U Show Commands. Cisco Nexus 9000 Series NX-OS Command Reference (Show Commands), Release 6.1(2)I2(2) 1
|
|
- Kristin Rodgers
- 5 years ago
- Views:
Transcription
1 show udld, page 2 show udld global, page 7 show udld neighbors, page 8 show ulib process, page 10 show user-account, page 11 show username keypair, page 12 show users, page 13 1
2 show udld show udld show udld [ if0 ] [ readonly TABLE_interface interface mib-port-status mib-oper-status mib-aggresive-mode admin-port-mode operational-port-mode current-bidirectional-state current-operational-state message-interval timeout-interval no-multiple-neighbor-detected TABLE_entry entry-number expiration-time device-id neighbor-state device-name port-id neighbor-echo-device-number neighbor-echo-device-name neighbor-echo-port-number neighbor-echo-port-id neighbor-message-interval neighbor-timeout-interval cdp-device-name pkt-xmt-rec-time pc-index] Syntax Description show udld if0 readonly TABLE_interface interface mib-port-status mib-oper-status Show running system information UDLD status and configuration on one or all interfaces Type: interface Enter an interface name if only one single interface status is desired Type: interface Interface ID Port MIB enable status enabled value: 1 udld is enabled on this port disabled value: 2 udld is disabled on this port Port MIB Operational status shutdown value: 1 this port status is shutdown indeterminant value: 2 this port status is indeterminant bidirectional value: 3 this port status is bidirectional notapplicable value: 4 this port status is not applicable 2
3 show udld mib-aggresive-mode Port MIB aggresive mode enabled value: 1 Aggresive mode is enabled on this port disabled value: 2 Aggresive mode is disabled on this port admin-port-mode Port enable administration configuration setting unknown value: 0 udld status unknown enabled value: 1 udld is enabled on this port disabled value: 2 udld is disabled on this port enabled-aggressive value: 3 udld is enabled with aggressive mode this port device-default value: 4 udld follows device default on this port operational-port-mode Port enable operational state enabled value: 1 udld is enabled on this port disabled value: 2 udld is disabled on this port enabled-aggressive value: 3 udld is enabled w/ aggresive mode on this port 3
4 show udld current-bidirectional-state Current bidirectional state unknown value: 0 Neighbor status unknown unidirectional value: 1 Neighbor status is unidirectional bidirectional value: 2 Neighbor status is bidirectional txrxloop value: 3 Neighbor status is in tx-rx loop mismatch value: 4 Mismatch with neighbor state reported echoempty value: 5 Neighbors echo is empty current-operational-state Current operational state link-up value: 0 Neighbor status is unidirectional link-down value: 1 Neighbor status is bidirectional detection value: 2 Neighbor status is in tx-rx loop advertisement value: 3 Mismatch with neighbor state reported disable-port value: 4 Neighbors echo is empty disable-link-up value: 5 Neighbor status unknown disable-link-down value: 6 Neighbor status unknown udld-init value: 7 Neighbor status unknown extended-detection value: 8 Neighbor status unknown 4
5 show udld message-interval timeout-interval no-multiple-neighbor-detected TABLE_entry entry-number expiration-time device-id neighbor-state UDLD probe messsage interval UDLD detection timeout interval No multiple neighbor detected Neighbor entry info Neighbor entry number Expiration time Device ID Current neighbor state unknown value: 0 Neighbor status unknown unidirectional value: 1 Neighbor status is unidirectional bidirectional value: 2 Neighbor status is bidirectional tx-rx-loop value: 3 Neighbor status is in tx-rx loop neighbor-mismatch value: 4 Mismatch with neighbor state reported empty-echo value: 5 Neighbors echo is empty device-name port-id Device name Port ID 5
6 show udld neighbor-echo-device-number neighbor-echo-device-name neighbor-echo-port-number neighbor-echo-port-id neighbor-message-interval neighbor-timeout-interval cdp-device-name pkt-xmt-rec-time pc-index Echo device number Echo device name Echo port number Echo port ID UDLD probe messsage interval UDLD detection timeout interval CDP Device name Last UDLD packet send/recv time Port channel index Command Modes /exec 6
