-
Cisco ME 3400E Ethernet Access Switch Command Reference Cisco
IOS Release 12.2(58)EXMarch 2012
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan
Jose, CA 95134-1706 USAhttp://www.cisco.comTel: 408 526-4000
800 553-NETS (6387)Fax: 408 527-0883
Text Part Number: OL-26663-01
http://www.cisco.com
-
CCVP, the Cisco logo, and Welcome to the Human Network are
trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live,
Play, and Learn is a service mark of Cisco Systems, Inc.; and
Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA,
CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo,
Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the
Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel,
EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare,
GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study,
LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking
Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet,
StackWise, The Fastest Way to Increase Your Internet Quotient, and
TransPath are registered trademarks of Cisco Systems, Inc. and/or
its affiliates in the United States and certain other
countries.
All other trademarks mentioned in this document or Website are
the property of their respective owners. The use of the word
partner does not imply a partnership relationship between Cisco and
any other company. (0711R)
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc.
and/or its affiliates in the U.S. and other countries. A listing of
Cisco's trademarks can be found at www.cisco.com/go/trademarks.
Third party trademarks mentioned are the property of their
respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company.
(1005R)
Cisco ME 3400E Ethernet Access Switch Command Reference© 2012
Cisco Systems, Inc. All rights reserved.
http://www.cisco.com/go/trademarks
-
OL-26663-01
C O N T E N T S
Preface xix
Audience xix
Purpose xix
Conventions xx
Filtering show Command Output xx
Related Publications xx
Obtaining Documentation and Submitting a Service Request xxi
C H A P T E R 1 Using the Command-Line Interface 1-1
CLI Command Modes 1-1User EXEC Mode 1-2Privileged EXEC Mode
1-3Global Configuration Mode 1-3Interface Configuration Mode
1-4VLAN Configuration Mode 1-4Line Configuration Mode 1-4
C H A P T E R 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commands 2-1
aaa accounting dot1x 2-1
aaa authentication dot1x 2-3
action 2-5
alarm-contact 2-7
archive download-sw 2-9
archive tar 2-12
archive upload-sw 2-15
arp access-list 2-17
bandwidth 2-19
boot buffersize 2-22
boot config-file 2-23
boot enable-break 2-24
boot helper 2-25
boot helper-config-file 2-26
iiiCisco ME 3400E Ethernet Access Switch Command Reference
-
Contents
boot manual 2-27
boot private-config-file 2-28
boot system 2-29
channel-group 2-30
channel-protocol 2-34
class 2-36
class-map 2-38
clear ip arp inspection log 2-40
clear ip arp inspection statistics 2-41
clear ip dhcp snooping 2-42
clear ipc 2-44
clear ipv6 dhcp conflict 2-45
clear l2protocol-tunnel counters 2-46
clear lacp 2-47
clear logging onboard 2-48
clear mac address-table 2-49
clear mac address-table move update 2-50
clear pagp 2-51
clear policer cpu uni-eni counters 2-52
clear port-security 2-53
clear rep counters 2-55
clear spanning-tree counters 2-56
clear spanning-tree detected-protocols 2-57
clear vmps statistics 2-59
conform-action 2-60
copy logging onboard module 2-62
cpu traffic qos cos 2-64
cpu traffic qos dscp 2-68
cpu traffic qos precedence 2-73
cpu traffic qos qos-group 2-76
define interface-range 2-78
delete 2-80
deny (ARP access-list configuration) 2-81
deny (IPv6 access-list configuration) 2-83
deny (MAC access-list configuration) 2-88
ivCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
diagnostic monitor 2-91
diagnostic schedule test 2-93
diagnostic start test 2-95
dot1x default 2-97
dot1x host-mode 2-98
dot1x initialize 2-100
dot1x max-reauth-req 2-101
dot1x max-req 2-103
dot1x port-control 2-104
dot1x re-authenticate 2-106
dot1x reauthentication 2-107
dot1x supplicant force-multicast 2-108
dot1x system-auth-control 2-109
dot1x test eapol-capable 2-110
dot1x test timeout 2-111
dot1x timeout 2-112
dot1x violation-mode 2-114
duplex 2-115
errdisable detect cause 2-117
errdisable recovery 2-119
ethernet dot1ad 2-121
ethernet evc 2-123
ethernet lmi 2-124
ethernet lmi ce-vlan map 2-126
ethernet loopback (interface configuration) 2-128
ethernet loopback (privileged EXEC) 2-131
ethernet oam remote-failure 2-133
ethernet uni 2-135
ethernet uni id 2-137
exceed-action 2-138
flowcontrol 2-140
hw-module module logging onboard 2-142
interface port-channel 2-144
interface range 2-146
interface vlan 2-148
vCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
ip access-group 2-150
ip address 2-153
ip arp inspection filter vlan 2-155
ip arp inspection limit 2-157
ip arp inspection log-buffer 2-159
ip arp inspection trust 2-161
ip arp inspection validate 2-162
ip arp inspection vlan 2-164
ip arp inspection vlan logging 2-165
ip device tracking maximum 2-167
ip dhcp snooping 2-168
ip dhcp snooping binding 2-169
ip dhcp snooping database 2-171
ip dhcp snooping information option 2-173
ip dhcp snooping information option allowed-untrusted 2-175
ip dhcp snooping information option format remote-id 2-177
ip dhcp snooping limit rate 2-178
ip dhcp snooping trust 2-179
ip dhcp snooping verify mac-address 2-180
ip dhcp snooping vlan 2-181
ip dhcp snooping vlan information option format-type circuit-id
string 2-182
ip igmp filter 2-184
ip igmp max-groups 2-186
ip igmp profile 2-188
ip igmp snooping 2-190
ip igmp snooping last-member-query-interval 2-192
ip igmp snooping querier 2-194
ip igmp snooping report-suppression 2-196
ip igmp snooping tcn 2-198
ip igmp snooping tcn flood 2-199
ip igmp snooping vlan immediate-leave 2-200
ip igmp snooping vlan mrouter 2-201
ip igmp snooping vlan static 2-203
ip sla responder twamp 2-205
ip sla server twamp 2-207
viCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
ip source binding 2-209
ip ssh 2-211
ip sticky-arp (global configuration) 2-213
ip sticky-arp (interface configuration) 2-215
ip verify source 2-217
ipv6 access-list 2-219
ipv6 address dhcp 2-221
ipv6 dhcp client request vendor 2-222
ipv6 dhcp ping packets 2-223
ipv6 dhcp pool 2-224
ipv6 dhcp server 2-227
ipv6 mld snooping 2-229
ipv6 mld snooping last-listener-query-count 2-231
ipv6 mld snooping last-listener-query-interval 2-233
ipv6 mld snooping listener-message-suppression 2-235
ipv6 mld snooping robustness-variable 2-236
ipv6 mld snooping tcn 2-238
ipv6 mld snooping vlan 2-240
ipv6 traffic-filter 2-242
l2protocol-tunnel 2-244
l2protocol-tunnel cos 2-247
lacp port-priority 2-248
lacp system-priority 2-250
link state group 2-252
link state track 2-254
location (global configuration) 2-255
location (interface configuration) 2-257
logging event 2-259
logging file 2-260
mac access-group 2-262
mac access-list extended 2-264
mac address-table aging-time 2-266
mac address-table learning vlan 2-267
mac address-table move update 2-269
mac address-table notification 2-271
viiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
mac address-table static 2-273
mac address-table static drop 2-274
macro apply 2-276
macro description 2-278
macro global 2-279
macro global description 2-281
macro name 2-282
match (access-map configuration) 2-284
match access-group 2-286
match cos 2-287
match dot1ad dei 2-289
match ip dscp 2-291
match ip precedence 2-293
match qos-group 2-295
match vlan 2-297
mdix auto 2-300
media-type 2-302
monitor session 2-304
mvr (global configuration) 2-308
mvr (interface configuration) 2-311
no authentication logging verbose 2-314
no dot1x logging verbose 2-315
no mab logging verbose 2-316
oam protocol cfm svlan 2-317
pagp learn-method 2-318
pagp port-priority 2-320
permit (ARP access-list configuration) 2-322
permit (IPv6 access-list configuration) 2-324
permit (MAC access-list configuration) 2-329
police 2-332
policer aggregate (global configuration) 2-337
police aggregate (policy-map class configuration) 2-342
policer cpu uni 2-344
policy-map 2-346
port-channel load-balance 2-349
viiiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
port-type 2-351
power-supply dual 2-353
priority 2-355
private-vlan 2-358
private-vlan mapping 2-361
queue-limit 2-363
remote-span 2-367
renew ip dhcp snooping database 2-369
rep admin vlan 2-370
rep block port 2-371
rep lsl-age-timer 2-375
rep preempt delay 2-377
rep preempt segment 2-379
rep segment 2-380
rep stcn 2-383
reserved-only 2-384
rmon collection stats 2-385
sdm prefer 2-386
service instance 2-389
service password-recovery 2-391
service-policy (interface configuration) 2-393
service-policy (policy-map class configuration) 2-395
set cos 2-397
set dot1ad dei 2-399
set dscp 2-401
set precedence 2-403
set qos-group 2-405
setup 2-407
shape average 2-410
show access-lists 2-412
show archive status 2-415
show arp access-list 2-416
show boot 2-417
show cable-diagnostics tdr 2-419
