch:
Switch# archive download-sw /imageonly tftp://172.20.129.10/test-image.tar
This example shows how to keep the old software version after a successful download:
Switch# archive download-sw /leave-old-sw tftp://172.20.129.10/test-image.tar
This example specifies the location of two tar images without having to specify the path each time:
Switch# archive download-sw tftp://10.1.1.10/
c2350-lanlite-tar.122-46.EY.tar c2350-lanlitek9-tar.122-46.EY.tar
This example specifies the location of three tar images without having to specify the path each time:
Switch# archive download-sw /directory tftp://10.1.1.10/ c2350-lanlite-tar.122-46.EY.tar 2350-lanlitek9-tar.122-46.EY.tar c2350-lanlitek9-mz.122-46.EY.bin
Related Commands Command Description
archive tar Creates a tar file, lists the files in a tar file, or extracts the files from a tar file.
archive upload-sw Uploads an existing image on the switch to a server.
delete Deletes a file or directory on the flash memory device.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-5
Page 30
archive tar
archive tar
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the archive tar privileged EXEC command to create a tar file, list files in a tar file, or extract the files from a tar file.
archive tar {/create destination-url flash:/file-url} | {/table source-url} | {/xtract source-url
flash:/file-url [dir/file...]}
Syntax Description /create destination-url
flash:/file-url
Create a new tar file on the local or network file system.
For destination-url, specify the destination URL alias for the local or network file system and the name of the tar file to create. These options are supported:
The syntax for the local flash filesystem:
flash:
The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/tar-filename.tar
The syntax for an HTTP server:
http://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
The syntax for a secure HTTP server:
https://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
The syntax for the Remote Copy Protocol (RCP):
rcp:[[//username@location]/directory]/tar-filename.tar
The syntax for the TFTP:
tftp:[[//location]/directory]/tar-filename.tar
The tar-filename.tar is the tar file to be created.
For flash:/file-url, specify the location on the local flash file system from which the new tar file is created.
Catalyst 2350 Switch Command Reference
2-6
An optional list of files or directories within the source directory can be specified to write to the new tar file. If none are specified, all files and directories at this level are written to the newly created tar file.
OL-19055-01
Page 31
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
/table source-url Display the contents of an existing tar file to the screen.
archive tar
For source-url, specify the source URL alias for the local or network file system. These options are supported:
The syntax for the local flash file system:
flash:
The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/tar-filename.tar
The syntax for an HTTP server:
http://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
The syntax for a secure HTTP server:
https://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
The syntax for the RCP:
rcp:[[//username@location]/directory]/tar-filename.tar
The syntax for the TFTP:
tftp:[[//location]/directory]/tar-filename.tar
/xtract source-url flash:/file-url [dir/file...]
The tar-filename.tar is the tar file to display.
Extract files from a tar file to the local file system.
For source-url, specify the source URL alias for the local file system. These options are supported:
The syntax for the local flash file system:
flash:
The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/tar-filename.tar
The syntax for an HTTP server:
http://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
The syntax for a secure HTTP server:
https://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
The syntax for the RCP:
rcp:[[//username@location]/directory]/tar-filename.tar
The syntax for the TFTP:
tftp:[[//location]/directory]/tar-filename.tar
The tar-filename.tar is the tar file from which to extract.
For flash:/file-url [dir/file...], specify the location on the local flash file system into which the tar file is extracted. Use the dir/file... option to specify an optional list of files or directories within the tar file to be extracted. If none are specified, all files and directories are extracted.
Defaults There is no default setting.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-7
Page 32
archive tar
Command Modes Privileged EXEC
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Filenames and directory names are case sensitive.
Image names are case sensitive.
Examples This example shows how to create a tar file. The command writes the contents of the new-configs
directory on the local flash device to a file named saved.tar on the TFTP server at 172.20.10.30:
Switch# archive tar /create tftp:172.20.10.30/saved.tar flash:/new-configs
This example shows how to display the contents of the c2350-lanlite-tar.122-46.EY.tar file that is in flash memory. The contents of the tar file appear on the screen:
Switch# archive tar /table flash:c2350-lanlite-tar.122-46.EY.tar info (219 bytes)
c2350-lanlite-tar.122-46.EY.tar/ (directory) c2350-lanlite-tar.122-46.EY.tar(610856 bytes) c2350-lanlite-tar.122-46.EY.tar/info (219 bytes) info.ver (219 bytes)
This example shows how to display only thec2350-lanlite-tar.122-46.EY.tar /html directory and its contents:
Switch# archive tar /table flash:c2350-lanlite-tar.122-46.EY.tar/html c2350-lanlite-tar.122-46.EY.tar/html/ (directory) c2350-lanlite-tar.122-46.EY.tar/html/const.htm (556 bytes) c2350-lanlite-tar.122-46.EY.tar/html/xhome.htm (9373 bytes) c2350-lanlite-tar.122-46.EY.tar/html/menu.css (1654 bytes) <output truncated>
This example shows how to extract the contents of a tar file on the TFTP server at 172.20.10.30. This command extracts just the new-configs directory into the root directory on the local flash file system. The remaining files in the saved.tar file are ignored.
Switch# archive tar /xtract tftp://172.20.10.30/saved.tar flash:/ new-configs
Related Commands
Command Description
archive download-sw Downloads a new image from a TFTP server to the switch.
archive upload-sw Uploads an existing image on the switch to a server.
Catalyst 2350 Switch Command Reference
2-8
OL-19055-01
Page 33
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive upload-sw
Use the archive upload-sw privileged EXEC command to upload an existing switch image to a server.
archive upload-sw [/version version_string] destination-url
archive upload-sw
Syntax Description
/version version_string (Optional) Specify the specific version string of the image to be uploaded.
destination-url The destination URL alias for a local or network file system. The
image-name.tar is the name of software image to be stored on the server.
These options are supported:
Local flash file system syntax:
flash:
FTP syntax:
ftp:[[//username[:password]@location]/directory]/image-name.tar
HTTP server syntax:
http://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
Secure HTTP server syntax:
https://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar
Remote Copy Protocol (RCP) syntax:
rcp:[[//username@location]/directory]/image-name.tar
TFTP syntax:
tftp:[[//location]/directory]/image-name.tar
Defaults Uploads the currently running image from the flash: file system.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Use the upload feature only if the HTML files associated with the embedded device manager have been
installed with the existing image.
The files are uploaded in this sequence: the Cisco IOS image, the HTML files, and info. After these files are uploaded, the software creates the tar file.
Image names are case sensitive.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-9
Page 34
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
archive upload-sw
Examples This example shows how to upload the currently running image to a TFTP server at 172.20.140.2:
Switch# archive upload-sw tftp://172.20.140.2/test-image.tar
Related Commands Command Description
archive download-sw Downloads a new image to the switch.
archive tar Creates a tar file, lists the files in a tar file, or extracts the files from a tar file.
Catalyst 2350 Switch Command Reference
2-10
OL-19055-01
Page 35
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot config-file
Use the boot config-file global configuration command on a standalone switch to specify the filename that Cisco IOS uses to read and write a nonvolatile copy of the system configuration. Use the no form of this command to return to the default setting.
boot config-file flash:/file-url
no boot config-file
boot config-file
Syntax Description
Defaults The default configuration file is flash:config.text.
Command Modes Global configuration
Command History
Usage Guidelines Filenames and directory names are case sensitive.
Related Commands
flash:/file-url The path (directory) and name of the configuration file.
Release Modification
12.2(46)EY This command was introduced.
This command changes the setting of the CONFIG_FILE environment variable. For more information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Command Description
show boot Displays the settings of the boot environment variables.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-11
Page 36
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot enable-break
boot enable-break
Use the boot enable-break global configuration command on a standalone switch to enable interrupting the automatic boot process. Use the no form of this command to return to the default setting.
boot enable-break
no boot enable-break
Syntax Description This command has no arguments or keywords.
Defaults Disabled. The automatic boot process cannot be interrupted by pressing the Break key on the console.
Command Modes Global configuration
Command History
Usage Guidelines When you enter this command, you can interrupt the automatic boot process by pressing the Break key
Note Despite the setting of this command, you can interrupt the automatic boot process at any time by pressing
Related Commands
Release Modification
12.2(46)EY This command was introduced.
on the console after the flash file system is initialized.
the MODE button on the switch front panel.
This command changes the setting of the ENABLE_BREAK environment variable. For more information, see
Command Description
show boot Displays the settings of the boot environment variables.
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Catalyst 2350 Switch Command Reference
2-12
OL-19055-01
Page 37
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot helper
Use the boot helper global configuration command to dynamically load files during boot loader initialization to extend or patch the functionality of the boot loader. Use the no form of this command to return to the default.
boot helper filesystem:/file-url ...
no boot helper
boot helper
Syntax Description
Defaults No helper files are loaded.
Command Modes Global configuration
Command History
Usage Guidelines This variable is used only for internal development and testing.
filesystem: Alias for a flash file system. Use flash: for the system board flash device.
/file-url The path (directory) and a list of loadable files to dynamically load during
loader initialization. Separate each image name with a semicolon.
Release Modification
12.2(46)EY This command was introduced.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER environment variable. For more information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Related Commands
OL-19055-01
Command Description
show boot Displays the settings of the boot environment variables.
Catalyst 2350 Switch Command Reference
2-13
Page 38
boot helper-config-file
boot helper-config-file
Use the boot helper-config-file global configuration command to specify the name of the configuration file to be used by the Cisco IOS helper image. If this is not set, the file specified by the CONFIG_FILE environment variable is used by all versions of Cisco IOS that are loaded. Use the no form of this command to return to the default setting.
boot helper-config-file filesystem:/file-url
no boot helper-config file
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
Defaults No helper configuration file is specified.
Command Modes Global configuration
Command History
Usage Guidelines This variable is used only for internal development and testing.
filesystem: Alias for a flash file system. Use flash: for the system board flash
device.
/file-url The path (directory) and helper configuration file to load.
Release Modification
12.2(46)EY This command was introduced.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER_CONFIG_FILE environment variable. For more information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Related Commands
Catalyst 2350 Switch Command Reference
2-14
Command Description
show boot Displays the settings of the boot environment variables.
OL-19055-01
Page 39
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot manual
Use the boot manual global configuration command on a standalone switch to enable manually booting the switch during the next boot cycle. Use the no form of this command to return to the default setting.
boot manual
no boot manual
Syntax Description This command has no arguments or keywords.
Defaults Manual booting is disabled.
Command Modes Global configuration
boot manual
Command History
Usage Guidelines The next time you reboot the system, the switch is in boot loader mode, which is shown by the switch:
Related Commands
Release Modification
12.2(46)EY This command was introduced.
prompt. To boot up the system, use the boot boot loader command, and specify the name of the bootable image.
