Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches) Americas Headquarters

Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches) Americas Headquarters
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650
Switches)
First Published: March 31, 2016
Last Modified: April 21, 2016
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2016
Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface
Preface xxxi
Document Conventions xxxi
Related Documentation xxxiii
Obtaining Documentation and Submitting a Service Request xxxiii
CHAPTER 1
Using the Command-Line Interface 1
Using the Command-Line Interface 1
Understanding Command Modes 1
Understanding the Help System 3
Understanding Abbreviated Commands 4
Understanding no and default Forms of Commands 4
Understanding CLI Error Messages 4
Using Configuration Logging 5
Using Command History 5
Changing the Command History Buffer Size 5
Recalling Commands 5
Disabling the Command History Feature 6
Using Editing Features 6
Enabling and Disabling Editing Features 6
Editing Commands through Keystrokes 7
Editing Command Lines that Wrap 9
Searching and Filtering Output of show and more Commands 9
Accessing the CLI 10
Accessing the CLI through a Console Connection or through Telnet 10
PART I
CleanAir 11
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
iii
Contents
CHAPTER 2
CleanAir Commands 13
ap dot11 5ghz cleanair 15
ap dot11 5ghz cleanair alarm air-quality 16
ap dot11 5ghz cleanair alarm device 17
default ap dot11 5ghz cleanair device 19
ap dot11 5ghz rrm channel cleanair-event 21
ap dot11 5ghz rrm channel device 23
ap dot11 24ghz cleanair 24
ap dot11 24ghz cleanair alarm air-quality 25
ap dot11 24ghz cleanair alarm device 26
default ap dot11 24ghz cleanair device 28
ap dot11 24ghz rrm channel cleanair-event 30
ap dot11 24ghz rrm channel device 32
ap name mode se-connect 33
default ap dot11 5ghz cleanair device 34
default ap dot11 5ghz rrm channel cleanair-event 36
default ap dot11 5ghz rrm channel device 37
default ap dot11 24ghz cleanair alarm device 38
default ap dot11 24ghz cleanair device 40
default ap dot11 24ghz rrm channel cleanair-event 42
show ap dot11 5ghz cleanair air-quality summary 43
show ap dot11 5ghz cleanair air-quality worst 44
show ap dot11 5ghz cleanair config 45
show ap dot11 5ghz cleanair device type 47
show ap dot11 24ghz cleanair air-quality summary 49
show ap dot11 24ghz cleanair air-quality worst 50
show ap dot11 24ghz cleanair config 51
show ap dot11 24ghz cleanair summary 53
Flexible NetFlow Commands 55
PART II
CHAPTER 3
Flexible NetFlow Commands 57
cache 59
clear flow exporter 61
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
iv
Contents
clear flow monitor 62
collect 64
collect counter 66
collect interface 67
collect timestamp absolute 68
collect transport tcp flags 70
datalink flow monitor 72
debug flow exporter 74
debug flow monitor 75
debug flow record 76
debug sampler 77
description 78
destination 79
dscp 81
export-protocol netflow-v9 82
exporter 83
flow exporter 84
flow monitor 85
flow record 86
ip flow monitor 87
ipv6 flow monitor 89
match datalink ethertype 91
match datalink mac 93
match datalink vlan 95
match flow cts 96
match flow direction 97
match interface 98
match ipv4 99
match ipv4 destination address 101
match ipv4 source address 102
match ipv4 ttl 103
match ipv6 104
match ipv6 destination address 105
match ipv6 hop-limit 106
match ipv6 source address 107
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
v
Contents
match transport 108
match transport icmp ipv4 109
match transport icmp ipv6 110
mode random 1 out-of 111
option 112
record 114
sampler 115
show flow exporter 116
show flow interface 118
show flow monitor 120
show flow record 123
show sampler 124
source 126
template data timeout 128
transport 129
ttl 130
PART III
Interface and Hardware Components 131
CHAPTER 4
Interface and Hardware Commands 133
client vlan 136
debug ilpower 137
debug interface 139
debug lldp packets 141
debug nmsp 142
debug platform poe 143
duplex 144
errdisable detect cause 146
errdisable recovery cause 148
errdisable recovery interval 151
interface 152
interface range 154
ip mtu 155
ipv6 mtu 157
lldp (interface configuration) 159
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
vi
Contents
logging event power-inline-status 161
mdix auto 162
mode (power-stack configuration) 164
network-policy 166
network-policy profile (global configuration) 167
nmsp attachment suppress 169
power efficient-ethernet auto 170
power-priority 171
power inline 173
power inline police 176
power supply 179
show CAPWAP summary 181
show controllers cpu-interface 182
show controllers ethernet-controller 184
show controllers utilization 194
show eee 196
show env 199
show errdisable detect 202
show errdisable recovery 203
show interfaces 204
show interfaces counters 208
show interfaces switchport 211
show interfaces transceiver 214
show module 217
show mgmt-infra trace messages ilpower 218
show mgmt-infra trace messages ilpower-ha 220
show mgmt-infra trace messages platform-mgr-poe 221
show network-policy profile 222
show platform CAPWAP summary 223
show power inline 224
show stack-power 230
show system mtu 231
show wireless interface summary 232
speed 233
stack-power 235
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
vii
Contents
switchport block 237
system mtu 239
voice-signaling vlan (network-policy configuration) 240
voice vlan (network-policy configuration) 242
wireless ap-manager interface 244
wireless exclusionlist 245
wireless linktest 246
wireless management interface 247
wireless peer-blocking forward-upstream 248
PART IV
IP 249
CHAPTER 5
IP Commands 251
fhrp delay 253
fhrp version vrrp v3 254
glbp authentication 255
glbp forwarder preempt 257
glbp ip 258
glbp load-balancing 260
glbp name 262
glbp preempt 264
glbp priority 265
glbp timers 266
glbp weighting 268
glbp weighting track 270
ip address dhcp 272
ip address pool (DHCP) 275
ip address 276
key chain 279
key-string (authentication) 280
key 281
show glbp 283
show key chain 287
show track 288
track 290
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
viii
Contents
vrrp 292
vrrp description 293
vrrp preempt 294
vrrp priority 296
vrrp timers advertise 297
vrrs leader 299
PART V
CHAPTER 6
IP Multicast Routing Commands 301
IP Multicast Commands 303
cache-memory-max 305
clear ip mfib counters 306
clear ip mroute 307
ip igmp filter 309
ip igmp max-groups 310
ip igmp profile 312
ip igmp snooping 314
ip igmp snooping last-member-query-count 315
ip igmp snooping querier 317
ip igmp snooping report-suppression 319
ip igmp snooping vlan mrouter 320
ip igmp snooping vlan static 321
ip multicast auto-enable 323
ip multicast vlan 324
ip pim accept-register 325
ip pim bsr-candidate 326
ip pim rp-candidate 328
ip pim send-rp-announce 330
ip pim spt-threshold 332
match message-type 333
match service-type 334
match service-instance 335
mrinfo 336
redistribute mdns-sd 338
service-list mdns-sd 339
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
ix
Contents
service-policy-query 341
service-routing mdns-sd 342
service-policy 343
show ip igmp filter 344
show ip igmp profile 345
show ip igmp snooping 346
show ip igmp snooping groups 348
show ip igmp snooping igmpv2-tracking 350
show ip igmp snooping mrouter 351
show ip igmp snooping querier 352
show ip igmp snooping wireless mcast-spi-count 354
show ip igmp snooping wireless mgid 355
show ip pim autorp 356
show ip pim bsr-router 357
show ip pim bsr 358
show ip pim tunnel 359
show mdns cache 361
show mdns requests 363
show mdns statistics 364
show platform ip multicast 365
wireless mdns-bridging 372
wireless multicast 373
PART VI
IPv6 375
CHAPTER 7
IPv6 Commands 377
ipv6 flow monitor 378
ipv6 traffic-filter 379
show wireless ipv6 statistics 380
Layer 2/3 381
PART VII
CHAPTER 8
Layer 2/3 Commands 383
channel-group 385
channel-protocol 389
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
x
Contents
clear lacp 391
clear pagp 392
clear spanning-tree counters 393
clear spanning-tree detected-protocols 394
debug etherchannel 396
debug lacp 398
debug pagp 399
debug platform pm 401
debug platform udld 403
debug spanning-tree 404
interface port-channel 406
lacp max-bundle 408
lacp port-priority 409
lacp rate 411
lacp system-priority 412
pagp learn-method 414
pagp port-priority 416
port-channel 418
port-channel auto 419
port-channel load-balance 420
port-channel load-balance extended 422
port-channel min-links 424
show etherchannel 426
show lacp 429
show pagp 434
show platform etherchannel 436
show platform pm 437
show udld 438
switchport 442
switchport access vlan 444
switchport mode 447
switchport nonegotiate 450
switchport voice vlan 452
udld 455
udld port 457
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xi
Contents
udld reset 459
PART VIII
CHAPTER 9
Lightweight Access Point 461
Cisco Lightweight Access Point Commands 463
ap auth-list ap-policy 469
ap bridging 470
ap capwap multicast 471
ap capwap retransmit 472
ap capwap timers 473
ap cdp 475
ap core-dump 477
ap country 478
ap crash-file 479
ap dot11 24ghz preamble 480
ap dot11 24ghz dot11g 481
ap dot11 5ghz channelswitch mode 482
ap dot11 5ghz power-constraint 483
ap dot11 beaconperiod 484
ap dot11 beamforming 485
ap dot11 cac media-stream 487
ap dot11 cac multimedia 490
ap dot11 cac video 492
ap dot11 cac voice 494
ap dot11 cleanair 497
ap dot11 cleanair alarm air-quality 498
ap dot11 cleanair alarm device 499
ap dot11 cleanair device 501
ap dot11 dot11n 503
ap dot11 dtpc 506
ap dot11 edca-parameters 508
ap dot11 rrm group-mode 510
ap dot11 rrm channel cleanair-event 511
ap dot11 l2roam rf-params 512
ap dot11 media-stream 514
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xii
Contents
ap dot11 rrm ccx location-measurement 516
ap dot11 rrm channel dca 517
ap dot11 rrm group-member 519
ap dot11 rrm logging 520
ap dot11 rrm monitor 522
ap dot11 rrm ndp-type 524
ap dot11 5ghz dot11ac frame-burst 525
ap dot1x max-sessions 526
ap dot1x username 527
ap ethernet duplex 528
ap group 529
ap image 530
ap ipv6 tcp adjust-mss 531
ap led 532
ap link-encryption 533
ap link-latency 534
ap mgmtuser username 535
ap name ap-groupname 537
ap name antenna band mode 538
ap name bhrate 539
ap name bridgegroupname 540
ap name bridging 541
ap name cdp interface 542
ap name console-redirect 543
ap name capwap retransmit 544
ap name command 545
ap name core-dump 546
ap name country 547
ap name crash-file 548
ap name dot11 24ghz rrm coverage 549
ap name dot11 49ghz rrm profile 551
ap name dot11 5ghz rrm channel 553
ap name dot11 antenna 554
ap name dot11 antenna extantgain 556
ap name dot11 cleanair 557
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xiii
Contents
ap name dot11 dot11n antenna 558
ap name dot11 dual-band cleanair 559
ap name dot11 dual-band shutdown 560
ap name dot11 rrm ccx 561
ap name dot11 rrm profile 562
ap name dot11 txpower 564
ap name dot1x-user 565
ap name ethernet 567
ap name ethernet duplex 568
ap name key-zeroize 569
ap name image 570
ap name ipv6 tcp adjust-mss 571
ap name jumbo mtu 572
ap name lan 573
ap name led 574
ap name link-encryption 575
ap name link-latency 576
ap name location 577
ap name mgmtuser 578
ap name mode 580
ap name monitor-mode 582
ap name monitor-mode dot11b 583
ap name name 584
ap name no dot11 shutdown 585
ap name power 586
ap name shutdown 587
ap name slot shutdown 588
ap name sniff 589
ap name ssh 590
ap name telnet 591
ap name power injector 592
ap name power pre-standard 593
ap name reset-button 594
ap name reset 595
ap name slot 596
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xiv
Contents
ap name static-ip 598
ap name stats-timer 600
ap name syslog host 601
ap name syslog level 602
ap name tcp-adjust-mss 603
ap name tftp-downgrade 604
ap power injector 605
ap power pre-standard 606
ap reporting-period 607
ap reset-button 608
service-policy type control subscriber 609
ap static-ip 610
ap syslog 611
ap name no controller 613
ap tcp-adjust-mss size 614
ap tftp-downgrade 615
config wireless wps rogue client mse 616
clear ap name tsm dot11 all 617
clear ap config 618
clear ap eventlog-all 619
clear ap join statistics 620
clear ap mac-address 621
clear ap name wlan statistics 622
debug ap mac-address 623
show ap cac voice 624
show ap capwap 626
show ap cdp 628
show ap config dot11 629
show ap config dot11 dual-band summary 630
show ap config fnf 631
show ap config 632
show ap crash-file 633
show ap data-plane 634
show ap dot11 l2roam 635
show ap dot11 cleanair air-quality 636
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xv
Contents
show ap dot11 cleanair config 637
show ap dot11 cleanair summary 639
show ap dot11 640
show ap env summary 645
show ap ethernet statistics 646
show ap gps-location summary 647
show ap groups 648
show ap groups extended 649
show ap image 650
show ap is-supported 651
show ap join stats summary 652
show ap link-encryption 653
show ap mac-address 654
show ap monitor-mode summary 656
show ap name auto-rf 657
show ap name bhmode 660
show ap name bhrate 661
show ap name cac voice 662
show ap name config fnf 663
show ap name dot11 call-control 664
show ap name cable-modem 665
show ap name capwap retransmit 666
show ap name ccx rm 667
show ap name cdp 668
show ap name channel 669
show ap name config 670
show ap name config dot11 672
show ap name config slot 676
show ap name core-dump 680
show ap name data-plane 681
show ap name dot11 682
show ap name dot11 cleanair 685
show ap name env 686
show ap name ethernet statistics 687
show ap name eventlog 688
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xvi
Contents
show ap gps-location summary 689
show ap name image 690
show ap name inventory 691
show ap name lan port 692
show ap name link-encryption 693
show ap name service-policy 694
show ap name tcp-adjust-mss 695
show ap name wlan 696
show ap name wlandot11 service policy 698
show ap slots 699
show ap summary 700
show ap tcp-adjust-mss 701
show ap universal summary 702
show ap uptime 703
show wireless ap summary 704
show wireless client ap 705
test ap name 706
test capwap ap name 707
trapflags ap 708
PART IX
CHAPTER 10
Mobility 709
Mobility Commands 711
mobility anchor 712
wireless mobility 714
wireless mobility controller 715
wireless mobility controller (ip_address) 717
wireless mobility controller peer-group 718
wireless mobility group keepalive 719
wireless mobility group member ip 720
wireless mobility group name 721
wireless mobility load-balance 722
show wireless mobility 723
clear wireless mobility statistics 724
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xvii
Contents
Network Management 725
PART X
CHAPTER 11
Network Management Commands 727
ip wccp 729
monitor capture (interface/control plane) 731
monitor capture buffer 735
monitor capture clear 736
monitor capture export 737
monitor capture file 738
monitor capture limit 740
monitor capture match 741
monitor capture start 742
monitor capture stop 743
monitor session 744
monitor session destination 746
monitor session filter 750
monitor session source 752
show ip sla statistics 755
show monitor 757
show monitor capture 760
show platform ip wccp 762
snmp-server enable traps 763
snmp-server enable traps bridge 767
snmp-server enable traps bulkstat 768
snmp-server enable traps call-home 769
snmp-server enable traps cef 770
snmp-server enable traps cpu 771
snmp-server enable traps envmon 772
snmp-server enable traps errdisable 773
snmp-server enable traps flash 774
snmp-server enable traps isis 775
snmp-server enable traps license 776
snmp-server enable traps mac-notification 777
snmp-server enable traps ospf 778
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xviii
Contents
snmp-server enable traps pim 780
snmp-server enable traps port-security 781
snmp-server enable traps power-ethernet 782
snmp-server enable traps snmp 783
snmp-server enable traps stackwise 784
snmp-server enable traps storm-control 786
snmp-server enable traps stpx 787
snmp-server enable traps transceiver 788
snmp-server enable traps vrfmib 789
snmp-server enable traps vstack 790
snmp-server engineID 791
snmp-server host 792
switchport mode access 797
switchport voice vlan 798
PART XI
CHAPTER 12
QoS 799
QoS Commands 801
auto qos classify 803
auto qos trust 809
auto qos video 816
auto qos voip 826
debug auto qos 838
show auto qos 839
class 841
class-map 844
match (class-map configuration) 846
match non-client-nrt 849
match wlan user-priority 850
policy-map 851
priority 854
queue-buffers ratio 856
queue-limit 858
qos wireless-default untrust 860
service-policy (Wired) 861
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xix
Contents
service-policy (WLAN) 863
set 865
show ap name service-policy 872
show ap name dot11 873
show class-map 876
show platform hardware fed switch 877
show platform software fed switch qos 881
show platform software fed switch qos qsb 882
show wireless client calls 885
show wireless client dot11 886
show wireless client mac-address (Call Control) 887
show wireless client mac-address (TCLAS) 888
show wireless client voice diagnostics 889
show policy-map 890
show wlan 892
trust device 895
PART XII
Radio Resource Management 897
CHAPTER 13
Radio Resource Management Commands 899
airtime-fairness dot11 mode (apgroup) 901
airtime-fairness dot11 optimization (apgroup) 902
airtime-fairness dot11 policy 903
airtime-fairness policy (wlan) 904
ap dot11 rrm 905
ap dot11 rrm ccx 908
ap dot11 rrm channel 909
ap dot11 24ghz rrm channel cleanair-event rogue-contribution 911
ap dot11 24ghz or 5ghz rrm channel dca add 912
ap dot11 24ghz or 5ghz rrm channel dca remove 913
ap dot11 5ghz rrm channel dca chan-width-11n 914
ap dot11 rrm coverage 915
ap dot11 rrm group-member 917
ap dot11 rrm monitor 918
ap dot11 rrm profile 920
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xx
Contents
ap dot11 rrm tpc-threshold 921
ap dot11 rrm txpower 922
ap dot11 airtime-fairness mode 923
ap dot11 airtime-fairness policy-name 924
policy-weight 925
ap name dot11 airtime-fairness mode 926
ap name dot11 airtime-fairness optimization 927
ap name no dot11 airtime-fairness wlan-name policy-name 928
ap name dot11 airtime-fairness wlan-name policy 929
no ap dot11 airtime-fairness policy-name 930
clear wireless airtime-fairness statistics 931
show ap dot11 24ghz 932
show ap dot11 5ghz 934
show ap airtime-fairness (per radio) 936
show ap dot11 airtime-fairness (radio bands) 937
show ap name dot11 airtime-fairness summary 938
show ap airtime-fairness (ap) 939
show ap airtime-fairness policy (all) 940
show ap name dot11 airtime-fairness policy statistics 941
show ap airtime-fairness wlan 942
show ap name dot11 airtime-fairness wlan name statistics 943
show ap airtime-fairness ap-group 944
PART XIII
CHAPTER 14
Security 945
Security Commands 947
aaa accounting dot1x 950
aaa accounting identity 952
aaa authentication dot1x 954
aaa authorization network 955
authentication host-mode 956
authentication mac-move permit 958
authentication priority 959
authentication violation 962
cisp enable 964
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxi
Contents
clear errdisable interface vlan 966
clear mac address-table 968
deny (MAC access-list configuration) 970
device-role (IPv6 snooping) 974
device-role (IPv6 nd inspection) 975
device-tracking policy 976
dot1x critical (global configuration) 978
dot1x pae 979
dot1x supplicant force-multicast 980
dot1x test eapol-capable 981
dot1x test timeout 982
dot1x timeout 983
epm access-control open 986
ip admission 987
ip admission name 988
ip device tracking maximum 991
ip device tracking probe 992
ip dhcp snooping database 993
ip dhcp snooping information option format remote-id 995
ip dhcp snooping verify no-relay-agent-address 996
ip source binding 997
ip verify source 998
ipv6 snooping policy 999
limit address-count 1001
mab request format attribute 32 1002
match (access-map configuration) 1004
no authentication logging verbose 1006
no dot1x logging verbose 1007
no mab logging verbose 1008
permit (MAC access-list configuration) 1009
protocol (IPv6 snooping) 1013
security level (IPv6 snooping) 1014
show aaa clients 1015
show aaa command handler 1016
show aaa local 1017
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxii
Contents
show aaa servers 1019
show aaa sessions 1020
show authentication sessions 1021
show cisp 1024
show dot1x 1026
show eap pac peer 1028
show ip dhcp snooping statistics 1029
show radius server-group 1032
show storm-control 1034
show vlan access-map 1036
show vlan group 1037
storm-control 1038
switchport port-security aging 1041
switchport port-security mac-address 1043
switchport port-security maximum 1046
switchport port-security violation 1048
tracking (IPv6 snooping) 1050
trusted-port 1052
wireless dot11-padding 1053
wireless security dot1x 1054
wireless security lsc 1056
wireless security strong-password 1058
wireless wps ap-authentication 1059
wireless wps auto-immune 1060
wireless wps cids-sensor 1061
wireless wps client-exclusion 1062
wireless wps mfp infrastructure 1064
wireless wps rogue 1065
wireless wps shun-list re-sync 1066
vlan access-map 1067
vlan filter 1069
vlan group 1071
PART XIV
Stack Manager and High Availability 1073
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxiii
Contents
CHAPTER 15
Stack Manager and High Availability Commands 1075
debug platform stack-manager 1077
main-cpu 1078
mode sso 1079
policy config-sync prc reload 1080
redundancy 1081
redundancy config-sync mismatched-commands 1082
redundancy force-switchover 1084
redundancy reload 1085
reload 1086
session 1088
set trace capwap ap ha 1089
set trace mobility ha 1091
set trace qos ap ha 1093
show checkpoint 1095
show etherchannel summary 1101
show platform ses 1102
show platform stack-manager 1107
show redundancy 1108
show redundancy config-sync 1112
show switch 1114
show trace messages capwap ap ha 1118
show trace messages mobility ha 1119
stack-mac persistent timer 1120
stack-mac update force 1122
standby console enable 1124
switch stack port 1125
switch priority 1127
switch provision 1128
switch renumber 1130
System Management 1133
PART XV
CHAPTER 16
System Management Commands 1135
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxiv
Contents
ap hyperlocation 1139
ap ntp ip 1140
arp 1141
boot 1142
cat 1144
clear location 1145
clear location statistics 1146
clear nmsp statistics 1147
clear wireless ccx statistics 1148
clear wireless client tsm dot11 1149
clear wireless location s69 statistics 1150
copy 1151
copy startup-config tftp: 1152
copy tftp: startup-config 1153
debug call-admission wireless all 1154
debug rfid 1155
debug voice diagnostics mac-address 1156
debug wps mfp 1157
delete 1158
dir 1159
emergency-install 1161
exit 1163
flash_init 1164
help 1165
license right-to-use 1166
location 1168
location algorithm 1172
location expiry 1173
location notify-threshold 1174
location plm calibrating 1175
location rfid 1176
location rssi-half-life 1177
mac address-table move update 1178
mgmt_init 1180
mkdir 1181
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxv
Contents
more 1182
nmsp notification interval 1183
no debug all 1185
readrtc 1186
rename 1187
reset 1188
rmdir 1189
sdm prefer 1190
set 1191
show avc client 1194
show avc wlan 1195
show cable-diagnostics tdr 1197
show ap hyperlocation 1200
show debug 1202
show env 1203
show flow monitor 1205
show license right-to-use 1208
show location 1210
show location ap-detect 1211
show mac address-table move update 1213
show nmsp 1214
show sdm prefer 1216
show tech-support wireless 1218
show wireless band-select 1220
show wireless client calls 1221
show wireless client dot11 1222
show wireless client location-calibration 1223
show wireless client probing 1224
show wireless client summary 1225
show wireless client timers 1226
show wireless client voice diagnostics 1227
show wireless country 1228
show wireless detail 1231
show wireless dtls connections 1232
show wireless flow-control 1233
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxvi
Contents
show wireless flow-control statistics 1234
show wireless load-balancing 1235
show wireless performance 1236
show wireless pmk-cache 1237
show wireless probe 1238
show wireless sip preferred-call-no 1239
show wireless summary 1240
shutdown 1241
system env temperature threshold yellow 1242
test cable-diagnostics tdr 1244
traceroute mac 1245
traceroute mac ip 1248
trapflags 1251
trapflags client 1252
type 1253
unset 1254
version 1256
wireless client 1257
wireless client mac-address deauthenticate 1259
wireless client mac-address 1260
wireless load-balancing 1265
wireless sip preferred-call-no 1266
writertc 1267
CHAPTER 17
Tracing Commands 1269
Information About Tracing 1269
Tracing Overview 1269
Location of Tracelogs 1270
Tracelog Naming Convention 1270
Rotation and Throttling Policy 1270
Tracing Levels 1271
set platform software trace 1272
show platform software trace filter-binary 1276
show platform software trace message 1277
show platform software trace level 1281
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxvii
Contents
request platform software trace archive 1284
request platform software trace rotate all 1285
request platform software trace filter-binary 1286
set platform software trace wireless switch active R0 hyperlocation 1287
PART XVI
VLAN 1289
CHAPTER 18
VLAN Commands 1291
client vlan 1292
clear vtp counters 1293
debug platform vlan 1294
debug sw-vlan 1295
debug sw-vlan ifs 1297
debug sw-vlan notification 1298
debug sw-vlan vtp 1300
interface vlan 1302
show platform vlan 1304
show vlan 1305
show vtp 1309
show wireless vlan group 1316
switchport priority extend 1317
switchport trunk 1319
vlan 1322
vlan dot1q tag native 1328
vtp (global configuration) 1329
vtp (interface configuration) 1334
vtp primary 1335
wireless broadcast vlan 1337
PART XVII
CHAPTER 19
WLAN 1339
WLAN Commands 1341
aaa-override 1343
accounting-list 1344
band-select 1345
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxviii
Contents
broadcast-ssid 1346
call-snoop 1347
channel-scan defer-priority 1349
channel-scan defer-time 1350
chd 1351
client association limit 1352
client vlan 1354
ccx aironet-iesupport 1355
datalink flow monitor 1356
device-classification 1358
default 1359
dtim dot11 1362
exclusionlist 1363
exit 1364
exit (WLAN AP Group) 1365
ip access-group 1366
ip flow monitor 1367
ip verify source mac-check 1368
load-balance 1369
mobility anchor 1370
nac 1372
passive-client 1373
peer-blocking 1374
radio 1375
radio-policy 1377
roamed-voice-client re-anchor 1379
security web-auth 1380
service-policy (WLAN) 1381
session-timeout 1383
show wlan 1384
show wireless wlan summary 1387
shutdown 1388
sip-cac 1389
static-ip tunneling 1390
vlan 1391
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxix
Contents
universal-admin 1392
wgb non-cisco 1393
wlan (AP Group Configuration) 1394
wlan 1395
wlan shutdown 1396
wmm 1397
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxx
Preface
• Document Conventions, page xxxi
• Related Documentation, page xxxiii
• Obtaining Documentation and Submitting a Service Request, page xxxiii
Document Conventions
This document uses the following conventions:
Convention
Description
^ or Ctrl
Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For
example, the key combination ^D or Ctrl-D means that you hold down the Control
key while you press the D key. (Keys are indicated in capital letters but are not
case sensitive.)
bold font
Commands and keywords and user-entered text appear in bold font.
Italic font
Document titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
Courier
font
Bold Courier
Terminal sessions and information the system displays appear in courier font.
font
Bold Courier
font indicates text that the user must enter.
[x]
Elements in square brackets are optional.
...
An ellipsis (three consecutive nonbolded periods without spaces) after a syntax
element indicates that the element can be repeated.
|
A vertical line, called a pipe, indicates a choice within a set of keywords or
arguments.
[x | y]
Optional alternative keywords are grouped in brackets and separated by vertical
bars.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxxi
Preface
Document Conventions
Convention
Description
{x | y}
Required alternative keywords are grouped in braces and separated by vertical
bars.
[x {y | z}]
Nested set of square brackets or braces indicate optional or required choices
within optional or required elements. Braces and a vertical bar within square
brackets indicate a required choice within an optional element.
string
A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
<>
Nonprinting characters such as passwords are in angle brackets.
[]
Default responses to system prompts are in square brackets.
!, #
An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Reader Alert Conventions
This document may use the following conventions for reader alerts:
Note
Tip
Caution
Timesaver
Warning
Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Means the following information will help you solve a problem.
Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Means the described action saves time. You can save time by performing the action described in the
paragraph.
IMPORTANT SAFETY INSTRUCTIONS
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with
standard practices for preventing accidents. Use the statement number provided at the end of each warning
to locate its translation in the translated safety warnings that accompanied this device. Statement 1071
SAVE THESE INSTRUCTIONS
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxxii
Preface
Related Documentation
Related Documentation
Note
Before installing or upgrading the device, refer to the device release notes.
• Cisco Catalyst 3650 Switch documentation, located at:
http://www.cisco.com/go/cat3650_docs
• Cisco SFP, SFP+, and QSFP+ modules documentation, including compatibility matrixes, located at:
http://www.cisco.com/en/US/products/hw/modules/ps5455/tsd_products_support_series_home.html
• Error Message Decoder, located at:
https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information,
see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco
technical documentation, at:
http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxxiii
Preface
Obtaining Documentation and Submitting a Service Request
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
xxxiv
Using the Command-Line Interface
This chapter contains the following topics:
• Using the Command-Line Interface, page 1
Using the Command-Line Interface
This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your switch.
Understanding Command Modes
The Cisco IOS user interface is divided into many different modes. The commands available to you depend
on which mode you are currently in. Enter a question mark (?) at the system prompt to obtain a list of commands
available for each command mode.
When you start a session on the switch, you begin in user mode, often called user EXEC mode. Only a limited
subset of the commands are available in user EXEC mode. For example, most of the user EXEC commands
are one-time commands, such as show commands, which show the current configuration status, and clear
commands, which clear counters or interfaces. The user EXEC commands are not saved when the switch
reboots.
To have access to all commands, you must enter privileged EXEC mode. Normally, you must enter a password
to enter privileged EXEC mode. From this mode, you can enter any privileged EXEC command or enter
global configuration mode.
Using the configuration modes (global, interface, and line), you can make changes to the running configuration.
If you save the configuration, these commands are stored and used when the switch reboots. To access the
various configuration modes, you must start at global configuration mode. From global configuration mode,
you can enter interface configuration mode and line configuration mode.
This table describes the main command modes, how to access each one, the prompt you see in that mode, and
how to exit the mode. The examples in the table use the hostname Switch.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
1
Using the Command-Line Interface
Understanding Command Modes
Table 1: Command Mode Summary
Mode
Access Method
Prompt
Exit Method
About This Mode
User EXEC
Begin a session with
your switch.
Switch>
Enter logout or
quit.
Use this mode to
• Change
terminal
settings.
• Perform basic
tests.
• Display
system
information.
Privileged EXEC
While in user EXEC
mode, enter the
enable command.
Global
configuration
While in privileged
EXEC mode, enter
the configure
command.
VLAN
configuration
While in global
configuration mode,
enter the vlan
vlan-id command.
Interface
configuration
While in global
configuration mode,
enter the interface
command (with a
specific interface).
Device#
Device(config)#
Device(config-vlan)#
Device(config-if)#
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
2
Enter disable to
exit.
Use this mode to
verify commands
that you have
entered. Use a
password to protect
access to this mode.
To exit to privileged
EXEC mode, enter
exit or end, or press
Ctrl-Z.
Use this mode to
configure
parameters that
apply to the entire
switch.
To exit to global
configuration mode,
enter the exit
command.
Use this mode to
configure VLAN
parameters. When
VTP mode is
transparent, you can
To return to
create
privileged EXEC
extended-range
mode, press Ctrl-Z
VLANs (VLAN IDs
or enter end.
greater than 1005)
and save
configurations in the
switch startup
configuration file.
To exit to global
Use this mode to
configuration mode, configure
enter exit.
parameters for the
Ethernet ports.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
Using the Command-Line Interface
Understanding the Help System
Mode
Access Method
Line configuration
While in global
configuration mode,
specify a line with
the line vty or line
console command.
Prompt
Exit Method
Device(config-line)#
About This Mode
To exit to global
Use this mode to
configuration mode, configure
enter exit.
parameters for the
terminal line.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
For more detailed information on the command modes, see the command reference guide for this release.
Understanding the Help System
You can enter a question mark (?) at the system prompt to display a list of commands available for each
command mode. You can also obtain a list of associated keywords and arguments for any command.
Table 2: Help Summary
Command
Purpose
help
Obtains a brief description of the help system in any
command mode.
abbreviated-command-entry ?
Obtains a list of commands that begin with a
particular character string.
Device# di?
dir disable disconnect
abbreviated-command-entry <Tab>
Completes a partial command name.
Device# sh conf<tab>
Device# show configuration
Lists all commands available for a particular
command mode.
?
Switch> ?
command ?
Lists the associated keywords for a command.
Switch> show ?
command keyword ?
Lists the associated arguments for a keyword.
Device(config)# cdp holdtime ?
<10-255> Length of time (in sec) that
receiver must keep this packet
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
3
Using the Command-Line Interface
Understanding Abbreviated Commands
Understanding Abbreviated Commands
You need to enter only enough characters for the switch to recognize the command as unique.
This example shows how to enter the show configuration privileged EXEC command in an abbreviated form:
Device# show conf
Understanding no and default Forms of Commands
Almost every configuration command also has a no form. In general, use the no form to disable a feature or
function or reverse the action of a command. For example, the no shutdown interface configuration command
reverses the shutdown of an interface. Use the command without the keyword no to re-enable a disabled
feature or to enable a feature that is disabled by default.
Configuration commands can also have a default form. The default form of a command returns the command
setting to its default. Most commands are disabled by default, so the default form is the same as the no form.
However, some commands are enabled by default and have variables set to certain default values. In these
cases, the default command enables the command and sets variables to their default values.
Understanding CLI Error Messages
This table lists some error messages that you might encounter while using the CLI to configure your switch.
Table 3: Common CLI Error Messages
Error Message
Meaning
How to Get Help
% Ambiguous command: "show
con"
You did not enter enough
characters for your switch to
recognize the command.
Re-enter the command followed by
a question mark (?) with a space
between the command and the
question mark.
The possible keywords that you can
enter with the command appear.
% Incomplete command.
You did not enter all the keywords Re-enter the command followed by
or values required by this
a question mark (?) with a space
command.
between the command and the
question mark.
The possible keywords that you can
enter with the command appear.
% Invalid input detected at
‘^’ marker.
You entered the command
Enter a question mark (?) to display
incorrectly. The caret (^) marks the all the commands that are available
point of the error.
in this command mode.
The possible keywords that you can
enter with the command appear.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
4
Using the Command-Line Interface
Using Configuration Logging
Using Configuration Logging
You can log and view changes to the switch configuration. You can use the Configuration Change Logging
and Notification feature to track changes on a per-session and per-user basis. The logger tracks each
configuration command that is applied, the user who entered the command, the time that the command was
entered, and the parser return code for the command. This feature includes a mechanism for asynchronous
notification to registered applications whenever the configuration changes. You can choose to have the
notifications sent to the syslog.
Note
Only CLI or HTTP changes are logged.
Using Command History
The software provides a history or record of commands that you have entered. The command history feature
is particularly useful for recalling long or complex commands or entries, including access lists. You can
customize this feature to suit your needs.
Changing the Command History Buffer Size
By default, the switch records ten command lines in its history buffer. You can alter this number for a current
terminal session or for all sessions on a particular line. These procedures are optional.
Beginning in privileged EXEC mode, enter this command to change the number of command lines that the
switch records during the current terminal session:
Device# terminal history
[size
number-of-lines]
The range is from 0 to 256.
Beginning in line configuration mode, enter this command to configure the number of command lines the
switch records for all sessions on a particular line:
Device(config-line)# history
[size
number-of-lines]
The range is from 0 to 256.
Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in this table. These actions are
optional.
Note
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
5
Using the Command-Line Interface
Using Editing Features
Table 4: Recalling Commands
Action
Result
Press Ctrl-P or the up arrow key.
Recalls commands in the history buffer, beginning
with the most recent command. Repeat the key
sequence to recall successively older commands.
Press Ctrl-N or the down arrow key.
Returns to more recent commands in the history
buffer after recalling commands with Ctrl-P or the
up arrow key. Repeat the key sequence to recall
successively more recent commands.
show history
While in privileged EXEC mode, lists the last several
commands that you just entered. The number of
commands that appear is controlled by the setting of
the terminal history global configuration command
and the history line configuration command.
Device(config)# help
Disabling the Command History Feature
The command history feature is automatically enabled. You can disable it for the current terminal session or
for the command line. These procedures are optional.
To disable the feature during the current terminal session, enter the terminal no history privileged EXEC
command.
To disable command history for the line, enter the no history line configuration command.
Using Editing Features
This section describes the editing features that can help you manipulate the command line.
Enabling and Disabling Editing Features
Although enhanced editing mode is automatically enabled, you can disable it, re-enable it, or configure a
specific line to have enhanced editing. These procedures are optional.
To globally disable enhanced editing mode, enter this command in line configuration mode:
Switch (config-line)# no editing
To re-enable the enhanced editing mode for the current terminal session, enter this command in privileged
EXEC mode:
Device# terminal editing
To reconfigure a specific line to have enhanced editing mode, enter this command in line configuration mode:
Device(config-line)# editing
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
6
Using the Command-Line Interface
Using Editing Features
Editing Commands through Keystrokes
This table shows the keystrokes that you need to edit command lines. These keystrokes are optional.
Note
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Table 5: Editing Commands through Keystrokes
Capability
Keystroke
Move around the command line to Press Ctrl-B, or press the left
make changes or corrections.
arrow key.
Purpose
Moves the cursor back one
character.
Press Ctrl-F, or press the right
arrow key.
Moves the cursor forward one
character.
Press Ctrl-A.
Moves the cursor to the beginning
of the command line.
Press Ctrl-E.
Moves the cursor to the end of the
command line.
Press Esc B.
Moves the cursor back one word.
Press Esc F.
Moves the cursor forward one
word.
Press Ctrl-T.
Transposes the character to the left
of the cursor with the character
located at the cursor.
Recall commands from the buffer Press Ctrl-Y.
and paste them in the command
line. The switch provides a buffer
with the last ten items that you
deleted.
Recalls the most recent entry in the
buffer.
Press Esc Y.
Recalls the next buffer entry.
The buffer contains only the last
10 items that you have deleted or
cut. If you press Esc Y more than
ten times, you cycle to the first
buffer entry.
Delete entries if you make a
mistake or change your mind.
Press the Delete or Backspace key. Erases the character to the left of
the cursor.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
7
Using the Command-Line Interface
Using Editing Features
Capability
Capitalize or lowercase words or
capitalize a set of letters.
Keystroke
Purpose
Press Ctrl-D.
Deletes the character at the cursor.
Press Ctrl-K.
Deletes all characters from the
cursor to the end of the command
line.
Press Ctrl-U or Ctrl-X.
Deletes all characters from the
cursor to the beginning of the
command line.
Press Ctrl-W.
Deletes the word to the left of the
cursor.
Press Esc D.
Deletes from the cursor to the end
of the word.
Press Esc C.
Capitalizes at the cursor.
Press Esc L.
Changes the word at the cursor to
lowercase.
Press Esc U.
Capitalizes letters from the cursor
to the end of the word.
Designate a particular keystroke as Press Ctrl-V or Esc Q.
an executable command, perhaps
as a shortcut.
Scroll down a line or screen on
displays that are longer than the
terminal screen can display.
Note
Press the Return key.
Scrolls down one line.
Press the Space bar.
Scrolls down one screen.
The More prompt is used
for any output that has
more lines than can be
displayed on the terminal
screen, including show
command output. You can
use the Return and Space
bar keystrokes whenever
you see the More prompt.
Redisplay the current command
Press Ctrl-L or Ctrl-R.
line if the switch suddenly sends a
message to your screen.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
8
Redisplays the current command
line.
Using the Command-Line Interface
Searching and Filtering Output of show and more Commands
Editing Command Lines that Wrap
You can use a wraparound feature for commands that extend beyond a single line on the screen. When the
cursor reaches the right margin, the command line shifts ten spaces to the left. You cannot see the first ten
characters of the line, but you can scroll back and check the syntax at the beginning of the command. The
keystroke actions are optional.
To scroll back to the beginning of the command entry, press Ctrl-B or the left arrow key repeatedly. You can
also press Ctrl-A to immediately move to the beginning of the line.
Note
The arrow keys function only on ANSI-compatible terminals such as VT100s.
In this example, the access-list global configuration command entry extends beyond one line. When the cursor
first reaches the end of the line, the line is shifted ten spaces to the left and redisplayed. The dollar sign ($)
shows that the line has been scrolled to the left. Each time the cursor reaches the end of the line, the line is
again shifted ten spaces to the left.
Device(config)#
Device(config)#
Device(config)#
Device(config)#
access-list 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1
$ 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1.20 255.25
$t tcp 131.108.2.5 255.255.255.0 131.108.1.20 255.255.255.0 eq
$108.2.5 255.255.255.0 131.108.1.20 255.255.255.0 eq 45
After you complete the entry, press Ctrl-A to check the complete syntax before pressing the Return key to
execute the command. The dollar sign ($) appears at the end of the line to show that the line has been scrolled
to the right:
Device(config)# access-list 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1$
The software assumes that you have a terminal screen that is 80 columns wide. If you have a width other than
that, use the terminal width privileged EXEC command to set the width of your terminal.
Use line wrapping with the command history feature to recall and modify previous complex command entries.
Searching and Filtering Output of show and more Commands
You can search and filter the output for show and more commands. This is useful when you need to sort
through large amounts of output or if you want to exclude output that you do not need to see. Using these
commands is optional.
To use this functionality, enter a show or more command followed by the pipe character (|), one of the
keywords begin, include, or exclude, and an expression that you want to search for or filter out:
command | {begin | include | exclude} regular-expression
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output are
not displayed, but the lines that contain Output appear.
This example shows how to include in the output display only lines where the expression protocol appears:
Device# show interfaces | include protocol
Vlan1 is up, line protocol is up
Vlan10 is up, line protocol is down
GigabitEthernet1/0/1 is up, line protocol is down
GigabitEthernet1/0/2 is up, line protocol is up
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
9
Using the Command-Line Interface
Accessing the CLI
Accessing the CLI
You can access the CLI through a console connection, through Telnet, or by using the browser.
You manage the switch stack and the stack member interfaces through the active switch. You cannot manage
stack members on an individual switch basis. You can connect to the active switchstack master through the
console port or the Ethernet management port of one or more stack members. Be careful with using multiple
CLI sessions to the active switchstack master. Commands you enter in one session are not displayed in the
other sessions. Therefore, it is possible to lose track of the session from which you entered commands.
Note
We recommend using one CLI session when managing the switch stack.
If you want to configure a specific stack member port, you must include the stack member number in the CLI
command interface notation.
To debug a specific stack member, you can access it from the active switchstack master by using the session
stack-member-number privileged EXEC command. The stack member number is appended to the system
prompt. For example, Switch-2# is the prompt in privileged EXEC mode for stack member 2, and where the
system prompt for the active switchstack master is Switch. Only the show and debug commands are available
in a CLI session to a specific stack member.
Accessing the CLI through a Console Connection or through Telnet
Before you can access the CLI, you must connect a terminal or a PC to the switch console or connect a PC to
the Ethernet management port and then power on the switch, as described in the hardware installation guide
that shipped with your switch.
CLI access is available before switch setup. After your switch is configured, you can access the CLI through
a remote Telnet session or SSH client.
You can use one of these methods to establish a connection with the switch:
• Connect the switch console port to a management station or dial-up modem, or connect the Ethernet
management port to a PC. For information about connecting to the console or Ethernet management
port, see the switch hardware installation guide.
• Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management station.
The switch must have network connectivity with the Telnet or SSH client, and the switch must have an
enable secret password configured.
The switch supports up to 16 simultaneous Telnet sessions. Changes made by one Telnet user are reflected
in all other Telnet sessions.
The switch supports up to five simultaneous secure SSH sessions.
After you connect through the console port, through the Ethernet management port, through a Telnet session
or through an SSH session, the user EXEC prompt appears on the management station.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
10
PART
I
CleanAir
• CleanAir Commands, page 13
CleanAir Commands
• ap dot11 5ghz cleanair , page 15
• ap dot11 5ghz cleanair alarm air-quality, page 16
• ap dot11 5ghz cleanair alarm device, page 17
• default ap dot11 5ghz cleanair device, page 19
• ap dot11 5ghz rrm channel cleanair-event, page 21
• ap dot11 5ghz rrm channel device, page 23
• ap dot11 24ghz cleanair, page 24
• ap dot11 24ghz cleanair alarm air-quality, page 25
• ap dot11 24ghz cleanair alarm device, page 26
• default ap dot11 24ghz cleanair device, page 28
• ap dot11 24ghz rrm channel cleanair-event, page 30
• ap dot11 24ghz rrm channel device, page 32
• ap name mode se-connect, page 33
• default ap dot11 5ghz cleanair device, page 34
• default ap dot11 5ghz rrm channel cleanair-event, page 36
• default ap dot11 5ghz rrm channel device, page 37
• default ap dot11 24ghz cleanair alarm device, page 38
• default ap dot11 24ghz cleanair device, page 40
• default ap dot11 24ghz rrm channel cleanair-event, page 42
• show ap dot11 5ghz cleanair air-quality summary, page 43
• show ap dot11 5ghz cleanair air-quality worst, page 44
• show ap dot11 5ghz cleanair config, page 45
• show ap dot11 5ghz cleanair device type, page 47
• show ap dot11 24ghz cleanair air-quality summary, page 49
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
13
• show ap dot11 24ghz cleanair air-quality worst, page 50
• show ap dot11 24ghz cleanair config, page 51
• show ap dot11 24ghz cleanair summary, page 53
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
14
ap dot11 5ghz cleanair
ap dot11 5ghz cleanair
To enable CleanAir for detecting 5-GHz devices, use the ap dot11 5ghz cleanair command in global
configuration mode.
ap dot11 5ghz cleanair
Command Default
Disabled.
Command Modes
Global configuration.
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable this CleanAir command before you configure other CleanAir commands.
Examples
This example shows how to enable CleanAir for 5-GHz devices:
Device(config)# ap dot11 5ghz cleanair
Related Commands
Command
Description
ap dot11 5ghz cleanair alarm air-quality
Configures CleanAir AQ for 5-GHz devices.
ap dot11 5ghz cleanair alarm device
Configures the alarm for 5-GHz interference devices.
default ap dot11 5ghz cleanair device
Configures the 5-GHz interference devices that will generate
reports on the device.
ap dot11 5ghz rrm channel cleanair-event
Enables EDRRM for 5-GHz devices.
ap dot11 5ghz rrm channel device
Configures persistent non-Wi-Fi device avoidance in the
802.11a channel
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
15
ap dot11 5ghz cleanair alarm air-quality
ap dot11 5ghz cleanair alarm air-quality
To configure the alarm when the Air Quality (AQ) reaches the threshold value for the 5-GHz devices, use the
ap dot11 5ghz cleanair alarm air-quality command. To disable the alarm when the AQ reaches the threshold
value for the 5-GHz devices, use the no form of this command.
ap dot11 5ghz cleanair alarm air-quality threshold threshold _value
Syntax Description
threshold threshold _value
Command Default
The default threshold value for AQ is 10.
Command Modes
Global configuration (config).
Command History
Configures the threshold value for air quality. The range is from
1 to 100.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 5ghz cleanaircommand before you configure this command.
Examples
This example shows how to set the threshold value for the AQ:
Device(config)# ap dot11 5ghz cleanair alarm air-quality threshold 30
Related Commands
Command
Description
ap dot11 5ghz cleanair
Enables CleanAir for 5-GHz devices.
default ap dot11 5ghz cleanair device
Configures the 5-GHz interference devices that will generate
reports on the device.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
16
ap dot11 5ghz cleanair alarm device
ap dot11 5ghz cleanair alarm device
To configure the alarm for the 5-GHz interference devices, use the ap dot11 5ghz cleanair alarm device
command.
ap dot11 5ghz cleanair alarm device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | superag
| tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
radar
Configures the alarm for radars.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled and for all other interference devices is disabled.
Command Modes
Global configuration (config).
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
17
ap dot11 5ghz cleanair alarm device
Examples
This example shows how to enable the alarm to notify interferences from a radar device:
Device(config)# ap dot11 5ghz cleanair alarm device radar
Related Commands
Command
Description
ap dot11 5ghz cleanair
Enables CleanAir for 5-GHz devices.
ap dot11 5ghz cleanair alarm air-quality
Configures CleanAir AQ for 5-GHz devices.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
18
default ap dot11 5ghz cleanair device
default ap dot11 5ghz cleanair device
To configure the default state of the alarm for 5-GHz interference devices, use the default ap dot11 5ghz
cleanair device command in global configuration mode.
default ap dot11 5ghz cleanair device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report
| superag | tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
radar
Configures the alarm for radars.
report
Enables interference device reports.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other interference devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
19
default ap dot11 5ghz cleanair device
Usage Guidelines
You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Device(config)# default ap dot11 5ghz cleanair device video
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
20
ap dot11 5ghz rrm channel cleanair-event
ap dot11 5ghz rrm channel cleanair-event
To enable Event-Driven RRM (EDRRM) and configure the sensitivity for 5-GHz devices, use the ap dot11
5ghz rrm channel cleanair-event command in global configuration mode. To disable EDRRM, use the no
form of the command.
ap dot11 5ghz rrm channel cleanair-event [sensitivity {high| low| medium}]
no ap dot11 5ghz rrm channel cleanair-event [sensitivity {high| low| medium}]
Syntax Description
sensitivity
(Optional) Configures the EDRRM sensitivity of the CleanAir event.
high
(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as
indicated by the air quality (AQ) value.
low
(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
medium
(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
Command Default
EDRRM is disabled and the EDRRM sensitivity is low.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable EDRRM using the ap dot11 5ghz rrm channel cleanair-event command before you
configure the sensitivity.
Examples
This example shows how to enable EDRRM and set the EDRRM sensitivity to high:
Device(config)# ap dot11 5ghz rrm channel cleanair-event
Device(config)# ap dot11 5ghz rrm channel cleanair-event sensitivity high
Related Commands
Command
Description
ap dot11 5ghz cleanair
Enables CleanAir for 5-GHz devices.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
21
ap dot11 5ghz rrm channel cleanair-event
Command
Description
ap dot11 5ghz rrm channel device
Configures persistent non-Wi-Fi device avoidance in the
802.11a channel
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
22
ap dot11 5ghz rrm channel device
ap dot11 5ghz rrm channel device
To configure persistent non-Wi-Fi device avoidance in the 802.11a channel, use the ap dot11 5ghz rrm
channel device command in global configuration mode. To disable persistent device avoidance, use the no
form of this command.
ap dot11 5ghz rrm channel device
no ap dot11 5ghz rrm channel device
Syntax Description
This command has no arguments or keywords.
Command Default
The CleanAir persistent device state is disabled.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
CleanAir-capable monitor mode access points collect information about persistent devices on all configured
channels and stores the information in the device. Local and bridge mode access points detect interference
devices on the serving channels only.
Examples
This example shows how to enable persistent device avoidance on 802.11a devices:
Device(config)# ap dot11 5ghz rrm channel device
Related Commands
Command
Description
ap dot11 5ghz cleanair
Enables CleanAir for 5-GHz devices.
ap dot11 5ghz rrm channel cleanair-event
Enables EDRRM for 5-GHz devices.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
23
ap dot11 24ghz cleanair
ap dot11 24ghz cleanair
To enable CleanAir for detecting 2.4-GHz devices, use the ap dot11 24ghz cleanair command in global
configuration mode. To disable CleanAir for detecting 2.4-GHz devices, use the no form of this command.
ap dot11 24ghz cleanair
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable this CleanAir command before you configure other CleanAir commands.
Examples
This example shows how to enable CleanAir for 2.4-GHz devices:
Device(config)# ap dot11 24ghz cleanair
Related Commands
Command
Description
ap dot11 24ghz cleanair alarm air-quality
Configures the alarm for the AQ of 2.4 GHz devices.
ap dot11 24ghz cleanair alarm device
Configures alarm for 2.4-GHz interference devices.
default ap dot11 24ghz cleanair device
Configures the default 2.4-GHz interference devices to
generate reports.
ap dot11 24ghz rrm channel cleanair-event
ap dot11 24ghz rrm channel device
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
24
Configures persistent non-Wi-Fi device avoidance in the
802.11b channel.
ap dot11 24ghz cleanair alarm air-quality
ap dot11 24ghz cleanair alarm air-quality
To configure the alarm for the threshold value of Air Quality (AQ) for all 2.4-GHz devices, use the ap dot11
24ghz cleanair alarm air-quality command in global configuration mode. To disable the alarm for the
threshold value of AQ for all 2.4-GHz devices, use the no form of this command.
ap dot11 24ghz cleanair alarm air-quality threshold threshold_value
Syntax Description
threshold threshold_value
Configures the threshold value for AQ. The range is from 1 to
100.
Command Default
The default threshold value for AQ is 10.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.
Examples
This example shows how to set the threshold value for the AQ:
Device(config)# ap dot11 24ghz cleanair alarm air-quality threshold 50
Related Commands
Command
Description
ap dot11 24ghz cleanair
Command to configure CleanAir for devices that work in the
2.4-GHz frequency.
ap dot11 24ghz cleanair alarm device
Configures alarm for 2.4-GHz interference devices.
default ap dot11 24ghz cleanair device
Configures the default 2.4-GHz interference devices to generate
reports.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
25
ap dot11 24ghz cleanair alarm device
ap dot11 24ghz cleanair alarm device
To configure the alarm for the 2.4-GHz interference devices, use the ap dot11 24ghz cleanair alarm device
command in global configuration mode. To disable the alarm for the 2.4-GHz interference devices, use the
no form of this command.
ap dot11 24ghz cleanairalarm {device | bt-discovery | bt-link canopy| cont-tx | dect-like | fh | inv | jammer
| mw-oven | nonstd | superag | tdd-tx video | wimax-fixed | wimax-mobile | xbox | zigbee}
Syntax Description
Command Default
bt-discovery
Configures the alarm for Bluetooth interference devices.
bt-link
Configures the alarm for any Bluetooth link.
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11 frequency hopping (FH) devices.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
mw-oven
Configures the alarm for microwave ovens.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
xbox
Configures the alarm for Xbox interference devices.
zigbee
Configures the alarm for 802.15.4 interference devices.
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
26
ap dot11 24ghz cleanair alarm device
Command Modes
Command History
Global configuration (config).
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.
Examples
This example shows how to enable the alarm to notify interferences from a Zigbee device:
Device(config)# ap dot11 24ghz cleanair alarm device zigbee
Related Commands
Command
Description
ap dot11 24ghz cleanair
Command to configure CleanAir for devices that work in the
2.4-GHz frequency.
ap dot11 24ghz cleanair alarm air-quality
Configures the alarm for the AQ of 2.4 GHz devices.
default ap dot11 24ghz cleanair device
Configures the default 2.4-GHz interference devices to generate
reports.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
27
default ap dot11 24ghz cleanair device
default ap dot11 24ghz cleanair device
To configure the default state of report generation for 2.4-GHz interference devices, use the default ap dot11
24ghz cleanair device command in global configuration mode.
default ap dot11 24ghz cleanair device {ble-beacon| bt-discovery | bt-link | canopy | cont-tx | dect-like
| fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile |
xbox | zigbee}
Syntax Description
ble-beacon
Configure the BLE beacon feature.
bt-discovery
Configures the alarm for Bluetooth
interference devices.
bt-link
Configures the alarm for any
Bluetooth link.
canopy
Configures the alarm for canopy
interference devices.
cont-tx
Configures the alarm for
continuous transmitters.
dect-like
Configures the alarm for Digital
Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11
frequency hopping devices.
inv
Configures the alarm for devices
using spectrally inverted Wi-Fi
signals.
jammer
Configures the alarm for jammer
interference devices.
mw-oven
Configures the alarm for
microwave ovens.
nonstd
Configures the alarm for devices
using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11
SuperAG interference devices.
tdd-tx
Configures the alarm for Time
Division Duplex (TDD)
transmitters.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
28
default ap dot11 24ghz cleanair device
video
Configures the alarm for video
cameras.
wimax-fixed
Configures the alarm for WiMax
fixed interference devices.
wimax-mobile
Configures the alarm for WiMax
mobile interference devices.
xbox
Configures the alarm for Xbox
interference devices.
zigbee
Configures the alarm for 802.15.4
interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
This command was modified. The
ble-beacon keyword was added.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanaircommand before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Device(config)# default ap dot11 24ghz cleanair device video
Related Commands
Command
Description
ap dot11 24ghz cleanair
Command to configure CleanAir for devices that work in the
2.4-GHz frequency.
ap dot11 24ghz cleanair alarm air-quality
Configures the alarm for the AQ of 2.4 GHz devices.
ap dot11 24ghz cleanair alarm device
Configures alarm for 2.4-GHz interference devices.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
29
ap dot11 24ghz rrm channel cleanair-event
ap dot11 24ghz rrm channel cleanair-event
To enable Event-Driven RRM (EDRRM) and the sensitivity for 2.4-GHz devices, use the ap dot11 24ghz
rrm channel cleanair-event command in global configuration mode. To disable EDRRM, use the no form
of this command.
ap dot11 24ghz rrm channel cleanair-event sensitivity {high | low | medium}
no ap dot11 24ghz rrm channel cleanair-event [sensitivity{high | low | medium}]
Syntax Description
sensitivity
(Optional) Configures the EDRRM sensitivity of the CleanAir event.
high
(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as
indicated by the air quality (AQ) value.
low
(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
medium
(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
Command Default
EDRRM is disabled and the sensitivity is low.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable EDRRM using the ap dot11 24ghz rrm channel cleanair-event command before you
configure the sensitivity.
Examples
This example shows how to enable EDRRM and set the EDRRM sensitivity to low:
Device(config)# ap dot11 24ghz rrm channel cleanair-event
Device(config)# ap dot11 24ghz rrm channel cleanair-event sensitivity low
Related Commands
Command
Description
ap dot11 24ghz cleanair
Command to configure CleanAir for devices that work in the
2.4-GHz frequency.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
30
ap dot11 24ghz rrm channel cleanair-event
Command
Description
ap dot11 24ghz rrm channel device
Configures persistent non-Wi-Fi device avoidance in the 802.11b
channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
31
ap dot11 24ghz rrm channel device
ap dot11 24ghz rrm channel device
To configure persistent non-Wi-Fi device avoidance in the 802.11b channel, use the ap dot11 24ghz rrm
channel device command in global configuration mode. To disable persistent device avoidance, use the no
form of this command.
ap dot11 24ghz rrm channel device
no ap dot11 24ghz rrm channel device
Syntax Description
This command has no arguments or keywords.
Command Default
Persistent device avoidance is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
CleanAir-capable monitor mode access points collect information about persistent devices on all configured
channels and stores the information in the device. Local and bridge mode access points detect interference
devices on the serving channels only.
Examples
This example shows how to enable persistent device avoidance:
Device(config)# ap dot11 24ghz rrm channel device
Related Commands
Command
Description
ap dot11 24ghz cleanair
Command to configure CleanAir for devices that work in
the 2.4-GHz frequency.
ap dot11 24ghz rrm channel cleanair-event
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
32
ap name mode se-connect
ap name mode se-connect
To configure the access point for SE-Connect mode, use the ap name ap_name mode se-connect command
in privileged exec mode.
ap name ap_name mode se-connect
Syntax Description
ap_name
Name of the access point.
Command Default
No access point is configured for SE-Connect mode.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The access point will reboot after you change the mode.
SE-connect mode enables a user to connect a Spectrum Expert application running on an external Microsoft
Windows XP or Vista PC to a Cisco CleanAir-enabled access point in order to display and analyze detailed
spectrum data. The Spectrum Expert application connects directly to the access point, by passing the controller.
An access point in SE-Connect mode does not provide any Wi-Fi, RF, or spectrum data to the controller. All
CleanAir system functionality is suspended while the AP is in this mode, and no clients are served. This mode
is intended for remote troubleshooting only.
Examples
This example shows how to change the mode of the access point to SE-Connect:
Device# ap name AS-5508-5-AP3 mode se-connect
Changing the AP's mode will cause the AP to reboot.
Are you sure you want to continue? (y/n)[y]: y
% switch-1:wcm:Cisco AP does not support the seconnect mode
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
33
default ap dot11 5ghz cleanair device
default ap dot11 5ghz cleanair device
To configure the default state of the alarm for 5-GHz interference devices, use the default ap dot11 5ghz
cleanair device command in global configuration mode.
default ap dot11 5ghz cleanair device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report
| superag | tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
radar
Configures the alarm for radars.
report
Enables interference device reports.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other interference devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
34
default ap dot11 5ghz cleanair device
Usage Guidelines
You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Device(config)# default ap dot11 5ghz cleanair device video
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
35
default ap dot11 5ghz rrm channel cleanair-event
default ap dot11 5ghz rrm channel cleanair-event
To configure the default state of Event-Driven radio resource management (EDRRM) and the EDRRM
sensitivity for 5-GHz devices, use the default ap dot11 5ghz rrm channel cleanair-event command in
global configuration mode.
default ap dot11 5ghz rrm channel cleanair-event [sensitivity {high | low | medium}]
Syntax Description
sensitivity
(Optional) Configures the EDRRM sensitivity of the CleanAir event.
high
(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as
indicated by the Air Quality (AQ) value.
low
(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
medium
(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
Command Default
EDRRM is disabled and the sensitivity is low.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable EDRRM before you configure the sensitivity.
Examples
This example shows how to set the default EDRRM state and sensitivity:
Device(config)# default ap dot11 5ghz rrm channel cleanair-event
Device(config)# default ap dot11 5ghz rrm channel cleanair-event sensitivity
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
36
default ap dot11 5ghz rrm channel device
default ap dot11 5ghz rrm channel device
To configure the default state of the persistent non-Wi-Fi device avoidance in the 802.11a channels, use the
default ap dot11 5ghz rrm channel device command in global configuration mode.
default ap dot11 5ghz rrm channel device
Syntax Description
This command has no arguments or keywords.
Command Default
Persistent device state is disabled.
Command Modes
Global configuration (config)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure persistent non-Wi-Fi device avoidance in the 802.11a channels:
Device(config)# default ap dot11 5ghz rrm channel device
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
37
default ap dot11 24ghz cleanair alarm device
default ap dot11 24ghz cleanair alarm device
To configure the default value of the alarm for 2.4-GHz interference devices, use the default ap dot11 24ghz
cleanair alarm device command in global configuration mode.
default ap dot11 24ghz cleanair alarm device {bt-discovery | bt-link | canopy | cont-tx | dect-like | fh |
inv | jammer | mw-oven| nonstd | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee}
Syntax Description
bt-discovery
Configures the alarm for Bluetooth interference devices.
bt-link
Configures the alarm for any Bluetooth link.
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11 frequency hopping (FH) devices.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
mw-oven
Configures the alarm for microwave ovens.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
xbox
Configures the alarm for Xbox interference devices.
zigbee
Configures the alarm for 802.15.4 interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all the other devices is disabled.
Command Modes
Global configuration (config)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
38
default ap dot11 24ghz cleanair alarm device
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.
Examples
This example shows how to configure the default CleanAir 2.4-GHz interference devices alarm:
Device(config)# default ap dot11 24ghz cleanair alarm device inv
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
39
default ap dot11 24ghz cleanair device
default ap dot11 24ghz cleanair device
To configure the default state of report generation for 2.4-GHz interference devices, use the default ap dot11
24ghz cleanair device command in global configuration mode.
default ap dot11 24ghz cleanair device {ble-beacon| bt-discovery | bt-link | canopy | cont-tx | dect-like
| fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile |
xbox | zigbee}
Syntax Description
ble-beacon
Configure the BLE beacon feature.
bt-discovery
Configures the alarm for Bluetooth
interference devices.
bt-link
Configures the alarm for any
Bluetooth link.
canopy
Configures the alarm for canopy
interference devices.
cont-tx
Configures the alarm for
continuous transmitters.
dect-like
Configures the alarm for Digital
Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11
frequency hopping devices.
inv
Configures the alarm for devices
using spectrally inverted Wi-Fi
signals.
jammer
Configures the alarm for jammer
interference devices.
mw-oven
Configures the alarm for
microwave ovens.
nonstd
Configures the alarm for devices
using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11
SuperAG interference devices.
tdd-tx
Configures the alarm for Time
Division Duplex (TDD)
transmitters.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
40
default ap dot11 24ghz cleanair device
video
Configures the alarm for video
cameras.
wimax-fixed
Configures the alarm for WiMax
fixed interference devices.
wimax-mobile
Configures the alarm for WiMax
mobile interference devices.
xbox
Configures the alarm for Xbox
interference devices.
zigbee
Configures the alarm for 802.15.4
interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
This command was modified. The
ble-beacon keyword was added.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanaircommand before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Device(config)# default ap dot11 24ghz cleanair device video
Related Commands
Command
Description
ap dot11 24ghz cleanair
Command to configure CleanAir for devices that work in the
2.4-GHz frequency.
ap dot11 24ghz cleanair alarm air-quality
Configures the alarm for the AQ of 2.4 GHz devices.
ap dot11 24ghz cleanair alarm device
Configures alarm for 2.4-GHz interference devices.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
41
default ap dot11 24ghz rrm channel cleanair-event
default ap dot11 24ghz rrm channel cleanair-event
To configure the default Event-Driven radio resource management (EDRRM) state and sensitivity for 2.4-GHz
devices, use the default ap dot11 24ghz rrm channel cleanair-event command in global configuration
mode.
default ap dot11 24ghz rrm channel cleanair-event [sensitivity {high | low | medium}]
Syntax Description
sensitivity
Configures the EDRRM sensitivity of the CleanAir event.
high
Specifies the highest sensitivity to non-Wi–Fi interference as indicated by the
Air Quality (AQ) value.
low
Specifies the least sensitivity to non-Wi–Fi interference as indicated by the AQ
value.
medium
Specifies medium sensitivity to non-Wi–Fi interference as indicated by the AQ
value.
Command Default
EDRRM is disabled and the sensitivity is low.
Command Modes
Global configuration (config)
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable EDRRM and set the default EDRRM sensitivity:
Device(config)# default ap dot11 24ghz rrm channel cleanair-event
Device(config)# default ap dot11 24ghz rrm channel cleanair-event sensitivity
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
42
show ap dot11 5ghz cleanair air-quality summary
show ap dot11 5ghz cleanair air-quality summary
To display the CleanAir AQ data for 5-GHz band, use the show ap dot11 5ghz cleanair air-quality summary
command in user EXEC mode or privileged EXEC mode.
show ap dot11 5ghz cleanair air-quality summary
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CleanAir AQ data for 5-GHz band:
Device# show ap dot11 5ghz cleanair air-quality summary
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP270ca.9b86.4546
1
99
99
0
No
AP2894.0f26.22df
6
98
97
0
No
AP2894.0f58.cc6b
11
99
99
0
No
AP2894.0f39.1040
6
97
97
0
No
AP2894.0f63.c6da
11
99
99
0
No
AP2894.0f58.d013
6
97
97
0
No
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
43
show ap dot11 5ghz cleanair air-quality worst
show ap dot11 5ghz cleanair air-quality worst
To display the worst AQ data for 5-GHz band, use the show ap dot11 5ghz cleanair air-quality worst
command in user EXEC mode or privileged EXEC mode.
show ap dot11 5ghz cleanair air-quality worst
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the worst AQ data for 5-GHz band:
Device# show ap dot11 5ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP2894.0f39.1040
6
97
97
0
No
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
44
show ap dot11 5ghz cleanair config
show ap dot11 5ghz cleanair config
To display the CleanAir configuration for 5-GHz band, use the show ap dot11 5ghz cleanair config command.
show ap dot11 5ghz cleanair config
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In Release 3.3SE, you can configure this command on the Mobility Agent (MA).
Examples
This example shows how to display the CleanAir configuration for 5-GHz band on the Mobility Controller:
Device# show ap dot11 5ghz cleanair config
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
: Enabled
:
:
:
:
Enabled
15
Enabled
1
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
: Enabled
: HIGH
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
45
show ap dot11 5ghz cleanair config
CleanAir Persistent Devices state............ : Enabled
This example shows how to display the CleanAir configuration for 5-GHz band on the Mobility Agent:
Device# show ap dot11 5ghz cleanair config
Mobility Controller Link Status..................
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
46
: UP
: Enabled
:
:
:
:
Enabled
15
Enabled
10
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Enabled
Enabled
Disabled
Disabled
Disabled
Enabled
: Disabled
: LOW
: Disabled
show ap dot11 5ghz cleanair device type
show ap dot11 5ghz cleanair device type
To display the 5-GHz interference devices, use the show ap dot11 5ghz cleanair device type command.
show ap dot11 5ghz cleanair device type {all | canopy | cont-tx | dect-like | inv | jammer | nonstd |
persistent | superag | tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
Command Modes
all
Displays all CleanAir interferer devices for 5-GHz band.
canopy
Displays CleanAir interferers of type canopy for 5-GHz band.
cont-tx
Displays CleanAir interferers of type continuous transmitter for 5-GHz band.
dect-like
Displays CleanAir interferers of type Digital Enhanced Cordless
Communication (DECT)-like phone for 5-GHz band.
inv
Displays CleanAir interferer devices using spectrally inverted WiFi signals for
5-GHz band.
jammer
Displays CleanAir interferers of type jammer for 5-GHz band.
nonstd
Displays CleanAir interferer devices using non-standard Wi-Fi channels for
5-GHz band.
persistent
Displays CleanAir persistent device interferers for 5-GHz band.
superag
Displays CleanAir interferers of type SuperAG for 5-GHz band.
tdd-tx
Displays CleanAir Time Division Duplex (TDD) transmitters for 5-GHz band.
video
Displays CleanAir interferers of type video camera for 5-GHz band.
winmax-fixed
Displays CleanAir interferers of type WiMax fixed for 5-GHz band.
wimax-mobile
Displays CleanAir interferers of type WiMax mobile for 5-GHz band.
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
47
show ap dot11 5ghz cleanair device type
Usage Guidelines
Interference devices are listed only if there is an interference from any 5-GHz devices.
Examples
This example shows how to view all the 5-GHz interference devices:
Device# show ap dot11 5ghz cleanair device type all
DC
ISI
RSSI
DevID
=
=
=
=
Duty Cycle (%)
Interference Severity Index (1-Low Interference, 100-High Interference)
Received Signal Strength Index (dBm)
Device ID
No
ClusterID
DevID Type
AP Name
ISI RSSI DC
Channel
-------------------------------------------------------------------------------------------------
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
48
show ap dot11 24ghz cleanair air-quality summary
show ap dot11 24ghz cleanair air-quality summary
To display the CleanAir AQ data for 2.4-GHz band, use the show ap dot11 24ghz cleanair air-quality
summary command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair air-quality summary
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CleanAir AQ data for 2.4-GHz band:
Device# show ap dot11 24ghz cleanair air-quality summary
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP270ca.9b86.4546
1
99
99
0
No
AP2894.0f26.22df
6
98
97
0
No
AP2894.0f58.cc6b
11
99
99
0
No
AP2894.0f39.1040
6
97
97
0
No
AP2894.0f63.c6da
11
99
99
0
No
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
49
show ap dot11 24ghz cleanair air-quality worst
show ap dot11 24ghz cleanair air-quality worst
To display the worst air quality data for 2.4-GHz band, use the show ap dot11 24ghz cleanair air-quality
worst command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair air-quality worst
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the worst AQ data for 2.4-GHz band:
Device# show ap dot11 24ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP2895.0f39.1040
6
97
97
0
No
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
50
show ap dot11 24ghz cleanair config
show ap dot11 24ghz cleanair config
To display the CleanAir configuration for 2.4-GHz band, use the show ap dot11 24ghz cleanair config
command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair config
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In Release 3.3SE, you can configure this command on the Mobility Agent (MA).
Examples
This example shows how to display the CleanAir configuration for 2.4-GHz band on the Mobility Controller:
Device# show ap dot11 24ghz cleanair config
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
: Enabled
:
:
:
:
Enabled
15
Enabled
1
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
51
show ap dot11 24ghz cleanair config
CleanAir Event-driven RRM State.............. : Enabled
CleanAir Driven RRM Sensitivity.............. : HIGH
CleanAir Persistent Devices state............ : Enabled
This example shows how to display the CleanAir configuration for 2.4-GHz band on the Mobility Agent:
Device# show ap dot11 24ghz cleanair config
Mobility Controller Link Status..................
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
52
: UP
: Enabled
:
:
:
:
Enabled
15
Enabled
10
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Enabled
Enabled
Disabled
Disabled
Disabled
Enabled
: Disabled
: LOW
: Disabled
show ap dot11 24ghz cleanair summary
show ap dot11 24ghz cleanair summary
To display a summary of 2.4-GHz CleanAir devices, use the show ap dot11 24ghz cleanair summary
command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair summary
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show ap dot11 24ghz cleanair summary command:
Device# show ap dot11 24ghz cleanair summary
AP Name
MAC Address
Slot ID Spectrum Capable Spectrum Intelligence
Spectrum Oper State
----------------------------------------------------------------------------------------------------------------AP1cdf.0f95.1719
0817.35c7.1a60
0 Disabled
Disabled
Down
AS-5508-5-AP3
0817.35dd.9f40
0 Disabled
Disabled
Down
AP270ca.9b86.4546
0c85.259e.c350
0 Enabled
Enabled
Up
AP2894.0f26.22df
0c85.25ab.cca0
0 Enabled
Enabled
Up
AP2894.0f58.cc6b
0c85.25c7.b7a0
0 Enabled
Enabled
Up
AP2894.0f39.1040
0c85.25de.2c10
0 Enabled
Enabled
Up
AP2894.0f63.c6da
0c85.25de.c8e0
0 Enabled
Enabled
Up
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
53
show ap dot11 24ghz cleanair summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
54
PART
II
Flexible NetFlow Commands
• Flexible NetFlow Commands, page 57
Flexible NetFlow Commands
• cache, page 59
• clear flow exporter, page 61
• clear flow monitor, page 62
• collect, page 64
• collect counter, page 66
• collect interface, page 67
• collect timestamp absolute, page 68
• collect transport tcp flags, page 70
• datalink flow monitor, page 72
• debug flow exporter, page 74
• debug flow monitor, page 75
• debug flow record, page 76
• debug sampler, page 77
• description, page 78
• destination, page 79
• dscp, page 81
• export-protocol netflow-v9, page 82
• exporter, page 83
• flow exporter, page 84
• flow monitor, page 85
• flow record, page 86
• ip flow monitor, page 87
• ipv6 flow monitor, page 89
• match datalink ethertype, page 91
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
57
• match datalink mac, page 93
• match datalink vlan, page 95
• match flow cts, page 96
• match flow direction, page 97
• match interface, page 98
• match ipv4, page 99
• match ipv4 destination address, page 101
• match ipv4 source address, page 102
• match ipv4 ttl, page 103
• match ipv6, page 104
• match ipv6 destination address, page 105
• match ipv6 hop-limit, page 106
• match ipv6 source address, page 107
• match transport, page 108
• match transport icmp ipv4, page 109
• match transport icmp ipv6, page 110
• mode random 1 out-of, page 111
• option, page 112
• record, page 114
• sampler, page 115
• show flow exporter, page 116
• show flow interface, page 118
• show flow monitor, page 120
• show flow record, page 123
• show sampler, page 124
• source, page 126
• template data timeout, page 128
• transport, page 129
• ttl, page 130
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
58
cache
cache
To configure a flow cache parameter for a flow monitor, use the cache command in flow monitor configuration
mode. To remove a flow cache parameter for a flow monitor, use the no form of this command.
cache {timeout {active| inactive} seconds| type normal}
no cache {timeout {active| inactive} | type}
Syntax Description
Command Default
timeout
Specifies the flow timeout.
active
Specifies the active flow timeout.
inactive
Specifies the inactive flow timeout.
seconds
The timeout value in seconds. The range is 1 to 604800 (7 days).
type
Specifies the type of the flow cache.
normal
Configures a normal cache type. The entries in the flow cache will
be aged out according to the timeout active seconds and timeout
inactive seconds settings. This is the default cache type.
The default flow monitor flow cache parameters are used.
The following flow cache parameters for a flow monitor are enabled:
• Cache type: normal
• Active flow timeout: 1800 seconds
• Inactive flow timeout: 15 seconds
Command Modes
Command History
Usage Guidelines
Flow monitor configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Each flow monitor has a cache that it uses to store all the flows it monitors. Each cache has various configurable
elements, such as the time that a flow is allowed to remain in it. When a flow times out, it is removed from
the cache and sent to any exporters that are configured for the corresponding flow monitor.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
59
cache
The cache timeout active command controls the aging behavior of the normal type of cache. If a flow has
been active for a long time, it is usually desirable to age it out (starting a new flow for any subsequent packets
in the flow). This age out process allows the monitoring application that is receiving the exports to remain up
to date. By default, this timeout is 1800 seconds (30 minutes), but it can be adjusted according to system
requirements. A larger value ensures that long-lived flows are accounted for in a single flow record; a smaller
value results in a shorter delay between starting a new long-lived flow and exporting some data for it. When
you change the active flow timeout, the new timeout value takes effect immediately.
The cache timeout inactive command also controls the aging behavior of the normal type of cache. If a flow
has not seen any activity for a specified amount of time, that flow will be aged out. By default, this timeout
is 15 seconds, but this value can be adjusted depending on the type of traffic expected. If a large number of
short-lived flows is consuming many cache entries, reducing the inactive timeout can reduce this overhead.
If a large number of flows frequently get aged out before they have finished collecting their data, increasing
this timeout can result in better flow correlation. When you change the inactive flow timeout, the new timeout
value takes effect immediately.
The cache type normal command specifies the normal cache type. This is the default cache type. The entries
in the cache will be aged out according to the timeout active seconds and timeout inactive seconds settings.
When a cache entry is aged out, it is removed from the cache and exported via any exporters configured for
the monitor associated with the cache.
To return a cache to its default settings, use the default cache flow monitor configuration command.
Note
Examples
When a cache becomes full, new flows will not be monitored.
The following example shows how to configure the active timeout for the flow monitor cache:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# cache timeout active 4800
The following example shows how to configure the inactive timer for the flow monitor cache:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# cache timeout inactive 30
The following example shows how to configure a normal cache:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# cache type normal
Related Commands
Command
Description
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters
flow monitor configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
60
clear flow exporter
clear flow exporter
To clear the statistics for a flow exporter, use the clear flow exporter command in privileged EXEC mode.
clear flow exporter [[name] exporter-name] statistics
Syntax Description
Command Modes
Command History
Usage Guidelines
name
(Optional) Specifies the name of a flow exporter.
exporter-name
(Optional) Name of a flow exporter that was previously configured.
statistics
Clears the flow exporter statistics.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The clear flow exporter command removes all statistics from the flow exporter. These statistics will not be
exported and the data gathered in the cache will be lost.