show class-map 2-421
ixCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
show controllers cpu-interface 2-422
show controllers ethernet-controller 2-424
show controllers tcam 2-431
show controllers utilization 2-433
show cpu traffic qos 2-435
show diagnostic 2-437
show dot1q-tunnel 2-441
show dot1x 2-442
show env 2-445
show errdisable detect 2-447
show errdisable flap-values 2-449
show errdisable recovery 2-451
show etherchannel 2-453
show ethernet loopback 2-456
show ethernet service evc 2-458
show ethernet service instance 2-459
show ethernet service interface 2-461
show flowcontrol 2-463
show idprom 2-465
show interfaces 2-467
show interfaces counters 2-475
show interfaces rep 2-477
show interfaces transceivers 2-479
show inventory 2-482
show ip arp inspection 2-483
show ip dhcp snooping 2-487
show ip dhcp snooping binding 2-488
show ip dhcp snooping database 2-490
show ip dhcp snooping statistics 2-492
show ip igmp profile 2-495
show ip igmp snooping 2-496
show ip igmp snooping groups 2-498
show ip igmp snooping mrouter 2-500
show ip igmp snooping querier 2-501
show ip sla standards 2-503
xCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
show ip sla twamp connection 2-504
show ip sla twamp session 2-506
show ip source binding 2-507
show ip verify source 2-508
show ipc 2-510
show ipv6 access-list 2-514
show ipv6 dhcp conflict 2-516
show ipv6 route updated 2-517
show l2protocol-tunnel 2-519
show lacp 2-521
show link state group 2-525
show location 2-527
show logging onboard 2-530
show mac access-group 2-534
show mac address-table 2-535
show mac address-table address 2-537
show mac address-table aging-time 2-538
show mac address-table count 2-540
show mac address-table dynamic 2-542
show mac address-table interface 2-544
show mac address-table learning 2-546
show mac address-table move update 2-547
show mac address-table notification 2-548
show mac address-table static 2-550
show mac address-table vlan 2-552
show monitor 2-554
show mvr 2-556
show mvr interface 2-558
show mvr members 2-560
show pagp 2-562
show parser macro 2-564
show policer aggregate 2-566
show policer cpu uni-eni 2-567
show policy-map 2-570
show port-security 2-575
xiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
show port-type 2-578
show rep topology 2-580
show sdm prefer 2-583
show spanning-tree 2-585
show storm-control 2-591
show system mtu 2-593
show table-map 2-594
show udld 2-595
show version 2-598
show vlan 2-600
show vlan access-map 2-605
show vlan filter 2-606
show vlan mapping 2-607
show vmps 2-609
shutdown 2-611
shutdown vlan 2-612
snmp mib rep trap-rate 2-613
snmp-server enable traps 2-614
snmp-server host 2-618
snmp trap mac-notification change 2-622
spanning-tree 2-624
spanning-tree bpdufilter 2-626
spanning-tree bpduguard 2-628
spanning-tree cost 2-630
spanning-tree etherchannel guard misconfig 2-632
spanning-tree extend system-id 2-634
spanning-tree guard 2-636
spanning-tree link-type 2-638
spanning-tree loopguard default 2-640
spanning-tree mode 2-642
spanning-tree mst configuration 2-644
spanning-tree mst cost 2-646
spanning-tree mst forward-time 2-648
spanning-tree mst hello-time 2-649
spanning-tree mst max-age 2-651
xiiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
spanning-tree mst max-hops 2-653
spanning-tree mst port-priority 2-655
spanning-tree mst pre-standard 2-657
spanning-tree mst priority 2-658
spanning-tree mst root 2-660
spanning-tree port-priority 2-662
spanning-tree portfast (global configuration) 2-664
spanning-tree portfast (interface configuration) 2-667
spanning-tree vlan 2-669
speed 2-672
storm-control 2-674
switchport 2-677
switchport access vlan 2-679
switchport backup interface 2-681
switchport block 2-685
switchport host 2-687
switchport mode 2-688
switchport mode private-vlan 2-691
switchport port-security 2-694
switchport port-security aging 2-698
switchport private-vlan 2-700
switchport protected 2-702
switchport trunk 2-704
switchport vlan mapping 2-706
system env temperature threshold yellow 2-709
system mtu 2-710
table-map 2-713
test cable-diagnostics tdr 2-715
traceroute mac 2-717
traceroute mac ip 2-720
udld 2-722
udld port 2-724
udld reset 2-726
uni count 2-727
uni-vlan 2-729
xiiiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
violate-action 2-731
vlan 2-733
vlan access-map 2-736
vlan dot1q tag native 2-738
vlan filter 2-740
vmps reconfirm (privileged EXEC) 2-742
vmps reconfirm (global configuration) 2-743
vmps retry 2-744
vmps server 2-745
vrf upgrade-cli multi-af-mode 2-747
A P P E N D I X A Cisco ME 3400E Ethernet Access SwitchBoot
Loader Commands A-1
arp A-2
boot A-3
cat A-5
copy A-6
delete A-7
dir A-8
flash_init A-10
format A-11
fsck A-12
help A-13
memory A-14
mgmt_clr A-15
mgmt_init A-16
mgmt_show A-17
mkdir A-18
more A-19
rename A-20
reset A-21
rmdir A-22
set A-23
type A-26
unset A-27
version A-29
xivCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
A P P E N D I X B Cisco ME 3400E Ethernet Access SwitchDebug
Commands B-1
debug backup B-2
debug dot1x B-3
debug etherchannel B-4
debug ethernet service B-5
debug interface B-7
debug ip dhcp snooping B-8
debug ip igmp filter B-9
debug ip igmp max-groups B-10
debug ip igmp snooping B-11
debug ip sla error twamp connection B-12
debug ip sla error twamp control reflector B-14
debug ip sla error twamp control server B-16
debug ip sla error twamp session B-18
debug ip sla trace twamp connection B-20
debug ip sla trace twamp control reflector B-22
debug ip sla trace twamp control server B-24
debug ip sla trace twamp session B-26
debug ip verify source packet B-28
debug lacp B-29
debug mac-notification B-30
debug matm B-31
debug matm move update B-32
debug monitor B-33
debug mvrdbg B-34
debug nvram B-35
debug pagp B-36
debug platform acl B-37
debug platform backup interface B-38
debug platform cfm B-39
debug platform cpu-queues B-40
debug platform dot1ad B-42
debug platform dot1x B-43
debug platform etherchannel B-44
debug platform forw-tcam B-45
xvCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
debug platform ip arp inspection B-46
debug platform ip dhcp B-47
debug platform ip igmp snooping B-48
debug platform ip multicast B-50
debug platform ip source-guard B-52
debug platform ip unicast B-53
debug platform ipc B-55
debug platform led B-56
debug platform matm B-57
debug platform messaging application B-58
debug platform phy B-59
debug platform pm B-61
debug platform policer cpu uni-eni B-63
debug platform port-asic B-64
debug platform port-security B-65
debug platform qos-acl-tcam B-66
debug platform qos-manager B-67
debug platform remote-commands B-68
debug platform rep B-69
debug platform resource-manager B-70
debug platform snmp B-71
debug platform span B-72
debug platform supervisor-asic B-73
debug platform sw-bridge B-74
debug platform tcam B-75
debug platform udld B-77
debug platform vlan B-78
debug pm B-79
debug port-security B-81
debug rep B-82
debug qos-manager B-83
debug spanning-tree B-84
debug spanning-tree bpdu B-86
debug spanning-tree bpdu-opt B-87
debug spanning-tree mstp B-88
xviCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
debug spanning-tree switch B-90
debug sw-vlan B-92
debug sw-vlan ifs B-93
debug sw-vlan notification B-94
debug udld B-96
debug vqpc B-98
A P P E N D I X C Cisco ME 3400E Ethernet Access SwitchShow
Platform Commands C-1
show platform acl C-2
show platform backup interface C-3
show platform cfm C-4
show platform configuration C-5
show platform dl C-6
show platform etherchannel C-7
show platform forward C-8
show platform frontend-controller C-10
show platform ip igmp snooping C-11
show platform ip multicast C-12
show platform ip unicast C-13
show platform ipc trace C-14
show platform ipv6 unicast C-15
show platform l2pt dm C-17
show platform layer4op C-18
show platform mac-address-table C-19
show platform messaging C-20
show platform monitor C-21
show platform mvr table C-22
show platform pm C-23
show platform policer cpu C-24
show platform port-asic C-28
show platform port-security C-32
show platform qos C-33
show platform resource-manager C-36
show platform snmp counters C-38
show platform spanning-tree synchronization C-39
xviiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Contents
show platform status C-40
show platform stp-instance C-41
show platform tcam C-42
show platform vlan C-44
show platform vlan mapping C-45
A P P E N D I X D Acknowledgments for Open-Source Software
D-1
I N D E X
xviiiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Preface
AudienceThis guide is for the networking professional using the
Cisco IOS command-line interface (CLI) to manage the Cisco Metro
Ethernet (ME) 3400E Series Ethernet Access switch, hereafter
referred to as the switch. Before using this guide, you should have
experience working with the Cisco IOS commands and the switch
software features. You should also have experience working with the
concepts and terminology of Ethernet and local area networking.