This command changes the setting of the MANUAL_BOOT environment variable. For more information, see
Command Description
show boot Displays the settings of the boot environment variables.
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
OL-19055-01
Catalyst 2350 Switch Command Reference
2-15
Page 40
boot private-config-file
boot private-config-file
Use the boot private-config-file global configuration command on a standalone switch to specify the filename that Cisco IOS uses to read and write a nonvolatile copy of the private configuration. Use the
no form of this command to return to the default setting.
boot private-config-file filename
no boot private-config-file
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
Defaults The default configuration file is private-config.
Command Modes Global configuration
Command History
Usage Guidelines Filenames are case sensitive.
Examples This example shows how to specify the name of the private configuration file to be pconfig:
Related Commands
filename The name of the private configuration file.
Release Modification
12.2(46)EY This command was introduced.
Switch(config)# boot private-config-file pconfig
Command Description
show boot Displays the settings of the boot environment variables.
Catalyst 2350 Switch Command Reference
2-16
OL-19055-01
Page 41
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
boot system
Use the boot system global configuration command to specify the Cisco IOS image to load during the next boot cycle. Use the no form of this command to return to the default setting.
boot system {filesystem:/file-url ...}
no boot system
no boot system switch {number | all}
boot system
Syntax Description
Defaults The switch attempts to automatically boot up the system by using information in the BOOT environment
Command Modes Global configuration
Command History
Usage Guidelines Filenames and directory names are case sensitive.
filesystem: Alias for a flash file system. Use flash: for the system board flash device.
/file-url The path (directory) and name of a bootable image. Separate image names
with a semicolon.
variable. If this variable is not set, the switch attempts to load and execute the first executable image it can by performing a recursive, depth-first search throughout the flash file system. In a depth-first search of a directory, each encountered subdirectory is completely searched before continuing the search in the original directory.
Release Modification
12.2(46)EY This command was introduced.
If you enter the boot system filesystem:/file-url command the specified software image is loaded during the next boot cycle.
If you are using the archive download-sw privileged EXEC command to maintain system images, you never need to use the boot system command. The boot system command is automatically manipulated to load the downloaded image.
This command changes the setting of the BOOT environment variable. For more information, see
Appendix A, “Catalyst 2350 Switch Boot Loader Commands.”
Related Commands
OL-19055-01
Command Description
show boot Displays the settings of the boot environment variables.
Catalyst 2350 Switch Command Reference
2-17
Page 42
channel-group
channel-group
Use the channel-group interface configuration command to assign an Ethernet port to an EtherChannel group, to enable an EtherChannel mode, or both. Use the no form of this command to remove an Ethernet port from an EtherChannel group.
channel-group channel-group-number mode {active | {auto [non-silent]} | {desirable
no channel-group
PAgP modes:
On mode:
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
[non-silent]} | on | passive}
channel-group channel-group-number mode {{auto [non-silent]} | {desirable [non-silent}}
channel-group channel-group-number mode on
Syntax Description
channel-group-number Specify the channel group number. The range is 1 to 48.
mode Specify the EtherChannel mode.
active Active mode places a port into a negotiating state in which the port initiates
negotiations with other ports by sending LACP packets. A channel is formed with another port group in either the active or passive mode.
auto Enable the Port Aggregation Protocol (PAgP) only if a PAgP device is
detected.
Auto mode places a port into a passive negotiating state in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. A channel is formed only with another port group in desirable mode. When auto is enabled, silent operation is the default.
desirable Unconditionally enable PAgP.
Desirable mode places a port into an active negotiating state in which the port starts negotiations with other ports by sending PAgP packets. An EtherChannel is formed with another port group that is in the desirable or auto mode. When desirable is enabled, silent operation is the default.
non-silent (Optional) Use in PAgP mode with the auto or desirable keyword when
traffic is expected from the other device.
on Enable on mode.
In on mode, a usable EtherChannel exists only when both connected port groups are in the on mode.
passive Passive mode places a port into a negotiating state in which the port
responds to received LACP packets but does not initiate LACP packet negotiation. A channel is formed only with another port group in active mode.
Defaults No channel groups are assigned.
No mode is configured.
Catalyst 2350 Switch Command Reference
2-18
OL-19055-01
Page 43
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command Modes Interface configuration
channel-group
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines For Layer 2 EtherChannels, you do not have to create a port-channel interface first by using the interface
port-channel global configuration command before assigning a physical port to a channel group.
Instead, you can use the channel-group interface configuration command. It automatically creates the port-channel interface when the channel group gets its first physical port if the logical interface is not already created. If you create the port-channel interface first, the channel-group-number can be the same as the port-channel-number, or you can use a new number. If you use a new number, the channel-group command dynamically creates a new port channel.
You do not have to disable the IP address that is assigned to a physical port that is part of a channel group, but we strongly recommend that you do so.
After you configure an EtherChannel, configuration changes that you make on the port-channel interface apply to all the physical ports assigned to the port-channel interface. Configuration changes applied to the physical port affect only the port where you apply the configuration. To change the parameters of all ports in an EtherChannel, apply configuration commands to the port-channel interface, for example, spanning-tree commands or commands to configure a Layer 2 EtherChannel as a trunk.
If you do not specify non-silent with the auto or desirable mode, silent is assumed. The silent mode is used when the switch is connected to a device that is not PAgP-capable and seldom, if ever, sends packets. A example of a silent partner is a file server or a packet analyzer that is not generating traffic. In this case, running PAgP on a physical port prevents that port from ever becoming operational. However, it allows PAgP to operate, to attach the port to a channel group, and to use the port for transmission. Both ends of the link cannot be set to silent.
In the on mode, an EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode.
Caution You should use care when using the on mode. This is a manual configuration, and ports on both ends of
the EtherChannel must have the same configuration. If the group is misconfigured, packet loss or spanning-tree loops can occur.
Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running PAgP and LACP can coexist on the same switch. Individual EtherChannel groups can run either PAgP or LACP, but they cannot interoperate.
If you set the protocol by using the channel-protocol interface configuration command, the setting is not overridden by the channel-group interface configuration command.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the software configuration guide for this release.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-19
Page 44
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
channel-group
Examples This example shows how to configure an EtherChannel that assigns two static-access ports in VLAN 10
to channel 5 with the PAgP mode desirable:
Switch# configure terminal Switch(config)# interface range gigabitethernet0/1 -2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode desirable Switch(config-if-range)# end
This example shows how to configure an EtherChannel that assigns two static-access ports in VLAN 10 to channel 5 with the LACP mode active:
Switch# configure terminal Switch(config)# interface range gigabitethernet0/1 -2 Switch(config-if-range)# switchport mode access Switch(config-if-range)# switchport access vlan 10 Switch(config-if-range)# channel-group 5 mode active Switch(config-if-range)# end
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands Command Description
channel-protocol Restricts the protocol used on a port to manage channeling.
interface port-channel Accesses or creates the port channel.
show etherchannel Displays EtherChannel information for a channel.
show lacp Displays LACP channel-group information.
show pagp Displays PAgP channel-group information.
show running-config Displays the operating configuration. For syntax information, use
this link to the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_ command_reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
Catalyst 2350 Switch Command Reference
2-20
OL-19055-01
Page 45
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
channel-protocol
Use the channel-protocol interface configuration command to restrict the protocol used on a port to manage channeling. Use the no form of this command to return to the default setting.
channel-protocol {lacp | pagp}
no channel-protocol
channel-protocol
Syntax Description
Defaults No protocol is assigned to the EtherChannel.
Command Modes Interface configuration
Command History
Usage Guidelines Use the channel-protocol command only to restrict a channel to LACP or PAgP. If you set the protocol
lacp Configure an EtherChannel with the Link Aggregation Control Protocol (LACP).
pagp Configure an EtherChannel with the Port Aggregation Protocol (PAgP).
Release Modification
12.2(46)EY This command was introduced.
by using the channel-protocol command, the setting is not overridden by the channel-group interface configuration command.
You must use the channel-group interface configuration command to configure the EtherChannel parameters. The channel-group command also can set the mode for the EtherChannel.
You cannot enable both the PAgP and LACP modes on an EtherChannel group.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
Examples This example shows how to specify LACP as the protocol that manages the EtherChannel:
Switch(config-if)# channel-protocol lacp
You can verify your settings by entering the show etherchannel [channel-group-number] protocol privileged EXEC command.
Related Commands
OL-19055-01
Command Description
channel-group Assigns an Ethernet port to an EtherChannel group.
show etherchannel protocol Displays protocol information the EtherChannel.
Catalyst 2350 Switch Command Reference
2-21
Page 46
class
class
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the class policy-map configuration command to define a traffic classification match criteria (through the police, set, and trust policy-map class configuration commands) for the specified class-map name. Use the no form of this command to delete an existing class map.
class class-map-name
no class class-map-name
Syntax Description
class-map-name Name of the class map.
Defaults No policy map class-maps are defined.
Command Modes Policy-map configuration
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Before using the class command, you must use the policy-map global configuration command to
identify the policy map and to enter policy-map configuration mode. After specifying a policy map, you can configure a policy for new classes or modify a policy for any existing classes in that policy map. You attach the policy map to a port by using the service-policy interface configuration command.
After entering the class command, you enter policy-map class configuration mode, and these configuration commands are available:
exit: exits policy-map class configuration mode and returns to policy-map configuration mode.
no: returns a command to its default setting.
police: defines a policer or aggregate policer for the classified traffic. The policer specifies the
bandwidth limitations and the action to take when the limits are exceeded. For more information, see the
set: specifies a value to be assigned to the classified traffic. For more information, see the set
police and police aggregate policy-map class commands.
command.
trust: defines a trust state for traffic classified with the class or the class-map command. For more
information, see the
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
The class command performs the same function as the class-map global configuration command. Use the class command when a new classification, which is not shared with any other ports, is needed. Use the class-map command when the map is shared among many ports.
Catalyst 2350 Switch Command Reference
2-22
trust command.
OL-19055-01
Page 47
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
class
Examples This example shows how to create a policy map called policy1. When attached to the ingress direction,
it matches all the incoming traffic defined in class1, sets the IP Differentiated Services Code Point (DSCP) to 10, and polices the traffic at an average rate of 1 Mb/s and bursts at 20 KB. Traffic exceeding the profile is marked down to a DSCP value gotten from the policed-DSCP map and then sent.