7 show udld global show udld global show udld global [ readonly udld-global-mode message-interval] Syntax Description show udld global readonly udld-global-mode message-interval Show running system information UDLD protocol UDLD global status and configuration on all interfaces UDLD global configuration setting enabled value: 1 udld is gloablly enabled disabled value: 2 udld is gloablly disabled enabled-aggressive value: 3 udld is gloablly enabled with aggressive mode UDLD probe messsage interval Command Modes /exec 7
8 show udld neighbors show udld neighbors show udld neighbors [ readonly TABLE_entry local-port-id neighbor-echo-device-name device-id neighbor-echo-port-id neighbor-state] Syntax Description show udld neighbors readonly TABLE_entry local-port-id neighbor-echo-device-name device-id neighbor-echo-port-id neighbor-state Show running system information UDLD protocol UDLD neighbor interfaces Type: interface Local port ID Echo device name Device ID Echo port ID Current neighbor state unknown value: 0 Neighbor status unknown unidirectional value: 1 Neighbor status is unidirectional bidirectional value: 2 Neighbor status is bidirectional tx-rx-loop value: 3 Neighbor status is in tx-rx loop neighbor-mismatch value: 4 Mismatch with neighbor state reported empty-echo value: 5 Neighbors echo is empty 8
9 show udld neighbors Command Modes /exec 9
10 show ulib process show ulib process show ulib process [ readonly TABLE_ulib ufdm-state urib-state u6rib-state feature-name feature-state time-left total-bytes] Syntax Description show ulib process readonly TABLE_ulib ufdm-state urib-state u6rib-state feature-name feature-state time-left total-bytes Show running system information Display ULIB status and configuration ULIB Process information State of URIB State of U6RIB Feature's name Feature's state Time left Type: uinteger Total Bytes Command Modes /exec 10
11 show user-account show user-account show user-account [ s0 ] [ readonly TABLE_template usr_name expire_date TABLE_role role [ remote_login ] [ sshkey_info ] TABLE_keys ssh_keys] Syntax Description show TABLE_template TABLE_role TABLE_keys readonly usr_name expire_date role remote_login sshkey_info ssh_keys user-account s0 Show running system information Name of the user Expiry date for this user account(in YYYY-MM-DD format) role/s which the user is to be assigned to Remote account information for a remote user SSH key information of user SSH key pairs of the user Show user information length: 28 User name Command Modes /exec 11
12 show username keypair show username keypair show username s0 keypair [ readonly TABLE_sessions t_type t_time t_keys t_bitcount t_fingerprint] Syntax Description show username keypair s0 readonly TABLE_sessions t_type t_time t_keys t_bitcount t_fingerprint Show running system information Show user information. Show SSH keypairs length: 28 user name username keypair keys type timestamp ssh key bitcount fingerprint Command Modes /exec 12
13 show users show users show users [ readonly TABLE_sessions u_name t_terminal t_time t_idle p_pid c_comment] Syntax Description show users readonly TABLE_sessions u_name t_terminal t_time t_idle p_pid c_comment Show running system information Show the current users logged in the system users table user name terminal time idle pid comment Command Modes /exec 13
14 show users 14
Configuring UDLD. Understanding UDLD CHAPTER
21 CHAPTER This chapter describes how to configure the UniDirectional Link Detection (UDLD) protocol on the Catalyst 3750 switch. Unless otherwise noted, the term switch refers to a standalone switch and
More informationConfiguring UDLD. Understanding UDLD. Modes of Operation CHAPTER
23 CHAPTER This chapter describes how to configure the UniDirectional Link Detection (UDLD) protocol on your Catalyst 3550 switch. Note For complete syntax and usage information for the commands used in
More informationU Commands. udld (configuration mode), page 2 udld (Ethernet), page 4. Cisco Nexus 5600 Series Switches Layer2 Command Reference 1
udld (configuration mode), page 2 udld (Ethernet), page 4 1 udld (configuration mode) udld (configuration mode) To configure the Unidirectional Link Detection (UDLD) protocol on the switch, use the udld
More informationUniDirectional Link Detection (UDLD) Protocol
The UniDirectional Link Detection protocol is a Layer 2 protocol that detects and disables one-way connections before they create undesired situation such as Spanning Tree loops. Information About the
More informationU Commands. udf, on page 3 udld aggressive, on page 7. udld continue-on-err, on page 8 udld disable, on page 10. udld enable, on page 12