Purpose The switch ships with one of these software images
installed:
• The metro access image includes additional features such as
IEEE 802.1Q tunneling, Layer 2 protocol tunneling, dynamic ARP
inspection, and IP source guard.
• The metro IP access image adds Layer 3 functionality such as
IP routing support for Routing Information Protocol (RIP), Open
Shortest Path First (OSPF) Protocol, Border Gateway Protocol (BGP),
and Enhanced Interior Gateway Routing Protocol (EIGRP), multiple
VPN routing/forwarding on customer edge (multi-VRF-CE) devices, and
IP multicast routing.
This guide provides the information you need about the Layer 2
and Layer 3 commands that have been created or changed for use with
the Cisco ME 3400EEthernet Access switch. For information about the
standard Cisco IOS Release 12.2 commands, see the Cisco IOS
documentation set available from the Cisco.com home page by
selecting Service and Support > Technical Documents. On the
Cisco Product Documentation home page, select Release 12.2 from the
Cisco IOS Software drop-down list.
This guide does not provide procedures for configuring your
switch. For detailed configuration procedures, see the software
configuration guide for this release.
This guide does not describe system messages you might
encounter. For more information, see the system message guide for
this release.
For the latest documentation updates, see the release notes for
this release.
xixCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Preface
ConventionsThis publication uses these conventions to convey
instructions and information:
Command descriptions use these conventions:
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
• Square brackets ([ ]) means optional elements.
• Braces ( ) group required choices, and vertical bars ( | )
separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean
a required choice within an optional element.
Interactive examples use these conventions:
• Terminal sessions and system displays are in screen font.
• Information you enter is in boldface screen font.
• Nonprinting characters, such as passwords or tabs, are in
angle brackets (< >).
Notes, cautions, and warnings use these conventions and
symbols:
Note Means reader take note. Notes contain helpful suggestions
or references to materials not contained in this manual.
Caution Means reader be careful. In this situation, you might do
something that could result in equipment damage or loss of
data.
Filtering show Command Output The show commands have optional
output modifiers to filter the command output.
• | begin—Display begins with the line that matches the
expression.
• | exclude—Display excludes with the line that matches the
expression.
• | include—Display includes with the line that matches the
expression.
• expression—Expression in the output to use as a reference
point.
Expressions are case sensitive. If you enter | exclude output,
the lines that contain output are not displayed, but the lines that
contain Output are displayed.
Related PublicationsThese documents provide complete information
about the switch and are available from this Cisco.com site:
http://www.cisco.com/en/US/products/ps9637/tsd_products_support_series_home.html
xxCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
http://www.cisco.com/en/US/products/ps9637/tsd_products_support_series_home.html
-
Preface
Note Before installing, configuring, or upgrading the switch,
see these documents:
• For initial configuration information, see the “Configuring
the Switch with the CLI-Based Setup Program” appendix in the
hardware installation guide.
• For upgrading information, see the “Downloading Software”
section in the release notes.
• Release Notes for the Cisco ME 3400E Ethernet Access
Switch
• Cisco ME 3400E Ethernet Access Switch Software Configuration
Guide
• Cisco ME 3400E Ethernet Access Switch Command Reference
• Cisco ME 3400E, ME 3400, and ME 2400 Switch System Message
Guide
• Cisco ME 3400E Ethernet Access Switch Hardware Installation
Guide
• Cisco ME 3400E Switch Getting Started Guide
• Regulatory Compliance and Safety Information for the Cisco ME
3400E Ethernet Access Switch
• Cisco Small Form-Factor Pluggable Modules Installation
Notes
• Cisco CWDM GBIC and CWDM SFP Installation Note
• These compatibility matrix documents are available from this
Cisco.com site:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
– Cisco Gigabit Ethernet Transceiver Modules Compatibility
Matrix
– Cisco 100-Megabit Ethernet SFP Modules Compatibility
Matrix
– Cisco Small Form-Factor Pluggable Modules Compatibility
Matrix
– Compatibility Matrix for 1000BASE-T Small Form-Factor
Pluggable Modules
Obtaining Documentation and Submitting a Service RequestFor
information on obtaining documentation, submitting a service
request, and gathering additional information, see the monthly
What’s New in Cisco Product Documentation, which also lists all new
and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a
Really Simple Syndication (RSS) feed and set content to be
delivered directly to your desktop using a reader application. The
RSS feeds are a free service and Cisco currently supports RSS
version 2.0.
xxiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.htmlhttp://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
-
Preface
xxiiCisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Cisco ME OL-26663-01
C H A P T E R 1
Using the Command-Line Interface
The Cisco Metro Ethernet (ME) 3400E Series Ethernet Access
switch is supported by Cisco IOS software. This chapter describes
how to use the switch command-line interface (CLI) to configure
software features.
For a complete description command descriptions, see these
sections:
• For the configuration and monitoring commands that support
these features, see Chapter 2, “Cisco ME 3400E Ethernet Access
Switch Cisco IOS Commands.”
• For information on the boot loader commands, see Appendix A,
“Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”
• For information on the debug commands, see Appendix B, “Cisco
ME 3400E Ethernet Access Switch Debug Commands.”
• For information on the show platform commands, see Appendix C,
“Cisco ME 3400E Ethernet Access Switch Show Platform Commands.”
• For more information on Cisco IOS Release 12.2, see the Cisco
IOS Release 12.2 Command Summary.
For task-oriented configuration steps, see the software
configuration guide for this release.
In this document, unless otherwise specified, IP refers to IP
version 4 (IPv4).
CLI Command ModesThis section describes the CLI command mode
structure. Command modes support specific Cisco IOS commands. For
example, the interface interface-id command only works when entered
in global configuration mode.
These are the main command modes for the switch:
• User EXEC
• Privileged EXEC
• Global configuration
• Interface configuration
• VLAN configuration
• Line configuration
1-13400E Ethernet Access Switch Command Reference
-
Chapter 1 Using the Command-Line InterfaceCLI Command Modes
Table 1-1 lists the main command modes, how to access each mode,
the prompt you see in that mode, and how to exit that mode. The
prompts listed use the default name Switch.
User EXEC Mode After you access the device, you are
automatically in user EXEC command mode. The EXEC commands
available at the user level are a subset of those available at the
privileged level. In general, use the user EXEC commands to
temporarily change terminal settings, perform basic tests, and list
system information.
The supported commands can vary depending on the version of
software in use. To display a comprehensive list of commands, enter
a question mark (?) at the prompt.
Switch> ?
Table 1-1 Command Modes Summary
Command Mode Access Method Prompt Exit or Access Next Mode
User EXEC This is the first level of access.
(For the switch) Change terminal settings, perform basic tasks,
and list system information.