You can view the flow exporter statistics by using the show flow exporter statistics privileged EXEC
command.
Examples
The following example clears the statistics for all of the flow exporters configured on the device:
Device# clear flow exporter statistics
The following example clears the statistics for the flow exporter named FLOW-EXPORTER-1:
Device# clear flow exporter FLOW-EXPORTER-1 statistics
Related Commands
Command
Description
debug flow exporter
Enables debugging output for flow exporters.
show flow exporter
Displays flow exporter status and statistics.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
61
clear flow monitor
clear flow monitor
To clear a flow monitor cache or flow monitor statistics and to force the export of the data in the flow monitor
cache, use the clear flow monitor command in privileged EXEC mode.
clear flow monitor [name] monitor-name [[cache] force-export| statistics]
Syntax Description
Command Modes
Command History
Usage Guidelines
Note
name
Specifies the name of a flow monitor.
monitor-name
Name of a flow monitor that was previously configured.
cache
(Optional) Clears the flow monitor cache information.
force-export
(Optional) Forces the export of the flow monitor cache statistics.
statistics
(Optional) Clears the flow monitor statistics.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The clear flow monitor cache command removes all entries from the flow monitor cache. These entries will
not be exported and the data gathered in the cache will be lost.
The statistics for the cleared cache entries are maintained.
The clear flow monitor force-export command removes all entries from the flow monitor cache and exports
them using all flow exporters assigned to the flow monitor. This action can result in a short-term increase in
CPU usage. Use this command with caution.
The clear flow monitor statistics command clears the statistics for this flow monitor.
Note
The current entries statistic will not be cleared by the clear flow monitor statistics command because
this is an indicator of how many entries are in the cache and the cache is not cleared with this command.
You can view the flow monitor statistics by using the show flow monitor statistics privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
62
clear flow monitor
Examples
The following example clears the statistics and cache entries for the flow monitor named FLOW-MONITOR-1:
Device# clear flow monitor name FLOW-MONITOR-1
The following example clears the statistics and cache entries for the flow monitor named FLOW-MONITOR-1
and forces an export:
Device# clear flow monitor name FLOW-MONITOR-1 force-export
The following example clears the cache for the flow monitor named FLOW-MONITOR-1 and forces an
export:
Device# clear flow monitor name FLOW-MONITOR-1 cache force-export
The following example clears the statistics for the flow monitor named FLOW-MONITOR-1:
Device# clear flow monitor name FLOW-MONITOR-1 statistics
Related Commands
Command
Description
debug flow monitor
Enables debugging output for flow monitors.
show flow monitor
Displays the status and statistics for a flow monitor.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
63
collect
collect
To configure non-key fields for the flow monitor record and to enable capturing the values in the fields for
the flow created with the record, use the collect command in flow record configuration mode.
collect {counter| interface| timestamp| transport}
Syntax Description
counter
Configures the number of bytes or packets in a flow as a non-key field for a flow
record. For more information, see collect counter, on page 66.
interface
Configures the input and output interface name as a non-key field for a flow record.
For more information, see collect interface, on page 67.
timestamp
Configures the absolute time of the first seen or last seen packet in a flow as a non-key
field for a flow record. For more information, see collect timestamp absolute, on
page 68.
transport
Enables the collecting of transport TCP flags from a flow record. For more
information, see collect transport tcp flags, on page 70.
Command Default
Non-key fields are not configured for the flow monitor record.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The values in non-key fields are added to flows to provide additional information about the traffic in the flows.
A change in the value of a non-key field does not create a new flow. In most cases, the values for non-key
fields are taken from only the first packet in the flow.
The collect commands are used to configure non-key fields for the flow monitor record and to enable capturing
the values in the fields for the flow created with the record. The values in non-key fields are added to flows
to provide additional information about the traffic in the flows. A change in the value of a non-key field does
not create a new flow. In most cases the values for non-key fields are taken from only the first packet in the
flow.
Note
Although it is visible in the command-line help string, the flow username keyword is not supported.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
64
collect
Examples
The following example configures the total number of bytes in the flows as a non-key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# collect counter bytes long
Related Commands
Command
Description
collect counter
Configures the number of bytes or packets in a flow as a non-key field
for a flow record.
collect interface
Configures the input interface as a non-key field for a flow record.
collect timestamp absolute
Configures the absolute time of the first seen or last seen packet in a
flow as a non-key field for a flow record.
collect transport tcp flags
Enables the collecting of TCP flag values from a flow.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
65
collect counter
collect counter
To configure the number of bytes or packets in a flow as a non-key field for a flow record, use the collect
counter command in flow record configuration mode. To disable the use of the number of bytes or packets
in a flow (counters) as a non-key field for a flow record, use the no form of this command.
Command Default
The number of bytes or packets in a flow is not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default settings, use the no collect counter or default collect counter flow
record configuration command.
Examples
The following example configures the total number of bytes in the flows as a non-key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)#collect counter bytes long
The following example configures the total number of packets from the flows as a non-key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# collect counter packets long
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
66
collect interface
collect interface
To configure the input interface name as a non-key field for a flow record, use the collect interface command
in flow record configuration mode. To disable the use of the input interface as a non-key field for a flow
record, use the no form of this command.
collect interface input
no collect interface input
Syntax Description
input
Configures the input interface name as a non-key field and enables collecting the
input interface from the flows.
Command Default
The input interface name is not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The Flexible NetFlow collect commands are used to configure non-key fields for the flow monitor record and
to enable capturing the values in the fields for the flow created with the record. The values in non-key fields
are added to flows to provide additional information about the traffic in the flows. A change in the value of
a non-key field does not create a new flow. In most cases, the values for non-key fields are taken from only
the first packet in the flow.
To return this command to its default settings, use the no collect interface or default collect interface flow
record configuration command.
Examples
The following example configures the input interface as a non-key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# collect interface input
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
67
collect timestamp absolute
collect timestamp absolute
To configure the absolute time of the first seen or last seen packet in a flow as a non-key field for a flow
record, use the collect timestamp absolute command in flow record configuration mode. To disable the use
of the first seen or last seen packet in a flow as a non-key field for a flow record, use the no form of this
command.
collect timestamp absolute {first| last}
no collect timestamp absolute {first| last}
Syntax Description
first
Configures the absolute time of the first seen packet in a flow as a non-key field and
enables collecting time stamps from the flows.
last
Configures the absolute time of the last seen packet in a flow as a non-key field and
enables collecting time stamps from the flows.
Command Default
The absolute time field is not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The collect commands are used to configure non-key fields for the flow monitor record and to enable capturing
the values in the fields for the flow created with the record. The values in non-key fields are added to flows
to provide additional information about the traffic in the flows. A change in the value of a non-key field does
not create a new flow. In most cases the values for non-key fields are taken from only the first packet in the
flow.
Examples
The following example configures time stamps based on the absolute time of the first seen packet in a flow
as a non-key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# collect timestamp absolute first
The following example configures time stamps based on the absolute time of the last seen packet in a flow
as a non-key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# collect timestamp absolute last
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
68
collect timestamp absolute
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
69
collect transport tcp flags
collect transport tcp flags
To enable the collecting of transport TCP flags from a flow, use the collect transport tcp flags command in
flow record configuration mode. To disable the collecting of transport TCP flags from the flow, use the no
form of this command.
collect transport tcp flags
no collect transport tcp flags
Syntax Description
This command has no arguments or keywords.
Command Default
The transport layer fields are not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The values of the transport layer fields are taken from all packets in the flow. You cannot specify which TCP
flag to collect. You can only specify to collect transport TCP flags. All TCP flags will be collected with this
command. The following transport TCP flags are collected:
• ack—TCP acknowledgement flag
• cwr—TCP congestion window reduced flag
• ece—TCP ECN echo flag
• fin—TCP finish flag
• psh—TCP push flag
• rst—TCP reset flag
• syn—TCP synchronize flag
• urg—TCP urgent flag
To return this command to its default settings, use the no collect collect transport tcp flags or default collect
collect transport tcp flags flow record configuration command.
Examples
The following example collects the TCP flags from a flow:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# collect transport tcp flags
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
70
collect transport tcp flags
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
71
datalink flow monitor
datalink flow monitor
To apply a Flexible NetFlow flow monitor to an interface, use the datalink flow monitor command in interface
configuration mode. To disable a Flexible NetFlow flow monitor, use the no form of this command.
datalink flow monitor monitor-name sampler sampler-name input
no datalink flow monitor monitor-name sampler sampler-name input
Syntax Description
monitor-name
Name of the flow monitor to apply to the interface.
sampler sampler-name
Enables the specified flow sampler for the flow monitor.
input
Monitors traffic that the switch receives on the interface.
Command Default
A flow monitor is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Before you apply a flow monitor to an interface with the datalink flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command and the flow sampler
using the sampler global configuration command.
To enable a flow sampler for the flow monitor, you must have already created the sampler.
Note
Examples
The datalink flow monitor command only monitors non-IPv4 and non-IPv6 traffic. To monitor IPv4
traffic, use the ip flow monitor command. To monitor IPv6 traffic, use the ipv6 flow monitor command.
This example shows how to enable Flexible NetFlow datalink monitoring on an interface:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# datalink flow monitor FLOW-MONITOR-1 sampler FLOW-SAMPLER-1 input
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
72
datalink flow monitor
Related Commands
Command
Description
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters
flow monitor configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
73
debug flow exporter
debug flow exporter
To enable debugging output for flow exporters, use the debug flow exporter command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug flow exporter [[name] exporter-name] [error| event| packets number]
no debug flow exporter [[name] exporter-name] [error| event| packets number]
Syntax Description
Command Modes
Command History
Examples
name
(Optional) Specifies the name of a flow exporter.
exporter-name
(Optional) The name of a flow exporter that was previously configured.
error
(Optional) Enables debugging for flow exporter errors.
event
(Optional) Enables debugging for flow exporter events.
packets
(Optional) Enables packet-level debugging for flow exporters.
number
(Optional) The number of packets to debug for packet-level debugging of
flow exporters. The range is 1 to 65535.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example indicates that a flow exporter packet has been queued for process send:
Device# debug flow exporter
May 21 21:29:12.603: FLOW EXP: Packet queued for process send
Related Commands
Command
Description
clear flow exporter
Clears the statistics for a flow exporter.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
74
debug flow monitor
debug flow monitor
To enable debugging output for flow monitors, use the debug flow monitor command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug flow monitor [error| [name] monitor-name [cache [error]| error| packets packets]]
no debug flow monitor [error| [name] monitor-name [cache [error]| error| packets packets]]
Syntax Description
Command Modes
Command History
Examples
error
(Optional) Enables debugging for flow monitor errors for all flow monitors
or for the specified flow monitor.
name
(Optional) Specifies the name of a flow monitor.
monitor-name
(Optional) Name of a flow monitor that was previously configured.
cache
(Optional) Enables debugging for the flow monitor cache.
cache error
(Optional) Enables debugging for flow monitor cache errors.
packets
(Optional) Enables packet-level debugging for flow monitors.
packets
(Optional) Number of packets to debug for packet-level debugging of flow
monitors. The range is 1 to 65535.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example shows that the cache for FLOW-MONITOR-1 was deleted:
Device# debug flow monitor FLOW-MONITOR-1 cache
May 21 21:53:02.839: FLOW MON: 'FLOW-MONITOR-1' deleted cache
Related Commands
Command
Description
clear flow monitor
Clears a flow monitor cache or flow monitor statistics and forces the export
of the data in the flow monitor cache.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
75
debug flow record
debug flow record
To enable debugging output for flow records, use the debug flow record command in privileged EXEC
mode. To disable debugging output, use the no form of this command.
debug flow record [[name] record-name| options {sampler-table}| [detailed| error]]
no debug flow record [[name] record-name| options {sampler-table}| [detailed| error]]
Syntax Description
Command Modes
Command History
Examples
name
(Optional) Specifies the name of a flow record.
record-name
(Optional) Name of a user-defined flow record that was previously
configured.
options
(Optional) Includes information on other flow record options.
sampler-table
(Optional) Includes information on the sampler tables.
detailed
(Optional) Displays detailed information.
error
(Optional) Displays errors only.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example enables debugging for the flow record:
Device# debug flow record FLOW-record-1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
76
debug sampler
debug sampler
To enable debugging output for samplers, use the debug sampler command in privileged EXEC mode. To
disable debugging output, use the no form of this command.
debug sampler [detailed| error| [name] sampler-name [detailed| error| sampling samples]]
no debug sampler [detailed| error| [name] sampler-name [detailed| error| sampling]]
Syntax Description
Command Modes
Command History
Examples
detailed
(Optional) Enables detailed debugging for sampler elements.
error
(Optional) Enables debugging for sampler errors.
name
(Optional) Specifies the name of a sampler.
sampler-name
(Optional) Name of a sampler that was previously configured.
sampling samples
(Optional) Enables debugging for sampling and specifies the number of
samples to debug.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following sample output shows that the debug process has obtained the ID for the sampler named
SAMPLER-1:
Device#
*May 28
get ID
*May 28
get ID
debug sampler detailed
04:14:30.883: Sampler: Sampler(SAMPLER-1: flow monitor FLOW-MONITOR-1 (ip,Et1/0,O)
succeeded:1
04:14:30.971: Sampler: Sampler(SAMPLER-1: flow monitor FLOW-MONITOR-1 (ip,Et0/0,I)
succeeded:1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
77
description
description
To configure a description for a flow monitor, flow exporter, or flow record, use the description command
in the appropriate configuration mode. To remove a description, use the no form of this command.
description description
no description description
Syntax Description
description
Text string that describes the flow monitor, flow exporter, or flow record.
Command Default
The default description for a flow sampler, flow monitor, flow exporter, or flow record is "User defined."
Command Modes
The following command modes are supported:
Flow exporter configuration
Flow monitor configuration
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default setting, use the no description or default description command in the
appropriate configuration mode.
Examples
The following example configures a description for a flow monitor:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# description Monitors traffic to 172.16.0.1 255.255.0.0
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters flow
monitor configuration mode.
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
78
destination
destination
To configure an export destination for a flow exporter, use the destination command in flow exporter
configuration mode. To remove an export destination for a flow exporter, use the no form of this command.
destination {hostname| ip-address}
no destination {hostname| ip-address}
Syntax Description
hostname
Hostname of the device to which you want to send the NetFlow information.
ip-address
IPv4 address of the workstation to which you want to send the NetFlow
information.
Command Default
An export destination is not configured.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Each flow exporter can have only one destination address or hostname.
When you configure a hostname instead of the IP address for the device, the hostname is resolved immediately
and the IPv4 address is stored in the running configuration. If the hostname-to-IP-address mapping that was
used for the original Domain Name System (DNS) name resolution changes dynamically on the DNS server,
the device does not detect this, and the exported data continues to be sent to the original IP address, resulting
in a loss of data.
To return this command to its default setting, use the no destination or default destination command in flow
exporter configuration mode.
Examples
The following example shows how to configure the networking device to export the cache entry to a destination
system:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# destination 10.0.0.4
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
79
destination
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
80
dscp
dscp
To configure a differentiated services code point (DSCP) value for flow exporter datagrams, use the dscp
command in flow exporter configuration mode. To remove a DSCP value for flow exporter datagrams, use
the no form of this command.
dscp dscp
no dscp dscp
Syntax Description
dscp
DSCP to be used in the DSCP field in exported datagrams. The range is 0 to 63. The
default is 0.
Command Default
The differentiated services code point (DSCP) value is 0.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default setting, use the no dscp or default dscp flow exporter configuration
command.
Examples
The following example sets 22 as the value of the DSCP field in exported datagrams:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# dscp 22
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
81
export-protocol netflow-v9
export-protocol netflow-v9
To configure NetFlow Version 9 export as the export protocol for a Flexible NetFlow exporter, use the
export-protocol netflow-v9 command in flow exporter configuration mode.
export-protocol netflow-v9
Syntax Description
This command has no arguments or keywords.
Command Default
NetFlow Version 9 is enabled.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The device does not support NetFlow v5 export format, only NetFlow v9 export format is supported.
Examples
The following example configures NetFlow Version 9 export as the export protocol for a NetFlow exporter:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# export-protocol netflow-v9
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
82
exporter
exporter
To add a flow exporter for a flow monitor, use the exporter command in the appropriate configuration mode.
To remove a flow exporter for a flow monitor, use the no form of this command.
exporter exporter-name
no exporter exporter-name
Syntax Description
exporter-name
Command Default
An exporter is not configured.
Command Modes
Flow monitor configuration
Command History
Usage Guidelines
Name of a flow exporter that was previously configured.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You must have already created a flow exporter by using the flow exporter command before you can apply
the flow exporter to a flow monitor with the exporter command.
To return this command to its default settings, use the no exporter or default exporter flow monitor
configuration command.
Examples
The following example configures an exporter for a flow monitor:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# exporter EXPORTER-1
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters flow
monitor configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
83
flow exporter
flow exporter
To create a flow exporter, or to modify an existing flow exporter, and enter flow exporter configuration
mode, use the flow exporter command in global configuration mode. To remove a flow exporter, use the no
form of this command.
flow exporter exporter-name
no flow exporter exporter-name
Syntax Description
exporter-name
Name of the flow exporter that is being created or modified.
Command Default
flow exporters are not present in the configuration.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Flow exporters export the data in the flow monitor cache to a remote system, such as a server running NetFlow
collector, for analysis and storage. Flow exporters are created as separate entities in the configuration. Flow
exporters are assigned to flow monitors to provide data export capability for the flow monitors. You can create
several flow exporters and assign them to one or more flow monitors to provide several export destinations.
You can create one flow exporter and apply it to several flow monitors.
Examples
The following example creates a flow exporter named FLOW-EXPORTER-1 and enters flow exporter
configuration mode:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)#
Related Commands
Command
Description
clear flow exporter
Clears the statistics for a flow exporter.
debug flow exporter
Enables debugging output for flow exporters.
show flow exporter
Displays flow exporter status and statistics.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
84
flow monitor
flow monitor
To create a flow monitor, or to modify an existing flow monitor, and enter flow monitor configuration mode,
use the flow monitor command in global configuration mode. To remove a flow monitor, use the no form of
this command.
flow monitor monitor-name
no flow monitor monitor-name
Syntax Description
monitor-name
Name of the flow monitor that is being created or modified.
Command Default
flow monitors are not present in the configuration.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Flow monitors are the component that is applied to interfaces to perform network traffic monitoring. Flow
monitors consist of a flow record and a cache. You add the record to the flow monitor after you create the
flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the
first interface. Flow data is collected from the network traffic during the monitoring process based on the key
and nonkey fields in the flow monitor's record and stored in the flow monitor cache.
Examples
The following example creates a flow monitor named FLOW-MONITOR-1 and enters flow monitor
configuration mode:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)#
Related Commands
Command
Description
clear flow monitor
Clears a flow monitor cache or flow monitor statistics and forces the
export of the data in the flow monitor cache.
debug flow monitor
Enables debugging output for flow monitors.
show flow monitor
Displays the status and statistics for a flow monitor.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
85
flow record
flow record
To create a flow record, or to modify an existing flow record, and enter flow record configuration mode,
use the flow record command in global configuration mode. To remove a record, use the no form of this
command.
flow record record-name
no flow record record-name
Syntax Description
record-name
Command Default
A flow record is not configured.
Command Modes
Global configuration
Command History
Name of the flow record that is being created or modified.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record defines the keys that uses to identify packets in the flow, as well as other fields of interest that
gathers for the flow. You can define a flow record with any combination of keys and fields of interest. The
supports a rich set of keys. A flow record also defines the types of counters gathered per flow. You can
configure 64-bit packet or byte counters.
Examples
The following example creates a flow record named FLOW-RECORD-1, and enters flow record configuration
mode:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)#
Related Commands
Command
Description
show flow record
Displays the status and statistics for a flow record.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
86
ip flow monitor
ip flow monitor
To enable a Flexible NetFlow flow monitor for IPv4 traffic that the device is receiving, use the ip flow monitor
command in interface configuration mode. To disable a flow monitor, use the no form of this command.
ip flow monitor monitor-name [sampler sampler-name] input
no ip flow monitor monitor-name [sampler sampler-name] input
Syntax Description
monitor-name
Name of the flow monitor to apply to the interface.
sampler sampler-name
(Optional) Enables the specified flow sampler for the flow monitor.
input
Monitors IPv4 traffic that the device receives on the interface.
Command Default
A flow monitor is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Before you can apply a flow monitor to an interface with the ip flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command.
When you add a sampler to a flow monitor, only packets that are selected by the named sampler will be entered
into the cache to form flows. Each use of a sampler causes separate statistics to be stored for that usage.
You cannot add a sampler to a flow monitor after the flow monitor has been enabled on the interface. You
must first remove the flow monitor from the interface and then enable the same flow monitor with a sampler.
Note
Examples
The statistics for each flow must be scaled to give the expected true usage. For example, with a 1 in 100
sampler it is expected that the packet and byte counters will have to be multiplied by 100.
The following example enables a flow monitor for monitoring input traffic:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# ip flow monitor FLOW-MONITOR-1 input
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
87
ip flow monitor
The following example enables a flow monitor for monitoring input traffic, with a sampler to limit the input
packets that are sampled:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
The following example shows what happens when you try to add a sampler to a flow monitor that has already
been enabled on an interface without a sampler:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
% Flow Monitor: Flow Monitor 'FLOW-MONITOR-1' is already on in full mode and cannot be
enabled with a sampler.
The following example shows how to remove a flow monitor from an interface so that it can be enabled with
the sampler:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# no ip flow monitor FLOW-MONITOR-1 input
Device(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
Related Commands
Command
Description
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters flow
monitor configuration mode.
sampler
Creates a flow sampler, or modifies an existing flow sampler.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
88
ipv6 flow monitor
ipv6 flow monitor
To enable a flow monitor for IPv6 traffic that the device is receiving, use the ipv6 flow monitor command
in interface configuration mode. To disable a flow monitor, use the no form of this command.
ipv6 flow monitor monitor-name [sampler sampler-name] input
no ipv6 flow monitor monitor-name [sampler sampler-name] input
Syntax Description
monitor-name
Name of the flow monitor to apply to the interface.
sampler sampler-name
(Optional) Enables the specified flow sampler for the flow monitor.
input
Monitors IPv6 traffic that the device receives on the interface.
Command Default
A flow monitor is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Before you can apply a flow monitor to the interface with the ipv6 flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command.
When you add a sampler to a flow monitor, only packets that are selected by the named sampler will be entered
into the cache to form flows. Each use of a sampler causes separate statistics to be stored for that usage.
You cannot add a sampler to a flow monitor after the flow monitor has been enabled on the interface. You
must first remove the flow monitor from the interface and then enable the same flow monitor with a sampler.
Note
Examples
The statistics for each flow must be scaled to give the expected true usage. For example, with a 1 in 100
sampler it is expected that the packet and byte counters will have to be multiplied by 100.
The following example enables a flow monitor for monitoring input traffic:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# ipv6 flow monitor FLOW-MONITOR-1 input
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
89
ipv6 flow monitor
The following example enables a flow monitor for monitoring input traffic, with a sampler to limit the input
packets that are sampled:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
The following example shows what happens when you try to add a sampler to a flow monitor that has already
been enabled on an interface without a sampler:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
% Flow Monitor: Flow Monitor 'FLOW-MONITOR-1' is already on in full mode and cannot be
enabled with a sampler.
The following example shows how to remove a flow monitor from an interface so that it can be enabled with
the sampler:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# no ipv6 flow monitor FLOW-MONITOR-1 input
Device(config-if)# ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
Related Commands
Command
Description
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters flow
monitor configuration mode.
sampler
Creates a flow sampler, or modifies an existing flow sampler.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
90
match datalink ethertype
match datalink ethertype
To configure the EtherType of the packet as a key field for a flow record, use the match datalink ethertype
command in flow record configuration mode. To disable the EtherType of the packet as a key field for a flow
record, use the no form of this command.
match datalink ethertype
no match datalink ethertype
Syntax Description
This command has no arguments or keywords.
Command Default
The EtherType of the packet is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
When you configure the EtherType of the packet as a key field for a flow record using the match datalink
ethertype command, the traffic flow that is created is based on the type of flow monitor that is assigned to
the interface:
• When a datalink flow monitor is assigned to an interface using the datalink flow monitor interface
configuration command, it creates unique flows for different Layer 2 protocols.
• When an IP flow monitor is assigned to an interface using the ip flow monitor interface configuration
command, it creates unique flows for different IPv4 protocols.
• When an IPv6 flow monitor is assigned to an interface using the ipv6 flow monitor interface configuration
command, it creates unique flows for different IPv6 protocols.
To return this command to its default settings, use the no match datalink ethertype or default match datalink
ethertype flow record configuration command.
Examples
The following example configures the EtherType of the packet as a key field for a flow record:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match datalink ethertype
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
91
match datalink ethertype
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
92
match datalink mac
match datalink mac
To configure the use of MAC addresses as a key field for a flow record, use the match datalink mac command
in flow record configuration mode. To disable the use of MAC addresses as a key field for a flow record, use
the no form of this command.
match datalink mac {destination address input| source address input}
no match datalink mac {destination address input| source address input}
Syntax Description
destination address
Configures the use of the destination MAC address as a key field.
input
Specifies the MAC address of input packets.
source address
Configures the use of the source MAC address as a key field.
Command Default
MAC addresses are not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The input keyword is used to specify the observation point that is used by the match datalink mac command
to create flows based on the unique MAC addresses in the network traffic.
Note
When a datalink flow monitor is assigned to an interface or VLAN record, it creates flows only for non-IPv6
or non-IPv4 traffic.
To return this command to its default settings, use the no match datalink mac or default match datalink
mac flow record configuration command.
Examples
The following example configures the use of the destination MAC address of packets that are received by the
device as a key field for a flow record:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match datalink mac destination address input
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
93
match datalink mac
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
94
match datalink vlan
match datalink vlan
To configure the VLAN ID as a key field for a flow record, use the match datalink vlan command in flow
record configuration mode. To disable the use of the VLAN ID value as a key field for a flow record, use the
no form of this command.
match datalink vlan input
no match datalink vlan input
Syntax Description
input
Configures the VLAN ID of traffic being received by the device as a key field.
Command Default
The VLAN ID is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The input keyword is used to specify the observation point that is used by the match datalink vlan command
to create flows based on the unique VLAN IDs in the network traffic.
Examples
The following example configures the VLAN ID of traffic being received by the device as a key field for a
flow record:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match datalink vlan input
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
95
match flow cts
match flow cts
To configure CTS source group tag and destination group tag for a flow record, use thematch flow cts
command in flow record configuration mode. To disable the group tag as key field for a flow record, use the
no form of this command.
match flow cts {source| destination} group-tag
no match flow cts {source| destination} group-tag
Syntax Description
cts destination group-tag
Configures the CTS destination field group as a key field.
cts source group-tag
Configures the CTS source field group as a key field.
Command Default
The CTS destination or source field group, flow direction and the flow sampler ID are not configured as key
fields.
Command Modes
Flexible NetFlow flow record configuration (config-flow-record)
Policy inline configuration (config-if-policy-inline)
Command History
Release
Modification
Cisco IOS XE 3.7.3E
This command was introduced.
Cisco IOS XE Denali 16.2.1
This command was reintroduced.
This command was not supported
in Cisco IOS XE Denali 16.1.x
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the source group-tag as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match flow cts source group-tag
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
96
match flow direction
match flow direction
To configure the flow direction as key fields for a flow record, use the match flow direction command in
flow record configuration mode. To disable the use of the flow direction as key fields for a flow record, use
the no form of this command.
match flow direction
no match flow direction
Syntax Description
This command has no arguments or keywords.
Command Default
The flow direction is not configured as key fields.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The match flow direction command captures the direction of the flow as a key field. This feature is most
useful when a single flow monitor is configured for input and output flows. It can be used to find and eliminate
flows that are being monitored twice, once on input and once on output. This command can help to match up
pairs of flows in the exported data when the two flows are flowing in opposite directions.
Examples
The following example configures the direction the flow was monitored in as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match flow direction
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
97
match interface
match interface
To configure the input and output interfaces as key fields for a flow record, use the match interface command
in flow record configuration mode. To disable the use of the input and output interfaces as key fields for a
flow record, use the no form of this command.
match interface {input| output}
no match interface {input| output}
Syntax Description
input
Configures the input interface as a key field.
output
Configures the output interface as a key field.
Command Default
The input and output interfaces are not configured as key fields.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the input interface as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match interface input
The following example configures the output interface as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match interface output
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
98
match ipv4
match ipv4
To configure one or more of the IPv4 fields as a key field for a flow record, use the match ipv4 command in
flow record configuration mode. To disable the use of one or more of the IPv4 fields as a key field for a flow
record, use the no form of this command.
match ipv4 {destination address| protocol| source address| tos| version}
no match ipv4 {destination address| protocol| source address| tos| version}
Syntax Description
destination address
Configures the IPv4 destination address as a key field. For more information
see match ipv4 destination address, on page 101.
protocol
Configures the IPv4 protocol as a key field.
source address
Configures the IPv4 destination address as a key field. For more information
see match ipv4 source address, on page 102.
tos
Configures the IPv4 ToS as a key field.
version
Configures the IP version from IPv4 header as a key field.
Command Default
The use of one or more of the IPv4 fields as a key field for a user-defined flow record is not enabled.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv4 protocol as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv4 protocol
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
99
match ipv4
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
100
match ipv4 destination address
match ipv4 destination address
To configure the IPv4 destination address as a key field for a flow record, use the match ipv4 destination
address command in flow record configuration mode. To disable the IPv4 destination address as a key field
for a flow record, use the no form of this command.
match ipv4 destination address
no match ipv4 destination address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv4 destination address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv4 destination address or default match
ipv4 destination address flow record configuration command.
Examples
The following example configures the IPv4 destination address as a key field for a flow record:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv4 destination address
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
101
match ipv4 source address
match ipv4 source address
To configure the IPv4 source address as a key field for a flow record, use the match ipv4 source address
command in flow record configuration mode. To disable the use of the IPv4 source address as a key field for
a flow record, use the no form of this command.
match ipv4 source address
no match ipv4 source address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv4 source address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv4 source address or default match ipv4
source address flow record configuration command.
Examples
The following example configures the IPv4 source address as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv4 source address
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
102
match ipv4 ttl
match ipv4 ttl
To configure the IPv4 time-to-live (TTL) field as a key field for a flow record, use the match ipv4 ttl command
in flow record configuration mode. To disable the use of the IPv4 TTL field as a key field for a flow record,
use the no form of this command.
match ipv4 ttl
no match ipv4 ttl
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv4 time-to-live (TTL) field is not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match ipv4 ttl command.
Examples
The following example configures IPv4 TTL as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv4 ttl
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
103
match ipv6
match ipv6
To configure one or more of the IPv6 fields as a key field for a flow record, use the match ipv6 command in
flow record configuration mode. To disable the use of one or more of the IPv6 fields as a key field for a flow
record, use the no form of this command.
match ipv6 {destination address| protocol| source address| traffic-class| version}
no match ipv6 {destination address| protocol| source address| traffic-class| version}
Syntax Description
destination address
Configures the IPv4 destination address as a key field. For more
information see match ipv6 destination address, on page 105.
protocol
Configures the IPv6 protocol as a key field.
source address
Configures the IPv4 destination address as a key field. For more
information see match ipv6 source address, on page 107.
Command Default
The IPv6 fields are not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv6 protocol field as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv6 protocol
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
104
match ipv6 destination address
match ipv6 destination address
To configure the IPv6 destination address as a key field for a flow record, use the match ipv6 destination
address command in flow record configuration mode. To disable the IPv6 destination address as a key field
for a flow record, use the no form of this command.
match ipv6 destination address
no match ipv6 destination address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv6 destination address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv6 destination address or default match
ipv6 destination address flow record configuration command.
Examples
The following example configures the IPv6 destination address as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv6 destination address
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
105
match ipv6 hop-limit
match ipv6 hop-limit
To configure the IPv6 hop limit as a key field for a flow record, use the match ipv6 hop-limit command in
flow record configuration mode. To disable the use of a section of an IPv6 packet as a key field for a flow
record, use the no form of this command.
match ipv6 hop-limit
no match ipv6 hop-limit
Syntax Description
This command has no arguments or keywords.
Command Default
The use of the IPv6 hop limit as a key field for a user-defined flow record is not enabled by default.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the hop limit of the packets in the flow as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv6 hop-limit
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
106
match ipv6 source address
match ipv6 source address
To configure the IPv6 source address as a key field for a flow record, use the match ipv6 source address
command in flow record configuration mode. To disable the use of the IPv6 source address as a key field for
a flow record, use the no form of this command.
match ipv6 source address
no match ipv6 source address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv6 source address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv6 source address or default match ipv6
source address flow record configuration command.
Examples
The following example configures a IPv6 source address as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match ipv6 source address
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
107
match transport
match transport
To configure one or more of the transport fields as a key field for a flow record, use the match transport
command in flow record configuration mode. To disable the use of one or more of the transport fields as a
key field for a flow record, use the no form of this command.
Syntax Description
destination-port
Configures the transport destination port as a key field.
source-port
Configures the transport source port as a key field.
Command Default
The transport fields are not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the destination port as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match transport destination-port
The following example configures the source port as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match transport source-port
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
108
match transport icmp ipv4
match transport icmp ipv4
To configure the ICMP IPv4 type field and the code field as key fields for a flow record, use the match
transport icmp ipv4 command in flow record configuration mode. To disable the use of the ICMP IPv4 type
field and code field as key fields for a flow record, use the no form of this command.
match transport icmp ipv4 {code| type}
no match transport icmp ipv4 {code| type}
Syntax Description
code
Configures the IPv4 ICMP code as a key field.
type
Configures the IPv4 ICMP type as a key field.
Command Default
The ICMP IPv4 type field and the code field are not configured as key fields.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv4 ICMP code field as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match transport icmp ipv4 code
The following example configures the IPv4 ICMP type field as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match transport icmp ipv4 type
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
109
match transport icmp ipv6
match transport icmp ipv6
To configure the ICMP IPv6 type field and the code field as key fields for a flow record, use the match
transport icmp ipv6 command in flow record configuration mode. To disable the use of the ICMP IPv6 type
field and code field as key fields for a flow record, use the no form of this command.
match transport icmp ipv6 {code| type}
no match transport icmp ipv6 {code| type}
Syntax Description
code
Configures the IPv6 ICMP code as a key field.
type
Configures the IPv6 ICMP type as a key field.
Command Default
The ICMP IPv6 type field and the code field are not configured as key fields.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv6 ICMP code field as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match transport icmp ipv6 code
The following example configures the IPv6 ICMP type field as a key field:
Device(config)# flow record FLOW-RECORD-1
Device(config-flow-record)# match transport icmp ipv6 type
Related Commands
Command
Description
flow record
Creates a flow record, or modifies an existing flow record, and enters flow
record configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
110
mode random 1 out-of
mode random 1 out-of
To enable random sampling and to specify the packet interval for a sampler, use the mode random 1 out-of
command in sampler configuration mode. To remove the packet interval information for a sampler, use the
no form of this command.
mode random 1 out-of window-size
no mode
Syntax Description
window-size
Specifies the window size from which to select packets. The range is 2 to
1024.
Command Default
The mode and the packet interval for a sampler are not configured.
Command Modes
Sampler configuration
Command History
Usage Guidelines
Note
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A total of four unique samplers are supported on the . Packets are chosen in a manner that should eliminate
any bias from traffic patterns and counter any attempt by users to avoid monitoring.
The deterministic keyword is not supported, even though it is visible in the command-line help string.
The following example enables random sampling with a window size of 1000:
Device(config)# sampler SAMPLER-1
Device(config-sampler)# mode random 1 out-of 1000
Related Commands
Command
Description
debug sampler
Enables debugging output for samplers.
show sampler
Displays the status and statistics for a sampler.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
111
option
option
To configure optional data parameters for a flow exporter for , use the option command in flow exporter
configuration mode. To remove optional data parameters for a flow exporter, use the no form of this command.
option {exporter-stats| interface-table| sampler-table} [timeout seconds]
no option {exporter-stats| interface-table| sampler-table}
Syntax Description
exporter-stats
Configures the exporter statistics option for flow exporters.
interface-table
Configures the interface table option for flow exporters.
sampler-table
Configures the export sampler table option for flow exporters.
timeout seconds
(Optional) Configures the option resend time in seconds for flow
exporters. The range is 1 to 86400. The default is 600.
Command Default
The timeout is 600 seconds. All other optional data parameters are not configured.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The option exporter-stats command causes the periodic sending of the exporter statistics, including the
number of records, bytes, and packets sent. This command allows the collector to estimate packet loss for the
export records it receives. The optional timeout alters the frequency at which the reports are sent.
The option interface-table command causes the periodic sending of an options table, which allows the
collector to map the interface SNMP indexes provided in the flow records to interface names. The optional
timeout can alter the frequency at which the reports are sent.
The option sampler-table command causes the periodic sending of an options table, which details the
configuration of each sampler and allows the collector to map the sampler ID provided in any flow record to
a configuration that it can use to scale up the flow statistics. The optional timeout can alter the frequency at
which the reports are sent.
To return this command to its default settings, use the no option or default option flow exporter configuration
command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
112
option
Examples
The following example shows how to enable the periodic sending of the sampler option table, which allows
the collector to map the sampler ID to the sampler type and rate:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# option sampler-table
The following example shows how to enable the periodic sending of the exporter statistics, including the
number of records, bytes, and packets sent:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# option exporter-stats
The following example shows how to enable the periodic sending of an options table, which allows the
collector to map the interface SNMP indexes provided in the flow records to interface names:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# option interface-table
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
113
record
record
To add a flow record for a flow monitor, use the record command in flow monitor configuration mode. To
remove a flow record for a flow monitor, use the no form of this command.
record record-name
no record
Syntax Description
record-name
Command Default
A flow record is not configured.
Command Modes
Flow monitor configuration
Command History
Usage Guidelines
Note
Examples
Name of a user-defined flow record that was previously configured.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Each flow monitor requires a record to define the contents and layout of its cache entries. The flow monitor
can use one of the wide range of predefined record formats, or advanced users may create their own record
formats.
You must use the no ip flow monitor command to remove a flow monitor from all of the interfaces to
which you have applied it before you can modify the parameters for the record command for the flow
monitor.
The following example configures the flow monitor to use FLOW-RECORD-1:
Device(config)# flow monitor FLOW-MONITOR-1
Device(config-flow-monitor)# record FLOW-RECORD-1
Related Commands
Command
Description
flow monitor
Creates a flow monitor, or modifies an existing flow monitor, and enters
flow monitor configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
114
sampler
sampler
To create a flow sampler, or to modify an existing flow sampler, and to enter sampler configuration mode,
use the sampler command in global configuration mode. To remove a sampler, use the no form of this
command.
sampler sampler-name
no sampler sampler-name
Syntax Description
sampler-name
Command Default
flow samplers are not configured.
Command Modes
Global configuration
Command History
Usage Guidelines
Name of the flow sampler that is being created or modified.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Flow samplers are used to reduce the load placed by on the networking device to monitor traffic by limiting
the number of packets that are analyzed. You configure a rate of sampling that is 1 out of a range of packets.
Flow samplers are applied to interfaces in conjunction with a flow monitor to implement sampled .
To enable flow sampling, you configure the record that you want to use for traffic analysis and assign it to a
flow monitor. When you apply a flow monitor with a sampler to an interface, the sampled packets are analyzed
at the rate specified by the sampler and compared with the flow record associated with the flow monitor. If
the analyzed packets meet the criteria specified by the flow record, they are added to the flow monitor cache.
Examples
The following example creates a flow sampler name SAMPLER-1:
Device(config)# sampler SAMPLER-1
Device(config-sampler)#
Related Commands
Command
Description
debug sampler
Enables debugging output for samplers.
mode
Specifies the type of sampling and the packet interval for a sampler.
show sampler
Displays the status and statistics for a sampler.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
115
show flow exporter
show flow exporter
To display flow exporter status and statistics, use the show flow exporter command in privileged EXEC
mode.
show flow exporter [export-ids netflow-v9| [name] exporter-name [statistics| templates]| statistics|
templates]
Syntax Description
export-ids netflow-v9
(Optional) Displays the NetFlow Version 9 export fields that can be exported
and their IDs.
name
(Optional) Specifies the name of a flow exporter.
exporter-name
(Optional) Name of a flow exporter that was previously configured.
statistics
(Optional) Displays statistics for all flow exporters or for the specified flow
exporter.
templates
(Optional) Displays template information for all flow exporters or for the
specified flow exporter.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example displays the status and statistics for all of the flow exporters configured on a device:
Device# show flow exporter
Flow Exporter FLOW-EXPORTER-1:
Description:
Exports to the datacenter
Export protocol:
NetFlow Version 9
Transport Configuration:
Destination IP address: 192.168.0.1
Source IP address:
192.168.0.2
Transport Protocol:
UDP
Destination Port:
9995
Source Port:
55864
DSCP:
0x0
TTL:
255
Output Features:
Used
This table describes the significant fields shown in the display:
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
116
show flow exporter
Table 6: show flow exporter Field Descriptions
Field
Description
Flow Exporter
The name of the flow exporter that you configured.
Description
The description that you configured for the exporter,
or the default description User defined.
Transport Configuration
The transport configuration fields for this exporter.
Destination IP address
The IP address of the destination host.
Source IP address
The source IP address used by the exported packets.
Transport Protocol
The transport layer protocol used by the exported
packets.
Destination Port
The destination UDP port to which the exported
packets are sent.
Source Port
The source UDP port from which the exported packets
are sent.
DSCP
The differentiated services code point (DSCP) value.
TTL
The time-to-live value.
Output Features
Specifies whether the output-features command,
which causes the output features to be run on Flexible
NetFlow export packets, has been used or not.
The following example displays the status and statistics for all of the flow exporters configured on a device:
Device# show flow exporter name FLOW-EXPORTER-1 statistics
Flow Exporter FLOW-EXPORTER-1:
Packet send statistics (last cleared 2w6d ago):
Successfully sent:
0
(0 bytes)
Related Commands
Command
Description
clear flow exporter
Clears the statistics for a flow exporter.
debug flow exporter
Enables debugging output for flow exporters.
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and
enters flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
117
show flow interface
show flow interface
To display the configuration and status for an interface, use the show flow interface command in privileged
EXEC mode.
show flow interface [type number]
Syntax Description
Command Modes
Command History
Examples
type
(Optional) The type of interface on which you want to display accounting
configuration information.
number
(Optional) The number of the interface on which you want to display accounting
configuration information.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example displays the accounting configuration on Ethernet interfaces 0/0 and 0/1:
Device# show flow interface gigabitethernet1/0/1
Interface Ethernet1/0
monitor:
FLOW-MONITOR-1
direction:
Output
traffic(ip):
on
Device# show flow interface gigabitethernet1/0/2
Interface Ethernet0/0
monitor:
FLOW-MONITOR-1
direction:
Input
traffic(ip):
sampler SAMPLER-2#
The table below describes the significant fields shown in the display.
Table 7: show flow interface Field Descriptions
Field
Description
Interface
The interface to which the information applies.
monitor
The name of the flow monitor that is configured on
the interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
118
show flow interface
Field
Description
direction:
The direction of traffic that is being monitored by the
flow monitor.
The possible values are:
• Input—Traffic is being received by the
interface.
• Output—Traffic is being transmitted by the
interface.
traffic(ip)
Indicates if the flow monitor is in normal mode or
sampler mode.
The possible values are:
• on—The flow monitor is in normal mode.
• sampler—The flow monitor is in sampler mode
(the name of the sampler will be included in the
display).
Related Commands
Command
Description
show flow monitor
Displays the status and statistics for a flow monitor.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
119
show flow monitor
show flow monitor
To display the status and statistics for a flow monitor, use the show flow monitor command in privileged
EXEC mode.
Syntax Description
Command Modes
Command History
Usage Guidelines
name
(Optional) Specifies the name of a flow monitor.
monitor-name
(Optional) Name of a flow monitor that was previously configured.
cache
(Optional) Displays the contents of the cache for the flow monitor.
format
(Optional) Specifies the use of one of the format options for formatting the
display output.
csv
(Optional) Displays the flow monitor cache contents in comma-separated
variables (CSV) format.
record
(Optional) Displays the flow monitor cache contents in record format.
table
(Optional) Displays the flow monitor cache contents in table format.
statistics
(Optional) Displays the statistics for the flow monitor.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The cache keyword uses the record format by default.
The uppercase field names in the display output of the show flowmonitor monitor-name cache command
are key fields that uses to differentiate flows. The lowercase field names in the display output of the show
flow monitor monitor-name cache command are nonkey fields from which collects values as additional data
for the cache.
Examples
The following example displays the status for a flow monitor:
Device# show flow monitor FLOW-MONITOR-1
Flow Monitor FLOW-MONITOR-1:
Description:
Used for basic traffic analysis
Flow Record:
flow-record-1
Flow Exporter:
flow-exporter-1
flow-exporter-2
Cache:
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
120
show flow monitor
Type:
Status:
Size:
Inactive Timeout:
Active Timeout:
normal
allocated
4096 entries / 311316 bytes
15 secs
1800 secs
This table describes the significant fields shown in the display.
Table 8: show flow monitor monitor-name Field Descriptions
Field
Description
Flow Monitor
Name of the flow monitor that you configured.
Description
Description that you configured or the monitor, or
the default description User defined.
Flow Record
Flow record assigned to the flow monitor.
Flow Exporter
Exporters that are assigned to the flow monitor.
Cache
Information about the cache for the flow monitor.
Type
Flow monitor cache type. The value is always normal,
as it is the only supported cache type.
Status
Status of the flow monitor cache.
The possible values are:
• allocated—The cache is allocated.
• being deleted—The cache is being deleted.
• not allocated—The cache is not allocated.
Size
Current cache size.
Inactive Timeout
Current value for the inactive timeout in seconds.
Active Timeout
Current value for the active timeout in seconds.
The following example displays the status, statistics, and data for the flow monitor named FLOW-MONITOR-1:
This table describes the significant fields shown in the display.
The following example displays the status, statistics, and data for the flow monitor named FLOW-MONITOR-1
in a table format:
The following example displays the status, statistics, and data for the flow monitor named
FLOW-MONITOR-IPv6 (the cache contains IPv6 data) in record format:
The following example displays the status and statistics for a flow monitor:
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
121
show flow monitor
Related Commands
Command
Description
clear flow monitor
Clears a flow monitor cache or flow monitor statistics and forces the
export of the data in the flow monitor cache.
debug flow monitor
Enables debugging output for flow monitors.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
122
show flow record
show flow record
To display the status and statistics for a flow record, use the show flow record command in privileged EXEC
mode.
show flow record [[name] record-name]
Syntax Description
name
(Optional) Specifies the name of a flow record.
record-name
(Optional) Name of a user-defined flow record that was previously configured.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example displays the status and statistics for FLOW-RECORD-1:
Device# show flow record FLOW-RECORD-1
flow record FLOW-RECORD-1:
Description:
User defined
No. of users:
0
Total field space: 24 bytes
Fields:
match ipv6 destination address
match transport source-port
collect interface input
Related Commands
Command
Description
record
Configures a flow record for a flow monitor.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
123
show sampler
show sampler
To display the status and statistics for a sampler, use the show sampler command in privileged EXEC mode.
show sampler [[name] sampler-name]
Syntax Description
name
(Optional) Specifies the name of a sampler.
sampler-name
(Optional) Name of a sampler that was previously configured.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example displays the status and statistics for all of the flow samplers configured:
Device# show sampler
Sampler SAMPLER-1:
ID:
2083940135
export ID:
0
Description:
User defined
Type:
Invalid (not in use)
Rate:
1 out of 32
Samples:
0
Requests:
0
Users (0):
Sampler SAMPLER-2:
ID:
3800923489
export ID:
1
Description:
User defined
Type:
random
Rate:
1 out of 100
Samples:
1
Requests:
124
Users (1):
flow monitor FLOW-MONITOR-1 (datalink,vlan1)
0 out of 0
This table describes the significant fields shown in the display.
Table 9: show sampler Field Descriptions
Field
Description
ID
ID number of the flow sampler.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
124
show sampler
Related Commands
Field
Description
Export ID
ID of the flow sampler export.
Description
Description that you configured for the flow sampler,
or the default description User defined.
Type
Sampling mode that you configured for the flow
sampler.
Rate
Window size (for packet selection) that you
configured for the flow sampler. The range is 2 to
32768.
Samples
Number of packets sampled since the flow sampler
was configured or the device was restarted. This is
equivalent to the number of times a positive response
was received when the sampler was queried to
determine if the traffic needed to be sampled. See the
explanation of the Requests field in this table.
Requests
Number of times the flow sampler was queried to
determine if the traffic needed to be sampled.
Users
Interfaces on which the flow sampler is configured.
Command
Description
debug sampler
Enables debugging output for samplers.
sampler
Creates a flow sampler, or modifies an existing flow sampler.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
125
source
source
To configure the source IP address interface for all of the packets sent by a flow exporter, use the source
command in flow exporter configuration mode. To remove the source IP address interface for all of the packets
sent by a flow exporter, use the no form of this command.
source interface-type interface-number
no source
Syntax Description
interface-type
Type of interface whose IP address you want to use for the source IP address
of the packets sent by a flow exporter.
interface-number
Interface number whose IP address you want to use for the source IP address
of the packets sent by a flow exporter.
Command Default
The IP address of the interface over which the datagram is transmitted is used as the source IP address.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The benefits of using a consistent IP source address for the datagrams that sends include the following:
• The source IP address of the datagrams exported by is used by the destination system to determine from
which device the data is arriving. If your network has two or more paths that can be used to send
datagrams from the device to the destination system and you do not specify the source interface from
which the source IP address is to be obtained, the device uses the IP address of the interface over which
the datagram is transmitted as the source IP address of the datagram. In this situation the destination
system might receive datagrams from the same device, but with different source IP addresses. When
the destination system receives datagrams from the same device with different source IP addresses, the
destination system treats the datagrams as if they were being sent from different devices. To avoid
having the destination system treat the datagrams as if they were being sent from different devices, you
must configure the destination system to aggregate the datagrams it receives from all of the possible
source IP addresses in the device into a single flow.
• If your device has multiple interfaces that can be used to transmit datagrams to the destination system,
and you do not configure the source command, you will have to add an entry for the IP address of each
interface into any access lists that you create for permitting traffic. Creating and maintaining access
lists for permitting traffic from known sources and blocking it from unknown sources is easier when
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
126
source
you limit the source IP address for datagrams to a single IP address for each device that is exporting
traffic.
Caution
The interface that you configure as the source interface must have an IP address configured, and it must
be up.
Tip
When a transient outage occurs on the interface that you configured with the source command, the exporter
reverts to the default behavior of using the IP address of the interface over which the datagrams are being
transmitted as the source IP address for the datagrams. To avoid this problem, use a loopback interface
as the source interface because loopback interfaces are not subject to the transient outages that can occur
on physical interfaces.
To return this command to its default settings, use the no source or default source flow exporter configuration
command.
Examples
The following example shows how to configure to use a loopback interface as the source interface for NetFlow
traffic:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# source loopback 0
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
127
template data timeout
template data timeout
To specify a timeout period for resending flow exporter template data, use the template data timeout command
in flow exporter configuration mode. To remove the template resend timeout for a flow exporter, use the no
form of this command.
template data timeout seconds
no template data timeout seconds
Syntax Description
seconds
Timeout value in seconds. The range is 1 to 86400. The default is 600.
Command Default
The default template resend timeout for a flow exporter is 600 seconds.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Flow exporter template data describes the exported data records. Data records cannot be decoded without the
corresponding template. The template data timeout command controls how often those templates are exported.
To return this command to its default settings, use the no template data timeout or default template data
timeout flow record exporter command.
Examples
The following example configures resending templates based on a timeout of 1000 seconds:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# template data timeout 1000
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
128
transport
transport
To configure the transport protocol for a flow exporter for , use the transport command in flow exporter
configuration mode. To remove the transport protocol for a flow exporter, use the no form of this command.
transport udp udp-port
no transport udp udp-port
Syntax Description
udp udp-port
Specifies User Datagram Protocol (UDP) as the transport protocol and the
UDP port number.
Command Default
Flow exporters use UDP on port 9995.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default settings, use the no transport or default transport flow exporter
configuration command.
Examples
The following example configures UDP as the transport protocol and a UDP port number of 250:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# transport udp 250
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
129
ttl
ttl
To configure the time-to-live (TTL) value, use the ttl command in flow exporter configuration mode. To
remove the TTL value, use the no form of this command.
ttl ttl
no ttl ttl
Syntax Description
ttl
Time-to-live (TTL) value for exported datagrams. The range is 1 to 255. The default is
255.
Command Default
Flow exporters use a TTL of 255.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default settings, use the no ttl or default ttl flow exporter configuration command.
Examples
The following example specifies a TTL of 15:
Device(config)# flow exporter FLOW-EXPORTER-1
Device(config-flow-exporter)# ttl 15
Related Commands
Command
Description
flow exporter
Creates a flow exporter, or modifies an existing flow exporter, and enters
flow exporter configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
130
PART
III
Interface and Hardware Components
• Interface and Hardware Commands, page 133
Interface and Hardware Commands
• client vlan, page 136
• debug ilpower, page 137
• debug interface, page 139
• debug lldp packets, page 141
• debug nmsp, page 142
• debug platform poe, page 143
• duplex, page 144
• errdisable detect cause, page 146
• errdisable recovery cause, page 148
• errdisable recovery interval, page 151
• interface, page 152
• interface range, page 154
• ip mtu, page 155
• ipv6 mtu, page 157
• lldp (interface configuration), page 159
• logging event power-inline-status, page 161
• mdix auto, page 162
• mode (power-stack configuration), page 164
• network-policy, page 166
• network-policy profile (global configuration), page 167
• nmsp attachment suppress, page 169
• power efficient-ethernet auto, page 170
• power-priority , page 171
• power inline, page 173
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
133
• power inline police, page 176
• power supply, page 179
• show CAPWAP summary, page 181
• show controllers cpu-interface, page 182
• show controllers ethernet-controller, page 184
• show controllers utilization, page 194
• show eee, page 196
• show env, page 199
• show errdisable detect, page 202
• show errdisable recovery, page 203
• show interfaces, page 204
• show interfaces counters, page 208
• show interfaces switchport, page 211
• show interfaces transceiver, page 214
• show module, page 217
• show mgmt-infra trace messages ilpower, page 218
• show mgmt-infra trace messages ilpower-ha, page 220
• show mgmt-infra trace messages platform-mgr-poe, page 221
• show network-policy profile, page 222
• show platform CAPWAP summary, page 223
• show power inline, page 224
• show stack-power , page 230
• show system mtu, page 231
• show wireless interface summary, page 232
• speed, page 233
• stack-power , page 235
• switchport block, page 237
• system mtu, page 239
• voice-signaling vlan (network-policy configuration), page 240
• voice vlan (network-policy configuration), page 242
• wireless ap-manager interface, page 244
• wireless exclusionlist, page 245
• wireless linktest, page 246
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
134
• wireless management interface, page 247
• wireless peer-blocking forward-upstream, page 248
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
135
client vlan
client vlan
To configure a WLAN interface or an interface group, use the client vlan command. To disable the WLAN
interface, use the no form of this command.
client vlan interface-id-name-or-group-name
no client vlan
Syntax Description
interface-id-name-or-group-name
Command Default
The default interface is configured.
Command Modes
WLAN configuration
Command History
Interface ID, name, or VLAN group name. The interface ID can
also be in digits too.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must disable the WLAN before using this command. See Related Commands section for more information
on how to disable a WLAN.
Examples
This example shows how to enable a client VLAN on a WLAN:
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# wlan wlan1
Device(config-wlan)# client vlan client-vlan1
Device(config-wlan)# end
This example shows how to disable a client VLAN on a WLAN:
Device# configure terminal
Enter configuration commands, one per line.
Device(config)# wlan wlan1
Device(config-wlan)# no client vlan
Device(config-wlan)# end
Related Commands
Command
Description
wlan
Creates or disables a WLAN.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
136
End with CNTL/Z.
debug ilpower
debug ilpower
To enable debugging of the power controller and Power over Ethernet (PoE) system, use the debug ilpower
command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ilpower {cdp| controller| event| ha| ipc| police| port| powerman| registries| scp | sense}
no debug ilpower {cdp| controller| event| ha| ipc| police| port| powerman| registries| scp | sense}
Syntax Description
cdp
Displays PoE Cisco Discovery Protocol (CDP) debug messages.
controller
Displays PoE controller debug messages.
event
Displays PoE event debug messages.
ha
Displays PoE high-availability messages.
ipc
Displays PoE Inter-Process Communication (IPC) debug messages.
police
Displays PoE police debug messages.
port
Displays PoE port manager debug messages.
powerman
Displays PoE power management debug messages.
registries
Displays PoE registries debug messages.
scp
Displays PoE SCP debug messages.
sense
Displays PoE sense debug messages.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is supported only on PoE-capable switches.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
137
debug ilpower
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
138
debug interface
debug interface
To enable debugging of interface-related activities, use the debug interface command in privileged EXEC
mode. To disable debugging, use the no form of this command.
debug interface {interface-id| counters {exceptions| protocol memory} | null interface-number| port-channel
port-channel-number| states|vlan vlan-id}
no debug interface {interface-id| counters {exceptions| protocol memory} | null interface-number|
port-channel port-channel-number| states|vlan vlan-id}
Syntax Description
interface-id
ID of the physical interface. Displays debug messages for the specified
physical port, identified by type switch number/module number/port, for
example, gigabitethernet 1/0/2.
null interface-number
Displays debug messages for null interfaces. The interface number is always
0.
port-channel
port-channel-number
Displays debug messages for the specified EtherChannel port-channel
interface. The port-channel-number range is 1 to 48.
vlan vlan-id
Displays debug messages for the specified VLAN. The vlan range is 1 to
4094.
counters
Displays counters debugging information.
exceptions
Displays debug messages when a recoverable exceptional condition occurs
during the computation of the interface packet and data rate statistics.
protocol memory
Displays debug messages for memory operations of protocol counters.
states
Displays intermediary debug messages when an interface's state transitions.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
If you do not specify a keyword, all debug messages appear.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
139
debug interface
The undebug interface command is the same as the no debug interface command.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
140
debug lldp packets
debug lldp packets
To enable debugging of Link Layer Discovery Protocol (LLDP) packets, use the debug lldp packets command
in privileged EXEC mode. To disable debugging, use the no form of this command.
debug lldp packets
no debug lldp packets
Syntax Description
This command has no arguments or keywords.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug lldp packets command is the same as the no debug lldp packets command.
When you enable debugging on a switch stack, it is enabled only on the active switch. To enable debugging
on a stack member, you can start a session from the active switch by using the session switch-number EXEC
command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
141
debug nmsp
debug nmsp
To enable debugging of the Network Mobility Services Protocol (NMSP) on the switch, use the debug nmsp
command in privileged EXEC mode. To disable debugging, use the no form of this command.
Syntax Description
all
Displays all NMSP debug messages.
connection
Displays debug messages for NMSP connection events.
error
Displays debugging information for NMSP error messages.
event
Displays debug messages for NMSP events.
rx
Displays debugging information for NMSP receive messages.
tx
Displays debugging information for NMSP transmit messages.
packet
Displays debug messages for NMSP packet events.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug nmsp command is the same as the no debug nmsp command.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
142
debug platform poe
debug platform poe
To enable debugging of a Power over Ethernet (PoE) port, use the debug platform poe command in privileged
EXEC mode. To disable debugging, use the no form of this command.
debug platform poe [error| info] [switch switch-number]
no debug platform poe [error| info] [switch switch-number]
Syntax Description
error
(Optional) Displays PoE-related error debug messages.
info
(Optional) Displays PoE-related information debug messages.
switch switch-number
(Optional) Specifies the stack member. This keyword is supported only on
stacking-capable switches.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug platform poe command is the same as the no debug platform poe command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
143
duplex
duplex
To specify the duplex mode of operation for a port, use the duplex command in interface configuration mode.
To return to the default value, use the no form of this command.
duplex {auto| full| half}
no duplex {auto| full| half}
Syntax Description
Command Default
auto
Enables automatic duplex configuration. The port automatically detects whether it should
run in full- or half-duplex mode, depending on the attached device mode.
full
Enables full-duplex mode.
half
Enables half-duplex mode (only for interfaces operating at 10 or 100 Mb/s). You cannot
configure half-duplex mode for interfaces operating at 1000 or 10,000 Mb/s.
The default is auto for Gigabit Ethernet ports.
You cannot configure the duplex mode on 10-Gigabit Ethernet ports; it is always full.
Duplex options are not supported on the 1000BASE-x or 10GBASE-x (where -x is -BX, -CWDM, -LX, -SX,
or -ZX) small form-factor pluggable (SFP) modules.
Command Modes
Command History
Usage Guidelines
Note
Interface configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
For Gigabit Ethernet ports, setting the port to auto has the same effect as specifying full if the attached device
does not autonegotiate the duplex parameter.
Half-duplex mode is supported on Gigabit Ethernet interfaces if the duplex mode is auto and the connected
device is operating at half duplex. However, you cannot configure these interfaces to operate in half-duplex
mode.
Certain ports can be configured to be either full duplex or half duplex. How this command is applied depends
on the device to which the switch is attached.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
144
duplex
If both ends of the line support autonegotiation, we highly recommend using the default autonegotiation
settings. If one interface supports autonegotiation and the other end does not, configure duplex and speed on
both interfaces, and use the auto setting on the supported side.
If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed setting
and then forces the speed setting to the negotiated value. The duplex setting remains as configured on each
end of the link, which could result in a duplex setting mismatch.
You can configure the duplex setting when the speed is set to auto.
Caution
Changing the interface speed and duplex mode configuration might shut down and reenable the interface
during the reconfiguration.
You can verify your setting by entering the show interfaces privileged EXEC command.
Examples
This example shows how to configure an interface for full-duplex operation:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# duplex full
Related Commands
Command
Description
show interfaces
Displays the administrative and operational status of all interfaces or a
specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
145
errdisable detect cause
errdisable detect cause
To enable error-disable detection for a specific cause or for all causes, use the errdisable detect cause
command in global configuration mode. To disable the error-disable detection feature, use the no form of this
command.
errdisable detect cause {all| arp-inspection| bpduguard shutdown vlan| dhcp-rate-limit| dtp-flap|
gbic-invalid| inline-power| link-flap| loopback| pagp-flap| pppoe-ia-rate-limit | psp shutdown vlan|
security-violation shutdown vlan| sfp-config-mismatch}
no errdisable detect cause {all| arp-inspection| bpduguard shutdown vlan| dhcp-rate-limit| dtp-flap|
gbic-invalid| inline-power| link-flap| loopback| pagp-flap| pppoe-ia-rate-limit | psp shutdown vlan|
security-violation shutdown vlan| sfp-config-mismatch}
Syntax Description
all
Enables error detection for all error-disabled causes.
arp-inspection
Enables error detection for dynamic Address Resolution Protocol (ARP)
inspection.
bpduguard shutdown vlan
Enables per-VLAN error-disable for BPDU guard.
dhcp-rate-limit
Enables error detection for DHCP snooping.
dtp-flap
Enables error detection for the Dynamic Trunking Protocol (DTP)
flapping.
gbic-invalid
Enables error detection for an invalid Gigabit Interface Converter (GBIC)
module.
Note
inline-power
This error refers to an invalid small form-factor pluggable (SFP)
module.
Enables error detection for the Power over Ethernet (PoE) error-disabled
cause.
Note
This keyword is supported only on switches with PoE
ports.
link-flap
Enables error detection for link-state flapping.
loopback
Enables error detection for detected loopbacks.
pagp-flap
Enables error detection for the Port Aggregation Protocol (PAgP) flap
error-disabled cause.
pppoe-ia-rate-limit
Enables error detection for the PPPoE Intermediate Agent rate-limit
error-disabled cause.
psp shutdown vlan
Enables error detection for protocol storm protection (PSP).
security-violation shutdown vlan Enables voice aware 802.1x security.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
146
errdisable detect cause
sfp-config-mismatch
Enables error detection on an SFP configuration mismatch.
Command Default
Detection is enabled for all causes. All causes, except per-VLAN error disabling, are configured to shut down
the entire port.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A cause (such as a link-flap or dhcp-rate-limit) is the reason for the error-disabled state. When a cause is
detected on an interface, the interface is placed in an error-disabled state, an operational state that is similar
to a link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For
the bridge protocol data unit (BPDU) guard, voice-aware 802.1x security, and port-security features, you can
configure the switch to shut down only the offending VLAN on the port when a violation occurs, instead of
shutting down the entire port.
If you set a recovery mechanism for the cause by entering the errdisable recovery global configuration
command, the interface is brought out of the error-disabled state and allowed to retry the operation when all
causes have timed out. If you do not set a recovery mechanism, you must enter the shutdown and then the
no shutdown commands to manually recover an interface from the error-disabled state.
For protocol storm protection, excess packets are dropped for a maximum of two virtual ports. Virtual port
error disabling using the psp keyword is not supported for EtherChannel and Flexlink interfaces.
To verify your settings, enter the show errdisable detect privileged EXEC command.
Examples
This example shows how to enable error-disabled detection for the link-flap error-disabled cause:
Device(config)# errdisable detect cause link-flap
This command shows how to globally configure BPDU guard for a per-VLAN error-disabled state:
Device(config)# errdisable detect cause bpduguard shutdown vlan
This command shows how to globally configure voice-aware 802.1x security for a per-VLAN error-disabled
state:
Device(config)# errdisable detect cause security-violation shutdown vlan
You can verify your setting by entering the show errdisable detect privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
147
errdisable recovery cause
errdisable recovery cause
To enable the error-disabled mechanism to recover from a specific cause, use the errdisable recovery cause
command in global configuration mode. To return to the default setting, use the no form of this command.
errdisable recovery cause {all| arp-inspection| bpduguard| channel-misconfig| dhcp-rate-limit| dtp-flap|
gbic-invalid| inline-power| link-flap| loopback| mac-limit| pagp-flap| port-mode-failure|
pppoe-ia-rate-limit| psecure-violation| psp| security-violation| sfp-config-mismatch| storm-control| udld|
vmps}
no errdisable recovery cause {all| arp-inspection| bpduguard| channel-misconfig| dhcp-rate-limit|
dtp-flap| gbic-invalid| inline-power| link-flap| loopback| mac-limit| pagp-flap| port-mode-failure|
pppoe-ia-rate-limit| psecure-violation| psp| security-violation| sfp-config-mismatch| storm-control| udld|
vmps}
Syntax Description
all
Enables the timer to recover from all error-disabled causes.
arp-inspection
Enables the timer to recover from the Address Resolution Protocol
(ARP) inspection error-disabled state.
bpduguard
Enables the timer to recover from the bridge protocol data unit
(BPDU) guard error-disabled state.
channel-misconfig
Enables the timer to recover from the EtherChannel misconfiguration
error-disabled state.
dhcp-rate-limit
Enables the timer to recover from the DHCP snooping error-disabled
state.
dtp-flap
Enables the timer to recover from the Dynamic Trunking Protocol
(DTP) flap error-disabled state.
gbic-invalid
Enables the timer to recover from an invalid Gigabit Interface
Converter (GBIC) module error-disabled state.
Note
inline-power
This error refers to an invalid small form-factor pluggable
(SFP) error-disabled state.
Enables the timer to recover from the Power over Ethernet (PoE)
error-disabled state.
This keyword is supported only on switches with PoE ports.
link-flap
Enables the timer to recover from the link-flap error-disabled state.
loopback
Enables the timer to recover from a loopback error-disabled state.
mac-limit
Enables the timer to recover from the mac limit error-disabled state.
pagp-flap
Enables the timer to recover from the Port Aggregation Protocol
(PAgP)-flap error-disabled state.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
148
errdisable recovery cause
port-mode-failure
Enables the timer to recover from the port mode change failure
error-disabled state.
pppoe-ia-rate-limit
Enables the timer to recover from the PPPoE IA rate limit
error-disabled state.
psecure-violation
Enables the timer to recover from a port security violation disable
state.
psp
Enables the timer to recover from the protocol storm protection (PSP)
error-disabled state.
security-violation
Enables the timer to recover from an IEEE 802.1x-violation disabled
state.
sfp-config-mismatch
Enables error detection on an SFP configuration mismatch.
storm-control
Enables the timer to recover from a storm control error.
udld
Enables the timer to recover from the UniDirectional Link Detection
(UDLD) error-disabled state.
vmps
Enables the timer to recover from the VLAN Membership Policy
Server (VMPS) error-disabled state.
Command Default
Recovery is disabled for all causes.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A cause (such as all or BDPU guard) is defined as the reason that the error-disabled state occurred. When a
cause is detected on an interface, the interface is placed in the error-disabled state, an operational state similar
to link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For
the BPDU guard and port-security features, you can configure the switch to shut down only the offending
VLAN on the port when a violation occurs, instead of shutting down the entire port.
If you do not enable the recovery for the cause, the interface stays in the error-disabled state until you enter
the shutdown and the no shutdown interface configuration commands. If you enable the recovery for a cause,
the interface is brought out of the error-disabled state and allowed to retry the operation again when all the
causes have timed out.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
149
errdisable recovery cause
Otherwise, you must enter the shutdown and then the no shutdown commands to manually recover an
interface from the error-disabled state.
You can verify your settings by entering the show errdisable recovery privileged EXEC command.
Examples
This example shows how to enable the recovery timer for the BPDU guard error-disabled cause:
Device(config)# errdisable recovery cause bpduguard
Related Commands
Command
Description
errdisable recovery interval
Specifies the time to recover from an error-disabled state.
show errdisable recovery
Displays the error-disabled recovery timer information.
show interfaces
Displays the administrative and operational status of all interfaces
or a specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
150
errdisable recovery interval
errdisable recovery interval
To specify the time to recover from an error-disabled state, use the errdisable recovery interval command
in global configuration mode. To return to the default setting, use the no form of this command.
errdisable recovery interval timer-interval
no errdisable recovery interval timer-interval
Syntax Description
timer-interval
Time to recover from the error-disabled state. The range is 30 to 86400 seconds.
The same interval is applied to all causes. The default interval is 300 seconds.
Command Default
The default recovery interval is 300 seconds.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The error-disabled recovery timer is initialized at a random differential from the configured interval value.
The difference between the actual timeout value and the configured value can be up to 15 percent of the
configured interval.
You can verify your settings by entering the show errdisable recovery privileged EXEC command.
Examples
This example shows how to set the timer to 500 seconds:
Device(config)# errdisable recovery interval 500
Related Commands
Command
Description
errdisable recovery cause
Enables the error-disabled mechanism to recover from a specific
cause.
show errdisable recovery
Displays the error-disabled recovery timer information.
show interfaces
Displays the administrative and operational status of all interfaces or
a specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
151
interface
interface
To configure an interface, use the interface command.
interface {Auto-Template Auto-Template interface-number| Capwap Capwap interface-number | Gigabit
Ethernet Gigabit Ethernet interface number| Group VI Group VI interface number Internal Interface
Internal Interface number Loopback Loopback interface number Null Null interface Port-channel interface
numberPort-channel interface number TenGigabit Ethernet interface number Tunnel interface number
Vlan interface number}
Syntax Description
Auto-Template Auto-template
interface-number
Enables you to configure auto-template interface. Values range
from 1 to 999.
Capwap Capwap interface number
Enables you to configure CAPWAP tunnel interface. Values
range from 0 to 2147483647.
GigabitEthernet Gigabit Ethernet interface Enables you to configure Gigabit Ethernet IEEE 802.3z
interface. Values range from 0 to 9.
number
Group VI Group VI interface number
Enables you to configure the internal interface. Values range
from 0 to 9.
Internal Interface Internal Interface
Enables you to configure internal interface.
Loopback Loopback Interface number
Enables you to configure loopback interface. Values range from
0 to 2147483647.
Null Null interface number
Enables you to configure null interface. Value is 0.
Port-channel interface number
Enables you to configure Ethernet channel interfaces. Values
range from 1 to 128.
TenGigabitEthernet interface number
Enables you to configure a 10-Gigabit Ethernet interface. Values
range from 0 to 9.
Tunnel interface number
Enables you to configure the tunnel interface. Values range
from 0 to 2147483647.
Vlan interface number
Enables you to configure switch VLAN interfaces. Values range
from 0 to 4098.
Command Default
None
Command Modes
Global configuration
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
152
interface
Command History
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
Usage Guidelines
You can not use the "no" form of this command.
Examples
This example shows how you can configure interface:
Device# interface Tunnel 15
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
153
interface range
interface range
To configure an interface range, use the interface range command.
interface range {Gigabit Ethernet interface-number | Loopback interface-number | Port Channel
interface-number | TenGigabit Ethernet interface-number Tunnel interface-number Vlan
interface-number Macro WORD}
Syntax Description
GigabitEthernet interface-number
Configures the Gigabit Ethernet IEEE 802.3z interface. Values
range from 1 to 9.
Loopback interface-number
Configures the loopback interface. Values range from 0 to
2147483647.
Port-Channel interface-number
Configures 10-Gigabit Ethernet channel of interfaces. Values
range from 1 to 128.
TenGigabit Ethernet interface-number Configures 10-Gigabit Ethernet interfaces. Values range from 0
to 9.
Tunnel interface-number
Configures the tunnel interface. Values range from 0 to
2147483647.
VLAN interface-number
Configures the switch VLAN interfaces. Values range from 1 to
4095.
Macro WORD
Configures the keywords to interfaces. Support up to 32 characters.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how you can configure interface range:
Device(config)# interface range vlan 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
154
ip mtu
ip mtu
To set the IP maximum transmission unit (MTU) size of routed packets on all routed ports of the switch or
switch stack, use the ip mtu command in interface configuration mode. To restore the default IP MTU size,
use the no form of this command.
ip mtu bytes
no ip mtu bytes
Syntax Description
bytes
MTU size, in bytes. The range is from 68 up to the system MTU value (in bytes).
Command Default
The default IP MTU size for frames received and sent on all switch interfaces is 1500 bytes.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The upper limit of the IP value is based on the switch or switch stack configuration and refers to the currently
applied system MTU value. For more information about setting the MTU sizes, see the system mtu global
configuration command.
To return to the default IP MTU setting, you can apply the default ip mtu command or the no ip mtu command
on the interface.
You can verify your setting by entering the show ip interface interface-id or show interfaces interface-id
privileged EXEC command.
Examples
The following example sets the maximum IP packet size for VLAN 200 to 1000 bytes:
Device(config)# interface vlan 200
Device(config-if)# ip mtu 1000
The following example sets the maximum IP packet size for VLAN 200 to the default setting of 1500 bytes:
Device(config)# interface vlan 200
Device(config-if)# default ip mtu
This is an example of partial output from the show ip interface interface-id command. It displays the current
IP MTU setting for the interface.
Device# show ip interface gigabitethernet4/0/1
GigabitEthernet4/0/1 is up, line protocol is up
Internet address is 18.0.0.1/24
Broadcast address is 255.255.255.255
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
155
ip mtu
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
<output truncated>
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
156
ipv6 mtu
ipv6 mtu
To set the IPv6 maximum transmission unit (MTU) size of routed packets on all routed ports of the switch or
switch stack, use the ipv6 mtu command in interface configuration mode. To restore the default IPv6 MTU
size, use the no form of this command.
ipv6 mtu bytes
no ipv6 mtu bytes
Syntax Description
bytes
MTU size, in bytes. The range is from 1280 up to the system MTU value (in bytes).
Command Default
The default IPv6 MTU size for frames received and sent on all switch interfaces is 1500 bytes.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The upper limit of the IPv6 MTU value is based on the switch or switch stack configuration and refers to the
currently applied system MTU value. For more information about setting the MTU sizes, see the system mtu
global configuration command.
To return to the default IPv6 MTU setting, you can apply the default ipv6 mtu command or the no ipv6 mtu
command on the interface.
You can verify your setting by entering the show ipv6 interface interface-id or show interface interface-id
privileged EXEC command.
Examples
The following example sets the maximum IPv6 packet size for an interface to 2000 bytes:
Device(config)# interface gigabitethernet4/0/1
Device(config-if)# ipv6 mtu 2000
The following example sets the maximum IPv6 packet size for an interface to the default setting of 1500 bytes:
Device(config)# interface gigabitethernet4/0/1
Device(config-if)# default ipv6 mtu
This is an example of partial output from the show ipv6 interface interface-id command. It displays the
current IPv6 MTU setting for the interface.
Device# show ipv6 interface gigabitethernet4/0/1
GigabitEthernet4/0/1 is up, line protocol is up
Internet address is 18.0.0.1/24
Broadcast address is 255.255.255.255
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
157
ipv6 mtu
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
<output truncated>
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
158
lldp (interface configuration)
lldp (interface configuration)
To enable Link Layer Discovery Protocol (LLDP) on an interface, use the lldp command in interface
configuration mode. To disable LLDP on an interface, use the no form of this command.
Syntax Description
med-tlv-select
Selects an LLDP Media Endpoint Discovery (MED) time-length-value
(TLV) element to send.
tlv
String that identifies the TLV element. Valid values are the following:
• inventory-management— LLDP MED Inventory Management
TLV.
• location— LLDP MED Location TLV.
• network-policy— LLDP MED Network Policy TLV.
receive
Enables the interface to receive LLDP transmissions.
tlv-select
Selects the LLDP TLVs to send.
power-management
Sends the LLDP Power Management TLV.
transmit
Enables LLDP transmission on the interface.
Command Default
LLDP is enabled on supported interfaces.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is supported on 802.1 media types.
If the interface is configured as a tunnel port, LLDP is automatically disabled.
Examples
The following example shows how to disable LLDP transmission on an interface:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# no lldp transmit
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
159
lldp (interface configuration)
The following example shows how to enable LLDP transmission on an interface:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# lldp transmit
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
160
logging event power-inline-status
logging event power-inline-status
To enable the logging of Power over Ethernet (PoE) events, use the logging event power-inline-status
command in interface configuration mode. To disable the logging of PoE status events, use the no form of
this command.
logging event power-inline-status
no logging event power-inline-status
Syntax Description
This command has no arguments or keywords.
Command Default
Logging of PoE events is enabled.
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The no form of this command does not disable PoE error events.