Switch(config)# policy-map policy1 Switch(config-pmap)# class class1 Switch(config-pmap-c)# set dscp 10 Switch(config-pmap-c)# police 1000000 20000 exceed-action policed-dscp-transmit Switch(config-pmap-c)# exit
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands Command Description
class-map Creates a class map to be used for matching packets to the class whose name
you specify.
police Defines a policer for classified traffic.
policy-map Creates or modifies a policy map that can be attached to multiple ports to
specify a service policy.
set Classifies IP traffic by setting a DSCP or IP-precedence value in the packet.
show policy-map Displays quality of service (QoS) policy maps.
trust Defines a trust state for the traffic classified through the class policy-map
configuration command or the class-map global configuration command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-23
Page 48
class-map
class-map
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the class-map global configuration command to create a class map to be used for matching packets to the class whose name you specify and to enter class-map configuration mode. Use the no form of this command to delete an existing class map and to return to global configuration mode.
class-map [match-all | match-any] class-map-name
no class-map [match-all | match-any] class-map-name
Syntax Description
match-all (Optional) Perform a logical-AND of all matching statements under this class
map. All criteria in the class map must be matched.
match-any (Optional) Perform a logical-OR of the matching statements under this class
map. One or more criteria must be matched.
class-map-name Name of the class map.
Defaults No class maps are defined.
If neither the match-all or match-any keyword is specified, the default is match-all.
Command Modes Global configuration
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Use this command to specify the name of the class for which you want to create or modify class-map
match criteria and to enter class-map configuration mode.
The class-map command and its subcommands are used to define packet classification, marking, and aggregate policing as part of a globally named service policy applied on a per-port basis.
After you are in quality of service (QoS) class-map configuration mode, these configuration commands are available:
description: describes the class map (up to 200 characters). The show class-map privileged EXEC
command displays the description and the name of the class-map.
exit: exits from QoS class-map configuration mode.
match: configures classification criteria. For more information, see the match (class-map
configuration) command.
no: removes a match statement from a class map.
rename: renames the current class map. If you rename a class map with a name that is already used,
the message
Catalyst 2350 Switch Command Reference
A class-map with this name already exists appears.
2-24
OL-19055-01
Page 49
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
class-map
If you enter the match-all or match-any keyword, you can only use it to specify an extended named access control list (ACL) with the match access-group acl-index-or-name class-map configuration command.
To define packet classification on a physical-port basis, only one match command per class map is supported. In this situation, the match-all and match-any keywords are equivalent.
Only one ACL can be configured in a class map. The ACL can have multiple access control entries (ACEs).
Examples This example shows how to configure the class map called class1 with one match criterion, which is an
access list called 103:
Switch(config)# access-list 103 permit ip any any dscp 10 Switch(config)# class-map class1 Switch(config-cmap)# match access-group 103 Switch(config-cmap)# exit
This example shows how to delete the class map class1:
Switch(config)# no class-map class1
You can verify your settings by entering the show class-map privileged EXEC command.
Related Commands Command Description
class Defines a traffic classification match criteria (through the police,
set, and trust policy-map class configuration commands) for the
specified class-map name.
match (class-map
Defines the match criteria to classify traffic.
configuration)
policy-map Creates or modifies a policy map that can be attached to multiple
ports to specify a service policy.
show class-map Displays QoS class maps.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-25
Page 50
clear eap
clear eap
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the clear eap privileged EXEC command to clear Extensible Authentication Protocol (EAP) session information for the switch or for the specified port.
clear eap sessions [credentials name [interface interface-id] | interface interface-id | method
name | transport name] [credentials name | interface interface-id | transport name] ...
Syntax Description
credentials name Clear EAP credential information for the specified profile.
interface interface-id Clear EAP information for the specified interface.
method name Clear EAP information for the specified method.
transport name Clear EAP transport information for the specified lower level.
Defaults No default is defined.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced
Usage Guidelines You can clear all counters by using the clear eap command, or you can clear only the specific
information by using the keywords.
Examples This example shows how to clear all EAP information:
Switch# clear eap
This example shows how to clear EAP-session credential information for the specified profile:
Switch# clear eap sessions credential type1
Related Commands
Command Description
show eap Displays EAP registration and session information for the switch or for
Catalyst 2350 Switch Command Reference
2-26
the specified port
OL-19055-01
Page 51
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
clear errdisable interface
Use the clear errdisable interface privileged EXEC command to re-enable a VLAN that was error disabled.
clear errdisable interface interface-id vlan [vlan-list]
clear errdisable interface
Syntax Description
Command Default No default is defined
Command Modes Privileged EXEC
Command History
Usage Guidelines You can re-enable a port by using the shutdown and no shutdown interface configuration commands,
Examples This example shows how to re-enable all VLANs that were error-disabled on Gigabit Ethernet port 0/2.
vlan list (Optional) Specify a list of VLANs to be re-enabled. If a vlan-list is not
specified, then all VLANs are re-enabled.
Release Modification
12.2(46)EY This command was introduced.
or you can clear error disable for VLANs by using the clear errdisable interface command.
Switch# clear errdisable interface gigabitethernet0/2 vlan
Related Commands
OL-19055-01
Command Description
errdisable detect cause Enables error-disabled detection for a specific cause or all causes.
errdisable recovery Configures the recovery mechanism variables.
show errdisable detect Displays error-disabled detection status.
show errdisable recovery Display error-disabled recovery timer information.
show interfaces status
err-disabled
Displays interface status of a list of interfaces in error-disabled state.
Catalyst 2350 Switch Command Reference
2-27
Page 52
clear lacp
clear lacp
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the clear lacp privileged EXEC command to clear Link Aggregation Control Protocol (LACP) channel-group counters.
clear lacp {channel-group-number counters | counters}
Syntax Description
channel-group-number (Optional) Channel group number. The range is 1 to 48.
counters Clear traffic counters.
Defaults No default is defined.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines You can clear all counters by using the clear lacp counters command, or you can clear only the counters
for the specified channel group by using the clear lacp channel-group-number counters command.
Examples This example shows how to clear all channel-group information:
Switch# clear lacp counters
Related Commands
Catalyst 2350 Switch Command Reference
2-28
This example shows how to clear LACP traffic counters for group 4:
Switch# clear lacp 4 counters
You can verify that the information was deleted by entering the show lacp counters or the show lacp 4 counters privileged EXEC command.
Command Description
show lacp Displays LACP channel-group information.
OL-19055-01
Page 53
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
clear logging onboard
Use the clear logging onboard privileged EXEC command to clear all of the on-board failure logging (OBFL) data except for the uptime and CLI-command information stored in the flash memory.
clear logging onboard
Syntax Description This command has no arguments or keywords.
Defaults No default is defined.
Command Modes Privileged EXEC
clear logging onboard
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines We recommend that you keep OBFL enabled and do not erase the data stored in the flash memory.
Examples This example shows how to clear all the OBFL information except for the uptime and CLI-command
information:
Switch# clear logging onboard Clear logging onboard buffer [confirm]
You can verify that the information was deleted by entering the onboard privileged EXEC command.
Related Commands
Command Description
hw-module module [switch-number] logging onboard Enables OBFL.
onboard Displays OBFL information.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-29
Page 54
clear mac address-table
clear mac address-table
Use the clear mac address-table privileged EXEC command to delete from the MAC address table a specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a particular VLAN. This command also clears the MAC address notification global counters.
clear mac address-table {dynamic [address mac-addr | interface interface-id | vlan vlan-id] |
notification}
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
Defaults No default is defined.
Command Modes Privileged EXEC
Command History
Examples This example shows how to remove a specific MAC address from the dynamic address table:
dynamic Delete all dynamic MAC addresses.
dynamic address
mac-addr
dynamic interface
interface-id
dynamic vlan vlan-id (Optional) Delete all dynamic MAC addresses for the specified VLAN. The
notification Clear the notifications in the history table and reset the counters.
Release Modification
12.2(46)EY This command was introduced.
Switch# clear mac address-table dynamic address 0008.0070.0007
(Optional) Delete the specified dynamic MAC address.
(Optional) Delete all dynamic MAC addresses on the specified physical port or port channel.
range is 1 to 4094.
You can verify that the information was deleted by entering the show mac address-table privileged EXEC command.
Related Commands
Catalyst 2350 Switch Command Reference
2-30
Command Description
show mac address-table Displays the MAC address table static and dynamic entries.
snmp trap mac-notification Enables the Simple Network Management Protocol (SNMP)
MAC address notification trap on a specific interface.
OL-19055-01
Page 55
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
clear pagp
Use the clear pagp privileged EXEC command to clear Port Aggregation Protocol (PAgP) channel-group information.
clear pagp {channel-group-number counters | counters}
clear pagp
Syntax Description
channel-group-number (Optional) Channel group number. The range is 1 to 48.
counters Clear traffic counters.
Defaults No default is defined.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines You can clear all counters by using the clear pagp counters command, or you can clear only the counters
for the specified channel group by using the clear pagp channel-group-number counters command.
Examples This example shows how to clear all channel-group information:
Switch# clear pagp counters
Related Commands
OL-19055-01
This example shows how to clear PAgP traffic counters for group 10:
Switch# clear pagp 10 counters
You can verify that information was deleted by entering the show pagp privileged EXEC command.
Command Description
show pagp Displays PAgP channel-group information.
Catalyst 2350 Switch Command Reference
2-31
Page 56
clear spanning-tree counters
clear spanning-tree counters
Use the clear spanning-tree counters privileged EXEC command to clear the spanning-tree counters.
clear spanning-tree counters [interface interface-id]
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
Defaults No default is defined.
Command Modes Privileged EXEC
Command History
Usage Guidelines If the interface-id is not specified, spanning-tree counters are cleared for all interfaces.
Examples This example shows how to clear spanning-tree counters for all interfaces:
interface interface-id (Optional) Clear all spanning-tree counters on the specified interface. Valid
interfaces include physical ports, VLANs, and port channels. The VLAN range is 1 to 4094. The port-channel range is 1 to 48.
Release Modification
12.2(46)EY This command was introduced.
Switch# clear spanning-tree counters
Related Commands
Catalyst 2350 Switch Command Reference
2-32
Command Description
show spanning-tree Displays spanning-tree state information.
OL-19055-01
Page 57
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
clear spanning-tree detected-protocols
Use the clear spanning-tree detected-protocols privileged EXEC command to restart the protocol migration process (force the renegotiation with neighboring switches) on all interfaces or on the specified interface.
clear spanning-tree detected-protocols [interface interface-id]
clear spanning-tree detected-protocols
Syntax Description
Defaults No default is defined.
Command Modes Privileged EXEC
Command History
Usage Guidelines A switch running the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol or the Multiple
interface interface-id (Optional) Restart the protocol migration process on the specified interface.
Valid interfaces include physical ports, VLANs, and port channels. The VLAN range is 1 to 4094. The port-channel range is 1 to 48.
Release Modification
12.2(46)EY This command was introduced.