udf, on page 3 udld aggressive, on page 4 udld aggressive, on page 5 udld aggressive, on page 6 udld aggressive, on page 7 udld continue-on-err, on page 8 udld disable, on page 9 udld disable, on page
More informationConfiguring UDLD. Understanding UDLD CHAPTER
CHAPTER 9 This chapter describes how to configure the UniDirectional Link Detection (UDLD) protocol. Release 12.2(33)SXI4 and later releases support fast UDLD, which provides faster detection times. For
More informationConfiguring DLDP CHAPTERS. 1. Overview 2. DLDP Configuration 3. Appendix: Default Parameters
CHAPTERS 1. Overview 2. 3. Appendix: Default Parameters Overview This guide applies to: T1500G-10PS v2 or above, T1500G-8T v2 or above, T1500G-10MPS v2 or above, T1500-28PCT v3 or above, T1600G-52TS v3
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More informationSyntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6
VRRP Show Commands instance Syntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6 Context show>vrrp Description This
More informationDGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 9-1 Port Security Global Settings window
9. Security DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Port Security 802.1X AAA RADIUS TACACS IMPB DHCP Server Screening ARP Spoofing Prevention MAC Authentication Web-based
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More informationCisco Interconnecting Cisco Networking Devices Part 2
Cisco 200-105 Interconnecting Cisco Networking Devices Part 2 R1# show running-config description ***Loopback*** ip address 192.168.1.1 255.255.255.255 Question: 374 description **Connected to R1-LAN**
More informationConfiguring Basic Interface Parameters
This chapter describes how to configure the basic interface parameters on Cisco NX-OS devices. About the Basic Interface Parameters, page 1 Licensing Requirements, page 7 Guidelines and Limitations, page
More information2] Chapter 2 Cisco IOS Commands traceroute mac
2] Chapter 2 traceroute mac traceroute mac Use the traceroute mac privileged EXEC command on the switch stack or on a standalone switch to display the Layer 2 path taken by the packets from the specified
More informationU Commands. Cisco MDS 9000 Series Command Reference 1
undebug all, page 2 update license, page 3 use-profile, page 5 user-certdn-match, page 6 username, page 8 username (iscsi initiator configuration and islb initiator configuration), page 13 userprofile,
More informationU Commands. Send documentation comments to CHAPTER
CHAPTER 24 The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. See
More informationIPv6 Neighbor Discovery
IPv6 Neighbor Discovery Last Updated: September 19, 2012 The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the
More informationCCNP TSHOOT. Quick Reference Sheet Exam
CCNP TSHOOT Quick Reference Sheet Exam 300-135 Chapter 1. Network Principles Troubleshooting Steps Problem Identification Collection of Information Examination and Action Plan Verification Basic Troubleshooting
More informationIPv4 and IPv6 Commands
This module describes the Cisco IOS XR software commands used to configure the IPv4 and IPv6 commands for Broadband Network Gateway (BNG) on the Cisco ASR 9000 Series Router. For details regarding the
More informationSend document comments to
CHAPTER 8 This chapter describes how to configure Telnet and includes the following topics: Information About the Telnet Server, page 8-1 Prerequisites for Telnet, page 8-1 Guidelines and Limitations,
More informationSingle-router APS for the Cisco Series Router
Single-router APS for the Cisco 12000 Series Router This feature provides 1+1 single-router automatic protection switching (SR-APS) for the Cisco 12000 series ISE ATM line cards (Engine 3) installed in
More informationTable of Contents 1 System Maintaining and Debugging Commands 1-1
Table of Contents 1 System Maintaining and Debugging Commands 1-1 System Maintaining Commands 1-1 ping 1-1 tracert 1-4 System Debugging Commands 1-6 debugging 1-6 display debugging 1-7 i 1 System Maintaining
More informationConfiguring Location Settings
Finding Feature Information, page 1 Information About, page 1 How to Configure Location Settings, page 2 Monitoring Location Settings and NMSP Settings, page 6 Examples: Location Settings Configuration,
More informationVeryx ATTEST TM. Sample Test Plan. Conformance Test Suite. Bidirectional Forwarding Detection (BFD) Part Number: T / TPS BFD-IPv /1.