Switch> Enter the logout command.
To enter privileged EXEC mode, enter the enable command.
Privileged EXEC From user EXEC mode, enter the enable
command.
Switch# To exit to user EXEC mode, enter the disable
command.
To enter global configuration mode, enter the configure
command.
Global configuration
From privileged EXEC mode, enter the configure command.
Switch(config)# To exit to privileged EXEC mode, enter the exit
or end command, or press Ctrl-Z.
To enter interface configuration mode, enter the interface
configuration command.
Interface configuration
From global configuration mode, specify an interface by entering
the interface command followed by an interface identification.
Switch(config-if)# To exit to privileged EXEC mode, enter the
end command, or press Ctrl-Z.
To exit to global configuration mode, enter the exit
command.
VLAN configuration
In global configuration mode, enter the vlan vlan-id
command.
Switch(config-vlan)# To exit to global configuration mode, enter
the exit command.
To return to privileged EXEC mode, enter the end command, or
press Ctrl-Z.
Line configuration From global configuration mode, specify a
line by entering the line command.
Switch(config-line)# To exit to global configuration mode, enter
the exit command.
To return to privileged EXEC mode, enter the end command, or
press Ctrl-Z.
1-2Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 1 Using the Command-Line InterfaceCLI Command Modes
Privileged EXEC ModeBecause many of the privileged commands
configure operating parameters, privileged access should be
password-protected to prevent unauthorized use. The privileged
command set includes those commands contained in user EXEC mode, as
well as the configure privileged EXEC command through which you
access the remaining command modes.
If your system administrator has set a password, you are
prompted to enter it before being granted access to privileged EXEC
mode. The password does not appear on the screen and is case
sensitive.
The privileged EXEC mode prompt is the device name followed by
the pound sign (#).
Switch#
Enter the enable command to access privileged EXEC mode:
Switch> enable Switch#
The supported commands can vary depending on the version of
software in use. To display a comprehensive list of commands, enter
a question mark (?) at the prompt.
Switch# ?
To return to user EXEC mode, enter the disable privileged EXEC
command.
Global Configuration ModeGlobal configuration commands apply to
features that affect the device as a whole. Use the configure
privileged EXEC command to enter global configuration mode. The
default is to enter commands from the management console.
When you enter the configure command, a message prompts you for
the source of the configuration commands:
Switch# configure Configuring from terminal, memory, or network
[terminal]?
You can specify either the terminal or nonvolatile RAM (NVRAM)
as the source of configuration commands.
This example shows you how to access global configuration
mode:
Switch# configure terminal Enter configuration commands, one per
line. End with CNTL/Z.
The supported commands can vary depending on the version of
software in use. To display a comprehensive list of commands, enter
a question mark (?) at the prompt.
Switch(config)# ?
To exit global configuration command mode and to return to
privileged EXEC mode, enter the end or exit command, or press
Ctrl-Z.
1-3Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 1 Using the Command-Line InterfaceCLI Command Modes
Interface Configuration ModeInterface configuration commands
modify the operation of the interface. Interface configuration
commands always follow a global configuration command, which
defines the interface type.
Use the interface interface-id command to access interface
configuration mode. The new prompt means interface configuration
mode.
Switch(config-if)#
The supported commands can vary depending on the version of
software in use. To display a comprehensive list of commands, enter
a question mark (?) at the prompt.
Switch(config-if)# ?
To exit interface configuration mode and to return to global
configuration mode, enter the exit command. To exit interface
configuration mode and to return to privileged EXEC mode, enter the
end command, or press Ctrl-Z.
VLAN Configuration ModeUse this mode to configure normal-range
VLANs (VLAN IDs 1 to 1005) or extended-range VLANs (VLAN IDs 1006
to 4094). The VLAN configuration is saved in the running
configuration file, and you can save it to the switch startup
configuration file by using the copy running-config startup-config
privileged EXEC command. The configurations of VLAN IDs 1 to 1005
are saved in the VLAN database. The extended-range VLAN
configurations are not saved in the VLAN database.
Enter the vlan vlan-id global configuration command to access
VLAN configuration mode:
Switch(config)# vlan 2000Switch(config-vlan)#
To display a comprehensive list of available commands, enter a
question mark (?) at the prompt.
Switch(config-vlan)# ?
For extended-range VLANs, many characteristics are not
configurable and must remain at the default setting.
To return to global configuration mode, enter exit; to return to
privileged EXEC mode, enter end. All the commands except shutdown
take effect when you exit config-vlan mode.
Line Configuration ModeLine configuration commands modify the
operation of a terminal line. Line configuration commands always
follow a line command, which defines a line number. Use these
commands to change terminal parameter settings line-by-line or for
a range of lines.
Use the line vty line_number [ending_line_number] command to
enter line configuration mode. The new prompt means line
configuration mode. The following example shows how to enter line
configuration mode for virtual terminal line 7:
Switch(config)# line vty 0 7
The supported commands can vary depending on the version of
software in use. To display a comprehensive list of commands, enter
a question mark (?) at the prompt.
Switch(config-line)# ?
1-4Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 1 Using the Command-Line InterfaceCLI Command Modes
To exit line configuration mode and to return to global
configuration mode, use the exit command. To exit line
configuration mode and to return to privileged EXEC mode, enter the
end command, or press Ctrl-Z.
1-5Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 1 Using the Command-Line InterfaceCLI Command Modes
1-6Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Cisco ME OL-26663-01
C H A P T E R 2
Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands
aaa accounting dot1xUse the aaa accounting dot1x global
configuration command to enable authentication, authorization, and
accounting (AAA) accounting and to create method lists defining
specific accounting methods on a per-line or per-interface basis
for IEEE 802.1x sessions. Use the no form of this command to
disable IEEE 802.1x accounting.
aaa accounting dot1x {name | default} start-stop {broadcast
group {name | radius | tacacs+} [group {name | radius | tacacs+}...
] | group {name | radius | tacacs+} [group {name | radius |
tacacs+} ... ]}
no aaa accounting dot1x {name | default}
Syntax Description name Name of a server group. This is optional
when you enter it after the broadcast group and group keywords.
default Use the accounting methods that follow as the default
list for accounting services.
start-stop Send a start accounting notice at the beginning of a
process and a stop accounting notice at the end of a process. The
start accounting record is sent in the background. The
requested-user process begins regardless of whether or not the
start accounting notice was received by the accounting server.
broadcast Enable accounting records to be sent to multiple AAA
servers and send accounting records to the first server in each
group. If the first server is unavailable, the switch uses the list
of backup servers to identify the first server.
group Specify the server group to be used for accounting
services. These are valid server group names:
• name—Name of a server group.
• radius—List of all RADIUS hosts.
• tacacs+—List of all TACACS+ hosts.
The group keyword is optional when you enter it after the
broadcast group and group keywords. You can enter more than
optional group keyword.
2-13400E Ethernet Access Switch Command Reference
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsaaa accounting dot1x
Defaults AAA accounting is disabled.
Command Modes Global configuration
Command History
Usage Guidelines This command requires access to a RADIUS
server.
Note We recommend that you enter the dot1x reauthentication
interface configuration command before configuring IEEE 802.1x
RADIUS accounting on an interface.
Examples This example shows how to configure IEEE 802.1x
accounting:
Switch(config)# aaa accounting dot1xSwitch(config)# aaa
accounting dot1x default start-stop group radiusSwitch(config)#
Note The RADIUS authentication server must be properly
configured to accept and log update or watchdog packets from the
AAA client.
Related Commands
radius (Optional) Enable RADIUS authorization.
tacacs+ (Optional) Enable TACACS+ accounting.
Release Modification
12.2(44)EY This command was introduced.
Command Description
aaa authentication dot1x
Specifies one or more AAA methods for use on interfaces running
IEEE 802.1x.
aaa-new-model Enables the AAA access control model. For syntax
information, see the Cisco IOS Security Command Reference, Release
12.2> Authentication, Authorization, and Accounting >
Authentication Commands.
dot1x reauthentication Enables or disables periodic
re-authentication.
dot1x timeout reauth period
Sets the number of seconds between re-authentication
attempts.
2-2Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsaaa authentication dot1x
aaa authentication dot1xUse the aaa authentication dot1x global
configuration command to specify the authentication, authorization,
and accounting (AAA) method to use on ports complying with IEEE
802.1x. Use the no form of this command to disable
authentication.
aaa authentication dot1x {default} method1
no aaa authentication dot1x {default}
Syntax Description
Note Though other keywords are visible in the command-line help
strings, only the default and group radius keywords are
supported.