Spanning Tree Protocol (MSTP) supports a built-in protocol migration mechanism that enables it to interoperate with legacy IEEE 802.1D switches. If a rapid-PVST+ switch or an MSTP switch receives a legacy IEEE 802.1D configuration bridge protocol data unit (BPDU) with the protocol version set to 0, it sends only IEEE 802.1D BPDUs on that port. A multiple spanning-tree (MST) switch can also detect that a port is at the boundary of a region when it receives a legacy BPDU, an MST BPDU (Version 3) associated with a different region, or a rapid spanning-tree (RST) BPDU (Version 2).
However, the switch does not automatically revert to the rapid-PVST+ or the MSTP mode if it no longer receives IEEE 802.1D BPDUs because it cannot learn whether the legacy switch has been removed from the link unless the legacy switch is the designated switch. Use the clear spanning-tree detected-protocols command in this situation.
Examples This example shows how to restart the protocol migration process on a port:
Switch# clear spanning-tree detected-protocols interface gigabitethernet0/1
Related Commands
OL-19055-01
Command Description
show spanning-tree Displays spanning-tree state information.
spanning-tree link-type Overrides the default link-type setting and enables rapid spanning-tree
changes to the forwarding state.
Catalyst 2350 Switch Command Reference
2-33
Page 58
clear vtp counters
clear vtp counters
Use the clear vtp counters privileged EXEC command to clear the VLAN Trunking Protocol (VTP) and pruning counters.
clear vtp counters
Syntax Description This command has no arguments or keywords.
Defaults No default is defined.
Command Modes Privileged EXEC
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
Examples This example shows how to clear the VTP counters:
Related Commands
Release Modification
12.2(46)EY This command was introduced.
Switch# clear vtp counters
You can verify that information was deleted by entering the show vtp counters privileged EXEC command.
Command Description
show vtp Displays general information about the VTP management domain, status,
and counters.
Catalyst 2350 Switch Command Reference
2-34
OL-19055-01
Page 59
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster commander-address
You do not need to enter this command from a standalone cluster member switch. The cluster command switch automatically provides its MAC address to cluster member switches when these switches join the cluster. The cluster member switch adds this information and other cluster information to its running configuration file. Use the no form of this global configuration command from the cluster member switch console port or Ethernet management port to remove the switch from a cluster only during debugging or recovery procedures.
cluster commander-address mac-address [member number name name]
no cluster commander-address
cluster commander-address
Syntax Description
Defaults The switch is not a member of any cluster.
Command Modes Global configuration
Command History
Usage Guidelines This command is available only on the cluster command switch.
mac-address MAC address of the cluster command switch.
member number (Optional) Number of a configured cluster member switch. The range is 0
to
15.
name name (Optional) Name of the configured cluster up to 31 characters.
Release Modification
12.2(46)EY This command was introduced.
A cluster member can have only one cluster command switch.
The cluster member switch retains the identity of the cluster command switch during a system reload by using the mac-address parameter.
You can enter the no form on a cluster member switch to remove it from the cluster during debugging or recovery procedures. You would normally use this command from the cluster member switch console port or Ethernet management port only when the member has lost communication with the cluster command switch. With normal switch configuration, we recommend that you remove cluster member switches only by entering the no cluster member n global configuration command on the cluster command switch.
When a standby cluster command switch becomes active (becomes the cluster command switch), it removes the cluster commander address line from its configuration.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-35
Page 60
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster commander-address
Examples This is partial sample output from the running configuration of a cluster member.
Switch(config)# show running-configuration
<output truncated>
cluster commander-address 00e0.9bc0.a500 member 4 name my_cluster
<output truncated>
This example shows how to remove a member from the cluster by using the cluster member console.
Switch # configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# no cluster commander-address
You can verify your settings by entering the show cluster privileged EXEC command.
Related Commands Command Description
show cluster Displays the cluster status and a summary of the cluster to which the switch
belongs.
Catalyst 2350 Switch Command Reference
2-36
OL-19055-01
Page 61
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster discovery hop-count
Use the cluster discovery hop-count global configuration command on the cluster command switch to set the hop-count limit for extended discovery of candidate switches. Use the no form of this command to return to the default setting.
cluster discovery hop-count number
no cluster discovery hop-count
cluster discovery hop-count
Syntax Description
Defaults The hop count is set to 3.
Command Modes Global configuration
Command History
Usage Guidelines This command is available only on the cluster command switch. This command does not operate on
number Number of hops from the cluster edge that the cluster command switch limits
the discovery of candidates. The range is 1 to 7.
Release Modification
12.2(46)EY This command was introduced.
cluster member switches.
If the hop count is set to 1, it disables extended discovery. The cluster command switch discovers only candidates that are one hop from the edge of the cluster. The edge of the cluster is the point between the last discovered cluster member switch and the first discovered candidate switch.
Examples This example shows how to set hop count limit to 4. This command is executed on the cluster command
switch.
Switch(config)# cluster discovery hop-count 4
You can verify your setting by entering the show cluster privileged EXEC command.
Related Commands
OL-19055-01
Command Description
show cluster Displays the cluster status and a summary of the cluster to which the
show cluster candidates Displays a list of candidate switches.
switch belongs.
Catalyst 2350 Switch Command Reference
2-37
Page 62
cluster enable
cluster enable
Use the cluster enable global configuration command on a command-capable switch to enable it as the cluster command switch, assign a cluster name, and to optionally assign a member number to it. Use the no form of the command to remove all members and to make the cluster command switch a candidate switch.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster enable name [command-switch-member-number]
no cluster enable
Syntax Description
Defaults The switch is not a cluster command switch.
Command Modes Global configuration
Command History
Usage Guidelines Enter this command on any command-capable switch that is not part of any cluster. This command fails
name Name of the cluster up to 31 characters. Valid characters include
only alphanumerics, dashes, and underscores.
command-switch-member-number (Optional) Assign a member number to the cluster command
switch of the cluster. The range is 0 to 15.
No cluster name is defined.
The member number is 0 when the switch is the cluster command switch.
Release Modification
12.2(46)EY This command was introduced.
if a device is already configured as a member of the cluster.
You must name the cluster when you enable the cluster command switch. If the switch is already configured as the cluster command switch, this command changes the cluster name if it is different from the previous cluster name.
Examples This example shows how to enable the cluster command switch, name the cluster, and set the cluster
command switch member number to 4.
Switch(config)# cluster enable Engineering-IDF4 4
You can verify your setting by entering the show cluster privileged EXEC command on the cluster command switch.
Catalyst 2350 Switch Command Reference
2-38
OL-19055-01
Page 63
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Related Commands Command Description
show cluster Displays the cluster status and a summary of the cluster to which the switch
belongs.
cluster enable
OL-19055-01
Catalyst 2350 Switch Command Reference
2-39
Page 64
cluster holdtime
cluster holdtime
Use the cluster holdtime global configuration command on the cluster command switch to set the duration in seconds before a switch (either the command or cluster member switch) declares the other switch down after not receiving heartbeat messages. Use the no form of this command to set the duration to the default value.
cluster holdtime holdtime-in-secs
no cluster holdtime
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
holdtime-in-secs Duration in seconds before a switch (either a command or cluster member
switch) declares the other switch down. The range is 1 to 300 seconds.
Defaults The default holdtime is 80 seconds.
Command Modes Global configuration
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Enter this command with the cluster timer global configuration command only on the cluster command
switch. The cluster command switch propagates the values to all its cluster members so that the setting is consistent among all switches in the cluster.
The holdtime is typically set as a multiple of the interval timer (cluster timer). For example, it takes (holdtime-in-secs divided by the interval-in-secs) number of heartbeat messages to be missed in a row to declare a switch down.
Examples This example shows how to change the interval timer and the duration on the cluster command switch.
Switch(config)# cluster timer 3 Switch(config)# cluster holdtime 30
You can verify your settings by entering the show cluster privileged EXEC command.
Related Commands
Command Description
show cluster Displays the cluster status and a summary of the cluster to which the switch
Catalyst 2350 Switch Command Reference
2-40
belongs.
OL-19055-01
Page 65
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster member
Use the cluster member global configuration command on the cluster command switch to add candidates to a cluster. Use the no form of the command to remove members from the cluster.
cluster member [n] mac-address H.H.H
no cluster member n
cluster member
Syntax Description
Defaults A newly enabled cluster command switch has no associated cluster members.
Command Modes Global configuration
Command History
Usage Guidelines Enter this command only on the cluster command switch to add a candidate to or remove a member from
n The number that identifies a cluster member. The range is 0 to 15.
mac-address H.H.H MAC address of the cluster member switch in hexadecimal format.
Release Modification
12.2(46)EY This command was introduced.
the cluster. If you enter this command on a switch other than the cluster command switch, the switch rejects the command and displays an error message.
You must enter a member number to remove a switch from the cluster. However, you do not need to enter a member number to add a switch to the cluster. The cluster command switch selects the next available member number and assigns it to the switch that is joining the cluster.
You must enter the enable password of the candidate switch for authentication when it joins the cluster. The password is not saved in the running or startup configuration. After a candidate switch becomes a member of the cluster, its password becomes the same as the cluster command-switch password.
If a switch does not have a configured hostname, the cluster command switch appends a member number to the cluster command-switch hostname and assigns it to the cluster member switch.
If you do not specify a VLAN ID, the cluster command switch automatically chooses a VLAN and adds the candidate to the cluster.
Examples This example shows how to add a switch as member 2 with MAC address 00E0.1E00.2222 and the
password key to a cluster. The cluster command switch adds the candidate to the cluster through VLAN
3.
Switch(config)# cluster member 2 mac-address 00E0.1E00.2222 password key vlan 3
OL-19055-01
Catalyst 2350 Switch Command Reference
2-41
Page 66
cluster member
This example shows how to add a switch with MAC address 00E0.1E00.3333 to the cluster. This switch does not have a password. The cluster command switch selects the next available member number and assigns it to the switch that is joining the cluster.
Switch(config)# cluster member mac-address 00E0.1E00.3333
You can verify your settings by entering the show cluster members privileged EXEC command on the cluster command switch.
Related Commands Command Description
show cluster Displays the cluster status and a summary of the cluster to which the
switch belongs.
show cluster candidates Displays a list of candidate switches.
show cluster members Displays information about the cluster members.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Catalyst 2350 Switch Command Reference
2-42
OL-19055-01
Page 67
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster outside-interface
Use the cluster outside-interface global configuration command on the a cluster command switch to configure the outside interface for cluster Network Address Translation (NAT) so that a member without an IP address can communicate with devices outside the cluster. Use the no form of this command to return to the default setting.
cluster outside-interface interface-id
no cluster outside-interface
cluster outside-interface
Syntax Description
Defaults The default outside interface is automatically selected by the cluster command switch.