Examples
This example shows how to enable logging of PoE events on a port:
Device(config-if)# interface gigabitethernet1/0/1
Device(config-if)# logging event power-inline-status
Device(config-if)#
Related Commands
Command
Description
power inline
Configures the power management mode on PoE ports.
show power inline
Displays the PoE status for the specified PoE port, the specified stack
member, or for all PoE ports in the switch stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
161
mdix auto
mdix auto
To enable the automatic medium-dependent interface crossover (auto-MDIX) feature on the interface, use
the mdix auto command in interface configuration mode. To disable auto-MDIX, use the no form of this
command.
mdix auto
no mdix auto
Syntax Description
This command has no arguments or keywords.
Command Default
Auto-MDIX is enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
When auto-MDIX is enabled, the interface automatically detects the required cable connection type
(straight-through or crossover) and configures the connection appropriately.
When you enable auto-MDIX on an interface, you must also set the interface speed and duplex to auto so
that the feature operates correctly.
When auto-MDIX (and autonegotiation of speed and duplex) is enabled on one or both of the connected
interfaces, link up occurs, even if the cable type (straight-through or crossover) is incorrect.
Auto-MDIX is supported on all 10/100 and 10/100/1000 Mb/s interfaces and on 10/100/1000BASE-TX small
form-factor pluggable (SFP) module interfaces. It is not supported on 1000BASE-SX or -LX SFP module
interfaces.
You can verify the operational state of auto-MDIX on the interface by entering the show controllers
ethernet-controller interface-id phy privileged EXEC command.
Examples
This example shows how to enable auto-MDIX on a port:
Device# configure terminal
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# speed auto
Device(config-if)# duplex auto
Device(config-if)# mdix auto
Device(config-if)# end
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
162
mdix auto
Related Commands
Command
Description
show controllers ethernet-controller
Displays per-interface send and receive statistics read from the
hardware with keywords.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
163
mode (power-stack configuration)
mode (power-stack configuration)
To configure power stack mode for the power stack, use the mode command in power-stack configuration
mode. To return to the default settings, use the no form of the command.
mode {power-shared| redundant} [strict]
no mode
Syntax Description
power-shared
Sets the power stack to operate in power-shared mode. This is the default.
redundant
Sets the power stack to operate in redundant mode. The largest power supply
is removed from the power pool to be used as backup power in case one of
the other power supplies fails.
strict
(Optional) Configures the power stack mode to run a strict power budget.
The stack power needs cannot exceed the available power.
Command Default
The default modes are power-shared and nonstrict.
Command Modes
Power-stack configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is available only on switch stacks running the IP Base or IP Services feature set.
To access power-stack configuration mode, enter the stack-power stack power stack name global configuration
command.
Entering the no mode command sets the switch to the defaults of power-shared and non-strict mode.
Note
For stack power, available power is the total power available for PoE from all power supplies in the power
stack, available power is the power allocated to all powered devices connected to PoE ports in the stack,
and consumed power is the actual power consumed by the powered devices.
In power-shared mode, all of the input power can be used for loads, and the total available power appears
as one large power supply. The power budget includes all power from all supplies. No power is set aside for
power supply failures. If a power supply fails, load shedding (shutting down of powered devices or switches)
might occur.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
164
mode (power-stack configuration)
In redundant mode, the largest power supply is removed from the power pool to use as backup power in case
one of the other power supplies fails. The available power budget is the total power minus the largest power
supply. This reduces the available power in the pool for switches and powered devices, but in case of a failure
or an extreme power load, there is less chance of having to shut down switches or powered devices.
In strict mode, when a power supply fails and the available power drops below the budgeted power, the system
balances the budget through load shedding of powered devices, even if the actual power is less than the
available power. In nonstrict mode, the power stack can run in an over-allocated state and is stable as long as
the actual power does not exceed the available power. In this mode, a powered device drawing more than
normal power could cause the power stack to start shedding loads. This is normally not a problem because
most devices do not run at full power. The chances of multiple powered devices in the stack requiring maximum
power at the same time is small.
In both strict and nonstrict modes, power is denied when there is no power available in the power budget.
Examples
This is an example of setting the power stack mode for the stack named power1 to power-shared with strict
power budgeting. All power in the stack is shared, but when the total available power is allotted, no more
devices are allowed power.
Device(config)# stack-power stack power1
Device(config-stackpower)# mode power-shared strict
Device(config-stackpower)# exit
This is an example of setting the power stack mode for the stack named power2 to redundant. The largest
power supply in the stack is removed from the power pool to provide redundancy in case one of the other
supplies fails.
Device(config)# stack-power stack power2
Device(config-stackpower)# mode redundant
Device(config-stackpower)# exit
Related Commands
Command
Description
stack-power
Configures StackPower parameters for the power stack or for a switch in
the power stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
165
network-policy
network-policy
To apply a network-policy profile to an interface, use the network-policy command in interface configuration
mode. To remove the policy, use the no form of this command.
network-policy profile-number
no network-policy
Syntax Description
profile-number
The network-policy profile number to apply to the interface.
Command Default
No network-policy profiles are applied.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile number interface configuration command to apply a profile to an interface.
You cannot apply the switchport voice vlan command on an interface if you first configure a network-policy
profile on it. However, if switchport voice vlan vlan-id is already configured on the interface, you can apply
a network-policy profile on the interface. The interface then has the voice or voice-signaling VLAN
network-policy profile applied.
Examples
This example shows how to apply network-policy profile 60 to an interface:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# network-policy 60
Related Commands
Command
Description
network-policy profile (global configuration)
Creates a network-policy profile and enters network-policy
configuration mode.
show network-policy profile
Displays the network-policy profiles.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
166
network-policy profile (global configuration)
network-policy profile (global configuration)
To create a network-policy profile and to enter network-policy configuration mode, use the network-policy
profile command in global configuration mode. To delete the policy and to return to global configuration
mode, use the no form of this command.
network-policy profile profile-number
no network-policy profile profile-number
Syntax Description
profile-number
Network-policy profile number. The range is 1 to 4294967295.
Command Default
No network-policy profiles are defined.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile global configuration command to create a profile and to enter network-policy
profile configuration mode.
To return to privileged EXEC mode from the network-policy profile configuration mode, enter the exit
command.
When you are in network-policy profile configuration mode, you can create the profile for voice and voice
signaling by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP),
and tagging mode.
These profile attributes are contained in the Link Layer Discovery Protocol for Media Endpoint Devices
(LLDP-MED) network-policy time-length-value (TLV).
Examples
This example shows how to create network-policy profile 60:
Device(config)# network-policy profile 60
Device(config-network-policy)#
Related Commands
Command
Description
network-policy
Applies a network-policy profile to an interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
167
network-policy profile (global configuration)
Command
Description
show network-policy profile
Displays the network-policy profiles.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
168
nmsp attachment suppress
nmsp attachment suppress
To suppress the reporting of attachment information from a specified interface, use the nmsp attachment
suppress command in interface configuration mode. To return to the default setting, use the no form of this
command.
nmsp attachment suppress
no nmsp attachment suppress
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use the nmsp attachment suppress interface configuration command to configure an interface to not send
location and attachment notifications to a Cisco Mobility Services Engine (MSE).
Examples
This example shows how to configure an interface to not send attachment information to the MSE:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# nmsp attachment suppress
Related Commands
Command
Description
show nmsp
Displays the NMSP information for the switch.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
169
power efficient-ethernet auto
power efficient-ethernet auto
To enable Energy Efficient Ethernet (EEE) for an interface, use the power efficient-ethernet auto command
in interface configuration mode. To disable EEE on an interface, use the no form of this command.
power efficient-ethernet auto
no power efficient-ethernet auto
Syntax Description
This command has no arguments or keywords.
Command Default
EEE is disabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can enable EEE on devices that support low power idle (LPI) mode. Such devices can save power by
entering LPI mode during periods of low utilization. In LPI mode, systems on both ends of the link can save
power by shutting down certain services. EEE provides the protocol needed to transition into and out of LPI
mode in a way that is transparent to upper layer protocols and applications.
The power efficient-ethernet auto command is available only if the interface is EEE capable. To check if
an interface is EEE capable, use the show eee capabilities EXEC command.
When EEE is enabled, the device advertises and autonegotiates EEE to its link partner. To view the current
EEE status for an interface, use the show eee status EXEC command.
This command does not require a license.
Examples
This example shows how to enable EEE for an interface:
Device(config-if)# power efficient-ethernet auto
Device(config-if)#
This example shows how to disable EEE for an interface:
Device(config-if)# no power efficient-ethernet auto
Device(config-if)#
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
170
power-priority
power-priority
To configure Cisco StackPower power-priority values for a switch in a power stack and for its high-priority
and low-priority PoE ports, use the power-priority command in switch stack-power configuration mode. To
return to the default setting, use the no form of the command.
power-priority {high value| low value| switch value}
no power-priority {high| low| switch}
Syntax Description
Command Default
high value
Sets the power priority for the ports configured as high-priority ports. The range is 1
to 27, with 1 as the highest priority. The high value must be lower than the value set
for the low-priority ports and higher than the value set for the switch.
low value
Sets the power priority for the ports configured as low-priority ports. The range is 1
to 27. The low value must be higher than the value set for the high-priority ports and
the value set for the switch.
switch value
Sets the power priority for the switch. The range is 1 to 27. The switch value must be
lower than the values set for the low and high-priority ports.
If no values are configured, the power stack randomly determines a default priority.
The default ranges are 1 to 9 for switches, 10 to 18 for high-priority ports, 19 to 27 for low-priority ports.
On non-PoE switches, the high and low values (for port priority) have no effect.
Command Modes
Command History
Usage Guidelines
Switch stack-power configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
To access switch stack-power configuration mode, enter the stack-power switch switch-number global
configuration command.
Cisco StackPower power-priority values determine the order for shutting down switches and ports when power
is lost and load shedding must occur. Priority values are from 1 to 27; the highest numbers are shut down first.
We recommend that you configure different priority values for each switch and for its high priority ports and
low priority ports to limit the number of devices shut down at one time during a loss of power. If you try to
configure the same priority value on different switches in a power stack, the configuration is allowed, but you
receive a warning message.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
171
power-priority
Note
Examples
This command is available only on switch stacks running the IP Base or IP Services feature set.
This is an example of setting the power priority for switch 1 in power stack a to 7, for the high-priority ports
to 11, and for the low-priority ports to 20.
Device(config)# stack-power switch 1
Device(config-switch-stackpower)# stack-id power_stack_a
Device(config-switch-stackpower)# power-priority high 11
Device(config-switch-stackpower)# power-priority low 20
Device(config-switch-stackpower)# power-priority switch 7
Device(config-switch-stackpower)# exit
Related Commands
Command
Description
show stack-power
Displays information about StackPower stacks or switches in a power
stack.
stack-power
Configures StackPower parameters for the power stack or for a switch in
the power stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
172
power inline
power inline
To configure the power management mode on Power over Ethernet (PoE) ports, use the power inline command
in interface configuration mode. To return to the default settings, use the no form of this command.
power inline {auto [max max-wattage]| never| port priority {high | low} | static [max max-wattage]}
no power inline {auto| never| port priority {high | low}| static [max max-wattage]}
Syntax Description
Command Default
auto
Enables powered-device detection.
If enough power is available,
automatically allocates power to
the PoE port after device detection.
Allocation is first-come, first-serve.
max max-wattage
(Optional) Limits the power
allowed on the port. The range is
4000 to 30000 mW. If no value is
specified, the maximum is allowed.
never
Disables device detection, and
disables power to the port.
port
Configures the power priority of
the port. The default priority is low.
priority {high|low}
Sets the power priority of the port.
In case of a power supply failure,
ports configured as low priority are
turned off first and ports configured
as high priority are turned off last.
The default priority is low.
static
Enables powered-device detection.
Pre-allocates (reserves) power for
a port before the switch discovers
the powered device. This action
guarantees that the device
connected to the interface receives
enough power.
The default is auto (enabled).
The maximum wattage is 30,000 mW.
The default port priority is low.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
173
power inline
Command Default
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is supported only on PoE-capable ports. If you enter this command on a port that does not
support PoE, this error message appears:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# power inline auto
^
% Invalid input detected at '^' marker.
In a switch stack, this command is supported on all ports in the stack that support PoE.
Use the max max-wattage option to disallow higher-power powered devices. With this configuration, when
the powered device sends Cisco Discovery Protocol (CDP) messages requesting more power than the maximum
wattage, the switch removes power from the port. If the powered-device IEEE class maximum is greater than
the maximum wattage, the switch does not power the device. The power is reclaimed into the global power
budget.
Note
The switch never powers any class 0 or class 3 device if the power inline max max-wattage command
is configured for less than 30 W.
If the switch denies power to a powered device (the powered device requests more power through CDP
messages or if the IEEE class maximum is greater than the maximum wattage), the PoE port is in a power-deny
state. The switch generates a system message, and the Oper column in the show power inline privileged
EXEC command output shows power-deny.
Use the power inline static max max-wattage command to give a port high priority. The switch allocates
PoE to a port configured in static mode before allocating power to a port configured in auto mode. The switch
reserves power for the static port when it is configured rather than upon device discovery. The switch reserves
the power on a static port even when there is no connected device and whether or not the port is in a shutdown
or in a no shutdown state. The switch allocates the configured maximum wattage to the port, and the amount
is never adjusted through the IEEE class or by CDP messages from the powered device. Because power is
pre-allocated, any powered device that uses less than or equal to the maximum wattage is guaranteed power
when it is connected to a static port. However, if the powered device IEEE class is greater than the maximum
wattage, the switch does not supply power to it. If the switch learns through CDP messages that the powered
device needs more than the maximum wattage, the powered device is shut down.
If the switch cannot pre-allocate power when a port is in static mode (for example, because the entire power
budget is already allocated to other auto or static ports), this message appears: Command rejected: power
inline static: pwr not available. The port configuration remains unchanged.
When you configure a port by using the power inline auto or the power inline static interface configuration
command, the port autonegotiates by using the configured speed and duplex settings. This is necessary to
determine the power requirements of the connected device (whether or not it is a powered device). After the
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
174
power inline
power requirements have been determined, the switch hardcodes the interface by using the configured speed
and duplex settings without resetting the interface.
When you configure a port by using the power inline never command, the port reverts to the configured
speed and duplex settings.
If a port has a Cisco powered device connected to it, you should not use the power inline never command
to configure the port. A false link-up can occur, placing the port in an error-disabled state.
Use the power inline port priority {high | low} command to configure the power priority of a PoE port.
Powered devices connected to ports with low port priority are shut down first in case of a power shortage.
You can verify your settings by entering the show power inline EXEC command.
Examples
This example shows how to enable detection of a powered device and to automatically power a PoE port on
a switch:
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# power inline auto
This example shows how to configure a PoE port on a switch to allow a class 1 or a class 2 powered device:
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# power inline auto max 7000
This example shows how to disable powered-device detection and to not power a PoE port on a switch:
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# power inline never
This example shows how to set the priority of a port to high, so that it would be one of the last ports to be
shut down in case of power supply failure:
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# power inline port priority high
Related Commands
Command
Description
logging event power-inline-status
Enables the logging of PoE events.
show power inline
Displays the PoE status for the specified PoE port, the specified
stack member, or for all PoE ports in the switch stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
175
power inline police
power inline police
To enable policing of real-time power consumption on a powered device, use the power inline police command
in interface configuration mode. To disable this feature, use the no form of this command
power inline police [action {errdisable| log}]
no power inline police
Syntax Description
action errdisable
(Optional) Configures the device to turn off power to the port if the real-time power
consumption exceeds the maximum power allocation on the port. This is the default
action.
action log
(Optional) Configures the device to generate a syslog message while still providing
power to a connected device if the real-time power consumption exceeds the
maximum power allocation on the port.
Command Default
Policing of the real-time power consumption of the powered device is disabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is supported only on the LAN Base image.
This command is supported only on Power over Ethernet (PoE)-capable ports. If you enter this command on
a device or port that does not support PoE, an error message appears.
In a switch stack, this command is supported on all switches or ports in the stack that support PoE and real-time
power-consumption monitoring.
When policing of the real-time power consumption is enabled, the device takes action when a powered device
consumes more power than the allocated maximum amount.
When PoE is enabled, the device senses the real-time power consumption of the powered device. This feature
is called power monitoring or power sensing. The device also polices the power usage with the power policing
feature.
When power policing is enabled, the device uses one of the these values as the cutoff power on the PoE port
in this order:
1 The user-defined power level that limits the power allowed on the port when you enter the power inline
auto max max-wattage or the power inline static max max-wattage interface configuration command
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
176
power inline police
2 The device automatically sets the power usage of the device by using CDP power negotiation or by the
IEEE classification and LLPD power negotiation.
If you do not manually configure the cutoff-power value, the device automatically determines it by using CDP
power negotiation or the device IEEE classification and LLDP power negotiation. If CDP or LLDP are not
enabled, the default value of 30 W is applied. However without CDP or LLDP, the device does not allow
devices to consume more than 15.4 W of power because values from 15400 to 30000 mW are only allocated
based on CDP or LLDP requests. If a powered device consumes more than 15.4 W without CDP or LLDP
negotiation, the device might be in violation of the maximum current Imax limitation and might experience
an Icut fault for drawing more current than the maximum. The port remains in the fault state for a time before
attempting to power on again. If the port continuously draws more than 15.4 W, the cycle repeats.
When a powered device connected to a PoE+ port restarts and sends a CDP or LLDP packet with a power
TLV, the device locks to the power-negotiation protocol of that first packet and does not respond to power
requests from the other protocol. For example, if the device is locked to CDP, it does not provide power to
devices that send LLDP requests. If CDP is disabled after the device has locked on it, the device does not
respond to LLDP power requests and can no longer power on any accessories. In this case, you should restart
the powered device.
If power policing is enabled, the device polices power usage by comparing the real-time power consumption
to the maximum power allocated on the PoE port. If the device uses more than the maximum power allocation
(or cutoff power) on the port, the device either turns power off to the port, or the device generates a syslog
message and updates the LEDs (the port LEDs are blinking amber) while still providing power to the device.
• To configure the device to turn off power to the port and put the port in the error-disabled state, use the
power inline police interface configuration command.
• To configure the device to generate a syslog message while still providing power to the device, use the
power inline police action log command.
If you do not enter the action log keywords, the default action is to shut down the port, turn off power to it,
and put the port in the PoE error-disabled state. To configure the PoE port to automatically recover from the
error-disabled state, use the errdisable detect cause inline-power global configuration command to enable
error-disabled detection for the PoE cause and the errdisable recovery cause inline-power interval interval
global configuration command to enable the recovery timer for the PoE error-disabled cause.
Caution
If policing is disabled, no action occurs when the powered device consumes more than the maximum
power allocation on the port, which could adversely affect the device.
You can verify your settings by entering the show power inline police privileged EXEC command.
Examples
This example shows how to enable policing of the power consumption and configuring the device to generate
a syslog message on the PoE port on a device:
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# power inline police action log
Related Commands
Command
Description
power inline
Configures the power management mode on PoE ports.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
177
power inline police
Command
Description
show power inline
Displays the PoE status for the specified PoE port, the specified stack
member, or for all PoE ports in the switch stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
178
power supply
power supply
To configure and manage the internal power supplies on a switch, use the power supply command in privileged
EXEC mode.
power supply stack-member-number slot {A| B} {off| on}
Syntax Description
stack-member-number
Stack member number for which to configure the internal power
supplies. The range is 1 to 9, depending on the number of switches
in the stack.
This parameter is available only on stacking-capable switches.
slot
Selects the switch power supply to set.
A
Selects the power supply in slot A.
B
Selects the power supply in slot B.
Note
off
Sets the switch power supply to off.
on
Sets the switch power supply to on.
Command Default
The switch power supply is on.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Power supply slot B is the closest slot to the outer edge
of the switch.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The power supply command applies to a switch or to a switch stack where all switches are the same platform.
In a switch stack with the same platform switches, you must specify the stack member before entering the
slot {A | B} off or on keywords.
To return to the default setting, use the power supply stack-member-number on command.
You can verify your settings by entering the show env power privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
179
power supply
Examples
This example shows how to set the power supply in slot A to off:
Device> power supply 2 slot A off
Disabling Power supply A may result in a power loss to PoE devices and/or switches ...
Continue? (yes/[no]): yes
Device
Jun 10 04:52:54.389: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered off
Jun 10 04:52:56.717: %PLATFORM_ENV-1-FAN_NOT_PRESENT: Fan is not present
This example shows how to set the power supply in slot A to on:
Device> power supply 1 slot B on
Jun 10 04:54:39.600: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered on
This example shows the output of the show env power command:
Device> show env power
SW PID
-- -----------------1A PWR-1RUC2-640WAC
1B Not Present
Serial#
Status
---------- --------------DCB1705B05B OK
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
180
Sys Pwr
------Good
PoE Pwr
------Good
Watts
----250/390
show CAPWAP summary
show CAPWAP summary
To display all the CAPWAP tunnels established by the controller to access points and other mobility controllers
use the show CAPWAP summary command.
show CAPWAP summary
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to display CAPWAP tunnels established by the controllers to the access points and
other controllers.
Device# show capwap summary
CAPWAP Tunnels General Statistics:
Number of Capwap Data Tunnels = 8
Number of Capwap Mobility Tunnels = 0
Number of Capwap Multicast Tunnels = 0
Name APName Type PhyPortIf Mode McastIf
------ -------------------------------- ---- --------- --------------Ca4 AP-Behind-Router data - unicast Ca0 AP1142-kat data - unicast Ca5 APRFCHAMBER2-EDISON data - unicast Ca6 KATANA_2_RF data - unicast Ca1 AP-1040-RF data - unicast Ca7 KATANA_1_RF data - unicast Ca2 AP3500-2027 data - unicast Ca3 AP-1040-out data - unicast -
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
181
show controllers cpu-interface
show controllers cpu-interface
To display the state of the CPU network interface ASIC and the send and receive statistics for packets reaching
the CPU, use the show controllers cpu-interface command in privileged EXEC mode.
show controllers cpu-interface [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
(Optional) Specifies the stack member number.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives
troubleshooting the switch.
Examples
This is a partial output example from the show controllers cpu-interface command:
Device# show controllers cpu-interface switch 1
cpu-queue-frames retrieved dropped invalid hol-block
----------------
--------- ------- ------- ---------
Routing Protocol
0
L2 Protocol
241567
sw forwarding
0
broadcast
68355
icmp
0
icmp redirect
0
logging
0
rpf-fail
0
DOT1X authentication 328174
Forus Traffic
0
Forus Resolution
0
Wireless q5
0
Wireless q1
0
Wireless q2
0
Wireless q3
0
Wireless q4
0
Learning cache
0
Topology control
820408
Proto snooping
0
BFD Low latency
0
Transit Traffic
0
Multi End station
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
182
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
show controllers cpu-interface
Health Check
Crypto control
Exception
General Punt
NFL sampled data
STG cache
EGR exception
show forward
Multicast data
Gold packet
Related Commands
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Command
Description
show controllers ethernet-controller
Displays per-interface send and receive statistics read from the
hardware with keywords.
show interfaces
Displays the administrative and operational status of all interfaces or
a specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
183
show controllers ethernet-controller
show controllers ethernet-controller
To display per-interface send and receive statistics read from the hardware with keywords, use the show
controllers ethernet-controller command in EXEC mode.
show controllers ethernet-controller [interface-id] [down-when-looped| phy [detail]] [port-asic statistics
{exceptions| interface interface-id {l2| l3}| l3-ifid if-id| port-ifid if-id| vlan-ifid if-id} [switch
stack-member-number] [asic asic-number]]
Syntax Description
interface-id
(Optional) ID of the physical interface.
down-when-looped
(Optional) Displays states related to down-when-looped detection.
phy
(Optional) Displays the status of the internal registers on the switch physical
layer device (PHY) for the device or the interface. This display includes the
operational state of the automatic medium-dependent interface crossover
(auto-MDIX) feature on an interface.
detail
(Optional) Displays details about the PHY internal registers.
port-asic
(Optional) Displays information about the port ASIC internal registers.
statistics
Displays port ASIC statistics, including the Rx/Sup Queue and miscellaneous
statistics.
exceptions
Displays port ASIC exception statistics.
interface interface-id
Specifies the interface for which to display port ASIC statistics.
l2
Displays statistics for the Layer 2 interface.
l3
Displays statistics for the Layer 3 interface.
l3-ifid if-id
Specifies the Layer 3 IF interface ID for which to display port ASIC
statistics.
port-ifid if-id
Specifies the PortIF interface ID for which to display port ASIC statistics.
vlan-ifid if-id
Specifies the VLANIF interface ID for which to display port ASIC statistics.
switch stack-member-number (Optional) Specifies the stack member number for which to display send
and receive statistics.
asic asic-number
Command Modes
(Optional) Specifies the ASIC number.
User EXEC (only supported with the interface-id keywords in user EXEC mode)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
184
show controllers ethernet-controller
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Without keywords, this command provides the RMON statistics for all interfaces or for the specified interface.
To display the interface internal registers, use the phy keyword. To display information about the port ASIC,
use the port-asic keyword.
When you enter the phy or port-asic keywords, the displayed information is useful primarily for Cisco
technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers ethernet-controller command for an interface:
Device# show controllers ethernet-controller gigabitethernet1/0/1
Transmit
GigabitEthernet1/0/1
Receive
19216827 Total bytes
0 Total bytes
41935 Unicast frames
0 Unicast frames
2683840 Unicast bytes
0 Unicast bytes
216662 Multicast frames
0 Multicast frames
16532987 Multicast bytes
0 Multicast bytes
0 Broadcast frames
0 Broadcast frames
0 Broadcast bytes
0 Broadcast bytes
0 System FCS error frames
0 IpgViolation frames
0 MacUnderrun frames
0 MacOverrun frames
0 Pause frames
0 Pause frames
0 Cos 0 Pause frames
0 Cos 0 Pause frames
0 Cos 1 Pause frames
0 Cos 1 Pause frames
0 Cos 2 Pause frames
0 Cos 2 Pause frames
0 Cos 3 Pause frames
0 Cos 3 Pause frames
0 Cos 4 Pause frames
0 Cos 4 Pause frames
0 Cos 5 Pause frames
0 Cos 5 Pause frames
0 Cos 6 Pause frames
0 Cos 6 Pause frames
0 Cos 7 Pause frames
0 Cos 7 Pause frames
0 Oam frames
0 OamProcessed frames
0 Oam frames
0 OamDropped frames
251598 Minimum size frames
0 Minimum size frames
0 65 to 127 byte frames
0 65 to 127 byte frames
0 128 to 255 byte frames
0 128 to 255 byte frames
6999 256 to 511 byte frames
0 256 to 511 byte frames
0 512 to 1023 byte frames
0 512 to 1023 byte frames
0 1024 to 1518 byte frames
0 1024 to 1518 byte frames
0 1519 to 2047 byte frames
0 1519 to 2047 byte frames
0 2048 to 4095 byte frames
0 2048 to 4095 byte frames
0 4096 to 8191 byte frames
0 4096 to 8191 byte frames
0 8192 to 16383 byte frames
0 8192 to 16383 byte frames
0 16384 to 32767 byte frame
0 16384 to 32767 byte frame
0 > 32768 byte frames
0 > 32768 byte frames
0 Late collision frames
0 SymbolErr frames
0 Excess Defer frames
0 Collision fragments
0 Good (1 coll) frames
0 ValidUnderSize frames
0 Good (>1 coll) frames
0 InvalidOverSize frames
0 Deferred frames
0 ValidOverSize frames
0 Gold frames dropped
0 FcsErr frames
0 Gold frames truncated
0 Gold frames successful
0 1 collision frames
0 2 collision frames
0 3 collision frames
0 4 collision frames
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
185
show controllers ethernet-controller
0
0
0
0
0
0
0
0
0
0
0
0
5 collision frames
6 collision frames
7 collision frames
8 collision frames
9 collision frames
10 collision frames
11 collision frames
12 collision frames
13 collision frames
14 collision frames
15 collision frames
Excess collision frames
LAST UPDATE 850 msecs AGO
Table 10: Transmit Field Descriptions
Field
Description
Total bytes
The total number of bytes sent on an interface.
Unicast Frames
The total number of frames sent to unicast addresses.
Unicast bytes
The total number of bytes sent to unicast addresses.
Multicast frames
The total number of frames sent to multicast addresses.
Multicast bytes
The total number of bytes sent to multicast addresses.
Broadcast frames
The total number of frames sent to broadcast addresses.
Broadcast bytes
The total number of bytes sent to broadcast addresses.
System FCS error frames
The total number of frames that fail the Frame Check Sequence (FCS).
MacUnderrun frames
The total number of frames that have MAC Underrun errors.
Pause frames
The total number of pause frames sent on an interface.
Cos x Pause frames
The total number of class of service (CoS) x pause frames sent on an
interface.
Oam frames
The total number of Ethernet Operations, Administration, and Maintenance
(OAM) frames sent on an interface.
Minimum size frames
The number of frames that are the minimum allowed frame size.
65 to 127 byte frames
The total number of frames sent on an interface that are 65 to 127 bytes.
128 to 255 byte frames
The total number of frames sent on an interface that are 128 to 255 bytes.
256 to 511 byte frames
The total number of frames sent on an interface that are 256 to 511 bytes.
512 to 1023 byte frames
The total number of frames sent on an interface that are 512 to 1023 bytes.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
186
show controllers ethernet-controller
Field
Description
1024 to 1518 byte frames
The total number of frames sent on an interface that are 1024 to 1518 bytes.
1519 to 2047 byte frames
The total number of frames sent on an interface that are 1519 to 2047 bytes.
2048 to 4095 byte frames
The total number of frames sent on an interface that are 2048 to 4095 bytes.
4096 to 8191 byte frames
The total number of frames sent on an interface that are 4096 to 8191 bytes.
8192 to 16383 byte frames
The total number of frames sent on an interface that are 8192 to 16383 bytes.
16384 to 32767 byte frames
The total number of frames sent on an interface that are 16384 to 32767
bytes.
> 32768 byte frames
The total number of frames sent on an interface that are greater than 32768
bytes.
Late collision frames
After a frame is sent, the number of frames dropped because late collisions
were detected while the frame was sent.
Excess defer frames
The number of frames that are not sent after the time exceeds the
maximum-packet time.
Good (1 coll) frames
The number of frames that are successfully sent on an interface after one
collision occurs. This value does not include the number of frames that are
not successfully sent after one collision occurs.
Good (>1 coll) frames
The number of frames that are successfully sent on an interface after more
than one collision occurs. This value does not include the number of frames
that are not successfully sent after more than one collision occurs.
Deferred frames
The number of frames that are not sent after the time exceeds
2*maximum-packet time.
Gold frames dropped
The number of gold frames that are dropped.
Gold frames truncated
The number of gold frames that are truncated.
Gold frames successful
The number of gold frames that are successful.
1 collision frames
The number of frames that are successfully sent on an interface after one
collision occurs.
2 collision frames
The number of frames that are successfully sent on an interface after two
collisions occur.
3 collision frames
The number of frames that are successfully sent on an interface after three
collisions occur.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
187
show controllers ethernet-controller
Field
Description
4 collision frames
The number of frames that are successfully sent on an interface after four
collisions occur.
5 collision frames
The number of frames that are successfully sent on an interface after five
collisions occur.
6 collision frames
The number of frames that are successfully sent on an interface after six
collisions occur.
7 collision frames
The number of frames that are successfully sent on an interface after seven
collisions occur.
8 collision frames
The number of frames that are successfully sent on an interface after eight
collisions occur.
9 collision frames
The number of frames that are successfully sent on an interface after nine
collisions occur.
10 collision frames
The number of frames that are successfully sent on an interface after ten
collisions occur.
11 collision frames
The number of frames that are successfully sent on an interface after 11
collisions occur.
12 collision frames
The number of frames that are successfully sent on an interface after 12
collisions occur.
13 collision frames
The number of frames that are successfully sent on an interface after 13
collisions occur.
14 collision frames
The number of frames that are successfully sent on an interface after 14
collisions occur.
15 collision frames
The number of frames that are successfully sent on an interface after 15
collisions occur.
Excess collisions
The number of frames that could not be sent on an interface after 16
collisions occur.
Table 11: Transmit Field Descriptions
Field
Description
Bytes
The total number of bytes sent on an interface.
Unicast Frames
The total number of frames sent to unicast addresses.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
188
show controllers ethernet-controller
Field
Description
Multicast frames
The total number of frames sent to multicast
addresses.
Broadcast frames
The total number of frames sent to broadcast
addresses.
Too old frames
The number of frames dropped on the egress port
because the packet aged out.
Deferred frames
The number of frames that are not sent after the time
exceeds 2*maximum-packet time.
MTU exceeded frames
The number of frames that are larger than the
maximum allowed frame size.
1 collision frames
The number of frames that are successfully sent on
an interface after one collision occurs.
2 collision frames
The number of frames that are successfully sent on
an interface after two collisions occur.
3 collision frames
The number of frames that are successfully sent on
an interface after three collisions occur.
4 collision frames
The number of frames that are successfully sent on
an interface after four collisions occur.
5 collision frames
The number of frames that are successfully sent on
an interface after five collisions occur.
6 collision frames
The number of frames that are successfully sent on
an interface after six collisions occur.
7 collision frames
The number of frames that are successfully sent on
an interface after seven collisions occur.
8 collision frames
The number of frames that are successfully sent on
an interface after eight collisions occur.
9 collision frames
The number of frames that are successfully sent on
an interface after nine collisions occur.
10 collision frames
The number of frames that are successfully sent on
an interface after ten collisions occur.
11 collision frames
The number of frames that are successfully sent on
an interface after 11 collisions occur.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
189
show controllers ethernet-controller
Field
Description
12 collision frames
The number of frames that are successfully sent on
an interface after 12 collisions occur.
13 collision frames
The number of frames that are successfully sent on
an interface after 13 collisions occur.
14 collision frames
The number of frames that are successfully sent on
an interface after 14 collisions occur.
15 collision frames
The number of frames that are successfully sent on
an interface after 15 collisions occur.
Excessive collisions
The number of frames that could not be sent on an
interface after 16 collisions occur.
Late collisions
After a frame is sent, the number of frames dropped
because late collisions were detected while the frame
was sent.
VLAN discard frames
The number of frames dropped on an interface
because the CFI1 bit is set.
Excess defer frames
The number of frames that are not sent after the time
exceeds the maximum-packet time.
64 byte frames
The total number of frames sent on an interface that
are 64 bytes.
127 byte frames
The total number of frames sent on an interface that
are from 65 to 127 bytes.
255 byte frames
The total number of frames sent on an interface that
are from 128 to 255 bytes.
511 byte frames
The total number of frames sent on an interface that
are from 256 to 511 bytes.
1023 byte frames
The total number of frames sent on an interface that
are from 512 to 1023 bytes.
1518 byte frames
The total number of frames sent on an interface that
are from 1024 to 1518 bytes.
Too large frames
The number of frames sent on an interface that are
larger than the maximum allowed frame size.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
190
show controllers ethernet-controller
Field
Description
Good (1 coll) frames
The number of frames that are successfully sent on
an interface after one collision occurs. This value does
not include the number of frames that are not
successfully sent after one collision occurs.
1 CFI = Canonical Format Indicator
Table 12: Receive Field Descriptions
Field
Description
Total Bytes
The total amount of memory (in bytes) used by frames received on an
interface, including the FCS2 value and the incorrectly formed frames.
This value excludes the frame header bits.
Unicast frames
The total number of frames successfully received on the interface that
are directed to unicast addresses.
Unicast bytes
The total amount of memory (in bytes) used by unicast frames received
on an interface, including the FCS value and the incorrectly formed
frames. This value excludes the frame header bits.
Multicast frames
The total amount of memory (in bytes) used by multicast frames received
on an interface, including the FCS value and the incorrectly formed
frames. This value excludes the frame header bits.
Multicast bytes
The total number of bytes successfully received on the interface that are
directed to multicast addresses.
Broadcast frames
The total number of frames successfully received on an interface that are
directed to broadcast addresses.
Broadcast bytes
The total amount of memory (in bytes) used by broadcast frames received
on an interface, including the FCS value and the incorrectly formed
frames. This value excludes the frame header bits.
IpgViolation frames
The total number of frames with an interpacket gap (IPG) violation.
MacOverrun frames
The total number of frames with MacOverrun errors.
Pause frames
The total number of pause frames received on an interface.
Cos x Pause frames
The total number of class of service (CoS) x pause frames received on
an interface.
OamProcessed
The total number of Ethernet Operations, Administration, and
Maintenance (OAM) frames that are processed on an interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
191
show controllers ethernet-controller
Field
Description
OamDropped
The total number of Ethernet Operations, Administration, and
Maintenance (OAM) frames that are dropped on an interface.
Minimum size frames
The total number of frames that are the minimum frame size.
65 to 127 byte frames
The total number of frames that are from 65 to 127 bytes.
128 to 255 byte frames
The total number of frames that are from 128 to 255 bytes.
256 to 511 byte frames
The total number of frames that are from 256 to 511 bytes.
512 to 1023 byte frames
The total number of frames that are from 512 to 1023 bytes.
1024 to 1518 byte frames
The total number of frames that are from 1024 to 1518 bytes.
1519 to 2047 byte frames
The total number of frames that are from 1519 to 2047 bytes.
2048 to 4095 byte frames
The total number of frames that are from 2048 to 4095 bytes.
4096 to 8191 byte frames
The total number of frames that are from 4096 to 8191 bytes.
8192 to 16383 byte frames
The total number of frames that are from 8192 to 16383 bytes.
16384 to 32767 byte frames
The total number of frames that are from 16384 to 32767 bytes.
> 32768 byte frames
The total number of frames that are greater than 32768 bytes.
Symbol error frames
The number of frames received on an interface that have symbol errors.
Collision fragments
The number of collision fragments received on an interface.
Valid undersize frames
The number of frames received on an interface that are smaller than 64
bytes (or 68 bytes for VLAN-tagged frames) and that have valid FCS
values. The frame size includes the FCS bits but excludes the frame
header bits.
Invalid oversize frames
The number of frames received that were larger than maximum allowed
maximum transmission unit (MTU) size (including the FCS bits and
excluding the frame header) and that have either an FCS error or an
alignment error.
Valid oversize frames
The number of frames received on an interface that are larger than the
maximum allowed frame size and have valid FCS values. The frame size
includes the FCS value but does not include the VLAN tag.
FcsErr frames
The total number of frames received on an interface that have a valid
length (in bytes) but do not have the correct FCS values.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
192
show controllers ethernet-controller
2 FCS = frame check sequence
This is an example of output from the show controllers ethernet-controller phy command for a specific
interface:
Device# show controllers ethernet-controller gigabitethernet1/0/2 phy
Gi1/0/2 (gpn: 2, port-number: 2)
----------------------------------------------------------0000 : 1140 Control Register
: 0001 0001 0100 0000
0001 : 7949 Control STATUS
: 0111 1001 0100 1001
0002 : 0141 Phy ID 1
: 0000 0001 0100 0001
0003 : 0EE0 Phy ID 2
: 0000 1110 1110 0000
0004 : 03E1 Auto-Negotiation Advertisement
: 0000 0011 1110 0001
0005 : 0000 Auto-Negotiation Link Partner
: 0000 0000 0000 0000
0006 : 0004 Auto-Negotiation Expansion Reg
: 0000 0000 0000 0100
0007 : 2001 Next Page Transmit Register
: 0010 0000 0000 0001
0008 : 0000 Link Partner Next page Registe
: 0000 0000 0000 0000
0010 : 3B60 PHY Specific Control
: 0011 1011 0110 0000
0011 : 8010 PHY Specific Status
: 1000 0000 0001 0000
0012 : 6404 PHY Specific Interrupt Enable
: 0110 0100 0000 0100
0013 : 0000 PHY Specific Interrupt Status
: 0000 0000 0000 0000
Related Commands
Command
Description
show controllers cpu-interface
Displays the state of the CPU network interface ASIC and the send and
receive statistics for packets reaching the CPU.
show controllers cpu-interface
Displays the state of the CPU network interface ASIC and the send and
receive statistics for packets reaching the CPU.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
193
show controllers utilization
show controllers utilization
To display bandwidth utilization, use the show controllers utilization command in EXEC mode.
show controllers [interface-id] utilization
Syntax Description
interface-id
Command Default
None
Command Modes
User EXEC
(Optional) ID of the physical interface.
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show controllers utilization command:
Device> show controllers utilization
Port
Receive Utilization Transmit Utilization
Gi1/0/1
0
0
Gi1/0/2
0
0
Gi1/0/3
0
0
Gi1/0/4
0
0
Gi1/0/5
0
0
Gi1/0/6
0
0
Gi1/0/7
0
0
<output truncated>
Gi2/0/1
0
0
Gi2/0/2
0
0
<output truncated>
Total Ports : 48
Switch Receive Bandwidth Percentage Utilization : 0
Switch Transmit Bandwidth Percentage Utilization : 0
Average Switch Percentage Utilization : 0
This is an example of output from the show controllers utilization command on a specific port:
Device> show controllers gigabitethernet1/0/1 utilization
Receive Bandwidth Percentage Utilization
: 0
Transmit Bandwidth Percentage Utilization : 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
194
show controllers utilization
Table 13: Show controllers utilization Field Descriptions
Field
Description
Receive Bandwidth Percentage
Utilization
Displays the received bandwidth usage of the switch, which is the sum
of the received traffic on all the ports divided by the switch receive
capacity.
Transmit Bandwidth Percentage Displays the transmitted bandwidth usage of the switch, which is the sum
Utilization
of the transmitted traffic on all the ports divided it by the switch transmit
capacity.
Average Switch Percentage
Utilization
Displays the average of the transmitted and received bandwidth usage of
the switch.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
195
show eee
show eee
To display Energy Efficient Ethernet (EEE) information for an interface, use the show eee command in EXEC
mode.
show eee{capabilities| status}interfaceinterface-id
Syntax Description
capabilities
Displays EEE capabilities for the specified interface.
status
Displays EEE status information for the specified
interface.
interface interface-id
Specifies the interface for which to display EEE
capabilities or status information.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can enable EEE on devices that support low power idle (LPI) mode. Such devices can save power by
entering LPI mode during periods of low power utilization. In LPI mode, systems on both ends of the link
can save power by shutting down certain services. EEE provides the protocol needed to transition into and
out of LPI mode in a way that is transparent to upper layer protocols and applications.
To check if an interface is EEE capable, use the show eee capabilities command. You can enable EEE on an
interface that is EEE capable by using the power efficient-ethernet auto interface configuration command.
To view the EEE status, LPI status, and wake error count information for an interface, use the show eee status
command.
Examples
This is an example of output from the show eee capabilities command on an interface where EEE is enabled:
Device# show eee capabilities interface gigabitethernet1/0/1
Gi1/0/1
EEE(efficient-ethernet): yes (100-Tx and 1000T auto)
Link Partner
: yes (100-Tx and 1000T auto)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
196
show eee
This is an example of output from the show eee capabilities command on an interface where EEE is not
enabled:
Device# show eee capabilities interface gigabitethernet2/0/1
Gi2/0/1
EEE(efficient-ethernet): not enabled
Link Partner
: not enabled
This is an example of output from the show eee status command on an interface where EEE is enabled and
operational. The table that follows describes the fields in the display.
Device# show eee status interface
Gi1/0/4 is up
EEE(efficient-ethernet):
Rx LPI Status
:
Tx LPI Status
:
gigabitethernet1/0/4
Operational
Received
Received
This is an example of output from the show eee status command on an interface where EEE operational and
the ports are in low power save mode:
Device# show eee status interface
Gi1/0/3 is up
EEE(efficient-ethernet):
Rx LPI Status
:
Tx LPI Status
:
Wake Error Count
:
gigabitethernet1/0/3
Operational
Low Power
Low Power
0
This is an example of output from the show eee status command on an interface where EEE is not enabled
because a remote link partner is incompatible with EEE:
Device# show eee status interface
Gi1/0/3 is down
EEE(efficient-ethernet):
Rx LPI Status
:
Tx LPI Status
:
Wake Error Count
:
gigabitethernet1/0/3
Disagreed
None
None
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
197
show eee
Table 14: show eee status Field Descriptions
Field
Description
EEE (efficient-ethernet)
The EEE status for the interface. This field can have
any of the following values:
• N/A—The port is not capable of EEE.
• Disabled—The port EEE is disabled.
• Disagreed—The port EEE is not set because a
remote link partner might be incompatible with
EEE; either it is not EEE capable, or its EEE
setting is incompatible.
• Operational—The port EEE is enabled and
operating.
If the interface speed is configured as 10 Mbps, EEE
is disabled internally. When the interface speed moves
back to auto, 100 Mbps or 1000 Mbps, EEE becomes
active again.
Rx/Tx LPI Status
The Low Power Idle (LPI) status for the link partner.
These fields can have any of the following values:
• N/A—The port is not capable of EEE.
• Interrupted—The link partner is in the process
of moving to low power mode.
• Low Power—The link partner is in low power
mode.
• None— EEE is disabled or not capable at the
link partner side.
• Received—The link partner is in low power
mode and there is traffic activity.
If an interface is configured as half-duplex, the LPI
status is None, which means the interface cannot be
in low power mode until it is configured as full-duplex.
Wake Error Count
The number of PHY wake-up faults that have occurred.
A wake-up fault can occur when EEE is enabled and
the connection to the link partner is broken.
This information is useful for PHY debugging.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
198
show env
show env
To display fan, temperature, and power information, use the show env command in EXEC mode.
show env {all| fan| power [all| switch [stack-member-number]]| stack [stack-member-number] | temperature
[status]}
Syntax Description
all
Displays the fan and temperature environmental status and the status of
the internal power supplies.
fan
Displays the switch fan status.
power
Displays the internal power status of the active switch.
all
(Optional) Displays the status of all the internal power supplies in a
standalone switch when the command is entered on the switch, or in all
the stack members when the command is entered on the stack masteractive
switch.
switch
(Optional) Displays the status of the internal power supplies for each
switch in the stack or for the specified switch.
This keyword is available only on stacking-capable switches.
stack-member-number
(Optional) Number of the stack member for which to display the status
of the internal power supplies or the environmental status.
The range is 1 to 9.
stack
Displays all environmental status for each switch in the stack or for the
specified switch.
This keyword is available only on stacking-capable switches.
temperature
Displays the switch temperature status.
status
(Optional) Displays the switch internal temperature (not the external
temperature) and the threshold values.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
199
show env
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the show env EXEC command to display the information for the switch being accessed—a standalone
switch or the stack masteractive switch. Use this command with the stack and switch keywords to display
all information for the stack or for the specified stack member.
If you enter the show env temperature status command, the command output shows the switch temperature
state and the threshold level.
You can also use the show env temperature command to display the switch temperature status. The command
output shows the green and yellow states as OK and the red state as FAULTY. If you enter the show env all
command, the command output is the same as the show env temperature status command output.
Examples
This is an example of output from the show env all command:
Device>show env all
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is OK
FAN PS-2 is NOT PRESENT
Switch 1: SYSTEM TEMPERATURE is OK
SW PID
Serial#
Status
-- ------------------ ---------- --------------1A PWR-C2-250WAC
LIT16372A1M OK
1B Not Present
Sys Pwr
------Good
PoE Pwr
------Good
Watts
----250
This is an example of output from the show env fan command:
Device>show env fan
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is NOT PRESENT
FAN PS-2 is OK
This is an example of output from the show env power all command on the stack masteractive switch:
Device# show env power all
SW PID
Serial#
Status
-- ------------------ ---------- --------------1A PWR-C2-250WAC
LIT16372A1M OK
1B Not Present
Sys Pwr
------Good
PoE Pwr
------Good
Watts
----250
This is an example of output from the show env stack command on the stack masteractive switch:
Device> show env stack
SWITCH: 1
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is NOT PRESENT
FAN PS-2 is OK
Switch 1: SYSTEM TEMPERATURE is OK
Temperature Value: 28 Degree Celsius
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
200
show env
Temperature State: GREEN
Yellow Threshold : 41 Degree Celsius
Red Threshold
: 56 Degree Celsius
This example shows how to display the temperature value, state, and the threshold values on a standalone
switch. The table describes the temperature states in the command output.
Device> show env temperature
Temperature Value: 33 Degree
Temperature State: GREEN
Yellow Threshold : 65 Degree
Red Threshold
: 75 Degree
status
Celsius
Celsius
Celsius
Table 15: States in the show env temperature status Command Output
State
Description
Green
The switch temperature is in the normal operating
range.
Yellow
The temperature is in the warning range. You should
check the external temperature around the switch.
Red
The temperature is in the critical range. The switch
might not run properly if the temperature is in this
range.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
201
show errdisable detect
show errdisable detect
To display error-disabled detection status, use the show errdisable detect command in EXEC mode.
show errdisable detect
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A gbic-invalid error reason refers to an invalid small form-factor pluggable (SFP) module.
The error-disable reasons in the command output are listed in alphabetical order. The mode column shows
how error-disable is configured for each feature.
You can configure error-disabled detection in these modes:
• port mode—The entire physical port is error-disabled if a violation occurs.
• vlan mode—The VLAN is error-disabled if a violation occurs.
• port/vlan mode—The entire physical port is error-disabled on some ports and is per-VLAN error-disabled
on other ports.
Examples
This is an example of output from the show errdisable detect command:
Related Commands
Command
Description
show errdisable recovery
Displays the error-disabled recovery timer information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
202
show errdisable recovery
show errdisable recovery
To display the error-disabled recovery timer information, use the show errdisable recovery command in
EXEC mode.
show errdisable recovery
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Note
Examples
Related Commands
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A gbic-invalid error-disable reason refers to an invalid small form-factor pluggable (SFP) module interface.
Though visible in the output, the unicast-flood field is not valid.
This is an example of output from the show errdisable recovery command:
Command
Description
errdisable recovery cause
Enables the error-disabled mechanism to recover from a specific
cause.
errdisable recovery interval
Specifies the time to recover from an error-disabled state.
show errdisable detect
Displays error-disabled detection status.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
203
show interfaces
show interfaces
To display the administrative and operational status of all interfaces or for a specified interface, use the show
interfaces command in privileged EXEC mode.
show interfaces [interface-id| vlan vlan-id] [accounting| capabilities [module number]| debounce|
description| etherchannel| flowcontrol| pruning| stats| status [err-disabled]| trunk]
Syntax Description
interface-id
(Optional) ID of the interface. Valid interfaces include physical
ports (including type, stack member for stacking-capable switches,
module, and port number) and port channels. The port channel
range is 1 to 48.
vlan vlan-id
(Optional) VLAN identification. The range is 1 to 4094.
accounting
(Optional) Displays accounting information on the interface,
including active protocols and input and output packets and octets.
Note
The display shows only packets processed in software;
hardware-switched packets do not appear.
capabilities
(Optional) Displays the capabilities of all interfaces or the specified
interface, including the features and options that you can configure
on the interface. Though visible in the command line help, this
option is not available for VLAN IDs.
module number
(Optional) Displays capabilities of all interfaces on the switch or
specified stack member.
This option is not available if you entered a specific interface ID.
debounce
(Optional) Displays port debounce timer information for an
interface.
description
(Optional) Displays the administrative status and description set
for an interface.
etherchannel
(Optional) Displays interface EtherChannel information.
flowcontrol
(Optional) Displays interface flow control information.
mtu
(Optional) Displays the MTU for each interface or for the specified
interface.
pruning
(Optional) Displays trunk VTP pruning information for the
interface.
stats
(Optional) Displays the input and output packets by switching the
path for the interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
204
show interfaces
Note
status
(Optional) Displays the status of the interface. A status of
unsupported in the Type field means that a non-Cisco small
form-factor pluggable (SFP) module is inserted in the module slot.
err-disabled
(Optional) Displays interfaces in an error-disabled state.
trunk
(Optional) Displays interface trunk information. If you do not
specify an interface, only information for active trunking ports
appears.
Though visible in the command-line help strings, the crb, fair-queue, irb, mac-accounting, precedence,
random-detect, and rate-limit keywords are not supported.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The show interfaces capabilities command with different keywords has these results:
• Use the show interface capabilities module number command to display the capabilities of all interfaces
on that switch in the stack. If there is no switch with that module number in the stack, there is no output.
• Use the show interfaces interface-id capabilities to display the capabilities of the specified interface.
• Use the show interfaces capabilities (with no module number or interface ID) to display the capabilities
of all interfaces in the stack.
Examples
This is an example of output from the show interfaces command for an interface on stack member 3:
Device# show interfaces gigabitethernet3/0/2
GigabitEthernet3/0/2 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is 2037.064d.4381 (bia 2037.064d.4381)
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Auto-duplex, Auto-speed, media type is 10/100/1000BaseTX
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
205
show interfaces
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts (0 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 input packets with dribble condition detected
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
This is an example of output from the show interfaces accounting command:
This is an example of output from the show interfaces capabilities command for an interface:
This is an example of output from the show interfaces interface description command when the interface
has been described as Connects to Marketing by using the description interface configuration command:
Device# show interfaces gigabitethernet1/0/2 description
Interface
Status
Protocol Description
Gi1/0/2
up
down
Connects to Marketing
This is an example of output from the show interfaces etherchannel command when port channels are
configured on the switch:
Device# show interfaces etherchannel
---Port-channel34:
Age of the Port-channel
= 28d:18h:51m:46s
Logical slot/port
= 12/34
Number of ports = 0
GC
= 0x00000000
HotStandBy port = null
Passive port list
=
Port state
= Port-channel L3-Ag Ag-Not-Inuse
Protocol
=
Port security
= Disabled
This is an example of output from the show interfaces interface-id pruning command when pruning is enabled
in the VTP domain:
Device# show interfaces gigabitethernet1/0/2 pruning
Port
Vlans pruned for lack of request by neighbor
Gi1/0/2
3,4
Port
Gi1/0/2
Vlans traffic requested of neighbor
1-3
This is an example of output from the show interfaces stats command for a specified VLAN interface:
Device# show interfaces vlan 1 stats
Switching path
Pkts In
Chars In
Processor
1165354
136205310
Route cache
0
0
Total
1165354
136205310
Pkts Out
570800
0
570800
Chars Out
91731594
0
91731594
This is an example of partial output from the show interfaces status command. It displays the status of all
interfaces:
This is an example of output from the show interfaces interface-id status command:
Device# show interfaces gigabitethernet1/0/20 status
Port
Name
Status
Vlan
Duplex
Gi1/0/20
notconnect
1
auto
seTX
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
206
Speed
Type
auto 10/100/1000Ba
show interfaces
This is an example of output from the show interfaces status err-disabled command. It displays the status
of interfaces in the error-disabled state:
Device# show interfaces status err-disabled
Port
Name
Status
Reason
Gi1/0/2
err-disabled
gbic-invalid
Gi2/0/3
err-disabled
dtp-flap
This is an example of output from the show interfaces interface-id pruning command:
Device# show interfaces gigabitethernet1/0/2 pruning
Port Vlans pruned for lack of request by neighbor
This is an example of output from the show interfaces interface-id trunk command. It displays trunking
information for the port.
Device# show interfaces gigabitethernet1/0/1 trunk
Port
Mode
Encapsulation Status
Gi1/0/1
on
802.1q
other
Related Commands
Native vlan
10
Port
Gi1/0/1
Vlans allowed on trunk
none
Port
Gi1/0/1
Vlans allowed and active in management domain
none
Port
Gi1/0/1
Vlans in spanning tree forwarding state and not pruned
none
Command
Description
show interfaces counters
Displays various counters for the switch or for a specific interface.
show interfaces switchport
Displays the administrative and operational status of a switching
(nonrouting) port.
show interfaces transceiver
Displays the physical properties of a small form-factor pluggable
(SFP) module interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
207
show interfaces counters
show interfaces counters
To display various counters for the switch or for a specific interface, use the show interfaces counters
command in privileged EXEC mode.
show interfaces [interface-id] counters [errors| etherchannel| module stack-member-number| protocol
status| trunk]
Syntax Description
Note
interface-id
(Optional) ID of the physical interface, including type, stack member
(stacking-capable switches only) module, and port number.
errors
(Optional) Displays error counters.
etherchannel
(Optional) Displays EtherChannel counters, including octets, broadcast
packets, multicast packets, and unicast packets received and sent.
module
stack-member-number
(Optional) Displays counters for the specified stack member.
protocol status
(Optional) Displays the status of protocols enabled on interfaces.
trunk
(Optional) Displays trunk counters.
None
Command Modes
Privileged EXEC
Usage Guidelines
In this command, the module keyword refers to the stack member
number. The module number that is part of the interface ID is always
zero.
Though visible in the command-line help string, the vlan vlan-id keyword is not supported.
Command Default
Command History
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
If you do not enter any keywords, all counters for all interfaces are included.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
208
show interfaces counters
Examples
This is an example of partial output from the show interfaces counters command. It displays all counters for
the switch.
Device# show interfaces counters
Port
InOctets
InUcastPkts
Gi1/0/1
0
0
Gi1/0/2
0
0
Gi1/0/3
95285341
43115
Gi1/0/4
0
0
InMcastPkts
0
0
1178430
0
InBcastPkts
0
0
1950
0
<output truncated>
This is an example of partial output from the show interfaces counters module command for stack member
2. It displays all counters for the specified switch in the stack.
Device# show interfaces counters module 2
Port
InOctets
InUcastPkts
Gi1/0/1
520
2
Gi1/0/2
520
2
Gi1/0/3
520
2
Gi1/0/4
520
2
InMcastPkts
0
0
0
0
InBcastPkts
0
0
0
0
<output truncated>
This is an example of partial output from the show interfaces counters protocol status command for all
interfaces:
Device# show interfaces counters protocol status
Protocols allocated:
Vlan1: Other, IP
Vlan20: Other, IP, ARP
Vlan30: Other, IP, ARP
Vlan40: Other, IP, ARP
Vlan50: Other, IP, ARP
Vlan60: Other, IP, ARP
Vlan70: Other, IP, ARP
Vlan80: Other, IP, ARP
Vlan90: Other, IP, ARP
Vlan900: Other, IP, ARP
Vlan3000: Other, IP
Vlan3500: Other, IP
GigabitEthernet1/0/1: Other, IP, ARP, CDP
GigabitEthernet1/0/2: Other, IP
GigabitEthernet1/0/3: Other, IP
GigabitEthernet1/0/4: Other, IP
GigabitEthernet1/0/5: Other, IP
GigabitEthernet1/0/6: Other, IP
GigabitEthernet1/0/7: Other, IP
GigabitEthernet1/0/8: Other, IP
GigabitEthernet1/0/9: Other, IP
GigabitEthernet1/0/10: Other, IP, CDP
<output truncated>
This is an example of output from the show interfaces counters trunk command. It displays trunk counters
for all interfaces.
Device# show interfaces counters trunk
Port
TrunkFramesTx
TrunkFramesRx
Gi1/0/1
0
0
Gi1/0/2
0
0
Gi1/0/3
80678
0
Gi1/0/4
82320
0
Gi1/0/5
0
0
WrongEncap
0
0
0
0
0
<output truncated>
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
209
show interfaces counters
Related Commands
Command
Description
show interfaces
Displays the administrative and operational status of all interfaces or a
specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
210
show interfaces switchport
show interfaces switchport
To display the administrative and operational status of a switching (nonrouting) port, including port blocking
and port protection settings, use the show interfaces switchport command in privileged EXEC mode.
show interfaces [interface-id] switchport [module number]
Syntax Description
interface-id
(Optional) ID of the interface. Valid interfaces include physical ports (including
type, stack member for stacking-capable switches, module, and port number) and
port channels. The port channel range is 1 to 48.
module number
(Optional) Displays switchport configuration of all interfaces on the switch or
specified stack member.
This option is not available if you entered a specific interface ID.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use the show interface switchport module number command to display the switch port characteristics of
all interfaces on that switch in the stack. If there is no switch with that module number in the stack, there is
no output.
Examples
This is an example of output from the show interfaces switchport command for a port. The table that follows
describes the fields in the display.
Note
Private VLANs are not supported in this release, so those fields are not applicable.
Device# show interfaces gigabitethernet1/0/1 switchport
Name: Gi1/0/1
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: down
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 10 (VLAN0010)
Administrative Native VLAN tagging: enabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
211
show interfaces switchport
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings: none
Operational private-vlan: none
Trunking VLANs Enabled: 11-20
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
Appliance trust: none
Field
Description
Name
Displays the port name.
Switchport
Displays the administrative and operational status of
the port. In this display, the port is in switchport
mode.
Administrative Mode
Displays the administrative and operational modes.
Operational Mode
Administrative Trunking Encapsulation
Operational Trunking Encapsulation
Displays the administrative and operational
encapsulation method and whether trunking
negotiation is enabled.
Negotiation of Trunking
Access Mode VLAN
Displays the VLAN ID to which the port is
configured.
Trunking Native Mode VLAN
Lists the VLAN ID of the trunk that is in native mode.
Lists the allowed VLANs on the trunk. Lists the active
VLANs on the trunk.
Trunking VLANs Enabled
Trunking VLANs Active
Pruning VLANs Enabled
Lists the VLANs that are pruning-eligible.
Protected
Displays whether or not protected port is enabled
(True) or disabled (False) on the interface.
Unknown unicast blocked
Displays whether or not unknown multicast and
unknown unicast traffic is blocked on the interface.
Unknown multicast blocked
Voice VLAN
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
212
Displays the VLAN ID on which voice VLAN is
enabled.
show interfaces switchport
Related Commands
Field
Description
Appliance trust
Displays the class of service (CoS) setting of the data
packets of the IP phone.
Command
Description
show interfaces
Displays the administrative and operational status of all interfaces or a
specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
213
show interfaces transceiver
show interfaces transceiver
To display the physical properties of a small form-factor pluggable (SFP) module interface, use the show
interfaces transceiver command in EXEC mode.
show interfaces [interface-id] transceiver [detail| module number| properties| supported-list|
threshold-table]
Syntax Description
interface-id
(Optional) ID of the physical interface, including type, stack member
(stacking-capable switches only) module, and port number.
detail
(Optional) Displays calibration properties, including high and low numbers and
any alarm information for any Digital Optical Monitoring (DoM)-capable
transceiver if one is installed in the switch.
module number
(Optional) Limits display to interfaces on module on the switch.
The range is 1 to 9.
This option is not available if you entered a specific interface ID.
Command Modes
properties
(Optional) Displays speed, duplex, and inline power settings on an interface.
supported-list
(Optional) Lists all supported transceivers.
threshold-table
(Optional) Displays alarm and warning threshold table.
User EXEC
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show interfaces interface-id transceiver properties command:
This is an example of output from the show interfaces interface-id transceiver detail command:
Device# show interfaces gigabitethernet1/1/1 transceiver detail
ITU Channel not available (Wavelength not available),
Transceiver is internally calibrated.
mA:milliamperes, dBm:decibels (milliwatts), N/A:not applicable.
++:high alarm, +:high warning, -:low warning, -- :low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are uncalibrated.
High Alarm
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
214
High Warn
Low Warn
Low Alarm
show interfaces transceiver
Port
------Gi1/1/1
Temperature
Threshold
Threshold Threshold Threshold
(Celsius)
(Celsius)
(Celsius) (Celsius) (Celsius)
----------------- ---------- --------- --------- --------29.9
74.0
70.0
0.0
-4.0
High Alarm High Warn Low Warn
Low Alarm
Voltage
Threshold
Threshold Threshold Threshold
(Volts)
(Volts)
(Volts)
(Volts)
(Volts)
------------------------ --------- --------- --------3.28
3.60
3.50
3.10
3.00
Port
------Gi1/1/1
Optical
Transmit Power
(dBm)
----------------1.8
High Alarm
Threshold
(dBm)
---------7.9
High Warn
Threshold
(dBm)
--------3.9
Low Warn
Threshold
(dBm)
--------0.0
Low Alarm
Threshold
(dBm)
---------4.0
Port
------Gi1/1/1
Optical
Receive Power
(dBm)
-----------------23.5
High Alarm
Threshold
(dBm)
----------5.0
High Warn
Threshold
(dBm)
---------9.0
Low Warn
Threshold
(dBm)
---------28.2
Low Alarm
Threshold
(dBm)
---------32.2
Port
------Gi1/1/1
This is an example of output from the show interfaces transceiver threshold-table command:
Device# show interfaces transceiver threshold-table
Optical Tx
Optical Rx
Temp
Laser Bias
current
------------- ------------- ----------------DWDM GBIC
Min1
-4.00
Min2
0.00
Max2
4.00
Max1
7.00
DWDM SFP
Min1
-4.00
Min2
0.00
Max2
4.00
Max1
8.00
RX only WDM GBIC
Min1
N/A
Min2
N/A
Max2
N/A
Max1
N/A
DWDM XENPAK
Min1
-5.00
Min2
-1.00
Max2
3.00
Max1
7.00
DWDM X2
Min1
-5.00
Min2
-1.00
Max2
3.00
Max1
7.00
DWDM XFP
Min1
-5.00
Min2
-1.00
Max2
3.00
Max1
7.00
CWDM X2
Min1
N/A
Min2
N/A
Max2
N/A
Max1
N/A
Voltage
---------
-32.00
-28.00
-9.00
-5.00
-4
0
70
74
N/A
N/A
N/A
N/A
4.65
4.75
5.25
5.40
-32.00
-28.00
-9.00
-5.00
-4
0
70
74
N/A
N/A
N/A
N/A
3.00
3.10
3.50
3.60
-32.00
-28.30
-9.00
-5.00
-4
0
70
74
N/A
N/A
N/A
N/A
4.65
4.75
5.25
5.40
-28.00
-24.00
-7.00
-3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-28.00
-24.00
-7.00
-3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-28.00
-24.00
-7.00
-3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
0
0
0
0
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
<output truncated>
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
215
show interfaces transceiver
Related Commands
Command
Description
show interfaces
Displays the administrative and operational status of all interfaces or a
specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
216
show module
show module
To display module information such as switch number, model number, serial number, hardware revision
number, software version, MAC address and so on, use this command in user EXEC or privileged EXEC
mode.
show module [switch-num]
Syntax Description
switch-num
Command Default
None
Command Modes
User EXEC (>)
(Optional) Number of the switch.
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE Denali 16.1.1
This command was introduced.
Usage Guidelines
Entering the show module command without the switch-num argument is the same as entering the show
module all command.
Examples
This example shows how to display information for all the modules on a Cisco Catalyst 3850 Series switch:
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
217
show mgmt-infra trace messages ilpower
show mgmt-infra trace messages ilpower
To display inline power messages within a trace buffer, use the show mgmt-infra trace messages ilpower
command in privileged EXEC mode.
show mgmt-infra trace messages ilpower [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Specifies the stack member number for which to display
inline power messages within a trace buffer.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This is an output example from the show mgmt-infra trace messages ilpower command:
Device# show mgmt-infra trace messages ilpower
[10/23/12 14:05:10.984 UTC 1 3] Initialized inline power system configuration fo
r slot 1.
[10/23/12 14:05:10.984 UTC 2 3] Initialized inline power system configuration fo
r slot 2.
[10/23/12 14:05:10.984 UTC 3 3] Initialized inline power system configuration fo
r slot 3.
[10/23/12 14:05:10.984 UTC 4 3] Initialized inline power system configuration fo
r slot 4.
[10/23/12 14:05:10.984 UTC 5 3] Initialized inline power system configuration fo
r slot 5.
[10/23/12 14:05:10.984 UTC 6 3] Initialized inline power system configuration fo
r slot 6.
[10/23/12 14:05:10.984 UTC 7 3] Initialized inline power system configuration fo
r slot 7.
[10/23/12 14:05:10.984 UTC 8 3] Initialized inline power system configuration fo
r slot 8.
[10/23/12 14:05:10.984 UTC 9 3] Initialized inline power system configuration fo
r slot 9.
[10/23/12 14:05:10.984 UTC a 3] Inline power subsystem initialized.
[10/23/12 14:05:18.908 UTC b 264] Create new power pool for slot 1
[10/23/12 14:05:18.909 UTC c 264] Set total inline power to 450 for slot 1
[10/23/12 14:05:20.273 UTC d 3] PoE is not supported on .
[10/23/12 14:05:20.288 UTC e 3] PoE is not supported on .
[10/23/12 14:05:20.299 UTC f 3] PoE is not supported on .
[10/23/12 14:05:20.311 UTC 10 3] PoE is not supported on .
[10/23/12 14:05:20.373 UTC 11 98] Inline power process post for switch 1
[10/23/12 14:05:20.373 UTC 12 98] PoE post passed on switch 1
[10/23/12 14:05:20.379 UTC 13 3] Slot #1: PoE initialization for board id 16387
[10/23/12 14:05:20.379 UTC 14 3] Set total inline power to 450 for slot 1
[10/23/12 14:05:20.379 UTC 15 3] Gi1/0/1 port config Initialized
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
218
show mgmt-infra trace messages ilpower
[10/23/12
[10/23/12
[10/23/12
[10/23/12
[10/23/12
[10/23/12
14:05:20.379
14:05:20.380
14:05:20.380
14:05:20.380
14:05:50.440
14:05:50.440
UTC
UTC
UTC
UTC
UTC
UTC
16
17
18
19
1a
1b
3]
3]
3]
3]
3]
3]
Interface Gi1/0/1 initialization done.
Gi1/0/24 port config Initialized
Interface Gi1/0/24 initialization done.
Slot #1: initialization done.
Slot #1: PoE initialization for board id 16387
Duplicate init event
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
219
show mgmt-infra trace messages ilpower-ha
show mgmt-infra trace messages ilpower-ha
To display inline power high availability messages within a trace buffer, use the show mgmt-infra trace
messages ilpower-ha command in privileged EXEC mode.
show mgmt-infra trace messages ilpower-ha [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Specifies the stack member number for which to display
inline power messages within a trace buffer.
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This is an output example from the show mgmt-infra trace messages ilpower-ha command:
Device# show mgmt-infra trace messages ilpower-ha
[10/23/12 14:04:48.087 UTC 1 3] NG3K_ILPOWER_HA: Created NGWC ILP CF client succ
essfully.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
220
show mgmt-infra trace messages platform-mgr-poe
show mgmt-infra trace messages platform-mgr-poe
To display platform manager Power over Ethernet (PoE) messages within a trace buffer, use the show
mgmt-infra trace messages platform-mgr-poe privileged EXEC command.
show mgmt-infra trace messages platform-mgr-poe [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Specifies the stack member number for which to display
messages within a trace buffer.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This is an example of partial output from the show mgmt-infra trace messages platform-mgr-poe command:
Device# show mgmt-infra trace messages platform-mgr-poe
[10/23/12 14:04:06.431 UTC 1 5495] PoE Info: get power controller param sent:
[10/23/12 14:04:06.431 UTC 2 5495] PoE Info: POE_SHUT sent for port 1 (0:0)
[10/23/12 14:04:06.431 UTC 3 5495] PoE Info: POE_SHUT sent for port 2 (0:1)
[10/23/12 14:04:06.431 UTC 4 5495] PoE Info: POE_SHUT sent for port 3 (0:2)
[10/23/12 14:04:06.431 UTC 5 5495] PoE Info: POE_SHUT sent for port 4 (0:3)
[10/23/12 14:04:06.431 UTC 6 5495] PoE Info: POE_SHUT sent for port 5 (0:4)
[10/23/12 14:04:06.431 UTC 7 5495] PoE Info: POE_SHUT sent for port 6 (0:5)
[10/23/12 14:04:06.431 UTC 8 5495] PoE Info: POE_SHUT sent for port 7 (0:6)
[10/23/12 14:04:06.431 UTC 9 5495] PoE Info: POE_SHUT sent for port 8 (0:7)
[10/23/12 14:04:06.431 UTC a 5495] PoE Info: POE_SHUT sent for port 9 (0:8)
[10/23/12 14:04:06.431 UTC b 5495] PoE Info: POE_SHUT sent for port 10 (0:9)
[10/23/12 14:04:06.431 UTC c 5495] PoE Info: POE_SHUT sent for port 11 (0:10)
[10/23/12 14:04:06.431 UTC d 5495] PoE Info: POE_SHUT sent for port 12 (0:11)
[10/23/12 14:04:06.431 UTC e 5495] PoE Info: POE_SHUT sent for port 13 (e:0)
[10/23/12 14:04:06.431 UTC f 5495] PoE Info: POE_SHUT sent for port 14 (e:1)
[10/23/12 14:04:06.431 UTC 10 5495] PoE Info: POE_SHUT sent for port 15 (e:2)
[10/23/12 14:04:06.431 UTC 11 5495] PoE Info: POE_SHUT sent for port 16 (e:3)
[10/23/12 14:04:06.431 UTC 12 5495] PoE Info: POE_SHUT sent for port 17 (e:4)
[10/23/12 14:04:06.431 UTC 13 5495] PoE Info: POE_SHUT sent for port 18 (e:5)
[10/23/12 14:04:06.431 UTC 14 5495] PoE Info: POE_SHUT sent for port 19 (e:6)
[10/23/12 14:04:06.431 UTC 15 5495] PoE Info: POE_SHUT sent for port 20 (e:7)
[10/23/12 14:04:06.431 UTC 16 5495] PoE Info: POE_SHUT sent for port 21 (e:8)
[10/23/12 14:04:06.431 UTC 17 5495] PoE Info: POE_SHUT sent for port 22 (e:9)
[10/23/12 14:04:06.431 UTC 18 5495] PoE Info: POE_SHUT sent for port 23 (e:10)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
221
show network-policy profile
show network-policy profile
To display the network-policy profiles, use the show network policy profile command in privileged EXEC
mode.
show network-policy profile [profile-number]
Syntax Description
profile-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Displays the network-policy profile number. If no profile is entered,
all network-policy profiles appear.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show network-policy profile command:
Device# show network-policy profile
Network Policy Profile 60
Interface:
none
Related Commands
Command
Description
network-policy
Applies a network-policy profile to an interface.
network-policy profile (global configuration) Creates a network-policy profile and enters network-policy
configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
222
show platform CAPWAP summary
show platform CAPWAP summary
To display the tunnel identifier and the type all the CAPWAP tunnels established by the controller to the
access points and other mobility controllers, use the show platform CAPWAP summary command.
show platform CAPWAP summary
Syntax Description
This command has no arguments or keywords.
Command Default
Command Modes
Command History
Examples
Global configuration
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example displays the tunnel identifier and details:
Device# show platform capwap summary
Tunnel ID | Type | Src IP | Dst IP | SPrt | DPrt | S | A
------------------------------------------------------------------------------0x0088498000000983 data 9.6.44.61 9.12.138.101 5247 41894 1 1
0x00966dc000000010 data 9.6.44.61 9.6.47.101 5247 62526 1 2
0x00938e800000095b data 9.6.44.61 9.12.138.100 5247 45697 1 1
0x00ab1a8000000bd1 data 9.6.44.61 9.12.139.101 5247 38906 1 0
0x00896e40000000bd data 9.6.44.61 9.12.136.100 5247 1836 1 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
223
show power inline
show power inline
To display the Power over Ethernet (PoE) status for the specified PoE port, the specified stack member, or
for all PoE ports in the switch stack, use the show power inline command in EXEC mode.
show power inline [police| priority] [interface-id | module stack-member-number] [detail]
Syntax Description
police
(Optional) Displays the power policing information about
real-time power consumption.
priority
(Optional) Displays the power inline port priority for each port.
interface-id
(Optional) ID of the physical interface.
module stack-member-number
(Optional) Limits the display to ports on the specified stack
member.
This keyword is supported only on stacking-capable switches.
detail
Command Modes
(Optional) Displays detailed output of the interface or module.
User EXEC
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show power inline command. The table that follows describes the
output fields.
Device> show power inline
Module
Available
Used
Remaining
(Watts)
(Watts)
(Watts)
----------------------------1
n/a
n/a
n/a
2
n/a
n/a
n/a
3
1440.0
15.4
1424.6
4
720.0
6.3
713.7
Interface Admin Oper
Power
Device
(Watts)
--------- ------ ---------- ------- ------------------Gi3/0/1
auto
off
0.0
n/a
Gi3/0/2
auto
off
0.0
n/a
Gi3/0/3
auto
off
0.0
n/a
Gi3/0/4
auto
off
0.0
n/a
Gi3/0/5
auto
off
0.0
n/a
Gi3/0/6
auto
off
0.0
n/a
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
224
Class Max
----n/a
n/a
n/a
n/a
n/a
n/a
---30.0
30.0
30.0
30.0
30.0
30.0
show power inline
Gi3/0/7
auto
off
Gi3/0/8
auto
off
Gi3/0/9
auto
off
Gi3/0/10 auto
off
Gi3/0/11 auto
off
Gi3/0/12 auto
off
<output truncated>
0.0
0.0
0.0
0.0
0.0
0.0
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
30.0
30.0
30.0
30.0
30.0
30.0
This is an example of output from the show power inline interface-id command on a switch port:
Device> show power inline gigabitethernet1/0/1
Interface Admin Oper
Power
Device
Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ---Gi1/0/1
auto
off
0.0
n/a
n/a
30.0
This is an example of output from the show power inline module switch-number command on stack member
3. The table that follows describes the output fields.
Device> show power inline module 3
Module
Available
Used
Remaining
(Watts)
(Watts)
(Watts)
----------------------------3
865.0
864.0
1.0
Interface Admin Oper
Power
Device
(Watts)
--------- ------ ---------- ------- ------------------Gi3/0/1
auto
power-deny 4.0
n/a
Gi3/0/2
auto
off
0.0
n/a
Gi3/0/3
auto
off
0.0
n/a
Gi3/0/4
auto
off
0.0
n/a
Gi3/0/5
auto
off
0.0
n/a
Gi3/0/6
auto
off
0.0
n/a
Gi3/0/7
auto
off
0.0
n/a
Gi3/0/8
auto
off
0.0
n/a
Gi3/0/9
auto
off
0.0
n/a
Gi3/0/10 auto
off
0.0
n/a
<output truncated>
Class Max
----n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
---15.4
15.4
15.4
15.4
15.4
15.4
15.4
15.4
15.4
15.4
Table 16: show power inline Field Descriptions
Field
Description
Available
The total amount of configured power3 on the PoE
switch in watts (W).
Used
The amount of configured power that is allocated to
PoE ports in watts.
Remaining
The amount of configured power in watts that is not
allocated to ports in the system. (Available – Used =
Remaining)
Admin
Administration mode: auto, off, static.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
225
show power inline
Field
Description
Oper
Operating mode:
• on—The powered device is detected, and power
is applied.
• off—No PoE is applied.
• faulty—Device detection or a powered device
is in a faulty state.
• power-deny—A powered device is detected,
but no PoE is available, or the maximum
wattage exceeds the detected powered-device
maximum.
Power
The maximum amount of power that is allocated to
the powered device in watts. This value is the same
as the value in the Cutoff Power field in the show
power inline police command output.
Device
The device type detected: n/a, unknown, Cisco
powered-device, IEEE powered-device, or the name
from CDP.
Class
The IEEE classification: n/a or a value from 0 to 4.
Max
The maximum amount of power allocated to the
powered device in watts.