Defaults No authentication is performed.
Command Modes Global configuration
Command History
Usage Guidelines The method argument identifies the method that
the authentication algorithm tries in the given sequence to
validate the password provided by the client. The only method that
is truly IEEE 802.1x-compliant is the group radius method, in which
the client data is validated against a RADIUS authentication
server.
If you specify group radius, you must configure the RADIUS
server by entering the radius-server host global configuration
command.
Use the show running-config privileged EXEC command to display
the configured lists of authentication methods.
Examples This example shows how to enable AAA and how to create
an IEEE 802.1x-compliant authentication list. This authentication
first tries to contact a RADIUS server. If this action returns an
error, the user is not allowed access to the network.
Switch(config)# aaa new-modelSwitch(config)# aaa authentication
dot1x default group radius
You can verify your settings by entering the show running-config
privileged EXEC command.
default Use the listed authentication method that follows this
argument as the default method when a user logs in.
method1 Enter the group radius keywords to use the list of all
RADIUS servers for authentication.
Release Modification
12.2(44)EY This command was introduced.
2-3Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsaaa authentication dot1x
Related Commands Command Description
aaa new-model Enables the AAA access control model. For syntax
information, see the Cisco IOS Security Command Reference, Release
12.2 > Authentication, Authorization, and Accounting >
Authentication Commands.
show running-config Displays the operating configuration. For
syntax information, use this link to the Cisco IOS Release 12.2
Command Reference listing page:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_reference_list.html
Select the Cisco IOS Commands Master List, Release 12.2 to navigate
to the command.
2-4Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_reference_list.htmlhttp://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_reference_list.html
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsaction
actionUse the action access-map configuration command to set the
action for the VLAN access map entry. Use the no form of this
command to set the action to the default value, which is to
forward.
action {drop | forward}
no action
Syntax Description
Defaults The default action is to forward packets.
Command Modes Access-map configuration
Command History
Usage Guidelines You enter access-map configuration mode by
using the vlan access-map global configuration command.
If the action is drop, you should define the access map,
including configuring any access control list (ACL) names in match
clauses, before applying the map to a VLAN, or all packets could be
dropped.
In access-map configuration mode, use the match access-map
configuration command to define the match conditions for a VLAN
map. Use the action command to set the action that occurs when a
packet matches the conditions.
The drop and forward parameters are not used in the no form of
the command.
Examples This example shows how to identify and apply a VLAN
access map vmap4 to VLANs 5 and 6 that causes the VLAN to forward
an IP packet if the packet matches the conditions defined in access
list al2:
Switch(config)# vlan access-map vmap4Switch(config-access-map)#
match ip address al2Switch(config-access-map)# action
forwardSwitch(config-access-map)# exitSwitch(config)# vlan filter
vmap4 vlan-list 5-6
You can verify your settings by entering the show vlan
access-map privileged EXEC command.
drop Drop the packet when the specified conditions are
matched.
forward Forward the packet when the specified conditions are
matched.
Release Modification
12.2(44)EY This command was introduced.
2-5Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsaction
Related Commands Command Description
access-list {deny | permit} Configures a standard numbered ACL.
For syntax information, select Cisco IOS IP Command Reference,
Volume 1 of 3:Addressing and Services, Release 12.2 > IP
Services Commands.
ip access-list Creates a named access list. For syntax
information, select Cisco IOS IP Command Reference, Volume 1 of
3:Addressing and Services, Release 12.2 > IP Services
Commands.
mac access-list extended Creates a named MAC address access
list.
match (access-map configuration)
Defines the match conditions for a VLAN map.
show vlan access-map Displays the VLAN access maps created on
the switch.
vlan access-map Creates a VLAN access map.
2-6Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsalarm-contact
alarm-contact Use the alarm-contact global configuration command
to configure triggers and severity levels for external alarms. Use
the no form of this command to remove the configuration.
alarm-contact {contact-number {description string | severity
{critical | major | minor} | trigger {closed | open}} | all
{severity {critical | major | minor} | trigger {closed | open}}
no alarm-contact {contact-number {description | severity |
trigger} | all {severity | trigger}
Defaults No alarms are configured.
Command Modes Global configuration
Command History
Usage Guidelines The no alarm-contact contact-number description
sets the description to an empty string.
The no alarm-contact {contact-number | all} severity sets the
alarm-contact severity to minor.
The no alarm-contact {contact-number | all} trigger sets the
external alarm-contact trigger to closed.
contact-number Configure a specific alarm contact number. The
range is 1 to 4.
description string
Add a description for the alarm contact number. The description
string can be up to 80 alphanumeric characters in length and is
included in the system message generated when the alarm is
triggered.
all Configure all alarm contacts.
severity Set the severity level that is set when the alarm is
triggered. The severity is included in the alarm notification.
Entering no alarm-contact severity sets the severity to minor.
critical Set severity level as critical.
major Set severity level as major.
minor Set severity level as minor.
trigger Set the state that triggers the alarm, whether the
connected circuit is open or closed. Entering no alarm-contact
trigger sets the trigger to closed.
closed Specify that the alarm is triggered when the contact is
closed.
open Specify that the alarm is triggered when the contact is
open.
Release Modification
12.2(44)EY This command was introduced.
2-7Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsalarm-contact
Examples This example shows how to configure alarm contact
number 1 to report a critical alarm when the contact is open.
Switch(config)# alarm-contact 1 description
main_lab_doorSwitch(config)# alarm-contact 1 severity critical
Switch(config)# alarm-contact 1 trigger openDec 4 10:34:09.049:
%PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_ASSERT: Alarm asserted:
main_lab_door
You can verify your settings by entering the show env
alarm-contact or the show running-config privileged EXEC
command.
Switch# show env alarm-contactALARM CONTACT 1 Status: asserted
Description: main_lab_door Severity: critical Trigger: open
This example shows how to configure clear alarm contact number 1
and the show command outputs.
Switch(config)# no alarm-contact 1 descriptionDec 4
10:39:33.621: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_CLEAR: Alarm
cleared: main_lab_door Dec 4 10:39:33.621:
%PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_ASSERT: Alarm asserted:
external alarm contact 1
Switch(config)# no alarm-contact 1 severityDec 4 10:39:46.774:
%PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_CLEAR: Alarm cleared:
external alarm contact 1 Dec 4 10:39:46.774:
%PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_ASSERT: Alarm asserted:
external alarm contact 1
Switch(config)# no alarm-contact 1 trigger openDec 4
10:39:56.547: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_CLEAR: Alarm
cleared: external alarm contact 1
Switch(config)# endSwitch# show env alarm-contactALARM CONTACT 1
Status: not asserted Description: external alarm contact 1
Severity: minor Trigger: closedSwitch# show hard ledSWITCH:
1SYSTEM: GREENMGMT: GREENALARM 1: BLACKALARM 2: BLACKALARM 3:
BLACKALARM 4: BLACK
Related Commands Command Description
show env alarm-contact Displays the alarm setting and status for
the switch.
2-8Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive download-sw
archive download-swUse the archive download-sw privileged EXEC
command to download a new image from a TFTP server to the switch
and to overwrite or keep the existing image.
archive download-sw {/force-reload | /imageonly | /leave-old-sw
| /no-set-boot | /no-version-check | /overwrite | /reload | /safe}
source-url
Syntax Description /force-reload Unconditionally force a system
reload after successfully downloading the software image.
/imageonly Download only the software image but not the HTML
files associated with the embedded device manager. The HTML files
for the existing version are deleted only if the existing version
is being overwritten or removed.
/leave-old-sw Keep the old software version after a successful
download.
/no-set-boot Do not alter the setting of the BOOT environment
variable to point to the new software image after it is
successfully downloaded.
/no-version-check Download the software image without checking
to prevent installing an incompatible image.
/overwrite Overwrite the software image in flash memory with the
downloaded one.
/reload Reload the system after successfully downloading the
image unless the configuration has been changed and not been
saved.
/safe Keep the current software image; do not delete it to make
room for the new software image before the new image is downloaded.