Command Modes Global configuration
Command History
Usage Guidelines Enter this command only on the cluster command switch. If you enter this command on a cluster member
Examples This example shows how to set the outside interface to VLAN 1:
interface-id Interface to serve as the outside interface. Valid interfaces include
physical interfaces, port-channels, or VLANs. The port-channel range is 1 to 48. The VLAN range is 1 to 4094.
Release Modification
12.2(46)EY This command was introduced.
switch, an error message appears.
Switch(config)# cluster outside-interface vlan 1
You can verify your setting by entering the show running-config privileged EXEC command.
Related Commands
OL-19055-01
Command Description
show running-config Displays the operating configuration. For syntax information, use this
link to the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_com mand_reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
Catalyst 2350 Switch Command Reference
2-43
Page 68
cluster run
cluster run
Use the cluster run global configuration command to enable clustering on a switch. Use the no form of this command to disable clustering on a switch.
cluster run
no cluster run
Syntax Description This command has no arguments or keywords.
Defaults Clustering is enabled on all switches.
Command Modes Global configuration
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
Usage Guidelines When you enter the no cluster run command on a cluster command switch, the cluster command switch
Examples This example shows how to disable clustering on the cluster command switch:
Related Commands
Release Modification
12.2(46)EY This command was introduced.
is disabled. Clustering is disabled, and the switch cannot become a candidate switch.
When you enter the no cluster run command on a cluster member switch, it is removed from the cluster. Clustering is disabled, and the switch cannot become a candidate switch.
When you enter the no cluster run command on a switch that is not part of a cluster, clustering is disabled on this switch. This switch cannot then become a candidate switch.
Switch(config)# no cluster run
You can verify your setting by entering the show cluster privileged EXEC command.
Command Description
show cluster Displays the cluster status and a summary of the cluster to which the switch
belongs.
Catalyst 2350 Switch Command Reference
2-44
OL-19055-01
Page 69
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
cluster timer
Use the cluster timer global configuration command on the a cluster command switch to set the interval in seconds between heartbeat messages. Use the no form of this command to set the interval to the default value.
cluster timer interval-in-secs
no cluster timer
cluster timer
Syntax Description
interval-in-secs Interval in seconds between heartbeat messages. The range is 1 to 300
seconds.
Defaults The interval is 8 seconds.
Command Modes Global configuration
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Enter this command with the cluster holdtime global configuration command only on the cluster
command switch. The cluster command switch propagates the values to all its cluster members so that the setting is consistent among all switches in the cluster.
The holdtime is typically set as a multiple of the heartbeat interval timer (cluster timer). For example, it takes (holdtime-in-secs divided by the interval-in-secs) number of heartbeat messages to be missed in a row to declare a switch down.
Examples This example shows how to change the heartbeat interval timer and the duration on the cluster command
switch:
Switch(config)# cluster timer 3 Switch(config)# cluster holdtime 30
You can verify your settings by entering the show cluster privileged EXEC command.
Related Commands
Command Description
show cluster Displays the cluster status and a summary of the cluster to which the switch
OL-19055-01
belongs.
Catalyst 2350 Switch Command Reference
2-45
Page 70
copy logging onboard
copy logging onboard
Use the copy logging onboard privileged EXEC command to copy on-board failure logging (OBFL) data to the local network or a specific file system.
copy logging onboard destination
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
destination Specify the location on the local network or file system to which the system
messages are copied.
For destination, specify the destination on the local or network file system and the filename. These options are supported:
The syntax for the local flash file system:
flash[number]:/filename
The syntax for the FTP:
ftp://username:password@host/filename
The syntax for an HTTP server:
http://[[username:password]@]{hostname | host-ip}[/directory]/filename
The syntax for the NVRAM:
nvram:/filename
The syntax for the null file system:
null:/filename
The syntax for the Remote Copy Protocol (RCP):
rcp://username@host/filename
The syntax for the switch file system:
system:filename
The syntax for the temporary file system:
tmpsys:/filename
The syntax for the TFTP:
tftp:[[//location]/directory]/filename
Defaults This command has no default setting.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced.
Catalyst 2350 Switch Command Reference
2-46
OL-19055-01
Page 71
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
copy logging onboard
Usage Guidelines For information about OBFL, see the hw-module command.
Examples This example shows how to copy the OBFL data messages to the obfl_file file on the flash file system:
Switch# copy logging onboard flash:obfl_file OBFL copy successful Switch#
Related Commands Command Description
hw-module module [switch-number] logging onboard Enables OBFL.
onboard Displays OBFL information.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-47
Page 72
define interface-range
define interface-range
Use the define interface-range global configuration command to create an interface-range macro. Use the no form of this command to delete the defined macro.
define interface-range macro-name interface-range
no define interface-range macro-name interface-range
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
macro-name Name of the interface-range macro; up to 32 characters.
interface-range Interface range; for valid values for interface ranges, see “Usage Guidelines.”
Defaults This command has no default setting.
Command Modes Global configuration
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines The macro name is a 32-character maximum character string.
A macro can contain up to five ranges.
All interfaces in a range must be the same type; that is, all Fast Ethernet ports, all Gigabit Ethernet ports, all EtherChannel ports, or all VLANs, but you can combine multiple interface types in a macro.
When entering the interface-range, use this format:
type {first-interface} - {last-interface}
You must add a space between the first interface number and the hyphen when entering an
interface-range. For example, gigabitethernet 0/1
- 2 is a valid range; gigabitethernet0/1-2 is not
a valid range
Valid values for type and interface:
vlan vlan-id - vlan-ID, where the VLAN ID is 1 to 4094
VLAN interfaces must have been configured with the interface vlan command (the show running-config privileged EXEC command displays the configured VLAN interfaces). VLAN interfaces not displayed by the show running-config command cannot be used in interface-ranges.
port-channel port-channel-number, where port-channel-number is from 1 to 48
gigabitethernet module/{first port} - {last port}
tengigabitethernet module/{first port} - {last port}
Catalyst 2350 Switch Command Reference
2-48
OL-19055-01
Page 73
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
For physical interfaces:
module is always 0.
the range is type 0/number - number (for example, gigabitethernet 0/1 - 2).
When you define a range, you must enter a space before the hyphen (-), for example:
gigabitethernet0/1 - 2
You can also enter multiple ranges. When you define multiple ranges, you must enter a space after the first entry before the comma
gigabitethernet0/3, gigabitethernet0/1 - 2
gigabitethernet0/3 -4, tengigabitethernet0/1 - 2
Examples This example shows how to create a multiple-interface macro:
Switch(config)# define interface-range macro1 gigabitethernet0/1 - 2, gigabitethernet0/5
- 7, tengigabitethernet0/1 - 2
(,). The space after the comma is optional, for example:
define interface-range
Related Commands Command Description
interface range Executes a command on multiple ports at the same time.
show running-config Displays the operating configuration. For syntax information, use this
link to the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_com mand_reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-49
Page 74
delete
delete
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the delete privileged EXEC command to delete a file or directory on the flash memory device.
delete [/force] [/recursive] filesystem:/file-url
Syntax Description
Command Modes Privileged EXEC
Command History
Usage Guidelines If you use the /force keyword, you are prompted once at the beginning of the deletion process to confirm
/force (Optional) Suppress the prompt that confirms the deletion.
/recursive (Optional) Delete the named directory and all subdirectories and the files contained in
it.
filesystem: Alias for a flash file system.
The syntax for the local flash file system:
flash:
/file-url The path (directory) and filename to delete.
Release Modification
12.2(46)EY This command was introduced.
the deletion.
If you use the /recursive keyword without the /force keyword, you are prompted to confirm the deletion of every file.
The prompting behavior depends on the setting of the file prompt global configuration command. By default, the switch prompts for confirmation on destructive file operations. For more information about this command, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2.
Examples This example shows how to remove the directory that contains the old software image after a successful
download of a new image:
Switch# delete /force /recursive flash:/old-image
You can verify that the directory was removed by entering the dir filesystem: privileged EXEC command.
Related Commands
Catalyst 2350 Switch Command Reference
2-50
Command Description
archive download-sw Downloads a new image to the switch and overwrites or keeps the existing
image.
OL-19055-01
Page 75
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic monitor
Use the diagnostic monitor global configuration command to configure health-monitoring diagnostic testing. Use the no form of this command to disable testing and to return to the default settings.
diagnostic monitor interval test {name | test-id | test-id-range | all} hh:mm:ss milliseconds day
diagnostic monitor test {name | test-id | test-id-range | all}
diagnostic monitor syslog
diagnostic monitor threshold test {name | test-id | test-id-range | all} failure count count
no diagnostic monitor interval test {name | test-id | test-id-range | all}
no diagnostic monitor test {name | test-id | test-id-range | all}
no diagnostic monitor syslog
no diagnostic monitor threshold test {name | test-id | test-id-range | all} failure count count
diagnostic monitor
Syntax Description
interval Configure the interval between tests.
test Specify the tests to be run.
name Specify the name of the test. For more information, see the “Usage
Guidelines” section.
test-id Specify the ID number of the test. The range is from 1 to 7. For more
information, see the “Usage Guidelines” section.
test-id-range Specify more than one test with the range of test ID numbers. For more
information, see the “Usage Guidelines” section.
all Specify all of the diagnostic tests.
hh:mm:ss Configure the monitoring interval in hours, minutes, and seconds. For
formatting information, see the “Usage Guidelines” section.
milliseconds Configure the monitoring interval in milliseconds (ms). The range is from
0 to 999
day Configure the monitoring interval in the number of days. The range is from
0 to 20 days. For formatting information, see the “Usage Guidelines” section.
syslog Enable the generation of a syslog message when a health-monitoring test
fails.
threshold Configure the failure threshold.
failure count
count
Set the failure threshold count. The range for count is from 0 to 99.
ms.
Defaults Monitoring is disabled, and a failure threshold value is not set.
Command Modes Global configuration
OL-19055-01
Catalyst 2350 Switch Command Reference
2-51
Page 76
diagnostic monitor
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines Follow these guidelines when configuring health-monitoring diagnostic testing:
name—Enter the show diagnostic content privileged EXEC command to display the test names in
the test ID list.
test-id—Enter the show diagnostic content command to display the test numbers in the test ID list.
test-id-range—Enter the show diagnostic content command to display the test numbers in the test
ID list. Enter the range as integers separated by a comma and a hyphen (for example, 1,3-6 specifies test IDs 1, 3, 4, 5, and 6).
hh—Enter the hours from 0 to 24.
mm—Enter the minutes from 0 to 60.
ss—Enter the seconds from 0 to 60.
milliseconds—Enter the test time in milliseconds from 0 to 999.
day—Enter the number of days between test from 0 to 20.
Enter the diagnostic monitor test 1 command to enable diagnostic monitoring.
You must configure the failure threshold and the interval between tests before enabling diagnostic monitoring.