AdminPowerMax
The maximum amount power allocated to the powered
device in watts when the switch polices the real-time
power consumption. This value is the same as the
Max field value.
AdminConsumption
The power consumption of the powered device in
watts when the switch polices the real-time power
consumption. If policing is disabled, this value is the
same as the AdminPowerMax field value.
3 The configured power is the power that you manually specify or that the switch specifies by using CDP power negotiation or the IEEE classification, which
is different than the real-time power that is monitored with the power sensing feature.
This is an example of output from the show power inline police command on a stacking-capable switch:
Device> show power inline police
Module
Available
Used
Remaining
(Watts)
(Watts)
(Watts)
----------------------------1
370.0
0.0
370.0
3
865.0
864.0
1.0
Admin Oper
Admin
Oper
Cutoff Oper
Interface State State
Police
Police
Power Power
--------- ------ ----------- ---------- ---------- ------ ------
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
226
show power inline
Gi1/0/1
auto
off
Gi1/0/2
auto
off
Gi1/0/3
auto
off
Gi1/0/4
off
off
Gi1/0/5
off
off
Gi1/0/6
off
off
Gi1/0/7
auto
off
Gi1/0/8
auto
off
Gi1/0/9
auto
on
Gi1/0/10 auto
on
Gi1/0/11 auto
on
Gi1/0/12 auto
on
Gi1/0/13 auto
errdisable
<output truncated>
none
log
errdisable
none
log
errdisable
none
log
none
log
log
errdisable
errdisable
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
ok
log
ok
n/a
n/a
5.4
5.4
n/a
5.4
5.4
n/a
5.4
n/a
5.4
5.4
5.4
5.4
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
5.1
4.2
5.9
4.2
0.0
In the previous example:
• The Gi1/0/1 port is shut down, and policing is not configured.
• The Gi1/0/2 port is shut down, but policing is enabled with a policing action to generate a syslog message.
• The Gi1/0/3 port is shut down, but policing is enabled with a policing action is to shut down the port.
• Device detection is disabled on the Gi1/0/4 port, power is not applied to the port, and policing is disabled.
• Device detection is disabled on the Gi1/0/5 port, and power is not applied to the port, but policing is
enabled with a policing action to generate a syslog message.
• Device detection is disabled on the Gi1/0/6 port, and power is not applied to the port, but policing is
enabled with a policing action to shut down the port.
• The Gi1/0/7 port is up, and policing is disabled, but the switch does not apply power to the connected
device.
• The Gi1/0/8 port is up, and policing is enabled with a policing action to generate a syslog message, but
the switch does not apply power to the powered device.
• The Gi1/0/9 port is up and connected to a powered device, and policing is disabled.
• The Gi1/0/10 port is up and connected to a powered device, and policing is enabled with a policing
action to generate a syslog message. The policing action does not take effect because the real-time power
consumption is less than the cutoff value.
• The Gi1/0/11 port is up and connected to a powered device, and policing is enabled with a policing
action to generate a syslog message.
• The Gi1/0/12 port is up and connected to a powered device, and policing is enabled with a policing
action to shut down the port. The policing action does not take effect because the real-time power
consumption is less than the cutoff value.
• The Gi1/0/13 port is up and connected to a powered device, and policing is enabled with a policing
action to shut down the port.
This is an example of output from the show power inline police interface-id command on a standalone switch.
The table that follows describes the output fields.
Device> show power inline police gigabitethernet1/0/1
Interface Admin Oper
Admin
Oper
Cutoff
State State
Police
Police
Power
--------- ------ ---------- ---------- ---------- -----Gi1/0/1
auto
off
none
n/a
n/a
Oper
Power
----0.0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
227
show power inline
Table 17: show power inline police Field Descriptions
Field
Description
Available
The total amount of configured power4 on the switch
in watts (W).
Used
The amount of configured power allocated to PoE
ports in watts.
Remaining
The amount of configured power in watts that is not
allocated to ports in the system. (Available – Used =
Remaining)
Admin State
Administration mode: auto, off, static.
Oper State
Operating mode:
• errdisable—Policing is enabled.
• faulty—Device detection on a powered device
is in a faulty state.
• off—No PoE is applied.
• on—The powered device is detected, and power
is applied.
• power-deny—A powered device is detected,
but no PoE is available, or the real-time power
consumption exceeds the maximum power
allocation.
Note
Admin Police
The operating mode is the current PoE state
for the specified PoE port, the specified stack
member, or for all PoE ports on the switch.
Status of the real-time power-consumption policing
feature:
• errdisable—Policing is enabled, and the switch
shuts down the port when the real-time power
consumption exceeds the maximum power
allocation.
• log—Policing is enabled, and the switch
generates a syslog message when the real-time
power consumption exceeds the maximum
power allocation.
• none—Policing is disabled.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
228
show power inline
Field
Description
Oper Police
Policing status:
• errdisable—The real-time power consumption
exceeds the maximum power allocation, and
the switch shuts down the PoE port.
• log—The real-time power consumption exceeds
the maximum power allocation, and the switch
generates a syslog message.
• n/a—Device detection is disabled, power is not
applied to the PoE port, or no policing action is
configured.
• ok—Real-time power consumption is less than
the maximum power allocation.
Cutoff Power
The maximum power allocated on the port. When the
real-time power consumption is greater than this
value, the switch takes the configured policing action.
Oper Power
The real-time power consumption of the powered
device.
4 The configured power is the power that you manually specify or that the switch specifies by using CDP power negotiation or the IEEE classification, which
is different than the real-time power that is monitored with the power sensing feature.
Related Commands
Command
Description
logging event power-inline-status
Enables the logging of PoE events.
power inline
Configures the power management mode on PoE ports.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
229
show stack-power
show stack-power
To display information about StackPower stacks or switches in a power stack, use the show stack-power
command in EXEC mode.
show stack-power [power-stack-name]
Syntax Description
Command Modes
power-stack-name
(Optional) Name of the power stack for which to display power information.
The name can be up to 31 characters.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is available only on switch stacks running the IP Base or IP Services image.
If a switch is shut down because of load shedding, the output of the show stack-power command still includes
the MAC address of the shutdown neighbor switch. The command output shows the stack power topology
even if there is not enough power to power a switch.
Examples
This is an example of output from the show stack-power command:
Device# show stack-power
Power Stack
Stack
Name
Mode
-------------------- -----Powerstack-1
SP-PS
Related Commands
Command
Stack
Topolgy
------Stndaln
Total
Pwr(W)
-----715
Rsvd
Pwr(W)
-----509
Alloc
Pwr(W)
-----190
Unused
Pwr(W)
-----16
Num
SW
--1
Num
PS
--1
Description
mode (power-stack configuration) Configures power stack mode for the power stack.
power-priority
Configures Cisco StackPower power-priority values for a switch in a
power stack and for its high-priority and low-priority PoE.
stack-power
Configures StackPower parameters for the power stack or for a switch
in the power stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
230
show system mtu
show system mtu
To display the global maximum transmission unit (MTU) or maximum packet size set for the switch, use the
show system mtu command in privileged EXEC mode.
show system mtu
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
For information about the MTU values and the stack configurations that affect the MTU values, see the system
mtu command.
Examples
This is an example of output from the show system mtu command:
Device# show system mtu
Global Ethernet MTU is 1500 bytes.
Related Commands
Command
Description
system mtu
Sets the global maximum packet size or MTU size for switched packets on
Gigabit Ethernet and 10-Gigabit Ethernet ports.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
231
show wireless interface summary
show wireless interface summary
To display the wireless interface status and configuration, use the show wireless interface summary
privileged EXEC command.
show wireless interface summary
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
Usage Guidelines
Examples
This example shows how to display the summary of wireless interfaces:
Device# show wireless interface summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
232
speed
speed
To specify the speed of a 10/100 Mb/s or 10/100/1000 Mb/s port, use the speed command in interface
configuration mode. To return to the default value, use the no form of this command.
speed {10| 100| 1000| auto [10| 100| 1000]| nonegotiate}
no speed
Syntax Description
10
Specifies that the port runs at 10 Mb/s.
100
Specifies that the port runs at 100 Mb/s.
1000
Specifies that the port runs at 1000 Mb/s. This option is valid and visible only on
10/100/1000 Mb/s ports.
auto
Automatically detects the speed the port should run at based on the port at the other
end of the link. If you use the 10, 100, or 1000 keywords with the auto keyword,
the port only autonegotiates at the specified speeds.
nonegotiate
Disables autonegotiation, and the port runs at 1000 Mb/s.
Command Default
The default is auto.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You cannot configure speed on the 10-Gigabit Ethernet ports.
Except for the 1000BASE-T small form-factor pluggable (SFP) modules, you can configure the speed to not
negotiate (nonegotiate) when an SFP module port is connected to a device that does not support autonegotiation.
If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed setting
and then forces the speed setting to the negotiated value. The duplex setting remains as configured on each
end of the link, which could result in a duplex setting mismatch.
If both ends of the line support autonegotiation, we highly recommend the default autonegotiation settings.
If one interface supports autonegotiation and the other end does not, do use the auto setting on the supported
side, but set the duplex and speed on the other side.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
233
speed
Caution
Changing the interface speed and duplex mode configuration might shut down and reenable the interface
during the reconfiguration.
For guidelines on setting the switch speed and duplex parameters, see the “Configuring Interface Characteristics”
chapter in the software configuration guide for this release.
You can verify your settings by entering the show interfaces privileged EXEC command.
Examples
This example shows how to set speed on a port to 100 Mb/s:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# speed 100
This example shows how to set a port to autonegotiate at only 10 Mb/s:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# speed auto 10
This example shows how to set a port to autonegotiate at only 10 or 100 Mb/s:
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# speed auto 10 100
Related Commands
Command
Description
duplex
Specifies the duplex mode of operation for a port.
show interfaces
Displays the administrative and operational status of all interfaces or a
specified interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
234
stack-power
stack-power
To configure StackPower parameters for the power stack or for a switch in the power stack, use the stack
power command in global configuration mode. To return to the default setting, use the no form of the command,
stack-power {stack power-stack-name| switch stack-member-number}
no stack-power {stack power-stack-name| switch stack-member-number}
Syntax Description
stack power-stack-name
Specifies the name of the power stack. The name can be up to 31 characters.
Entering these keywords followed by a carriage return enters power stack
configuration mode.
switch stack-member-number
Specifies the switch number in the stack (1 to 4) to enter switch stack-power
configuration mode for the switch.
Command Default
There is no default.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
When you enter the stack-power stack power stack name command, you enter power stack configuration
mode, and these commands are available:
• default—Returns a command to its default setting.
• exit—Exits ARP access-list configuration mode.
• mode—Sets the power mode for the power stack. See the mode command.
• no—Negates a command or returns to default settings.
If you enter the stack-power switch switch-number command with a switch number that is not participating
in StackPower, you receive an error message.
When you enter the stack-power switch switch-number command with the number of a switch participating
in StackPower, you enter switch stack power configuration mode, and these commands are available:
• default—Returns a command to its default setting.
• exit—Exits switch stack power configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
235
stack-power
• no—Negates a command or returns to default settings.
• power-priority—Sets the power priority for the switch and the switch ports. See the power-priority
command.
• stack-id name—Enters the name of the power stack to which the switch belongs. If you do not enter
the power stack-ID, the switch does not inherit the stack parameters. The name can be up to 31 characters.
• standalone—Forces the switch to operate in standalone power mode. This mode shuts down both stack
power ports.
Examples
This example removes switch 2, which is connected to the power stack, from the power pool and shutting
down both power ports:
Device(config)# stack-power switch 2
Device(config-switch-stackpower)# standalone
Device(config-switch-stackpower)# exit
Related Commands
Command
Description
mode (power-stack configuration)
Configures power stack mode for the power stack.
power-priority
Configures Cisco StackPower power-priority values for a switch in a
power stack and for its high-priority and low-priority PoE.
show stack-power
Displays information about StackPower stacks or switches in a power
stack.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
236
switchport block
switchport block
To prevent unknown multicast or unicast packets from being forwarded, use the switchport block command
in interface configuration mode. To allow forwarding unknown multicast or unicast packets, use the no form
of this command.
switchport block {multicast| unicast}
no switchport block {multicast| unicast}
Syntax Description
multicast
Specifies that unknown multicast traffic should be blocked.
Note
unicast
Only pure Layer 2 multicast traffic is blocked. Multicast packets that contain
IPv4 or IPv6 information in the header are not blocked.
Specifies that unknown unicast traffic should be blocked.
Command Default
Unknown multicast and unicast traffic is not blocked.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
By default, all traffic with unknown MAC addresses is sent to all ports. You can block unknown multicast or
unicast traffic on protected or nonprotected ports. If unknown multicast or unicast traffic is not blocked on a
protected port, there could be security issues.
With multicast traffic, the port blocking feature blocks only pure Layer 2 packets. Multicast packets that
contain IPv4 or IPv6 information in the header are not blocked.
Blocking unknown multicast or unicast traffic is not automatically enabled on protected ports; you must
explicitly configure it.
For more information about blocking packets, see the software configuration guide for this release.
Examples
This example shows how to block unknown unicast traffic on an interface:
Device(config-if)# switchport block unicast
You can verify your setting by entering the show interfaces interface-id switchport privileged EXEC
command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
237
switchport block
Related Commands
Command
Description
show interfaces switchport
Displays the administrative and operational status of a switching
(nonrouting) port.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
238
system mtu
system mtu
To set the global maximum packet size or MTU size for switched packets on Gigabit Ethernet and 10-Gigabit
Ethernet ports, use the system mtu command in global configuration mode. To restore the global MTU value
to its default value use the no form of this command.
system mtu bytes
no system mtu
Syntax Description
bytes
The global MTU size in bytes. The range is 1500 to 9198 bytes; the default is 1500
bytes.
Command Default
The default MTU size for all ports is 1500 bytes.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can verify your setting by entering the show system mtu privileged EXEC command.
The switch does not support the MTU on a per-interface basis.
If you enter a value that is outside the allowed range for the specific type of interface, the value is not accepted.
Examples
This example shows how to set the global system MTU size to 6000 bytes:
Device(config)# system mtu 6000
Global Ethernet MTU is set to 6000 bytes.
Note: this is the Ethernet payload size, not the total
Ethernet frame size, which includes the Ethernet
header/trailer and possibly other tags, such as ISL or
802.1q tags.
Related Commands
Command
Description
show system mtu
Displays the global MTU or maximum packet size set for the switch.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
239
voice-signaling vlan (network-policy configuration)
voice-signaling vlan (network-policy configuration)
To create a network-policy profile for the voice-signaling application type, use the voice-signaling vlan
command in network-policy configuration mode. To delete the policy, use the no form of this command.
voice-signaling vlan {vlan-id [cos cos-value| dscp dscp-value]| dot1p [cos l2-priority| dscp dscp]| none|
untagged}
Syntax Description
Command Default
vlan-id
(Optional) The VLAN for voice traffic. The range is 1 to 4094.
cos cos-value
(Optional) Specifies the Layer 2 priority class of service (CoS) for the configured
VLAN. The range is 0 to 7; the default is 5.
dscp dscp-value
(Optional) Specifies the differentiated services code point (DSCP) value for the
configured VLAN. The range is 0 to 63; the default is 46.
dot1p
(Optional) Configures the phone to use IEEE 802.1p priority tagging and to use
VLAN 0 (the native VLAN).
none
(Optional) Does not instruct the Cisco IP phone about the voice VLAN. The phone
uses the configuration from the phone key pad.
untagged
(Optional) Configures the phone to send untagged voice traffic. This is the default
for the phone.
No network-policy profiles for the voice-signaling application type are defined.
The default CoS value is 5.
The default DSCP value is 46.
The default tagging mode is untagged.
Command Modes
Command History
Usage Guidelines
Network-policy profile configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile global configuration command to create a profile and to enter network-policy
profile configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
240
voice-signaling vlan (network-policy configuration)
The voice-signaling application type is for network topologies that require a different policy for voice signaling
than for voice media. This application type should not be advertised if all of the same network policies apply
as those advertised in the voice policy TLV.
When you are in network-policy profile configuration mode, you can create the profile for voice-signaling
by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and
tagging mode.
These profile attributes are contained in the Link Layer Discovery Protocol for Media Endpoint Devices
(LLDP-MED) network-policy time-length-value (TLV).
To return to privileged EXEC mode from the network-policy profile configuration mode, enter the exit
command.
Examples
This example shows how to configure voice-signaling for VLAN 200 with a priority 2 CoS:
Device(config)# network-policy profile 1
Device(config-network-policy)# voice-signaling vlan 200 cos 2
This example shows how to configure voice-signaling for VLAN 400 with a DSCP value of 45:
Device(config)# network-policy profile 1
Device(config-network-policy)# voice-signaling vlan 400 dscp 45
This example shows how to configure voice-signaling for the native VLAN with priority tagging:
Device(config-network-policy)# voice-signaling vlan dot1p cos 4
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
241
voice vlan (network-policy configuration)
voice vlan (network-policy configuration)
To create a network-policy profile for the voice application type, use the voice vlan command in network-policy
configuration mode. To delete the policy, use the no form of this command.
voice vlan {vlan-id [cos cos-value| dscp dscp-value]| dot1p [cos l2-priority| dscp dscp]| none| untagged}
Syntax Description
Command Default
vlan-id
(Optional) The VLAN for voice traffic. The range is 1 to 4094.
cos cos-value
(Optional) Specifies the Layer 2 priority class of service (CoS) for the configured
VLAN. The range is 0 to 7; the default is 5.
dscp dscp-value
(Optional) Specifies the differentiated services code point (DSCP) value for the
configured VLAN. The range is 0 to 63; the default is 46.
dot1p
(Optional) Configures the phone to use IEEE 802.1p priority tagging and to use
VLAN 0 (the native VLAN).
none
(Optional) Does not instruct the Cisco IP phone about the voice VLAN. The phone
uses the configuration from the phone key pad.
untagged
(Optional) Configures the phone to send untagged voice traffic. This is the default
for the phone.
No network-policy profiles for the voice application type are defined.
The default CoS value is 5.
The default DSCP value is 46.
The default tagging mode is untagged.
Command Modes
Command History
Usage Guidelines
Network-policy profile configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile global configuration command to create a profile and to enter network-policy
profile configuration mode.
The voice application type is for dedicated IP telephones and similar devices that support interactive voice
services. These devices are typically deployed on a separate VLAN for ease of deployment and enhanced
security through isolation from data applications.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
242
voice vlan (network-policy configuration)
When you are in network-policy profile configuration mode, you can create the profile for voice by specifying
the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and tagging mode.
These profile attributes are contained in the Link Layer Discovery Protocol for Media Endpoint Devices
(LLDP-MED) network-policy time-length-value (TLV).
To return to privileged EXEC mode from the network-policy profile configuration mode, enter the exit
command.
Examples
This example shows how to configure the voice application type for VLAN 100 with a priority 4 CoS:
Device(config)# network-policy profile 1
Device(config-network-policy)# voice vlan 100 cos 4
This example shows how to configure the voice application type for VLAN 100 with a DSCP value of 34:
Device(config)# network-policy profile 1
Device(config-network-policy)# voice vlan 100 dscp 34
This example shows how to configure the voice application type for the native VLAN with priority tagging:
Device(config-network-policy)# voice vlan dot1p cos 4
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
243
wireless ap-manager interface
wireless ap-manager interface
To configure the wireless AP-manager interface, use the wireless ap-manager interface command.
wireless ap-managerinterface {TenGigabitEthernet interface-number| Vlan interface-number}
Syntax Description
TenGigabitEthernet interface-name
Configures 10-Gigabit Ethernet interface. Values range from
0 to 9.
Vlan interface-name
Configures VLANs. Values range from 1 to 4095.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to configure the wireless AP-manager:
Device# wireless ap-manager interface vlan
<1-4095> Vlan interface number
This example shows how to configure the wireless AP-manager:
Device# #wireless ap-manager interface vlan 10
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
244
wireless exclusionlist
wireless exclusionlist
To manage exclusion list entries, use the wireless exclusionlist global configuration command. To remove
the exclusion list entries, use the no form of the command.
wireless exclusionlist mac-addr description description
no wireless exclusionlist mac-addr
Syntax Description
mac-addr
The MAC address of the local excluded entry.
description description
Specifies the description for an exclusion-list entry.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to create a local exclusion list entry for the MAC address xxx.xxx.xxx:
Device# wireless exclusionlist xxx.xxx.xxx
This example shows how to create a description for the local exclusion list entry for the MAC address
xxx.xxx.xxx:
Device# wireless exclusionlist xxx.xxx.xxx description sample
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
245
wireless linktest
wireless linktest
To configure linktest frame size and number of frames to send, use the wireless linktest command.
wireless linktest {frame-size size| number-of-frames value}
Syntax Description
frame-size size
Specifies the link test frame size for each packet. The values range from
1 to 1400.
number-of-frames value
Specifies the number of frames to be sent for the link test. The values
range from 1 to 100.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to configure the link test frame size of each frame as 10:
Device# wireless linktest frame-size 10
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
246
wireless management interface
wireless management interface
To configure wireless management parameters on an interface, use the wireless management interface global
configuration command. To remove a wireless management parameters on an interface, use the no form of
the command.
wireless management interface interface-name {TenGigabitEthernet interface-name| Vlan interface-name}
no wireless management interface
Syntax Description
interface-name
The interface number.
TenGigabitEthernet interface-name The 10-Gigabit Ethernet interface number. The values range from 0
to 9.
Vlan interface-name
Command Default
None
Command Modes
Global configuration
Command History
Examples
The VLAN interface number. The values range from 1 to 4095.
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to configure VLAN 10 on the wireless interface:
Device# wireless management interface Vlan 10
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
247
wireless peer-blocking forward-upstream
wireless peer-blocking forward-upstream
To configure peer-to-peer blocking for forward upstream, use the wireless peer-blocking forward-upstream
command. To remove a peer-to-peer blocking, use the no form of the command.
wireless peer-blocking forward-upstream interface{GigabitEthernet interface-number TenGigabitEthernet
interface-number}
no wireless peer-blocking forward-upstream {GigabitEthernet interface-number TenGigabitEthernet
interface-number}
Syntax Description
GigabitEthernet interface
The Gigabit Ethernet interface number. Values range from 0 to 9.
TenGigabitEthernet interface
The 10-Gigabit Ethernet interface number. Values range from 0 to 9.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to configure peer-to-peer blocking for interface 10-gigabit ethernet interface:
Device(config)# wireless peer-blocking forward-upstream TenGigabitEthernet 1/1/4
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
248
PART
IV
IP
• IP Commands, page 251
IP Commands
• fhrp delay, page 253
• fhrp version vrrp v3, page 254
• glbp authentication, page 255
• glbp forwarder preempt, page 257
• glbp ip, page 258
• glbp load-balancing, page 260
• glbp name, page 262
• glbp preempt, page 264
• glbp priority, page 265
• glbp timers, page 266
• glbp weighting, page 268
• glbp weighting track, page 270
• ip address dhcp, page 272
• ip address pool (DHCP), page 275
• ip address, page 276
• key chain, page 279
• key-string (authentication), page 280
• key, page 281
• show glbp, page 283
• show key chain, page 287
• show track, page 288
• track, page 290
• vrrp, page 292
• vrrp description, page 293
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
251
• vrrp preempt, page 294
• vrrp priority, page 296
• vrrp timers advertise, page 297
• vrrs leader, page 299
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
252
fhrp delay
fhrp delay
To specify the delay period for the initialization of First Hop Redundancy Protocol (FHRP) clients, use the
fhrp delay command in interface configuration mode. To remove the delay period specified, use the no form
of this command.
fhrp delay {[minimum] [reload] seconds}
no fhrp delay {[minimum] [reload] seconds}
Syntax Description
minimum
(Optional) Configures the delay period after an
interface becomes available.
reload
(Optional) Configures the delay period after the
device reloads.
seconds
Delay period in seconds. The range is from 0 to 3600.
Command Default
None
Command Modes
Interface configuration (config-if)
Examples
This example shows how to specify the delay period for the initialization of FHRP clients:
Device(config-if)# fhrp delay minimum 90
Related Commands
Command
Description
show fhrp
Displays First Hop Redundancy Protocol (FHRP)
information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
253
fhrp version vrrp v3
fhrp version vrrp v3
To enable Virtual Router Redundancy Protocol version 3 (VRRPv3) and Virtual Router Redundancy Service
(VRRS) configuration on a device, use the fhrp version vrrp v3 command in global configuration mode. To
disable the ability to configure VRRPv3 and VRRS on a device, use the no form of this command.
fhrp version vrrp v3
no fhrp version vrrp v3
Syntax Description
This command has no keywords or arguments.
Command Default
VRRPv3 and VRRS configuration on a device is not enabled.
Command Modes
Global configuration (config)
Usage Guidelines
When VRRPv3 is in use, VRRP version 2 (VRRPv2) is unavailable.
Examples
In the following example, a tracking process is configured to track the state of an IPv6 object using a VRRPv3
group. VRRP on GigabitEthernet interface 0/0/0 then registers with the tracking process to be informed of
any changes to the IPv6 object on the VRRPv3 group. If the IPv6 object state on serial interface VRRPv3
goes down, then the priority of the VRRP group is reduced by 20:
Device(config)# fhrp version vrrp v3
Device(config)# interface GigabitEthernet 0/0/0
Device(config-if)# vrrp 1 address-family ipv6
Device(config-if-vrrp)# track 1 decrement 20
Related Commands
Command
Description
track (VRRP)
Enables an object to be tracked using a VRRPv3
group.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
254
glbp authentication
glbp authentication
To configure an authentication string for the Gateway Load Balancing Protocol (GLBP), use the glbp
authentication command in interface configuration mode. To disable authentication, use the no form of this
command.
glbp group-numberauthentication {text string| md5 {key-string [0| 7] key| key-chain name-of-chain}}
no glbp group-number authentication {text string| md5 {key-string [0| 7] key| key-chain name-of-chain}}
Syntax Description
group-number
text
GLBP group number in the range from 0 to 1023.
string
Specifies an authentication string. The number of
characters in the command plus the text string must
not exceed 255 characters.
md5
Message Digest 5 (MD5) authentication.
key-string key
Specifies the secret key for MD5 authentication. The
key string cannot exceed 100 characters in length.
We recommend using at least 16 characters.
0
(Optional) Unencrypted key. If no prefix is specified,
the key is unencrypted.
7
(Optional) Encrypted key.
key-chain name-of-chain
Identifies a group of authentication keys.
Command Default
No authentication of GLBP messages occurs.
Command Modes
Interface configuration (config-if)
Usage Guidelines
The same authentication method must be configured on all the devices that are configured to be members of
the same GLBP group, to ensure interoperation. A device will ignore all GLBP messages that contain the
wrong authentication information.
If password encryption is configured with the service password-encryption command, the software saves
the key string in the configuration as encrypted text.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
255
glbp authentication
Examples
The following example configures stringxyz as the authentication string required to allow GLBP devices in
group 10 to interoperate:
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# glbp 10 authentication text stringxyz
In the following example, GLBP queries the key chain “AuthenticateGLBP” to obtain the current live key and
key ID for the specified key chain:
Device(config)# key chain AuthenticateGLBP
Device(config-keychain)# key 1
Device(config-keychain-key)# key-string ThisIsASecretKey
Device(config-keychain-key)# exit
Device(config-keychain)# exit
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# ip address 10.0.0.1 255.255.255.0
Device(config-if)# glbp 2 authentication md5 key-chain AuthenticateGLBP
Related Commands
Command
Description
glbp ip
Enables GLBP.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
256
glbp forwarder preempt
glbp forwarder preempt
To configure a device to take over as active virtual forwarder (AVF) for a Gateway Load Balancing Protocol
(GLBP) group if the current AVF falls below its low weighting threshold, use the glbp forwarder preempt
command in interface configuration mode. To disable this function, use the no form of this command.
glbp group forwarder preempt [delay minimum seconds]
no glbp group forwarder preempt [delay minimum]
Syntax Description
group
GLBP group number in the range from 0 to 1023.
delay minimum seconds
(Optional) Specifies a minimum number of seconds
that the device will delay before taking over the role
of AVF. The range is from 0 to 3600 seconds with a
default delay of 30 seconds.
Command Default
Forwarder preemption is enabled with a default delay of 30 seconds.
Command Modes
Interface configuration (config-if)
Command History
Examples
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The following example shows a device being configured to preempt the current AVF when the current AVF
falls below its low weighting threshold. If the device preempts the current AVF, it waits 60 seconds before
taking over the role of the AVF.
Device(config-if)# glbp 10 forwarder preempt delay minimum 60
Related Commands
Command
Description
glbp ip
Enables GLBP.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
257
glbp ip
glbp ip
To activate the Gateway Load Balancing Protocol (GLBP), use the glbp ip command in interface configuration
mode. To disable GLBP, use the no form of this command.
glbp group ip [ip-address [secondary]]
no glbp group ip [ip-address [secondary]]
Syntax Description
group
GLBP group number in the range from 0 to 1023.
ip-address
(Optional) Virtual IP address for the GLBP group.
The IP address must be in the same subnet as the
interface IP address.
secondary
(Optional) Indicates that the IP address is a secondary
GLBP virtual address.
Command Default
GLBP is disabled by default.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The glbp ip command activates GLBP on the configured interface. If an IP address is specified, that address
is used as the designated virtual IP address for the GLBP group. If no IP address is specified, the designated
address is learned from another device configured to be in the same GLBP group. For GLBP to elect an active
virtual gateway (AVG), at least one device on the cable must have been configured with the designated address.
A device must be configured with, or have learned, the virtual IP address of the GLBP group before assuming
the role of a GLBP gateway or forwarder. Configuring the designated address on the AVG always overrides
a designated address that is in use.
When the glbp ip command is enabled on an interface, the handling of proxy Address Resolution Protocol
(ARP) requests is changed (unless proxy ARP was disabled). ARP requests are sent by hosts to map an IP
address to a MAC address. The GLBP gateway intercepts the ARP requests and replies to the ARP on behalf
of the connected nodes. If a forwarder in the GLBP group is active, proxy ARP requests are answered using
the MAC address of the first active forwarder in the group. If no forwarder is active, proxy ARP responses
are suppressed.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
258
glbp ip
Examples
The following example activates GLBP for group 10 on GigabitEthernet interface 1/0/1. The virtual IP address
to be used by the GLBP group is set to 10.21.8.10.
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# ip address 10.21.8.32 255.255.255.0
Device(config-if)# glbp 10 ip 10.21.8.10
Related Commands
Command
Description
show glbp
Displays GLBP information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
259
glbp load-balancing
glbp load-balancing
To specify the load-balancing method used by the active virtual gateway (AVG) of the Gateway Load Balancing
Protocol (GLBP), use the glbp load-balancing command in interface configuration mode. To disable load
balancing, use the no form of this command.
glbp group load-balancing [host-dependent| round-robin| weighted]
no glbp group load-balancing
Syntax Description
group
GLBP group number in the range from 0 to 1023.
host-dependent
(Optional) Specifies a load balancing method based
on the MAC address of a host where the same
forwarder is always used for a particular host while
the number of GLBP group members remains
unchanged.
round-robin
(Optional) Specifies a load balancing method where
each virtual forwarder in turn is included in address
resolution replies for the virtual IP address. This
method is the default.
weighted
(Optional) Specifies a load balancing method that is
dependent on the weighting value advertised by the
gateway.
Command Default
The round-robin method is the default.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Use the host-dependent method of GLBP load balancing when you need each host to always use the same
device. Use the weighted method of GLBP load balancing when you need unequal load balancing because
devices in the GLBP group have different forwarding capacities.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
260
glbp load-balancing
Examples
The following example shows the host-dependent load-balancing method being configured for the AVG of
the GLBP group 10:
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# glbp 10 ip 10.21.8.10
Device(config-if)# glbp 10 load-balancing host-dependent
Related Commands
Command
Description
show glbp
Displays GLBP information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
261
glbp name
glbp name
To enable IP redundancy by assigning a name to the Gateway Load Balancing Protocol (GLBP) group, use
the glbp name command in interface configuration mode. To disable IP redundancy for a group, use the no
form of this command.
glbp group-number name group-name
no glbp group-number name group-name
Syntax Description
group-number
GLBP group number. Range is from 0 to 1023.
group-name
GLBP group name specified as a character string.
Maximum number of characters is 255.
Command Default
IP redundancy for a group is disabled.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
The GLBP redundancy client must be configured with the same GLBP group name so that the redundancy
client and the GLBP group can be connected.
Examples
The following example assigns the abccomp name to GLBP group 10:
Device(config-if)# glbp 10 name abccomp
Related Commands
Command
Description
glbp authentication
Configures an authentication string for the GLBP.
glbp forwarder preempt
Configures a device to take over as AVF for a GLBP
group if it has higher priority than the current AVF.
glbp ip
Activates GLBP.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
262
glbp name
Command
Description
glbp load-balancing
Specifies the load-balancing method used by the AVG
of GLBP.
glbp preempt
Configures the gateway to take over as AVG for a
GLBP group if it has higher priority than the current
AVG.
glbp priority
Sets the priority level of the gateway within a GLBP
group.
glbp timers
Configures the time between hello packets sent by
the GLBP gateway and the time for which the virtual
gateway and virtual forwarder information is
considered valid.
glbp timers redirect
Configures the time during which the AVG for a
GLBP group continues to redirect clients to a
secondary AVF.
glbp weighting
Specifies the initial weighting value of the GLBP
gateway.
glbp weighting track
Specifies a tracking object where the GLBP weighting
changes based on the availability of the object being
tracked.
show glbp
Displays GLBP information.
track
Configures an interface to be tracked where the GLBP
weighting changes based on the state of the interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
263
glbp preempt
glbp preempt
To configure the gateway to take over as active virtual gateway (AVG) for a Gateway Load Balancing Protocol
(GLBP) group if it has higher priority than the current AVG, use the glbp preempt command in interface
configuration mode. To disable this function, use the no form of this command.
glbp group preempt [delay minimum seconds]
no glbp group preempt [delay minimum]
Syntax Description
group
GLBP group number in the range from 0 to 1023.
delay minimum seconds
(Optional) Specifies a minimum number of seconds
that the device will delay before taking over the role
of AVG. The range is from 0 to 3600 seconds with a
default delay of 30 seconds.
Command Default
A GLBP device with a higher priority than the current AVG cannot assume the role of AVG. The default
delay value is 30 seconds.
Command Modes
Interface configuration (config-if)
Command History
Examples
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The following example shows a device being configured to preempt the current AVG when its priority of 254
is higher than that of the current AVG. If the device preempts the current AVG, it waits 60 seconds before
assuming the role of AVG.
Device(config-if)# glbp 10 preempt delay minimum 60
Device(config-if)# glbp 10 priority 254
Related Commands
Command
Description
glbp ip
Enables GLBP.
glbp priority
Sets the priority level of the device within a GLBP
group.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
264
glbp priority
glbp priority
To set the priority level of the gateway within a Gateway Load Balancing Protocol (GLBP) group, use the
glbp priority command in interface configuration mode. To remove the priority level of the gateway, use the
no form of this command.
glbp group priority level
no glbp group priority level
Syntax Description
group
GLBP group number in the range from 0 to 1023.
level
Priority of the gateway within the GLBP group. The
range is from 1 to 255. The default is 100.
Command Default
The GLBP virtual gateway preemptive scheme is disabled
Command Modes
Interface configuration (config-if)
Usage Guidelines
Use this command to control which virtual gateway becomes the active virtual gateway (AVG). After the
priorities of several different virtual gateways are compared, the gateway with the numerically higher priority
is elected as the AVG. If two virtual gateways have equal priority, the gateway with the higher IP address is
selected.
Examples
The following example shows a virtual gateway being configured with a priority of 254:
Device(config-if)# glbp 10 priority 254
Related Commands
Command
Description
glbp ip
Enables GLBP.
glbp preempt
Configures a device to take over as the AVG for a
GLBP group if it has higher priority than the current
AVG.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
265
glbp timers
glbp timers
To configure the time between hello packets sent by the Gateway Load Balancing Protocol (GLBP) gateway
and the time that the virtual gateway and virtual forwarder information is considered valid, use the glbp timers
command in interface configuration mode. To restore the timers to their default values, use the no form of
this command.
glbp group timers {hellotime{holdtime | msec holdtime} | msec { holdtime | msec holdtime} | redirect
time-interval-to-redirect | timeout}
no glbp group timers {hellotime{holdtime | msec holdtime} | msec { holdtime | msec holdtime} | redirect
time-interval-to-redirect | timeout}
Syntax Description
group
GLBP group number in the range from 0 to 1023.
msec
(Optional) Specifies that the following (hellotime or
holdtime) argument value will be expressed in
milliseconds rather than seconds.
hellotime
Hello interval. The default is 3 seconds (3000
milliseconds).
holdtime
Time before the virtual gateway and virtual forwarder
information contained in the hello packet is
considered invalid. The default is 10 seconds (10,000
milliseconds).
redirect
Specifies time interval during which the active virtual
gateway (AVG) for a Gateway Load Balancing
Protocol (GLBP) group continues to redirect clients
to a secondary active virtual forwarder (AVF) and
time-out values for failed forwarders.
time-interval-to-redirect
The redirect timer interval in the range from 0 to 3600
seconds. The default is 600 seconds (10 minutes).
Note
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
266
The zero value for the
time-interval-to-redirect argument cannot be
removed from the range of acceptable values
because preexisting configurations of Cisco
IOS software already using the zero value
could be negatively affected during an
upgrade. However, be advised that a zero
setting is not recommended
andtime-interval-to-redirect, if used, results
in a redirect timer that never expires. If the
redirect timer does not expire, then when a
device fails, new hosts continue to be
assigned to the failed device instead of being
redirected to the backup.
glbp timers
timeout
The time interval, in the range from 600 to 64,800
seconds, before the secondary virtual forwarder
becomes unavailable. The default is 14,400 seconds
(4 hours).
Command Default
GLBP timers are set to their default values.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
Devices on which timer values are not configured can learn timer values from the active virtual gateway
(AVG). The timers configured on the AVG always override any other timer settings. All devices in a GLBP
group should use the same timer values. If a GLBP gateway sends a hello message, the information should
be considered valid for one holdtime. Normally, holdtime is greater than three times the value of hello time,
(holdtime > 3 * hellotime). The range of values for holdtime force the holdtime to be greater than the hello
time.
Examples
The following example shows the GLBP group 10 on GigabitEthernet interface 1/0/1 timers being configured
for an interval of 5 seconds between hello packets, and the time after which virtual gateway and virtual
forwarder information is considered to be invalid to 18 seconds:
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# glbp 10 ip
Device(config-if)# glbp 10 timers 5 18
Related Commands
Command
Description
glbp ip
Activates GLBP.
show glbp
Displays GLBP information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
267
glbp weighting
glbp weighting
To specify the initial weighting value of the Gateway Load Balancing Protocol (GLBP) gateway, use the glbp
weighting command in interface configuration mode. To restore the default values, use the noform of this
command.
glbp group weighting maximum [lower lower] [upper upper]
no glbp group weighting
Syntax Description
group
GLBP group number in the range from 0 to 1023.
maximum
Maximum weighting value in the range from 1 to
254. Default value is 100.
lower
lower
(Optional) Specifies a lower weighting value in the
range from 1 to the specified maximum weighting
value. Default value is 1.
upper
upper
(Optional) Specifies an upper weighting value in the
range from the lower weighting to the maximum
weighting value. The default value is the specified
maximum weighting value.
Command Default
The default gateway weighting value is 100 and the default lower weighting value is 1.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The weighting value of a virtual gateway is a measure of the forwarding capacity of the gateway. If a tracked
interface on the device fails, the weighting value of the device may fall from the maximum value to below
the lower threshold, causing the device to give up its role as a virtual forwarder. When the weighting value
of the device rises above the upper threshold, the device can resume its active virtual forwarder role.
Use the glbp weighting track and track commands to configure parameters for an interface to be tracked.
If an interface on a device goes down, the weighting for the device can be reduced by a specified value.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
268
glbp weighting
Examples
The following example shows the weighting of the gateway for GLBP group 10 being set to a maximum of
110 with a lower weighting limit of 95 and an upper weighting limit of 105:
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# ip address 10.21.8.32 255.255.255.0
Device(config-if)# glbp 10 weighting 110 lower 95 upper 105
Related Commands
Command
Description
glbp weighting track
Specifies an object to be tracked that affects the
weighting of a GLBP gateway.
track
Configures an interface to be tracked.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
269
glbp weighting track
glbp weighting track
To specify a tracking object where the Gateway Load Balancing Protocol (GLBP) weighting changes based
on the availability of the object being tracked, use the glbp weighting track command in interface configuration
mode. To remove the tracking, use the no form of this command.
glbp group weighting track object-number [decrement value]
no glbp group weighting track object-number [decrement value]
Syntax Description
group
GLBP group number in the range from 0 to 1023.
object-number
Object number representing an item to be tracked.
The valid range is 1 to 1000. Use the track command
to configure the tracked object.
decrement value
(Optional) Specifies an amount by which the GLBP
weighting for the device is decremented (or
incremented) when the interface goes down (or comes
back up). The value range is from 1 to 254, with a
default value of 10.
Command Default
Objects are not tracked for GLBP weighting changes.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
This command ties the weighting of the GLBP gateway to the availability of its interfaces. It is useful for
tracking interfaces that are not configured for GLBP.
When a tracked interface goes down, the GLBP gateway weighting decreases by 10. If an interface is not
tracked, its state changes do not affect the GLBP gateway weighting. For each GLBP group, you can configure
a separate list of interfaces to be tracked.
The optional value argument specifies by how much to decrement the GLBP gateway weighting when a
tracked interface goes down. When the tracked interface comes back up, the weighting is incremented by the
same amount.
When multiple tracked interfaces are down, the configured weighting decrements are cumulative.
Use the track command to configure each interface to be tracked.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
270
glbp weighting track
A maximum of 1000 objects can be tracked. Although 1000 tracked objects can be configured, each tracked
object uses CPU resources. The amount of available CPU resources on a device is dependent upon variables
such as traffic load and how other protocols are configured and run. The ability to use 1000 tracked objects
is dependent upon the available CPU. Testing should be conducted on site to ensure that the service works
under the specific site traffic conditions.
Examples
In the following example, GigabitEthernet interface 1/0/1 tracks two interfaces represented by the numbers
1 and 2. If interface 1 goes down, the GLBP gateway weighting decreases by the default value of 10. If
interface 2 goes down, the GLBP gateway weighting decreases by 5.
Device(config)# interface GigabitEthernet 1/0/1
Device(config-if)# ip address 10.21.8.32 255.255.255.0
Device(config-if)# glbp 10 weighting track 1
Device(config-if)# glbp 10 weighting track 2 decrement 5
Related Commands
Command
Description
glbp weighting
Specifies the initial weighting value of a GLBP
gateway.
track
Configures an interface to be tracked.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
271
ip address dhcp
ip address dhcp
To acquire an IP address on an interface from the DHCP, use the ip address dhcpcommand in interface
configuration mode. To remove any address that was acquired, use the no form of this command.
ip address dhcp [client-id interface-type number] [hostname hostname]
no ip address dhcp [client-id interface-type number] [hostname hostname]
Syntax Description
client-id
(Optional) Specifies the client identifier. By default,
the client identifier is an ASCII value. The client-id
interface-type numberoption sets the client identifier
to the hexadecimal MAC address of the named
interface.
interface-type
(Optional) Interface type. For more information, use
the question mark (?) online help function.
number
(Optional) Interface or subinterface number. For more
information about the numbering syntax for your
networking device, use the question mark (?) online
help function.
hostname
(Optional) Specifies the hostname.
hostname
(Optional) Name of the host to be placed in the DHCP
option 12 field. This name need not be the same as
the hostname entered in global configuration mode.
Command Default
The hostname is the globally configured hostname of the device. The client identifier is an ASCII value.
Command Modes
Interface configuration (config-if)
Usage Guidelines
Note
Prior to Cisco IOS Release 12.2(8)T, the ip address dhcp command could be used only on Ethernet
interfaces.
The ip address dhcp command allows any interface to dynamically learn its IP address by using the DHCP
protocol. It is especially useful on Ethernet interfaces that dynamically connect to an Internet service provider
(ISP). Once assigned a dynamic address, the interface can be used with the Port Address Translation (PAT)
of Cisco IOS Network Address Translation (NAT) to provide Internet access to a privately addressed network
attached to the device.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
272
ip address dhcp
The ip address dhcp command also works with ATM point-to-point interfaces and will accept any
encapsulation type. However, for ATM multipoint interfaces you must specify Inverse ARP via the protocol
ip inarp interface configuration command and use only the aa15snap encapsulation type.
Some ISPs require that the DHCPDISCOVER message have a specific hostname and client identifier that is
the MAC address of the interface. The most typical usage of the ip address dhcp client-id interface-type
number hostname hostname command is when interface-typeis the Ethernet interface where the command
is configured and interface-type numberis the hostname provided by the ISP.
A client identifier (DHCP option 61) can be a hexadecimal or an ASCII value. By default, the client identifier
is an ASCII value. The client-id interface-type numberoption overrides the default and forces the use of the
hexadecimal MAC address of the named interface.
Note
Between Cisco IOS Releases 12.1(3)T and 12.2(3), the client-id optional keyword allows the change of
the fixed ASCII value for the client identifier. After Release 12.2(3), the optional client-id keyword forces
the use of the hexadecimal MAC address of the named interface as the client identifier.
If a Cisco device is configured to obtain its IP address from a DHCP server, it sends a DHCPDISCOVER
message to provide information about itself to the DHCP server on the network.
If you use the ip address dhcp command with or without any of the optional keywords, the DHCP option 12
field (hostname option) is included in the DISCOVER message. By default, the hostname specified in option
12 will be the globally configured hostname of the device. However, you can use the ip address dhcp hostname
hostname command to place a different name in the DHCP option 12 field than the globally configured
hostname of the device.
The no ip address dhcp command removes any IP address that was acquired, thus sending a DHCPRELEASE
message.
You might need to experiment with different configurations to determine the one required by your DHCP
server. The table below shows the possible configuration methods and the information placed in the DISCOVER
message for each method.
Table 18: Configuration Method and Resulting Contents of the DISCOVER Message
Configuration Method
Contents of DISCOVER Messages
ip address dhcp
The DISCOVER message contains “ciscomac-address -Eth1” in the client ID field. The
mac-address is the MAC address of the Ethernet 1
interface and contains the default hostname of the
device in the option 12 field.
ip address dhcp hostname hostname
The DISCOVER message contains “ciscomac-address -Eth1” in the client ID field. The
mac-address is the MAC address of the Ethernet 1
interface, and contains hostname in the option 12
field.
ip address dhcp client-id ethernet 1
The DISCOVER message contains the MAC address
of the Ethernet 1 interface in the client ID field and
contains the default hostname of the device in the
option 12 field.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
273
ip address dhcp
Examples
Configuration Method
Contents of DISCOVER Messages
ip address dhcp client-id ethernet 1 hostname
hostname
The DISCOVER message contains the MAC address
of the Ethernet 1 interface in the client ID field and
contains hostname in the option 12 field.
In the examples that follow, the command ip address dhcp is entered for Ethernet interface 1. The DISCOVER
message sent by a device configured as shown in the following example would contain “cisco- mac-address
-Eth1” in the client-ID field, and the value abc in the option 12 field.
hostname abc
!
interface GigabitEthernet 1/0/1
ip address dhcp
The DISCOVER message sent by a device configured as shown in the following example would contain
“cisco- mac-address -Eth1” in the client-ID field, and the value def in the option 12 field.
hostname abc
!
interface GigabitEthernet 1/0/1
ip address dhcp hostname def
The DISCOVER message sent by a device configured as shown in the following example would contain the
MAC address of Ethernet interface 1 in the client-id field, and the value abc in the option 12 field.
hostname abc
!
interface Ethernet 1
ip address dhcp client-id GigabitEthernet 1/0/1
The DISCOVER message sent by a device configured as shown in the following example would contain the
MAC address of Ethernet interface 1 in the client-id field, and the value def in the option 12 field.
hostname abc
!
interface Ethernet 1
ip address dhcp client-id GigabitEthernet 1/0/1 hostname def
Related Commands
Command
Description
ip dhcp pool
Configures a DHCP address pool on a Cisco IOS
DHCP server and enters DHCP pool configuration
mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
274
ip address pool (DHCP)
ip address pool (DHCP)
To enable the IP address of an interface to be automatically configured when a Dynamic Host Configuration
Protocol (DHCP) pool is populated with a subnet from IP Control Protocol (IPCP) negotiation, use the ip
address pool command in interface configuration mode. To disable autoconfiguring of the IP address of the
interface, use the no form of this command.
ip address pool name
no ip address pool
Syntax Description
name
Name of the DHCP pool. The IP address of the
interface will be automatically configured from the
DHCP pool specified in name.
Command Default
IP address pooling is disabled.
Command Modes
Interface configuration
Usage Guidelines
Use this command to automatically configure the IP address of a LAN interface when there are DHCP clients
on the attached LAN that should be serviced by the DHCP pool on the device. The DHCP pool obtains its
subnet dynamically through IPCP subnet negotiation.
Examples
The following example specifies that the IP address of GigabitEthernet interface 1/0/1 will be automatically
configured from the address pool named abc:
ip dhcp pool abc
import all
origin ipcp
!
interface GigabitEthernet 1/0/1
ip address pool abc
Related Commands
Command
Description
show ip interface
Displays the usability status of interfaces configured
for IP.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
275
ip address
ip address
To set a primary or secondary IP address for an interface, use the ip address command in interface configuration
mode. To remove an IP address or disable IP processing, use the noform of this command.
ip address ip-address mask [secondary [vrf vrf-name]]
no ip address ip-address mask [secondary [vrf vrf-name]]
Syntax Description
ip-address
IP address.
mask
Mask for the associated IP subnet.
secondary
(Optional) Specifies that the configured address is a
secondary IP address. If this keyword is omitted, the
configured address is the primary IP address.
Note
vrf
Command Default
No IP address is defined for the interface.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
If the secondary address is used for a VRF
table configuration with the vrf keyword,
the vrf keyword must be specified also.
(Optional) Name of the VRF table. The vrf-name
argument specifies the VRF name of the ingress
interface.
Release
Modification
Cisco IOS XE Release 2.1
This command was introduced.
An interface can have one primary IP address and multiple secondary IP addresses. Packets generated by the
Cisco IOS software always use the primary IP address. Therefore, all devices and access servers on a segment
should share the same primary network number.
Hosts can determine subnet masks using the Internet Control Message Protocol (ICMP) mask request message.
Devices respond to this request with an ICMP mask reply message.
You can disable IP processing on a particular interface by removing its IP address with the no ip address
command. If the software detects another host using one of its IP addresses, it will print an error message on
the console.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
276
ip address
The optional secondary keyword allows you to specify an unlimited number of secondary addresses. Secondary
addresses are treated like primary addresses, except the system never generates datagrams other than routing
updates with secondary source addresses. IP broadcasts and Address Resolution Protocol (ARP) requests are
handled properly, as are interface routes in the IP routing table.
Secondary IP addresses can be used in a variety of situations. The following are the most common applications:
• There may not be enough host addresses for a particular network segment. For example, your subnetting
allows up to 254 hosts per logical subnet, but on one physical subnet you need 300 host addresses. Using
secondary IP addresses on the devices or access servers allows you to have two logical subnets using
one physical subnet.
• Many older networks were built using Level 2 bridges. The judicious use of secondary addresses can
aid in the transition to a subnetted, device-based network. Devices on an older, bridged segment can be
easily made aware that many subnets are on that segment.
• Two subnets of a single network might otherwise be separated by another network. This situation is not
permitted when subnets are in use. In these instances, the first network is extended, or layered on top of
the second network using secondary addresses.
Note
If any device on a network segment uses a secondary address, all other devices on that same segment must
also use a secondary address from the same network or subnet. Inconsistent use of secondary addresses
on a network segment can very quickly cause routing loops.
Note
When you are routing using the Open Shortest Path First (OSPF) algorithm, ensure that all secondary
addresses of an interface fall into the same OSPF area as the primary addresses.
To transparently bridge IP on an interface, you must perform the following two tasks:
• Disable IP routing (specify the no ip routing command).
• Add the interface to a bridge group, see the bridge-group command.
To concurrently route and transparently bridge IP on an interface, see the bridge crbcommand.
Examples
In the following example, 192.108.1.27 is the primary address and 192.31.7.17 and 192.31.8.17 are secondary
addresses for GigabitEthernet interface 1/0/1:
interface GigabitEthernet 1/0/1
ip address 192.108.1.27 255.255.255.0
ip address 192.31.7.17 255.255.255.0 secondary
Related Commands
Command
Description
match ip route-source
Specifies a source IP address to match to required
route maps that have been set up based on VRF
connected routes.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
277
ip address
Command
Description
route-map
Defines the conditions for redistributing routes from
one routing protocol into another, or to enable policy
routing.
set vrf
Enables VPN VRF selection within a route map for
policy-based routing VRF selection.
show ip arp
Displays the ARP cache, in which SLIP addresses
appear as permanent ARP table entries.
show ip interface
Displays the usability status of interfaces configured
for IP.
show route-map
Displays static and dynamic route maps.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
278
key chain
key chain
To define an authentication key chain needed to enable authentication for routing protocols and enter key-chain
configuration mode, use the key chain command in global configuration mode. To remove the key chain, use
the no form of this command.
key chain name-of-chain
no key chain name-of-chain
Syntax Description
name-of-chain
Name of a key chain. A key chain must have at least
one key and can have up to 2147483647 keys.
Command Default
No key chain exists.
Command Modes
Global configuration (config)
Usage Guidelines
You must configure a key chain with keys to enable authentication.
Although you can identify multiple key chains, we recommend using one key chain per interface per routing
protocol. Upon specifying the key chain command, you enter key chain configuration mode.
Examples
The following example shows how to specify key chain:
Device(config-keychain-key)# key-string chestnut
Related Commands
Command
Description
accept-lifetime
Sets the time period during which the authentication
key on a key chain is received as valid.
key
Identifies an authentication key on a key chain.
key-string (authentication)
Specifies the authentication string for a key.
send-lifetime
Sets the time period during which an authentication
key on a key chain is valid to be sent.
show key chain
Displays authentication key information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
279
key-string (authentication)
key-string (authentication)
To specify the authentication string for a key, use the key-string(authentication) command in key chain key
configuration mode. To remove the authentication string, use the no form of this command.
key-string key-string text
no key-string text
Syntax Description
text
Authentication string that must be sent and received
in the packets using the routing protocol being
authenticated. The string can contain from 1 to 80
uppercase and lowercase alphanumeric characters.
Command Default
No authentication string for a key exists.
Command Modes
Key chain key configuration (config-keychain-key)
Examples
The following example shows how to specify the authentication string for a key:
Device(config-keychain-key)# key-string key1
Related Commands
Command
Description
accept-lifetime
Sets the time period during which the authentication
key on a key chain is received as valid.
key
Identifies an authentication key on a key chain.
key chain
Defines an authentication key-chain needed to enable
authentication for routing protocols.
send-lifetime
Sets the time period during which an authentication
key on a key chain is valid to be sent.
show key chain
Displays authentication key information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
280
key
key
To identify an authentication key on a key chain, use the key command in key-chain configuration mode. To
remove the key from the key chain, use the no form of this command.
key key-id
no key key-id
Syntax Description
key-id
Identification number of an authentication key on a
key chain. The range of keys is from 0 to
2147483647. The key identification numbers need
not be consecutive.
Command Default
No key exists on the key chain.
Command Modes
Key-chain configuration (config-keychain)
Usage Guidelines
It is useful to have multiple keys on a key chain so that the software can sequence through the keys as they
become invalid after time, based on the accept-lifetime and send-lifetime key chain key command settings.
Each key has its own key identifier, which is stored locally. The combination of the key identifier and the
interface associated with the message uniquely identifies the authentication algorithm and Message Digest 5
(MD5) authentication key in use. Only one authentication packet is sent, regardless of the number of valid
keys. The software starts looking at the lowest key identifier number and uses the first valid key.
If the last key expires, authentication will continue and an error message will be generated. To disable
authentication, you must manually delete the last valid key.
To remove all keys, remove the key chain by using the no key chain command.
Examples
The following example shows how to specify a key to identify authentication on a key-chain:
Device(config-keychain)# key 1
Related Commands
Command
Description
accept-lifetime
Sets the time period during which the authentication
key on a key chain is received as valid.
key chain
Defines an authentication key chain needed to enable
authentication for routing protocols.
key-string (authentication)
Specifies the authentication string for a key.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
281
key
Command
Description
send-lifetime
Sets the time period during which an authentication
key on a key chain is valid to be sent.
show key chain
Displays authentication key information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
282
show glbp
show glbp
To display Gateway Load Balancing Protocol (GLBP) information, use the show glbp command in privileged
EXEC mode.
capability [interface-type interface-number]interface-type interface-number [ group-number ] [ state ] [brief]
Syntax Description
Command Modes
Command History
capability
(Optional) Displays the GLBP capability interfaces.
interface-type interface-number
(Optional) Interface type and number for which output
is displayed.
group-number
(Optional) GLBP group number in the range from 0
to 1023.
state
(Optional) State of the GLBP device, one of the
following: active, disabled, init, listen, and standby.
brief
(Optional) Summarizes each virtual gateway or virtual
forwarder with a single line of output.
Privileged EXEC (#)
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
Use the show glbp command to display information about GLBP groups on a device. The brief keyword
displays a single line of information about each virtual gateway or virtual forwarder. The capability keyword
displays all GLBP-capable interfaces.
Examples
The following is sample output from the show glbp command that displays GLBP group 10:
Device# show glbp GigabitEthernet 1/0/1 10
GigabitEthernet1/0/1 - Group 10
State is Active
1 state change, last state change 00:04:52
Virtual IP address is 10.21.8.10
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.608 secs
Redirect time 600 sec, forwarder time-out 14400 sec
Preemption disabled
Active is local
Standby is unknown
Priority 100 (default)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
283
show glbp
Weighting 100 (default 100), thresholds: lower 1, upper 100
Load balancing: round-robin
Group members:
ac7e.8a35.6364 (10.21.8.32) local
There is 1 forwarder (1 active)
Forwarder 1
State is Active
1 state change, last state change 00:04:41
MAC address is 0007.b400.0a01 (default)
Owner ID is ac7e.8a35.6364
Redirection enabled
Preemption enabled, min delay 30 sec
Active is local, weighting 100
The table below describes the significant fields shown in the displays.
Table 19: show glbp Field Descriptions
Field
Description
GigabitEthernet1/0/1 - Group
Interface type and number and GLBP group number
for the interface.
State is
State of the virtual gateway or virtual forwarder. For
a virtual gateway, the state can be one of the
following:
• Active--The gateway is the active virtual
gateway (AVG) and is responsible for
responding to Address Resolution Protocol
(ARP) requests for the virtual IP address.
• Disabled--The virtual IP address has not been
configured or learned yet, but another GLBP
configuration exists.
• Initial--The virtual IP address has been
configured or learned, but virtual gateway
configuration is not complete. An interface must
be up and configured to route IP, and an
interface IP address must be configured.
• Listen--The virtual gateway is receiving hello
packets and is ready to change to the “speak”
state if the active or standby virtual gateway
becomes unavailable.
• Speak--The virtual gateway is attempting to
become the active or standby virtual gateway.
• Standby--The gateway is next in line to be the
AVG.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
284
show glbp
Field
Description
Virtual IP address is
The virtual IP address of the GLBP group. All
secondary virtual IP addresses are listed on separate
lines. If one of the virtual IP addresses is a duplicate
of an address configured for another device, it will
be marked as “duplicate.” A duplicate address
indicates that the device has failed to defend its ARP
cache entry.
Hello time, hold time
The hello time is the time between hello packets (in
seconds or milliseconds). The hold time is the time
(in seconds or milliseconds) before other devices
declare the active device to be down. All devices in
a GLBP group use the hello- and hold-time values of
the current AVG. If the locally configured values are
different, the configured values appear in parentheses
after the hello- and hold-time values.
Next hello sent in
The time until GLBP will send the next hello packet
(in seconds or milliseconds).
Preemption
Whether GLBP gateway preemption is enabled. If
enabled, the minimum delay is the time (in seconds)
for which a higher-priority nonactive device will wait
before preempting the lower-priority active device.
This field is also displayed under the forwarder
section where it indicates GLBP forwarder
preemption.
Active is
The active state of the virtual gateway. The value can
be “local,” “unknown,” or an IP address. The address
(and the expiration date of the address) is the address
of the current AVG.
This field is also displayed under the forwarder
section where it indicates the address of the current
AVF.
Standby is
The standby state of the virtual gateway. The value
can be “local,” “unknown,” or an IP address. The
address (and the expiration date of the address) is the
address of the standby gateway (the gateway that is
next in line to be the AVG).
Weighting
The initial weighting value with lower and upper
threshold values.
Track object
The list of objects that are being tracked and their
corresponding states.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
285
show glbp
Related Commands
Field
Description
IP redundancy name is
The name of the GLBP group.
Command
Description
glbp ip
Enables GLBP.
glbp timers
Configures the time between hello messages and the
time before other devices declare the active GLBP
device to be down.
glbp weighting track
Specifies an object to be tracked that affects the
weighting of a GLBP gateway.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
286
show key chain
show key chain
To display the keychain, use the show key chain command.
show key chain [name-of-chain]
Syntax Description
name-of-chain
(Optional) Name of the key chain to display, as named
in the key chain command.
Command Default
If the command is used without any parameters, then it lists out all the key chains.
Command Modes
Privileged EXEC (#)
Examples
The following is sample output from the show key chain command:
show key chain
Device# show key chain
Key-chain AuthenticationGLBP:
key 1 -- text "Thisisasecretkey"
accept lifetime (always valid)
send lifetime (always valid) Key-chain glbp2:
key 100 -- text "abc123"
accept lifetime (always valid)
send lifetime (always valid) -
Related Commands
- (always valid) [valid now]
(always valid) [valid now]
- (always valid) [valid now]
(always valid) [valid now]
Command
Description
key-string
Specifies the authentication string for a key.
send-lifetime
Sets the time period during which an authentication
key on a key chain is valid to be sent.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
287
show track
show track
To display information about objects that are tracked by the tracking process, use the show track command
in privileged EXEC mode.
show track [object-number [brief] | application [brief] | interface [brief] | ip[route [brief] | [sla [brief]] |
ipv6 [route [brief]] | list [route [brief]] | resolution [ip | ipv6] | stub-object [brief] | summary | timers]
Syntax Description
Command Modes
Command History
object-number
(Optional) Object number that represents the object
to be tracked. The range is from 1 to 1000.
brief
(Optional) Displays a single line of information
related to the preceding argument or keyword.
application
(Optional) Displays tracked application objects.
interface
(Optional) Displays tracked interface objects.
ip route
(Optional) Displays tracked IP route objects.
ip sla
(Optional) Displays tracked IP SLA objects.
ipv6 route
(Optional) Displays tracked IPv6 route objects.
list
(Optional) Displays the list of boolean objects.
resolution
(Optional) Displays resolution of tracked parameters.
summary
(Optional) Displays the summary of the specified
object.
timers
(Optional) Displays polling interval timers.
Privileged EXEC (#)
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
XE 3.10S
This command was modified. The output was enhanced to display
IPv6 route information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
288
show track
Usage Guidelines
Use this command to display information about objects that are tracked by the tracking process. When no
arguments or keywords are specified, information for all objects is displayed.
A maximum of 1000 objects can be tracked. Although 1000 tracked objects can be configured, each tracked
object uses CPU resources. The amount of available CPU resources on a device is dependent upon variables
such as traffic load and how other protocols are configured and run. The ability to use 1000 tracked objects
is dependent upon the available CPU. Testing should be conducted on site to ensure that the service works
under the specific site traffic conditions.
Examples
The following example shows information about the state of IP routing on the interface that is being tracked:
Device# show track 1
Track 1
Interface GigabitEthernet 1/0/1 ip routing
IP routing is Down (no IP addr)
1 change, last change 00:01:08
The table below describes the significant fields shown in the displays.
Table 20: show track Field Descriptions
Related Commands
Field
Description
Track
Object number that is being tracked.
Interface GigabitEthernet 1/0/1 ip routing
Interface type, interface number, and object that is
being tracked.
IP routing is
State value of the object, displayed as Up or Down.
If the object is down, the reason is displayed.
1 change, last change
Number of times that the state of a tracked object has
changed and the time (in hh:mm:ss ) since the last
change.
Command
Description
show track resolution
Displays the resolution of tracked parameters.
track interface
Configures an interface to be tracked and enters
tracking configuration mode.
track ip route
Tracks the state of an IP route and enters tracking
configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
289
track
track
To configure an interface to be tracked where the Gateway Load Balancing Protocol (GLBP) weighting
changes based on the state of the interface, use the track command in global configuration mode. To remove
the tracking, use the no form of this command.
track object-number interface type number {line-protocol| ip routing | ipv6 routing}
no track object-number interface type number {line-protocol| ip routing | ipv6 routing}
Syntax Description
object-number
Object number in the range from 1 to 1000
representing the interface to be tracked.
interface type number
Interface type and number to be tracked.
line-protocol
Tracks whether the interface is up.
ip routing
Tracks whether IP routing is enabled, an IP address
is configured on the interface, and the interface state
is up, before reporting to GLBP that the interface is
up.
ipv6 routing
Tracks whether IPv6 routing is enabled, an IP address
is configured on the interface, and the interface state
is up, before reporting to GLBP that the interface is
up.
Command Default
The state of the interfaces is not tracked.
Command Modes
Global configuration (config)
Usage Guidelines
Use the track command in conjunction with the glbp weighting and glbp weighting track commands to
configure parameters for an interface to be tracked. If a tracked interface on a GLBP device goes down, the
weighting for that device is reduced. If the weighting falls below a specified minimum, the device will lose
its ability to act as an active GLBP virtual forwarder.
A maximum of 1000 objects can be tracked. Although 1000 tracked objects can be configured, each tracked
object uses CPU resources. The amount of available CPU resources on a device is dependent upon variables
such as traffic load and how other protocols are configured and run. The ability to use 1000 tracked objects
is dependent upon the available CPU. Testing should be conducted on site to ensure that the service works
under the specific site traffic conditions.
Examples
In the following example, TenGigabitEthernet interface 0/0/1 tracks whether GigabitEthernet interfaces 1/0/1
and 1/0/3 are up. If either of the GigabitEthernet interface goes down, the GLBP weighting is reduced by the
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
290
track
default value of 10. If both GigabitEthernet interfaces go down, the GLBP weighting will fall below the lower
threshold and the device will no longer be an active forwarder. To resume its role as an active forwarder, the
device must have both tracked interfaces back up, and the weighting must rise above the upper threshold.
Device(config)# track 1 interface GigabitEthernet 1/0/1 line-protocol
Device(config-track)# exit
Device(config)# track 2 interface GigabitEthernet 1/0/3 line-protocol
Device(config-track)# exit
Device(config)# interface TenGigabitEthernet 0/0/1
Device(config-if)# ip address 10.21.8.32 255.255.255.0
Device(config-if)# glbp 10 weighting 110 lower 95 upper 105
Device(config-if)# glbp 10 weighting track 1
Device(config-if)# glbp 10 weighting track 2
Related Commands
Command
Description
glbp weighting
Specifies the initial weighting value of a GLBP
gateway.
glbp weighting track
Specifies an object to be tracked that affects the
weighting of a GLBP gateway.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
291
vrrp
vrrp
To create a Virtual Router Redundancy Protocol version 3 (VRRPv3) group and enter VRRPv3 group
configuration mode, use the vrrp. To remove the VRRPv3 group, use the no form of this command.
vrrp group-id address-family {ipv4 | ipv6}
no vrrp group-id address-family {ipv4 | ipv6}
Syntax Description
group-id
Virtual router group number. The range is from 1 to
255.
address-family
Specifies the address-family for this VRRP group.
ipv4
(Optional) Specifies IPv4 address.
ipv6
(Optional) Specifies IPv6 address.
Command Default
None
Command Modes
Interface configuration (config-if)
Usage Guidelines
Examples
The following example shows how to create a VRRPv3 group and enter VRRP configuration mode:
Device(config-if)# vrrp 3 address-family ipv4
Related Commands
Command
Description
timers advertise
Sets the advertisement timer in milliseconds.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
292
vrrp description
vrrp description
To assign a description to the Virtual Router Redundancy Protocol (VRRP) group, use the vrrp description
command in interface configuration mode. To remove the description, use the no form of this command.
description text
no description
Syntax Description
text
Text (up to 80 characters) that describes the purpose
or use of the group.
Command Default
There is no description of the VRRP group.
Command Modes
VRRP configuration (config-if-vrrp)
Command History
Examples
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The following example enables VRRP. VRRP group 1 is described as Building A – Marketing and
Administration.
Device(config-if-vrrp)# description Building A - Marketing and Administration
Related Commands
Command
Description
vrrp
Creates a VRRPv3 group and enters VRRPv3 group
configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
293
vrrp preempt
vrrp preempt
To configure the device to take over as master virtual router for a Virtual Router Redundancy Protocol (VRRP)
group if it has higher priority than the current master virtual router, use the preempt command in VRRP
configuration mode. To disable this function, use the no form of this command.
preempt [delay minimum seconds]
no preempt
Syntax Description
delay minimum seconds
Command Default
This command is enabled.
Command Modes
VRRP configuration (config-if-vrrp)
Command History
Usage Guidelines
Note
Examples
(Optional) Number of seconds that the device will
delay before issuing an advertisement claiming master
ownership. The default delay is 0 seconds.
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
By default, the device being configured with this command will take over as master virtual router for the
group if it has a higher priority than the current master virtual router. You can configure a delay, which will
cause the VRRP device to wait the specified number of seconds before issuing an advertisement claiming
master ownership.
The device that is the IP address owner will preempt, regardless of the setting of this command.
The following example configures the device to preempt the current master virtual router when its priority of
200 is higher than that of the current master virtual router. If the device preempts the current master virtual
router, it waits 15 seconds before issuing an advertisement claiming it is the master virtual router.
Device(config-if-vrrp)#preempt delay minimum 15
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
294
vrrp preempt
Related Commands
Command
Description
vrrp
Creates a VRRPv3 group and enters VRRPv3 group
configuration mode.
priority
Sets the priority level of the device within a VRRP
group.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
295
vrrp priority
vrrp priority
To set the priority level of the device within a Virtual Router Redundancy Protocol (VRRP) group, use the
priority command in interface configuration mode. To remove the priority level of the device, use the no
form of this command.
priority level
no priority level
Syntax Description
level
Priority of the device within the VRRP group. The
range is from 1 to 254. The default is 100.
Command Default
The priority level is set to the default value of 100.
Command Modes
VRRP configuration (config-if-vrrp)
Command History
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
Usage Guidelines
Use this command to control which device becomes the master virtual router.
Examples
The following example configures the device with a priority of 254:
Device(config-if-vrrp)# priority 254
Related Commands
Command
Description
vrrp
Creates a VRRPv3 group and enters VRRPv3 group
configuration mode.
vrrp preempt
Configures the device to take over as master virtual
router for a VRRP group if it has higher priority than
the current master virtual router.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
296
vrrp timers advertise
vrrp timers advertise
To configure the interval between successive advertisements by the master virtual router in a Virtual Router
Redundancy Protocol (VRRP) group, use the timers advertise command in VRRP configuration mode. To
restore the default value, use the no form of this command.
timers advertise [msec] interval
no timers advertise [msec] interval
Syntax Description
group
Virtual router group number. The group number range
is from 1 to 255.
msec
(Optional) Changes the unit of the advertisement time
from seconds to milliseconds. Without this keyword,
the advertisement interval is in seconds.
interval
Time interval between successive advertisements by
the master virtual router. The unit of the interval is
in seconds, unless the msec keyword is specified. The
default is 1 second. The valid range is 1 to 255
seconds. When the msec keyword is specified, the
valid range is 50 to 999 milliseconds.
Command Default
The default interval of 1 second is configured.
Command Modes
VRRP configuration (config-if-vrrp)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The advertisements being sent by the master virtual router communicate the state and priority of the current
master virtual router.
The vrrp timers advertise command configures the time between successive advertisement packets and the
time before other routers declare the master router to be down. Routers or access servers on which timer values
are not configured can learn timer values from the master router. The timers configured on the master router
always override any other timer settings. All routers in a VRRP group must use the same timer values. If the
same timer values are not set, the devices in the VRRP group will not communicate with each other and any
misconfigured device will change its state to master.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
297
vrrp timers advertise
Examples
The following example shows how to configure the master virtual router to send advertisements every 4
seconds:
Device(config-if-vrrp)# timers advertise 4
Related Commands
Command
Description
vrrp
Creates a VRRPv3 group and enters VRRPv3 group
configuration mode.
timers learn
Configures the device, when it is acting as backup
virtual router for a VRRP group, to learn the
advertisement interval used by the master virtual
router.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
298
vrrs leader
vrrs leader
To specify a leader’s name to be registered with Virtual Router Redundancy Service (VRRS), use the vrrs
leader command. To remove the specified VRRS leader, use the no form of this command.
vrrs leader vrrs-leader-name
no vrrs leader vrrs-leader-name
Syntax Description
vrrs-leader-name
Name of VRRS Tag to lead.
Command Default
A registered VRRS name is unavailable by default.
Command Modes
VRRP configuration (config-if-vrrp)
Command History
Examples
Release
Modification
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
The following example specifies a leader's name to be registered with VRRS:
Device(config-if-vrrp)# vrrs leader leader-1
Related Commands
Command
Description
vrrp
Creates a VRRP group and enters VRRP
configuration mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
299
vrrs leader
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
300
PART
V
IP Multicast Routing Commands
• IP Multicast Commands, page 303
IP Multicast Commands
• cache-memory-max, page 305
• clear ip mfib counters, page 306
• clear ip mroute, page 307
• ip igmp filter, page 309
• ip igmp max-groups, page 310
• ip igmp profile, page 312
• ip igmp snooping, page 314
• ip igmp snooping last-member-query-count, page 315
• ip igmp snooping querier, page 317
• ip igmp snooping report-suppression, page 319
• ip igmp snooping vlan mrouter, page 320
• ip igmp snooping vlan static, page 321
• ip multicast auto-enable, page 323
• ip multicast vlan, page 324
• ip pim accept-register, page 325
• ip pim bsr-candidate, page 326
• ip pim rp-candidate, page 328
• ip pim send-rp-announce, page 330
• ip pim spt-threshold, page 332
• match message-type, page 333
• match service-type, page 334
• match service-instance, page 335
• mrinfo, page 336
• redistribute mdns-sd, page 338
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
303
• service-list mdns-sd, page 339
• service-policy-query, page 341
• service-routing mdns-sd, page 342
• service-policy, page 343
• show ip igmp filter, page 344
• show ip igmp profile, page 345
• show ip igmp snooping, page 346
• show ip igmp snooping groups, page 348
• show ip igmp snooping igmpv2-tracking, page 350
• show ip igmp snooping mrouter, page 351
• show ip igmp snooping querier, page 352
• show ip igmp snooping wireless mcast-spi-count, page 354
• show ip igmp snooping wireless mgid, page 355
• show ip pim autorp, page 356
• show ip pim bsr-router, page 357
• show ip pim bsr, page 358
• show ip pim tunnel, page 359
• show mdns cache, page 361
• show mdns requests, page 363
• show mdns statistics, page 364
• show platform ip multicast, page 365
• wireless mdns-bridging, page 372
• wireless multicast, page 373
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
304
cache-memory-max
cache-memory-max
To set a percentage of the system memory for cache, use the cache-memory-max command. To remove a
percentage of system memory for cache, use the no form of this command.
cache-memory-max cache-config-percentage
no cache-memory-max cache-config-percentage
Syntax Description
cache-config-percentage
Command Default
10 percent.
Command Modes
mDNS configuration
Command History
Usage Guidelines
Note
A percentage of the system memory for cache.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The number of services learned in a network could be large, so there is an upper limit on the amount of cache
memory that can be used. The memory is set by default to a maximum of 10 percent of the system memory.
You can override the default value by using this command.
When you try to add new records, and the cache is full, the records in the cache that are close to expiring are
deleted to provide space for the new records.
Examples
This example sets 20 percent of the system memory for cache:
Device(config-mdns)# cache-memory-max 20
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
305
clear ip mfib counters
clear ip mfib counters
To clear all active IPV4 multicast forwarding information base (MFIB) traffic counters, use the clear ip mfib
counters privileged exec command.
clear ip mfib [global | vrf *] counters [group-address] [hostname | source-address]
Syntax Description
global
(Optional) Resets the IP multicast forwarding information base cache to the
global default configuration.
vrf *
(Optional) Clears the IP multicast forwarding information base cache for all
VPN routing and forwarding instances.
group-address
(Optional) Limits the active multicast forwarding information base (MFIB)
traffic counters to the indicated group address.
hostname | source-address (Optional) Limits the active multicast forwarding information base (MFIB)
traffic counters to the indicated host name or source address.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example shows how to reset all active MFIB traffic counters for all multicast tables:
Device# clear ip mfib counters
The following example shows how to reset the IP multicast forwarding information base cache counters to
the global default configuration:
Device# clear ip mfib global counters
The following example shows how to clear the IP multicast forwarding information base cache for the all
VPN routing and forwarding instances:
Device# clear ip mfib vrf * counters
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
306
clear ip mroute
clear ip mroute
To delete entries from the IP multicast routing table, use the clear ip mroute privileged EXEC command.
clear ip mroute [vrf vrf-name]{* | ip-address | group-address}[hostname | source-address]
Syntax Description
vrf vrf-name
(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.
*
Specifies all Multicast routes.
ip-address
Multicast routes for the IP address.
group-address
Multicast routes for the group address.
hostname
(Optional) Multicast routes for the host name.
source-address
(Optional) Multicast routes for the source address.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The group-address variable specifies one of the following:
• Name of the multicast group as defined in the DNS hosts table or with the ip host command.
• IP address of the multicast group in four-part, dotted notation.
If you specify a group name or address, you can also enter the source argument to specify a name or address
of a multicast source that is sending to the group. A source does not need to be a member of the group.
Examples
The following example shows how to delete all entries from the IP multicast routing table:
Device# clear ip mroute *
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
307
clear ip mroute
The following example shows how to delete all sources on the 228.3.0.0 subnet that are sending to the multicast
group 224.2.205.42 from the IP multicast routing table. This example shows how to delete all sources on
network 228.3, not individual sources:
Device# clear ip mroute 224.2.205.42 228.3.0.0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
308
ip igmp filter
ip igmp filter
To control whether or not all hosts on a Layer 2 interface can join one or more IP multicast groups by applying
an Internet Group Management Protocol (IGMP) profile to the interface, use the ip igmp filter interface
configuration command on the device stack or on a standalone device. To remove the specified profile from
the interface, use the no form of this command.
ip igmp filter profile number
no ip igmp filter
Syntax Description
profile number
Command Default
No IGMP filters are applied.