The current image is deleted after the download.
source-url The source URL alias for a local or network file
system. These options are supported:
• The syntax for the local flash file system:flash:
• The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/image-name.tar
• The syntax for an HTTP
server:http://[[username:password]@]{hostname |
host-ip}[/directory]/image-name.tar
• The syntax for a secure HTTP
server:https://[[username:password]@]{hostname |
host-ip}[/directory]/image-name.tar
• The syntax for the Remote Copy Protocol (RCP):
rcp:[[//username@location]/directory]/image-name.tar
• The syntax for the
TFTP:tftp:[[//location]/directory]/image-name.tar
The image-name.tar is the software image to download and install
on the switch.
2-9Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive download-sw
Defaults The current software image is not overwritten with the
downloaded image.
Both the software image and HTML files are downloaded.
The new image is downloaded to the flash: file system.
The BOOT environment variable is changed to point to the new
software image on the flash: file system.
Image names are case sensitive; the image file is provided in
tar format.
Compatibility of the version on the image to be downloaded is
checked.
Command Modes Privileged EXEC
Command History
Usage Guidelines The /imageonly option removes the HTML files
for the existing image if the existing image is being removed or
replaced. Only the Cisco IOS image (without the HTML files) is
downloaded.
Using the /safe or /leave-old-sw option can cause the new image
download to fail if there is insufficient flash memory. If leaving
the software in place prevents the new image from fitting in flash
memory due to space constraints, an error results.
If you used the /leave-old-sw option and did not overwrite the
old image when you downloaded the new one, you can remove the old
image by using the delete privileged EXEC command. For more
information, see the “delete” section on page 2-80.
Note Use the /no-version-check option with care. This option
allows an image to be downloaded without first confirming that it
is not incompatible with the switch.
Use the /overwrite option to overwrite the image on the flash
device with the downloaded one.
If you specify the command without the /overwrite option, the
download algorithm verifies that the new image is not the same as
the one on the switch flash device. If the images are the same, the
download does not occur. If the images are different, the old image
is deleted, and the new one is downloaded.
After downloading a new image, enter the reload privileged EXEC
command to begin using the new image, or specify the /reload or
/force-reload option in the archive download-sw command.
Examples This example shows how to download a new image from a
TFTP server at 172.20.129.10 and overwrite the image on the
switch:
Switch# archive download-sw /overwrite
tftp://172.20.129.10/test-image.tar
This example shows how to download only the software image from
a TFTP server at 172.20.129.10 to the switch:
Switch# archive download-sw /imageonly
tftp://172.20.129.10/test-image.tar
This example shows how to keep the old software version after a
successful download:
Switch# archive download-sw /leave-old-sw
tftp://172.20.129.10/test-image.tar
Release Modification
12.2(44)EY This command was introduced.
2-10Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive download-sw
Related Commands Command Description
archive tar Creates a tar file, lists the files in a tar file,
or extracts the files from a tar file.
archive upload-sw Uploads an existing image on the switch to a
server.
delete Deletes a file or directory on the flash memory
device.
2-11Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive tar
archive tarUse the archive tar privileged EXEC command to create
a tar file, list files in a tar file, or extract the files from a
tar file.
archive tar {/create destination-url flash:/file-url} | {/table
source-url} | {/xtract source-url flash:/file-url
[dir/file...]}
Syntax Description /create destination-url flash:/file-url
Create a new tar file on the local or network file system.
For destination-url, specify the destination URL alias for the
local or network file system and the name of the tar file to
create. These options are supported:
• The syntax for the local flash filesystem:flash:
• The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/tar-filename.tar
• The syntax for the Remote Copy Protocol (RCP) is:
rcp:[[//username@location]/directory]/tar-filename.tar
• The syntax for the TFTP:
tftp:[[//location]/directory]/tar-filename.tar
The tar-filename.tar is the tar file to be created.
For flash:/file-url, specify the location on the local flash
file system from which the new tar file is created.
An optional list of files or directories within the source
directory can be specified to write to the new tar file. If none
are specified, all files and directories at this level are written
to the newly created tar file.
/table source-url Display the contents of an existing tar file
to the screen.
For source-url, specify the source URL alias for the local or
network file system. These options are supported:
• The syntax for the local flash file system:flash:
• The syntax for the
FTP:ftp:[[//username[:password]@location]/directory]/tar-filename.tar
• The syntax for the RCP:
rcp:[[//username@location]/directory]/tar-filename.tar
• The syntax for the TFTP:
tftp:[[//location]/directory]/tar-filename.tar
The tar-filename.tar is the tar file to display.
2-12Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive tar
Defaults None
Command Modes Privileged EXEC
Command History
Usage Guidelines Filenames and directory names are case
sensitive.
Image names are case sensitive.
Examples This example shows how to create a tar file. The
command writes the contents of the new-configs directory on the
local flash device to a file named saved.tar on the TFTP server at
172.20.10.30:
Switch# archive tar /create tftp:172.20.10.30/saved.tar
flash:/new-configs
This example shows how to display the contents of the file that
is in flash memory. The contents of the tar file appear on the
screen:
Switch# archive tar /table flash:image_name-mz.122-release.tar
info (219
bytes)image_name-mz.122-release/(directory)image_name-mz.122-release(610856
bytes)image_name-mz.122-release/info (219 bytes)info.ver (219
bytes)
/xtract source-url flash:/file-url [dir/file...]
Extract files from a tar file to the local file system.
For source-url, specify the source URL alias for the local file
system. These options are supported:
• The syntax for the local flash file system:flash:
• The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/tar-filename.tar
• The syntax for the RCP:
rcp:[[//username@location]/directory]/tar-filename.tar
• The syntax for the TFTP:
tftp:[[//location]/directory]/tar-filename.tar
The tar-filename.tar is the tar file from which to extract.
For flash:/file-url [dir/file...], specify the location on the
local flash file system into which the tar file is extracted. Use
the dir/file... option to specify an optional list of files or
directories within the tar file to be extracted. If none are
specified, all files and directories are extracted.
Release Modification
12.2(44)EY This command was introduced.
2-13Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive tar
This example shows how to display only the html directory and
its contents:
Switch# archive tar /table flash:image_name-mz.122-release.tar
image_name-mz.122-release/htmlimage_name-mz.122-release/html/
(directory)image_name-mz.122-release/html/const.htm (556
bytes)image_name-mz.122-release/html/xhome.htm (9373
bytes)image_name-mz.122-release/html/menu.css (1654 bytes)
This example shows how to extract the contents of a tar file on
the TFTP server at 172.20.10.30. This command extracts just the
new-configs directory into the root directory on the local flash
file system. The remaining files in the saved.tar file are
ignored.
Switch# archive tar /xtract tftp://172.20.10.30/saved.tar
flash:/ new-configs
Related Commands Command Description
Command History Downloads a new image from a TFTP server to the
switch.
archive upload-sw Uploads an existing image on the switch to a
server.
2-14Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive upload-sw
archive upload-swUse the archive upload-sw privileged EXEC
command to upload an existing switch image to a server.
archive upload-sw [/version version_string] destination-url
Syntax Description
Defaults Uploads the currently running image from the flash:
file system.
Command Modes Privileged EXEC
Command History
Usage Guidelines Use the upload feature only if the HTML files
associated with the embedded device manager have been installed
with the existing image.
The files are uploaded in this sequence: the Cisco IOS image,
the HTML files, and info. After these files are uploaded, the
software creates the tar file.
Image names are case sensitive.
Examples This example shows how to upload the currently running
image to a TFTP server at 172.20.140.2:
Switch# archive upload-sw tftp://172.20.140.2/test-image.tar
/version version_string (Optional) Specify the specific version
string of the image to be uploaded.
destination-url The destination URL alias for a local or network
file system. These options are supported:
• The syntax for the local flash file system:flash:
• The syntax for the FTP:
ftp:[[//username[:password]@location]/directory]/image-name.tar
• The syntax for the Remote Copy Protocol (RCP):
rcp:[[//username@location]/directory]/image-name.tar
• The syntax for the
TFTP:tftp:[[//location]/directory]/image-name.tar
The image-name.tar is the name of software image to be stored on
the server.
Release Modification
12.2(44)EY This command was introduced.
2-15Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarchive upload-sw
Related Commands Command Description
Command History Downloads a new image to the switch.
archive tar Creates a tar file, lists the files in a tar file,
or extracts the files from a tar file.
2-16Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarp access-list
arp access-listUse the arp access-list global configuration
command to define an Address Resolution Protocol (ARP) access
control list (ACL) or to add clauses to the end of a previously
defined list. Use the no form of this command to delete the
specified ARP access list.
arp access-list acl-name
no arp access-list acl-name
Syntax Description
Defaults No ARP access lists are defined.