Veryx ATTEST TM Conformance Test Suite Bidirectional Forwarding Detection (BFD) Part Number: T / TPS BFD-IPv4 1.1-1210/1.0 Copyright 2005-2010 Veryx Technologies Pvt. Ltd. All rights reserved. Veryx ATTEST
More informationSRP Commands on the Cisco IOS XR Software
This module provides command line interface (CLI) commands for configuring Spatial Reuse Protocol (SRP) on supported Cisco Dynamic Packet Transport (DPT) interfaces. SRP is a MAC-layer protocol developed
More informationCisco Discovery Protocol Version 2
Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media-independent, and network-independent protocol that runs on Cisco devices and enables networking applications to learn about directly
More informationUsing Cisco Discovery Protocol
Using Cisco Discovery Protocol First Published: February 1, 1995 Last Updated: August 12, 2010 Cisco Discovery Protocol (CDP) is a Layer 2 media-independent and network-independent protocol that runs on
More informationConfigure Global Link Layer Discovery Protocol (LLDP) Settings on a Switch through the Command Line Interface (CLI)
Configure Global Link Layer Discovery Protocol (LLDP) Settings on a Switch through the Command Line Interface (CLI) Objective Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) provides
More informationMulti-Chassis APS and Pseudowire Redundancy Interworking
Multi-Chassis and Pseudowire Redundancy Interworking In This Chapter This section describes multi-chassis and pseudowire redundancy interworking. Topics in this section include: Applicability on page 120
More informationChapter 6 Global CONFIG Commands
Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information
More informationError num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning:
Error num: 1 Meaning: Not owner Error num: 2 Meaning: No such file or directory Error num: 3 Meaning: No such process Error num: 4 Meaning: Interrupted system call Error num: 5 Meaning: I/O error Error
More informationConfiguring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch.
21 CHAPTER This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, refer
More informationConfiguring parameters and Band Selection
Configuring 802.11 parameters and Band Selection Finding Feature Information, page 1 Restrictions on Band Selection, 802.11 Bands, and Parameters, page 1 Information About Configuring Band Selection, 802.11
More information2016 Braindump2go Valid Cisco Exam Preparation Materials:
Guarantee All Exams 100% Pass One Time 2016 NEW Cisco CCNA Routing and Switching 200-105: Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Exam Questions and Answers RELEASED in Braindump2go.com
More informationRADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values
RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values First Published: September 23, 2005 Last Updated: August 18, 2010 The Internet Engineering Task Force (IETF) draft standard
More informationNetwork security session 9-2 Router Security. Network II
Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network
More informationno udld {aggressive enable message time seconds}
udld udld To enable aggressive or normal mode in UniDirectional Link Detection protocol (UDLD) and set the configurable message time, use the udld command in global configuration mode. To disable aggressive
More informationConfiguring Switch Security
CHAPTER 9 The authentication, authorization, and accounting (AAA) mechanism verifies the identity of, grants access to, and tracks the actions of users managing a switch. The Cisco MDS 9020 Fabric Switch
More informationOpenFlow. Finding Feature Information. Prerequisites for OpenFlow
Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 2 Information About Open Flow, page 3 Configuring, page 8 Monitoring, page 12 Configuration Examples for, page 12 Finding
More informationConfigure Link Layer Discovery Protocol
This chapter describes the procedures to configure Link Layer Discovery Protocol on Cisco NCS 4000 Series routers. Link Layer Discovery Protocol (LLDP) - Overview, on page 1 LLDP Frame Format, on page
More informationOpenFlow. Finding Feature Information. Prerequisites for OpenFlow
Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 2 Information About Open Flow, page 3 Configuring, page 8 Monitoring, page 12 Configuration Examples for, page 12 Finding
More informationLink Bundling Commands
Link Bundling Commands This module provides command line interface (CLI) commands for configuring Link Bundle interfaces on the Cisco NCS 5000 Series Router. For detailed information about Link Bundle
More informationStatistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8
Statistics Available on the Phone, page 1 Statistics Available from the Phone Web Pages, page 8 Statistics Available on the Phone You can see statistics and information about the phone from the Settings