Command Modes
Interface configuration
Command History
Usage Guidelines
The IGMP profile number to be applied. The range is 1 to 4294967295.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can apply IGMP filters only to Layer 2 physical interfaces; you cannot apply IGMP filters to routed ports,
switch virtual interfaces (SVIs), or ports that belong to an EtherChannel group.
An IGMP profile can be applied to one or more device port interfaces, but one port can have only one profile
applied to it.
Examples
You can verify your setting by using the show running-config privileged EXEC command and by specifying
an interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
309
ip igmp max-groups
ip igmp max-groups
To set the maximum number of Internet Group Management Protocol (IGMP) groups that a Layer 2 interface
can join or to configure the IGMP throttling action when the maximum number of entries is in the forwarding
table, use the ip igmp max-groups interface configuration command on the device stack or on a standalone
device. To set the maximum back to the default, which is to have no maximum limit, or to return to the default
throttling action, which is to drop the report, use the no form of this command.
ip igmp max-groups {max number | action { deny | replace}}
no ip igmp max-groups {max number | action}
Syntax Description
Command Default
max number
The maximum number of IGMP groups that an interface can join. The range is
0 to 4294967294. The default is no limit.
action deny
Drops the next IGMP join report when the maximum number of entries is in the
IGMP snooping forwarding table. This is the default action.
action replace
Replaces the existing group with the new group for which the IGMP report was
received when the maximum number of entries is in the IGMP snooping
forwarding table.
The default maximum number of groups is no limit.
After the device learns the maximum number of IGMP group entries on an interface, the default throttling
action is to drop the next IGMP report that the interface receives and to not add an entry for the IGMP group
to the interface.
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can use this command only on Layer 2 physical interfaces and on logical EtherChannel interfaces. You
cannot set IGMP maximum groups for routed ports, switch virtual interfaces (SVIs), or ports that belong to
an EtherChannel group.
Follow these guidelines when configuring the IGMP throttling action:
• If you configure the throttling action as deny and set the maximum group limitation, the entries that
were previously in the forwarding table are not removed but are aged out. After these entries are aged
out, when the maximum number of entries is in the forwarding table, the device drops the next IGMP
report received on the interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
310
ip igmp max-groups
• If you configure the throttling action as replace and set the maximum group limitation, the entries that
were previously in the forwarding table are removed. When the maximum number of entries is in the
forwarding table, the device replaces a randomly selected multicast entry with the received IGMP report.
• When the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups
{deny | replace} command has no effect.
Examples
This example shows how to limit to 25 the number of IGMP groups that a port can join:
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# ip igmp max-groups 25
This example shows how to configure the device to replace the existing group with the new group for which
the IGMP report was received when the maximum number of entries is in the forwarding table:
Device(config)# interface gigabitethernet2/0/1
Device(config-if)# ip igmp max-groups action replace
You can verify your setting by using the show running-config privileged EXEC command and by specifying
an interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
311
ip igmp profile
ip igmp profile
To create an Internet Group Management Protocol (IGMP) profile and enter IGMP profile configuration
mode, use the ip igmp profile global configuration command on the device stack or on a standalone device.
From this mode, you can specify the configuration of the IGMP profile to be used for filtering IGMP
membership reports from a switch port. To delete the IGMP profile, use the no form of this command.
ip igmp profile profile number
no ip igmp profile profile number
Syntax Description
profile number
The IGMP profile number being configured. The range is from 1 to
4294967295.
Command Default
No IGMP profiles are defined. When configured, the default action for matching an IGMP profile is to deny
matching addresses.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
When you are in IGMP profile configuration mode, you can create the profile by using these commands:
• deny—Specifies that matching addresses are denied; this is the default condition.
• exit—Exits from igmp-profile configuration mode.
• no—Negates a command or resets to its defaults.
• permit—Specifies that matching addresses are permitted.
• range—Specifies a range of IP addresses for the profile. This can be a single IP address or a range with
a start and an end address.
When entering a range, enter the low IP multicast address, a space, and the high IP multicast address.
You can apply an IGMP profile to one or more Layer 2 interfaces, but each interface can have only one profile
applied to it.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
312
ip igmp profile
Examples
This example shows how to configure IGMP profile 40 that permits the specified range of IP multicast
addresses:
Device(config)# ip igmp profile 40
Device(config-igmp-profile)# permit
Device(config-igmp-profile)# range 233.1.1.1 233.255.255.255
You can verify your settings by using the show ip igmp profile privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
313
ip igmp snooping
ip igmp snooping
To globally enable Internet Group Management Protocol (IGMP) snooping on the device or to enable it on a
per-VLAN basis, use the ip igmp snooping global configuration command on the device stack or on a
standalone device. To return to the default setting, use the no form of this command.
ip igmp snooping [vlan vlan-id]
no ip igmp snooping [vlan vlan-id]
Syntax Description
Command Default
vlan vlan-id
(Optional) Enables IGMP snooping on the specified VLAN. The range is 1 to
1001 and 1006 to 4094.
IGMP snooping is globally enabled on the device.
IGMP snooping is enabled on VLAN interfaces.
Command Modes
Command History
Usage Guidelines
Global configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
When IGMP snooping is enabled globally, it is enabled in all of the existing VLAN interfaces. When IGMP
snooping is globally disabled, it is disabled on all of the existing VLAN interfaces.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This example shows how to globally enable IGMP snooping:
Device(config)# ip igmp snooping
This example shows how to enable IGMP snooping on VLAN 1:
Device(config)# ip igmp snooping vlan 1
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
314
ip igmp snooping last-member-query-count
ip igmp snooping last-member-query-count
To configure how often Internet Group Management Protocol (IGMP) snooping will send query messages in
response to receiving an IGMP leave message, use the ip igmp snooping last-member-query-count
command in global configuration mode. To set count to the default value, use the no form of the command.
ip igmp snooping [vlan vlan-id] last-member-query-count count
no ip igmp snooping [vlan vlan-id] last-member-query-count count
Syntax Description
vlan vlan-id
(Optional) Sets the count value on a specific VLAN ID. The range is from 1 to
1001. Do not enter leading zeroes.
count
The interval at which query messages are sent, in milliseconds. The range is from
1 to 7. The default is 2.
Command Default
A query is sent every 2 milliseconds.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
When a multicast host leaves a group, the host sends an IGMP leave message. To check if this host is the last
to leave the group, IGMP query messages are sent when the leave message is seen until the
last-member-query-interval timeout period expires. If no response to the last-member queries are received
before the timeout period expires, the group record is deleted.
Use the ip igmp snooping last-member-query-interval command to configure the timeout period.
When both IGMP snooping immediate-leave processing and the query count are configured, immediate-leave
processing takes precedence.
Note
Do not set the count to 1 because the loss of a single packet (the query packet from the device to the host
or the report packet from the host to the device) may result in traffic forwarding being stopped even if
there is still a receiver. Traffic continues to be forwarded after the next general query is sent by the device,
but the interval during which a receiver may not receive the query could be as long as 1 minute (with the
default query interval).
The leave latency in Cisco IOS software may increase by up to one last-member-query-interval (LMQI) value
when the device is processing more than one leave within an LMQI. In this case, the average leave latency is
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
315
ip igmp snooping last-member-query-count
determined by the (count + 0.5) * LMQI. The result is that the default leave latency can range from 2.0 to 3.0
seconds with an average of 2.5 seconds under a higher load of IGMP leave processing. The leave latency
under load for the minimum LMQI value of 100 milliseconds and a count of 1 is from 100 to 200 milliseconds,
with an average of 150 milliseconds. This is done to limit the impact of higher rates of IGMP leave messages.
Examples
The following example sets the last member query count to 5:
Device(config)# ip igmp snooping last-member-query-count 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
316
ip igmp snooping querier
ip igmp snooping querier
To globally enable the Internet Group Management Protocol (IGMP) querier function in Layer 2 networks,
use the ip igmp snooping querier global configuration command. Use the command with keywords to enable
and configure the IGMP querier feature on a VLAN interface. To return to the default settings, use the no
form of this command.
ip igmp snooping [vlan vlan-id] querier [address ip-address | max-response-time response-time |
query-interval interval-count | tcn query {count count | interval interval} | timer expiry expiry-time |
version version]
no ip igmp snooping [vlan vlan-id] querier [address | max-response-time | query-interval | tcn query
{count | interval} | timer expiry | version]
Syntax Description
Command Default
vlan vlan-id
(Optional) Enables IGMP snooping and the IGMP querier function on
the specified VLAN. The range is 1 to 1001 and 1006 to 4094.
address ip-address
(Optional) Specifies a source IP address. If you do not specify an IP
address, the querier tries to use the global IP address configured for the
IGMP querier.
max-response-time
response-time
(Optional) Sets the maximum time to wait for an IGMP querier report.
The range is 1 to 25 seconds.
query-interval interval-count
(Optional) Sets the interval between IGMP queriers. The range is 1 to
18000 seconds.
tcn query
(Optional) Sets parameters related to Topology Change Notifications
(TCNs).
count count
Sets the number of TCN queries to be executed during the TCN interval
time. The range is 1 to 10.
interval interval
Sets the TCN query interval time. The range is 1 to 255.
timer expiry expiry-time
(Optional) Sets the length of time until the IGMP querier expires. The
range is 60 to 300 seconds.
version version
(Optional) Selects the IGMP version number that the querier feature uses.
Select 1 or 2.
The IGMP snooping querier feature is globally disabled on the device.
When enabled, the IGMP snooping querier disables itself if it detects IGMP traffic from a multicast router.
Command Modes
Global configuration
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
317
ip igmp snooping querier
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use this command to enable IGMP snooping to detect the IGMP version and IP address of a device that sends
IGMP query messages, which is also called a querier.
By default, the IGMP snooping querier is configured to detect devices that use IGMP Version 2 (IGMPv2)
but does not detect clients that are using IGMP Version 1 (IGMPv1). You can manually configure the
max-response-time value when devices use IGMPv2. You cannot configure the max-response-time when
devices use IGMPv1. (The value cannot be configured and is set to zero).
Non-RFC compliant devices running IGMPv1 might reject IGMP general query messages that have a non-zero
value as the max-response-time value. If you want the devices to accept the IGMP general query messages,
configure the IGMP snooping querier to run IGMPv1.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This example shows how to globally enable the IGMP snooping querier feature:
Device(config)# ip igmp snooping querier
This example shows how to set the IGMP snooping querier maximum response time to 25 seconds:
Device(config)# ip igmp snooping querier max-response-time 25
This example shows how to set the IGMP snooping querier interval time to 60 seconds:
Device(config)# ip igmp snooping querier query-interval 60
This example shows how to set the IGMP snooping querier TCN query count to 25:
Device(config)# ip igmp snooping querier tcn count 25
This example shows how to set the IGMP snooping querier timeout to 60 seconds:
Device(config)# ip igmp snooping querier timer expiry 60
This example shows how to set the IGMP snooping querier feature to version 2:
Device(config)# ip igmp snooping querier version 2
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
318
ip igmp snooping report-suppression
ip igmp snooping report-suppression
To enable Internet Group Management Protocol (IGMP) report suppression, use the ip igmp snooping
report-suppression global configuration command on the device stack or on a standalone device. To disable
IGMP report suppression and to forward all IGMP reports to multicast routers, use the no form of this command.
ip igmp snooping report-suppression
no ip igmp snooping report-suppression
Syntax Description
This command has no arguments or keywords.
Command Default
IGMP report suppression is enabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This
feature is not supported when the query includes IGMPv3 reports.
The device uses IGMP report suppression to forward only one IGMP report per multicast router query to
multicast devices. When IGMP report suppression is enabled (the default), the device sends the first IGMP
report from all hosts for a group to all the multicast routers. The device does not send the remaining IGMP
reports for the group to the multicast routers. This feature prevents duplicate reports from being sent to the
multicast devices.
If the multicast router query includes requests only for IGMPv1 and IGMPv2 reports, the device forwards
only the first IGMPv1 or IGMPv2 report from all hosts for a group to all of the multicast routers. If the
multicast router query also includes requests for IGMPv3 reports, the device forwards all IGMPv1, IGMPv2,
and IGMPv3 reports for a group to the multicast devices.
If you disable IGMP report suppression by entering the no ip igmp snooping report-suppression command,
all IGMP reports are forwarded to all of the multicast routers.
Examples
This example shows how to disable report suppression:
Device(config)# no ip igmp snooping report-suppression
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
319
ip igmp snooping vlan mrouter
ip igmp snooping vlan mrouter
To add a multicast router port, use the ip igmp snooping mrouter global configuration command on the
device stack or on a standalone device. To return to the default settings, use the no form of this command.
Command Default
By default, there are no multicast router ports.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
The configuration is saved in NVRAM.
Examples
This example shows how to configure a port as a multicast router port:
Device(config)# ip igmp snooping vlan 1 mrouter interface gigabitethernet1/0/2
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
320
ip igmp snooping vlan static
ip igmp snooping vlan static
To enable Internet Group Management Protocol (IGMP) snooping and to statically add a Layer 2 port as a
member of a multicast group, use the ip igmp snooping vlan static global configuration command on the
device stack or on a standalone device. Use the no form of this command to remove ports specified as members
of a static multicast group.
ip igmp snooping vlan vlan-id static ip-address interface interface-id
no ip igmp snooping vlan vlan-id static ip-address interface interface-id
Syntax Description
vlan-id
Enables IGMP snooping on the specified VLAN. The range is 1 to 1001 and 1006
to 4094.
ip-address
Adds a Layer 2 port as a member of a multicast group with the specified group IP
address.
interface interface-id Specifies the interface of the member port. The interface-id value has these options:
• fastethernet interface number—A Fast Ethernet IEEE 802.3 interface.
• gigabitethernet interface number—A Gigabit Ethernet IEEE 802.3z interface.
• tengigabitethernet interface number—A 10-Gigabit Ethernet IEEE 802.3z
interface.
• port-channel interface number—A channel interface. The range is 0 to 128.
Command Default
By default, there are no ports statically configured as members of a multicast group.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
The configuration is saved in NVRAM.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
321
ip igmp snooping vlan static
Examples
This example shows how to statically configure a host on an interface:
Device(config)# ip igmp snooping vlan 1 static 224.2.4.12 interface
gigabitEthernet1/0/1
Configuring port gigabitethernet1/0/1 on group 224.2.4.12
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
322
ip multicast auto-enable
ip multicast auto-enable
To support authentication, authorization, and accounting (AAA) enabling of IP multicast, use the ip multicast
auto-enable command. This command allows multicast routing to be enabled dynamically on dialup interfaces
using AAA attributes from a RADIUS server. To disable IP multicast for AAA, use the no form of the
command.
ip multicast auto-enable
no ip multicast auto-enable
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
None
This command is unavailable when using the LAN Base image.
Examples
This example shows how to enable authentication, authorization, and accounting (AAA) on IP multicast:
Device(config)# ip multicast auto-enable
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
323
ip multicast vlan
ip multicast vlan
To configure IP multicast on a single VLAN, use the ip multicast vlan command in global configuration
mode. To remove the VLAN from the WLAN, use the no form of the command.
ip multicast vlan {vlan-name | vlan-id}
no ip multicast vlan{vlan-name | vlan-id}
Syntax Description
vlan-name
Specifies the VLAN name.
vlan-id
Specifies the VLAN ID.
Command Default
Disabled.
Command Modes
WLAN configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This example configures vlan_id01 as a multicast VLAN.
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# wireless multicast
Device(config)# wlan test-wlan 1
Device(config-wlan)# ip multicast vlan vlan_id01
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
324
ip pim accept-register
ip pim accept-register
To configure a candidate rendezvous point (RP) switch to filter Protocol Independent Multicast (PIM) register
messages, use the ip pim accept-register command in global configuration mode. To disable this function,
use the no form of this command.
ip pim [vrf vrf-name ] accept-register {list access-list}
no ip pim [vrf vrf-name ] accept-register
Syntax Description
vrf vrf-name
(Optional) Configures a PIM register filter on candidate RPs for (S, G) traffic
associated with the multicast Virtual Private Network (VPN) routing and forwarding
(MVRF) instance specified for the vrf-name argument.
list access-list
Specifies the access-list argument as a number or name that defines the (S, G) traffic
in PIM register messages to be permitted or denied. The range is 100 to 199 and an
expanded range of 2000 to 2699. An IP-named access list can also be used.
Command Default
No PIM register filters are configured.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use this command to prevent unauthorized sources from registering with the RP. If an unauthorized source
sends a register message to the RP, the RP will immediately send back a register-stop message.
The access list provided for the ip pim accept-register command should only filter on IP source addresses
and IP destination addresses. Filtering on other fields (for example, IP protocol or UDP port number) will not
be effective and may cause undesired traffic to be forwarded from the RP down the shared tree to multicast
group members. If more complex filtering is desired, use the ip multicast boundary command instead.
Examples
The following example shows how to permit register packets for any source address sending to any group
range, with the exception of source address 172.16.10.1 sending to the SSM group range (232.0.0.0/8). These
are denied. These statements should be configured on all candidate RPs because candidate RPs will receive
PIM registers from first hop routers or switches.
Device(config)# ip pim accept-register list ssm-range
Device(config)# ip access-list extended ssm-range
Device(config-ext-nacl)# deny ip any 232.0.0.0 0.255.255.255
Device(config-ext-nacl)# permit ip any any
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
325
ip pim bsr-candidate
ip pim bsr-candidate
To configure the switch to be a candidate BSR, use the ip pim bsr-candidate command in global configuration
mode. To remove the switch as a candidate BSR, use the no form of this command.
ip pim [vrf vrf-name] bsr-candidate interface-id [hash-mask-length] [priority]
no ip pim [vrf vrf-name] bsr-candidate
Syntax Description
vrf vrf-name
(Optional) Configures the switch to be a candidate BSR for the Multicast Virtual Private
Network (MVPN) routing and forwarding (MVRF) instance specified for the vrf-name
argument.
interface-id
ID of the interface on this switch from which the BSR address is derived to make it a
candidate. This interface must be enabled for Protocol Independent Multicast (PIM)
using the ip pim command. Valid interfaces include physical ports, port channels, and
VLANs.
hash-mask-length
(Optional) Length of a mask (32 bits maximum) that is to be ANDed with the group
address before the PIMv2 hash function is called. All groups with the same seed hash
correspond to the same rendezvous point ( RP). For example, if this value is 24, only
the first 24 bits of the group addresses matter. The hash mask length allows one RP to
be used for multiple groups. The default hash mask length is 0.
priority
(Optional) Priority of the candidate BSR (C-BSR). The range is from 0 to 255. The
default priority is 0. The C-BSR with the highest priority value is preferred.
Command Default
The switch is not configured to announce itself as a candidate BSR.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The interface specified for this command must be enabled for Protocol Independent Multicast (PIM) using
the ip pim command.
This command configures the switch to send BSR messages to all of its PIM neighbors, with the address of
the designated interface as the BSR address.
This command should be configured on backbone switches that have good connectivity to all parts of the PIM
domain.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
326
ip pim bsr-candidate
The BSR mechanism is specified in RFC 2362. Candidate RP (C-RP) switches unicast C-RP advertisement
packets to the BSR. The BSR then aggregates these advertisements in BSR messages, which it regularly
multicasts with a TTL of 1 to the ALL-PIM-ROUTERS group address, 224.0.0.13. The multicasting of these
messages is handled by hop-by-hop RPF flooding; so no preexisting IP multicast routing setup is required
(unlike with AutoRP). In addition, the BSR does not preselect the designated RP for a particular group range
(unlike AutoRP); instead, each switch that receives BSR messages will elect RPs for group ranges based on
the information in the BSR messages.
Cisco switches always accept and process BSR messages. There is no command to disable this function.
Cisco switches perform the following steps to determine which C-RP is used for a group:
• A longest match lookup is performed on the group prefix that is announced by the BSR C-RPs.
• If more than one BSR-learned C-RP are found by the longest match lookup, the C-RP with the lowest
priority (configured with the ip pim rp-candidate command) is preferred.
• If more than one BSR-learned C-RP have the same priority, the BSR hash function is used to select the
RP for a group.
• If more than one BSR-learned C-RP return the same hash value derived from the BSR hash function,
the BSR C-RP with the highest IP address is preferred.
Examples
The following example shows how to configure the IP address of the switch on Gigabit Ethernet interface
1/0/0 to be a BSR C-RP with a hash mask length of 0 and a priority of 192:
Device(config)# ip pim bsr-candidate GigabitEthernet1/0/1 0 192
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
327
ip pim rp-candidate
ip pim rp-candidate
To configure the switch to advertise itself to the BSR as a Protocol Independent Multicast (PIM) Version 2
(PIMv2) candidate rendezvous point (C-RP), use the ip pim rp-candidate command in global configuration
mode. To remove this switch as a C-RP, use the no form of this command.
ip pim [vrf vrf-name] rp-candidate interface-id [group-list access-list-number]
no ip pim [vrf vrf-name] rp-candidate interface-id [group-list access-list-number]
Syntax Description
vrf vrf-name
(Optional) Configures the switch to advertise itself to the BSR as PIMv2 C-RP
for the Multicast Virtual Private Network (MVPN) routing and forwarding
(MVRF) instance specified for the vrf-name argument.
interface-id
ID of the interface whose associated IP address is advertised as a candidate RP
address. Valid interfaces include physical ports, port channels, and VLANs.
group-list
access-list-number
(Optional) Specifies the standard IP access list number that defines the group
prefixes that are advertised in association with the RP address.
Command Default
The switch is not configured to announce itself to the BSR as a PIMv2 C-RP.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use this command to configure the switch to send PIMv2 messages so that it advertises itself as a candidate
RP to the BSR.
This command should be configured on backbone switches that have good connectivity to all parts of the PIM
domain.
The IP address associated with the interface specified by interface-id will be advertised as the C-RP address.
The interface specified for this command must be enabled for Protocol Independent Multicast (PIM) using
the ip pim command.
If the optional group-list keyword and access-list-number argument are configured, the group prefixes defined
by the standard IP access list will also be advertised in association with the RP address.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
328
ip pim rp-candidate
Examples
The following example shows how to configure the switch to advertise itself as a C-RP to the BSR in its PIM
domain. The standard access list number 4 specifies the group prefix associated with the RP that has the
address identified by Gigabit Ethernet interface 1/0/1.
Device(config)# ip pim rp-candidate GigabitEthernet1/0/1 group-list 4
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
329
ip pim send-rp-announce
ip pim send-rp-announce
To use Auto-RP to configure groups for which the switch will act as a rendezvous point (RP), use the ip pim
send-rp-announce command in global configuration mode. To unconfigure this switch as an RP, use the no
form of this command.
ip pim [vrf vrf-name] send-rp-announce interface-id scope ttl-value [group-list access-list-number] [interval
seconds]
no ip pim [vrf vrf-name] send-rp-announce interface-id
Syntax Description
vrf vrf-name
(Optional) Uses Auto-RP to configure groups for which the switch will act as a
rendezvous point (RP) for the vrf-name argument.
interface-id
Enter the interface ID of the interface that identifies the RP address. Valid interfaces
include physical ports, port channels, and VLANs.
scope ttl-value
Specifies the time-to-live (TTL) value in hops that limits the number of Auto-RP
announcements. Enter a hop count that is high enough so that the RP-announce
messages reach all mapping agents in the network. There is no default setting. The
range is 1 to 255.
group-list
access-list-number
(Optional) Specifies the standard IP access list number that defines the group
prefixes that are advertised in association with the RP address. Enter an IP standard
access list number from 1 to 99. If no access list is configured, the RP is used for
all groups.
interval seconds
(Optional) Specifies the interval between RP announcements in seconds. The total
holdtime of the RP announcements is automatically set to three times the value of
the interval. The default interval is 60 seconds. The range is 1 to 16383.
Command Default
Auto-RP is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Enter this command on the switch that you want to be an RP. When you are using Auto-RP to distribute
group-to-RP mappings, this command causes the router to send an Auto-RP announcement message to the
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
330
ip pim send-rp-announce
well-known group CISCO-RP-ANNOUNCE (224.0.1.39). This message announces the router as a candidate
RP for the groups in the range described by the access list.
Examples
The following example shows how to configure the switch to send RP announcements out all Protocol
Independent Multicast (PIM)-enabled interfaces for a maximum of 31 hops. The IP address by which the
switch wants to be identified as RP is the IP address associated with Gigabit Ethernet interface 1/0/1 at an
interval of 120 seconds:
Device(config)# ip pim send-rp-announce GigabitEthernet1/0/1 scope 31 group-list 5 interval
120
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
331
ip pim spt-threshold
ip pim spt-threshold
To specify the threshold that must be reached before moving to shortest-path tree (spt), use the ip pim
spt-threshold command in global configuration mode. To remove the threshold, use the no form of this
command.
ip pim {kbps | infinity} [group-list access-list]
no ip pim {kbps | infinity} [group-list access-list]
Syntax Description
kbps
The threshold that must be reached before moving to shortest-path tree (spt). 0 is
the only valid entry even though the range is 0 to 4294967. A 0 entry always switches
to the source-tree.
infinity
Specifies that all sources for the specified group use the shared tree, never switching
to the source tree.
group-list access-list
(Optional) Specifies an access list number or a specific access list that you have
created by name. If the value is 0 or if the group-list access-list option is not used,
the threshold applies to all groups.
Command Default
Switches to the PIM shortest-path tree (spt).
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example makes all sources for access list 16 use the shared tree:
Device(config)# ip pim spt-threshold infinity group-list 16
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
332
match message-type
match message-type
To set the message type to match for a service list, use the match message-type command.
match message-type {announcement| any| query}
Syntax Description
announcement
Allows only service advertisements or announcements for the device.
any
Allows any match type.
query
Allows only a query from the client for a certain device in the network.
Command Default
None
Command Modes
Service list configuration.
Command History
Usage Guidelines
Note
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Multiple service maps of the same name with different sequence numbers can be created and the evaluation
of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual
statements, each one has a permit or deny result. Evaluation of service list consists of a list scan, in a
predetermined order, and an evaluation of the criteria of each statement that matches. A list scan is stopped
once the first statement match is found and an action permit/deny associated with the statement match is
performed. The default action after scanning through the entire list is to deny.
It is not possible to use the match command if you have used the service-list mdns-sd service-list-name
query command. The match command can be used only for the permit or deny option.
This example shows how to set the announcement message type to be matched:
Device(config-mdns-sd-sl)# match message-type announcement
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
333
match service-type
match service-type
To set the value of the mDNS service type string to match, use the match service-type command.
match service-type line
Syntax Description
line
Command Default
None
Command Modes
Service list configuration
Command History
Regular expression to match service type in packets.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
It is not possible to use the match command if you have used the service-list mdns-sd service-list-name
query command. The match command can be used only for the permit or deny option.
Examples
This example shows how to set the value of the mDNS service type string to match:
Device(config-mdns-sd-sl)# match service-type _ipp._tcp
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
334
match service-instance
match service-instance
To set the service instance to match for a service list, use the match service-instance command.
match servcie-instance line
Syntax Description
line
Command Default
None
Command Modes
Service list configuration
Command History
Regular expression to match service instance in packets.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
It is not possible to use the match command if you have used the service-list mdns-sd service-list-name
query command. The match command can be used only for the permit or deny option.
Examples
This example shows how to set the service instance to match:
Device(config-mdns-sd-sl)# match service-instance servInst 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
335
mrinfo
mrinfo
To query which neighboring multicast routers or multilayer switches are acting as peers, use the mrinfo
command in user EXEC or privileged EXEC mode.
mrinfo [vrf route-name] [hostname | address][interface-id]
Syntax Description
vrf route-name
(Optional) Specifies the VPN routing or forwarding instance.
hostname | address
(Optional) The Domain Name System (DNS) name or IP address of the
multicast router or multilayer switch to query. If omitted, the switch queries
itself.
interface-id
(Optional) Specifies the interface ID.
Command Default
The command is disabled.
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The mrinfo command is the original tool of the multicast backbone (MBONE) to determine which neighboring
multicast routers or switches are peering with multicast routers or switches. Cisco routers have supported
responding to mrinfo requests since Cisco IOS Release 10.2.
You can query a multicast router or multilayer switch using the mrinfo command. The output format is
identical to the multicast routed version of the Distance Vector Multicast Routing Protocol (DVMRP). (The
mrouted software is the UNIX software that implements DVMRP.)
Examples
The following is sample output from the mrinfo command:
Device# mrinfo
vrf 192.0.1.0
192.31.7.37 (barrnet-gw.cisco.com) [version cisco 11.1] [flags: PMSA]:
192.31.7.37 -> 192.31.7.34 (sj-wall-2.cisco.com) [1/0/pim]
192.31.7.37 -> 192.31.7.47 (dirtylab-gw-2.cisco.com) [1/0/pim]
192.31.7.37 -> 192.31.7.44 (dirtylab-gw-1.cisco.com) [1/0/pim]
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
336
mrinfo
Note
The flags indicate the following:
• P: prune-capable
• M: mtrace-capable
• S: Simple Network Management Protocol (SNMP)-capable
• A: Auto-Rendezvous Point (RP)-capable
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
337
redistribute mdns-sd
redistribute mdns-sd
To redistribute services or service announcements across subnets, use the redistribute mdns-sd command.
To disable redistribution of services or service announcements across subnets, use the no form of this command.
redistribute mdns-sd
no redistribute mdns-sd
This command has no arguments or keywords.
Command Default
The redistribution of services or service announcements across subnets is disabled.
Command Modes
mDNS configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
To redistribute service announcements across interfaces, use the redistribute mdns-sd command. This
command sends out unsolicited announcements received on one interface to all of the other interfaces. The
outgoing announcements are filtered as per the out-service policy defined for the interface or in absence of a
per-interface service policy based on the global out-service policy.
In the absence of a redistribute option, services can be discovered by querying in a Layer 3 domain that is not
local to the service provider.
Examples
This example shows how to redistribute services or service announcements across subnets:
Device(config-mdns)# redistribute mdns-sd
Note
If redistribution is enabled globally, global configuration is given higher priority than interface configuration.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
338
service-list mdns-sd
service-list mdns-sd
To enter mDNS service discovery service-list mode on the device, use the service-list mdns-sd command.
To exit mDNS service discovery service-list mode, use the no form of the command.
service-list mdns-sd service-list-name {permit | deny} sequence-number [query]
no service-list mdns-sd service-list-name {permit | deny} sequence-number [query]
Syntax Description
service-list-name
Name of the service list.
permit sequence number
Permits a filter on the service list
to be applied to the sequence
number.
deny sequence number
Denies a filter on the service list to
be applied to the sequence number.
query
Associates a query for the service
list name.
Command Default
Disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Service filters are modeled around access lists and route maps.
Multiple service maps of the same name with different sequence numbers can be created and the evaluation
of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual
statements, each has a permit or deny result. Evaluation of a service list consists of a list scan, in a predetermined
order, and an evaluation of the criteria of each statement that matches. A list scan is aborted once the first
statement match is found and an action, permit or deny associated with the statement match is performed.
Default action after scanning through the entire list will be to deny.
This command can be used to enter mDNS service discovery service-list mode.
In this mode you can:
• Create a service list and apply a filter on the service list according to the permit or deny option applied
to the sequence number.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
339
service-list mdns-sd
Examples
This example shows how to create a service list and apply a filter on the service list according to the permit
or deny option applied to the sequence number:
Device(config)# service-list mdns-sd sl1 permit 3
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
340
service-policy-query
service-policy-query
To configure service list query periodicity, use the service-policy-query command. To delete the configuration,
use the no form of this command.
service-policy-query [service-list-query-name service-list-query-periodicity]
no service-policy-query
Syntax Description
service-list-query-name service-list-query-periodicity (Optional) Configures the service list query
periodicity.
Command Default
Disabled.
Command Modes
mDNS configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
As there are devices that do not send unsolicited announcements and to force learning of services and to keep
them refreshed in the cache, this command contains an active query feature which ensures that services listed
in the active query list will be queried.
Examples
This example shows how to configure service list query periodicity:
Device(config-mdns)# service-policy-query sl-query1 100
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
341
service-routing mdns-sd
service-routing mdns-sd
To enable mDNS gateway functionality for a device and enter multicast DNS configuration mode, use the
service-routing mdns-sd command. To restore default settings and return to global config mode, enter the
no form of the command.
service-routing mdns-sd
no service-routing mdns-sd
This command has no arguments or keywords.
Command Default
Disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
mDNS gateway functionality can only be enabled or disabled globally, not on a per-interface basis. The service
filter policy and redistribution can be configured globally as well as on a per-interface basis. Any interface
specific configuration overrides the global configuration.
Examples
This example shows how to enable mDNS gateway functionality for a device and enter multicast DNS
configuration mode:
Device(config)# service-routing mdns-sd
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
342
service-policy
service-policy
To apply a filter on incoming or outgoing service discovery information on a service list, use the service-policy
command. To remove the filter, use the no form of the command.
service-policy service-policy-name {IN | OUT}
no service-policy service-policy-name {IN | OUT}
Syntax Description
service-policy-name IN
Applies a filter on incoming service discovery information.
service-policy-name OUT
Applies a filter on outgoing service discovery information.
Command Default
Disabled.
Command Modes
mDNS configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Device intercepts mDNS packets. If they are mDNS messages destined to a wireless client (for example,
the destination MAC is client's MAC address), and the client's mobility state is either local or foreign, the
destination MAC address is overwritten with the client's MAC address and enqueues the packet to be sent out
on the associated CAPWAP tunnel.
Examples
This example applies a filter on incoming service discovery information on a service list:
Device(config-mdns)#
service-policy serv-pol1 IN
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
343
show ip igmp filter
show ip igmp filter
To display Internet Group Management Protocol (IGMP) filter information, use the show ip igmp filter
command in privileged EXEC command mode.
show ip igmp [vrf vrf-name] filter
Syntax Description
vrf vrf-name
(Optional) Supports the multicast VPN routing and forwarding (VRF)
instance.
Command Default
IGMP filters are enabled by default.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The show ip igmp filter command displays information about all filters defined on the device.
Examples
The following is sample output from the show ip igmp filter command:
Device# show ip igmp filter
IGMP filter enabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
344
show ip igmp profile
show ip igmp profile
To display all configured Internet Group Management Protocol (IGMP) profiles or a specified IGMP profile,
use the show ip igmp profile privileged EXEC command.
show ip igmp [vrf vrf-name] profile [profile number]
Syntax Description
vrf vrf-name
(Optional) Supports the multicast VPN routing and forwarding (VRF) instance.
profile number
(Optional) The IGMP profile number to be displayed. The range is 1 to
4294967295. If no profile number is entered, all IGMP profiles are displayed.
Command Default
IGMP profiles undefined by default.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example shows the output of the show ip igmp profile privileged EXEC command for profile
number 40 on the device:
Device# show ip igmp profile 40
IGMP Profile 40
permit
range 233.1.1.1 233.255.255.255
This example shows the output of the show ip igmp profile privileged EXEC command for all profiles
configured on the device:
Device# show ip igmp profile
IGMP Profile 3
range 230.9.9.0 230.9.9.0
IGMP Profile 4
permit
range 229.9.9.0 229.255.255.255
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
345
show ip igmp snooping
show ip igmp snooping
To display the Internet Group Management Protocol (IGMP) snooping configuration of the device or the
VLAN, use the show ip igmp snooping command in user or privileged EXEC command mode.
show ip igmp snooping [groups | mrouter | querier] [vlan vlan-id] [detail]
Syntax Description
groups
(Optional) Displays the IGMP snooping multicast table.
mrouter
(Optional) Displays the IGMP snooping multicast router ports.
querier
(Optional) Displays the configuration and operation information for the IGMP
querier.
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094.
detail
(Optional) Displays operational state information.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Examples
This is an example of output from the show ip igmp snooping vlan 1 command. It shows snooping
characteristics for a specific VLAN:
Device# show ip igmp snooping vlan 1
Global IGMP Snooping configuration:
------------------------------------------IGMP snooping
: Enabled
IGMPv3 snooping (minimal)
: Enabled
Report suppression
: Enabled
TCN solicit query
: Disabled
TCN flood query count
: 2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
346
show ip igmp snooping
Robustness variable
Last member query count
Last member query interval
: 2
: 2
: 1000
Vlan 1:
-------IGMP snooping
IGMPv2 immediate leave
Multicast router learning mode
CGMP interoperability mode
Robustness variable
Last member query count
Last member query interval
:
:
:
:
:
:
:
Enabled
Disabled
pim-dvmrp
IGMP_ONLY
2
2
1000
This is an example of output from the show ip igmp snooping command. It displays snooping characteristics
for all VLANs on the device:
Device# show ip igmp snooping
Global IGMP Snooping configuration:
------------------------------------------IGMP snooping
: Enabled
IGMPv3 snooping (minimal)
: Enabled
Report suppression
: Enabled
TCN solicit query
: Disabled
TCN flood query count
: 2
Robustness variable
: 2
Last member query count
: 2
Last member query interval
: 1000
Vlan 1:
-------IGMP snooping
IGMPv2 immediate leave
Multicast router learning mode
CGMP interoperability mode
Robustness variable
Last member query count
Last member query interval
Vlan 2:
-------IGMP snooping
IGMPv2 immediate leave
Multicast router learning mode
CGMP interoperability mode
Robustness variable
Last member query count
Last member query interval
<output truncated>
:
:
:
:
:
:
:
Enabled
Disabled
pim-dvmrp
IGMP_ONLY
2
2
1000
:
:
:
:
:
:
:
Enabled
Disabled
pim-dvmrp
IGMP_ONLY
2
2
1000
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
347
show ip igmp snooping groups
show ip igmp snooping groups
To display the Internet Group Management Protocol (IGMP) snooping multicast table for the device or the
multicast information, use the show ip igmp snooping groups privileged EXEC command.
show ip igmp snooping groups [vlan vlan-id ] [[count] | ip_address]
Syntax Description
Command Modes
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094. Use this
option to display the multicast table for a specified multicast VLAN or specific
multicast information.
count
(Optional) Displays the total number of entries for the specified command options
instead of the actual entries.
ip_address
(Optional) Characteristics of the multicast group with the specified group IP address.
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Examples
This is an example of output from the show ip igmp snooping groups command without any keywords. It
displays the multicast table for the device:
Device# show ip igmp snooping groups
Vlan
Group
Type
Version
Port List
------------------------------------------------------------1
224.1.4.4
igmp
Gi1/0/11
1
224.1.4.5
igmp
Gi1/0/11
2
224.0.1.40
igmp
v2
Gi1/0/15
104
224.1.4.2
igmp
v2
Gi2/0/1, Gi2/0/2
104
224.1.4.3
igmp
v2
Gi2/0/1, Gi2/0/2
This is an example of output from the show ip igmp snooping groups count command. It displays the total
number of multicast groups on the device:
Device# show ip igmp snooping groups count
Total number of multicast groups: 2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
348
show ip igmp snooping groups
This is an example of output from the show ip igmp snooping groups vlan vlan-id ip-address command.
It shows the entries for the group with the specified IP address:
Device# show ip igmp snooping groups vlan 104 224.1.4.2
Vlan
Group
Type
Version
Port List
------------------------------------------------------------104
224.1.4.2
igmp
v2
Gi2/0/1, Gi1/0/15
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
349
show ip igmp snooping igmpv2-tracking
show ip igmp snooping igmpv2-tracking
To display group and IP address entries, use the show ip igmp snooping igmpv2-tracking command in
privileged EXEC mode.
Note
The command displays group and IP address entries only for wireless multicast IGMP joins and not for
wired joins. This command also displays output only if wireless multicast is enabled.
show ip igmp snooping igmpv2-tracking
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
350
show ip igmp snooping mrouter
show ip igmp snooping mrouter
To display the Internet Group Management Protocol (IGMP) snooping dynamically learned and manually
configured multicast router ports for the device or for the specified multicast VLAN, use the show ip igmp
snooping mrouter privileged EXEC command.
show ip igmp snooping mrouter [vlan vlan-id]
Syntax Description
Command Modes
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
When multicast VLAN registration (MVR) is enabled, the show ip igmp snooping mrouter command displays
MVR multicast router information and IGMP snooping information.
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Examples
This is an example of output from the show ip igmp snooping mrouter command. It shows how to display
multicast router ports on the device:
Device#
Vlan
---1
show ip igmp snooping mrouter
ports
----Gi2/0/1(dynamic)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
351
show ip igmp snooping querier
show ip igmp snooping querier
To display the configuration and operation information for the IGMP querier configured on a device, use the
show ip igmp snooping querier user EXEC command.
show ip igmp snooping querier [vlan vlan-id] [detail ]
Syntax Description
Command Modes
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094.
detail
(Optional) Displays detailed IGMP querier information.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the show ip igmp snooping querier command to display the IGMP version and the IP address of a
detected device, also called a querier, that sends IGMP query messages. A subnet can have multiple multicast
routers but has only one IGMP querier. In a subnet running IGMPv2, one of the multicast routers is elected
as the querier. The querier can be a Layer 3 device.
The show ip igmp snooping querier command output also shows the VLAN and the interface on which the
querier was detected. If the querier is the device, the output shows the Port field as Router. If the querier is a
router, the output shows the port number on which the querier is learned in the Port field.
The show ip igmp snooping querier detail user EXEC command is similar to the show ip igmp snooping
querier command. However, the show ip igmp snooping querier command displays only the device IP
address most recently detected by the device querier.
The show ip igmp snooping querier detail command displays the device IP address most recently detected
by the device querier and this additional information:
• The elected IGMP querier in the VLAN
• The configuration and operational information pertaining to the device querier (if any) that is configured
in the VLAN
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
352
show ip igmp snooping querier
Examples
This is an example of output from the show ip igmp snooping querier command:
Device> show ip igmp snooping querier
Vlan
IP Address
IGMP Version
Port
--------------------------------------------------1
172.20.50.11
v3
Gi1/0/1
2
172.20.40.20
v2
Router
This is an example of output from the show ip igmp snooping querier detail command:
Device> show ip igmp snooping querier detail
Vlan
IP Address
IGMP Version
Port
------------------------------------------------------------1
1.1.1.1
v2
Fa8/0/1
Global IGMP device querier status
-------------------------------------------------------admin state
: Enabled
admin version
: 2
source IP address
: 0.0.0.0
query-interval (sec)
: 60
max-response-time (sec)
: 10
querier-timeout (sec)
: 120
tcn query count
: 2
tcn query interval (sec)
: 10
Vlan 1:
IGMP device querier status
-------------------------------------------------------elected querier is 1.1.1.1
on port Fa8/0/1
-------------------------------------------------------admin state
: Enabled
admin version
: 2
source IP address
: 10.1.1.65
query-interval (sec)
: 60
max-response-time (sec)
: 10
querier-timeout (sec)
: 120
tcn query count
: 2
tcn query interval (sec)
: 10
operational state
: Non-Querier
operational version
: 2
tcn query pending count
: 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
353
show ip igmp snooping wireless mcast-spi-count
show ip igmp snooping wireless mcast-spi-count
To display the statistics of the number of multicast stateful packet inspections (SPIs) per multicast group ID
(MGID) sent to the device, use the show ip igmp snooping wireless mcast-spi-count command in privileged
EXEC mode.
show ip igmp snooping wireless mcast-spi-count
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This is an example of output from the show ip igmp snooping wireless mcast-spi-count command:
Device# show ip igmp snooping wireless mcast-spi-count
Stats for Mcast Client Add/Delete SPI Messages Sent to WCM
MGID
ADD MSGs
Del MSGs
--------------------------------4160
1323
667
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
354
show ip igmp snooping wireless mgid
show ip igmp snooping wireless mgid
To display multicast group ID (MGID) mappings, use the show ip igmp snooping wireless mgid command
in privileged EXEC mode.
show ip igmp snooping wireless mgid
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This is an example of output from the show ip igmp snooping wireless mgid command:
Device# show ip igmp snooping wireless mgid
Total number of L2-MGIDs
= 0
Total number of MCAST MGIDs = 0
Wireless multicast is Enabled in the system
Vlan
bcast
nonip-mcast
mcast
mgid
Stdby Flags
1
Disabled
Disabled
Enabled
Disabled 0:0:1:0
25
Disabled
Disabled
Enabled
Disabled 0:0:1:0
34
Disabled
Disabled
Enabled
Disabled 0:0:1:0
200
Disabled
Disabled
Enabled
Disabled 0:0:1:0
1002 Enabled
Enabled
Enabled
Disabled 0:0:1:0
1003 Enabled
Enabled
Enabled
Disabled 0:0:1:0
1004 Enabled
Enabled
Enabled
Disabled 0:0:1:0
1005 Enabled
Enabled
Enabled
Disabled 0:0:1:0
Index MGID
(S, G, V)
--------------------------------------------------------
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
355
show ip pim autorp
show ip pim autorp
To display global information about auto-rp, use the show ip pim autorp command in privileged EXEC
mode.
show ip pim autorp
Syntax Description
This command has no arguments or keywords.
Command Default
auto-rp is enabled by default.
Command Modes
Privileged EXEC mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command displays whether auto-rp is enabled or disabled.
Examples
The following command output displays that auto-rp is enabled:
Device# show ip pim autorp
AutoRP Information:
AutoRP is enabled.
RP Discovery packet MTU is 0.
224.0.1.40 is joined on GigabitEthernet1/0/1.
PIM AutoRP Statistics: Sent/Received
RP Announce: 0/0, RP Discovery: 0/0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
356
show ip pim bsr-router
show ip pim bsr-router
To display information related to Protocol Independent Multicast (PIM) bootstrap router (BSR) protocol
processing, use the show ip pim bsr-router command in user EXEC or privileged EXEC mode.
show ip pim bsr-router
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In addition to auto-rp, the BSR RP method can be configured. After the BSR RP method is configured, this
command will display the BSR router information.
Examples
The following is sample output from the show ip pim bsr-router command:
Device# show ip pim bsr-router
PIMv2 Bootstrap information
This system is the Bootstrap Router (BSR)
BSR address: 172.16.143.28
Uptime: 04:37:59, BSR Priority: 4, Hash mask length: 30
Next bootstrap message in 00:00:03 seconds
Next Cand_RP_advertisement in 00:00:03 seconds.
RP: 172.16.143.28(Ethernet0), Group acl: 6
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
357
show ip pim bsr
show ip pim bsr
To display information related to Protocol Independent Multicast (PIM) bootstrap router (BSR) protocol
processing, use the show ip pim bsr command in user EXEC or privileged EXEC mode.
show ip pim bsr
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In addition to auto-rp, the BSR RP method can be configured. After the BSR RP method is configured, this
command will display the BSR router information.
Examples
The following is sample output from the show ip pim bsr command:
Device# show ip pim bsr
PIMv2 Bootstrap information
This system is the Bootstrap Router (BSR)
BSR address: 172.16.143.28
Uptime: 04:37:59, BSR Priority: 4, Hash mask length: 30
Next bootstrap message in 00:00:03 seconds
Next Cand_RP_advertisement in 00:00:03 seconds.
RP: 172.16.143.28(Ethernet0), Group acl: 6
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
358
show ip pim tunnel
show ip pim tunnel
To display information about the Protocol Independent Multicast (PIM) register encapsulation and decapsulation
tunnels on an interface, use the show ip pim tunnel command.
show ip pim [vrf vrf-name] tunnel [Tunnel interface-number | verbose]
Syntax Description
vrf vrf-name
(Optional) Specifies a virtual routing and forwarding (VRF) configuration.
Tunnel interface-number
(Optional) Specifies the tunnel interface number.
verbose
(Optional) Provides additional information, such as the MAC encapsulation
header and platform-specific information.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the show ip pim tunnel to display information about PIM tunnel interfaces.
PIM tunnel interfaces are used by the IPv4 Multicast Forwarding Information Base (MFIB) for the PIM sparse
mode (PIM-SM) registration process. Two types of PIM tunnel interfaces are used by the the IPv4 MFIB:
• A PIM encapsulation tunnel (PIM Encap Tunnel)
• A PIM decapsulation tunnel (PIM Decap Tunnel)
The PIM Encap Tunnel is dynamically created whenever a group-to-rendezvous point (RP) mapping is learned
(through auto-RP, bootstrap router (BSR), or static RP configuration). The PIM Encap Tunnel is used to
encapsulate multicast packets sent by first-hop designated routers (DRs) that have directly connected sources.
Similar to the PIM Encap Tunnel, the PIM Decap Tunnel interface is dynamically created—but it is created
only on the RP whenever a group-to-RP mapping is learned. The PIM Decap Tunnel interface is used by the
RP to decapsulate PIM register messages.
Note
PIM tunnels will not appear in the running configuration.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
359
show ip pim tunnel
The following syslog message appears when a PIM tunnel interface is created:
* %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel<interface_number>,
changed state to up
Examples
The following is sample output from the show ip pim tunnel taken from an RP. The output is used to verify
the PIM Encap and Decap Tunnel on the RP:
Device# show ip pim tunnel
Tunnel0
Type : PIM Encap
RP
: 70.70.70.1*
Source: 70.70.70.1
Tunnel1*
Type : PIM Decap
RP
: 70.70.70.1*
Source: -R2#
Note
The asterisk (*) indicates that the router is the RP. The RP will always have a PIM Encap and Decap
Tunnel interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
360
show mdns cache
show mdns cache
To display mDNS cache information for the device, use the show mdns cache privileged EXEC command.
show mdns cache [interface type number | name record-name [type record-type] | type record-type]
Syntax Description
interface type-number
(Optional) Specifies a particular interface type and number for which
mDNS cache information is to be displayed.
name record-name
(Optional) Specifies a particular name for which mDNS cache information
is to be displayed.
type record-type
(Optional) Specifies a particular type for which mDNS cache information
is to be displayed.
Command Default
None
Command Modes
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain output appear.
Examples
This is an example of output from the show mdns cache command without any keywords:
Device# show mdns cache
=================================================================================================================================
[<NAME>]
[<TYPE>][<CLASS>][<TTL>/Remaining][Accessed][If-name][Mac
Address][<RR Record Data>]
_airplay._tcp.local
PTR
IN
b878.2e33.c7c5 CAMPUS APPLE TV1._airplay._tcp.local
4500/4455
0
Vl121
CAMPUS APPLE TV1._airplay._tcp.local SRV
b878.2e33.c7c5 CAMPUS-APPLE-TV1.local
IN
120/75
2
Vl121
CAMPUS-APPLE-TV1.local
b878.2e33.c7c5 121.1.0.254
IN
120/75
2
Vl121
4500/4455
2
Vl121
A
CAMPUS APPLE TV1._airplay._tcp.local TXT
IN
b878.2e33.c7c5 (162) 'deviceid=B8:78:2E:33:C7:C6'
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
361
show mdns cache
'features=0x5a7ffff7''flags=0x4'
'model=AppleT~'~
_ipp._tcp.local
PTR
IN
2894.0fed.447f EPSON XP-400 Series._ipp._tcp.local
4500/4465
2
Vl2
EPSON XP-400 Series._ipp._tcp.local
2894.0fed.447f EPSONC053AA.local
SRV
IN
120/85
2
Vl2
EPSONC053AA.local
2894.0fed.447f 121.1.0.251
A
IN
120/85
2
Vl2
4500/4465
2
Vl2
_smb._tcp.local
PTR
IN
2894.0fed.447f EPSON XP-400 Series._smb._tcp.local
4500/4465
2
Vl2
EPSON XP-400 Series._smb._tcp.local
2894.0fed.447f EPSONC053AA.local
SRV
IN
120/85
2
Vl2
EPSON XP-400 Series._smb._tcp.local
2894.0fed.447f (1)'' R2-Access1#
TXT
IN
4500/4465
2
Vl2
EPSON XP-400 Series._ipp._tcp.local TXT
IN
2894.0fed.447f (384)'txtvers=1' N XP-400 Series'
'usbFG=EPSON''usb_MDL=XP~'~
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
362
show mdns requests
show mdns requests
To display information for outstanding mDNS requests, including record name and record type information,
for the device, use the show mdns requests privileged EXEC command.
show mdns requests [detail | name record-name | type record-type [ name record-name ]]
Syntax Description
detail
Displays detailed mDNS requests information.
name record-name
Displays detailed mDNS requests information based on name.
type record-type
Displays detailed mDNS requests information based on type.
Command Default
None
Command Modes
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain output appear.
Examples
This is an example of output from the show mdns requests command without any keywords:
Device# show mdns requests
MDNS Outstanding Requests
======================================================
Request name :
_airplay._tcp.local
Request type :
PTR
Request class :
IN
-------------------------------------------------Request name :
*.*
Request type :
PTR
Request class :
IN
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
363
show mdns statistics
show mdns statistics
To display mDNS statistics for the device, use the show mdns statistics privileged EXEC command.
show mdns statistics {all | service-list list-name | service-policy {all | interface type-number }}
Syntax Description
all
Displays the service policy, service list, and interface information.
service-list list-name
Displays the service list information.
service-policy
Displays the service policy information.
interface type number
Displays interface information.
Command Default
None
Command Modes
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain output appear.
Examples
This is an example of output from the show mdns statistics all command:
Device# show mdns statistics all
mDNS Statistics
mDNS packets sent
: 0
mDNS packets received
: 0
mDNS packets dropped
: 0
mDNS cache memory in use: 64224(bytes)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
364
show platform ip multicast
show platform ip multicast
To display platform-dependent IP multicast tables and other information, use the show platform ip multicast
privileged EXEC command.
show platform ip multicast {groups | hardware [detail] | interfaces | retry}
Syntax Description
Command Modes
Command History
groups
Displays IP multicast routes per group.
hardware [detail]
Displays IP multicast routes loaded into hardware. The optional detail
keyword is used to show port members in the destination index and route
index.
interfaces
Displays IP multicast interfaces.
retry
Displays the IP multicast routes in the retry queue.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use this command only when you are working directly with a technical support representative while
troubleshooting a problem. Do not use this command unless a technical support representative asks you to do
so.
Examples
This example shows how to display platform IP multicast routes per group:
Device# show platform ip multicast groups
Total Number of entries:3
MROUTE ENTRY vrf 0 (*, 224.0.0.0)
Token: 0x0000001f6 flags: C
No RPF interface.
Number of OIF: 0
Flags: 0x10
Pkts : 0
OIF Details:No OIF interface.
DI details
---------Handle:0x603cf7f8 Res-Type:ASIC_RSC_DI Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_INVALID ref_count:1
Hardware Indices/Handles: index0:0x51f6 index1:0x51f6
Cookie length 56
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x4 0xe0 0x0 0x0 0x0 0x0 0x0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
365
show platform ip multicast
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
Detailed Resource Information (ASIC# 0)
---------------------------------------al_rsc_di
RM:index = 0x51f6
RM:pmap = 0x0
RM:cmi = 0x0
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f6
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
Detailed Resource Information (ASIC# 1)
---------------------------------------al_rsc_di
RM:index = 0x51f6
RM:pmap = 0x0
RM:cmi = 0x0
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f6
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
==============================================================
RI details
---------SI details
---------RM:generic lbl = 0x0
RM:di_handle = 0x51f6
RM:fd const lbl = 0x0
RM:skipid_idx = 0x0
RM:rcp serviceid = 0x0
RM:dejavu prechken= 0x1
RM:local cpu = 0x0
RM:local data = 0x1
RM:remote cpu = 0x0
RM:remote data = 0x1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
366
show platform ip multicast
==============================================================
HTM details
----------Handle:0x5d604490 Res-Type:ASIC_RSC_STP_INDEX Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_IPV4_MCAST_ROUTE_STARG ref_count:1
Hardware Indices/Handles: handle0:0x5d604518 handle1:0x5d604580
Detailed Resource Information (ASIC# 0)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x5d604518)
KEY - grp_addr:224.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:240.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 4095 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 164
capwap_mgid_present: 0 mgid 0
Detailed Resource Information (ASIC# 1)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x5d604580)
KEY - grp_addr:224.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:240.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 4095 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 164
capwap_mgid_present: 0 mgid 0
==============================================================
MROUTE ENTRY vrf 0 (*, 224.0.1.40)
Token: 0x0000001f8 flags: C IC
RPF interface: Vl121(74238750229529173)): SVI
Token:0x00000021 flags: F IC NS
Number of OIF: 1
Flags: 0x10
Pkts : 0
OIF Details:
Vl121
F IC NS
DI details
---------Handle:0x603d0000 Res-Type:ASIC_RSC_DI Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_INVALID ref_count:1
Hardware Indices/Handles: index0:0x51f7 index1:0x51f7
Cookie length 56
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x20 0xe0 0x0 0x1 0x28 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
Detailed Resource Information (ASIC# 0)
---------------------------------------al_rsc_di
RM:index = 0x51f7
RM:pmap = 0x0
RM:cmi = 0x33f
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
367
show platform ip multicast
al_rsc_cmi
RM:index = 0x51f7
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
Detailed Resource Information (ASIC# 1)
---------------------------------------al_rsc_di
RM:index = 0x51f7
RM:pmap = 0x0
RM:cmi = 0x33f
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f7
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
==============================================================
RI details
---------SI details
---------RM:generic lbl = 0x0
RM:di_handle = 0x51f7
RM:fd const lbl = 0x8
RM:skipid_idx = 0x0
RM:rcp serviceid = 0x0
RM:dejavu prechken= 0x1
RM:local cpu = 0x0
RM:local data = 0x1
RM:remote cpu = 0x1
RM:remote data = 0x1
==============================================================
HTM details
----------Handle:0x603d0440 Res-Type:ASIC_RSC_STP_INDEX Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_IPV4_MCAST_ROUTE_STARG ref_count:1
Hardware Indices/Handles: handle0:0x603cfae0 sm handle 0:0x603d0590 handle1:0x603d0520
sm handle 1:0x603d1770
Detailed Resource Information (ASIC# 0)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x603cfae0)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
368
show platform ip multicast
KEY - grp_addr:224.0.1.40 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 6 station_index: 165
capwap_mgid_present: 0 mgid 0
Detailed Resource Information (ASIC# 1)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x603d0520)
KEY - grp_addr:224.0.1.40 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 6 station_index: 165
capwap_mgid_present: 0 mgid 0
==============================================================
MROUTE ENTRY vrf 0 (*, 239.255.255.250)
Token: 0x0000003b7d flags: C
No RPF interface.
Number of OIF: 1
Flags: 0x10
Pkts : 95
OIF Details:
Vl131
F NS
DI details
---------Handle:0x606ffba0 Res-Type:ASIC_RSC_DI Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_INVALID ref_count:1
Hardware Indices/Handles: index0:0x51f8 index1:0x51f8
Cookie length 56
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x20 0xef 0xff 0xff 0xfa 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
Detailed Resource Information (ASIC# 0)
---------------------------------------al_rsc_di
RM:index = 0x51f8
RM:pmap = 0x0
RM:cmi = 0x0
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f8
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
Detailed Resource Information (ASIC# 1)
---------------------------------------al_rsc_di
RM:index = 0x51f8
RM:pmap = 0x0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
369
show platform ip multicast
RM:cmi = 0x0
RM:rcp_pmap = 0x1
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f8
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
==============================================================
RI details
---------ASIC# 0
Replication list :
-----------------Total #ri : 0
start_ri : 15
common_ret : 0
ASIC# 1
Replication list :
-----------------Total #ri : 6
start_ri : 15
common_ret : 0
Replication entry rep_ri 0xF #elem = 1
0) ri[0]=50 port=58 dirty=0
ASIC# 2
Replication list :
-----------------Total #ri : 0
start_ri : 0
common_ret : 0
SI details
---------RM:generic lbl = 0x0
RM:di_handle = 0x51f8
RM:fd const lbl = 0x8
RM:skipid_idx = 0x0
RM:rcp serviceid = 0x0
RM:dejavu prechken= 0x1
RM:local cpu = 0x0
RM:local data = 0x1
RM:remote cpu = 0x0
RM:remote data = 0x1
==============================================================
HTM details
-----------
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
370
show platform ip multicast
Handle:0x606ff6f8 Res-Type:ASIC_RSC_STP_INDEX Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_IPV4_MCAST_ROUTE_STARG ref_count:1
Hardware Indices/Handles: handle0:0x606ff3e0 sm handle 0:0x60ab9160 handle1:0x606ff378
sm handle 1:0x60ab6cc0
Detailed Resource Information (ASIC# 0)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x606ff3e0)
KEY - grp_addr:239.255.255.250 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 178
capwap_mgid_present: 0 mgid 0
Detailed Resource Information (ASIC# 1)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x606ff378)
KEY - grp_addr:239.255.255.250 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 178
capwap_mgid_present: 0 mgid 0
==============================================================
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
371
wireless mdns-bridging
wireless mdns-bridging
To enable Ethernet mDNS support, use the wireless mdns-bridging command. To disable Ethernet mDNS
support, use the no form of this command.
wireless mdns-bridging
no wireless mdns-bridging
This command has no keywords or arguments.
Command Default
Ethernet mDNS support is enabled by default.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use this command only if you have enabled wireless multicast.
Examples
This example shows how to enable Ethernet mDNS support:
Device# configure terminal
Enter configuration commands, one per line.
Device(config)# wireless multicast
Device(config)# wireless mdns-bridging
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
372
End with CNTL/Z.
wireless multicast
wireless multicast
To enable Ethernet multicast support, use the wireless multicast command.
wireless multicast [non-ip [vlan vlan-id]]
Syntax Description
non-ip
(Optional) Configures multicast non-IP support.
vlan vlan-id
(Optional) Specifies multicast non-IP for a VLAN. The interface number
ranges between 1 and 4095.
Command Default
Disabled
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure multicast non-IP VLAN:
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# wireless multicast non-ip vlan 20
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
373
wireless multicast
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
374
PART
VI
IPv6
• IPv6 Commands, page 377
IPv6 Commands
• ipv6 flow monitor , page 378
• ipv6 traffic-filter , page 379
• show wireless ipv6 statistics , page 380
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
377
ipv6 flow monitor
ipv6 flow monitor
This command activates a previously created flow monitor by assigning it to the interface to analyze incoming
or outgoing traffic.
To activate a previously created flow monitor, use the ipv6 flow monitor command. To de-activate a flow
monitor, use the no form of the command.
ipv6 flow monitor ipv6-monitor-name [sampler ipv6-sampler-name] {input| output}
no ipv6 flow monitor ipv6-monitor-name [sampler ipv6-sampler-name] {input| output}
Syntax Description
ipv6-monitor-name
Activates a previously created flow monitor by assigning it to the
interface to analyze incoming or outgoing traffic.
sampler ipv6-sampler-name
Applies the flow monitor sampler.
input
Applies the flow monitor on input traffic.
output
Applies the flow monitor on output traffic.
Command Default
IPv6 flow monitor is not activated until it is assigned to an interface.
Command Modes
Interface Configuration.
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You cannot attach a NetFlow monitor to a port channel interface. If both service module interfaces are part
of an EtherChannel, you should attach the monitor to both physical interfaces.
Examples
This example shows how to apply a flow monitor to an interface:
Device(config)# interface gigabitethernet 1/1/2
Device(config-if)# ip flow monitor FLOW-MONITOR-1 input
Device(config-if)# ip flow monitor FLOW-MONITOR-2 output
Device(config-if)# end
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
378
ipv6 traffic-filter
ipv6 traffic-filter
This command enables IPv6 traffic filter.
To enable the filtering of IPv6 traffic on an interface, use the ipv6 traffic-filter command. To disable the
filtering of IPv6 traffic on an interface, use the no form of the command.
Use the ipv6 traffic-filter interface configuration command on the switch stack or on a standalone switch to
filter IPv6 traffic on an interface. The type and direction of traffic that you can filter depends on the feature
set running on the switch stack. Use the no form of this command to disable the filtering of IPv6 traffic on
an interface.
ipv6 traffic-filter [web] acl-name
no ipv6 traffic-filter [web]
Syntax Description
web
(Optional) Specifies an IPv6 access name for the WLAN Web ACL.
acl-name
Specifies an IPv6 access name.
Command Default
Filtering of IPv6 traffic on an interface is not configured.
Command Modes
wlan
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 {default | vlan}
global configuration command and reload the switch.
You can use the ipv6 traffic-filter command on physical interfaces (Layer 2 or Layer 3 ports), Layer 3 port
channels, or switch virtual interfaces (SVIs).
You can apply an ACL to outbound or inbound traffic on Layer 3 interfaces (port ACLs), or to inbound traffic
on Layer 2 interfaces (router ACLs).
If any port ACL (IPv4, IPv6, or MAC) is applied to an interface, that port ACL is used to filter packets, and
any router ACLs attached to the SVI of the port VLAN are ignored.
Examples
This example shows how to filter IPv6 traffic on an interface:
Device(config-wlan)# ipv6 traffic-filter TestDocTrafficFilter
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
379
show wireless ipv6 statistics
show wireless ipv6 statistics
This command is used to display the IPv6 packet counter statistics.
To view IPv6 packet counter statistics, use the show wireless ipv6 statistics command.
show wireless ipv6 statistics
Command Default
None.
Command Modes
User EXEC.
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The following example shows the summary of the IPv6 packet counter statistics:
Device# show wireless ipv6 statistics
NS Forwarding to wireless clients
: Enabled
RS count
: 0
RA count
: 0
NS count
: 0
NA count
: 0
Other NDP packet count
: 0
-----------------------------------------------------Non-IPv6 packets count
: 0
Non-IPv6 Multicast Destination MAC packet count : 0
Invalid length packets count
: 0
Null packets count
: 0
Invalid Source MAC packets count
: 0
-----------------------------------------------------TCP packets count
: 0
UDP packets count
: 0
Fragmented packets count
: 0
No next header packets count
: 0
Other type packets count
: 0
-----------------------------------------------------Total packets count
: 0
-----------------------------------------------------Blocked RA packets count
: 0
Blocked NS packets count
: 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
380
PART
VII
Layer 2/3
• Layer 2/3 Commands, page 383
Layer 2/3 Commands
• channel-group, page 385
• channel-protocol, page 389
• clear lacp, page 391
• clear pagp, page 392
• clear spanning-tree counters, page 393
• clear spanning-tree detected-protocols, page 394
• debug etherchannel, page 396
• debug lacp, page 398
• debug pagp, page 399
• debug platform pm, page 401
• debug platform udld, page 403
• debug spanning-tree , page 404
• interface port-channel, page 406
• lacp max-bundle, page 408
• lacp port-priority, page 409
• lacp rate, page 411
• lacp system-priority, page 412
• pagp learn-method, page 414
• pagp port-priority, page 416
• port-channel, page 418
• port-channel auto, page 419
• port-channel load-balance, page 420
• port-channel load-balance extended, page 422
• port-channel min-links, page 424
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
383
• show etherchannel, page 426
• show lacp, page 429
• show pagp, page 434
• show platform etherchannel, page 436
• show platform pm, page 437
• show udld, page 438
• switchport, page 442
• switchport access vlan, page 444
• switchport mode, page 447
• switchport nonegotiate, page 450
• switchport voice vlan, page 452
• udld, page 455
• udld port, page 457
• udld reset, page 459
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
384
channel-group
channel-group
To assign an Ethernet port to an EtherChannel group, or to enable an EtherChannel mode, or both, use the
channel-group command in interface configuration mode. To remove an Ethernet port from an EtherChannel
group, use the no form of this command.
channel-group { auto | channel-group-number mode {active| auto [non-silent]| desirable [non-silent]| on|
passive}}
no channel-group
Syntax Description
auto
Enables auto-LAG feature on
individual port interface.
By default, the auto-LAG feature
is enabled on the port.
Command Default
channel-group-number
Channel group number. The range
is 1 to 128.
mode
Specifies the EtherChannel mode.
active
Unconditionally enables Link
Aggregation Control Protocol
(LACP).
auto
Enables the Port Aggregation
Protocol (PAgP) only if a PAgP
device is detected.
non-silent
(Optional) Configures the interface
for nonsilent operation when
connected to a partner that is
PAgP-capable. Use in PAgP mode
with the auto or desirable keyword
when traffic is expected from the
other device.
desirable
Unconditionally enables PAgP.
on
Enables the on mode.
passive
Enables LACP only if a LACP
device is detected.
No channel groups are assigned.
No mode is configured.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
385
channel-group
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
For Layer 2 EtherChannels, the channel-group command automatically creates the port-channel interface
when the channel group gets its first physical port. You do not have to use the interface port-channel command
in global configuration mode to manually create a port-channel interface. If you create the port-channel
interface first, the channel-group-number can be the same as the port-channel-number, or you can use a new
number. If you use a new number, the channel-group command dynamically creates a new port channel.
After you configure an EtherChannel, configuration changes that you make on the port-channel interface
apply to all the physical ports assigned to the port-channel interface. Configuration changes applied to the
physical port affect only the port where you apply the configuration. To change the parameters of all ports in
an EtherChannel, apply configuration commands to the port-channel interface, for example, spanning-tree
commands or commands to configure a Layer 2 EtherChannel as a trunk.
Active mode places a port into a negotiating state in which the port initiates negotiations with other ports by
sending LACP packets. A channel is formed with another port group in either the active or passive mode.
Auto mode places a port into a passive negotiating state in which the port responds to PAgP packets it receives
but does not start PAgP packet negotiation. A channel is formed only with another port group in desirable
mode. When auto is enabled, silent operation is the default.
Desirable mode places a port into an active negotiating state in which the port starts negotiations with other
ports by sending PAgP packets. An EtherChannel is formed with another port group that is in the desirable
or auto mode. When desirable is enabled, silent operation is the default.
If you do not specify non-silent with the auto or desirable mode, silent is assumed. The silent mode is used
when the device is connected to a device that is not PAgP-capable and rarely, if ever, sends packets. An
example of a silent partner is a file server or a packet analyzer that is not generating traffic. In this case, running
PAgP on a physical port prevents that port from ever becoming operational. However, it allows PAgP to
operate, to attach the port to a channel group, and to use the port for transmission. Both ends of the link cannot
be set to silent.
In on mode, a usable EtherChannel exists only when both connected port groups are in the on mode.
Caution
Use care when using the on mode. This is a manual configuration, and ports on both ends of the
EtherChannel must have the same configuration. If the group is misconfigured, packet loss or spanning-tree
loops can occur.
Passive mode places a port into a negotiating state in which the port responds to received LACP packets but
does not initiate LACP packet negotiation. A channel is formed only with another port group in active mode.
Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running PAgP
and LACP can coexist on the same device or on different devices in the stack (but not in a cross-stack
configuration). Individual EtherChannel groups can run either PAgP or LACP, but they cannot interoperate.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
386
channel-group
If you set the protocol by using the channel-protocol interface configuration command, the setting is not
overridden by the channel-group interface configuration command.
Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an IEEE 802.1x
port. If you try to enable IEEE 802.1x authentication on an EtherChannel port, an error message appears, and
IEEE 802.1x authentication is not enabled.
Do not configure a secure port as part of an EtherChannel or configure an EtherChannel port as a secure port.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the software
configuration guide for this release.
Caution
Examples
Do not assign bridge groups on the physical EtherChannel ports because it creates loops.
This example shows how to configure an EtherChannel on a single device in the stack. It assigns two
static-access ports in VLAN 10 to channel 5 with the PAgP mode desirable:
Device# configure terminal
Device(config)# interface range GigabitEthernet 2/0/1 - 2
Device(config-if-range)# switchport mode access
Device(config-if-range)# switchport access vlan 10
Device(config-if-range)# channel-group 5 mode desirable
Device(config-if-range)# end
This example shows how to configure an EtherChannel on a single device in the stack. It assigns two
static-access ports in VLAN 10 to channel 5 with the LACP mode active:
Device# configure terminal
Device(config)# interface range GigabitEthernet 2/0/1 - 2
Device(config-if-range)# switchport mode access
Device(config-if-range)# switchport access vlan 10
Device(config-if-range)# channel-group 5 mode active
Device(config-if-range)# end
This example shows how to configure a cross-stack EtherChannel in a device stack. It uses LACP passive
mode and assigns two ports on stack member 2 and one port on stack member 3 as static-access ports in VLAN
10 to channel 5:
Device# configure terminal
Device(config)# interface range GigabitEthernet 2/0/4 - 5
Device(config-if-range)# switchport mode access
Device(config-if-range)# switchport access vlan 10
Device(config-if-range)# channel-group 5 mode passive
Device(config-if-range)# exit
Device(config)# interface GigabitEthernet 3/0/3
Device(config-if)# switchport mode access
Device(config-if)# switchport access vlan 10
Device(config-if)# channel-group 5 mode passive
Device(config-if)# exit
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands
Command
Description
channel-protocol
Restricts the protocol used on a port to manage channeling.
interface port-channel
Accesses or creates a port channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
387
channel-group
Command
Description
show etherchannel
Displays EtherChannel information for a channel.
show lacp
Displays LACP channel-group information.
show pagp
Displays Port Aggregation Protocol (PAgP) channel-group
information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
388
channel-protocol
channel-protocol
To restrict the protocol used on a port to manage channeling, use the channel-protocol command in interface
configuration mode. To return to the default setting, use the no form of this command.
channel-protocol {lacp| pagp}
no channel-protocol
Syntax Description
lacp
Configures an EtherChannel with the Link Aggregation Control Protocol (LACP).
pagp
Configures an EtherChannel with the Port Aggregation Protocol (PAgP).
Command Default
No protocol is assigned to the EtherChannel.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the channel-protocol command only to restrict a channel to LACP or PAgP. If you set the protocol by
using the channel-protocol command, the setting is not overridden by the channel-group interface
configuration command.
You must use the channel-group interface configuration command to configure the EtherChannel parameters.
The channel-group command also can set the mode for the EtherChannel.
You cannot enable both the PAgP and LACP modes on an EtherChannel group.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
You cannot configure PAgP on cross-stack configurations.
Examples
This example shows how to specify LACP as the protocol that manages the EtherChannel:
Device(config-if)# channel-protocol lacp
You can verify your settings by entering the show etherchannel [channel-group-number] protocol privileged
EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
389
channel-protocol
Related Commands
Command
Description
channel-group
Assigns an Ethernet port to an EtherChannel group, or enables an
EtherChannel mode, or both.
show etherchannel
Displays EtherChannel information for a channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
390
clear lacp
clear lacp
To clear Link Aggregation Control Protocol (LACP) channel-group counters, use the clear lacp command
in privileged EXEC mode.
clear lacp [channel-group-number] counters
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Clears traffic counters.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can clear all counters by using the clear lacp counters command, or you can clear only the counters for
the specified channel group by using the clear lacp channel-group-number counters command.
Examples
This example shows how to clear all channel-group information:
Device# clear lacp counters
This example shows how to clear LACP traffic counters for group 4:
Device# clear lacp 4 counters
You can verify that the information was deleted by entering the show lacp counters or the show lacp
channel-group-number counters privileged EXEC command.
Related Commands
Command
Description
show lacp
Displays LACP channel-group information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
391
clear pagp
clear pagp
To clear the Port Aggregation Protocol (PAgP) channel-group information, use the clear pagp command in
privileged EXEC mode.
clear pagp [channel-group-number] counters
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Clears traffic counters.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can clear all counters by using the clear pagp counters command, or you can clear only the counters
for the specified channel group by using the clear pagp channel-group-number counters command.
Examples
This example shows how to clear all channel-group information:
Device# clear pagp counters
This example shows how to clear PAgP traffic counters for group 10:
Device# clear pagp 10 counters
You can verify that the information was deleted by entering the show pagp privileged EXEC command.
Related Commands
Command
Description
debug pagp
Enables debugging of PAgP.
show pagp
Displays Port Aggregation Protocol (PAgP) channel-group information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
392
clear spanning-tree counters
clear spanning-tree counters
To clear the spanning-tree counters, use the clear spanning-tree counters command in privileged EXEC
mode.
clear spanning-tree counters [interface interface-id]
Syntax Description
interface interface-id
(Optional) Clears all spanning-tree counters on the specified
interface. Valid interfaces include physical ports, VLANs, and port
channels.
The VLAN range is 1 to 4094.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If the interface-id value is not specified, spanning-tree counters are cleared for all interfaces.
Examples
This example shows how to clear spanning-tree counters for all interfaces:
Device# clear spanning-tree counters
Related Commands
Command
Description
clear spanning-tree detected-protocols
Restarts the protocol migration process on the interface.
debug spanning-tree
Enables debugging of spanning-tree activities.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
393
clear spanning-tree detected-protocols
clear spanning-tree detected-protocols
To restart the protocol migration process and force renegotiation with neighboring devices on the interface,
use the clear spanning-tree detected-protocols command in privileged EXEC mode.
clear spanning-tree detected-protocols [interface interface-id]
Syntax Description
interface interface-id
(Optional) Restarts the protocol migration process on the specified interface.
Valid interfaces include physical ports, VLANs, and port channels.
The VLAN range is 1 to 4094.
The port-channel range is 1 to 128.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A device running the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol or the Multiple Spanning
Tree Protocol (MSTP) supports a built-in protocol migration method that enables it to interoperate with legacy
IEEE 802.1D devices. If a rapid-PVST+ or an MSTP device receives a legacy IEEE 802.1D configuration
bridge protocol data unit (BPDU) with the protocol version set to 0, the device sends only IEEE 802.1D
BPDUs on that port. A multiple spanning-tree (MST) device can also detect that a port is at the boundary of
a region when it receives a legacy BPDU, an MST BPDU (Version 3) associated with a different region, or
a rapid spanning-tree (RST) BPDU (Version 2).
The device does not automatically revert to the rapid-PVST+ or the MSTP mode if it no longer receives IEEE
802.1D BPDUs because it cannot learn whether the legacy switch has been removed from the link unless the
legacy switch is the designated switch. Use the clear spanning-tree detected-protocols command in this
situation.
Examples
This example shows how to restart the protocol migration process on a port:
Device# clear spanning-tree detected-protocols interface gigabitethernet2/0/1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
394
clear spanning-tree detected-protocols
Related Commands
Command
Description
clear spanning-tree detected-protocols
Restarts the protocol migration process on the interface.
debug spanning-tree
Enables debugging of spanning-tree activities.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
395
debug etherchannel
debug etherchannel
To enable debugging of EtherChannels, use the debug etherchannel command in privileged EXEC mode.
To disable debugging, use the no form of the command.
debug etherchannel [all | detail | error | event | idb ]
no debug etherchannel [all | detail | error | event | idb ]
Syntax Description
all
(Optional) Displays all EtherChannel debug messages.
detail
(Optional) Displays detailed EtherChannel debug messages.
error
(Optional) Displays EtherChannel error debug messages.
event
(Optional) Displays EtherChannel event messages.
idb
(Optional) Displays PAgP interface descriptor block debug messages.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug etherchannel command is the same as the no debug etherchannel command.
Although the linecard keyword is displayed in the command-line help, it is not supported.
When you enable debugging on a stack, it is enabled only on the active switchstack master. To enable debugging
on a stack memberthe standby switch , start a session from the active switchstack master by using the session
switch-number command in privileged EXEC mode. Enter the debug command at the command-line prompt
of the stack memberstandby switch.