Command Modes Global configuration
Command History
Usage Guidelines After entering the arp access-list command, you
enter ARP access-list configuration mode, and these configuration
commands are available:
• default: returns a command to its default setting.
• deny: specifies packets to reject. For more information, see
the “deny (ARP access-list configuration)” section on page
2-81.
• exit: exits ARP access-list configuration mode.
• no: negates a command or returns to the default settings.
• permit: specifies packets to forward. For more information,
see the “permit (ARP access-list configuration)” section on page
2-322.
Use the permit and deny access-list configuration commands to
forward and to drop ARP packets based on the specified matching
criteria.
When the ARP ACL is defined, you can apply it to a VLAN by using
the ip arp inspection filter vlan global configuration command. ARP
packets containing only IP-to-MAC address bindings are compared to
the ACL. All other types of packets are bridged in the ingress VLAN
without validation. If the ACL permits a packet, the switch
forwards it. If the ACL denies a packet because of an explicit deny
statement, the switch drops the packet. If the ACL denies a packet
because of an implicit deny statement, the switch compares the
packet to the list of DHCP bindings (unless the ACL is static,
which means that packets are not compared to the bindings).
acl-name Name of the ACL.
Release Modification
12.2(44)EY This command was introduced.
2-17Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsarp access-list
Examples This example shows how to define an ARP access list and
to permit both ARP requests and ARP responses from a host with an
IP address of 1.1.1.1 and a MAC address of 0000.0000.abcd:
Switch(config)# arp access-list
static-hostsSwitch(config-arp-nacl)# permit ip host 1.1.1.1 mac
host 00001.0000.abcdSwitch(config-arp-nacl)# end
You can verify your settings by entering the show arp
access-list privileged EXEC command.
Related Commands Command Description
deny (ARP access-list configuration)
Denies an ARP packet based on matches compared against the DHCP
bindings.
ip arp inspection filter vlan
Permits ARP requests and responses from a host configured with a
static IP address.
permit (ARP access-list configuration)
Permits an ARP packet based on matches compared against the DHCP
bindings.
show arp access-list Displays detailed information about ARP
access lists.
2-18Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsbandwidth
bandwidthUse the bandwidth policy-map class configuration
command to configure class-based weighted fair queuing (CBWFQ) by
setting the output bandwidth for a policy-map class. Use the no
form of this command to remove the bandwidth setting for the
class.
bandwidth {rate | percent value | remaining percent value}
no bandwidth [rate | percent value | remaining percent
value]
Syntax Description
Defaults No bandwidth is defined.
Command Modes Policy-map class configuration
Command History
Usage Guidelines You use the bandwidth policy-map class command
to control output traffic. The bandwidth command specifies the
bandwidth for traffic in that class. CBWFQ derives the weight for
packets belonging to the class from the bandwidth allocated to the
class and uses the weight to ensure that the queue for that class
is serviced fairly. Bandwidth settings are not supported in input
policy maps.
When you configure bandwidth for a class of traffic as an
absolute rate (kbps) or a percentage of bandwidth (percent value),
it represents the minimum bandwidth guarantee or committed
information rate (CIR) for that traffic class. This means that the
traffic class gets at least the bandwidth specified in the command,
but is not limited to that bandwidth. Any excess bandwidth on the
port is allocated to each class in the same ratio as the configured
CIR rates.
When you enter the bandwidth remaining percent command, hard
bandwidths are not guaranteed, and only relative bandwidths are
assured. Class bandwidths are always proportional to the specified
bandwidth percentages configured for the port.
When you configure bandwidth in an output policy, you must
specify the same units in each bandwidth configuration; that is,
all absolute values (rates) or percentages.
The total rate of the minimum bandwidth guarantees for each
queue of the policy cannot exceed the total speed for the
interface. If the percent keyword is used, the sum of the class
bandwidth percentages cannot exceed 100 percent.
rate Set the bandwidth rate for the class in kilobits per second
(kbps). The range is from 64 to 1000000.
percent value Set the bandwidth for the class as a percent of
the total bandwidth. The range is from 1 to 100 percent.
remaining percent value Set the bandwidth for the class as a
percent of the remaining bandwidth. The range is from 1 to 100
percent.
Release Modification
12.2(44)EY This command was introduced.
2-19Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsbandwidth
Using the queue-limit command to modify the default queue limit
is especially important on higher-speed interfaces so that they
meet the minimum bandwidth guarantees required by the
interface.
You cannot use the bandwidth policy-map class configuration
command to configure CBWFQ and the shape average command to
configure class-based shaping for the same class in a policy
map.
You cannot configure bandwidth in a class that includes priority
queuing (configured with the priority policy-map class
configuration command).
Examples This example shows how to set the precedence of output
queues by setting bandwidth in kilobits per second. The classes
outclass1, outclass2, and outclass3 get a minimum of 50000, 20000,
and 10000 kbps. The class class-default at a minimum gets the
remaining bandwidth.
Switch(config)# policy-map out-policySwitch(config-pmap)# class
outclass1Switch(config-pmap-c)# bandwidth
50000Switch(config-pmap-c)# exitSwitch(config-pmap)# class
outclass2Switch(config-pmap-c)# bandwidth
20000Switch(config-pmap-c)# exitSwitch(config-pmap)# class
outclass3Switch(config-pmap-c)# bandwidth
10000Switch(config-pmap-c)# exitSwitch(config-pmap)#
exitSwitch(config)# interface fastethernet 0/1Switch(config-if)#
service-policy output out-policySwitch(config-if)# exit
This example shows how to set the precedence of output queues by
allocating percentages of the total available bandwidth to each
traffic class.The classes outclass1, outclass2, and outclass3 get a
minimum of 50, 20, and 10 percent. The class class-default at a
minimum gets 20 percent.
Switch(config)# policy-map out-policySwitch(config-pmap)# class
outclass1Switch(config-pmap-c)# bandwidth percent
50Switch(config-pmap-c)# exitSwitch(config-pmap)# class
outclass2Switch(config-pmap-c)# bandwidth percent
20Switch(config-pmap-c)# exitSwitch(config-pmap)# class
outclass3Switch(config-pmap-c)# bandwidth percent
10Switch(config-pmap-c)# exitSwitch(config-pmap)#
exitSwitch(config)# interface fastethernet 0/1Switch(config-if)#
service-policy output out-policySwitch(config-if)# exit
2-20Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsbandwidth
This example shows how to set outclass1 as a priority queue,
with outclass2, and outclass3 getting 50 and 20 percent,
respectively, of the bandwidth remaining after the priority queue
is serviced. The class class-default gets the remaining 30 percent
with no guarantees.
Switch(config)# policy-map out-policySwitch(config-pmap)# class
outclass1Switch(config-pmap-c)# prioritySwitch(config-pmap-c)#
exitSwitch(config-pmap)# class outclass2Switch(config-pmap-c)#
bandwidth remaining percent 50Switch(config-pmap-c)#
exitSwitch(config-pmap)# class outclass3Switch(config-pmap-c)#
bandwidth remaining percent 20Switch(config-pmap-c)#
exitSwitch(config-pmap)# exitSwitch(config)# interface fastethernet
0/1Switch(config-if)# service-policy output
out-policySwitch(config-if)# exit
You can verify your settings by entering the show policy-map
privileged EXEC command.
Related Commands Command Description
class Defines a traffic classification match criteria for the
specified class-map name.
policy-map Creates or modifies a policy map that can be attached
to multiple ports to specify a service policy.
show policy-map Displays quality of service (QoS) policy
maps.
2-21Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot buffersize
boot buffersizeUse the boot buffersize global configuration
command to configure the NVRAM size. Use the no form of this
command to return to the default.
boot buffersize size
no boot buffersize
Syntax Description
Defaults The default NVRAM buffer size is 512 KB.
Command Modes Global configuration
Command History
Usage Guidelines The default NVRAM buffer size is 512 KB. In
some cases, the configuration file might be too large to save to
NVRAM. You can configure the size of the NVRAM buffer to support
larger configuration files.
After you configure the NVRAM buffer size, reload the
switch.
Examples This example shows how to configure the NVRAM buffer
size:
Switch(config)# boot buffersize 524288Switch(config)# end
Related Commands
size The NVRAM buffer size in KB.
The valid range is from 4096 to 1048576.