More informationCongestion Avoidance. Finding Feature Information
This chapter provides information about slow devices that cause congestion (slow-drain devices) in a network and how to avoid slow-drain devices. Finding Feature Information, page 1 Feature History for,
More informationControlled/uncontrolled port and port authorization status
Contents 802.1X fundamentals 1 802.1X architecture 1 Controlled/uncontrolled port and port authorization status 1 802.1X-related protocols 2 Packet formats 2 EAP over RADIUS 4 Initiating 802.1X authentication
More informationTable of Contents 1 LLDP Configuration 1-1
Table of Contents 1 LLDP Configuration 1-1 Over 1-1 Background 1-1 Basic Concepts 1-1 How LLDP Works 1-5 Protocols and Standards 1-6 LLDP Configuration Task List 1-6 Performing Basic LLDP Configuration
More informationBFD on BDI Interfaces
The Cisco feature alleviates limitations on the maximum number of interfaces per system that switched virtual interfaces (SVI) impose. This document describes how to configure the Bidirectional Forwarding
More informationHP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine
HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal
More informationNAM CLI Commands: show password strong-policy - web user
CHAPTER 6 NAM CLI Commands: show password strong-policy - web user This chapter describes the following NAM CLI commands: show password strong-policy show patches show pkt-drop counters show preferences
More informationBASIC MULTICAST TROUBLESHOOTING. Piotr Wojciechowski (CCIE #25543)
BASIC MULTICAST TROUBLESHOOTING Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE #25543
More informationResilient Ethernet Protocol (REP)
The is a Cisco proprietary protocol that provides an alternative to the Spanning Tree Protocol (STP). REP provides a way to control network loops, handle link failures, and improve convergence time. It
More informationConfiguring Routes on the ACE
CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up
More informationBanyan VINES Commands
Banyan VINES Commands The Banyan Virtual Network System (VINES) protocol is a networking system for personal computers. This proprietary protocol was developed by Banyan and is derived from the Xerox Network
More informationOperation Manual BFD-GR H3C S3610&S5510 Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 Introduction to BFD... 1-1 1.1.1 How BFD Works... 1-1 1.1.2 BFD Packet Format... 1-3 1.1.3 Protocols and Standards... 1-5 1.2 BFD Configuration Task List...
More informationUtils Commands CHAPTER
CHAPTER 9 Published: October 26, 2010, This chapter contains the following utils commands: utils fior utils firewall utils iostat utils iothrottle enable utils iothrottle disable utils iothrottle status
More informationSAMI Cisco IOS PPC Commands
APPENDIXC The following commands, listed in alphabetical order, are introduced or modified for the Cisco SAMI Cisco IOS PPCs and are supported at the SAMI Cisco IOS PPC console: clear sami ixp statistics
More informationV Commands. virtual ip, page 2 virtual ipv6, page 5 vrf, page 8. Cisco Nexus 7000 Series NX-OS Intelligent Traffic Director Command Reference 1
virtual ip, page 2 virtual ipv6, page 5 vrf, page 8 1 virtual ip virtual ip To configure the virtual IPv4 address of an Intelligent Traffic Director (ITD) service, use the virtual ip command. To remove
More informationConfiguring parameters and Band Selection
Configuring 802.11 parameters and Band Selection Finding Feature Information, page 1 Restrictions on Band Selection, 802.11 Bands, and Parameters, page 1 Information About Configuring Band Selection, 802.11
More informationConfiguring IP SLAs ICMP Echo Operations
This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices
More informationCisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards
Cisco HWIC-4ESW and HWIC-D-9ESW EtherSwitch Interface Cards This document provides configuration tasks for the 4-port Cisco HWIC-4ESW and the 9-port Cisco HWIC-D-9ESW EtherSwitch high-speed WAN interface
More informationREP Command Reference
REP Reference This chapter describes commands to configure Resilient Ethernet Protocol (REP). rep admin vlan, page 2 rep block port, page 3 rep lsl-age-timer, page 5 rep lsl-retries, page 6 rep preempt
More informationNAM CLI Commands: show patches - web user
CHAPTER 6 NAM CLI Commands: show patches - web user This chapter describes the following NAM CLI commands: show patches show preferences show protocol-feature show remote-storage show rxcounters show snmp
More informationTable of Contents 1 System Maintenance and Debugging Commands 1-1
Table of Contents 1 System Maintenance and Debugging Commands 1-1 System Maintenance Commands 1-1 ping 1-1 ping ipv6 1-5 tracert 1-6 tracert ipv6 1-7 System Debugging Commands 1-8 debugging 1-8 display