To enable debugging on a stack memberthe standby switch without first starting a session on the active
switchstack master, use the remote command switch-number LINE command in privileged EXEC mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
396
debug etherchannel
Examples
This example shows how to display all EtherChannel debug messages:
Device# debug etherchannel all
This example shows how to display debug messages related to EtherChannel events:
Device# debug etherchannel event
Related Commands
Command
Description
show etherchannel
Displays EtherChannel information for a channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
397
debug lacp
debug lacp
To enable debugging of Link Aggregation Control Protocol (LACP) activity, use the debug lacp command
in privileged EXEC mode. To disable LACP debugging, use the no form of this command.
debug lacp [all | event | fsm | misc | packet]
no debug lacp [all | event | fsm | misc | packet]
Syntax Description
all
(Optional) Displays all LACP debug messages.
event
(Optional) Displays LACP event debug messages.
fsm
(Optional) Displays messages about changes within the LACP finite state machine.
misc
(Optional) Displays miscellaneous LACP debug messages.
packet
(Optional) Displays the receiving and transmitting LACP control packets.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug etherchannel command is the same as the no debug etherchannel command.
When you enable debugging on a stack, it is enabled only on the active switchstack master. To enable debugging
on a stack memberthe standby switch , start a session from the active switchstack master by using the session
switch-number command in privileged EXEC mode. Enter the debug command at the command-line prompt
of the stack memberstandby switch.
To enable debugging on a stack memberthe standby switch without first starting a session on the active
switchstack master, use the remote command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display all LACP debug messages:
Device# debug LACP all
This example shows how to display debug messages related to LACP events:
Device# debug LACP event
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
398
debug pagp
debug pagp
To enable debugging of Port Aggregation Protocol (PAgP) activity, use the debug pagp command in privileged
EXEC mode. To disable PAgP debugging, use the no form of this command.
debug pagp [all | dual-active | event | fsm | misc | packet]
no debug pagp [all | dual-active | event | fsm | misc | packet]
Syntax Description
all
(Optional) Displays all PAgP debug messages.
dual-active
(Optional) Displays dual-active detection messages.
event
(Optional) Displays PAgP event debug messages.
fsm
(Optional) Displays messages about changes within the
PAgP finite state machine.
misc
(Optional) Displays miscellaneous PAgP debug messages.
packet
(Optional) Displays the receiving and transmitting PAgP
control packets.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug pagp command is the same as the no debug pagp command.
When you enable debugging on a stack, it is enabled only on the active switchstack master. To enable debugging
on a stack memberthe standby switch , start a session from the active switchstack master by using the session
switch-number command in privileged EXEC mode. Enter the debug command at the command-line prompt
of the stack memberstandby switch.
To enable debugging on a stack memberthe standby switch without first starting a session on the active
switchstack master, use the remote command switch-number LINE command in privileged EXEC mode.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
399
debug pagp
Examples
This example shows how to display all PAgP debug messages:
Device# debug pagp all
This example shows how to display debug messages related to PAgP events:
Device# debug pagp event
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
400
debug platform pm
debug platform pm
To enable debugging of the platform-dependent port manager software module, use the debug platform pm
command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug platform pm {all| counters| errdisable| fec| if-numbers| l2-control| link-status| platform| pm-spi|
pm-vectors [detail]| ses| vlans}
no debug platform pm {all| counters| errdisable| fec| if-numbers| l2-control| link-status| platform| pm-spi|
pm-vectors [detail]| ses| vlans}
Syntax Description
all
Displays all port manager debug messages.
counters
Displays counters for remote procedure call (RPC) debug messages.
errdisable
Displays error-disabled-related events debug messages.
fec
Displays forwarding equivalence class (FEC) platform-related events
debug messages.
if-numbers
Displays interface-number translation event debug messages.
l2-control
Displays Layer 2 control infra debug messages.
link-status
Displays interface link-detection event debug messages.
platform
Displays port manager function event debug messages.
pm-spi
Displays port manager stateful packet inspection (SPI) event debug
messages.
pm-vectors
Displays port manager vector-related event debug messages.
detail
(Optional) Displays vector-function details.
ses
Displays service expansion shelf (SES) related event debug messages.
vlans
Displays VLAN creation and deletion event debug messages.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
401
debug platform pm
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug platform pm command is the same as the no debug platform pm command.
When you enable debugging on a stack, it is enabled only on the active switchstack master. To enable debugging
on a stack memberthe standby switch , start a session from the active switchstack master by using the session
switch-number command in privileged EXEC mode. Enter the debug command at the command-line prompt
of the stack memberstandby switch.
To enable debugging on a stack memberthe standby switch without first starting a session on the active
switchstack master, use the remote command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display debug messages related to the creation and deletion of VLANs:
Device# debug platform pm vlans
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
402
debug platform udld
debug platform udld
To enable debugging of the platform-dependent UniDirectional Link Detection (UDLD) software, use the
debug platform udld command in privileged EXEC mode. To disable debugging, use the no form of this
command.
debug platform udld [error| event] [switch switch-number]
no debug platform udld [error| event] [switch switch-number]
Syntax Description
error
(Optional) Displays error condition debug messages.
event
(Optional) Displays UDLD-related platform event debug messages.
switch switch-number
(Optional) Displays UDLD debug messages for the specified stack member.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug platform udld command is the same as the no debug platform udld command.
When you enable debugging on a switch stack, it is enabled only on the active switch. To enable debugging
on a stack member, you can start a session from the active switch by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
403
debug spanning-tree
debug spanning-tree
To enable debugging of spanning-tree activities, use the debug spanning-tree command in EXEC mode. To
disable debugging, use the no form of this command.
debug spanning-tree {all | backbonefast | bpdu | bpdu-opt | config | etherchannel | events | exceptions |
general | ha | mstp | pvst+| root | snmp | synchronization | switch | uplinkfast}
no debug spanning-tree {all | backbonefast | bpdu | bpdu-opt | config | etherchannel | events | exceptions
| general | mstp | pvst+| root | snmp | synchronization | switch | uplinkfast}
Syntax Description
all
Displays all spanning-tree debug messages.
backbonefast
Displays BackboneFast-event debug messages.
bpdu
Displays spanning-tree bridge protocol data unit (BPDU)
debug messages.
bpdu-opt
Displays optimized BPDU handling debug messages.
config
Displays spanning-tree configuration change debug
messages.
etherchannel
Displays EtherChannel-support debug messages.
events
Displays spanning-tree topology event debug messages.
exceptions
Displays spanning-tree exception debug messages.
general
Displays general spanning-tree activity debug messages.
ha
Displays high-availability spanning-tree debug messages.
mstp
Debugs Multiple Spanning Tree Protocol (MSTP) events.
pvst+
Displays per-VLAN spanning-tree plus (PVST+) event
debug messages.
root
Displays spanning-tree root-event debug messages.
snmp
Displays spanning-tree Simple Network Management
Protocol (SNMP) handling debug messages.
switch
Displays device shim command debug messages. This
shim is the software module that is the interface between
the generic Spanning Tree Protocol (STP) code and the
platform-specific code of various device platforms.
synchronization
Displays the spanning-tree synchronization event debug
messages.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
404
debug spanning-tree
Displays UplinkFast-event debug messages.
uplinkfast
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The undebug spanning-tree command is the same as the no debug spanning-tree command.
When you enable debugging on a stack, it is enabled only on the active switchstack master. To enable debugging
on a stack memberthe standby switch , start a session from the active switchstack master by using the session
switch-number command in privileged EXEC mode. Enter the debug command at the command-line prompt
of the stack memberstandby switch.
To enable debugging on a stack memberthe standby switch without first starting a session on the active
switchstack master, use the remote command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display all spanning-tree debug messages:
Device# debug spanning-tree all
Related Commands
Command
Description
clear spanning-tree counters
Clears spanning-tree counters.
clear spanning-tree detected-protocols
Restarts the protocol migration process on the interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
405
interface port-channel
interface port-channel
To access or create a port channel, use the interface port-channel command in global configuration mode.
Use the no form of this command to remove the port channel.
interface port-channel port-channel-number
no interface port-channel
Syntax Description
port-channel-number
Channel group number. The range is 1 to 128.
Command Default
No port channel logical interfaces are defined.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
For Layer 2 EtherChannels, you do not have to create a port-channel interface before assigning physical ports
to a channel group. Instead, you can use the channel-group interface configuration command, which
automatically creates the port-channel interface when the channel group obtains its first physical port. If you
create the port-channel interface first, the channel-group-number can be the same as the port-channel-number,
or you can use a new number. If you use a new number, the channel-group command dynamically creates a
new port channel.
Only one port channel in a channel group is allowed.
Follow these guidelines when you use the interface port-channel command:
• If you want to use the Cisco Discovery Protocol (CDP), you must configure it on the physical port and
not on the port channel interface.
• Do not configure a port that is an active member of an EtherChannel as an IEEE 802.1x port. If IEEE
802.1x is enabled on a not-yet active port of an EtherChannel, the port does not join the EtherChannel.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the software
configuration guide for this release.
Examples
This example shows how to create a port channel interface with a port channel number of 5:
Device(config)# interface port-channel 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
406
interface port-channel
You can verify your setting by entering the show running-config privileged EXEC or show etherchannel
channel-group-number detail privileged EXEC command.
Related Commands
Command
Description
channel-group
Assigns an Ethernet port to an EtherChannel group, or enables an
EtherChannel mode, or both.
show etherchannel
Displays EtherChannel information for a channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
407
lacp max-bundle
lacp max-bundle
To define the maximum number of active LACP ports allowed in a port channel, use the lacp max-bundle
command in interface configuration mode. To return to the default setting, use the no form of this command.
lacp max-bundle max_bundle_number
no lacp max-bundle
Syntax Description
max_bundle_number
Command Default
None
Command Modes
Interface configuration
Command History
Usage Guidelines
The maximum number of active LACP ports in the port channel. The
range is 1 to 8. The default is 8.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in hot-standby mode. When there are more than eight ports in an LACP channel
group, the device on the controlling end of the link uses port priorities to determine which ports are bundled
into the channel and which ports are put in hot-standby mode. Port priorities on the other device (the
noncontrolling end of the link) are ignored.
The lacp max-bundle command must specify a number greater than the number specified by the port-channel
min-links command.
Use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby
mode (denoted with an H port-state flag in the output display).
Examples
This example shows how to specify a maximum of five active LACP ports in port channel 2:
Device(config)# interface port-channel 2
Device(config-if)# lacp max-bundle 5
Related Commands
Command
Description
port-channel min-links
Specifies the minimum number of LACP ports that must be in the link-up
state and bundled in the EtherChannel in order for the port channel to become
active.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
408
lacp port-priority
lacp port-priority
To configure the port priority for the Link Aggregation Control Protocol (LACP), use the lacp port-priority
command in interface configuration mode. To return to the default setting, use the no form of this command.
lacp port-priority priority
no lacp port-priority
Syntax Description
priority
Command Default
The default is 32768.
Command Modes
Interface configuration
Command History
Usage Guidelines
Port priority for LACP. The range is 1 to 65535.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The lacp port-priority interface configuration command determines which ports are bundled and which ports
are put in hot-standby mode when there are more than eight ports in an LACP channel group.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in standby mode.
In port-priority comparisons, a numerically lower value has a higher priority: When there are more than eight
ports in an LACP channel group, the eight ports with the numerically lowest values (highest priority values)
for LACP port priority are bundled into the channel group, and the lower-priority ports are put in hot-standby
mode. If two or more ports have the same LACP port priority (for example, they are configured with the
default setting of 65535), then an internal value for the port number determines the priority.
Note
The LACP port priorities are only effective if the ports are on the device that controls the LACP link. See
the lacp system-priority global configuration command for determining which device controls the link.
Use the show lacp internal privileged EXEC command to display LACP port priorities and internal port
number values.
For information about configuring LACP on physical ports, see the configuration guide for this release.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
409
lacp port-priority
Examples
This example shows how to configure the LACP port priority on a port:
Device# interface gigabitethernet2/0/1
Device(config-if)# lacp port-priority 1000
You can verify your settings by entering the show lacp [channel-group-number] internal privileged EXEC
command.
Related Commands
Command
Description
channel-group
Assigns an Ethernet port to an EtherChannel group, or enables an
EtherChannel mode, or both.
lacp system-priority
Configures the LACP system priority.
show lacp
Displays LACP channel-group information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
410
lacp rate
lacp rate
To set the rate at which Link Aggregation Control Protocol (LACP) control packets are ingressed to an
LACP-supported interface, use the lacp rate command in interface configuration mode. To return to the
default settings, use the no form of this command
lacp rate {normal | fast}
no lacp rate
Syntax Description
normal
Specifies that LACP control packets are ingressed at the normal rate, every 30 seconds
after the link is bundled.
fast
Specifies that LACP control packets are ingressed at the fast rate, once every 1 second.
Command Default
The default ingress rate for control packets is 30 seconds after the link is bundled.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Use this command to modify the duration of LACP timeout. The LACP timeout value on Cisco switch is
three times the LACP rate configured on the interface. Using the lacp ratecommand, you can select the LACP
timeout value for a switch to be either 90 seconds or 3 seconds.
This command is supported only on LACP-enabled interfaces.
Examples
This example shows how to specify the fast (1 second) ingress rate on interface GigabitEthernet 0/0:
Device(config)# interface gigabitEthernet 0/0
Device(config-if)# lacp rate fast
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
411
lacp system-priority
lacp system-priority
To configure the system priority for the Link Aggregation Control Protocol (LACP), use the lacp
system-priority command in global configuration mode on the device. To return to the default setting, use
the no form of this command.
lacp system-priority priority
no lacp system-priority
Syntax Description
priority
Command Default
The default is 32768.
Command Modes
Global configuration
Command History
Usage Guidelines
System priority for LACP. The range is 1 to 65535.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The lacp system-priority command determines which device in an LACP link controls port priorities.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in standby mode. When there are more than eight ports in an LACP channel group,
the device on the controlling end of the link uses port priorities to determine which ports are bundled into the
channel and which ports are put in hot-standby mode. Port priorities on the other device (the noncontrolling
end of the link) are ignored.
In priority comparisons, numerically lower values have a higher priority. Therefore, the system with the
numerically lower value (higher priority value) for LACP system priority becomes the controlling system. If
both devices have the same LACP system priority (for example, they are both configured with the default
setting of 32768), the LACP system ID (the device MAC address) determines which device is in control.
The lacp system-priority command applies to all LACP EtherChannels on the device.
Use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby
mode (denoted with an H port-state flag in the output display).
Examples
This example shows how to set the LACP system priority:
Device(config)# lacp system-priority 20000
You can verify your settings by entering the show lacp sys-id privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
412
lacp system-priority
Related Commands
Command
Description
channel-group
Assigns an Ethernet port to an EtherChannel group, or enables an
EtherChannel mode, or both.
lacp port-priority
Configures the port priority for the Link Aggregation Control Protocol
(LACP).
show lacp
Displays LACP channel-group information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
413
pagp learn-method
pagp learn-method
To learn the source address of incoming packets received from an EtherChannel port, use the pagp
learn-method command in interface configuration mode. To return to the default setting, use the no form of
this command.
pagp learn-method {aggregation-port| physical-port}
no pagp learn-method
Syntax Description
aggregation-port
Specifies address learning on the logical port channel. The device sends packets to
the source using any port in the EtherChannel. This setting is the default. With
aggregation-port learning, it is not important on which physical port the packet arrives.
physical-port
Specifies address learning on the physical port within the EtherChannel. The device
sends packets to the source using the same port in the EtherChannel from which it
learned the source address. The other end of the channel uses the same port in the
channel for a particular destination MAC or IP address.
Command Default
The default is aggregation-port (logical port channel).
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The learn method must be configured the same at both ends of the link.
The device supports address learning only on aggregate ports even though the physical-port keyword is
provided in the command-line interface (CLI). The pagp learn-method and the pagp port-priority interface
configuration commands have no effect on the device hardware, but they are required for PAgP interoperability
with devices that only support address learning by physical ports.
When the link partner to the device is a physical learner, we recommend that you configure the device as a
physical-port learner by using the pagp learn-method physical-port interface configuration command. We
also recommend that you set the load-distribution method based on the source MAC address by using the
port-channel load-balance src-mac global configuration command. Use the pagp learn-method interface
configuration command only in this situation.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
414
pagp learn-method
Examples
This example shows how to set the learning method to learn the address on the physical port within the
EtherChannel:
Device(config-if)# pagp learn-method physical-port
This example shows how to set the learning method to learn the address on the port channel within the
EtherChannel:
Device(config-if)# pagp learn-method aggregation-port
You can verify your settings by entering the show running-config privileged EXEC command or the show
pagp channel-group-number internal privileged EXEC command.
Related Commands
Command
Description
pagp port-priority
Selects a port over which all traffic through the EtherChannel is sent.
show pagp
Displays Port Aggregation Protocol (PAgP) channel-group information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
415
pagp port-priority
pagp port-priority
To select a port over which all Port Aggregation Protocol (PAgP) traffic through the EtherChannel is sent,
use the pagp port-priority command in interface configuration mode. If all unused ports in the EtherChannel
are in hot-standby mode, they can be placed into operation if the currently selected port and link fails. To
return to the default setting, use the no form of this command.
pagp port-priority priority
no pagp port-priority
Syntax Description
priority
Command Default
The default is 128.
Command Modes
Interface configuration
Command History
Usage Guidelines
Priority number. The range is from 0 to 255.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The physical port with the highest priority that is operational and has membership in the same EtherChannel
is the one selected for PAgP transmission.
The device supports address learning only on aggregate ports even though the physical-port keyword is
provided in the command-line interface (CLI). The pagp learn-method and the pagp port-priority interface
configuration commands have no effect on the device hardware, but they are required for PAgP interoperability
with devices that only support address learning by physical ports, such as the Catalyst 1900 switch.
When the link partner to the device is a physical learner, we recommend that you configure the device as a
physical-port learner by using the pagp learn-method physical-port interface configuration command. We
also recommend that you set the load-distribution method based on the source MAC address by using the
port-channel load-balance src-mac global configuration command. Use the pagp learn-method interface
configuration command only in this situation.
Examples
This example shows how to set the port priority to 200:
Device(config-if)# pagp port-priority 200
You can verify your setting by entering the show running-config privileged EXEC command or the show
pagp channel-group-number internal privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
416
pagp port-priority
Related Commands
Command
Description
pagp learn-method
Provides the ability to learn the source address of incoming packets.
port-channel load-balance
Sets the load-distribution method among the ports in the EtherChannel.
show pagp
Displays Port Aggregation Protocol (PAgP) channel-group information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
417
port-channel
port-channel
To convert the auto created EtherChannel into a manual channel and adding configuration on the EtherChannel,
use the port-channel command in privileged EXEC mode.
port-channel {channel-group-number persistent | persistent }
Syntax Description
channel-group-number
Channel group number. The range is 1 to 128.
persistent
Converts the auto created EtherChannel into a manual channel and allows
you to add configuration on the EtherChannel.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.7.2E
This command was introduced.
Usage Guidelines
You can use the show etherchannel summary privileged EXEC command to display the EtherChannel
information.
Examples
This example shows how to convert the auto created EtherChannel into a manual channel:
Device# port-channel 1 persistent
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
418
port-channel auto
port-channel auto
To enable the auto-LAG feature on a switch globally, use the port-channel auto command in global
configuration mode. To disable the auto-LAG feature on the switch globally, use no form of this command.
port-channel auto
no port-channel auto
Syntax Description
This command has no arguments or keywords.
Command Default
By default, the auto-LAG feature is disabled globally and is enabled on all port interfaces.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.7.2E
This command was introduced.
Usage Guidelines
You can use the show etherchannel auto privileged EXEC command to verify if the EtherChannel was
created automatically.
Examples
This example shows how to enable the auto-LAG feature on the switch:
Device(config)# port-channel auto
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
419
port-channel load-balance
port-channel load-balance
To set the load-distribution method among the ports in the EtherChannel, use the port-channel load-balance
command in global configuration mode. To reset the load-balancing mechanism to the default setting, use the
no form of this command.
port-channel load-balance {dst-ip| dst-mac| dst-mixed-ip-port| dst-port| extended| src-dst-ip| src-dst-mac|
src-dst-mixed-ip-port| src-dst-port| src-ip| src-mac| src-mixed-ip-port| src-port}
no port-channel load-balance
Syntax Description
dst-ip
Specifies load distribution based on the destination host IP address.
dst-mac
Specifies load distribution based on the destination host MAC address. Packets
to the same destination are sent on the same port, but packets to different
destinations are sent on different ports in the channel.
dst-mixed-ip-port
Specifies load distribution based on the destination IPv4 or IPv6 address and the
TCP/UDP (Layer 4) port number.
dst-port
Specifies load distribution based on the destination TCP/UDP (Layer 4) port
number for both IPv4 and IPv6.
extended
Sets extended load balance methods among the ports in the EtherChannel. See
the port-channel load-balance extended command.
src-dst-ip
Specifies load distribution based on the source and destination host IP address.
src-dst-mac
Specifies load distribution based on the source and destination host MAC address.
src-dst-mixed-ip-port
Specifies load distribution based on the source and destination host IP address
and TCP/UDP (layer 4) port number.
src-dst-port
Specifies load distribution based on the source and destination TCP/UDP (Layer
4) port number.
src-ip
Specifies load distribution based on the source host IP address.
src-mac
Specifies load distribution based on the source MAC address. Packets from
different hosts use different ports in the channel, but packets from the same host
use the same port.
src-mixed-ip-port
Specifies load distribution based on the source host IP address and TCP/UDP
(Layer 4) port number.
src-port
Specifies load distribution based on the TCP/UDP (Layer 4) port number.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
420
port-channel load-balance
Command Default
The default is src-mac.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can verify your setting by entering the show running-config privileged EXEC command or the show
etherchannel load-balance privileged EXEC command.
Examples
This example shows how to set the load-distribution method to dst-mac:
Device(config)# port-channel load-balance dst-mac
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
421
port-channel load-balance extended
port-channel load-balance extended
To set combinations of load-distribution methods among the ports in the EtherChannel, use the port-channel
load-balance extended command in global configuration mode. To reset the extended load-balancing
mechanism to the default setting, use the no form of this command.
port-channel load-balance extended[dst-ip| dst-mac| dst-port| ipv6-label| l3-proto| src-ip| src-mac|
src-port]
no port-channel load-balance extended
Syntax Description
dst-ip
(Optional) Specifies load distribution based on the destination host IP address.
dst-mac
(Optional) Specifies load distribution based on the destination host MAC address.
Packets to the same destination are sent on the same port, but packets to different
destinations are sent on different ports in the channel.
dst-port
(Optional) Specifies load distribution based on the destination TCP/UDP (Layer 4)
port number for both IPv4 and IPv6.
ipv6-label
(Optional) Specifies load distribution based on the source MAC address and IPv6
flow label.
l3-proto
(Optional) Specifies load distribution based on the source MAC address and Layer
3 protocols.
src-ip
(Optional) Specifies load distribution based on the source host IP address.
src-mac
(Optional) Specifies load distribution based on the source MAC address. Packets
from different hosts use different ports in the channel, but packets from the same
host use the same port.
src-port
(Optional) Specifies load distribution based on the TCP/UDP (Layer 4) port number.
Command Default
The default is src-mac.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
422
port-channel load-balance extended
Usage Guidelines
For information about when to use these forwarding methods, see the Layer 2/3 Configuration Guide (Catalyst
3650 Switches) for this release.
You can verify your setting by entering the show running-config privileged EXEC command or the show
etherchannel load-balance privileged EXEC command.
Examples
This example shows how to set the extended load-distribution method:
Device(config)# port-channel load-balance extended dst-ip dst-mac src-ip
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
423
port-channel min-links
port-channel min-links
To define the minimum number of LACP ports that must be bundled in the link-up state and bundled in the
EtherChannel in order that a port channel becomes active, use the port-channel min-links command in
interface configuration mode. To return to the default setting, use the no form of this command.
port-channel min-links min_links_number
no port-channel min-links
Syntax Description
min_links_number
Command Default
None
Command Modes
Interface configuration
Command History
Usage Guidelines
The minimum number of active LACP ports in the port channel. The range
is 2 to 8. The default is 1.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in hot-standby mode. When there are more than eight ports in an LACP channel
group, the device on the controlling end of the link uses port priorities to determine which ports are bundled
into the channel and which ports are put in hot-standby mode. Port priorities on the other device (the
noncontrolling end of the link) are ignored.
The port-channel min-links command must specify a number a less than the number specified by the lacp
max-bundle command.
Use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby
mode (denoted with an H port-state flag in the output display).
Examples
This example shows how to specify a minimum of three active LACP ports before port channel 2 becomes
active:
Device(config)# interface port-channel 2
Device(config-if)# port-channel min-links 3
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
424
port-channel min-links
Related Commands
Command
Description
lacp max-bundle
Specifies the maximum number of LACP ports allowed in a port
channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
425
show etherchannel
show etherchannel
To display EtherChannel information for a channel, use the show etherchannel command in user EXEC
mode.
show etherchannel [channel-group-number | {detail | port | port-channel | protocol | summary }] | [auto|
detail| load-balance | port| port-channel| protocol| summary]
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
auto
(Optional) Displays that Etherchannel is created
automatically.
detail
(Optional) Displays detailed EtherChannel information.
load-balance
(Optional) Displays the load-balance or frame-distribution
scheme among ports in the port channel.
port
(Optional) Displays EtherChannel port information.
port-channel
(Optional) Displays port-channel information.
protocol
(Optional) Displays the protocol that is being used in the
channel.
summary
(Optional) Displays a one-line summary per channel group.
Command Default
None
Command Modes
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
Usage Guidelines
If you do not specify a channel group number, all channel groups are displayed.
Examples
This is an example of output from the show etherchannel auto command:
device# show etherchannel auto
Flags: D - down
P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
426
show etherchannel
R
U
M
u
w
d
A
-
Layer3
S - Layer2
in use
f - failed to allocate aggregator
not in use, minimum links not met
unsuitable for bundling
waiting to be aggregated
default port
formed by Auto LAG
Number of channel-groups in use: 1
Number of aggregators:
1
Group Port-channel Protocol
Ports
------+-------------+-----------+----------------------------------------------1
Po1(SUA)
LACP
Gi1/0/45(P) Gi2/0/21(P) Gi3/0/21(P)
This is an example of output from the show etherchannel channel-group-number detail command:
Device> show etherchannel 1 detail
Group state = L2
Ports: 2
Maxports = 16
Port-channels: 1 Max Port-channels = 16
Protocol:
LACP
Ports in the group:
------------------Port: Gi1/0/1
-----------Port state
= Up Mstr In-Bndl
Channel group = 1
Mode = Active
Port-channel =
Po1GC = Port index
=
0Load = 0x00
Flags: S - Device is sending Slow LACPDUs
A - Device is in active mode.
Gcchange = Pseudo port-channel = Po1
Protocol = LACP
F - Device is sending fast LACPDU
P - Device is in passive mode.
Local information:
Port
Gi1/0/1
Gi1/0/2
Flags
SA
A
State
bndl
bndl
LACP port
Priority
32768
32768
Admin
Key
0x1
0x0
Oper
Key
0x1
0x1
Port
Port
Number State
0x101 0x3D
0x0
0x3D
Age of the port in the current state: 01d:20h:06m:04s
Port-channels in the group:
---------------------Port-channel: Po1
(Primary Aggregator)
Age of the Port-channel = 01d:20h:20m:26s
Logical slot/port = 10/1
Number of ports = 2
HotStandBy port
= null
Port state
= Port-channel Ag-Inuse
Protocol
= LACP
Ports in the Port-channel:
Index Load
Port
EC state
No of bits
------+------+------+------------------+----------0
00
Gi1/0/1
Active
0
0
00
Gi1/0/2
Active
0
Time since last port bundled:
01d:20h:24m:44s
Gi1/0/2
This is an example of output from the show etherchannel channel-group-number summary command:
Device> show etherchannel 1 summary
Flags: D - down P - in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3 S - Layer2
u - unsuitable for bundling
U - in use f - failed to allocate aggregator
d - default port
Number of channel-groups in use: 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
427
show etherchannel
Number of aggregators: 1
Group Port-channel Protocol
Ports
------+-------------+-----------+---------------------------------------1
Po1(SU)
LACP
Gi1/0/1(P) Gi1/0/2(P)
This is an example of output from the show etherchannel channel-group-number port-channel command:
Device> show etherchannel 1 port-channel
Port-channels in the group:
---------------------Port-channel: Po1 (Primary Aggregator)
-----------Age of the Port-channel = 01d:20h:24m:50s
Logical slot/port = 10/1 Number of ports = 2
Logical slot/port = 10/1 Number of ports = 2
Port state = Port-channel Ag-Inuse
Protocol = LACP
Ports in the Port-channel:
Index Load
Port
EC state
No of bits
------+------+------+------------------+----------0
00
Gi1/0/1 Active
0
0
00
Gi1/0/2 Active
0
Time since last port bundled: 01d:20h:24m:44s Gi1/0/2
This is an example of output from show etherchannel protocol command:
Device# show etherchannel protocol
Channel-group listing:
----------------------Group: 1
---------Protocol: LACP
Group: 2
---------Protocol: PAgP
Related Commands
Command
Description
channel-group
Assigns an Ethernet port to an EtherChannel group, or enables an
EtherChannel mode, or both.
channel-protocol
Restricts the protocol used on a port to manage channeling.
interface port-channel
Accesses or creates a port channel.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
428
show lacp
show lacp
To display Link Aggregation Control Protocol (LACP) channel-group information, use the show lacp command
in user EXEC mode.
show lacp [channel-group-number] {counters| internal| neighbor| sys-id}
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Displays traffic information.
internal
Displays internal information.
neighbor
Displays neighbor information.
sys-id
Displays the system identifier that is being used by LACP. The system
identifier consists of the LACP system priority and the device MAC
address.
Command Default
None
Command Modes
User EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can enter any show lacp command to display the active channel-group information. To display specific
channel information, enter the show lacp command with a channel-group number.
If you do not specify a channel group, information for all channel groups appears.
You can enter the channel-group-number to specify a channel group for all keywords except sys-id.
Examples
This is an example of output from the show lacp counters user EXEC command. The table that follows
describes the fields in the display.
Device> show lacp counters
LACPDUs
Marker
Marker Response
LACPDUs
Port
Sent Recv
Sent Recv
Sent Recv
Pkts Err
--------------------------------------------------------------------Channel group:1
Gi2/0/1
19
10
0
0
0
0
0
Gi2/0/2
14
6
0
0
0
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
429
show lacp
Table 21: show lacp counters Field Descriptions
Field
Description
LACPDUs Sent and Recv
The number of LACP packets sent and received by
a port.
Marker Sent and Recv
The number of LACP marker packets sent and
received by a port.
Marker Response Sent and Recv
The number of LACP marker response packets sent
and received by a port.
LACPDUs Pkts and Err
The number of unknown and illegal packets received
by LACP for a port.
This is an example of output from the show lacp internal command:
Device> show lacp 1 internal
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode
P - Device is in Passive mode
Channel group 1
Port
Gi2/0/1
Gi2/0/2
Flags
SA
SA
State
bndl
bndl
LACP port
Priority
32768
32768
Admin
Key
0x3
0x3
The following table describes the fields in the display:
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
430
Oper
Key
0x3
0x3
Port
Number
0x4
0x5
Port
State
0x3D
0x3D
show lacp
Table 22: show lacp internal Field Descriptions
Field
Description
State
State of the specific port. These are the allowed
values:
• – —Port is in an unknown state.
• bndl—Port is attached to an aggregator and
bundled with other ports.
• susp—Port is in a suspended state; it is not
attached to any aggregator.
• hot-sby—Port is in a hot-standby state.
• indiv—Port is incapable of bundling with any
other port.
• indep—Port is in an independent state (not
bundled but able to handle data traffic. In this
case, LACP is not running on the partner port).
• down—Port is down.
LACP Port Priority
Port priority setting. LACP uses the port priority to
put ports in standby mode when there is a hardware
limitation that prevents all compatible ports from
aggregating.
Admin Key
Administrative key assigned to this port. LACP
automatically generates an administrative key value
as a hexadecimal number. The administrative key
defines the ability of a port to aggregate with other
ports. A port’s ability to aggregate with other ports is
determined by the port physical characteristics (for
example, data rate and duplex capability) and
configuration restrictions that you establish.
Oper Key
Runtime operational key that is being used by this
port. LACP automatically generates this value as a
hexadecimal number.
Port Number
Port number.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
431
show lacp
Field
Description
Port State
State variables for the port, encoded as individual bits
within a single octet with these meanings:
• bit0: LACP_Activity
• bit1: LACP_Timeout
• bit2: Aggregation
• bit3: Synchronization
• bit4: Collecting
• bit5: Distributing
• bit6: Defaulted
• bit7: Expired
Note
In the list above, bit7 is the MSB and bit0 is
the LSB.
This is an example of output from the show lacp neighbor command:
Device> show lacp neighbor
Flags: S - Device is sending Slow LACPDUs
A - Device is in Active mode
F - Device is sending Fast LACPDUs
P - Device is in Passive mode
Channel group 3 neighbors
Partner’s information:
Port
Gi2/0/1
Partner
System ID
32768,0007.eb49.5e80
Partner
Port Number
0xC
Age
19s
Partner
Flags
SP
LACP Partner
Port Priority
32768
Partner
Oper Key
0x3
Partner
Port State
0x3C
Partner
System ID
32768,0007.eb49.5e80
Partner
Port Number
0xD
Age
15s
LACP Partner
Port Priority
32768
Partner
Oper Key
0x3
Partner
Port State
0x3C
Partner’s information:
Port
Gi2/0/2
Partner
Flags
SP
This is an example of output from the show lacp sys-id command:
Device> show lacp sys-id
32765,0002.4b29.3a00
The system identification is made up of the system priority and the system MAC address. The first two bytes
are the system priority, and the last six bytes are the globally administered individual MAC address associated
to the system.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
432
show lacp
Related Commands
Command
Description
clear lacp
Clears the LACP channel-group information.
lacp port-priority
Configures the port priority for the Link Aggregation Control Protocol
(LACP).
lacp system-priority
Configures the LACP system priority.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
433
show pagp
show pagp
To display Port Aggregation Protocol (PAgP) channel-group information, use the show pagp command in
EXEC mode.
show pagp [channel-group-number] {counters| dual-active| internal| neighbor}
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Displays traffic information.
dual-active
Displays the dual-active status.
internal
Displays internal information.
neighbor
Displays neighbor information.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can enter any show pagp command to display the active channel-group information. To display the
nonactive information, enter the show pagp command with a channel-group number.
Examples
This is an example of output from the show pagp 1 counters command:
Device> show pagp 1 counters
Information
Flush
Port
Sent
Recv
Sent
Recv
---------------------------------------Channel group: 1
Gi1/0/1
45
42
0
0
Gi1/0/2
45
41
0
0
This is an example of output from the show pagp dual-active command:
Device> show pagp dual-active
PAgP dual-active detection enabled: Yes
PAgP dual-active version: 1.1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
434
show pagp
Channel group 1
Dual-Active
Port
Detect Capable
Gi1/0/1
No
Gi1/0/2
No
Partner
Name
Device
Device
Partner
Port
Gi3/0/3
Gi3/0/4
Partner
Version
N/A
N/A
<output truncated>
This is an example of output from the show pagp 1 internal command:
Device> show pagp 1 internal
Flags: S - Device is sending Slow hello.
A - Device is in Auto mode.
Timers: H - Hello timer is running.
S - Switching timer is running.
C - Device is in Consistent state.
Q - Quit timer is running.
I - Interface timer is running.
Channel group 1
Port
Gi1/0/1
Gi1/0/2
Flags State
SC
U6/S7
SC
U6/S7
Timers
H
H
Hello
Interval
30s
30s
Partner PAgP
Count
Priority
1
128
1
128
Learning Group
Method Ifindex
Any
16
Any
16
This is an example of output from the show pagp 1 neighbor command:
Device> show pagp 1 neighbor
Flags:
S - Device is sending Slow hello.
A - Device is in Auto mode.
Channel group 1 neighbors
Partner
Port
Name
Gi1/0/1
device-p2
Gi1/0/2
device-p2
Related Commands
C - Device is in Consistent state.
P - Device learns on physical port.
Partner
Device ID
0002.4b29.4600
0002.4b29.4600
Partner
Port
Gi01//1
Gi1/0/2
Partner
Age Flags
9s SC
24s SC
Command
Description
clear pagp
Clears PAgP channel-group information.
Group
Cap.
10001
10001
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
435
show platform etherchannel
show platform etherchannel
To display platform-dependent EtherChannel information, use the show platform etherchannel command
in privileged EXEC mode.
show platform etherchannel channel-group-number {group-mask| load-balance mac src-mac dst-mac [ip
src-ip dst-ip [port src-port dst-port]]} [switch switch-number]
Syntax Description
channel-group-number
Channel group number. The range is 1 to 128.
group-mask
Displays EtherChannel group mask.
load-balance
Tests EtherChannel load-balance hash algorithm.
mac src-mac dst-mac
Specifies the source and destination MAC addresses.
ip src-ip dst-ip
(Optional) Specifies the source and destination IP addresses.
port src-port dst-port
(Optional) Specifies the source and destination layer port numbers.
switch switch-number
(Optional) Specifies the stack member.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use this command only when you are working directly with a technical support representative while
troubleshooting a problem.
Do not use this command unless a technical support representative asks you to do so.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
436
show platform pm
show platform pm
To display platform-dependent port manager information, use the show platform pm command in privileged
EXEC mode.
show platform pm {etherchannel channel-group-number group-mask| interface-numbers| port-data
interface-id| port-state| spi-info| spi-req-q}
Syntax Description
etherchannel channel-group-number Displays the EtherChannel group-mask table for the specified
channel group. The range is 1 to 128.
group-mask
interface-numbers
Displays interface numbers information.
port-data interface-id
Displays port data information for the specified interface.
port-state
Displays port state information.
spi-info
Displays stateful packet inspection (SPI) information.
spi-req-q
Displays stateful packet inspection (SPI) maximum wait time for
acknowledgment.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use this command only when you are working directly with your technical support representative while
troubleshooting a problem.
Do not use this command unless your technical support representative asks you to do so.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
437
show udld
show udld
To display UniDirectional Link Detection (UDLD) administrative and operational status for all ports or the
specified port, use the show udld command in user EXEC mode.
show udld [Auto-Template | Capwap | GigabitEthernet | GroupVI | InternalInterface | Loopback | Null
| Port-channel | TenGigabitEthernet | Tunnel | Vlan] interface_number
show udld neighbors
Syntax Description
Auto-Template
(Optional) Displays UDLD operational status of the
auto-template interface. The range is from 1 to 999.
Capwap
(Optional) Displays UDLD operational status of the CAPWAP
interface. The range is from 0 to 2147483647.
GigabitEthernet
(Optional) Displays UDLD operational status of the
GigabitEthernet interface. The range is from 0 to 9.
GroupVI
(Optional) Displays UDLD operational status of the group virtual
interface. The range is from 1 to 255.
InternalInterface
(Optional) Displays UDLD operational status of the internal
interface. The range is from 0 to 9.
Loopback
(Optional) Displays UDLD operational status of the loopback
interface. The range is from 0 to 2147483647.
Null
(Optional) Displays UDLD operational status of the null
interface.
Port-channel
(Optional) Displays UDLD operational status of the Ethernet
channel interfaces. The range is from 1 to 128.
TenGigabitEthernet
(Optional) Displays UDLD operational status of the Ten Gigabit
Ethernet interface. The range is from 0 to 9.
Tunnel
(Optional) Displays UDLD operational status of the tunnel
interface. The range is from 0 to 2147483647.
Vlan
(Optional) Displays UDLD operational status of the VLAN
interface. The range is from 1 to 4095.
interface-id
(Optional) ID of the interface and port number. Valid interfaces
include physical ports, VLANs, and port channels.
neighbors
(Optional) Displays neighbor information only.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
438
show udld
Command Default
None
Command Modes
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If you do not enter an interface ID, administrative and operational UDLD status for all interfaces appear.
Examples
This is an example of output from the show udld interface-id command. For this display, UDLD is enabled
on both ends of the link, and UDLD detects that the link is bidirectional. The table that follows describes the
fields in this display.
Device> show udld gigabitethernet2/0/1
Interface gi2/0/1
--Port enable administrative configuration setting: Follows device default
Port enable operational state: Enabled
Current bidirectional state: Bidirectional
Current operational state: Advertisement - Single Neighbor detected
Message interval: 60
Time out interval: 5
Entry 1
Expiration time: 146
Device ID: 1
Current neighbor state: Bidirectional
Device name: Switch-A
Port ID: Gi2/0/1
Neighbor echo 1 device: Switch-B
Neighbor echo 1 port: Gi2/0/2
Message interval: 5
CDP Device name: Switch-A
Table 23: show udld Field Descriptions
Field
Description
Interface
The interface on the local device configured for
UDLD.
Port enable administrative configuration setting
How UDLD is configured on the port. If UDLD is
enabled or disabled, the port enable configuration
setting is the same as the operational enable state.
Otherwise, the enable operational setting depends on
the global enable setting.
Port enable operational state
Operational state that shows whether UDLD is
actually running on this port.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
439
show udld
Field
Description
Current bidirectional state
The bidirectional state of the link. An unknown state
appears if the link is down or if it is connected to an
UDLD-incapable device. A bidirectional state appears
if the link is a normal two-way connection to a
UDLD-capable device. All other values mean
miswiring.
Current operational state
The current phase of the UDLD state machine. For a
normal bidirectional link, the state machine is most
often in the Advertisement phase.
Message interval
How often advertisement messages are sent from the
local device. Measured in seconds.
Time out interval
The time period, in seconds, that UDLD waits for
echoes from a neighbor device during the detection
window.
Entry 1
Information from the first cache entry, which contains
a copy of echo information received from the
neighbor.
Expiration time
The amount of time in seconds remaining before this
cache entry is aged out.
Device ID
The neighbor device identification.
Current neighbor state
The neighbor’s current state. If both the local and
neighbor devices are running UDLD normally, the
neighbor state and local state should be bidirectional.
If the link is down or the neighbor is not
UDLD-capable, no cache entries appear.
Device name
The device name or the system serial number of the
neighbor. The system serial number appears if the
device name is not set or is set to the default (Switch).
Port ID
The neighbor port ID enabled for UDLD.
Neighbor echo 1 device
The device name of the neighbors’ neighbor from
which the echo originated.
Neighbor echo 1 port
The port number ID of the neighbor from which the
echo originated.
Message interval
The rate, in seconds, at which the neighbor is sending
advertisement messages.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
440
show udld
Field
Description
CDP device name
The CDP device name or the system serial number.
The system serial number appears if the device name
is not set or is set to the default (Switch).
This is an example of output from the show udld neighbors command:
Device# show udld neighbors
Port
Device Name
-------- -------------------Gi2/0/1 Switch-A
Gi3/0/1 Switch-A
Related Commands
Device ID
---------1
2
Port-ID
-------Gi2/0/1
Gi3/0/1
OperState
-------------Bidirectional
Bidirectional
Command
Description
udld
Enables aggressive or normal mode in UDLD or sets the configurable message
timer time.
udld port
Enables UDLD on an individual interface or prevents a fiber-optic interface from
being enabled by the udld global configuration command.
udld reset
Resets all interfaces shut down by UDLD and permits traffic to pass through again.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
441
switchport
switchport
To put an interface that is in Layer 3 mode into Layer 2 mode for Layer 2 configuration, use the switchport
command in interface configuration mode. To put an interface in Layer 3 mode, use the no form of this
command.
switchport
no switchport
Syntax Description
This command has no arguments or keywords.
Command Default
By default, all interfaces are in Layer 2 mode.
Command Modes
Interface configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use the no switchport command (without parameters) to set the interface to the routed-interface status and
to erase all Layer 2 configurations. You must use this command before assigning an IP address to a routed
port.
This command is not supported on devices running the LAN Base feature set.
Entering the no switchport command shuts the port down and then reenables it, which might generate messages
on the device to which the port is connected.
When you put an interface that is in Layer 2 mode into Layer 3 mode (or the reverse), the previous configuration
information related to the affected interface might be lost, and the interface is returned to its default
configuration.
Note
If an interface is configured as a Layer 3 interface, you must first enter the switchport command to
configure the interface as a Layer 2 port. Then you can enter the switchport access vlan and switchport
mode commands.
The switchport command is not used on platforms that do not support Cisco-routed ports. All physical ports
on such platforms are assumed to be Layer 2-switched interfaces.
You can verify the port status of an interface by entering the show running-config privileged EXEC command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
442
switchport
Examples
This example shows how to cause an interface to cease operating as a Layer 2 port and become a Cisco-routed
port:
Device(config-if)# no switchport
This example shows how to cause the port interface to cease operating as a Cisco-routed port and convert to
a Layer 2 switched interface:
Device(config-if)# switchport
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
443
switchport access vlan
switchport access vlan
To configure a port as a static-access port, use the switchport access vlan command in interface configuration
mode. To reset the access mode to the default VLAN mode for the device, use the no form of this command.
switchport access vlan {vlan-id | name vlan_name}
no switchport access vlan
Syntax Description
vlan-id
VLAN ID of the access mode VLAN; the range is 1 to 4094.
name vlan_name
(Optional) Enter the name of the VLAN. You can enter up to 128
characters.
Command Default
The default access VLAN and trunk interface native VLAN is a default VLAN corresponding to the platform
or interface hardware.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
The name vlan_name keyword was introduced.
The port must be in access mode before the switchport access vlan command can take effect.
If the switchport mode is set to access vlan vlan-id, the port operates as a member of the specified VLAN.
An access port can be assigned to only one VLAN.
The no switchport access command resets the access mode VLAN to the appropriate default VLAN for the
device.
Examples
This example shows how to change a switched port interface that is operating in access mode to operate in
VLAN 2 instead of the default VLAN:
Device(config-if)# switchport access vlan 2
Examples
This example show how to first populate the VLAN database by associating a VLAN ID with a VLAN name,
and then configure the VLAN (using the name) on an interface, in the access mode: You can also verify your
configuration by entering the show interfaces interface-id switchport in privileged EXEC command and
examining information in the Access Mode VLAN: row.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
444
switchport access vlan
Part 1 - Making the entry in the VLAN database:
Device# configure terminal
Device(config)# vlan 33
Device(config-vlan)# name test
Device(config-vlan)# end
Device#
Part 2 - Checking the VLAN database
Device # show vlan id 33
VLAN Name
Status
Ports
---- -------------------------------- --------- ------------------------------33
test
active
VLAN Type SAID
MTU
Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ -----33
enet 100033
1500
0
0
Remote SPAN VLAN
---------------Disabled
Primary Secondary Type
Ports
------- --------- -------------- ------------------------------------------
Part 3 - Assigning VLAN to the interface by using the name of the VLAN
Device # configure terminal
Device(config)# interface GigabitEthernet3/1/1
Device(config-if)# switchport mode access
Device(config-if)# switchport access vlan name test
Device(config-if)# end
Device#
Part 4 - Verifying configuration
Device # show running-config interface GigabitEthernet3/1/1
Building configuration...
Current configuration : 113 bytes
!
interface GigabitEthernet3/1/1
switchport access vlan 33
switchport mode access
Switch#
Part 5 - Verifying interface switchport
Device # show interface GigabitEthernet3/1/1 switchport
Name: Gi3/1/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 33 (test)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Voice VLAN: None
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
445
switchport access vlan
Appliance trust: none
Switch#
Related Commands
Command
Description
switchport mode
Configures the VLAN membership mode of a port.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
446
switchport mode
switchport mode
To configure the VLAN membership mode of a port, use the switchport mode command in interface
configuration mode. To reset the mode to the appropriate default for the device, use the no form of this
command.
switchport mode {access| dynamic | {auto| desirable}| trunk}
noswitchport mode {access| dynamic | {auto| desirable}| trunk}
Syntax Description
access
Sets the port to access mode (either static-access or dynamic-access depending on the
setting of the switchport access vlan interface configuration command). The port is
set to access unconditionally and operates as a nontrunking, single VLAN interface that
sends and receives nonencapsulated (non-tagged) frames. An access port can be assigned
to only one VLAN.
dynamic auto
Sets the port trunking mode dynamic parameter to auto to specify that the interface
convert the link to a trunk link. This is the default switchport mode.
dynamic desirable Sets the port trunking mode dynamic parameter to desirable to specify that the interface
actively attempt to convert the link to a trunk link.
trunk
Sets the port to trunk unconditionally. The port is a trunking VLAN Layer 2 interface.
The port sends and receives encapsulated (tagged) frames that identify the VLAN of
origination. A trunk is a point-to-point link between two devices or between a device
and a router.
Command Default
The default mode is dynamic auto.
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Note
Although visible in the CLI, the dot1q-tunnel keyword is not supported.
A configuration that uses the access,or trunk keywords takes effect only when you configure the port in the
appropriate mode by using the switchport mode command. The static-access and trunk configuration are
saved, but only one configuration is active at a time.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
447
switchport mode
When you enter access mode, the interface changes to permanent nontrunking mode and negotiates to convert
the link into a nontrunk link even if the neighboring interface does not agree to the change.
When you enter trunk mode, the interface changes to permanent trunking mode and negotiates to convert
the link into a trunk link even if the interface connecting to it does not agree to the change.
When you enter dynamic auto mode, the interface converts the link to a trunk link if the neighboring interface
is set to trunk or desirable mode.
When you enter dynamic desirable mode, the interface becomes a trunk interface if the neighboring interface
is set to trunk, desirable, or auto mode.
To autonegotiate trunking, the interfaces must be in the same VLAN Trunking Protocol (VTP) domain. Trunk
negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a point-to-point protocol. However,
some internetworking devices might forward DTP frames improperly, which could cause misconfigurations.
To avoid this problem, configure interfaces connected to devices that do not support DTP to not forward DTP
frames, which turns off DTP.
• If you do not intend to trunk across those links, use the switchport mode access interface configuration
command to disable trunking.
• To enable trunking to a device that does not support DTP, use the switchport mode trunk and switchport
nonegotiate interface configuration commands to cause the interface to become a trunk but to not
generate DTP frames.
Access ports and trunk ports are mutually exclusive.
The IEEE 802.1x feature interacts with switchport modes in these ways:
• If you try to enable IEEE 802.1x on a trunk port, an error message appears, and IEEE 802.1x is not
enabled. If you try to change the mode of an IEEE 802.1x-enabled port to trunk, the port mode is not
changed.
• If you try to enable IEEE 802.1x on a port set to dynamic auto or dynamic desirable, an error message
appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port
to dynamic auto or dynamic desirable, the port mode is not changed.
• If you try to enable IEEE 802.1x on a dynamic-access (VLAN Query Protocol [VQP]) port, an error
message appears, and IEEE 802.1x is not enabled. If you try to change an IEEE 802.1x-enabled port to
dynamic VLAN assignment, an error message appears, and the VLAN configuration is not changed.
You can verify your settings by entering the show interfaces interface-id switchport privileged EXEC
command and examining information in the Administrative Mode and Operational Mode rows.
Examples
This example shows how to configure a port for access mode:
Device(config)# interface gigabitethernet2/0/1
Device(config-if)# switchport mode access
This example shows how set the port to dynamic desirable mode:
Device(config)# interface gigabitethernet2/0/1
Device(config-if)# switchport mode dynamic desirable
This example shows how to configure a port for trunk mode:
Device(config)# interface gigabitethernet2/0/1
Device(config-if)# switchport mode trunk
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
448
switchport mode
Related Commands
Command
Description
switchport access vlan
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
449
switchport nonegotiate
switchport nonegotiate
To specify that Dynamic Trunking Protocol (DTP) negotiation packets are not sent on the Layer 2 interface,
use the switchport nonegotiate command in interface configuration mode. Use the no form of this command
to return to the default setting.
switchport nonegotiate
no switchport nonegotiate
Syntax Description
This command has no arguments or keywords.
Command Default
The default is to use DTP negotiation to learn the trunking status.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The no switchport nonegotiate command removes nonegotiate status.
This command is valid only when the interface switchport mode is access or trunk (configured by using the
switchport mode access or the switchport mode trunk interface configuration command). This command
returns an error if you attempt to execute it in dynamic (auto or desirable) mode.
Internetworking devices that do not support DTP might forward DTP frames improperly and cause
misconfigurations. To avoid this problem, turn off DTP by using the switchport nonegotiate command to
configure the interfaces connected to devices that do not support DTP to not forward DTP frames.
When you enter the switchport nonegotiate command, DTP negotiation packets are not sent on the interface.
The device does or does not trunk according to the mode parameter: access or trunk.
• If you do not intend to trunk across those links, use the switchport mode access interface configuration
command to disable trunking.
• To enable trunking on a device that does not support DTP, use the switchport mode trunk and switchport
nonegotiate interface configuration commands to cause the interface to become a trunk but to not
generate DTP frames.
Examples
This example shows how to cause a port to refrain from negotiating trunking mode and to act as a trunk or
access port (depending on the mode set):
Device(config)# interface gigabitethernet2/0/1
Device(config-if)# switchport nonegotiate
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
450
switchport nonegotiate
You can verify your setting by entering the show interfaces interface-id switchport privileged EXEC
command.
Related Commands
Command
Description
switchport mode
Configures the VLAN membership mode of a port.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
451
switchport voice vlan
switchport voice vlan
To configure voice VLAN on the port, use the switchport voice vlan command in interface configuration
mode. To return to the default setting, use the no form of this command.
switchport voice vlan {vlan-id | dot1p | none | untagged | name vlan_name}
no switchport voice vlan
Syntax Description
Command Default
vlan-id
The VLAN to be used for voice traffic. The range is 1 to 4094. By default, the IP
phone forwards the voice traffic with an IEEE 802.1Q priority of 5.
dot1p
Configures the telephone to use IEEE 802.1p priority tagging and uses VLAN 0
(the native VLAN). By default, the Cisco IP phone forwards the voice traffic with
an IEEE 802.1p priority of 5.
none
Does not instruct the IP telephone about the voice VLAN. The telephone uses the
configuration from the telephone key pad.
untagged
Configures the telephone to send untagged voice traffic. This is the default for the
telephone.
name vlan_name
(Optional) Specifies the VLAN name to be used for voice traffic. You can enter up
to 128 characters.
The default is not to automatically configure the telephone (none).
The telephone default is not to tag frames.
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
Option to specify a VLAN name for voice VLAN. The
'name' keyword was added.
You should configure voice VLAN on Layer 2 access ports.
You must enable Cisco Discovery Protocol (CDP) on the switch port connected to the Cisco IP phone for the
device to send configuration information to the phone. CDP is enabled by default globally and on the interface.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
452
switchport voice vlan
Before you enable voice VLAN, we recommend that you enable quality of service (QoS) on the interface by
entering the trust device cisco-phone interface configuration command. If you use the auto QoS feature,
these settings are automatically configured.
When you enter a VLAN ID, the IP phone forwards voice traffic in IEEE 802.1Q frames, tagged with the
specified VLAN ID. The device puts IEEE 802.1Q voice traffic in the voice VLAN.
When you select dot1p, none, or untagged, the device puts the indicated voice traffic in the access VLAN.
In all configurations, the voice traffic carries a Layer 2 IP precedence value. The default is 5 for voice traffic.
When you enable port security on an interface that is also configured with a voice VLAN, set the maximum
allowed secure addresses on the port to 2. When the port is connected to a Cisco IP phone, the IP phone
requires one MAC address. The Cisco IP phone address is learned on the voice VLAN, but not on the access
VLAN. If you connect a single PC to the Cisco IP phone, no additional MAC addresses are required. If you
connect more than one PC to the Cisco IP phone, you must configure enough secure addresses to allow one
for each PC and one for the Cisco IP phone.
If any type of port security is enabled on the access VLAN, dynamic port security is automatically enabled
on the voice VLAN.
You cannot configure static secure MAC addresses in the voice VLAN.
The Port Fast feature is automatically enabled when voice VLAN is configured. When you disable voice
VLAN, the Port Fast feature is not automatically disabled.
Examples
This example show how to first populate the VLAN database by associating a VLAN ID with a VLAN name,
and then configure the VLAN (using the name) on an interface, in the access mode: You can also verify your
configuration by entering the show interfaces interface-id switchport in privileged EXEC command and
examining information in the Voice VLAN: row.
Part 1 - Making the entry in the VLAN database:
Device# configure terminal
Device(config)# vlan 55
Device(config-vlan)# name test
Device(config-vlan)# end
Device#
Part 2 - Checking the VLAN database:
Device# show vlan id 55
VLAN Name Status Ports
---- -------------------------------- --------- ------------------------------55 test active
VLAN Type SAID
MTU Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ------ ---- ----- ------ -------- --- -------- ------ -----55
enet 100055 1500 0
0
Remote SPAN VLAN
---------------Disabled
Primary Secondary Type Ports
------- --------- ----------------- ------------------------------------------
Part 3- Assigning VLAN to the interface by using the name of the VLAN:
Device# configure terminal
Device(config)# interface gigabitethernet3/1/1
Device(config-if)# switchport mode access
Device(config-if)# switchport voice vlan name test
Device(config-if)# end
Device#
Part 4 - Verifying configuration:
Device# show running-config
interface gigabitethernet3/1/1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
453
switchport voice vlan
Building configuration...
Current configuration : 113 bytes
!
interface GigabitEthernet3/1/1
switchport voice vlan 55
switchport mode access
Switch#
Part 5 - Also can be verified in interface switchport:
Device# show interface GigabitEthernet3/1/1 switchport
Name: Gi3/1/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Voice VLAN: 55 (test)
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
Appliance trust: none
Device#
Related Commands
Command
Description
show interfaces
Displays the administrative and operational status of all interfaces or a
specified interface.
switchport priority extend
Sets a port priority for the incoming untagged frames or the priority of
frames received by the IP phone connected to the specified port.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
454
udld
udld
To enable aggressive or normal mode in the UniDirectional Link Detection (UDLD) and to set the configurable
message timer time, use the udld command in global configuration mode. To disable aggressive or normal
mode UDLD on all fiber-optic ports, use the no form of the command.
udld {aggressive| enable| message time message-timer-interval}
no udld {aggressive| enable| message}
Syntax Description
Command Default
aggressive
Enables UDLD in aggressive mode on all fiber-optic interfaces.
enable
Enables UDLD in normal mode on all fiber-optic interfaces.
message time
message-timer-interval
Configures the period of time between UDLD probe messages on ports that
are in the advertisement phase and are determined to be bidirectional. The
range is 1 to 90 seconds. The default is 15 seconds.
UDLD is disabled on all interfaces.
The message timer is set at 15 seconds.
Command Modes
Command History
Usage Guidelines
Global configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD detects
unidirectional links due to misconnected interfaces on fiber-optic connections. In aggressive mode, UDLD
also detects unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and due to
misconnected interfaces on fiber-optic links. For information about normal and aggressive modes, see the
Catalyst 2960-X Switch Layer 2 Configuration GuideCatalyst 2960-XR Switch Layer 2 Configuration
GuideLayer 2/3 Configuration Guide (Catalyst 3650 Switches).
If you change the message time between probe packets, you are making a compromise between the detection
speed and the CPU load. By decreasing the time, you can make the detection-response faster but increase the
load on the CPU.
This command affects fiber-optic interfaces only. Use the udld interface configuration command to enable
UDLD on other interface types.
You can use these commands to reset an interface shut down by UDLD:
• The udld reset privileged EXEC command to reset all interfaces shut down by UDLD.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
455
udld
• The shutdown and no shutdown interface configuration commands.
• The no udld enable global configuration command followed by the udld {aggressive | enable} global
configuration command to reenable UDLD globally.
• The no udld port interface configuration command followed by the udld port or udld port aggressive
interface configuration command to reenable UDLD on the specified interface.
• The errdisable recovery cause udld and errdisable recovery interval interval global configuration
commands to automatically recover from the UDLD error-disabled state.
Examples
This example shows how to enable UDLD on all fiber-optic interfaces:
Device(config)# udld enable
You can verify your setting by entering the show udld privileged EXEC command.
Related Commands
Command
Description
show udld
Displays UDLD administrative and operational status for all ports or the specified
port.
udld port
Enables UDLD on an individual interface or prevents a fiber-optic interface from
being enabled by the udld global configuration command.
udld reset
Resets all interfaces shut down by UDLD and permits traffic to pass through
again.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
456
udld port
udld port
To enable UniDirectional Link Detection (UDLD) on an individual interface or to prevent a fiber-optic interface
from being enabled by the udld global configuration command, use the udld port command in interface
configuration mode. To return to the udld global configuration command setting or to disable UDLD if entered
for a nonfiber-optic port, use the no form of this command.
udld port [aggressive]
no udld port [aggressive]
Syntax Description
Command Default
aggressive
(Optional) Enables UDLD in aggressive mode on the specified interface.
On fiber-optic interfaces, UDLD is disabled and fiber-optic interfaces enable UDLD according to the state of
the udld enable or udld aggressive global configuration command.
On nonfiber-optic interfaces, UDLD is disabled.
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
A UDLD-capable port cannot detect a unidirectional link if it is connected to a UDLD-incapable port of
another device.
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD detects
unidirectional links due to misconnected interfaces on fiber-optic connections. In aggressive mode, UDLD
also detects unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and due to
misconnected interfaces on fiber-optic links.
To enable UDLD in normal mode, use the udld port interface configuration command. To enable UDLD in
aggressive mode, use the udld port aggressive interface configuration command.
Use the no udld port command on fiber-optic ports to return control of UDLD to the udld enable global
configuration command or to disable UDLD on nonfiber-optic ports.
Use the udld port aggressive command on fiber-optic ports to override the setting of the udld enable or udld
aggressive global configuration command. Use the no form on fiber-optic ports to remove this setting and to
return control of UDLD enabling to the udld global configuration command or to disable UDLD on
nonfiber-optic ports.
You can use these commands to reset an interface shut down by UDLD:
• The udld reset privileged EXEC command resets all interfaces shut down by UDLD.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
457
udld port
• The shutdown and no shutdown interface configuration commands.
• The no udld enable global configuration command, followed by the udld {aggressive | enable} global
configuration command reenables UDLD globally.
• The no udld port interface configuration command, followed by the udld port or udld port aggressive
interface configuration command reenables UDLD on the specified interface.
• The errdisable recovery cause udld and errdisable recovery interval interval global configuration
commands automatically recover from the UDLD error-disabled state.
Examples
This example shows how to enable UDLD on an port:
Device(config)# interface gigabitethernet6/0/1
Device(config-if)# udld port
This example shows how to disable UDLD on a fiber-optic interface despite the setting of the udld global
configuration command:
Device(config)# interface gigabitethernet6/0/1
Device(config-if)# no udld port
You can verify your settings by entering the show running-config or the show udld interface privileged
EXEC command.
Related Commands
Command
Description
show udld
Displays UDLD administrative and operational status for all ports or the specified
port.
udld
Enables aggressive or normal mode in UDLD or sets the configurable message
timer time.
udld reset
Resets all interfaces shut down by UDLD and permits traffic to pass through
again.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
458
udld reset
udld reset
To reset all interfaces disabled by UniDirectional Link Detection (UDLD) and permit traffic to begin passing
through them again (though other features, such as spanning tree, Port Aggregation Protocol (PAgP), and
Dynamic Trunking Protocol (DTP) still have their normal effects, if enabled), use the udld reset command
in privileged EXEC mode.
udld reset
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If the interface configuration is still enabled for UDLD, these ports begin to run UDLD again and are disabled
for the same reason if the problem has not been corrected.
Examples
This example shows how to reset all interfaces disabled by UDLD:
Device# udld reset
1 ports shutdown by UDLD were reset.
Related Commands
Command
Description
show udld
Displays UDLD administrative and operational status for all ports or the specified
port.
udld
Enables aggressive or normal mode in UDLD or sets the configurable message
timer time.
udld port
Enables UDLD on an individual interface or prevents a fiber-optic interface from
being enabled by the udld global configuration command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
459
udld reset
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
460
PART
VIII
Lightweight Access Point
• Cisco Lightweight Access Point Commands, page 463
Cisco Lightweight Access Point Commands
• ap auth-list ap-policy, page 469
• ap bridging, page 470
• ap capwap multicast, page 471
• ap capwap retransmit, page 472
• ap capwap timers, page 473
• ap cdp, page 475
• ap core-dump, page 477
• ap country, page 478
• ap crash-file, page 479
• ap dot11 24ghz preamble, page 480
• ap dot11 24ghz dot11g, page 481
• ap dot11 5ghz channelswitch mode, page 482
• ap dot11 5ghz power-constraint, page 483
• ap dot11 beaconperiod, page 484
• ap dot11 beamforming, page 485
• ap dot11 cac media-stream, page 487
• ap dot11 cac multimedia, page 490
• ap dot11 cac video, page 492
• ap dot11 cac voice, page 494
• ap dot11 cleanair, page 497
• ap dot11 cleanair alarm air-quality, page 498
• ap dot11 cleanair alarm device, page 499
• ap dot11 cleanair device, page 501
• ap dot11 dot11n, page 503
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
463
• ap dot11 dtpc, page 506
• ap dot11 edca-parameters, page 508
• ap dot11 rrm group-mode, page 510
• ap dot11 rrm channel cleanair-event, page 511
• ap dot11 l2roam rf-params, page 512
• ap dot11 media-stream, page 514
• ap dot11 rrm ccx location-measurement, page 516
• ap dot11 rrm channel dca, page 517
• ap dot11 rrm group-member, page 519
• ap dot11 rrm logging, page 520
• ap dot11 rrm monitor, page 522
• ap dot11 rrm ndp-type, page 524
• ap dot11 5ghz dot11ac frame-burst, page 525
• ap dot1x max-sessions, page 526
• ap dot1x username, page 527
• ap ethernet duplex, page 528
• ap group, page 529
• ap image, page 530
• ap ipv6 tcp adjust-mss, page 531
• ap led, page 532
• ap link-encryption, page 533
• ap link-latency, page 534
• ap mgmtuser username, page 535
• ap name ap-groupname, page 537
• ap name antenna band mode, page 538
• ap name bhrate, page 539
• ap name bridgegroupname, page 540
• ap name bridging, page 541
• ap name cdp interface, page 542
• ap name console-redirect, page 543
• ap name capwap retransmit, page 544
• ap name command, page 545
• ap name core-dump, page 546
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
464
• ap name country, page 547
• ap name crash-file, page 548
• ap name dot11 24ghz rrm coverage, page 549
• ap name dot11 49ghz rrm profile, page 551
• ap name dot11 5ghz rrm channel, page 553
• ap name dot11 antenna, page 554
• ap name dot11 antenna extantgain, page 556
• ap name dot11 cleanair, page 557
• ap name dot11 dot11n antenna, page 558
• ap name dot11 dual-band cleanair, page 559
• ap name dot11 dual-band shutdown, page 560
• ap name dot11 rrm ccx, page 561
• ap name dot11 rrm profile, page 562
• ap name dot11 txpower, page 564
• ap name dot1x-user, page 565
• ap name ethernet, page 567
• ap name ethernet duplex, page 568
• ap name key-zeroize , page 569
• ap name image, page 570
• ap name ipv6 tcp adjust-mss, page 571
• ap name jumbo mtu, page 572
• ap name lan, page 573
• ap name led, page 574
• ap name link-encryption, page 575
• ap name link-latency, page 576
• ap name location, page 577
• ap name mgmtuser, page 578
• ap name mode, page 580
• ap name monitor-mode, page 582
• ap name monitor-mode dot11b, page 583
• ap name name, page 584
• ap name no dot11 shutdown, page 585
• ap name power, page 586
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
465
• ap name shutdown, page 587
• ap name slot shutdown, page 588
• ap name sniff, page 589
• ap name ssh, page 590
• ap name telnet, page 591
• ap name power injector, page 592
• ap name power pre-standard, page 593
• ap name reset-button, page 594
• ap name reset, page 595
• ap name slot, page 596
• ap name static-ip, page 598
• ap name stats-timer, page 600
• ap name syslog host, page 601
• ap name syslog level, page 602
• ap name tcp-adjust-mss, page 603
• ap name tftp-downgrade, page 604
• ap power injector, page 605
• ap power pre-standard, page 606
• ap reporting-period, page 607
• ap reset-button, page 608
• service-policy type control subscriber, page 609
• ap static-ip, page 610
• ap syslog, page 611
• ap name no controller , page 613
• ap tcp-adjust-mss size, page 614
• ap tftp-downgrade, page 615
• config wireless wps rogue client mse, page 616
• clear ap name tsm dot11 all, page 617
• clear ap config, page 618
• clear ap eventlog-all, page 619
• clear ap join statistics, page 620
• clear ap mac-address, page 621
• clear ap name wlan statistics, page 622
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
466
• debug ap mac-address, page 623
• show ap cac voice, page 624
• show ap capwap, page 626
• show ap cdp, page 628
• show ap config dot11, page 629
• show ap config dot11 dual-band summary, page 630
• show ap config fnf, page 631
• show ap config, page 632
• show ap crash-file, page 633
• show ap data-plane, page 634
• show ap dot11 l2roam, page 635
• show ap dot11 cleanair air-quality, page 636
• show ap dot11 cleanair config, page 637
• show ap dot11 cleanair summary, page 639
• show ap dot11, page 640
• show ap env summary, page 645
• show ap ethernet statistics, page 646
• show ap gps-location summary, page 647
• show ap groups, page 648
• show ap groups extended, page 649
• show ap image, page 650
• show ap is-supported, page 651
• show ap join stats summary, page 652
• show ap link-encryption, page 653
• show ap mac-address, page 654
• show ap monitor-mode summary, page 656
• show ap name auto-rf, page 657
• show ap name bhmode, page 660
• show ap name bhrate, page 661
• show ap name cac voice, page 662
• show ap name config fnf, page 663
• show ap name dot11 call-control, page 664
• show ap name cable-modem, page 665
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
467
• show ap name capwap retransmit, page 666
• show ap name ccx rm, page 667
• show ap name cdp, page 668
• show ap name channel, page 669
• show ap name config, page 670
• show ap name config dot11, page 672
• show ap name config slot, page 676
• show ap name core-dump, page 680
• show ap name data-plane, page 681
• show ap name dot11, page 682
• show ap name dot11 cleanair, page 685
• show ap name env, page 686
• show ap name ethernet statistics, page 687
• show ap name eventlog, page 688
• show ap gps-location summary, page 689
• show ap name image, page 690
• show ap name inventory, page 691
• show ap name lan port, page 692
• show ap name link-encryption, page 693
• show ap name service-policy, page 694
• show ap name tcp-adjust-mss, page 695
• show ap name wlan, page 696
• show ap name wlandot11 service policy, page 698
• show ap slots, page 699
• show ap summary, page 700
• show ap tcp-adjust-mss, page 701
• show ap universal summary, page 702
• show ap uptime, page 703
• show wireless ap summary, page 704
• show wireless client ap, page 705
• test ap name, page 706
• test capwap ap name, page 707
• trapflags ap, page 708
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
468
ap auth-list ap-policy
ap auth-list ap-policy
To configure authorization policy for all Cisco lightweight access points joined to the device, use the ap
auth-list ap-policy command. To disable authorization policy for all Cisco lightweight access points joined
to the device, use the no form of this command.
ap auth-list ap-policy {authorize-ap| lsc| mic| ssc}
no ap auth-list ap-policy {authorize-ap| lsc| mic| ssc}
Syntax Description
authorize-ap
Enables the authorization policy.
lsc
Enables access points with locally significant certificates to connect.
mic
Enables access points with manufacture-installed certificates to connect.
ssc
Enables access points with self signed certificates to connect.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the access point authorization policy:
Device(config)# ap auth-list ap-policy authorize-ap
This example shows how to enable access points with locally significant certificates to connect:
Device(config)# ap auth-list ap-policy lsc
This example shows how to enable access points with manufacture-installed certificates to connect:
Device(config)# ap auth-list ap-policy mic
This example shows how to enable access points with self-signed certificates to connect:
Device(config)# ap auth-list ap-policy ssc
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
469
ap bridging
ap bridging
To enable Ethernet to 802.11 bridging on a Cisco lightweight access point, use the ap bridging command.
To disable Ethernet to 802.11 bridging on a Cisco lightweight access point, use the no form of this command.
ap bridging
no ap bridging
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable Ethernet-to-Ethernet bridging on a lightweight access point:
Device(config)# ap bridging
This example shows how to disable Ethernet-to-Ethernet bridging on a lightweight access point:
Device(config)# no ap bridging
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
470
ap capwap multicast
ap capwap multicast
To configure the multicast address used by all access points to receive multicast traffic when multicast
forwarding is enabled and to configure the outer Quality of Service (QoS) level of those multicast packets
sent to the access points, use the ap capwap multicast command.
ap capwap multicast {multicast-ip-address| service-policy output pollicymap-name}
Syntax Description
multicast-ip-address
Multicast IP address.
service-policy
Specifies the tunnel QoS policy for multicast access points.
output
Assigns a policy map name to the output.
policymap-name
Service policy map name.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a multicast address used by all access points to receive multicast traffic
when multicast forwarding is enabled:
Device(config)# ap capwap multicast 239.2.2.2
This example shows how to configure a tunnel multicast QoS service policy for multicast access points:
Device(config)# ap capwap multicast service-policy output tunnmulpolicy
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
471
ap capwap retransmit
ap capwap retransmit
To configure Control and Provisioning of Wireless Access Points (CAPWAP) control packet retransmit count
and control packet retransmit interval, use the ap capwap retransmit command.
ap capwap retransmit {count retransmit-count| interval retransmit-interval}
Syntax Description
count retransmit-count
Specifies the access point CAPWAP control packet retransmit count.
Note
interval retransmit-interval
Specifies the access point CAPWAP control packet retransmit interval.
Note
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
The count is from 3 to 8
seconds.
The interval is from 2 to 5
seconds.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the CAPWAP control packet retransmit count for an access point:
Device# ap capwap retransmit count 3
This example shows how to configure the CAPWAP control packet retransmit interval for an access point:
Device# ap capwap retransmit interval 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
472
ap capwap timers
ap capwap timers
To configure advanced timer settings, use the ap capwap timers command.
ap capwap timers {discovery-timeout seconds| fast-heartbeat-timeout local seconds| heartbeat-timeout
seconds| primary-discovery-timeout seconds| primed-join-timeout seconds}
Syntax Description
discovery-timeout
Specifies the Cisco lightweight access point discovery timeout.
Note
seconds
The Cisco lightweight access point discovery timeout is how long a
Cisco device waits for an unresponsive access point to answer before
considering that the access point failed to respond.
Cisco lightweight access point discovery timeout from 1 to 10 seconds.
Note
The default is 10
seconds.
fast-heartbeat-timeout
local
Enables the fast heartbeat timer that reduces the amount of time it takes to
detect a device failure for local or all access points.
seconds
Small heartbeat interval (from 1 to 10 seconds) that reduces the amount of time
it takes to detect a device failure.
Note
heartbeat-timeout
The fast heartbeat time-out interval is disabled by
default.
Specifies the Cisco lightweight access point heartbeat timeout.
Note
The Cisco lightweight access point heartbeat timeout controls how
often the Cisco lightweight access point sends a heartbeat keep-alive
signal to the Cisco device.
This value should be at least three times larger than the fast heartbeat
timer.
seconds
Cisco lightweight access point heartbeat timeout value from 1 to 30 seconds.
Note
The default is 30
seconds.
primary-discovery-timeout Specifies the access point primary discovery request timer. The timer determines
the amount of time taken by an access point to discovery the configured primary,
secondary, or tertiary device.
seconds
Access point primary discovery request timer from 30 to 3600 seconds.
Note
primed-join-timeout
The default is 120
seconds.
Specifies the authentication timeout. Determines the time taken by an access
point to determine that the primary device has become unresponsive. The access
point makes no further attempts to join the device until the connection to the
device is restored.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
473
ap capwap timers
seconds
Authentication response timeout from 120 to 43200 seconds.
Note
Command Default
None
Command Modes
Global configuration
Command History
Examples
The default is 120
seconds.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure an access point discovery timeout with the timeout value of 7:
Device(config)# ap capwap timers discovery-timeout 7
This example shows how to enable the fast heartbeat interval for all access points:
Device(config)# ap capwap timers fast-heartbeat-timeout 6
This example shows how to configure an access point heartbeat timeout to 20:
Device(config)# ap capwap timers heartbeat-timeout 20
This example shows how to configure the access point primary discovery request timer to 1200 seconds:
Device(config)# ap capwap timers primary-discovery-timeout 1200
This example shows how to configure the authentication timeout to 360 seconds:
Device(config)# ap capwap timers primed-join-timeout 360
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
474
ap cdp
ap cdp
To enable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the ap cdp command.
To disable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the no form of this
command.
ap cdp [interface {ethernet ethernet-id| radio radio-id}]
no ap cdp [interface {ethernet ethernet-id| radio radio-id}]
Syntax Description
interface
(Optional) Specifies CDP in a specific interface.
ethernet
Specifies CDP for an Ethernet interface.
ethernet-id
Ethernet interface number from 0 to 3.
radio
Specifies CDP for a radio interface.
radio-id
Radio number from 0 to 3.
Command Default
Disabled on all access points.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The no ap cdp command disables CDP on all access points that are joined to the device and all access points
that join in the future. CDP remains disabled on both current and future access points even after the device
or access point reboots. To enable CDP, enter the ap cdp command.
CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all
access points joined to the device, you can disable and then reenable CDP on individual access points
using the ap name Cisco-AP cdp command. After you disable CDP on all access points joined to the
device, you can enable and then disable CDP on individual access points.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
475
ap cdp
Examples
This example shows how to enable CDP on all access points:
Device(config)# ap cdp
This example shows how to enable CDP for Ethernet interface number 0 on all access points:
Device(config)# ap cdp ethernet 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
476
ap core-dump
ap core-dump
To enable a Cisco lightweight access point’s memory core dump settings, use the ap core-dump command.
To disable a Cisco lightweight access point’s memory core dump settings, use the no form of this command.
ap core-dump tftp-ip-addr filename {compress| uncompress}
no ap core-dump
Syntax Description
tftp-ip-addr
IP address of the TFTP server to which the access point sends core dump
files.
filename
Name that the access point uses to label the core file.
compress
Compresses the core dump file.
uncompress
Uncompresses the core dump file.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The access point must be able to reach the TFTP server.
Examples
This example shows how to configure and compress the core dump file:
Device(config)# ap core-dump 192.0.2.51 log compress
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
477
ap country
ap country
To configure one or more country codes for a device, use the ap country command.
ap country country-code
Syntax Description
country-code
Two-letter or three-letter country code or several country codes separated
by a comma.
Command Default
US (country code of the United States of America).