When entering the diagnostic monitor switch number test {name | test-id | test-id-range | all} command, you must isolate network traffic by disabling all connected ports, and do not send test packets during the test.
Examples This example shows how to configure a health-monitoring test:
Switch(config)# diagnostic monitor threshold switch 2 test 1 failure count 20 Switch(config)# diagnostic monitor interval switch 2 test 1 12:30:00 750 5
Related Commands
Command Description
show diagnostic Displays online diagnostic test results.
Catalyst 2350 Switch Command Reference
2-52
OL-19055-01
Page 77
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic schedule
Use the diagnostic schedule global configuration command to configure the diagnostic test schedule. Use the no form of this command to remove the schedule.
diagnostic schedule test {name | test-id | test-id-range | all | basic | non-disruptive} {daily hh:mm
| on
mm dd yyyy hh:mm | weekly day-of-week hh:mm}
no diagnostic schedule test {name | test-id | test-id-range | all | basic | non-disruptive} {daily
hh:mm | on
diagnostic schedule
mm dd yyyy hh:mm | weekly day-of-week hh:mm}
Syntax Description
Defaults This command has no default settings.
test Specify the tests to be scheduled.
name Specify the name of the test. For more information, see the “Usage
Guidelines” section.
test-id Specify the ID number of the test. The range is from 1 to 7. For more
information, see the “Usage Guidelines” section.
test-id-range Specify more than one test with the range of test ID numbers. For more
information, see the “Usage Guidelines” section.
all Specify all of the diagnostic tests.
basic Specify the basic on-demand diagnostic tests.
non-disruptive Specify the nondisruptive health-monitoring tests.
daily hh:mm Specify the daily scheduling of the diagnostic tests. For formatting
information, see the “Usage Guidelines” section.
on mm dd yyyy hh:mm
weekly day-of-week hh:mm
Specify the scheduling of the diagnostic tests on a specific day and time. For formatting information, see the “Usage Guidelines” section.
Specify the weekly scheduling of the diagnostic tests. For formatting information, see the “Usage Guidelines” section.
Command Modes Global configuration
Command History
Usage Guidelines Use these guidelines when scheduling testing:
OL-19055-01
Release Modification
12.2(46)EY This command was introduced.
name—Enter the show diagnostic content privileged EXEC command to display the test names in
the test ID list.
test-id—Enter the show diagnostic content command to display the test numbers in the test ID list.
Catalyst 2350 Switch Command Reference
2-53
Page 78
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic schedule
test-id-range—Enter the show diagnostic content command to display the test numbers in the test
ID list. Enter the range as integers separated by a comma and a hyphen (for example, 1,3-6 specifies test IDs 1, 3, 4, 5, and 6).
hh:mm—Enter the time as a 2-digit number (for a 24-hour clock) for hours:minutes; the colon (:) is
required, such as 12:30.
For mm dd yyyy:
mm—Spell out the month, such as January, February, and so on, with upper case or lower case characters.
dd—Enter the day as a 2-digit number, such as 03 or 16.
yyyy—Enter the year as a 4-digit number, such as 2006.
day-of-week—Spell out the day of the week, such as Monday, Tuesday, and so on, with upper case
or lower case characters.
Examples This example shows how to schedule diagnostic testing for a specific day and time:
Switch(config)# diagnostic schedule test 1,2,4-6 on november 3 2006 23:10
This example shows how to schedule diagnostic testing to occur weekly at a specific time on a switch:
Switch(config)# diagnostic schedule test TestPortAsicMem weekly friday 09:23
Related Commands Command Description
show diagnostic Displays online diagnostic test results.
Catalyst 2350 Switch Command Reference
2-54
OL-19055-01
Page 79
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic start
Use the diagnostic start privileged EXEC command to run an online diagnostic test.
diagnostic start test {name | test-id | test-id-range | all | basic | non-disruptive}
diagnostic start
Syntax Description
test Specify the tests to run.
name Specify the name of a test. For more information, see the “Usage
Guidelines” section.
test-id Specify the ID number of a test. The range is from 1 to 7. For more
information, see the “Usage Guidelines” section.
test-id-range Specify more than one test with the range of test ID numbers. For more
information, see the “Usage Guidelines” section.
all Specify all the diagnostic tests.
basic Specify the basic on-demand diagnostic tests.
non-disruptive Specify the nondisruptive health-monitoring tests.
Defaults This command has no default setting.
Command Modes Privileged EXEC
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines The switch supports these tests:
ID Test Name [On-Demand Test Attributes]
--- ------------------------------------------­1 TestPortAsicStackPortLoopback [B*N****] 2 TestPortAsicLoopback [B*D*R**] 3 TestPortAsicCam [B*D*R**] 4 TestPortAsicRingLoopback [B*D*R**] 5 TestMicRingLoopback [B*D*R**] 6 TestPortAsicMem [B*D*R**] 7 TestInlinePwrCtlr [B*D*R**]
--- -------------------------------------------
When specifying a test name, use the show diagnostic content privileged EXEC command to display the test ID list. To specify test 3 by using the test name, enter the diagnostic start switch number test Test Po rt As ic Ca m privileged EXEC command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-55
Page 80
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
diagnostic start
If specifying more than one test to run, use the test-id-range parameter, and enter integers separated by a comma and a hyphen. For example, to specify tests 2, 3, and 4, enter the diagnostic start switch
number test 2-4 command. To specify tests 1, 3, 4, 5, and 6, enter the diagnostic start switch number test 1,3-6 command.
After starting the tests by using the diagnostic start command, you cannot stop the testing process.
Examples This example shows how to start diagnostic test 1 on the switch:
Switch# diagnostic start test 1 Switch# 06:27:50: %DIAG-6-TEST_RUNNING: Switch: Running TestPortAsicStackPortLoopback{ID=1} ... (switch-1) 06:27:51: %DIAG-6-TEST_OK: Switch: TestPortAsicStackPortLoopback{ID=1} has completed successfully
Related Commands Command Description
show diagnostic Displays online diagnostic test results.
Catalyst 2350 Switch Command Reference
2-56
OL-19055-01
Page 81
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
duplex
Use the duplex interface configuration command to specify the duplex mode of operation for a port. Use the no form of this command to return the port to its default value.
duplex {auto | full | half}
no duplex
duplex
Syntax Description
Defaults The default is auto for Gigabit Ethernet ports.
Command Modes Interface configuration
auto Enable automatic duplex configuration; port automatically detects whether it
should run in full- or half-duplex mode, depending on the attached device mode.
full Enable full-duplex mode.
half Enable half-duplex mode (only for interfaces operating at 10 or 100 Mb/s). You
cannot configure half-duplex mode for interfaces operating at 1000 or 10,000
Mb/s.
You cannot configure the duplex mode on 10-Gigabit Ethernet ports; it is always full.
The default is full for the 100BASE- LX small form-factor pluggable (SFP) modules.
The default is half for the 100BASE-FX SFP modules.
Duplex options are not supported on the 1000BASE-x (where -x is -BX, -CWDM, -LX, -SX, or -ZX) SFP modules.
For information about which SFP modules are supported on your switch, see the product release notes.
Command History
Usage Guidelines For Gigabit Ethernet ports, setting the port to auto has the same effect as specifying full if the attached
OL-19055-01
Release Modification
12.2(46)EY This command was introduced.
device does not autonegotiate the duplex parameter.
Note Half-duplex mode is supported on Gigabit Ethernet interfaces if the duplex mode is auto and the
connected device is operating at half duplex. However, you cannot configure these interfaces to operate in half-duplex mode.
Certain ports can be configured to be either full duplex or half duplex. Applicability of this command depends on the device to which the switch is attached.
Catalyst 2350 Switch Command Reference
2-57
Page 82
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
duplex
If both ends of the line support autonegotiation, we highly recommend using the default autonegotiation settings. If one interface supports autonegotiation and the other end does not, configure duplex and speed on both interfaces; do use the auto setting on the supported side.
If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed setting and then forces the speed setting to the negotiated value. The duplex setting remains as configured on each end of the link, which could result in a duplex setting mismatch.
You can configure the duplex setting when the speed is set to auto.
Caution Changing the interface speed and duplex mode configuration might shut down and re-enable the
interface during the reconfiguration.
For guidelines on setting the switch speed and duplex parameters, see the “Configuring Interface Characteristics” chapter in the software configuration guide for this release.
Examples This example shows how to configure an interface for full-duplex operation:
Switch(config)# interface gigabitethernet0/1 Switch(config-if)# duplex full
You can verify your setting by entering the show interfaces privileged EXEC command.
Related Commands Command Description
show interfaces Displays the interface settings on the switch.
speed Sets the speed on a 10/100 or 10/100/1000 Mb/s interface.
Catalyst 2350 Switch Command Reference
2-58
OL-19055-01
Page 83
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
errdisable detect cause
Use the errdisable detect cause global configuration command to enable error-disabled detection for a specific cause or all causes. Use the no form of this command to disable the error-disabled detection feature.
errdisable detect cause {all | bpduguard | dtp-flap | gbic-invalid | l2ptguard |link-flap |
loopback | pagp-flap | sfp-config-mismatch | small-frame}
no errdisable detect cause {all | bpduguard |dtp-flap | gbic-invalid | l2ptguard |link-flap |
loopback | pagp-flap | sfp-config-mismatch | small-frame}
For the BPDU guard feature, you can use this command to globally configure the switch to shut down just the offending VLAN on the port when a violation occurs, instead of shutting down the entire port.
When the per-VLAN error-disable feature is turned off and a BPDU guard violation occurs, the entire port is disabled. Use the no form of this command to disable the per-VLAN error-disable feature.
errdisable detect cause bpduguard shutdown vlan
no errdisable detect cause bpduguard shutdown vlan
errdisable detect cause
Syntax Description
Command Default Detection is enabled for all causes. All causes, except for per-VLAN error disabling, are configured to
all Enable error detection for all error-disabled causes.
bpduguard shutdown vlan Enable per-VLAN error-disable for BPDU guard.
dtp-flap Enable error detection for the Dynamic Trunking Protocol (DTP)
flapping.
gbic-invalid Enable error detection for an invalid Gigabit Interface Converter
(GBIC) module.
Note This error refers to an invalid small form-factor pluggable
(SFP) module.
l2ptguard Enable error detection for a Layer 2 protocol-tunnel error-disabled
cause.
link-flap Enable error detection for link-state flapping.
loopback Enable error detection for detected loopbacks.
pagp-flap Enable error detection for the Port Aggregation Protocol (PAgP) flap
error-disabled cause.
sfp-config-mismatch Enable error detection on an SFP configuration mismatch.
small-frame See the errdisable detect cause small-frame command.
shut down the entire port.