Release Modification
12.2(55)SE This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-22Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot config-file
boot config-fileUse the boot config-file global configuration
command to specify the filename that Cisco IOS uses to read and
write a nonvolatile copy of the system configuration. Use the no
form of this command to return to the default setting.
boot config-file flash:/file-url
no boot config-file
Syntax Description
Defaults The default configuration file is
flash:config.text.
Command Modes Global configuration
Command History
Usage Guidelines Filenames and directory names are case
sensitive.
This command changes the setting of the CONFIG_FILE environment
variable. For more information, see Appendix A, “Cisco ME 3400E
Ethernet Access Switch Boot Loader Commands.”
Related Commands
flash:/file-url The path (directory) and name of the
configuration file.
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-23Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot enable-break
boot enable-breakUse the boot enable-break global configuration
command to enable interrupting the automatic boot process. Use the
no form of this command to return to the default setting.
boot enable-break
no boot enable-break
Syntax Description This command has no arguments or
keywords.
Defaults Disabled. The automatic boot process cannot be
interrupted by pressing the Break key on the console.
Command Modes Global configuration
Command History
Usage Guidelines When you enter this command, you can interrupt
the automatic boot process by pressing the break key on the console
after the flash file system is initialized. The break key is
different for each operating system:
• On a SUN work station running UNIX, Ctrl-C is the break
key.
• On a PC running Windows 2000, Ctrl-Break is the break key.
This command changes the setting of the ENABLE_BREAK environment
variable. For more information, see Appendix A, “Cisco ME 3400E
Ethernet Access Switch Boot Loader Commands.”
Related Commands
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-24Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot helper
boot helperUse the boot helper global configuration command to
dynamically load files during boot loader initialization to extend
or patch the functionality of the boot loader. Use the no form of
this command to return to the default.
boot helper filesystem:/file-url ...
no boot helper
Syntax Description
Defaults No helper files are loaded.
Command Modes Global configuration
Command History
Usage Guidelines This variable is used only for internal
development and testing.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER environment
variable. For more information, see Appendix A, “Cisco ME 3400E
Ethernet Access Switch Boot Loader Commands.”
Related Commands
filesystem: Alias for a flash file system. Use flash: for the
system board flash device.
/file-url The path (directory) and a list of loadable files to
dynamically load during loader initialization. Separate each image
name with a semicolon.
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-25Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot helper-config-file
boot helper-config-fileUse the boot helper-config-file global
configuration command to specify the name of the configuration file
to be used by the Cisco IOS helper image. If this is not set, the
file specified by the CONFIG_FILE environment variable is used by
all versions of Cisco IOS that are loaded. Use the no form of this
command to return to the default setting.
boot helper-config-file filesystem:/file-url
no boot helper-config file
Syntax Description
Defaults No helper configuration file is specified.
Command Modes Global configuration
Command History
Usage Guidelines This variable is used only for internal
development and testing.
Filenames and directory names are case sensitive.
This command changes the setting of the HELPER_CONFIG_FILE
environment variable. For more information, see Appendix A, “Cisco
ME 3400E Ethernet Access Switch Boot Loader Commands.”
Related Commands
filesystem: Alias for a flash file system. Use flash: for the
system board flash device.
/file-url The path (directory) and helper configuration file to
load.
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-26Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot manual
boot manualUse the boot manual global configuration command to
enable manually booting the switch during the next boot cycle. Use
the no form of this command to return to the default setting.
boot manual
no boot manual
Syntax Description This command has no arguments or
keywords.
Defaults Manual booting is disabled.
Command Modes Global configuration
Command History
Usage Guidelines The next time you reboot the system, the switch
is in boot loader mode, which is shown by the switch: prompt. To
boot the system, use the boot boot loader command, and specify the
name of the bootable image.
This command changes the setting of the MANUAL_BOOT environment
variable. For more information, see Appendix A, “Cisco ME 3400E
Ethernet Access Switch Boot Loader Commands.”
Related Commands
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-27Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot private-config-file
boot private-config-fileUse the boot private-config-file global
configuration command to specify the filename that Cisco IOS uses
to read and write a nonvolatile copy of the private configuration.
Use the no form of this command to return to the default
setting.
boot private-config-file filename
no boot private-config-file
Syntax Description
Defaults The default configuration file is private-config.
Command Modes Global configuration
Command History
Usage Guidelines Filenames are case sensitive.
Examples This example shows how to specify the name of the
private configuration file to be pconfig:
Switch(config)# boot private-config-file pconfig
Related Commands
filename The name of the private configuration file.
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-28Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandsboot system
boot systemUse the boot system global configuration command to
specify the Cisco IOS image to load during the next boot cycle. Use
the no form of this command to return to the default setting.
boot system filesystem:/file-url ...
no boot system
Syntax Description
Defaults The switch attempts to automatically boot the system by
using information in the BOOT environment variable. If this
variable is not set, the switch attempts to load and execute the
first executable image it can by performing a recursive,
depth-first search throughout the flash file system. In a
depth-first search of a directory, each encountered subdirectory is
completely searched before continuing the search in the original
directory.
Command Modes Global configuration
Command History
Usage Guidelines Filenames and directory names are case
sensitive.
If you are using the archive download-sw privileged EXEC command
to maintain system images, you never need to use the boot system
command. The boot system command is automatically manipulated to
load the downloaded image.
This command changes the setting of the BOOT environment
variable. For more information, see Appendix A, “Cisco ME 3400E
Ethernet Access Switch Boot Loader Commands.”
Related Commands
filesystem: Alias for a flash file system. Use flash: for the
system board flash device.
/file-url The path (directory) and name of a bootable image.
Separate image names with a semicolon.
Release Modification
12.2(44)EY This command was introduced.
Command Description
show boot Displays the settings of the boot environment
variables.
2-29Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandschannel-group
channel-groupUse the channel-group interface configuration
command to assign an Ethernet port to an EtherChannel group. Use
the no form of this command to remove an Ethernet port from an
EtherChannel group.
channel-group channel-group-number mode {active | {auto
[non-silent] | desirable [non-silent] | on} | passive}
no channel-group
PAgP modes: channel-group channel-group-number mode {auto
[non-silent] | {desirable [non-silent]}
LACP modes: channel-group channel-group-number mode {active |
passive}
On mode: channel-group channel-group-number mode on
Note Link Aggregation Control Protocol (LACP.) and Port
Aggregation Protocol (PAgP) are available only on network node
interfaces (NNIs) or enhanced network interfaces (ENIs). The
active, auto, desirable, and passive keywords are not visible on
user network interfaces (UNIs).
Syntax Description channel-group-number Specify the channel
group number. The range is 1 to 48.
mode Specify the EtherChannel mode.
active Unconditionally enable LACP
Active mode places a port into a negotiating state in which the
port initiates negotiations with other ports by sending LACP
packets. A channel is formed with another port group in either the
active or passive mode.
auto Enable the PAgP only if a PAgP device is detected.
Auto mode places a port into a passive negotiating state in
which the port responds to PAgP packets it receives but does not
start PAgP packet negotiation. A channel is formed only with
another port group in desirable mode. When auto is enabled, silent
operation is the default.
desirable Unconditionally enable PAgP.
Desirable mode places a port into an active negotiating state in
which the port starts negotiations with other ports by sending PAgP
packets. A channel is formed with another port group in either the
desirable or auto mode. When desirable is enabled, silent operation
is the default.
non-silent (Optional) Use in PAgP mode with the auto or
desirable keyword when traffic is expected from the other
device.
2-30Cisco ME 3400E Ethernet Access Switch Command Reference
OL-26663-01
-
Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS
Commandschannel-group
Defaults No channel groups are assigned.
No mode is configured.
Command Modes Interface configuration
Command History
Usage Guidelines For Layer 2 EtherChannels, you do not have to
create a port-channel interface first by using the interface
port-channel global configuration command before assigning a
physical port to a channel group. Instead, you can use the
channel-group interface configuration command. It automatically
creates the port-channel interface when the channel group gets its
first physical port if the logical interface is not already
created. If you create the port-channel interface first, the
channel-group-number can be the same as the port-channel-number, or
you can use a new number. If you use a new number, the
channel-group command dynamically creates a new port channel.
If the port is a UNI or an ENI, you must use the no shutdown
interface configuration command to enable it before using the
channel-group command. UNIs and ENIs are disabled by default. NNIs
are enabled by default.
You do not have to disable the IP address that is assigned to a
physical port that is part of a channel group, but we strongly
recommend that you do so.
You create Layer 3 port ch