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco device must be installed by a network administrator or qualified IT professional and the installer
must select the proper country code. Following installation, access to the unit should be password protected
by the installer to maintain compliance with regulatory requirements and to ensure proper unit functionality.
See the related product guide for the most recent country codes and regulatory domains.
Examples
This example shows how to configure country codes on the device to IN (India) and FR (France):
Device(config)# ap country IN,FR
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
478
ap crash-file
ap crash-file
To delete crash and radio core dump files, use the ap crash-file command.
ap crash-file {clear-all| delete filename}
Syntax Description
clear-all
Deletes all the crash and radio core dump files.
delete
Deletes a single crash and radio core dump file.
filename
Name of the file to delete.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to delete all crash files:
Device# ap crash-file clear-all
This example shows how to delete crash file 1:
Device# ap crash-file delete crash-file-1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
479
ap dot11 24ghz preamble
ap dot11 24ghz preamble
To enable only a short preamble as defined in subclause 17.2.2.2 , use the ap dot11 24ghz preamble
command. To enable long preambles (for backward compatibility with pre-802.11b devices, if these devices
are still present in your network) or short preambles (recommended unless legacy pre-802.11b devices are
present in the network), use the no form of this command.
ap dot11 24ghz preamble short
no ap dot11 24ghz preamble short
Syntax Description
short
Command Default
short preambles
Command Modes
Global configuration
Command History
Specifies the short 802.11b preamble.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Note
You must reboot the Cisco device (reset system) with the Save command before you can use the ap dot11
24ghz preamble command.
This parameter may need to be set to long to optimize this Cisco device for some legacy clients, including
SpectraLink NetLink telephones.
This command can be used any time that the CLI interface is active.
Examples
This example shows how to enable both long and short preamblest:
Device(config)# no ap dot11 24ghz preamble short
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
480
ap dot11 24ghz dot11g
ap dot11 24ghz dot11g
To enable the Cisco wireless LAN solution 802.11g network, use the ap dot11 24ghz dot11g command. To
disable the Cisco wireless LAN solution 802.11g network, use the no form of this command.
ap dot11 24ghz dot11g
no ap dot11 24ghz dot11g
Syntax Description
This command has no keywords and arguments.
Command Default
Enabled
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Before you enter the ap dot11 24ghz dot11g command, disable the 802.11 Cisco radio with the ap dot11
24ghz shutdown command.
After you configure the support for the 802.11g network, use the no ap dot11 24ghz shutdown command to
enable the 802.11 2.4 Ghz radio.
Examples
This example shows how to enable the 802.11g network:
Device(config)# ap dot11 24ghz dot11g
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
481
ap dot11 5ghz channelswitch mode
ap dot11 5ghz channelswitch mode
To configure a 802.11h channel switch announcement, use the ap dot11 5ghz channelswitch mode command.
To disable a 802.11h channel switch announcement, use the no form of this command.
ap dot11 5ghz channelswitch mode value
no ap dot11 5ghz channelswitch mode
Syntax Description
value
802.11h channel announcement value.
Note
You can specify anyone of the following two values:
• 0—Indicates that the channel switch announcement is
disabled.
• 1—Indicates that the channel switch announcement is
enabled.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the 802.11h switch announcement:
Device(config)# ap dot11 5ghz channelswitch mode 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
482
ap dot11 5ghz power-constraint
ap dot11 5ghz power-constraint
To configure the 802.11h power constraint value, use the ap dot11 5ghz power-constraint command. To
remove the 802.11h power constraint value, use the no form of this command.
ap dot11 5ghz power-constraint value
no ap dot11 5ghz power-constraint
Syntax Description
value
802.11h power constraint value.
Note
Command Default
None
Command Modes
Global configuration
Command History
Examples
The range is from 0 to 30
dBm.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the 802.11h power constraint to 5 dBm:
Device(config)# ap dot11 5ghz power-constraint 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
483
ap dot11 beaconperiod
ap dot11 beaconperiod
To change the beacon period globally for 2.4 GHz or 5 GHz bands, use the ap dot11 beaconperiod command.
Note
Disable the 802.11 network before using this command. See the “Usage Guidelines” section.
ap dot11 {24ghz| 5ghz} beaconperiod time
Syntax Description
24ghz
Specifies the settings for 2.4 GHz band.
5ghz
Specifies the settings for 5 GHz band.
beaconperiod
Specifies the beacon for a network globally.
time
Beacon interval in time units (TU). One TU is 1024 microseconds. The range
is from 20 to 1000.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
In Cisco wireless LAN 802.11 networks, all Cisco lightweight access point wireless LANs broadcast a beacon
at regular intervals. This beacon notifies clients that the wireless service is available and allows the clients to
synchronize with the lightweight access point.
Before you change the beacon period, make sure that you have disabled the 802.11 network by using the ap
dot11 {24ghz | 5ghz} shutdown command. After changing the beacon period, enable the 802.11 network by
using the no ap dot11 {24ghz | 5ghz} shutdown command.
Examples
This example shows how to configure the 5 GHZ band for a beacon period of 120 time units:
Device(config)# ap dot11 5ghz beaconperiod 120
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
484
ap dot11 beamforming
ap dot11 beamforming
To enable beamforming on the network or on individual radios, use the ap dot11 beamforming command.
ap dot11 {24ghz| 5ghz} beamforming
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
beamforming
Specifies beamforming on the network.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
When you enable beamforming on the network, it is automatically enabled for all the radios applicable to that
network type.
Follow these guidelines for using beamforming:
• Beamforming is supported for legacy orthogonal frequency-division multiplexing (OFDM) data rates
(6, 9, 12, 18, 24, 36, 48, and 54 Mbps).
Note
Beamforming is not supported for Direct Sequence Spread Spectrum data rates ( 1 and
2 Mbps) and Complementary-Code Key (CCK) data rates (5.5 and 11 Mbps).
• Beamforming is supported only on access points that support 802.11n (AP1260, AP3500, and AP3600).
• Two or more antennas must be enabled for transmission.
• All three antennas must be enabled for reception.
• OFDM rates must be enabled.
If the antenna configuration restricts operation to a single transmit antenna, or if OFDM rates are disabled,
beamforming is not used.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
485
ap dot11 beamforming
Examples
This example shows how to enable beamforming on the 5 GHz band:
Device(config)# ap dot11 5ghz beamforming
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
486
ap dot11 cac media-stream
ap dot11 cac media-stream
To configure media stream Call Admission Control (CAC) voice and video quality parameters for 2.4 GHz
and 5 GHz bands, use the ap dot11 cac media-stream command.
ap dot11 {24ghz| 5ghz} cac media-stream multicast-direct {max-retry-percent retryPercent|
min-client-rate{eighteen| eleven| fiftyFour| fivePointFive| fortyEight| nine| oneFifty|
oneFortyFourPointFour| oneThirty| oneThirtyFive| seventyTwoPointTwo| six| sixtyFive| thirtySix|
threeHundred| twelve| twentyFour| two| twoSeventy}}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
multicast-direct
Specifies CAC parameters for multicast-direct media streams.
max-retry-percent
Specifies the percentage of maximum retries that are allowed for multicast-direct
media streams.
retryPercent
Percentage of maximum retries that are allowed for multicast-direct media streams.
Note
min-client-rate
The range is from 0 to
100.
Specifies the minimum transmission data rate to the client for multicast-direct
media streams (rate at which the client must transmit in order to receive
multicast-direct unicast streams).
If the transmission rate is below this rate, either the video will not start or the
client may be classified as a bad client. The bad client video can be demoted for
better effort QoS or subject to denial.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
487
ap dot11 cac media-stream
min-client-rate
You can choose the following rates:
• eighteen
• eleven
• fiftyFour
• fivePointFive
• fortyEight
• nine
• one
• oneFifty
• oneFortyFourPointFour
• oneThirty
• oneThirtyFive
• seventyTwoPointTwo
• six
• sixtyFive
• thirtySix
• threeHundred
• twelve
• twentyFour
• two
• twoSeventy
Command Default
The default value for the maximum retry percent is 80. If it exceeds 80, either the video will not start or the
client might be classified as a bad client. The bad client video will be demoted for better effort QoS or is
subject to denial.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
488
ap dot11 cac media-stream
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.
Examples
This example shows how to configure the maximum retry percent for multicast-direct media streams as 90
on a 802.11a network:
Device(config)# ap dot11 5ghz cac media-stream multicast max-retry-percent 90
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
489
ap dot11 cac multimedia
ap dot11 cac multimedia
To configure multimedia Call Admission Control (CAC) voice and video quality parameters for 2.4 GHz and
5 GHz bands, use the ap dot11 cac multimedia command.
ap dot11 {24ghz| 5ghz} cac multimedia max-bandwidth bandwidth
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
max-bandwidth
Specifies the percentage of maximum bandwidth allocated to Wi-Fi Multimedia
(WMM) clients for voice and video applications on the 2.4 GHz or 5 GHz band.
bandwidth
Percentage of the maximum bandwidth allocated to WMM clients for voice and
video applications on the 802.11a or 802.11b/g network. Once the client reaches
the specified value, the access point rejects new multimedia flows this radio band.
The range is from 5 to 85%.
Command Default
The default value is 75%.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
490
ap dot11 cac multimedia
Examples
This example shows how to configure the percentage of the maximum bandwidth allocated to WMM clients
for voice and video applications on the 5 GHz band:
Device(config)# ap dot11 5ghz cac multimedia max-bandwidth 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
491
ap dot11 cac video
ap dot11 cac video
To configure Call Admission Control (CAC) parameters for the video category, use the ap dot11 cac video
command. To disable the CAC parameters for video category, use the no form of this command.
ap dot11 {24ghz| 5ghz} cac video {acm| max-bandwidth value| roam-bandwidth value}
no ap dot11 {24ghz| 5ghz} cac video {acm| max-bandwidth value| roam-bandwidth value}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
acm
Enables bandwidth-based video CAC for the 2.4 GHz or 5 GHz band.
Note
max-bandwidth
Sets the percentage of the maximum bandwidth allocated to clients for video
applications on the 2.4 GHz or 5 GHz band.
value
Bandwidth percentage value from 5 to 85%.
roam-bandwidth
Sets the percentage of the CAC maximum allocated bandwidth reserved for
roaming video clients on the 2.4 GHz or 5 GHz band.
value
Bandwidth percentage value from 0 to 85%.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
To disable bandwidth-based video CAC for the 2.4 GHz or 5 GHz
band, use the no ap dot11 {24ghz | 5ghz} cac video acm command.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
492
ap dot11 cac video
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm command.
Examples
This example shows how to enable the bandwidth-based CAC:
Device(config)# ap dot11 24ghz cac video acm
This example shows how to specify the percentage of the maximum allocated bandwidth for video applications
on the selected radio band:
Device(config)# ap dot11 24ghz cac video max-bandwidth 50
This example shows how to configure the percentage of the maximum allocated bandwidth reserved for
roaming video clients on the selected radio band:
Device(config)# ap dot11 24ghz cac video roam-bandwidth 10
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
493
ap dot11 cac voice
ap dot11 cac voice
To configure Call Admission Control (CAC) parameters for the voice category, use the ap dot11 cac voice
command.
ap dot11 {24ghz| 5ghz} cac voice{acm| load-based| max-bandwidth value| roam-bandwidth value| sip
[bandwidth bw] sample-interval value| stream-size x max-streams y| tspec-inactivity-timeout{enable|
ignore}}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
acm
Enables bandwidth-based voice CAC for the 2.4 GHz
or 5 GHz band.
Note
load-based
Enable load-based CAC on voice access category.
Note
To disable load-based CAC on voice access
category for the 2.4 GHz or 5 GHz band, use
the no ap dot11 {24ghz | 5ghz} cac voice
load-based command.
max-bandwidth
Sets the percentage of the maximum bandwidth
allocated to clients for voice applications on the 2.4
GHz or 5 GHz band.
value
Bandwidth percentage value from 5 to 85%.
roam-bandwidth
Sets the percentage of the CAC maximum allocated
bandwidth reserved for roaming voice clients on the
2.4 GHz or 5 GHz band.
value
Bandwidth percentage value from 0 to 85%.
sip
Specifies the CAC codec name and sample interval as
parameters and calculates the required bandwidth per
call for the 802.11 networks.
bandwidth
(Optional) Specifies bandwidth for a SIP-based call.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
494
To disable bandwidth-based voice CAC for
the 2.4 GHz or 5 GHz band, use the no ap
dot11 {24ghz | 5ghz} cac voice acm
command.
ap dot11 cac voice
bw
Bandwidth in kbps. The following bandwidth values
specify parameters for the SIP codecs:
• 64kbps—Specifies CAC parameters for the SIP
G711 codec.
• 8kbps—Specifies CAC parameters for the SIP
G729 codec.
Note
The default value is 64
Kbps.
sample-interval
Specifies the packetization interval for SIP codec.
value
Packetization interval in msecs. The sample interval
for SIP codec value is 20 seconds.
stream-size
Specifies the number of aggregated voice Wi-Fi
Multimedia (WMM) traffic specification (TSPEC)
streams at a specified data rate for the 2.4 GHz or 5
GHz band.
x
Stream size. The range of the stream size is from 84000
to 92100.
max-streams
Specifies the maximum number of streams per TSPEC.
y
Number (1 to 5) of voice streams.
Note
The default number of streams is 2 and the
mean data rate of a stream is 84 kbps.
tspec-inactivity-timeout
Specifies TSPEC inactivity timeout processing mode.
Note
Use this keyword to process or ignore the
Wi-Fi Multimedia (WMM) traffic
specifications (TSPEC) inactivity timeout
received from an access point. When the
inactivity timeout is ignored, a client TSPEC
is not deleted even if the access point reports
an inactivity timeout for that client.
enable
Processes the TSPEC inactivity timeout messages.
ignore
Ignores the TSPEC inactivity timeout messages.
Note
Command Default
None
Command Modes
Global configuration
The default is ignore
(disabled).
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
495
ap dot11 cac voice
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.
Examples
This example shows how to enable the bandwidth-based CAC:
Device(config)# ap dot11 24ghz cac voice acm
This example shows how to enable the load-based CAC on the voice access category:
Device(config)# ap dot11 24ghz cac voice load-based
This example shows how to specify the percentage of the maximum allocated bandwidth for voice applications
on the selected radio band:
Device(config)# ap dot11 24ghz cac voice max-bandwidth 50
This example shows how to configure the percentage of the maximum allocated bandwidth reserved for
roaming voice clients on the selected radio band:
Device(config)# ap dot11 24ghz cac voice roam-bandwidth 10
This example shows how to configure the bandwidth and voice packetization interval for the G729 SIP codec
on a 2.4 GHz band:
Device(config)# ap dot11 24ghz cac voice sip bandwidth 8 sample-interval 40
This example shows how to configure the number of aggregated voice traffic specifications stream with a
stream size of 85000 and with a maximum of 5 streams:
Device(config)# ap dot11 24ghz cac voice stream-size 85000 max-streams 5
This example shows how to enable the voice TSPEC inactivity timeout messages received from an access
point:
Device(config)# ap dot11 24ghz cac voice tspec-inactivity-timeout enable
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
496
ap dot11 cleanair
ap dot11 cleanair
To configure CleanAir on 802.11 networks, use the ap dot11 cleanair command. To disable CleanAir on
802.11 networks, use the no form of this command.
ap dot11 {24ghz| 5ghz} cleanair
no ap dot11 {24ghz| 5ghz} cleanair
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
cleanair
Specifies CleanAir on the 2.4 GHz or 5 GHz band.
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the CleanAir settings on the 2.4 GHz band:
Device(config)# ap dot11 24ghz cleanair
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
497
ap dot11 cleanair alarm air-quality
ap dot11 cleanair alarm air-quality
To configure CleanAir air-quality alarms for Cisco lightweight access points, use the ap dot11 cleanair
alarm air-quality command.
ap dot11 {24ghz| 5ghz} cleanair alarm air-quality [threshold value]
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
threshold
Specifies the air-quality alarm threshold.
value
Air quality alarm threshold (1 is bad air quality, and 100 is good air quality).
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the CleanAir 2.4 GHz air-quality threshold to 90:
Device(config)# ap dot11 24ghz cleanair air-quality threshold 90
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
498
ap dot11 cleanair alarm device
ap dot11 cleanair alarm device
To configure the CleanAir interference devices alarms on the 2.4 GHz or 5 GHz bands, use the ap dot11
cleanair alarm device command. To disable the CleanAir interference devices alarms on the 802.11 networks,
use the no form of this command.
ap dot11 {24ghz| 5ghz} cleanair alarm device{all| bt-discovery| bt-link| canopy| cont-tx| dect-like| fh|
inv| jammer| mw-oven| nonstd| superag| tdd-tx| video| wimax-fixed| wimax-mobile| xbox| zigbee}
no ap dot11 {24ghz| 5ghz} cleanair
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
all
Specifies all the device types at once.
bt-discovery
Specifies the Bluetooth device in discovery mode.
bt-link
Specifies the Bluetooth active link.
canopy
Specifies the Canopy devices.
cont-tx
Specifies the continuous transmitter.
dect-like
Specifies a Digital Enhanced Cordless Communication (DECT)-like
phone.
fh
Specifies the frequency hopping devices.
inv
Specifies the devices using spectrally inverted Wi-Fi signals.
jammer
Specifies the jammer.
mw-oven
Specifies the microwave oven devices.
nonstd
Specifies the devices using nonstandard Wi-Fi channels.
superag
Specifies 802.11 SuperAG devices.
tdd-tx
Specifies the TDD transmitter.
video
Specifies video cameras.
wimax-fixed
Specifies a WiMax fixed device.
wimax-mobile
Specifies a WiMax mobile device.
xbox
Specifies the Xbox device.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
499
ap dot11 cleanair alarm device
zigbee
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Specifies the ZigBee device.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable alarms for ZigBee interference detection:
Device(config)# no ap dot11 24ghz cleanair alarm device zigbee
This example shows how to enable alarms for detection of Bluetooth links:
Device(config)# ap dot11 24ghz cleanair alarm device bt-link
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
500
ap dot11 cleanair device
ap dot11 cleanair device
To configure CleanAir interference device types, use the ap dot11 cleanair device command.
ap dot11 24ghz cleanair device [all| bt-discovery| bt-link| canopy| cont-tx| dect-like| fh| inv| jammer|
mw-oven| nonstd| superag| tdd-tx| video| wimax-fixed| wimax-mobile| xbox| zigbee]
Syntax Description
Command Default
all
Specifies all device types.
device
Specifies the CleanAir interference device type.
bt-discovery
Specifies the Bluetooth device in discovery mode.
bt-link
Specifies the Bluetooth active link.
canopy
Specifies the Canopy devices.
cont-tx
Specifies the continuous transmitter.
dect-like
Specifies a Digital Enhanced Cordless Communication
(DECT)-like phone.
fh
Specifies the 802.11 frequency hopping devices.
inv
Specifies the devices using spectrally inverted Wi-Fi signals.
jammer
Specifies the jammer.
mw-oven
Specifies the microwave oven devices.
nonstd
Specifies the devices using nonstandard Wi-Fi channels.
superag
Specifies 802.11 SuperAG devices.
tdd-tx
Specifies the TDD transmitter.
video
Specifies video cameras.
wimax-fixed
Specifies a WiMax fixed device.
wimax-mobile
Specifies a WiMax mobile device.
xbox
Specifies the Xbox device.
zigbee
Specifies the ZigBee device.
None
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
501
ap dot11 cleanair device
Command Modes
Command History
Examples
Global configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the device to monitor ZigBee interferences:
Device(config)# ap dot11 24ghz cleanair device zigbee
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
502
ap dot11 dot11n
ap dot11 dot11n
To configure settings for an 802.11n network, use the ap dot11 dot11n command.
ap dot11 {24ghz| 5ghz} dot11n {a-mpdu tx priority {priority_value all }| scheduler timeout rt
scheduler_value}| a-msdu tx priority {priority_value| all}| guard-interval {any| long}| mcs tx rate| rifs
rx}
Syntax Description
24ghz
Specifies the 2.4-GHz band.
5ghz
Specifies the 5-GHz band.
dot11n
Enables 802.11n support.
a-mpdu tx priority
Specifies the traffic that is associated with the priority level
that uses Aggregated MAC Protocol Data Unit (A-MPDU)
transmission.
priority_value
Aggregated MAC protocol data unit priority level from 0
to 7.
all
Specifies all of the priority levels at once.
a-msdu tx priority
Specifies the traffic that is associated with the priority level
that uses Aggregated MAC Service Data Unit (A-MSDU)
transmission.
priority_value
Aggregated MAC protocol data unit priority level from 0
to 7.
all
Specifies all of the priority levels at once.
scheduler timeout rt
Configures the 802.11n A-MPDU transmit aggregation
scheduler timeout value in milliseconds.
scheduler_value
The 802.11n A-MPDU transmit aggregation scheduler
timeout value from 1 to 10000 milliseconds.
guard-interval
Specifies the guard interval.
any
Enables either a short or a long guard interval.
long
Enables only a long guard interval.
mcs tx rate
Specifies the modulation and coding scheme (MCS) rates
at which data can be transmitted between the access point
and the client.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
503
ap dot11 dot11n
rate
Specifies the modulation and coding scheme data rates.
Note
rifs rx
Command Default
By default, priority 0 is enabled.
Command Modes
Global configuration
Command History
Usage Guidelines
The range is from 0 to
23.
Specifies the Reduced Interframe Space (RIFS) between
data frames.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Aggregation is the process of grouping packet data frames together rather than transmitting them separately.
The two aggregation methods available are:
• A-MPDU—This aggregation is performed in the software.
• A-MSDU—This aggregation is performed in the hardware
Aggregated MAC Protocol Data Unit priority levels assigned per traffic type are as follows:
• 0—Best effort
• 1—Background
• 2—Spare
• 3—Excellent effort
• 4—Controlled load
• 5—Video, less than 100-ms latency and jitter
• 6—Voice, less than 10-ms latency and jitter
• 7—Network control
• all—Configure all of the priority levels at once.
Note
Configure the priority levels to match the aggregation method used by the clients.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
504
ap dot11 dot11n
Examples
This example shows how to enable 802.11n support on a 2.4-GHz band:
Device(config)# ap dot11 24ghz dot11n
This example shows how to configure all the priority levels at once so that the traffic that is associated with
the priority level uses A-MSDU transmission:
Device(config)# ap dot11 24ghz dot11n a-msdu tx priority all
This example shows how to enable only long guard intervals:
Device(config)# ap dot11 24ghz dot11n guard-interval long
This example shows how to specify MCS rates:
Device(config)# ap dot11 24ghz dot11n mcs tx 5
This example shows how to enable RIFS:
Device(config)# ap dot11 24ghz dot11n rifs rx
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
505
ap dot11 dtpc
ap dot11 dtpc
To configure Dynamic Transmit Power Control (DTPC) settings, Cisco Client eXtension (CCX) version 5
expedited bandwidth request feature, and the fragmentation threshold on an 802.11 network, use the ap dot11
dtpc command.
ap dot11 {24ghz| 5ghz} {dtpc| exp-bwreq| fragmentation threshold}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
dtpc
Specifies Dynamic Transport Power Control (DTPC) settings.
Note
exp-bwreq
Specifies Cisco Client eXtension (CCX) version 5 expedited bandwidth request
feature.
Note
fragmentation threshold
Command Default
None
Command Modes
Global configuration
Command History
The expedited bandwidth request feature is disabled by
default.
Specifies the fragmentation threshold.
Note
threshold
This option is enabled by
default.
This option can only used be when the network is disabled using the
ap dot11 {24ghz | 5ghz} shutdown command.
Threshold. The range is from 256 to 2346 bytes (inclusive).
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When the CCX version 5 expedited bandwidth request feature is enabled, the device configures all joining
access points for this feature.
Examples
This example shows how to enable DTPC for the 5 GHz band:
Device(config)# ap dot11 5ghz dtpc
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
506
ap dot11 dtpc
This example shows how to enable the CCX expedited bandwidth settings:
Device(config)# ap dot11 5ghz exp-bwrep
This example shows how to configure the fragmentation threshold on the 5 GHz band with the threshold
number of 1500 bytes:
Device(config)# ap dot11 5ghz fragmentation 1500
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
507
ap dot11 edca-parameters
ap dot11 edca-parameters
To enable a specific enhanced distributed channel access (EDCA) profile on the 2.4 GHz or 5 GHz bands,
use the ap dot11 edca-parameters command. To disable an EDCA profile on the 2.4 GHz or 5 GHz bands,
use the no form of this command.
ap dot11 {24ghz| 5ghz} edca-parameters {custom-voice| optimized-video-voice| optimized-voice| svp-voice|
wmm-default}
no ap dot11 {24ghz| 5ghz} edca-parameters {custom-voice| optimized-video-voice| optimized-voice|
svp-voice| wmm-default}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
edca-parameters
Specifies a specific enhanced distributed channel access (EDCA) profile on
the 802.11 networks.
custom-voice
Enables custom voice EDCA parameters.
optimized-video-voice
Enables EDCA voice- and video-optimized profile parameters. Choose this
option when both voice and video services are deployed on your network.
optimized-voice
Enables EDCA voice-optimized profile parameters. Choose this option when
voice services other than SpectraLink are deployed on your network.
svp-voice
Enables SpectraLink voice priority parameters. Choose this option if
SpectraLink phones are deployed on your network to improve the quality of
calls.
wmm-default
Enables the Wi-Fi Multimedia (WMM) default parameters. Choose this option
when voice or video services are not deployed on your network.
Command Default
wmm-default
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
10.3
The custom-voice keyword was
removed for Cisco 5700 Series
WLC.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
508
ap dot11 edca-parameters
Examples
This example shows how to enable SpectraLink voice priority parameters:
Device(config)# ap dot11 24ghz edca-parameters svp-voice
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
509
ap dot11 rrm group-mode
ap dot11 rrm group-mode
To set the 802.11 automatic RF group selection mode on, use the ap dot11 rrm group-mode command. To
set the 802.11 automatic RF group selection mode off, use the no form of this command.
ap dot11 {5ghz| 24ghz} rrm group-mode {auto| leader| off| restart}
no ap dot11 {5ghz| 24ghz} rrm group-mode
Syntax Description
5ghz
Specifies the 2.4 GHz band.
24ghz
Specifies the 5 GHz band.
auto
Sets the 802.11 RF group selection to automatic update mode.
leader
Sets the 802.11 RF group selection to static mode, and sets this device as the
group leader.
off
Sets the 802.11 RF group selection to off.
restart
Restarts the 802.11 RF group selection.
Command Default
auto
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to turn the auto RF group selection mode on the 5 GHz band:
Device(config)# ap dot11 5ghz rrm group-mode auto
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
510
ap dot11 rrm channel cleanair-event
ap dot11 rrm channel cleanair-event
To configure CleanAir event-driven Radio Resource Management (RRM) parameters for all 802.11 Cisco
lightweight access points, use the ap dot11 rrm channel cleanair-event command. When this parameter
is configured, CleanAir access points can change their channel when a source of interference degrades the
operations, even if the RRM interval has not expired yet.
ap dot11 {24ghz| 5ghz} rrm channel {cleanair-event sensitivity value}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
sensitivity
Sets the sensitivity for CleanAir event-driven RRM.
value
Sensitivity value. You can specify any one of the following three optional
sensitivity values:
• low—Specifies low sensitivity.
• medium—Specifies medium sensitivity.
• high—Specifies high sensitivity.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to set the high sensitivity for CleanAir event-driven RRM:
Device(config)# ap dot11 24ghz rrm channel cleanair-event sensitivity high
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
511
ap dot11 l2roam rf-params
ap dot11 l2roam rf-params
To configure the 2.4 GHz or 5 GHz Layer 2 client roaming parameters, use the ap dot11 l2roam rf-params
command.
ap dot11 {24ghz| 5ghz} l2roam rf-params custom min-rssi roam-hyst scan-thresh trans-time
Syntax Description
Command Default
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
custom
Specifies custom Layer 2 client roaming RF parameters.
min-rssi
Minimum received signal strength indicator (RSSI) that is required for the client to associate
to the access point. If the client’s average received signal power dips below this threshold,
reliable communication is usually impossible. Clients must already have found and roamed
to another access point with a stronger signal before the minimum RSSI value is reached.
The valid range is –80 to –90 dBm, and the default value is –85 dBm.
roam-hyst
How much greater the signal strength of a neighboring access point must be in order for
the client to roam to it. This parameter is intended to reduce the amount of roaming between
access points if the client is physically located on or near the border between the two
access points. The valid range is 2 to 4 dB, and the default value is 2 dB.
scan-thresh
Minimum RSSI that is allowed before the client should roam to a better access point.
When the RSSI drops below the specified value, the client must be able to roam to a better
access point within the specified transition time. This parameter also provides a power-save
method to minimize the time that the client spends in active or passive scanning. For
example, the client can scan slowly when the RSSI is above the threshold and scan more
rapidly when the RSSI is below the threshold. The valid range is –70 to –77 dBm, and the
default value is –72 dBm.
trans-time
Maximum time allowed for the client to detect a suitable neighboring access point to roam
to and to complete the roam, whenever the RSSI from the client’s associated access point
is below the scan threshold. The valid range is 1 to 10 seconds, and the default value is 5
seconds.
min-rssi
-85
roam-hyst
2
scan-thresh
-72
trans-time
5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
512
ap dot11 l2roam rf-params
Command Modes
Command History
Examples
Global configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure custom Layer 2 client roaming parameters on an 802.11a network:
Device(config)# ap dot11 5ghz l2roam rf-params custom -80 2 -70 7
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
513
ap dot11 media-stream
ap dot11 media-stream
To configure media stream multicast-direct and video-direct settings on an 802.11 network, use the ap dot11
media-stream command.
ap dot11 {24ghz| 5ghz} media-stream {multicast-direct {admission-besteffort| client-maximum value|
radio-maximum value}| video-redirect}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
multicast-direct
Specifies the multicast-direct for the 2.4 GHz or a 5 GHz band.
admission-besteffort
Admits the media stream to the best-effort queue.
client-maximum value
Specifies the maximum number of streams allowed on a client.
radio-maximum value
Specifies the maximum number of streams allowed on a 2.4 GHz or
a 5 GHz band.
video-redirect
Specifies the media stream video-redirect for the 2.4 GHz or a 5 GHz
band.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Before you configure the media stream multicast-direct or video-redirect on a 802.11 network, ensure that
the network is nonoperational.
Examples
This example shows how to enable media stream multicast-direct settings on the 5 GHz band:
Device(config)# ap dot11 5ghz media-stream multicast-direct
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
514
ap dot11 media-stream
This example shows how to admit the media stream to the best-effort queue if there is not enough bandwidth
to prioritize the flow:
Device(config)# ap dot11 5ghz media-stream multicast-direct admission-besteffort
This example shows how to set the maximum number of streams allowed on a client:
Device(config)# ap dot11 5ghz media-stream multicast-direct client-maximum 10
This example shows how to enable media stream traffic redirection on the 5 GHz band:
Device(config)# ap dot11 5ghz media-stream video-redirect
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
515
ap dot11 rrm ccx location-measurement
ap dot11 rrm ccx location-measurement
To configure cisco client Extensions (CCX) client location measurements for 2.4 GHz and 5 GHz bands, use
the ap dot11 rrm ccx location-measurement command.
ap dot11 {24ghz| 5ghz} rrm ccx location-measurement {disable| interval}
Syntax Description
24ghz
Specifies the 2.4-GHz band.
5ghz
Specifies the 5-GHz band.
disable
Disables support for CCX client location measurements.
interval
Interval from 10 to 32400.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable support for 2.4 GHz CCX client location measurements:
Device(config)# no ap dot11 24ghz rrm ccx location-measurement
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
516
ap dot11 rrm channel dca
ap dot11 rrm channel dca
To configure Dynamic Channel Assignment (DCA) algorithm parameters on 802.11 networks, use the ap
dot11 rrm channel dca command.
ap dot11 {24ghz| 5ghz} rrm channel dca{channel_number| anchor-time value| global{auto| once}| interval
value| min-metric value| sensitivity{high| low| medium}}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
channel_number
Channel number to be added to the DCA list.
Note
The range is from 1 to
14.
anchor-time
Specifies the anchor time for DCA.
value
Hour of time between 0 and 23. These values represent the hour from 12:00 a.m.
to 11:00 p.m.
global
Specifies the global DCA mode for the access points in the 802.11 networks.
auto
Enables auto-RF.
once
Enables one-time auto-RF.
interval
Specifies how often the DCA is allowed to run.
value
Interval between the times when DCA is allowed to run. Valid values are 0, 1,
2, 3, 4, 6, 8, 12, or 24 hours. 0 is 10 minutes (600 seconds). Default value is 0
(10 minutes).
min-metric
Specifies the DCA minimum RSSI energy metric.
value
Minimum RSSI energy metric value from –100 to –60.
sensitivity
Specifies how sensitive the DCA algorithm is to environmental changes (for
example, signal, load, noise, and interference) when determining whether or not
to change channels.
high
Specifies that the DCA algorithm is not particularly sensitive to environmental
changes. See the “Usage Guidelines” section for more information.
low
Specifies that the DCA algorithm is moderately sensitive to environmental
changes. See the “Usage Guidelines” section for more information.
medium
Specifies that the DCA algorithm is highly sensitive to environmental changes.
See the “Usage Guidelines” section for more information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
517
ap dot11 rrm channel dca
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The DCA sensitivity thresholds vary by radio band as shown in the table below.
To aid in troubleshooting, the output of this command shows an error code for any failed calls. The table
below explains the possible error codes for failed calls.
Table 24: DCA Sensitivity Threshold
Examples
Sensitivity
2.4 Ghz DCA Sensitivity
Threshold
5 Ghz DCA Sensitivity Threshold
High
5 dB
5 dB
Medium
15 dB
20 dB
Low
30 dB
35 dB
This example shows how to configure the device to start running DCA at 5 pm for the 2.4 GHz band:
Device(config)# ap dot11 24ghz rrm channel dca anchor-time 17
This example shows how to set the DCA algorithm to run every 10 minutes for the 2.4 GHz band:
Device(config)# ap dot11 24ghz rrm channel dca interval 0
This example shows how to configure the value of DCA algorithm’s sensitivity to low on the 2.4 GHz band:
Device(config)# ap dot11 24ghz rrm channel dca sensitivity low
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
518
ap dot11 rrm group-member
ap dot11 rrm group-member
To configure members in an 802.11 static RF group, use the ap dot11 rrm group-member command. To
remove members from 802.11 RF group, use the no form of this command.
ap dot11 {24ghz| 5ghz} rrm group-member controller-name controller-ip
no ap dot11 {24ghz| 5ghz} rrm group-member controller-name controller-ip
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
controller-name
Name of the device to be added.
controller-ip
IP address of the device to be added.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to add a device in the 5 GHz band RF group:
Device(config)# ap dot11 5ghz rrm group-member cisco-controller 192.0.2.54
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
519
ap dot11 rrm logging
ap dot11 rrm logging
To configure report log settings on supported 802.11 networks, use the ap dot11 rrm logging command.
ap dot11 {24ghz| 5ghz} rrm logging {channel| coverage| foreign| load| noise| performance| txpower}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
channel
Turns the channel change logging mode on or off. The default mode is off
(Disabled).
coverage
Turns the coverage profile logging mode on or off. The default mode is off
(Disabled).
foreign
Turns the foreign interference profile logging mode on or off. The default mode
is off (Disabled).
load
Turns the load profile logging mode on or off. The default mode is off
(Disabled).
noise
Turns the noise profile logging mode on or off. The default mode is off
(Disabled).
performance
Turns the performance profile logging mode on or off. The default mode is off
(Disabled).
txpower
Turns the transit power change logging mode on or off. The default mode is
off (Disabled).
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to turn the 5 GHz logging channel selection mode on:
Device(config)# ap dot11 5ghz rrm logging channel
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
520
ap dot11 rrm logging
This example shows how to turn the 5 GHz coverage profile violation logging selection mode on:
Device(config)# ap dot11 5ghz rrm logging coverage
This example shows how to turn the 5 GHz foreign interference profile violation logging selection mode on:
Device(config)# ap dot11 5ghz rrm logging foreign
This example shows how to turn the 5 GHz load profile logging mode on:
Device(config)# ap dot11 5ghz rrm logging load
This example shows how to turn the 5 GHz noise profile logging mode on:
Device(config)# ap dot11 5ghz rrm logging noise
This example shows how to turn the 5 GHz performance profile logging mode on:
Device(config)# ap dot11 5ghz rrm logging performance
This example shows how to turn the 5 GHz transmit power change mode on:
Device(config)# ap dot11 5ghz rrm logging txpower
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
521
ap dot11 rrm monitor
ap dot11 rrm monitor
To Configure monitor settings on the 802.11 networks, use the ap dot11 rrm monitor command.
ap dot11 {24ghz| 5ghz} rrm monitor{channel-list| {all| country| dca}| coverage| load| noise| signal}
seconds
Syntax Description
24ghz
Specifies the 802.11b parameters.
5ghz
Specifies the 802.11a parameters.
channel-list all
Monitors the noise, interference, and rogue monitoring channel list for all
channels.
channel-list country
Monitors the noise, interference, and rogue monitoring channel list for the
channels used in the configured country code.
channel-list dca
Monitors the noise, interference, and rogue monitoring channel list for the
channels used by automatic channel assignment.
coverage
Specifies the coverage measurement interval.
load
Specifies the load measurement interval.
noise
Specifies the noise measurement interval.
signal
Specifies the signal measurement interval.
rssi-normalization
Configure RRM Neighbor Discovery RSSI Normalization.
seconds
Measurement interval time from 60 to 3600 seconds.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
522
ap dot11 rrm monitor
Examples
This example shows how to monitor the channels used in the configured country:
Device(config)# ap dot11 24ghz rrm monitor channel-list country
This example shows how to set the coverage measurement interval to 60 seconds:
Device(config)# ap dot11 24ghz rrm monitor coverage 60
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
523
ap dot11 rrm ndp-type
ap dot11 rrm ndp-type
To configure the 802.11 access point radio resource management neighbor discovery protocol type, use the
ap dot11 rrm ndp-type command.
ap dot11 {24ghz| 5ghz} rrm ndp-type {protected| transparent}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
protected
Specifies the Tx RRM protected (encrypted) neighbor discovery protocol.
transparent
Specifies the Tx RRM transparent (not encrypted) neighbor discovery
protocol.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Before you configure the 802.11 access point RRM neighbor discovery protocol type, ensure that you have
disabled the network by entering the ap dot11 {24ghz | 5ghz} shutdown command.
This example shows how to enable the 802.11a access point RRM neighbor discovery protocol type as
protected:
Device(config)# ap dot11 5ghz rrm ndp-type protected
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
524
ap dot11 5ghz dot11ac frame-burst
ap dot11 5ghz dot11ac frame-burst
To configure the 802.11ac Frame Burst use the apdot115ghzdot11acframe-burst command. Use the no
forms to disable the bursting of 802.11ac A-MPDUs.
ap dot115ghzdot11acframe-burst
noap dot115ghzdot11acframe-burst
ap dot115ghzdot11acframe-burstautomatic
noap dot115ghzdot11acframe-burstautomatic
Syntax Description
5ghz
Configures the 802.11a parameters.
frame-burst
Configures the bursting of 802.11ac A-MPDUs.
Command Default
No
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.6E
This command was introduced.
This is the example shows how to configure the bursting of 802.11ac A-MPDUs.
Deviceap dot11 5ghz
dot11ac frame-burst
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
525
ap dot1x max-sessions
ap dot1x max-sessions
To configure the maximum number of simultaneous 802.1X sessions allowed per access point, use the ap
dot1x max-sessions command.
ap dot1x max-sessions num-of-sessions
Syntax Description
num-of-sessions
Command Default
None
Command Modes
Global configuration
Command History
Number of maximum 802.1X sessions initiated per AP at a time. The range
is from 0 to 255, where 0 indicates unlimited.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
It is required to limit the number of simultaneous 802.1X sessions initiated per access point to protect against
flooding attacks caused by using 802.1X messages.
Examples
This example shows how to configure the maximum number of simultaneous 802.1X sessions:
Device(config)# ap dot1x max-sessions 100
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
526
ap dot1x username
ap dot1x username
To configure the 802.1X username and password for all access points that are currently joined to the device
and any access points that join the device in the future, use the ap dot1x username command. To disable
the 802.1X username and password for all access points that are currently joined to the device, use the no
form of this command.
ap dot1x username user-id password{0| 8} password-string
no ap dot1x username user-idpassword{0| 8} password-string
Syntax Description
user-id
Username.
password
Specifies an 802.1X password for all access points.
0
Specifies an unencrypted password.
8
Specifies an AES encrypted password.
password_string
Password.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You should enter a strong password. Strong passwords have the following characteristics:
• They are at least eight characters long.
• They contain a combination of uppercase and lowercase letters, numbers, and symbols.
• They are not words in any language.
You can set the values for a specific access point.
Examples
This example shows how to configure the global authentication username and password for all access points:
Device(config)# ap dot1x username cisco123 password 0 cisco2020
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
527
ap ethernet duplex
ap ethernet duplex
To configure the Ethernet port duplex and speed settings of the lightweight access points, use the ap ethernet
duplex command. To disable the Ethernet port duplex and speed settings of lightweight access points, use
the no form of this command.
ap ethernet duplex duplex speed speed
no ap ethernet
Syntax Description
duplex
Ethernet port duplex settings. You can specify the following
options to configure the duplex settings:
• auto—Specifies the Ethernet port duplex auto settings.
• half—Specifies the Ethernet port duplex half settings.
• full—Specifies the Ethernet port duplex full settings.
speed
Specifies the Ethernet port speed settings.
speed
Ethernet port speed settings. You can specify the following
options to configure the speed settings:
• auto—Specifies the Ethernet port speed to auto.
• 10—Specifies the Ethernet port speed to 10 Mbps.
• 100—Specifies the Ethernet port speed to 100 Mbps.
• 1000—Specifies the Ethernet port speed to 1000 Mbps.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Ethernet port duplex full settings as 1000 Mbps for all access points:
Device(config)# ap ethernet duplex full speed 1000
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
528
ap group
ap group
To create a new access point group, use the ap group command. To remove an access point group, use the
no form of this command.
ap group group-name
no ap group group-name
Syntax Description
group-name
Command Default
None
Command Modes
Global configuration
Command History
Access point group name.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
An error message appears if you try to delete an access point group that is used by at least one access point.
Before you can delete an AP group, move all APs in this group to another group. The access points are not
moved to the default-group access point group automatically. To see the APs, enter the show ap summary
command. To move access points, enter the ap name Cisco-AP ap-groupname Group-Name command.
Examples
This example shows how to create a new access point group:
Device(config)# ap group sampleapgroup
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
529
ap image
ap image
To configure an image on all access points that are associated to the device, use the ap image command.
ap image {predownload| reset| swap}
Syntax Description
predownload
Instructs all the access points to start predownloading an image.
reset
Instructs all the access points to reboot.
swap
Instructs all the access points to swap the image.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to predownload an image to all access points:
Device# ap image predownload
This example shows how to reboot all access points:
Device# ap image reset
This example shows how to swap the access point’s primary and secondary images:
Device# ap image swap
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
530
ap ipv6 tcp adjust-mss
ap ipv6 tcp adjust-mss
To configure IPv6 TCP maximum segment size (MSS) value for all Cisco APs, use the ap ipv6 tcp adjust-mss
command.
ap ipv6 tcp adjust-mss size
no ap ipv6 tcp adjust-mss size
Syntax Description
adjust-mss
Configures IPv6 TCP MSS settings for all Cisco APs.
size
MSS value in the range of 500 to 1440.
Command Default
None
Command Modes
Global configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The MSS value must be in the range of 500 to 1440.
Examples
This example shows how to configure the IPv6 TCP MSS value to 600 for all Cisco APs:
Device(config)# ap ipv6 tcp adjust-mss 600
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
531
ap led
ap led
To enable the LED state for an access point, use the ap led command. To disable the LED state for an access
point, use the no form of this command.
ap led
no ap led
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the LED state for an access point:
Device(config)# ap led
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
532
ap link-encryption
ap link-encryption
To enable Datagram Transport Layer Security (DTLS) data encryption for access points, use the ap
link-encryption command. To disable the DTLS data encryption for access points, use the no form of this
command.
ap link-encryption
no ap link-encryption
Syntax Description
This command has no keywords and arguments.
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable data encryption for all the access points that are joined to the controller:
Device(config)# ap link-encryption
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
533
ap link-latency
ap link-latency
To enable link latency for all access points that are currently associated to the device, use the ap link-latency
command. To disable link latency all access points that are currently associated to the device, use the no form
of this command.
ap link-latency [reset]
no ap link-latency
Syntax Description
reset
(Optional) Resets all link latency for all access points.
Command Default
Link latency is disabled by default.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command enables or disables link latency only for those access points that are currently joined to the
device. It does not apply to access points that join in the future.
Examples
This example shows how to enable the link latency for all access points:
Device(config)# ap link-latency
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
534
ap mgmtuser username
ap mgmtuser username
To configure the username, password, and secret password for access point management, use the ap mgmtuser
username command.
ap mgmtuser username username password password_type password secret secret_type secret
Syntax Description
username
Specifies the username for access point management.
password
Specifies the password for access point management.
password_type
Password type. You can specify any one of the following
two password types:
• 0—Specifies that an unencrypted password will
follow.
• 8—Specifies that an AES encrypted password will
follow.
password
Access point management password.
Note
The password does not get encrypted by
service-password encryption.
secret
Specifies the secret password for privileged access point
management.
secret_type
Secret type. You can specify any one of the following two
secret types:
• 0—Specifies that an unencrypted secret password
will follow.
• 8—Specifies that an AES encrypted secret password
will follow.
secret
Command Default
None
Command Modes
Global configuration
Command History
Access point management secret password.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
535
ap mgmtuser username
Usage Guidelines
To specify a strong password, the following password requirements should be met:
• The password should contain characters from at least three of the following classes: lowercase letters,
uppercase letters, digits, and special characters.
• No character in the password can be repeated more than three times consecutively.
• The password should not contain a management username or the reverse of a username.
• The password should not contain words such as Cisco, oscic, admin, nimda or any variant obtained by
changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for
s.
To specify a strong secret password, the following requirement should be met:
• The secret password should contain characters from at least three of the following classes: lowercase
letters, uppercase letters, digits, or special characters.
Examples
This example shows how to add a username, password, and secret password for access point management:
Device(config)# ap mgmtuser username glbusr password 0 Arc_1234 secret 0 Mid_1234
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
536
ap name ap-groupname
ap name ap-groupname
To add a Cisco lightweight access point to a specific access point group, use the ap name ap-groupname
command.
ap name ap-name ap-groupname group-name
Syntax Description
ap-name
Name of the Cisco lightweight access point.
group-name
Descriptive name for the access point group.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
This example shows how to add the access point AP01 to the access point group superusers:
Device# ap name AP01 ap-groupname superusers
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
537
ap name antenna band mode
ap name antenna band mode
To configure the antenna mode, use the ap name<AP name> antenna-band-mode{ single | dual } command.
ap nameap-name antenna-band-mode{single| dual}
Syntax Description
ap- name
Name of the Cisco lightweight access point.
antenna-band-mode
Instructs the access point to enable the band mode of antenna.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the antenna band mode of access point.
Deviceap name <ap-name> antenna-band-mode single
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
538
ap name bhrate
ap name bhrate
To configure the Cisco bridge backhaul Tx rate, use the ap name bhrate command.
ap name ap-name bhrate kbps
Syntax Description
ap-name
Name of the Cisco access point.
kbps
Cisco bridge backhaul Tx rate in kbps. The valid values are 6000, 12000, 18000,
24000, 36000, 48000, and 54000.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Cisco bridge backhaul Tx rate to 54000 kbps:
Device# ap name AP02 bhrate 54000
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
539
ap name bridgegroupname
ap name bridgegroupname
To set a bridge group name on a Cisco lightweight access point, use the ap name bridgegroupname
command. To delete a bridge group name on a Cisco lightweight access point, use the no form of this command.
ap name ap-name bridgegroupname bridge_group_name
ap name ap-name no bridgegroupname
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Only access points with the same bridge group name can connect to each other. Changing the access point
bridgegroupname may strand the bridge access point.
Examples
This example shows how to set a bridge group name on Cisco access point’s bridge group name AP02:
Device# ap name AP02 bridgegroupname West
This example shows how to delete a bridge group name on Cisco access point’s bridge group name AP02:
Device# ap name AP02 no bridgegroupname
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
540
ap name bridging
ap name bridging
To enable Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the ap name bridging
command. To disable Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the no form of
this command.
ap name ap-name bridging
ap name ap-name no bridging
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable Ethernet-to-Ethernet bridging on an access point:
Device# ap name TSIM_AP2 bridging
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
541
ap name cdp interface
ap name cdp interface
To enable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the ap name
command. To disable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the no
form of this command.
ap name ap-name cdp interface {ethernet ethernet-id| radio radio-id}
ap name ap-name [no] cdp interface {ethernet ethernet-id| radio radio-id}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
ethernet
Enables CDP on an Ethernet interface.
ethernet-id
Ethernet interface number from 0 to 3.
radio
Enables CDP for a radio interface.
radio-id
Radio ID slot number from 0 to 3.
Command Default
Disabled on all access points.
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all access
points that are joined to the device, you can disable and then reenable CDP on individual access points by
using the ap name ap-name cdp interface ethernet ethernet-id cisco_ap command. After you disable CDP
on all access points that are joined to the device, you cannot enable and then disable CDP on individual access
points.
Examples
This example shows how to enable CDP for Ethernet interface number 0 on an access point:
Device# ap name TSIM_AP2 cdp interface ethernet 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
542
ap name console-redirect
ap name console-redirect
To redirect the remote debug output of a Cisco lightweight access point to the console, use the ap name
console-redirect command. To disable the redirection of the remote debug output of a Cisco lightweight
access point to the console, use the no form of this command.
ap name ap-name console-redirect
ap name ap-name [no] console-redirect
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable redirecting remote debug output of a Cisco access point named AP02 to
the console:
Device# ap name AP02 console-redirect
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
543
ap name capwap retransmit
ap name capwap retransmit
To configure the access point control packet retransmission interval and control packet retransmission count,
use the ap name capwap retransmit command.
ap name ap-name capwap retransmit {count count-value| interval interval-time}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
count
Sets the number of times control packet will be retransmitted.
count-value
Number of times that the control packet will be retransmitted from 3 to 8.
interval
Sets the control packet retransmission timeout interval.
interval-time
Control packet retransmission timeout from 2 to 5 seconds.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the retransmission interval for an access point:
Device# ap name AP01 capwap retransmit interval 5
This example shows how to configure the retransmission retry count for a specific access point:
Device# ap name AP01 capwap retransmit count 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
544
ap name command
ap name command
To execute a command remotely on a specific Cisco access point, use the ap name command command.
ap name ap-name command "command "
Syntax Description
ap-name
Name of the Cisco access point.
command
Command to be executed on a Cisco access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to remotely enter the show ip interface brief command on the Cisco access point
named TSIM_AP2:
Device# ap name AP2 command "show ip interface brief"
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
545
ap name core-dump
ap name core-dump
To configure a Cisco lightweight access point’s memory core dump, use the ap name core-dump command.
To disable a Cisco lightweight access point’s memory core dump, use the no form of this command.
ap name ap-name core-dump tftp-ip-addr filename {compress| uncompress}
ap name ap-name [no]core-dump
Syntax Description
ap-name
Name of the access point.
tftp-ip-addr
IP address of the TFTP server to which the access point sends core
dump files.
filename
Name that the access point used to label the core file.
compress
Compresses the core dump file.
uncompress
Uncompresses the core dump file.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The access point must be able to reach the TFTP server before you can use this command.
Examples
This example shows how to configure and compress the core dump file:
Device# ap name AP2 core-dump 192.1.1.1 log compress
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
546
ap name country
ap name country
To configure the country of operation for a Cisco lightweight access point, use the ap name country
command.
ap name ap-name country country-code
Syntax Description
ap-name
Name of the Cisco lightweight access point.
country-code
Two-letter or three-letter country code.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Cisco devices must be installed by a network administrator or qualified IT professional and the installer must
select the proper country code. Following installation, access to the unit should be password protected by the
installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. See the
related product guide for the most recent country codes and regulatory domains. Also, access point regulatory
domains are defined during the access point manufacturing process. You can change the access point country
code if the new country code matches a country that is valid within the access point regulatory domain. If you
try to enter a country that is not valid to the access point regulatory domain, the command fails.
Examples
This example shows how to configure the Cisco lightweight access point's country code to DE:
Device# ap name AP2 country JP
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
547
ap name crash-file
ap name crash-file
To manage crash data and radio core files for the Cisco access point, use the ap name crash-file command.
ap name ap-name crash-file {get-crash-data| get-radio-core-dump {slot 0| slot 1}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
get-crash-data
Collects the latest crash data for a Cisco lightweight access point.
get-radio-core-dump
Gets a Cisco lightweight access point’s radio core dump
slot
Slot ID for Cisco access point.
0
Specifies Slot 0.
1
Specifies Slot 1.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to collect the latest crash data for access point AP3:
Device# ap name AP3 crash-file get-crash-data
This example shows how to collect the radio core dump for access point AP02 and slot 0:
Device# ap name AP02 crash-file get-radio-core-dump slot 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
548
ap name dot11 24ghz rrm coverage
ap name dot11 24ghz rrm coverage
To configure coverage hole detection settings on the 2.4 GHz band, use the ap name dot11 24ghz rrm
coverage command.
ap name ap-name dot11 24ghz rrm coverage {exception value| level value}
Syntax Description
ap-name
Name of the Cisco access point.
exception
Specifies the percentage of clients on an access point that are experiencing a low
signal level but cannot roam to another access point.
value
Percentage of clients. Valid values are from 0 to 100%.
Note
The default is
25%.
level
Specifies the minimum number of clients on an access point with a received signal
strength indication (RSSI) value at or below the data or voice RSSI threshold.
value
Minimum number of clients. Valid values are from 1 to 75.
Note
The default is
3.
Command Default
The default for the exception parameter is 25% and the default for the level parameter is 3.
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
If you enable coverage hole detection, the device automatically determines, based on data that is received
from the access points, whether any access points have clients that are potentially located in areas with poor
coverage.
If both the number and percentage of failed packets exceed the values that you entered in the ap dot11 24ghz
rrm coverage data packet-count count and ap dot11 24ghz rrm coverage data fail-percentage percentage
commands for a 5-second period, the client is considered to be in a pre-alarm condition. The device uses this
information to distinguish between real and false coverage holes and excludes clients with poor roaming logic.
A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values
entered in the ap dot11 24ghz rrm coverage exception and ap dot11 24ghz rrm coverage level commands
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
549
ap name dot11 24ghz rrm coverage
over a 90-second period. The device determines whether the coverage hole can be corrected and, if appropriate,
mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
This example shows how to specify the percentage of clients for an access point 2.4 GHz radio that is
experiencing a low signal level:
Device# ap name AP2 dot11 24ghz rrm coverage exception 25%
This example shows how to specify the minimum number of clients on an 802.11b access point with an RSSI
value at or below the RSSI threshold:
Device# ap name AP2 dot11 24ghz rrm coverage level 60
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
550
ap name dot11 49ghz rrm profile
ap name dot11 49ghz rrm profile
To configure Radio Resource Management (RRM) performance profile settings for a Cisco lightweight access
point on a 4.9 GHz public safety channel, use the ap name dot11 49ghz rrm profile command.
ap name ap-name dot11 49ghz rrm profile {clients value| customize| exception value| foreign value| level
value| noise value| throughput vaue| utilization value}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
clients
Sets the access point client threshold.
value
Access point client threshold from 1 to 75 clients.
Note
customize
The default client threshold is
12.
Turns on performance profile customization for an access point.
Note
Performance profile customization is off by
default.
exception value
Sets the 802.11a Cisco access point coverage exception level from 0 to100
percent.
foreign
Sets the foreign 802.11 transmitter interference threshold.
value
Foreign 802.11 transmitter interference threshold from 0 to 100 percent.
Note
The default is 10
percent.
level value
Sets the 802.11a Cisco access point client minimum exception level from 1 to
75 clients.
noise
Sets the 802.11 foreign noise threshold.
value
802.11 foreign noise threshold from –127 to 0 dBm.
Note
The default is –70
dBm.
throughput
Sets the data-rate throughput threshold.
value
802.11 throughput threshold from 1000 to 10000000 bytes per second.
Note
utilization
The default is 1,000,000 bytes per
second.
Sets the RF utilization threshold.
Note
The operating system generates a trap when this threshold is exceeded.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
551
ap name dot11 49ghz rrm profile
value
802.11 RF utilization threshold from 0 to 100 percent.
Note
Command Default
None
Command Modes
Any command mode
Command History
Examples
The default is 80
percent.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to set the AP1 clients threshold to 75 clients:
Device# ap name AP1 dot11 49ghz rrm profile clients 75
This example shows how to turn performance on profile customization for Cisco lightweight access point
AP1 on the 4.9 GHz channel:
Device# ap name AP1 dot11 49ghz rrm profile customize
This example shows how to set the foreign transmitter interference threshold for AP1 to 0 percent:
Device# ap name AP1 dot11 49ghz rrm profile foreign 0
This example shows how to set the foreign noise threshold for AP1 to 0 dBm:
Device# ap name AP1 dot11 49ghz rrm profile noise 0
This example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:
Device# ap name AP1 dot11 49ghz rrm profile throughput 10000000
This example shows how to set the RF utilization threshold for AP1 to 100 percent:
Device# ap name AP1 dot11 49ghz rrm profile utilization 100
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
552
ap name dot11 5ghz rrm channel
ap name dot11 5ghz rrm channel
To configure a new channel using an 802.11h channel announcement, use the ap name dot11 5ghz rrm
channel command.
ap name ap-name dot11 5ghz rrm channel channel
Syntax Description
ap-name
Name of the Cisco lightweight access point.
channel
New channel.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a new channel using the 802.11h channel:
Device# ap name AP01 dot11 5ghz rrm channel 140
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
553
ap name dot11 antenna
ap name dot11 antenna
To configure radio antenna settings for Cisco lightweight access points on different 802.11 networks, use the
ap name dot11 antenna command.
ap name ap-name dot11 {24ghz| 5ghz} antenna {ext-ant-gain gain| mode {omni| sectorA| sectorB}|
selection {external| internal}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
ext-ant-gain
Specifies the external antenna gain for an 802.11 network.
Note
Before you enter this command, disable the Cisco radio by using the
ap dot11 {24ghz | 5ghz} shutdown command. After you enter this
command, reenable the Cisco radio by using the no ap dot11 {24ghz
| 5ghz} shutdown command.
gain
Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).
mode
Specifies that the Cisco lightweight access point is to use one internal antenna
for an 802.11 sectorized 180-degree coverage pattern or both internal antennas
for an 802.11 360-degree omnidirectional pattern.
omni
Specifies to use both internal antennas.
sectorA
Specifies to use only the side A internal antenna.
sectorB
Specifies to use only the side B internal antenna.
selection
Selects the internal or external antenna selection for a Cisco lightweight access
point on an 802.11 network.
external
Specifies the external antenna.
internal
Specifies the internal antenna.
Command Default
None
Command Modes
Any command mode
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
554
ap name dot11 antenna
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a 5 GHz external antenna gain of 0.5 dBm for AP1:
Device# ap name AP1 dot11 5ghz antenna ext-ant-gain 0.5
This example shows how to configure access point AP01 antennas for a 360-degree omnidirectional pattern
on a 2.4 GHz band:
Device# ap name AP01 dot11 24ghz antenna mode omni
This example shows how to configure access point AP02 on a 2.4 GHz band to use the internal antenna:
Device# ap name AP02 dot11 24ghz antenna selection interval
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
555
ap name dot11 antenna extantgain
ap name dot11 antenna extantgain
To configure radio antenna settings for Cisco lightweight access points on 4.9 GHz and 5.8 GHz public safety
channels, use the ap name dot11 antenna extantgain command.
ap name ap-name dot11 {49ghz| 58ghz} {antenna extantgain gain}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
49ghz
Specifies 4.9 GHz public safety channel settings.
58ghz
Specifies 5.8 GHz public safety channel settings.
gain
Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Before you enter this command, disable the Cisco radio by using the ap dot11 {24ghz | 5ghz} shutdown
command. After you enter this command, reenable the Cisco radio by using the no ap dot11 {24ghz | 5ghz}
shutdown command.
Examples
This example shows how to configure an external antenna gain of 0.5 dBm for AP1 on a 4.9 GHz public
safety channel:
Device# ap name AP1 dot11 49ghz antenna extantgain 0.5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
556
ap name dot11 cleanair
ap name dot11 cleanair
To configure CleanAir settings for a specific Cisco lightweight access point on 802.11 networks, use the ap
name dot11 cleanair command.
ap name ap-name dot11 {24ghz| 5ghz} cleanair
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
Command Default
Disabled.
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable CleanAir on the 2.4 GHz band:
Device# ap name AP01 dot11 24ghz cleanair
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
557
ap name dot11 dot11n antenna
ap name dot11 dot11n antenna
To configure an access point to use a specific antenna, use the ap name dot11 dot11n antenna command.
ap name ap-name dot11 {24ghz| 5ghz} dot11n antenna {A| B| C| D}
Syntax Description
ap-name
Access point name.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
A
Specifies antenna port A.
B
Specifies antenna port B.
C
Specifies antenna port C.
D
Specifies antenna port D.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable antenna B on access point AP02:
Device# ap name AP02 dot11 5ghz dot11n antenna B
This example shows how to disable antenna C on access point AP02:
Device# ap name AP02 no dot11 5ghz dot11n C
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
558
ap name dot11 dual-band cleanair
ap name dot11 dual-band cleanair
To configure CleanAir for a dual band radio, use the ap name dot11 dual-band cleanair command.
ap name ap-name dot11 dual-band cleanair
ap name ap-name no dot11 dual-band cleanair
Syntax Description
ap-name
Name of the Cisco AP.
cleanair
Specifies the CleanAir feature.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable CleanAir for a dual band radio of the access point AP01:
Device# ap name AP01 dot11 dual-band cleanair
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
559
ap name dot11 dual-band shutdown
ap name dot11 dual-band shutdown
To disable dual band radio on a Cisco AP, use the ap name dot11 dual-band shutdown command.
ap name ap-name dot11 dual-band shutdown
ap name ap-name no dot11 dual-band shutdown
Syntax Description
ap-name
Name of the Cisco AP.
shutdown
Disables the dual band radio on the Cisco AP.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable dual band radio on the Cisco access point AP01:
Device# ap name AP01 dot11 dual-band shutdown
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
560
ap name dot11 rrm ccx
ap name dot11 rrm ccx
To configure Cisco Client eXtension (CCX) Radio Resource Management (RRM) settings for specific Cisco
lightweight access points on 802.11 networks, use the ap name dot11 rrm ccx command.
ap name ap-name dot11 {24ghz| 5ghz} rrm ccx {customize| location-measurement interval}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
customize
Enables 802.11 CCX options.
location-measurement
Configures the CCX client location measurements.
interval
Interval from 10 to 32400.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure CCX client location measurements for an access point in the 2.4 GHz
band:
Device# ap name AP01 dot11 24ghz rrm ccx location-measurement 3200
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
561
ap name dot11 rrm profile
ap name dot11 rrm profile
To configure Radio Resource Management (RRM) performance profile settings for a Cisco lightweight access
point, use the ap name dot11 rrm profile command.
ap name ap-name dot11 {24ghz| 5ghz} rrm profile {clients value| customize| foreign value| noise value|
throughput value| utilization value}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
clients
Sets the access point client threshold.
value
Access point client threshold from 1 to 75 clients.
Note
customize
The default client threshold is
12.
Turns on performance profile customization for an access point.
Note
Performance profile customization is off by
default.
foreign
Sets the foreign 802.11 transmitter interference threshold.
value
Foreign 802.11 transmitter interference threshold from 0 to 100 percent.
Note
The default is 10
percent.
noise
Sets the 802.11 foreign noise threshold.
value
802.11 foreign noise threshold between –127 and 0 dBm.
Note
The default is —70
dBm.
throughput
Sets the data-rate throughput threshold.
value
802.11 throughput threshold from 1000 to 10000000 bytes per second.
Note
utilization
Sets the RF utilization threshold.
Note
value
The default is 1,000,000 bytes per
second.
The operating system generates a trap when this threshold is exceeded.
802.11 RF utilization threshold from 0 to 100 percent.
Note
The default is 80
percent.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
562
ap name dot11 rrm profile
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to set the AP1 clients threshold to 75 clients:
Device# ap name AP1 dot11 24ghz rrm profile clients 75
This example shows how to turn performance profile customization on for 802.11a Cisco lightweight access
point AP1:
Device# ap name AP1 dot11 5ghz rrm profile customize
This example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0 percent:
Device# ap name AP1 dot11 5ghz rrm profile foreign 0
This example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:
Device# ap name AP1 dot11 5ghz rrm profile noise 0
This example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:
Device# ap name AP1 dot11 5ghz rrm profile throughput 10000000
This example shows how to set the RF utilization threshold for AP1 to 100 percent:
Device# ap name AP1 dot11 5ghz rrm profile utilization 100
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
563
ap name dot11 txpower
ap name dot11 txpower
To configure the transmit power level for a single access point in an 802.11 network, use the ap name dot11
txpower command.
ap name ap-name dot11 {24ghz| 5ghz} {shutdown| txpower {auto| power-level}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
shutdown
Disables the 802.11 networks.
auto
Specifies the power level is automatically set by Radio Resource
Management (RRM) for the 802.11 Cisco radio.
power-level
Manual transmit power level number for the access point.
Command Default
The command default (txpower auto) is for automatic configuration by RRM.
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to automatically set the 2.4 GHz radio transmit power for access point AP1:
Device# ap name AP1 dot11 24ghz txpower auto
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
564
ap name dot1x-user
ap name dot1x-user
To configure the global authentication username and password for an access point that is currently joined to
the device, use the ap name dot1x-user command. To disable 802.1X authentication for a specific access
point, use the no form of this command.
ap name ap-name dot1x-user {global-override| username user-id password passwd}
ap name ap-name [no] dot1x-user
Syntax Description
ap-name
Name of the access point.
global-override
Forces the access point to use the device's global authentication
settings.
username
Specifies to add a username.
user-id
Username.
password
Specifies to add a password.
passwd
Password.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You should enter a strong password. Strong passwords have the following characteristics:
• They are at least eight characters long.
• They contain a combination of uppercase and lowercase letters, numbers, and symbols.
• They are not words in any language.
You can set the values for a specific access point.
You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not
enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
565
ap name dot1x-user
Examples
This example shows how to configure a specific username and password for dot1x authentication:
Device# ap name AP02 dot1x-user username Cisco123 password Cisco2020
This example shows how to disable the authentication for access point cisco_ap1:
Device# ap name cisco_ap1 no dot1x-user
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
566
ap name ethernet
ap name ethernet
To configure ethernet port settings of a Cisco lightweight access point, use the ap name ethernet command.
To remove configured port settings or set of defaults, use the no form of this command.
ap name ap-name ethernet intf-number mode {access vlan-id| trunk [add| delete]} native-vlan vlan-id
ap name ap-name no ethernet intf-number mode {access| trunk native-vlan}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
intf-number
Ethernet interface number from 0 to 3.
mode
Configures access or trunk mode.
access
Configures the port in access mode.
vlan-id
VLAN identifier.
trunk
Specifies the port in trunk mode.
add
(Optional) Adds a VLAN or trunk mode.
delete
(Optional) Deletes a VLAN or trunk mode.
native-vlan
Specifies a native VLAN.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure access mode for a Cisco access point.
Device# ap name AP2 ethernet 0 mode access 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
567
ap name ethernet duplex
ap name ethernet duplex
To configure the Ethernet port duplex and speed settings of the lightweight access points, use the ap name
ethernet duplex command.
ap name ap-name ethernet duplex {auto| full| half} speed{10| 100| 1000| auto}
Syntax Description
ap-name
Name of the Cisco access point.
auto
Specifies the Ethernet port duplex auto settings.
full
Specifies the Ethernet port duplex full settings.
half
Specifies the Ethernet port duplex half settings.
speed
Specifies the Ethernet port speed settings.
10
Specifies the Ethernet port speed to 10 Mbps.
100
Specifies the Ethernet port speed to 100 Mbps.
1000
Specifies the Ethernet port speed to 1000 Mbps.
auto
Specifies the Ethernet port setting for all connected access points.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Ethernet port to full duplex and 1 Gbps for an access point:
Device# ap name AP2 ethernet duplex full 1000
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
568
ap name key-zeroize
ap name key-zeroize
To enable the FIPS key-zeroization on an Access Point, use the ap name<AP name> key-zeroizecommand.
ap nameap-name key-zeroize
Syntax Description
ap- name
Name of the Cisco lightweight access point.
key-zeroize
Instructs the access point to enable the FIPS key-zeroization on AP.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable FIPS key-zeroization.
Deviceap name <AP Name> key-zeroize
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
569
ap name image
ap name image
To configure an image on a specific access point, use the ap name image command.
ap name ap-name image {predownload| swap}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
predownload
Instructs the access point to start the image predownload.
swap
Instructs the access point to swap the image.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to predownload an image to an access point:
Device# ap name AP2 image predownload
This example shows how to swap an access point’s primary and secondary images:
Device# ap name AP2 image swap
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
570
ap name ipv6 tcp adjust-mss
ap name ipv6 tcp adjust-mss
To configure IPv6 TCP maximum segment size (MSS) value for a Cisco AP, use the ap name ipv6 tcp
adjust-mss command.
ap name ap-name ipv6 tcp adjust-mss size
ap name ap-name no ipv6 tcp adjust-mss
Syntax Description
ap-name
Name of the Cisco AP.
adjust-mss
Configures IPv6 TCP MSS settings for all Cisco APs.
size
MSS value in the range of 500 to 1440.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The MSS value must be in the range of 500 to 1440.
Examples
This example shows how to configure the IPv6 TCP MSS value to 600 for a Cisco access point AP01:
Device# ap name AP01 ipv6 tcp adjust-mss 600
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
571
ap name jumbo mtu
ap name jumbo mtu
To configure the Jumbo MTU support, use the ap name<AP name>jumbo-mtucommand.
ap nameap-name {jumbo-mtu| no jumbo-mtu}
Syntax Description
ap- name
Name of the Cisco lightweight access point.
jumbo-mtu
Instructs the access point to enable the Jumbo MTU support.
no jumbo-mtu
Instructs the access point to disable the Jumbo MTU support.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Jumbo MTU support.
Deviceap name <AP Name> jumbo-mtu
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
572
ap name lan
ap name lan
To configure LAN port configurations for APs, use the ap name lan command. To remove LAN port
configurations for APs, use theap name no lan command.
ap name ap-name [ no ]lan port-id port-id {shutdown|vlan-access}
Syntax Description
no
Removes LAN port configurations.
port-id
Configures the port.
port-id
The ID of the port. The range is 1-4
shotdown
Disables the Port.
vlan-access
Enables VLAN access to Port.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to enable VLAN access to port:
Device# ap name AP1 lan port-id 1 vlan-access
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
573
ap name led
ap name led
To enable the LED state for an access point, use the ap name led command. To disable the LED state for
an access point, use the no form of this command.
ap name ap-name led
no ap name ap-name [led] led
Syntax Description
ap-name
Name of the Cisco lightweight access point.
led
Enables the access point’s LED state.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the LED state for an access point:
Device# ap name AP2 led
This example shows how to disable the LED state for an access point:
Device# ap name AP2 no led
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
574
ap name link-encryption
ap name link-encryption
To enable Datagram Transport Layer Security (DTLS) data encryption for specific Cisco lightweight access
points, use the ap name link-encryption command. To disable DTLS data encryption for specific Cisco
lightweight access points, use the no form of this command.
ap name ap-name link-encryption
ap name ap-name no link-encryption
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to enable data encryption for an access point:
Device# ap name AP02 link-encryption
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
575
ap name link-latency
ap name link-latency
To enable link latency for a specific Cisco lightweight access point that is currently associated to the device,
use the ap name link-latency command. To disable link latency for a specific Cisco lightweight access point
that is currently associated to the device, use the no form of this command.
ap name ap-name link-latency
ap name ap-name no link-latency
Syntax Description
ap-name
Command Default
Link latency is disabled by default.
Command Modes
Any command mode
Command History
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command enables or disables link latency only for access points that are currently joined to the device.
It does not apply to access points that join in the future.
Examples
This example shows how to enable link latency on access points:
Device# ap name AP2 link-latency
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
576
ap name location
ap name location
To modify the descriptive location of a Cisco lightweight access point, use the ap name location command.
ap name ap-name location location
Syntax Description
ap-name
Name of the Cisco lightweight access point.
location
Location name of the access point (enclosed by double quotation marks).
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
This example shows how to configure the descriptive location for access point AP1:
Device# ap name AP1 location Building1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
577
ap name mgmtuser
ap name mgmtuser
To configure the username, password, and secret password for access point management, use the ap name
mgmtuser command. To force a specific access point to use the device’s global credentials, use the no form
of this command.
ap name ap-name mgmtuser username username password password secret secret
ap name ap-name no mgmtuser
Syntax Description
ap-name
Name of the Cisco lightweight access point.
username
Specifies the username for access point management.
username
Management username.
password
Specifies the password for access point management.
password
Access point management password.
secret
Specifies the secret password for privileged access point management.
secret
Access point management secret password.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
To specify a strong password, you should adhere to the following requirements:
• The password should contain characters from at least three of the following classes: lowercase letters,
uppercase letters, digits, and special characters.
• No character in the password can be repeated more than three times consecutively.
• The password cannot contain a management username or the reverse of a username.
• The password cannot contain words such as Cisco, oscic, admin, nimda or any variant obtained by
changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for
s.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
578
ap name mgmtuser
The following requirement is enforced on the secret password:
• The secret password cannot contain characters from at least three of the following classes: lowercase
letters, uppercase letters, digits, or special characters.
Examples
This example shows how to add a username, password, and secret password for access point management:
Device# ap name AP01 mgmtuser username acd password Arc_1234 secret Mid_1234
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
579
ap name mode
ap name mode
To change a Cisco device communication option for an individual Cisco lightweight access point, use the
ap name mode command.
ap name ap-name mode{local submode{none| wips}| monitor submode{none| wips}| rogue| se-connect|
sniffer}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
local
Converts from an indoor mesh access point (MAP or RAP) to a nonmesh
lightweight access point (local mode).
submode
Specifies wIPS submode on an access point.
none
Disables the wIPS on an access point.
monitor
Specifies monitor mode settings.
wips
Enables the wIPS submode on an access point.
rogue
Enables wired rogue detector mode on an access point.
se-connect
Enables spectrum expert mode on an access point.
sniffer
Enables wireless sniffer mode on an access point.
Command Default
Local
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
The sniffer mode captures and forwards all the packets from the clients on that channel to a remote machine
that runs AiroPeek or other supported packet analyzer software. It includes information on the timestamp,
signal strength, packet size and so on.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
580
ap name mode
Examples
This example shows how to set the device to communicate with access point AP01 in local mode:
Device# ap name AP01 mode local submode none
This example shows how to set the device to communicate with access point AP01 in a wired rogue access
point detector mode:
Device# ap name AP01 mode rogue
This example shows how to set the device to communicate with access point AP02 in wireless sniffer mode:
Device# ap name AP02 mode sniffer
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
581
ap name monitor-mode
ap name monitor-mode
To configure Cisco lightweight access point channel optimization, use the ap name monitor-mode command.
ap name ap-name monitor-mode {no-optimization| tracking-opt| wips-optimized}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
no-optimization
Specifies no channel scanning optimization for the access point.
tracking-opt
Enables tracking optimized channel scanning for the access point.
wips-optimized
Enables wIPS optimized channel scanning for the access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a Cisco wireless intrusion prevention system (wIPS) monitor mode on
access point AP01:
Device# ap name AP01 monitor-mode wips
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
582
ap name monitor-mode dot11b
ap name monitor-mode dot11b
To configures 802.11b scanning channels for a monitor-mode access point, use the ap name monitor-mode
dot11b command.
ap name ap-name monitor-mode dot11b fast-channel channel1 [channel2] [channel3] [channel4]
Syntax Description
ap-name
Name of the access point.
fast-channel
Specifies the 2.4 GHz band scanning channel (or channels) for a
monitor-mode access point.
channel1
Scanning channel1.
channel2
(Optional) Scanning channel2.
channel3
(Optional) Scanning channel3.
channel4
(Optional) Scanning channel4.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure an access point in tracking optimized mode to listen to channels 1, 6,
and 11:
Device# ap name AP01 monitor-mode dot11b fast-channel 1 6 11
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
583
ap name name
ap name name
To modify the name of a Cisco lightweight access point, use the ap name name command.
ap name ap-name name new-name
Syntax Description
ap-name
Current Cisco lightweight access point name.
new-name
Desired Cisco lightweight access point name.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to modify the name of access point AP1 to AP2:
Device# ap name AP1 name AP2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
584
ap name no dot11 shutdown
ap name no dot11 shutdown
To enable radio transmission for an individual Cisco radio on an 802.11 network, use the ap name no dot11
shutdown command.
ap name ap-name no dot11{24ghz| 5ghz} shutdown
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz radios.
5ghz
Specifies the 5 GHz radios.
Command Default
The transmission is enabled for the entire network by default.
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Note
Use this command with the ap name Cisco-AP dot11 5ghz shutdown command when configuring 802.11
settings.
This command can be used any time that the CLI interface is active.
Examples
This example shows how to enable radio transmission on the 5 GHz band for access point AP1:
Device# ap name AP1 no dot11 5ghz shutdown
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
585
ap name power
ap name power
To enable the Cisco Power over Ethernet (PoE) feature for access points, use the ap name power command.
To disable the Cisco PoE feature for access points, use the no form of this command.
ap name ap-name power {injector| pre-standard}
ap name ap-name no power {injector| pre-standard}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
injector
Specifies the power injector state for an access point.
pre-standard
Enables the inline power Cisco prestandard switch state for an access
point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the power injector state for all access points:
Device# ap name AP01 power injector
This example shows how to enable the inline power Cisco prestandard switch state for access point AP02:
Device# ap name AP02 power pre-standard
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
586
ap name shutdown
ap name shutdown
To disable a Cisco lightweight access point, use the ap name shutdown command. To enable a Cisco
lightweight access point, use the no form of this command.
ap name ap-name shutdown
ap name ap-name no shutdown
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example how to disable a specific Cisco lightweight access point:
Device# ap name AP2 shutdown
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
587
ap name slot shutdown
ap name slot shutdown
To disable a slot on a Cisco lightweight access point, use the ap name slot shutdown command. To enable
a slot on a Cisco lightweight access point, use the no form of the command.
ap name ap-name slot {0| 1| 2| 3} shutdown
ap name ap-name no slot {0| 1| 2| 3} shutdown
Syntax Description
ap-name
Name of the Cisco lightweight access point.