Command Modes Global configuration
OL-19055-01
Catalyst 2350 Switch Command Reference
2-59
Page 84
errdisable detect cause
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines A cause (link-flap, dhcp-rate-limit, and so forth) is the reason for the error-disabled state. When a
cause is detected on an interface, the interface is placed in an error-disabled state, an operational state that is similar to a link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For the BPDU guard feature, you can configure the switch to shut down just the offending VLAN on the port when a violation occurs, instead of shutting down the entire port.
If you set a recovery mechanism for the cause by entering the errdisable recovery global configuration command for the cause, the interface is brought out of the error-disabled state and allowed to retry the operation when all causes have timed out. If you do not set a recovery mechanism, you must enter the shutdown and then the no shutdown commands to manually recover an interface from the error-disabled state.
Examples This example shows how to enable error-disabled detection for the link-flap error-disabled cause:
Switch(config)# errdisable detect cause link-flap
This command shows how to globally configure BPDU guard for per-VLAN error disable:
Switch(config)# errdisable detect cause bpduguard shutdown vlan
Related Commands
You can verify your setting by entering the show errdisable detect privileged EXEC command.
Command Description
show errdisable detect Displays error-disabled detection information.
show interfaces status err-disabled Displays interface status or a list of interfaces in the
error-disabled state.
clear errdisable interface Clears the error-disabled state from a port or VLAN that
was error disabled by the per-VLAN error disable feature.
Catalyst 2350 Switch Command Reference
2-60
OL-19055-01
Page 85
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
errdisable detect cause small-frame
Use the errdisable detect cause small-frame global configuration command to allow any switch port to be error disabled if incoming VLAN-tagged packets are small frames (67 bytes or less) and arrive at the minimum configured rate (the threshold). Use the no form of this command to return to the default setting.
errdisable detect cause small-frame
no errdisable detect cause small-frame
Syntax Description This command has no arguments or keywords.
Defaults This feature is disabled.
errdisable detect cause small-frame
Command Modes Global configuration
Command History
Usage Guidelines This command globally enables the small-frame arrival feature. Use the small violation-rate interface
Examples This example shows how to enable the switch ports to be put into the error-disabled mode if incoming
Related Commands
Release Modification
12.2(46)EY This command was introduced.
configuration command to set the threshold for each port.
You can configure the port to be automatically re-enabled by using the errdisable recovery cause
small-frame global configuration command. You configure the recovery time by using the errdisable recovery interval interval global configuration command.
small frames arrive at the configured threshold:
Switch(config)# errdisable detect cause small-frame
You can verify your setting by entering the show interfaces privileged EXEC command.
Command Description
errdisable recovery cause small-frame
errdisable recovery interval Specifies the time to recover from the specified error-disabled state.
show interfaces Displays the interface settings on the switch, including input and
small-frame violation rate Configures the rate (threshold) for incoming small frames to cause a
Enables the recovery timer.
output flow control.
port to be put into the error-disabled state.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-61
Page 86
errdisable recovery
errdisable recovery
Use the errdisable recovery global configuration command to configure the recovery mechanism variables. Use the no form of this command to return to the default setting.
errdisable recovery {cause {all | bpduguard | channel-misconfig | dtp-flap | gbic-invalid |
l2ptguard | link-flap | loopback | pagp-flap | sfp-mismatch | small-frame | udld}} | {interval
interval}
no errdisable recovery {cause {all | bpduguard | channel-misconfig | dtp-flap | gbic-invalid |
l2ptguard | link-flap | loopback | pagp-flap | sfp-mismatch | small-frame | udld}}| {interval
interval}
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
cause Enable the error-disabled mechanism to recover from a specific cause.
all Enable the timer to recover from all error-disabled causes.
bpduguard Enable the timer to recover from the bridge protocol data unit (BPDU) guard
error-disabled state.
channel-misconfig Enable the timer to recover from the EtherChannel misconfiguration
error-disabled state.
dtp-flap Enable the timer to recover from the Dynamic Trunking Protocol (DTP) flap
error-disabled state.
gbic-invalid Enable the timer to recover from an invalid Gigabit Interface Converter
(GBIC) module error-disabled state.
Note This error refers to an invalid small form-factor pluggable (SFP)
error-disabled state.
l2ptguard Enable the timer to recover from a Layer 2 protocol tunnel error-disabled
state.
link-flap Enable the timer to recover from the link-flap error-disabled state.
loopback Enable the timer to recover from a loopback error-disabled state.
pagp-flap Enable the timer to recover from the Port Aggregation Protocol (PAgP)-flap
error-disabled state.
sfp-config-mismatch Enable error detection on an SFP configuration mismatch.
small-frame See the errdisable recovery cause small-frame command.
udld Enable the timer to recover from the UniDirectional Link Detection (UDLD)
error-disabled state.
interval interval Specify the time to recover from the specified error-disabled state. The range
is 30 to 86400 seconds. The same interval is applied to all causes. The default interval is 300 seconds.
Note The error-disabled recovery timer is initialized at a random
differential from the configured interval value. The difference between the actual timeout value and the configured value can be up to 15 percent of the configured interval.
Defaults Recovery is disabled for all causes.
The default recovery interval is 300 seconds.
Catalyst 2350 Switch Command Reference
2-62
OL-19055-01
Page 87
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Command Modes Global configuration
errdisable recovery
Command History
Release Modification
12.246)EY This command was introduced.
Usage Guidelines A cause (all, bpduguard, and so forth) is defined as the reason that the error-disabled state occurred.
When a cause is detected on an interface, the interface is placed in the error-disabled state, an operational state similar to link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For the BPDU guard and port-security features, you can configure the switch to shut down just the offending VLAN on the port when a violation occurs, instead of shutting down the entire port.
If you do not enable the recovery for the cause, the interface stays in the error-disabled state until you enter the shutdown and the no shutdown interface configuration commands. If you enable the recovery for a cause, the interface is brought out of the error-disabled state and allowed to retry the operation again when all the causes have timed out.
Otherwise, you must enter the shutdown and then the no shutdown commands to manually recover an interface from the error-disabled state.
Examples This example shows how to enable the recovery timer for the BPDU guard error-disabled cause:
Switch(config)# errdisable recovery cause bpduguard
This example shows how to set the timer to 500 seconds:
Switch(config)# errdisable recovery interval 500
Related Commands
You can verify your settings by entering the show errdisable recovery privileged EXEC command.
Command Description
show errdisable recovery Displays error-disabled recovery timer information.
show interfaces status
err-disabled
Displays interface status or a list of interfaces in error-disabled state.
clear errdisable interface Clears the error-disabled state from a port or VLAN that was error
disabled by the per-VLAN error disable feature.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-63
Page 88
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
errdisable recovery cause small-frame
errdisable recovery cause small-frame
Use the errdisable recovery cause small-frame global configuration command to enable the recovery timer for ports to be automatically re-enabled after they are error disabled by the arrival of small frames. Use the no form of this command to return to the default setting.
errdisable recovery cause small-frame
no errdisable recovery cause small-frame
Syntax Description This command has no arguments or keywords.
Defaults This feature is disabled.
Command Modes Global configuration
Command History
Usage Guidelines This command enables the recovery timer for error-disabled ports. You configure the recovery time by
Examples This example shows how to set the recovery timer:
Related Commands
Release Modification
12.2(46)EY This command was introduced.
using the errdisable recovery interval interval interface configuration command.
Switch(config)# errdisable recovery cause small-frame
You can verify your setting by entering the show interfaces user EXEC command.
Command Description
errdisable detect cause small-frame Allows any switch port to be put into the error-disabled
state if an incoming frame is smaller than the configured minimum size and arrives at the specified rate (threshold).
show interfaces Displays the interface settings on the switch, including
input and output flow control.
small-frame violation rate Configures the size for an incoming (small) frame to cause
a port to be put into the error-disabled state.
Catalyst 2350 Switch Command Reference
2-64
OL-19055-01
Page 89
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
exception crashinfo
Use the exception crashinfo global configuration command to configure the switch to create the extended crashinfo file when the Cisco IOS image fails. Use the no form of this command to disable this feature.
exception crashinfo
no exception crashinfo
Syntax Description This command has no arguments or keywords.
Defaults The switch creates the extended crashinfo file.
Command Modes Global configuration
exception crashinfo
Command History
Usage Guidelines The basic crashinfo file includes the Cisco IOS image name and version that failed and a list of the
Examples This example shows how to configure the switch to not create the extended crashinfo file:
Related Commands
Release Modification
12.2(46)EY This command was introduced.
processor registers, and a stack trace. The extended crashinfo file includes additional information that can help determine the cause of the switch failure.
Use the no exception crashinfo global configuration command to configure the switch to not create the extended crashinfo file.
Switch(config)# no exception crashinfo
You can verify your settings by entering the show running-config privileged EXEC command.
Command Description
show running-config Displays the operating configuration. For syntax information, use this
link to the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_comma nd_reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-65
Page 90
flowcontrol
flowcontrol
Note The switch can receive, but not send, pause frames.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the flowcontrol interface configuration command to set the receive flow-control state for an interface. When flow control send is operable and on for a device and it detects any congestion at its end, it notifies the link partner or the remote device of the congestion by sending a pause frame. When flow control receive is on for a device and it receives a pause frame, it stops sending any data packets. This prevents any loss of data packets during the congestion period.
Use the receive off keywords to disable flow control.
flowcontrol receive {desired | off | on}
Syntax Description
Defaults The default is flowcontrol receive off.
Command Modes Interface configuration
Command History
Usage Guidelines The switch does not support sending flow-control pause frames.
receive Set whether the interface can receive flow-control packets from a remote device.
desired Allow an interface to operate with an attached device that is required to send
flow-control packets or with an attached device that is not required to but can send flow-control packets.
off Turn off the ability of an attached device to send flow-control packets to an interface.
on Allow an interface to operate with an attached device that is required to send
flow-control packets or with an attached device that is not required to but can send flow-control packets.
Release Modification
12.2(46)EY This command was introduced.
Note that the on and desired keywords have the same result.
When you use the flowcontrol command to set a port to control traffic rates during congestion, you are setting flow control on a port to one of these conditions:
receive on or desired: The port cannot send pause frames, but can operate with an attached device
that is required to or is able to send pause frames. The port can receive pause frames.
receive off: Flow control does not operate in either direction. In case of congestion, no indication is
given to the link partner, and no pause frames are sent or received by either device.
Catalyst 2350 Switch Command Reference
2-66
OL-19055-01
Page 91
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Table 2-1 shows the flow control results on local and remote ports for a combination of settings. The
table assumes that receive desired has the same results as using the receive on keywords.