More informationTable of Contents 1 System Maintaining and Debugging 1-1
Table of Contents 1 System Maintaining and Debugging 1-1 System Maintaining and Debugging 1-1 Ping 1-1 Introduction 1-1 Configuring Ping 1-1 Ping Configuration Example 1-2 Tracert 1-4 Introduction 1-4
More informationConfiguring IP SLAs ICMP Echo Operations
This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices
More informationBringing Up the Cisco IOS XR Software on a Multishelf System
CHAPTER 3 Bringing Up the Cisco IOS XR Software on a Multishelf System This chapter describes how to bring up Cisco IOS XR software on a Cisco CRS Multishelf System for the first time. Layer 2 system switching
More informationUtils Commands CHAPTER
CHAPTER 9 Published: October 31, 2011, This chapter contains the following utils commands: utils auditd disable utils auditd enable utils auditd status utils create report hardware utils create report
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationConfigure Multipoint Layer 2 Services
This module provides the conceptual and configuration information for Multipoint Layer 2 Bridging Services, also called Virtual Private LAN Services (VPLS). Note VPLS supports Layer 2 VPN technology and
More information-1- Command Guide of SGS T2X
-1- Command Guide of SGS-5220-24T2X Contents Command Guide of SGS-5220-24T2X Chapter 1 COMMAND LINE INTERFACE... 18 1.1 Accessing the CLI... 18 1.2 Command Line Modes... 18 1.3 Requirements... 19 Chapter
More informationSession Recovery. How Session Recovery Works
With robust hardware failover and redundancy protection, any hardware or software failures on the system can quickly be corrected. However, software failures can occur for numerous reasons, often without
More informationA Commands CHAPTER. Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter.
CHAPTER 1 The commands shown in this chapter apply to the Catalyst 8540 MSR, Catalyst 8510 MSR, and LightStream 1010 ATM switch routers. Where an entire command or certain attributes of a command have
More informationConsole Port, Telnet, and SSH Handling
Console Port Overview, on page 1 Connecting Console Cables, on page 1 Installing USB Device Drivers, on page 1 Console Port Handling Overview, on page 2 Telnet and SSH Overview, on page 2 Persistent Telnet,
More informationConfiguring High Availability
The Cisco High Availability (HA) technology enable network-wide protection by providing quick recovery from disruptions that may occur in any part of a network. A network's hardware and software work together
More informationContents. IP addressing configuration commands 1 display ip interface 1 display ip interface brief 3 ip address 5
Contents IP addressing configuration commands 1 display ip interface 1 display ip interface brief 3 ip address 5 i IP addressing configuration commands display ip interface Syntax View Default level Parameters
More informationSecure Cisco Discovery Protocol
The Cisco Discovery Protocol does not possess inherent security mechanisms and is vulnerable to attacks. The feature allows users to select the type, length, value (TLV) fields that are sent on a particular
More informationMonitoring GSS Global Server Load-Balancing Operation
CHAPTER 10 Monitoring GSS Global Server Load-Balancing Operation This chapter describes the following tools for monitoring the status of global server load-balancing on your GSS network: CLI-based commands
More informationContents. Configuring LLDP 2
Contents Configuring LLDP 2 Overview 2 Basic concepts 2 Working mechanism 8 Protocols and standards 9 LLDP configuration task list 9 Performing basic LLDP configurations 10 Enabling LLDP 10 Configuring
More informationConfiguring System Security and AAA Services
CHAPTER 14 Security can be independently configured for each of the following management paths: -line interface (CLI) You can access the CLI using one of three connection options: Console (serial connection)
More informationConfiguring RADIUS. Information About RADIUS. RADIUS Network Environments. Send document comments to
3 CHAPTER This chapter describes how to configure Remote Access Dial-In User Service (RADIUS) protocol on NX-OS devices. This chapter includes the following sections: Information About RADIUS, page 3-1
More informationExclusive Configuration Change Access and Access Session Locking
Exclusive Configuration Change Access and Access Session Locking Exclusive Configuration Change Access (also called the Configuration Lock feature) allows you to have exclusive change access to the Cisco
More informationTS Open Day Data Center Fibre Channel over IP
TS Open Day Data Center Fibre Channel over IP Presented by: Rong Cheng- TAC LAN & DCN China Jan 30 th, 2015 2013 Cisco and/or its affiliates. All rights reserved. 1 FCIP Introduction FCIP Configuration
More informationCisco Discovery Protocol Version 2
Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media-independent, and network-independent protocol that runs on Cisco devices and enables networking applications to learn about directly
More informationSegment Routing Commands
Segment Routing Commands address ipv4 (PCE), page 4 adjacency-sid, page 5 apply-weight ecmp-only bandwidth, page 7 attribute-set, page 8 autoroute announce, page 10 autoroute destination, page 12 clear
More informationConfiguring NetFlow and NetFlow Data Export
This module contains information about and instructions for configuring NetFlow to capture and export network traffic data. NetFlow capture and export are performed independently on each internetworking
More informationSession Recovery. How Session Recovery Works
With robust hardware failover and redundancy protection, any hardware or software failures on the system can quickly be corrected. However, software failures can occur for numerous reasons, often without
More informationInternet Engineering Task Force (IETF) Request for Comments: ISSN: June 2010
Internet Engineering Task Force (IETF) D. Katz Request for Comments: 5880 D. Ward Category: Standards Track Juniper Networks ISSN: 2070-1721 June 2010 Abstract Bidirectional Forwarding Detection (BFD)
More informationdebug backhaul-session-manager session through debug channel packets, page 1
debug backhaul-session-manager session through debug channel packets debug backhaul-session-manager session through debug channel packets, page 1 debug backhaul-session-manager session through debug channel
More informationSegment Routing MPLS OAM Support
Segment Routing Operations, Administration, and Maintenance (OAM) helps service providers to monitor label-switched paths (LSPs) and quickly isolate forwarding problems to assist with fault detection and
More informationCisco Discovery Protocol Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series)
Cisco Discovery Protocol Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 920 Series) Cisco Discovery Protocol Version 2 2 Finding Feature Information 2 Prerequisites for Using Cisco Discovery Protocol
More informationTroubleshooting. Diagnosing Problems. Check Switch POST Results CHAPTER
CHAPTER 3 This chapter describes these topics for troubleshooting problems: Diagnosing Problems, page 3-1 How to Clear the Switch IP Address and Configuration, page 3-4 Locating the Switch Serial Number,
More informationOAM and SAA Commands. Generic Commands. shutdown. shutdown XRS OAM and Diagnostics Guide Page 383. OAM, SAA, and OAM-PM Command Reference
OAM, SAA, and OAM-PM Command Reference OAM and SAA Commands Generic Commands shutdown Syntax [no] shutdown Context config>saa>test Description In order to modify an existing test it must first be shut
More informationConfiguring DHCP Features and IP Source Guard
CHAPTER 21 This chapter describes how to configure DHCP snooping and option-82 data insertion, and the DHCP server port-based address allocation features on the switch. It also describes how to configure
More informationFileCruiser. Administrator Portal Guide
FileCruiser Administrator Portal Guide Contents Administrator Portal Guide Contents Login to the Administration Portal 1 Home 2 Capacity Overview 2 Menu Features 3 OU Space/Team Space/Personal Space Usage
More informationSecure Shell Version 2 Support
Secure Shell Version 2 Support Last Updated: January 16, 2012 The Secure Shell Version 2 Support feature allows you to configure Secure Shell (SSH) Version 2. SSH runs on top of a reliable transport layer
More informationConfiguring Users and Common Roles
Send documentation comments to mdsfeedback-doc@cisco.com. 26 CHAPTER Configuring Users and Common Roles The CLI and SNMP use common roles in all switches in the Cisco MDS 9000 Family. You can use CLI to
More informationMicrosoft 365 Business Preview End of Life Plan
Last Updated: September 25, 2017 Microsoft 365 Business Preview End of Life Plan Gabe Long Sr Product Marketing Manager, Microsoft Timeline T-30 T-0 T+30 T+120 Transitioning a CSP Subscription to GA There
More informationIPv6 for Cisco IOS Software, File 3 of 3: Commands
IPv6 for Cisco IOS Software, File 3 of 3: Commands This document contains new and revised commands for the Cisco implementation of IP version 6 (IPv6) in the Cisco IOS software. All other commands used
More informationPer-Flow Admission. Finding Feature Information. Prerequisites for Per-Flow Admission
The feature provides explicit controls to limit packet flow into a WAN edge in order to protect already admitted flows on the routing/wan edge. Finding Feature Information, page 1 Prerequisites for, page
More informationUser Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2
User Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2 Overview New Software Features This addendum provides information and procedures that will be added to later
More information