Ta b l e 2-1 Flow Control Settings and Local and Remote Port Flow Control Resolution
Flow Control Settings Flow Control Resolution
Local Device Remote Device Local Device Remote Device
send off/receive on send on/receive on
Receives only
Sends and receives
flowcontrol
send on/receive off
send desired/receive on
send desired/receive off
send off/receive on
send off/receive off
send off/receive off send on/receive on
send on/receive off
send desired/receive on
send desired/receive off
send off/receive on
send off/receive off
Receives only
Receives only
Receives only
Receives only
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Sends only
Sends and receives
Sends only
Receives only
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Does not send or receive
Examples This example shows how to configure the local port to not support flow control by the remote port:
Switch(config)# interface gigabitethernet0/1 Switch(config-if)# flowcontrol receive off
You can verify your settings by entering the show interfaces privileged EXEC command.
Related Commands
Command Description
show interfaces Displays the interface settings on the switch, including input and output flow
OL-19055-01
control.
Catalyst 2350 Switch Command Reference
2-67
Page 92
hw-module
hw-module
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Use the hw-module global configuration command to enable on-board failure logging (OBFL). Use the no form of this command to disable this feature.
hw-module module [switch-number] logging onboard [message level level]
no hw-module module [switch-number] logging onboard [message level]
Syntax Description
Defaults OBFL is enabled, and all messages appear.
Command Modes Global configuration
Command History
Usage Guidelines We recommend that you keep OBFL enabled and do not erase the data stored in the flash memory.
switch-number The switch number is always 1.
message level
level
Release Modification
12.2(46)EY This command was introduced.
To ensure that the time stamps in the OBFL data logs are accurate, you should manually set the system clock, or configure it by using Network Time Protocol (NTP).
If you do not enter the message level level parameter, all the hardware-related messages generated by the switch are stored in the flash memory.
(Optional) Specify the severity of the hardware-related messages that are stored in the flash memory. The range is from 1 to 7.
Examples This example shows how to enable OBFL on a switch and to specify that only severity 1
hardware-related messages are stored in the flash memory of the switch:
Switch(config)# hw-module module 1 logging onboard message level 1
You can verify your settings by entering the onboard privileged EXEC command.
Related Commands
Catalyst 2350 Switch Command Reference
2-68
Command Description
clear logging onboard Removes the OBFL data in the flash memory.
onboard Displays OBFL information.
OL-19055-01
Page 93
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface port-channel
Use the interface port-channel global configuration command to access or create the port-channel logical interface. Use the no form of this command to remove the port-channel.
interface port-channel port-channel-number
no interface port-channel port-channel-number
interface port-channel
Syntax Description
Defaults No port-channel logical interfaces are defined.
Command Modes Global configuration
Command History
Usage Guidelines For Layer 2 EtherChannels, you do not have to create a port-channel interface first before assigning a
port-channel-number Port-channel number. The range is 1 to 48.
Release Modification
12.2(46)EY This command was introduced.
physical port to a channel group. Instead, you can use the channel-group interface configuration command. It automatically creates the port-channel interface when the channel group gets its first physical port. If you create the port-channel interface first, the channel-group-number can be the same as the port-channel-number, or you can use a new number. If you use a new number, the channel-group command dynamically creates a new port channel.
Only one port channel in a channel group is allowed.
Follow these guidelines when you use the interface port-channel command:
If you want to use the Cisco Discovery Protocol (CDP), you must configure it only on the physical
port and not on the port-channel interface.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the software configuration guide for this release.
Examples This example shows how to create a port-channel interface with a port channel number of 5:
Switch(config)# interface port-channel 5
You can verify your setting by entering the show running-config privileged EXEC or show etherchannel channel-group-number detail privileged EXEC command.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-69
Page 94
interface port-channel
Related Commands Command Description
channel-group Assigns an Ethernet port to an EtherChannel group.
show etherchannel Displays EtherChannel information for a channel.
show running-config Displays the operating configuration. For syntax information, use this link to
the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command _reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Catalyst 2350 Switch Command Reference
2-70
OL-19055-01
Page 95
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface range
Use the interface range global configuration command to enter interface range configuration mode and to execute a command on multiple ports at the same time. Use the no form of this command to remove an interface range.
interface range {port-range | macro name}
no interface range {port-range | macro name}
interface range
Syntax Description
Defaults This command has no default setting.
Command Modes Global configuration
Command History
Usage Guidelines When you enter interface range configuration mode, all interface parameters you enter are attributed to
port-range Port range. For a list of valid values for port-range, see the “Usage Guidelines”
section.
macro name Specify the name of a macro.
Release Modification
12.2(46)EY This command was introduced.
all interfaces within the range.
For VLANs, you can use the interface range command only on existing VLAN switch virtual interfaces (SVIs). To display VLAN SVIs, enter the show running-config privileged EXEC command. VLANs not displayed cannot be used in the interface range command. The commands entered under interface range command are applied to all existing VLAN SVIs in the range.
All configuration changes made to an interface range are saved to NVRAM, but the interface range itself is not saved to NVRAM.
You can enter the interface range in two ways:
Specifying up to five interface ranges
Specifying a previously defined interface-range macro
All interfaces in a range must be the same type; that is, all Fast Ethernet ports, all Gigabit Ethernet ports, all EtherChannel ports, or all VLANs. However, you can define up to five interface ranges with a single command, with each range separated by a comma.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-71
Page 96
interface range
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Valid values for port-range type and interface:
vlan vlan-ID - vlan-ID, where VLAN ID is from 1 to 4094
gigabitethernet module/{first port} - {last port}, where module is always 0
tengigabitethernet module/{first port} - {last port}, where module is always 0
For physical interfaces:
module is always 0
the range is type 0/number - number (for example, gigabitethernet0/1 - 2)
port-channel port-channel-number - port-channel-number, where port-channel-number is from 1
to 48
Note When you use the interface range command with port channels, the first and last port
channel number in the range must be active port channels.
When you define a range, you must enter a space between the first entry and the hyphen (-):
interface range gigabitethernet0/1 -2
When you define multiple ranges, you must still enter a space after the first entry and before the comma
interface range gigabitethernet0/1 - 2, gigabitethernet0/1 - 2
(,):
You cannot specify both a macro and an interface range in the same command.
You can also specify a single interface in port-range. The command is then similar to the interface interface-id global configuration command.
For more information about configuring interface ranges, see the software configuration guide for this release.
Examples This example shows how to use the interface range command to enter interface-range configuration
mode to apply commands to two ports:
Switch(config)# interface range gigabitethernet0/1 - 2 Switch(config-if-range)#
This example shows how to use a port-range macro macro1 for the same function. The advantage is that you can reuse macro1 until you delete it.
Switch(config)# define interface-range macro1 gigabitethernet0/1 - 2 Switch(config)# interface range macro macro1 Switch(config-if-range)#
Catalyst 2350 Switch Command Reference
2-72
OL-19055-01
Page 97
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Related Commands Command Description
define interface-range Creates an interface range macro.
show running-config Displays the operating configuration. For syntax information, use this link to
the Cisco IOS Release 12.2 Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_ reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.
interface range
OL-19055-01
Catalyst 2350 Switch Command Reference
2-73
Page 98
interface vlan
interface vlan
Use the interface vlan global configuration command to create or access a dynamic switch virtual interface (SVI) and to enter interface configuration mode. Use the no form of this command to delete an SVI.
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface vlan vlan-id
no interface vlan vlan-id
Syntax Description
Defaults The default VLAN interface is VLAN 1.
Command Modes Global configuration
Command History
Usage Guidelines SVIs are created the first time that you enter the interface vlan vlan-id command for a particular VLAN.
Note When you create an SVI, it does not become active until it is associated with a physical port.
vlan-id VLAN number. The range is 1 to 4094.
Release Modification
12.2(46)EY This command was introduced.
The vlan-id corresponds to the VLAN-tag associated with data frames on an encapsulated trunk or the VLAN ID configured for an access port.
If you delete an SVI by entering the no interface vlan vlan-id command, the deleted interface is no longer visible in the output from the show interfaces privileged EXEC command.
ISL or IEEE 802.1Q
Note You cannot delete the VLAN 1 interface.
You can re-instate a deleted SVI by entering the interface vlan vlan-id command for the deleted interface. The interface comes back up, but the previous configuration is gone.
The interrelationship between the number of SVIs configured on a switch and the number of other features being configured might have an impact on CPU utilization due to hardware limitations. You can use the sdm prefer global configuration command to reallocate system hardware resources based on templates and feature tables. For more information, see the
Catalyst 2350 Switch Command Reference
2-74
sdm prefer command.
OL-19055-01
Page 99
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
interface vlan
Examples This example shows how to create a new SVI with VLAN ID 23 and to enter interface configuration
mode:
Switch(config)# interface vlan 23 Switch(config-if)#
You can verify your setting by entering the show interfaces and show interfaces vlan vlan-id privileged EXEC commands.
Related Commands Command Description
show interfaces vlan vlan-id Displays the administrative and operational status of all
interfaces or the specified VLAN.
OL-19055-01
Catalyst 2350 Switch Command Reference
2-75
Page 100
ip access-group
ip access-group
Use the ip access-group interface configuration command to control access to a Layer 2 interface. Use the no form of this command to remove all access groups or the specified access group from the interface.
ip access-group {access-list-number | name} {in}
no ip access-group [access-list-number | name] {in}
Chapter 2 Catalyst 2350 Switch Cisco IOS Commands
Syntax Description
access-list-number The number of the IP access control list (ACL). The range is 1 to 199 or
1300 to 2699.
name The name of an IP ACL, specified in the ip access-list global configuration
command.
in Specify filtering on inbound packets.
Defaults No access list is applied to the interface.
Command Modes Interface configuration
Command History
Release Modification
12.2(46)EY This command was introduced.
Usage Guidelines You can apply named or numbered standard or extended IP access lists to an interface. To define an
access list by name, use the ip access-list global configuration command. To define a numbered access list, use the access list global configuration command. You can used numbered standard access lists ranging from 1 to 99 and 1300 to 1999 or extended access lists ranging from 100 to 199 and 2000 to
2699.
These are limitations for applying an access list to Layer 2 interfaces (port ACLs):
You can only apply ACLs in the inbound direction; the out keyword is not supported for Layer 2
interfaces.
You can only apply one IP ACL per interface.
Layer 2 interfaces Port ACLs do not support logging; if the log keyword is specified in the IP ACL,
it is ignored.
An IP ACL applied to a Layer 2 interface only filters IP packets.
For standard inbound access lists, after the switch receives a packet, it checks the source address of the packet against the access list. IP extended access lists can optionally check other fields in the packet, such as the destination IP address, protocol type, or port numbers. If the access list permits the packet, the switch continues to process the packet. If the access list denies the packet, the switch discards the packet. If the specified access list does not exist, all packets are passed.
Catalyst 2350 Switch Command Reference
2-76
OL-19055-01
Loading...