0
Enables slot number 0 on a Cisco lightweight access point.
1
Enables slot number 1 on a Cisco lightweight access point.
2
Enables slot number 2 on a Cisco lightweight access point.
3
Enables slot number 3 on a Cisco lightweight access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable slot 0 on a Cisco access point named TSIM_AP2:
Device# ap name TSIM_AP2 no slot 0 shutdown
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
588
ap name sniff
ap name sniff
To enable sniffing on an access point, use the ap name sniff command. To disable sniffing on an access
point, use the no form of this command.
ap name ap-name sniff {dot11a| dot11b}
ap name ap-name no sniff {dot11a| dot11b}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
dot11a
Specifies the 2.4 GHz band.
dot11b
Specifies the 5 GHz band.
channel
Valid channel to be sniffed. For the 5 GHz band, the range is 36 to 165.
For the 2.4 GHz band, the range is 1 to 14.
server-ip-address
IP address of the remote machine running Omnipeek, Airopeek, AirMagnet,
or Wireshark software.
Command Default
Channel 36
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
When the sniffer feature is enabled on an access point, it starts sniffing the signal on the given channel. It
captures and forwards all the packets to the remote computer that runs Omnipeek, Airopeek, AirMagnet, or
Wireshark software. It includes information about the timestamp, signal strength, packet size and so on.
Before an access point can act as a sniffer, a remote computer that runs one of the listed packet analyzers must
be set up so that it can receive packets that are sent by the access point.
Examples
This example shows how to enable the sniffing on the 5 GHz band for an access point on the primary wireless
LAN controller:
Device# ap name AP2 sniff dot11a 36 192.0.2.54
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
589
ap name ssh
ap name ssh
To enable Secure Shell (SSH) connectivity on a specific Cisco lightweight access point, use the ap name
ssh command. To disable SSH connectivity on a specific Cisco lightweight access point, use the no form of
this command.
ap name ap-name ssh
ap name ap-name no ssh
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco lightweight access point associates with this Cisco device for all network operations and in the
event of a hardware reset.
Examples
This example shows how to enable SSH connectivity on access point Cisco_ap2:
Device# ap name Cisco_ap2 ssh
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
590
ap name telnet
ap name telnet
To enable Telnet connectivity on an access point, use the ap name telnet command. To disable Telnet
connectivity on an access point, use the no form of this command.
ap name ap-name telnet
ap name ap-name no telnet
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable Telnet connectivity on access point cisco_ap1:
Device# ap name cisco_ap1 no telnet
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
591
ap name power injector
ap name power injector
To configure the power injector state for an access point, use the ap name power injector command. To
disable the Cisco Power over Ethernet (PoE) feature for access points, use the no form of this command.
ap name ap-name power injector {installed| override| switch-mac-address switch-MAC-address}
ap name ap-name no power injector
Syntax Description
ap-name
Name of he Cisco lightweight access point.
installed
Detects the MAC address of the current switch port that has a power
injector.
override
Overrides the safety checks and assumes a power injector is always
installed.
switch-mac-address
Specifies the MAC address of the switch port with an installed power
injector.
switch-MAC-address
MAC address of the switch port with an installed power injector.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the power injector state for an access point:
Device# ap name AP01 power injector switch-mac-address aaaa.bbbb.cccc
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
592
ap name power pre-standard
ap name power pre-standard
To enable the inline power Cisco prestandard switch state for an access point, use the ap name power
pre-standard command. To disable the inline power Cisco prestandard switch state for an access point, use
the no form of this command.
ap name ap-name power pre-standard
ap name ap-name no power pre-standard
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the inline power Cisco prestandard switch state for access point AP02:
Device# ap name AP02 power pre-standard
This example shows how to disable the inline power Cisco prestandard switch state for access point AP02:
Device# ap name AP02 no power pre-standard
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
593
ap name reset-button
ap name reset-button
To configure the Reset button for an access point, use the ap name reset-button command.
ap name ap-name reset-button
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the Reset button for access point AP03:
Device# ap name AP03 reset-button
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
594
ap name reset
ap name reset
To reset a specific Cisco lightweight access point, use the ap name reset command.
ap name ap-name reset
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to reset a Cisco lightweight access point named AP2:
Device# ap name AP2 reset
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
595
ap name slot
ap name slot
To configure various slot parameters, use the ap name slot command. To disable a slot on a Cisco lightweight
access point, use the no form of this command.
ap name ap-name slot slot-number {channel {global| number channel-number| width channel-width}|
rtsthreshold value| shutdown| txpower {global| channel-level}}
ap name ap-name no slot {0| 1| 2| 3} shutdown
Syntax Description
ap-name
Name of the Cisco access point.
slot-number
Slot downlink radio to which the channel is assigned. You can specify the
following slot numbers:
• 0—Enables slot number 0 on a Cisco lightweight access point.
• 1—Enables slot number 1 on a Cisco lightweight access point.
• 2—Enables slot number 2 on a Cisco lightweight access point.
• 3—Enables slot number 3 on a Cisco lightweight access point.
Command Default
channel
Specifies the channel for the slot.
global
Specifies channel global properties for the slot.
number
Specifies the channel number for the slot.
channel-number
Channel number from 1 to 169.
width
Specifies the channel width for the slot.
channel-width
Channel width from 20 to 40.
rtsthreshold
Specifies the RTS/CTS threshold for an access point.
value
RTS/CTS threshold value from 0 to 65535.
shutdown
Shuts down the slot.
txpower
Specifies Tx power for the slot.
global
Specifies auto-RF for the slot.
channel-level
Transmit power level for the slot from 1 to 7.
None
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
596
ap name slot
Command Modes
Command History
Examples
Any command mode
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable slot 3 for the access point abc:
Device# ap name abc slot 3
This example shows how to configure RTS for the access point abc:
Device# ap name abc slot 3 rtsthreshold 54
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
597
ap name static-ip
ap name static-ip
To configure lightweight access point static IP settings, use the ap name static-ip command. To disable the
Cisco lightweight access point static IP address, use the no form of this command.
ap name ap-name static-ip {domain domain-name| ip-address ip-address netmask netmask gateway
gateway| nameserver ip-address}
ap name ap-name no static-ip
Syntax Description
ap-name
Name of the access point.
domain
Specifies the Cisco access point domain name.
domain-name
Domain to which a specific access point belongs.
ip-address
Specifies the Cisco access point static IP address.
ip-address
Cisco access point static IP address.
netmask
Specifies the Cisco access point static IP netmask.
netmask
Cisco access point static IP netmask.
gateway
Specifies the Cisco access point gateway.
gateway
IP address of the Cisco access point gateway.
nameserver
Specifies a DNS server so that a specific access point can discover the
device using DNS resolution.
ip-address
IP address of the DNS server.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
598
ap name static-ip
Usage Guidelines
Examples
An access point cannot discover the device using Domain Name System (DNS) resolution if a static IP address
is configured for the access point unless you specify a DNS server and the domain to which the access point
belongs.
This example shows how to configure an access point static IP address:
Device# ap name AP2 static-ip ip-address 192.0.2.54 netmask 255.255.255.0 gateway 192.0.2.1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
599
ap name stats-timer
ap name stats-timer
To set the time in seconds that the Cisco lightweight access point sends its DOT11 statistics to the Cisco
device, use the ap name stats-timer command.
ap name ap-name stats-timer timer-value
Syntax Description
ap-name
Name of the Cisco lightweight access point.
timer-value
Time in seconds from 0 to 65535. A zero value disables the timer.
Command Default
0 (Disabled).
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A value of 0 (zero) means that the Cisco lightweight access point does not send any DOT11 statistics. The
acceptable range for the timer is from 0 to 65535 seconds, and the Cisco lightweight access point must be
disabled to set this value.
Examples
This example shows how to set the stats timer to 600 seconds for access point AP2:
Device# ap name AP2 stats-timer 600
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
600
ap name syslog host
ap name syslog host
To configure a syslog server for a specific Cisco lightweight access point, use the ap name syslog host
command.
ap name ap-name syslog host syslog-host-ip-address
Syntax Description
ap-name
Name of the Cisco lightweight access point.
syslog-host-ip-address
IP address of the syslog server.
Command Default
255.255.255.255
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
By default, the syslog server IP address for each access point is 255.255.255.255, which indicates that it is
not yet set. When the default value is used, the global access point syslog server IP address is pushed to the
access point.
Examples
This example shows how to configure a syslog server:
Device# ap name AP2 syslog host 192.0.2.54
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
601
ap name syslog level
ap name syslog level
To configure the system logging level, use the ap name syslog level command.
ap name ap-name syslog level {alert| critical| debug| emergency| errors| information| notification|
warning}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
alert
Specifies alert level system logging.
critical
Specifies critical level system logging.
debug
Specifies debug level system logging.
emergency
Specifies emergency level system logging.
errors
Specifies error level system logging.
information
Specifies information level system logging.
notification
Specifies notification level system logging.
warning
Specifies warning level system logging.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure alert level system logging:
Device# ap name AP2 syslog level alert
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
602
ap name tcp-adjust-mss
ap name tcp-adjust-mss
To enable or disable the TCP maximum segment size (MSS) on a particular access point, use the ap name
tcp-adjust-mss command. To disable the TCP maximum segment size (MSS) on a particular access point,
use the no form of this command.
ap name ap-name tcp-adjust-mss size size
ap name ap-name no tcp-adjust-mss
Syntax Description
ap-name
Name of the access point.
size
Maximum segment size, from 536 to 1363 bytes.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When you enable this feature, the access point checks for TCP packets to and from wireless clients in its data
path. If the MSS of these packets is greater than the value that you configured or greater than the default value
for the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel, the access point changes the
MSS to the new configured value. If the MSS of these packets is greater than the value that you have configured
or greater than the default value for the CAPWAP tunnel, the access point changes the MSS to the newly
configured value.
Examples
This example shows how to enable the TCP MSS on access point Cisco_ap1:
Device# ap name ciscoap tcp-adjust-mss size 1200
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
603
ap name tftp-downgrade
ap name tftp-downgrade
To configure the settings used for downgrading a lightweight access point to an autonomous access point,
use the ap name tftp-downgrade command.
ap name ap-name tftp-downgrade tftp-server-ip filename
Syntax Description
ap-name
Name of the Cisco lightweight access point.
tftp-server-ip
IP address of the TFTP server.
filename
Filename of the access point image file on the TFTP server.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the settings for downgrading access point AP1:
Device# ap name Ap01 tftp-downgrade 172.21.12.45 ap3g1-k9w7-tar.124-25d.JA.tar
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
604
ap power injector
ap power injector
To configure the power injector state for all the Cisco lightweight access points that are joined to the device,
use the ap power injector command. To delete the power injector state for all access points, use the no form
of this command.
ap power injector {installed| override| switch-mac-address switch-MAC-addr}
no ap power injector
Syntax Description
installed
Detects the MAC address of the current switch port that has a power
injector.
override
Overrides the safety checks and assumes a power injector is always
installed.
switch-mac-address
Specifies the MAC address of the switch port with an installed power
injector.
switch-MAC-address
Specifies the MAC address of the switch port with an installed power
injector.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the power injector state for all the Cisco lightweight access points that are
joined to the device:
Device(config)# ap power injector switch-mac-address aaaa.bbbb.cccc
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
605
ap power pre-standard
ap power pre-standard
To set the Cisco lightweight access points that are joined to the device to be powered by a high-power Cisco
switch, use the ap power pre-standard command. To disable the pre standard power for all access points,
use the no form of this command.
ap power pre-standard
no ap power pre-standard
Syntax Description
This command has no keywords and arguments.
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the inline power Cisco prestandard switch state for access point AP02:
Controller(config)# ap power pre-standard
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
606
ap reporting-period
ap reporting-period
To configure the access point rogue/error reporting period, use the ap reporting-period command. To
disable the access point rogue/error reporting period, use the no form of this command.
ap reporting-period value
no ap reporting-period
Syntax Description
value
Command Default
None
Command Modes
Global configuration
Command History
Examples
Time period in seconds from 10 to 120.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example show how to configure the access point rogue/error reporting:
Device(config)# ap reporting-period 100
This example show how to disable the access point rogue/error reporting:
Device(config)# no ap reporting-period 100
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
607
ap reset-button
ap reset-button
To configure the Reset button for all Cisco lightweight access points that are joined to the device, use the ap
reset-button command. To disable the Reset button for all access points, use the no form of this command.
ap reset-button
no ap reset-button
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Reset button for all access points that are joined to the controller:
Device(config)# ap reset-button
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
608
service-policy type control subscriber
service-policy type control subscriber
To apply the global subscriber control policy, use the service-policy type control subscriber
<subscriber-policy-name>command.
service-policytypecontrolsubscriber<subscriber-policy-name>
Syntax Description
service-policy
Instructs the access point to apply global subscriber control
policy.
<subscriber-policy-name>
Name of the subscriber policy.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable the global subscriber control policy.
Deviceno service-policy type control subscriber
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
609
ap static-ip
ap static-ip
To configure Cisco lightweight access point static IP address settings, use the ap static-ip command. To
disable access point static IP settings, use the no form of this command.
ap static-ip {domain domain-name| name-server ip-address}
no ap static-ip {domain| name-server}
Syntax Description
domain
Specifies the domain to which a specific access point or all access points
belong.
domain-name
Domain name.
name-server
Specifies a DNS server so that a specific access point or all access points
can discover the device using DNS resolution.
ip-address
DNS server IP address.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
An access point cannot discover the device using Domain Name System (DNS) resolution if a static IP address
is configured for the access point, unless you specify a DNS server and the domain to which the access point
belongs.
Examples
This example shows how to configure a static IP address for all access points:
Device(config)# ap static-ip domain cisco.com
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
610
ap syslog
ap syslog
To configure the system logging settings for all Cisco lightweight access points that are joined to the device,
use the ap syslog command.
ap syslog {host ipaddress| level{alert| critical| debug| emergency| errors| information| notification|
warning}}
Syntax Description
host
Specifies a global syslog server for all access points that join the device.
ipaddress
IP address of the syslog server.
level
Specifies the system logging level for all the access points joined to the device.
alert
Specifies alert level system logging for all Cisco access points.
critical
Specifies critical level system logging for all Cisco access points.
debug
Specifies debug level system logging for all Cisco access points.
emergency
Specifies emergency level system logging for all Cisco access points.
errors
Specifies errors level system logging for all Cisco access points.
information
Specifies information level system logging for all Cisco access points.
notification
Specifies notification level system logging for all Cisco access points.
warning
Specifies warning level system logging for all Cisco access points.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
By default, the global syslog server IP address for all access points is 255.255.255.255. Make sure that the
access points can reach the subnet on which the syslog server resides before configuring the syslog server on
the device. If the access points cannot reach this subnet, the access points are unable to send out syslog
messages.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
611
ap syslog
Examples
This example shows how to configure a global syslog server for all access points:
Device(config)# ap syslog host 172.21.34.45
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
612
ap name no controller
ap name no controller
To change the order of configured primary, secondary and tertiary wireless LAN controllers use the following
commands.
ap nameap-name no controller primary
ap nameap-name no controller secondary
ap nameap-name no controller tertiary
Syntax Description
ap- name
Name of the Cisco lightweight access point.
no controller primary
Instructs the access point to unconfigure the primary controller.
no controller secondary
Instructs the access point to unconfigure the secondary controller.
no controller tertiary
Instructs the access point to unconfigure the tertiary controller.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If you have the primary, secondary, and tertiary wireless LAN controllers configured for an access point and
you require swap the controller names and the corresponding IP addresses you can uncofigure the primary
and configure the secondary controller.
Examples
This example shows how to unconfigure the primary controller.
Deviceap name <AP Name> no controller primary.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
613
ap tcp-adjust-mss size
ap tcp-adjust-mss size
To enable the TCP maximum segment size (MSS) on all Cisco lightweight access points, use the ap
tcp-adjust-mss size command. To disable the TCP maximum segment size (MSS) on all Cisco lightweight
access points no form of this command.
ap tcp-adjust-mss size size
no ap tcp-adjust-mss
Syntax Description
size
Command Default
None
Command Modes
Global configuration
Command History
Maximum segment size, from 536 to 1363 bytes.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When you enable this feature, the access point checks for TCP packets to and from wireless clients in its data
path. If the MSS of these packets is greater than the value that you configured or greater than the default value
for the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel, the access point changes the
MSS to the new configured value.
Examples
This example shows how to enable the TCP MSS on all access points with a segment size of 1200:
Device(config)# ap tcp-adjust-mss 1200
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
614
ap tftp-downgrade
ap tftp-downgrade
To configure the settings used for downgrading a lightweight access point to an autonomous access point,
use the ap tftp-downgrade command. To disable the settings used for downgrading a lightweight access
point to an autonomous access point, use the no form of this command.
ap tftp-downgrade tftp-server-ip filename
no ap tftp-downgrade
Syntax Description
tftp-server-ip
IP address of the TFTP server.
filename
Filename of the access point image file on the TFTP server.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the settings for downgrading all access points:
Device(config)# ap tftp-downgrade 172.21.23.45 ap3g1-k9w7-tar.124-25d.JA.tar
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
615
config wireless wps rogue client mse
config wireless wps rogue client mse
To configure a rogue MSE client, use wirelesswps rogueclientmsecommand.
To view the summary of the wireless client statistics, use show wirelessclientclient-statisticssummary
command.
wirelesswpsrogueclientmse
showwirelessclientclient-statisticssummary
Syntax Description
rogueclient mse
Instructs the access point to enable configuring a rogue MSE client.
nowireless wps
Instructs the access point to disable the configuring a rogue MSE
client.
client-statisticssummary
Instructs to view the summary of the wireless client statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a rogue MSE client.
Devicewireless wps rogue client mse
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
616
clear ap name tsm dot11 all
clear ap name tsm dot11 all
To clear the traffic stream metrics (TSM) statistics for a particular access point or all the access points, use
the clear ap name tsm dot11 all command.
clear ap name ap-name tsm dot11 {24ghz| 5ghz} all
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
all
Specifies all access points.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the TSM statistics for an access point on the 2.4 GHz band:
Device# clear ap name AP1 tsm dot11 24ghz all
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
617
clear ap config
clear ap config
To clear (reset to the default values) a lightweight access point’s configuration settings, use the clear ap
config command.
clear ap config ap-name [eventlog| keep-ip-config]
Syntax Description
ap-name
Name of the Cisco lightweight access point.
eventlog
(Optional) Deletes the existing event log and creates an empty event log file
for a specific access point or for all access points joined to the device.
keep-ip-config
(Optional) Specifies not to erase the static IP configuration of the Cisco access
point.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Entering this command does not clear the static IP address of the access point.
Examples
This example shows how to clear the access point’s configuration settings for the access point named AP01:
Device# clear ap config AP01
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
618
clear ap eventlog-all
clear ap eventlog-all
To delete the existing event log and create an empty event log file for all access points, use the clear ap
eventlog-all command.
clear ap eventlog-all
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to delete the event log for all access points:
Device# clear ap eventlog-all
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
619
clear ap join statistics
clear ap join statistics
To clear the join statistics for all access points or for a specific access point, use the clear ap join statistics
command.
clear ap join statistics
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the join statistics of all the access points:
Device# clear ap join statistics
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
620
clear ap mac-address
clear ap mac-address
To clear the MAC address for the join statistics for a specific Cisco lightweight access point, use the clear
ap mac-address command.
clear ap mac-address mac join statistics
Syntax Description
mac
Access point MAC address.
join statistics
Clears join statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the join statistics of an access point:
Device# clear ap mac-address aaaa.bbbb.cccc join statistics
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
621
clear ap name wlan statistics
clear ap name wlan statistics
To clear WLAN statistics, use the clear ap name wlan statistics command.
clear ap name ap-name wlan statistics
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the WLAN configuration elements of the access point cisco_ap:
Device# clear ap name cisco_ap wlan statistics
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
622
debug ap mac-address
debug ap mac-address
To enable debugging of access point on the mac-address, use the debug ap mac-address command.
debug ap mac-address mac-address
no debug ap mac-address mac-address
Syntax Description
mac-address
Command Default
None
Command Modes
Any command mode
Command History
Examples
Access point Ethernet MAC address or the MAC address of the 802.11 radio
interface.
Release
Modification
10.3Cisco IOS XE 3.3 SE
This command was introduced.
This example shows how to enable debugging mac-address on an AP :
Device# debug ap mac-address
ap mac-address debugging is on
Examples
This example shows how to disable debugging mac-address on an AP :
Device# no debug ap mac-address
ap mac-address debugging is off
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
623
show ap cac voice
show ap cac voice
To display the list of all access points with brief voice statistics, which include bandwidth used, maximum
bandwidth available, and the call information, use the show ap cac voice command.
show ap cac voice
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display voice CAC details that correspond to Cisco lightweight access points:
controller# show ap cac voice
1) AP Name: AP01
=============================
Wireless Bandwidth (In MeanTime mt)
Slot# Radio
Calls BW-Max BW-Alloc Bw-InUse (%age)
-----------------------------------------------------------------1
0
802.11b/g
0
23437
0
0
2
1
802.11a
0
23437
0
0
Wired Bandwidth (in Kbps)
Slot# Wlan-ID Wlan-Name
BW-Config
BW-Avail
----------------------------------------------------------------1
0
1
maria-open
0
0
2
0
12
24
0
0
3
1
1
maria-open
0
0
4
1
12
24
0
0
2) AP Name: AP02
=============================
Wireless Bandwidth (In MeanTime mt)
Slot# Radio
Calls BW-Max BW-Alloc Bw-InUse (%age)
-----------------------------------------------------------------1
0
802.11b/g
0
23437
0
0
2
1
802.11a
0
23437
0
0
Wired Bandwidth (in Kbps)
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
624
show ap cac voice
Slot# Wlan-ID Wlan-Name
BW-Config
BW-Avail
----------------------------------------------------------------1
0
1
maria-open
0
0
2
0
12
24
0
0
3
1
1
maria-open
0
0
4
1
12
24
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
625
show ap capwap
show ap capwap
To display the Control and Provisioning of Wireless Access Points (CAPWAP) configuration that is applied
to all access points, use the show ap capwap command.
show ap capwap {retransmit| timers| summary}
Syntax Description
retransmit
Displays the access point CAPWAP retransmit parameters.
timers
Displays the rogue access point entry timers.
summary
Displays the network configuration of the Cisco device.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the access point CAPWAP retransmit parameters:
Controller# show ap capwap retransmit
Global control packet retransmit interval : 3
Global control packet retransmit count : 5
AP Name
Retransmit Interval
Retransmit Count
--------------------------------------------------------------------------------AP01
3
5
AP02
3
5
AP03
3
5
AP04
3
5
AP05
3
5
AP07
3
5
AP08
3
5
AP09
3
5
AP10
3
5
AP11
3
5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
626
show ap capwap
AP12
3
5
This example shows how to display the rogue access point entry timers:
Controller# show ap capwap timers
AP Discovery timer
AP Heart Beat timeout
Primary Discovery timer
Primed Join timeout
Fast Heartbeat
Fast Heartbeat timeout
:
:
:
:
:
:
10
30
120
0
Disabled
1
This example shows how to display the the network configuration of the Cisco device:
Controller# show ap capwap summary
AP Fallback
AP Join Priority
AP Master
Primary backup Controller Name
Primary backup Controller IP
Secondary backup Controller Name
Secondary backup Controller IP
:
:
:
:
:
:
:
Enabled
Disabled
Disabled
0.0.0.0
0.0.0.0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
627
show ap cdp
show ap cdp
To display the Cisco Discovery Protocol (CDP) information for all Cisco lightweight access points that are
joined to the device, use the show ap cdp command.
show ap cdp [neighbors [detail]]
Syntax Description
neighbors
(Optional) Displays neighbors using CDP.
detail
(Optional) Displays details about a specific access point neighbor that is
using CDP.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CDP status of all access points:
Device# show ap cdp
This example shows how to display details about all neighbors that are using CDP:
Device# show ap cdp neighbors
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
628
show ap config dot11
show ap config dot11
To display the detailed configuration of 802.11-58G radios on Cisco lightweight access points, use the show
ap config dot11 command.
show ap config dot11 58ghz summary
Syntax Description
58ghz
Displays the 802.11-58G radios.
summary
Displays a summary of the radios on the access points.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the detailed configuration of 802.11a-58G radios on access points:
Device# show ap config dot11 58ghz summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
629
show ap config dot11 dual-band summary
show ap config dot11 dual-band summary
To view a summary of configuration settings for dual band radios of Cisco APs, use the show ap config dot11
dual-band summary command.
show ap config dot11 dual-band summary
Syntax Description
dual-band
Specifies the dual band radio.
summary
Displays a summary of configuration settings for dual band radios of
Cisco APs.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
630
show ap config fnf
show ap config fnf
To view Netflow input and output monitors for all Cisco APs, use the show ap config fnf command.
show ap config fnf
Syntax Description
fnf
Command Default
None
Command Modes
Any command mode
Command History
Netflow input and output monitors for all Cisco APs.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
631
show ap config
show ap config
To display configuration settings for all access points that join the device, use the show ap config command.
show ap config {ethernet| general| global}
Syntax Description
ethernet
Displays ethernet VLAN tagging information for all Cisco APs.
general
Displays common information for all Cisco APs.
global
Displays global settings for all Cisco APs.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display global syslog server settings:
Device# show ap config global
AP global system logging host
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
632
: 255.255.255.255
show ap crash-file
show ap crash-file
To display the list of both crash and radio core dump files generated by lightweight access points, use the
show ap crash-file command.
show ap crash-file
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the crash file generated by the access point:
Device# show ap crash-file
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
633
show ap data-plane
show ap data-plane
To display the data plane status, use the show ap data-plane command.
show ap data-plane
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example show how to display the data plane status for all access points:
Device# show ap data-plane
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
634
show ap dot11 l2roam
show ap dot11 l2roam
To display 802.11a or 802.11b/g Layer 2 client roaming information, use the show ap dot11 l2roam
command.
show ap dot11 {24ghz| 5ghz} l2roam {mac-address mac-address statistics| rf-param| statistics}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
mac-address mac-address statistics
Specifies the MAC address of a Cisco lightweight access point.
rf-param
Specifies the Layer 2 frequency parameters.
statistics
Specifies the Layer 2 client roaming statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display 802.11b Layer 2 client roaming information:
Device# show ap dot11 24ghz l2roam rf-param
L2Roam 802.11bg RF Parameters
Config Mode
: Default
Minimum RSSI
: -85
Roam Hysteresis
: 2
Scan Threshold
: -72
Transition time
: 5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
635
show ap dot11 cleanair air-quality
show ap dot11 cleanair air-quality
To display the air-quality summary information and air-quality worst information for the 802.11 networks,
use the show ap dot11 cleanair air-quality command.
show ap dot11 {24ghz| 5ghz} cleanair air-quality {summary| worst}
Syntax Description
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
summary
Displays a summary of 802.11 radio band air-quality information.
worst
Displays the worst air-quality information for 802.11 networks.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the worst air-quality information for the 5 GHz band:
Device# show ap dot11 5ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel Avg AQ Min AQ Interferers DFS
------------ ------- ------ ------ ----------- ----CISCO_AP3500 36
95
70
0
40
This example shows how to display the worst air-quality information for the 2.4 GHz band:
Device# show ap dot11 24ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel Avg AQ Min AQ Interferers DFS
------------ ------- ------ ------ ----------- ----CISCO_AP3500 1
83
57
3
5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
636
show ap dot11 cleanair config
show ap dot11 cleanair config
To display the CleanAir configuration for the 802.11 networks, use the show ap dot11 cleanair config
command.
show ap dot11 {24ghz| 5ghz} cleanair config
Syntax Description
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CleanAir configuration for the 2.4 GHz band:
Device# show ap dot11 24ghz cleanair config
Clean Air Solution...............................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
Bluetooth Link...........................
Microwave Oven...........................
802.11 FH................................
Bluetooth Discovery......................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
802.15.4.................................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
Microsoft Device.........................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
Bluetooth Link...........................
Microwave Oven...........................
802.11 FH................................
: Disabled
:
:
:
:
Disabled
15
Enabled
10
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
: Disabled
: Disabled
: Disabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
637
show ap dot11 cleanair config
Bluetooth Discovery......................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
802.15.4.................................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
Microsoft Device.........................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional Clean Air Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
638
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
: Disabled
: LOW
: Disabled
show ap dot11 cleanair summary
show ap dot11 cleanair summary
To view CleanAir configurations for all 802.11a Cisco APs, use the show ap dot11 cleanair summary
command.
show ap dot11{24ghz| 5ghz} cleanair summary
Syntax Description
24ghz
Specifies the 2.4-GHz band
5ghz
Specifies the 5-GHz band
cleanair summary
Summary of CleanAir configurations for all 802.11a Cisco APs
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
639
show ap dot11
show ap dot11
To view 802.11a or 802.11b configuration information, use the show ap dot11 command.
show ap dot11{24ghz| 5ghz} {channel| coverage| group| load-info| logging| media-stream| monitor|
network| profile| receiver| service-policy| summary| txpower| ccx global}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
channel
Displays the automatic channel assignment configuration
and statistics.
coverage
Displays the configuration and statistics for coverage hole
detection.
group
Displays 802.11a or 802.11b Cisco radio RF grouping.
load-info
Displays channel utilization and client count information for
all Cisco APs.
logging
Displays 802.11a or 802.11b RF event and performance
logging.
media-stream
Display 802.11a or 802.11b Media Resource Reservation
Control configurations.
monitor
Displays the 802.11a or 802.11b default Cisco radio
monitoring.
network
Displays the 802.11a or 802.11b network configuration.
profile
Displays the 802.11a or 802.11b lightweight access point
performance profiles.
receiver
Displays the configuration and statistics of the 802.11a or
802.11b receiver.
service-policy
Displays the Quality of Service (QoS) service policies for
802.11a or 802.11b radio for all Cisco access points.
summary
Displays the 802.11a or 802.11b Cisco lightweight access
point name, channel, and transmit level summary.
txpower
Displays the 802.11a or 802.11b automatic transmit power
assignment.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
640
show ap dot11
Displays 802.11a or 802.11b Cisco Client eXtensions (CCX)
information for all Cisco access points that are joined to the
device.
ccx global
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.3SE
The load-info parameter was added.
This example shows how to display the automatic channel assignment configuration and statistics:
Device# show ap dot11 5ghz channel
Automatic Channel Assignment
Channel Assignment Mode
Channel Update Interval
Anchor time (Hour of the day)
Channel Update Contribution
Channel Assignment Leader
Last Run
DCA Sensitivity Level
DCA 802.11n Channel Width
Channel Energy Levels
Minimum
Average
Maximum
Channel Dwell Times
Minimum
Average
Maximum
802.11a 5 GHz Auto-RF Channel List
Allowed Channel List
57,161
Unused Channel List
65
802.11a 4.9 GHz Auto-RF Channel List
Allowed Channel List
Unused Channel List
15,16,17,18,19,20,21,22,23,24,25,26
DCA Outdoor AP option
:
:
:
:
:
:
:
:
AUTO
12 Hours
20
SNI.
web (9.9.9.2)
13105 seconds ago
MEDIUM (15 dB)
40 Mhz
: unknown
: unknown
: unknown
: unknown
: unknown
: unknown
: 36,40,44,48,52,56,60,64,149,153,1
: 100,104,108,112,116,132,136,140,1
:
: 1,2,3,4,5,6,7,8,9,10,11,12,13,14,
: Disabled
This example shows how to display the statistics for coverage hole detection:
Device# show ap dot11 5ghz coverage
Coverage Hole Detection
802.11a Coverage Hole Detection Mode
802.11a Coverage Voice Packet Count
802.11a Coverage Voice Packet Percentage
802.11a Coverage Voice RSSI Threshold
802.11a Coverage Data Packet Count
802.11a Coverage Data Packet Percentage
802.11a Coverage Data RSSI Threshold
802.11a Global coverage exception level
:
:
:
:
:
:
:
:
Enabled
100 packet(s)
50 %
-80dBm
50 packet(s)
50 %
-80dBm
25
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
641
show ap dot11
802.11a Global client minimum exception level
: 3 clients
This example shows how to display Cisco radio RF group settings:
Device# show ap dot11 5ghz group
Radio RF Grouping
802.11a
802.11a
802.11a
802.11a
Group
Group
Group
Group
Mode
Update Interval
Leader
Member
802.11a Last Run
:
:
:
:
STATIC
600 seconds
web (10.10.10.1)
web(10.10.10.1)
nb1(172.13.21.45) (*Unreachable)
: 438 seconds ago
Mobility Agents RF membership information
-----------------------------------------------------------No of 802.11a MA RF-members : 0
This example shows how to display 802.11a RF event and performance logging:
Device# show ap dot11 5ghz logging
RF Event and Performance Logging
Channel Update Logging
Coverage Profile Logging
Foreign Profile Logging
Load Profile Logging
Noise Profile Logging
Performance Profile Logging
TxPower Update Logging
:
:
:
:
:
:
:
Off
Off
Off
Off
Off
Off
Off
This example shows how to display the 802.11a media stream configuration:
Device# show ap dot11 5ghz media-stream
Multicast-direct
: Disabled
Best Effort
: Disabled
Video Re-Direct
: Disabled
Max Allowed Streams Per Radio
: Auto
Max Allowed Streams Per Client
: Auto
Max Video Bandwidth
: 0
Max Voice Bandwidth
: 75
Max Media Bandwidth
: 85
Min PHY Rate (Kbps)
: 6000
Max Retry Percentage
: 80
This example shows how to display the radio monitoring for the 802.11b network:
Device# show ap dot11 5ghz monitor
Default 802.11a AP monitoring
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
Monitor Mode
Monitor Mode for Mesh AP Backhaul
Monitor Channels
RRM Neighbor Discover Type
AP Coverage Interval
AP Load Interval
AP Noise Interval
AP Signal Strength Interval
:
:
:
:
:
:
:
:
Enabled
disabled
Country channels
Transparent
180 seconds
60 seconds
180 seconds
60 seconds
This example shows how to display the global configuration and statistics of an 802.11a profile:
Device#
Default
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
show ap dot11 5ghz profile
802.11a AP performance profiles
Global Interference threshold..............
Global noise threshold.....................
Global RF utilization threshold............
Global throughput threshold................
Global clients threshold...................
Global coverage threshold..................
Global coverage exception level............
Global client minimum exception lev........
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
642
10%
-70 dBm
80%
1000000 bps
12 clients
12 dB
80%
3 clients
show ap dot11
This example shows how to display the network configuration of an 802.11a profile:
Device# show ap dot11 5ghz network
802.11a Network : Enabled
11nSupport : Enabled
802.11a Low Band : Enabled
802.11a Mid Band : Enabled
802.11a High Band : Enabled
802.11a Operational Rates
802.11a 6M : Mandatory
802.11a 9M : Supported
802.11a 12M : Mandatory
802.11a 18M : Supported
802.11a 24M : Mandatory
802.11a 36M : Supported
802.11a 48M : Supported
802.11a 54M : Supported
802.11n MCS Settings:
MCS 0 : Supported
MCS 1 : Supported
MCS 2 : Supported
MCS 3 : Supported
MCS 4 : Supported
MCS 5 : Supported
MCS 6 : Supported
MCS 7 : Supported
MCS 8 : Supported
MCS 9 : Supported
MCS 10 : Supported
MCS 11 : Supported
MCS 12 : Supported
MCS 13 : Supported
MCS 14 : Supported
MCS 15 : Supported
MCS 16 : Supported
MCS 17 : Supported
MCS 18 : Supported
MCS 19 : Supported
MCS 20 : Supported
MCS 21 : Supported
MCS 22 : Supported
MCS 23 : Supported
802.11n Status:
A-MPDU Tx:
Priority 0 : Enabled
Priority 1 : Disabled
Priority 2 : Disabled
Priority 3 : Disabled
Priority 4 : Enabled
Priority 5 : Enabled
Priority 6 : Disabled
Priority 7 : Disabled
A-MSDU Tx:
Priority 0 : Enabled
Priority 1 : Enabled
Priority 2 : Enabled
Priority 3 : Enabled
Priority 4 : Enabled
Priority 5 : Enabled
Priority 6 : Disabled
Priority 7 : Disabled
Guard Interval : Any
Rifs Rx : Enabled
Beacon Interval : 100
CF Pollable mandatory : Disabled
CF Poll Request Mandatory : Disabled
CFP Period : 4
CFP Maximum Duration : 60
Default Channel : 36
Default Tx Power Level : 1
DTPC Status : Enabled
Fragmentation Threshold : 2346
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
643
show ap dot11
Pico-Cell Status : Disabled
Pico-Cell-V2 Status : Disabled
TI Threshold : 0
Legacy Tx Beamforming setting : Disabled
Traffic Stream Metrics Status : Disabled
Expedited BW Request Status : Disabled
EDCA profile type check : default-wmm
Call Admision Control (CAC) configuration
Voice AC
Voice AC - Admission control (ACM) : Disabled
Voice Stream-Size : 84000
Voice Max-Streams : 2
Voice Max RF Bandwidth : 75
Voice Reserved Roaming Bandwidth : 6
Voice Load-Based CAC mode : Enabled
Voice tspec inactivity timeout : Enabled
CAC SIP-Voice configuration
SIP based CAC : Disabled
SIP call bandwidth : 64
SIP call bandwith sample-size : 20
Video AC
Video AC - Admission control (ACM) : Disabled
Video max RF bandwidth : Infinite
Video reserved roaming bandwidth : 0
This example shows how to display the global configuration and statistics of an 802.11a profile:
Device#
Default
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
show ap dot11 5ghz receiver
802.11a AP performance profiles
Global Interference threshold..............
Global noise threshold.....................
Global RF utilization threshold............
Global throughput threshold................
Global clients threshold...................
Global coverage threshold..................
Global coverage exception level............
Global client minimum exception lev........
10%
-70 dBm
80%
1000000 bps
12 clients
12 dB
80%
3 clients
This example shows how to display the global configuration and statistics of an 802.11a profile:
Device# show ap dot11 5ghz service-policy
This example shows how to display a summary of the 802.11b access point settings:
Device#
AP Name
------CJ-1240
CJ-1130
show ap dot11 5ghz summary
MAC Address
Admin State
----------------- ----------00:21:1b:ea:36:60 ENABLED
00:1f:ca:cf:b6:60 ENABLED
Operation State
--------------UP
UP
Channel
------161
56*
TxPower
------1( )
1(*)
This example shows how to display the configuration and statistics of the 802.11a transmit power cost:
Device# show ap dot11 5ghz txpower
Automatic Transmit Power Assignment
Transmit Power Assignment Mode
Transmit Power Update Interval
Transmit Power Threshold
Transmit Power Neighbor Count
Min Transmit Power
Max Transmit Power
Transmit Power Update Contribution
Transmit Power Assignment Leader
Last Run
:
:
:
:
:
:
:
:
:
AUTO
600 seconds
-70 dBm
3 APs
-10 dBm
30 dBm
SNI.
web (10.10.10.1)
437 seconds ago
This example shows how to display the configuration and statistics of the 802.11a transmit power cost:
Device# show ap dot11 5ghz ccx global
802.11a Client Beacon Measurements:
disabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
644
show ap env summary
show ap env summary
To show ap environment summary, use the show ap env summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show ap environment summary:
Device#show ap env summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
645
show ap ethernet statistics
show ap ethernet statistics
To display Ethernet statistics for all Cisco lightweight access points, use the show ap ethernet statistics
command.
show ap ethernet statistics
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display Ethernet statistics for all access points:
Device# show ap ethernet statistics
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
646
show ap gps-location summary
show ap gps-location summary
To show GPS location summary of all connected Cisco APs, use the show ap gps-location summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show GPS location summary of all connected Cisco APs:
Device# show ap gps-location summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
647
show ap groups
show ap groups
To display information about all access point groups that are defined in the system, use the show ap groups
command.
show ap groups
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display information about all access point groups:
Device# show ap groups
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
648
show ap groups extended
show ap groups extended
To view information about all AP groups defined in the system in detail, use the show ap groups extended
command.
show ap groups extended
Syntax Description
extended
Command Default
None
Command Modes
Privileged EXEC
Command History
Displays information about all AP groups defined in the system in detail.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
649
show ap image
show ap image
To display the images present on Cisco lightweight access points, use the show ap image command.
show ap image
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display images on the access points:
Device# show ap image
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
650
show ap is-supported
show ap is-supported
To see if an AP model is supported or not, use the show ap is-supported command.
show ap is-supported model-part-number
Syntax Description
model-part-number
Command Default
None
Command Modes
Any command mode
Command History
Examples
Part number of the AP model. For example, AIR-LAP1142N-N-K9.
Release
Modification
Cisco IOS XE 3.7.0E
This command was introduced.
This example shows how to check if an AP model is supported or not:
Device# show ap is-supported AIR-LAP1142N-N-K9
AP Support: Yes
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
651
show ap join stats summary
show ap join stats summary
To display the last join error detail for a specific access point, use the show ap join stats summary command.
show ap join stats summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To obtain the MAC address of the 802.11 radio interface, enter the show interface command on the access
point.
Examples
This example shows how to display specific join information for an access point:
Device# show ap join stats summary
Number of APs : 1
Base MAC
Ethernet MAC
AP Name
IP Address
Status
--------------- --------------- --------------------- ---------------- ------------c8f9.f91a.aa80 0000.0000.0000 N A
0.0.0.0
Not Joined
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
652
show ap link-encryption
show ap link-encryption
To display the link encryption status, use the show ap link-encryption command.
show ap link-encryption
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example show how to display the link-encryption status:
Device# show ap link-encryption
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
653
show ap mac-address
show ap mac-address
To display join-related statistics collected and last join error details for access points, use the show ap
mac-address command.
show ap mac-address mac-address join stats {detailed| summary}
Syntax Description
mac-address
Access point Ethernet MAC address or the MAC address of the 802.11
radio interface.
join stats
Displays join information and statistics for Cisco access points.
detailed
Displays all join-related statistics collected.
summary
Displays the last join error detail.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display join information for a specific access point that is trying to join the device:
Device# show ap mac-address d0c2.8267.8b00 join stats detailed
Discovery phase statistics
Discovery requests received
Successful discovery responses sent
Unsuccessful discovery request processing
Reason for last unsuccessful discovery attempt
Time at last successful discovery attempt
Time at last unsuccessful discovery attempt
:
:
:
:
:
:
6
6
0
Not applicable
Nov 20 17:25:10.841
Not applicable
Join phase statistics
Join requests received
Successful join responses sent
Unsuccessful join request processing
Reason for last unsuccessful join attempt
Time at last successful join attempt
Time at last unsuccessful join attempt
:
:
:
:
:
:
3
3
0
Not applicable
Nov 20 17:25:20.998
Not applicable
Configuration phase statistics
Configuration requests received
Successful configuration responses sent
Unsuccessful configuration request processing
Reason for last unsuccessful configuration attempt
:
:
:
:
8
3
0
Not applicable
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
654
show ap mac-address
Time at last successful configuration attempt
Time at last unsuccessful configuration attempt
Last AP message decryption failure details
Reason for last message decryption failure
Last AP disconnect details
Reason for last AP connection failure
to the AP has reached maximum
Last join error summary
Type of error that occurred last
Reason for error that occurred last
to the AP has reached maximum
Time at which the last join error occurred
: Nov 20 17:25:21.177
: Not applicable
: Not applicable
: Number of message retransmission
: AP got or has been disconnected
: Number of message retransmission
: Nov 20 17:22:36.438
This example shows how to display specific join information for an access point:
Device# show ap mac-address d0c2.8267.8b00 join stats detailed
Is the AP currently connected to controller..........................
Time at which the AP joined this controller last time................
Type of error that occurred last.....................................
rejected
Reason for error that occurred last..................................
is pending for the AP
Time at which the last join error occurred...........................
No
Aug 21 12:50:36:061
Lwapp join request
RADIUS authorization
Aug 21 12:50:34:374
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
655
show ap monitor-mode summary
show ap monitor-mode summary
To display the current channel-optimized monitor mode settings, use the show ap monitor-mode summary
command.
show ap monitor-mode summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE
This command was introduced.
This example shows how to display current channel-optimized monitor mode settings:
Device# show ap monitor-mode summary
AP Name Ethernet MAC
Status
Scanning Channel List
------- -------------------- -------- ---------------AP_004 xx:xx:xx:xx:xx:xx Tracking 1,6,11, 4
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
656
show ap name auto-rf
show ap name auto-rf
To display the auto-RF settings for a Cisco lightweight access point, use the show ap name auto-rf command.
show ap name ap-name auto-rf dot11 {24ghz| 5ghz}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
Command Default
None
Command Modes
Privileged EXEC.
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display auto-RF information for an access point:
Device# show ap name AP01 auto-rf dot11 24ghz
Number of Slots
AP Name
MAC Address
Slot ID
Radio Type
Subband Type
:
:
:
:
:
:
2
TSIM_AP-1
0000.2000.02f0
0
802.11b/g
All
Noise Information
Noise Profile
Channel
1
Channel
2
Channel
3
Channel
4
Channel
5
Channel
6
Channel
7
Channel
8
Channel
9
Channel 10
Channel 11
: Failed
:
24 dBm
:
48 dBm
:
72 dBm
:
96 dBm
: 120 dBm
: -112 dBm
: -88 dBm
: -64 dBm
: -40 dBm
: -16 dBm
:
8 dBm
Interference Information
Interference Profile
Channel
1
Channel
2
Channel
3
Channel
4
: Passed
: -128 dBm
: -71 dBm
: -72 dBm
: -73 dBm
@
@
@
@
0%
1%
1%
2%
busy
busy
busy
busy
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
657
show ap name auto-rf
Channel
Channel
Channel
Channel
Channel
Channel
Channel
5
6
7
8
9
10
11
Rogue Histogram (20/40_ABOVE/40_BELOW)
Channel 36
Channel 40
Channel 44
Channel 48
Channel 52
Channel 56
Channel 60
Channel 64
Channel 100
Channel 104
Channel 108
:
:
:
:
:
:
:
-74
-75
-76
-77
-78
-79
-80
dBm
dBm
dBm
dBm
dBm
dBm
dBm
@
@
@
@
@
@
@
3%
4%
5%
5%
6%
7%
8%
busy
busy
busy
busy
busy
busy
busy
: 27/ 4/ 0
: 13/ 0/ 0
: 5/ 0/ 0
: 6/ 0/ 1
: 4/ 0/ 0
: 5/ 0/ 0
: 1/ 3/ 0
: 3/ 0/ 0
: 0/ 0/ 0
: 0/ 0/ 0
: 0/ 1/ 0
Load Information
Load Profile
Receive Utilization
Transmit Utilization
Channel Utilization
Attached Clients
:
:
:
:
:
Coverage Information
Coverage Profile
Failed Clients
: Passed
: 0 clients
Client Signal Strengths
RSSI -100 dBm
RSSI -92 dBm
RSSI -84 dBm
RSSI -76 dBm
RSSI -68 dBm
RSSI -60 dBm
RSSI -52 dBm
:
:
:
:
:
:
:
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
Client Signal to Noise Ratios
SNR
0 dB
SNR
5 dB
SNR
10 dB
SNR
15 dB
SNR
20 dB
SNR
25 dB
SNR
30 dB
SNR
35 dB
SNR
40 dB
SNR
45 dB
:
:
:
:
:
:
:
:
:
:
0
0
0
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
clients
clients
clients
Nearby APs
AP 0000.2000.0300 slot 0
AP 0000.2000.0400 slot 0
AP 0000.2000.0600 slot 0
: -68 dBm on
: -68 dBm on
: -68 dBm on
Passed
10%
20%
50%
0 clients
11 (10.10.10.1)
11 (10.10.10.1)
11 (10.10.10.1)
Radar Information
Channel Assignment Information
Current Channel Average Energy
Previous Channel Average Energy
Channel Change Count
Last Channel Change Time
Recommended Best Channel
:
:
:
:
:
0 dBm
0 dBm
0
Wed Oct 17 08:13:36 2012
11
RF Parameter Recommendations
Power Level
RTS/CTS Threshold
Fragmentation Threshold
Antenna Pattern
:
:
:
:
1
2347
2346
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
658
show ap name auto-rf
Persistent Interference Devices
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
659
show ap name bhmode
show ap name bhmode
To display Cisco bridge backhaul mode, use the show ap name bhmode command.
show ap name ap-name bhmode
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display Cisco bridge backhaul mode of an access point:
Device# show ap name TSIM_AP-1 bhmode
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
660
show ap name bhrate
show ap name bhrate
To display the Cisco bridge backhaul rate, use the show ap name bhrate command.
show ap name ap-name bhrate
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the Cisco bridge backhaul rate for an access point:
Device# show ap name AP01 bhrate
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
661
show ap name cac voice
show ap name cac voice
To display voice call admission control details for a specific Cisco lightweight access point, use the show
ap name cac voice command.
show ap name ap-name cac voice
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display voice call admission control details for an access point:
Device# show ap name AP01 cac voice
1) AP Name: AP01
=============================
Wireless Bandwidth (In MeanTime mt)
Slot# Radio
Calls BW-Max BW-Alloc Bw-InUse (%age)
-----------------------------------------------------------------1
0
802.11b/g
0
23437
0
0
2
1
802.11a
0
23437
0
0
Wired Bandwidth (in Kbps)
Slot# Wlan-ID Wlan-Name
BW-Config
BW-Avail
----------------------------------------------------------------1
0
1
maria-open
0
0
2
0
12
24
0
0
3
1
1
maria-open
0
0
4
1
12
24
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
662
show ap name config fnf
show ap name config fnf
To view the Netflow input and output monitors for a Cisco AP, use the show ap name config fnf command.
show ap name ap-name config fnf
Syntax Description
ap-name
Name of the Cisco lightweight access point
fnf
Netflow input and output monitors for a Cisco AP
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
663
show ap name dot11 call-control
show ap name dot11 call-control
To display call control information and the metrics for successful calls, use the show ap name dot11
call-control command.
show ap name ap-name dot11 {24ghz| 5ghz} call-control {call-info| metrics}
Syntax Description
ap-name
Name of the Cisco lightweight access point
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
call-info
Displays call information.
metrics
Displays call metrics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display metrics for successful calls for an access point:
Device# show ap name AP01 dot11 24ghz call-control metrics
Slot#
Call Count
Call Duration
--------------------------------0
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
664
show ap name cable-modem
show ap name cable-modem
To show AP CAPWAP CCX on a specific AP, use the show ap name cable-modemcommand.
show ap name ap-namecable-modem
Syntax Description
ap-name
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Name of the specific AP.
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show AP CAPWAP CCX on AP1:
Device# show ap name ap1 cable-modem
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
665
show ap name capwap retransmit
show ap name capwap retransmit
To display Control and Provisioning of Wireless Access Points (CAPWAP) retransmit settings, use the show
ap name capwap retransmit command.
show ap name ap-name capwap retransmit
Syntax Description
ap-name
Name of the Cisco lightweight access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CAPWAP retransmit settings of an access point:
Device# show ap name AP01 capwap retransmit
AP Name
-------AP01
Retransmit Interval Retransmit Count
------------------- ---------------3
5
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
666
show ap name ccx rm
show ap name ccx rm
To display an access point’s Cisco Client eXtensions (CCX) radio management status information, use the
show ap name ccx rm command.
show ap name ap-name ccx rm status
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CCX radio management information for an access point:
Device# show ap name AP01 ccx rm status
802.11b/g Radio
Beacon Request
Channel Load Request
Frame Request
Noise Histogram Request
Path Loss Request
Interval
Iteration
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
60
0
802.11a Radio
Beacon Request
Channel Load Request
Frame Request
Noise Histogram Request
Path Loss Request
Interval
Iteration
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
60
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
667
show ap name cdp
show ap name cdp
To display the Cisco Discovery Protocol (CDP) information for an access point, use the show ap name cdp
command.
show ap name ap-name cdp [neighbors [detail]]
Syntax Description
ap-name
Name of the Cisco lightweight access point.
neighbors
(Optional) Displays neighbors that are using CDP.
detail
(Optional) Displays details about a specific access point neighbor that is
using CDP.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CDP information for an access point:
Device# show ap name AP01 cdp neighbors detail
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
668
show ap name channel
show ap name channel
To display the available channels for a specific mesh access point, use the show ap name channel command.
show ap name ap-name channel
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the available channels for a particular access point:
Device# show ap name AP01 channel
Slot ID
Allowed Channel List
Slot ID
Allowed Channel List
: 0
: 1, 2, 3, 4, 5, 6, 7, 8, 9
10, 11
: 1
: 36, 40, 44, 48, 52, 56, 60, 64, 100
104, 108, 112, 116, 132, 136, 140, 149,
153
157, 161
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
669
show ap name config
show ap name config
To display common information and Ethernet VLAN tagging information for a specific Cisco lightweight
access point, use the show ap name config command.
show ap name ap-name config {ethernet| general}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
ethernet
Displays Ethernet tagging configuration information for an access point.
general
Displays common information for an access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display Ethernet tagging information for an access point:
Device# show ap name AP01 config ethernet
VLAN Tagging Information for AP01
This example shows how to display common information for an access point:
Device# show ap name AP01 config general
Cisco AP Name
Cisco AP Identifier
Country Code
Regulatory Domain Allowed by Country
AP Country Code
AP Regulatory Domain
Switch Port Number
MAC Address
IP Address Configuration
IP Address
IP Netmask
Gateway IP Address
Fallback IP Address Being Used
Domain
Name Server
CAPWAP Path MTU
Telnet State
SSH State
Cisco AP Location
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
670
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
AP01
5
US - United States
802.11bg:-A
802.11a:-A
US - United States
Unconfigured
Te1/0/1
0000.2000.02f0
Static IP assigned
10.10.10.12
255.255.0.0
10.10.10.1
10.10.10.12
Cisco
0.0.0.0
1485
Enabled
Disabled
sanjose
show ap name config
Cisco AP Group Name
Primary Cisco Controller Name
Primary Cisco Controller IP Address
Secondary Cisco Controller Name
Secondary Cisco Controller IP Address
Tertiary Cisco Controller Name
Tertiary Cisco Controller IP Address
Administrative State
Operation State
AP Mode
AP Submode
Remote AP Debug
Logging Trap Severity Level
Software Version
Boot Version
Stats Reporting Period
LED State
PoE Pre-Standard Switch
PoE Power Injector MAC Address
Power Type/Mode
Number of Slots
AP Model
AP Image
IOS Version
Reset Button
AP Serial Number
AP Certificate Type
Management Frame Protection Validation
AP User Mode
AP User Name
AP 802.1X User Mode
AP 802.1X User Name
Cisco AP System Logging Host
AP Up Time
seconds
AP CAPWAP Up Time
Join Date and Time
Join Taken Time
seconds
Join Priority
Ethernet Port Duplex
Ethernet Port Speed
AP Link Latency
Rogue Detection
AP TCP MSS Adjust
AP TCP MSS Size
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
default-group
CAPWAP Controller
10.10.10.1
Not Configured
Not Configured
Enabled
Registered
Local
Not Configured
Disabled
informational
7.4.0.5
7.4.0.5
180
Enabled
Disabled
Disabled
Power Injector/Normal Mode
2
1140AG
C1140-K9W8-M
SIM1140K001
Manufacture Installed
Disabled
Customized
cisco
Not Configured
Not Configured
255.255.255.255
15 days 16 hours 19 minutes 57
: 4 minutes 56 seconds
: 10/18/2012 04:48:56
: 15 days 16 hours 15 minutes 0
:
:
:
:
:
:
:
1
Auto
Auto
Disabled
Disabled
Disabled
6146
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
671
show ap name config dot11
show ap name config dot11
To display 802.11 configuration information that corresponds to specific Cisco lightweight access points, use
the show ap name config dot11 command.
show ap name ap-name config dot11 {24ghz| 49ghz| 58ghz| 5hgz| dual-band}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
49ghz
Displays 802.11-4.9G network settings.
58ghz
Displays 802.11-5.8G network settings.
5hgz
Displays the 5 GHz band settings.
dual-band
Displays the dual band radio settings.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.3SE
The dual-band parameter was added.
This example shows how to display 802.11b configuration information that corresponds to a specific Cisco
lightweight access point:
Device# show ap name AP01 config dot11 24ghz
Cisco AP Identifier
Cisco AP Name
Country Code
Regulatory Domain Allowed by Country
AP Country Code
AP Regulatory Domain
Switch Port Number
MAC Address
IP Address Configuration
IP Address
IP Netmask
Gateway IP Address
Fallback IP Address Being Used
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
672
:
:
:
:
:
:
:
:
:
:
:
:
:
5
AP01
US - United States
802.11bg:-A
802.11a:-A
US - United States
-A
Te1/0/1
0000.2000.02f0
Static IP assigned
10.10.10.12
255.255.0.0
10.10.10.1
10.10.10.12
show ap name config dot11
Domain
Name Server
CAPWAP Path MTU
Telnet State
SSH State
Cisco AP Location
Cisco AP Group Name
Administrative State
Operation State
AP Mode
AP Submode
Remote AP Debug
Logging Trap Severity Level
Software Version
Boot Version
Mini IOS Version
Stats Reporting Period
LED State
PoE Pre-Standard Switch
PoE Power Injector MAC Address
Power Type/Mode
Number of Slots
AP Model
AP Image
IOS Version
Reset Button
AP Serial Number
AP Certificate Type
Management Frame Protection Validation
AP User Mode
AP User Name
AP 802.1X User Mode
AP 802.1X User Name
Cisco AP System Logging Host
AP Up Time
seconds
AP CAPWAP Up Time
Join Date and Time
Join Taken Time
seconds
Attributes for Slot 0
Radio Type
Administrative State
Operation State
Cell ID
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Cisco
0.0.0.0
1485
Enabled
Disabled
sanjose
default-group
Enabled
Registered
Local
Not Configured
Disabled
informational
7.4.0.5
7.4.0.5
3.0.51.0
180
Enabled
Disabled
Disabled
Power Injector/Normal Mode
2
1140AG
C1140-K9W8-M
SIM1140K001
Manufacture Installed
Disabled
Customized
cisco
Not Configured
Not Configured
255.255.255.255
15 days 17 hours 9 minutes 41
: 54 minutes 40 seconds
: 10/18/2012 04:48:56
: 15 days 16 hours 15 minutes 0
:
:
:
:
802.11n - 2.4 GHz
Enabled
Up
0
:
:
:
:
:
:
Automatic
1
100
4
60
000020000200
Operation Rate Set
1000 Kbps
2000 Kbps
5500 Kbps
11000 Kbps
6000 Kbps
9000 Kbps
12000 Kbps
18000 Kbps
24000 Kbps
36000 Kbps
48000 Kbps
54000 Kbps
:
:
:
:
:
:
:
:
:
:
:
:
MANDATORY
MANDATORY
MANDATORY
MANDATORY
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
MCS Set
MCS 0
MCS 1
MCS 2
: SUPPORTED
: SUPPORTED
: SUPPORTED
Station Configuration
Configuration
Number of WLANs
Medium Occupancy Limit
CFP Period
CFP Maximum Duration
BSSID
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
673
show ap name config dot11
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
:
:
:
:
:
100
2346
True
True
US
Multi Domain Capability
Configuration
First Channel
Number of Channels
Country String
:
:
:
:
Automatic
0
0
US
MAC Operation Parameters
Configuration
Fragmentation Threshold
Packet Retry Limit
Legacy Tx Beamforming Setting
:
:
:
:
Automatic
2346
64
Disabled
Tx Power
Number of Supported Power Levels
Tx Power Level 1
Tx Power Level 2
Tx Power Level 3
Tx Power Level 4
Tx Power Level 5
Tx Power Level 6
Tx Power Level 7
Tx Power Level 8
Tx Power Configuration
Current Tx Power Level
:
:
:
:
:
:
:
:
:
:
:
8
20 dBm
17 dBm
14 dBm
11 dBm
8 dBm
5 dBm
2 dBm
-1 dBm
Automatic
1
Phy OFDM Parameters
Configuration
Current Channel
Extension Channel
Channel Width
Allowed Channel List
:
:
:
:
:
Automatic
11
None
20 MHz
1, 2, 3, 4, 5, 6, 7, 8, 9
10, 11
0
Internal
0
Diversity enabled
Beacon Period
Fragmentation Threshold
Multi Domain Capability Implemented
Multi Domain Capability Enabled
Country String
TI Threshold
Antenna Type
Internal Antenna Gain (in .5 dBi units)
Diversity
:
:
:
:
802.11n Antennas
Tx
Rx
: A, B, C
: A, B, C
Performance Profile Parameters
Configuration
Interference Threshold
Noise Threshold
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
674
: Automatic
: 10%
: -70 dBm
show ap name config dot11
RF Utilization Threshold
Data Rate Threshold
Client Threshold
Coverage SNR Threshold
Coverage Exception Level
Client Minimum Exception Level
RTS/CTS Threshold
Short Retry Limit
Long Retry Limit
Max Tx MSDU Lifetime
Max Rx Lifetime
CleanAir Management Information
CleanAir Capable
CleanAir Management Admin State
CleanAir Management Operation State
Rapid Udpate Mode
Spectrum Expert connection
CleanAir NSI Key
88
Spectrum Expert connections counter
CleanAir Sensor State
Rogue Containment Information
Containment Count
:
:
:
:
:
:
80%
1000000 bps
12 clients
15 dB
25%
3 clients
: 2347
: 7
: 4
: 512
: 512
:
:
:
:
:
:
Yes
Enabled
Up
Disabled
Disabled
377313C8F290E246E640C4EF177BED
: 0
: Configured
: 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
675
show ap name config slot
show ap name config slot
To display configuration information for slots on a specific Cisco lightweight access point, use the show ap
name config slot command.
show ap name ap-name config slot {0| 1| 2| 3}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
0
Displays slot number 0.
1
Displays slot number 1.
2
Displays slot number 2.
3
Displays slot number 3.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display configuration information for slots on an access point:
Device# show ap name AP01 config slot 0
Cisco AP Identifier
Cisco AP Name
Country Code
Regulatory Domain Allowed by Country
AP Country Code
AP Regulatory Domain
Switch Port Number
MAC Address
IP Address Configuration
IP Address
IP Netmask
Gateway IP Address
Fallback IP Address Being Used
Domain
Name Server
CAPWAP Path MTU
Telnet State
SSH State
Cisco AP Location
Cisco AP Group Name
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
676
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
3
AP01
US - United States
802.11bg:-A
802.11a:-A
US - United States
-A
Te1/0/1
0000.2000.02f0
Static IP assigned
10.10.10.12
255.255.0.0
10.10.10.1
10.10.10.12
Cisco
0.0.0.0
1485
Enabled
Disabled
sanjose
default-group
show ap name config slot
Administrative State
Operation State
AP Mode
AP Submode
Remote AP Debug
Logging Trap Severity Level
Software Version
Boot Version
Mini IOS Version
Stats Reporting Period
LED State
PoE Pre-Standard Switch
PoE Power Injector MAC Address
Power Type/Mode
Number of Slots
AP Model
AP Image
IOS Version
Reset Button
AP Serial Number
AP Certificate Type
Management Frame Protection Validation
AP User Mode
AP User Name
AP 802.1X User Mode
AP 802.1X User Name
Cisco AP System Logging Host
AP Up Time
econds
AP CAPWAP Up Time
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Join Date and Time
Join Taken Time
seconds
: 10/17/2012 08:13:36
: 14 days 19 hours 39 minutes 41
Attributes for Slot 0
Radio Type
Administrative State
Operation State
Cell ID
Enabled
Registered
Local
Not Configured
Disabled
informational
7.4.0.5
7.4.0.5
3.0.51.0
180
Enabled
Disabled
Disabled
Power Injector/Normal Mode
2
1140AG
C1140-K9W8-M
SIM1140K001
Manufacture Installed
Disabled
Customized
cisco
Not Configured
Not Configured
255.255.255.255
15 days 16 hours 1 minute 19 s
: 20 hours 21 minutes 37 seconds
:
:
:
:
802.11n - 2.4 GHz
Enabled
Up
0
:
:
:
:
:
:
Automatic
1
100
4
60
000020000200
Operation Rate Set
1000 Kbps
2000 Kbps
5500 Kbps
11000 Kbps
6000 Kbps
9000 Kbps
12000 Kbps
18000 Kbps
24000 Kbps
36000 Kbps
48000 Kbps
54000 Kbps
:
:
:
:
:
:
:
:
:
:
:
:
MANDATORY
MANDATORY
MANDATORY
MANDATORY
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
MCS Set
MCS 0
MCS 1
MCS 2
MCS 3
MCS 4
MCS 5
MCS 6
MCS 7
MCS 8
:
:
:
:
:
:
:
:
:
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
Station Configuration
Configuration
Number of WLANs
Medium Occupancy Limit
CFP Period
CFP Maximum Duration
BSSID
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
677
show ap name config slot
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
:
:
:
:
:
100
2346
True
True
US
Multi Domain Capability
Configuration
First Channel
Number of Channels
Country String
:
:
:
:
Automatic
0
0
US
MAC Operation Parameters
Configuration
Fragmentation Threshold
Packet Retry Limit
: Automatic
: 2346
: 64
Tx Power
Number of Supported Power Levels
Tx Power Level 1
Tx Power Level 2
Tx Power Level 3
Tx Power Level 4
Tx Power Level 5
Tx Power Level 6
Tx Power Level 7
Tx Power Level 8
Tx Power Configuration
Current Tx Power Level
:
:
:
:
:
:
:
:
:
:
:
8
20 dBm
17 dBm
14 dBm
11 dBm
8 dBm
5 dBm
2 dBm
-1 dBm
Automatic
1
Phy OFDM Parameters
Configuration
Current Channel
Extension Channel
Channel Width
Allowed Channel List
:
:
:
:
:
Automatic
11
None
20 MHz
1, 2, 3, 4, 5, 6, 7, 8, 9
10, 11
0
Internal
0
Diversity enabled
Beacon Period
Fragmentation Threshold
Multi Domain Capability Implemented
Multi Domain Capability Enabled
Country String
TI Threshold
Antenna Type
Internal Antenna Gain (in .5 dBi units)
Diversity
:
:
:
:
802.11n Antennas
Tx
Rx
: A, B, C
: A, B, C
Performance Profile Parameters
Configuration
Interference Threshold
Noise Threshold
RF Utilization Threshold
Data Rate Threshold
Client Threshold
Coverage SNR Threshold
Coverage Exception Level
Client Minimum Exception Level
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
678
:
:
:
:
:
:
:
:
:
Automatic
10%
-70 dBm
80%
1000000 bps
12 clients
15 dB
25%
3 clients
show ap name config slot
Rogue Containment Information
Containment Count
: 0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
679
show ap name core-dump
show ap name core-dump
To display the memory core dump information for a lightweight access point, use the show ap name
core-dump command.
show ap name ap-name core-dump
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the memory core dump information:
Device# show ap name 3602a core-dump
TFTP server IP : 172.31.25.21
Memory core dump file : 3602a.dump
Memory core dump file compressed : Disabled
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
680
show ap name data-plane
show ap name data-plane
To display the data plane status of a specific Cisco lightweight access point, use the show ap name data-plane
command.
show ap name ap-name data-plane
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the data plane status of an access point:
Device# show ap name AP01 data-plane
AP Name
-----------------AP01
Min Data
Round Trip
-------------0.000s
Data
Round Trip
-------------0.000s
Max Data
Last
Round Trip
Update
-------------- -------0.000s
00:00:00
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
681
show ap name dot11
show ap name dot11
To display 802.11a or 802.11b configuration information that corresponds to specific Cisco lightweight access
points, use the show ap name dot11 command.
show ap name ap-name dot11 {24ghz| 5ghz} {ccx| cdp| profile| service-poicy output| stats| tsm {all|
client-mac}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
ccx
Displays the Cisco Client eXtensions (CCX) radio management status
information.
cdp
Displays Cisco Discovery Protocol (CDP) information.
profile
Displays configuration and statistics of 802.11 profiling.
service-policy output
Displays downstream service policy information.
stats
Displays Cisco lightweight access point statistics.
tsm
Displays 802.11 traffic stream metrics statistics.
all
Displays the list of all access points to which the client has associations.
client-mac
MAC address of the client.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the service policy that is associated with the access point:
Device# show ap name test-ap dot11 24ghz service-policy output
Policy Name
: test-ap1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
682
show ap name dot11
Policy State : Installed
This example shows how to display the CCX RRM 802.11 configuration for a specific access point:
Device# show ap name AP01 dot11 24ghz ccx
This example show how to display CDP information for a specific access point:
Device# show ap name AP01 dot11 24ghz cdp
AP Name
AP CDP State
--------------------- -------------AP03
Disabled
This example show how to display the configuration and statistics of 802.11b profiling for a specific access
point:
Device# show ap name AP01 dot11 24ghz profile
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
AP
AP
AP
AP
AP
AP
performance profile mode
Interference threshold
noise threshold
RF utilization threshold
throughput threshold
clients threshold
:
:
:
:
:
:
GLOBAL
10 %
-70 dBm
80 %
1000000 bps
12 clients
This example show how to display downstream service policy information for a specific access point:
Device# show ap name AP01 dot11 24ghz service-policy output
Policy Name : def-11gn
Policy State : Installed
This example show how to display statistics for a specific access point:
Device# show ap name AP01 dot11 24ghz stats
Number of Users................................:
TxFragmentCount................................:
MulticastTxFrameCnt............................:
FailedCount....................................:
RetryCount.....................................:
MultipleRetryCount.............................:
FrameDuplicateCount............................:
RtsSuccessCount................................:
RtsFailureCount................................:
AckFailureCount................................:
RxIncompleteFragment...........................:
MulticastRxFrameCnt............................:
FcsErrorCount..................................:
TxFrameCount...................................:
WepUndecryptableCount..........................:
TxFramesDropped................................:
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Call Admission Control (CAC) Stats
Voice Bandwidth in use(% of config bw).........:
Video Bandwidth in use(% of config bw).........:
Total BW in use for Voice(%)...................:
Total BW in use for SIP Preferred call(%)......:
0
0
0
0
Load based Voice Call Stats
Total channel MT free..........................:
Total voice MT free............................:
Na Direct......................................:
Na Roam........................................:
0
0
0
0
WMM TSPEC CAC Call Stats
Total num of voice calls in progress...........:
Num of roaming voice calls in progress.........:
Total Num of voice calls since AP joined.......:
Total Num of roaming calls since AP joined.....:
0
0
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
683
show ap name dot11
Total Num of exp bw requests received..........:
Total Num of exp bw requests admitted..........:
Num of voice calls rejected since AP joined....:
Num of roam calls rejected since AP joined.....:
Num of calls rejected due to insufficent bw....:
Num of calls rejected due to invalid params....:
Num of calls rejected due to PHY rate..........:
Num of calls rejected due to QoS policy........:
0
0
0
0
0
0
0
0
SIP CAC Call Stats
Total Num of calls in progress.................:
Num of roaming calls in progress...............:
Total Num of calls since AP joined.............:
Total Num of roaming calls since AP joined.....:
Total Num of Preferred calls received..........:
Total Num of Preferred calls accepted..........:
Total Num of ongoing Preferred calls...........:
Total Num of calls rejected(Insuff BW).........:
Total Num of roam calls rejected(Insuff BW)....:
0
0
0
0
0
0
0
0
0
Band Select Stats
Num of dual band client .......................:
Num of dual band client added..................:
Num of dual band client expired ...............:
Num of dual band client replaced...............:
Num of dual band client detected ..............:
Num of suppressed client ......................:
Num of suppressed client expired...............:
Num of suppressed client replaced..............:
0
0
0
0
0
0
0
0
This example show how to display the traffic stream configuration for all clients that correspond to a specific
access point:
Device# show ap name AP01 dot11 24ghz tsm all
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
684
show ap name dot11 cleanair
show ap name dot11 cleanair
To display CleanAir configuration information that corresponds to an access point, use the show ap name
dot11 cleanair command.
show ap name ap-name dot11 {24ghz| 5ghz} cleanair {air-quality| device}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
cleanair
Displays CleanAir configuration information.
air-quality
Displays CleanAir air-quality (AQ) data.
device
Displays CleanAir interferers for an access point on the 5 GHz band.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CleanAir air-quality information for an access point in the 802.11b
network:
Device# show ap name AP01 dot11 24ghz cleanair air-quality
AQ = Air Quality
DFS = Dynamic Frequency Selection
This example shows how to display CleanAir interferers information for an access point in the 802.11b
network:
Device# show ap name AP01 dot11 24ghz cleanair device
DC
ISI
RSSI
DevID
=
=
=
=
Duty Cycle (%)
Interference Severity Index (1-Low Interference, 100-High Interference)
Received Signal Strength Index (dBm)
Device ID
No ClusterID DevID Type AP Name ISI RSSI DC Channel
-- --------- ----- ---- ------- --- ---- ----------
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
685
show ap name env
show ap name env
To show AP environment on a specific AP, use the show ap name envcommand.
show ap name ap-nameenv
Syntax Description
ap-name
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Name of the specific AP.
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show AP environment on AP1:
Device# show ap name ap1 env
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
686
show ap name ethernet statistics
show ap name ethernet statistics
To display the Ethernet statistics of a specific Cisco lightweight access point, use the show ap name ethernet
statistics command.
show ap name ap-name ethernet statistics
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the Ethernet statistics of an access point:
Device# show ap name 3602a ethernet statistics
Ethernet Stats for AP 3602a
Interface Name
Status
Speed
Rx Packets
Tx Packets
Discarded Packets
----------------------------------------------------------------------------------------GigabitEthernet0
UP
1000 Mbps
3793
5036
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
687
show ap name eventlog
show ap name eventlog
To download and display the event log of a specific Cisco lightweight access point, use the show ap name
eventlog command.
show ap name ap-name eventlog
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the event log for a specific access point:
Device# show ap name AP01 eventlog
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
688
show ap gps-location summary
show ap gps-location summary
To show GPS location summary of all connected Cisco APs, use the show ap gps-location summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show GPS location summary of all connected Cisco APs:
Device# show ap gps-location summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
689
show ap name image
show ap name image
To display the detailed information about the predownloaded image for specified access points, use the show
ap name image command.
show ap name ap-name image
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display images present on all access points:
Device# show ap name 3602a image
Total number of APs
: 1
Number of APs
Initiated
Predownloading
Completed predownloading
Not Supported
Failed to Predownload
:
:
:
:
:
0
0
0
1
0
AP Name
Primary Image
Backup Image
Predownload Status
Predownload Ver... Next
Retry Time
Retry Count
---------------------------------------------------------------------------------------------------------------------3602a
10.0.1.234
0.0.0.0
Not supported
None
NA
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
690
show ap name inventory
show ap name inventory
To display inventory information for an access point, use the show ap name inventory command.
show ap name ap-name inventory
Syntax Description
ap-name
Name of the Cisco lightweight access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display inventory information for an access point:
Device# show ap name 3502b inventory
NAME: Cisco AP
PID: 1140AG ,
NAME:
PID: ,
, DESCR: Cisco Wireless Access Point
VID: V01, SN: SIM1140K001
, DESCR:
VID: , SN:
NAME:
, DESCR:
PID: , VID: , SN:
NAME: Cisco AP
, DESCR: Cisco Wireless Access Point
PID: 3502I , VID: V01, SN: FTX1525E94A
NAME: Dot11Radio0
PID: UNKNOWN, VID:
, DESCR: 802.11N 2.4GHz Radio
, SN: FOC1522BLNA
NAME: Dot11Radio1
PID: UNKNOWN, VID:
, DESCR: 802.11N 5GHz Radio
, SN: FOC1522BLNA
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
691
show ap name lan port
show ap name lan port
To display LAN information, use show ap name lan port command.
show ap name lan portsummary |port-id
Syntax Description
summary
Displays brief summary for LAN information.
port-id
Port ID of the port that the LAN information will be displayed.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7SE
This command was introduced.
This example shows how to display the brief summary for LAN information:
Device# show ap name ap1 lan port summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
692
show ap name link-encryption
show ap name link-encryption
To display the link-encryption status for a specific Cisco lightweight access point, use the show ap name
link-encryption command.
show ap name ap-name link-encryption
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the link-encryption status for a specific Cisco lightweight access point:
Device# show ap name AP01 link-encryption
AP Name
-----------------AP01
Encryption
State
---------Disabled
Dnstream
Count
-------0
Upstream
Count
-------0
Last
Update
-----Never
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
693
show ap name service-policy
show ap name service-policy
To display service-policy information for a specific Cisco lightweight access point, use the show ap name
service-policy command.
show ap name ap-name service-policy
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display service-policy information for a specific Cisco lightweight access point:
Device# show ap name 3502b service-policy
NAME: Cisco AP
, DESCR: Cisco Wireless Access Point
PID: 3502I , VID: V01, SN: FTX1525E94A
NAME: Dot11Radio0
PID: UNKNOWN, VID:
, DESCR: 802.11N 2.4GHz Radio
, SN: FOC1522BLNA
NAME: Dot11Radio1
PID: UNKNOWN, VID:
, DESCR: 802.11N 5GHz Radio
, SN: FOC1522BLNA
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
694
show ap name tcp-adjust-mss
show ap name tcp-adjust-mss
To display TCP maximum segment size (MSS) for an access point, use the show ap name tcp-adjust-mss
command.
show ap name ap-name tcp-adjust-mss
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display TCP MSS for an access point:
Device# show ap name AP01 tcp-adjust-mss
AP Name
TCP State
MSS Size
-----------------------------------------------------AP01
Disabled
6146
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
695
show ap name wlan
show ap name wlan
To display the Basic Service Set Identifier (BSSID) value for each WLAN defined on an access point and to
display WLAN statistics, use the show ap name wlan command.
show ap name ap-name wlan {dot11 {24ghz| 5ghz}| statistic}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
dot11
Displays 802.11 parameters.
24ghz
Displays 802.11b network settings.
5ghz
Displays 802.11a network settings.
statistic
Displays WLAN statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display BSSID information of an access point in an 802.11b network:
Device# show ap name AP01 wlan dot11 24ghz
Site Name
Site Description
: default-group
:
WLAN ID Interface BSSID
------------------------------------1
default
00:00:20:00:02:00
12
default
00:00:20:00:02:0b
This example shows how to display WLAN statistics for an access point:
Device# show ap name AP01 wlan statistic
WLAN ID : 1
WLAN Profile Name
EAP
EAP
EAP
EAP
EAP
: maria-open
Id Request Msg Timeouts
Id Request Msg Timeouts Failures
Request Msg Timeouts
Request Msg Timeouts Failures
Key Msg Timeouts
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
696
:
:
:
:
:
0
0
0
0
0
show ap name wlan
EAP Key Msg Timeouts Failures
WLAN ID : 12
WLAN Profile Name
EAP
EAP
EAP
EAP
EAP
EAP
: 0
: 24
Id Request Msg Timeouts
Id Request Msg Timeouts Failures
Request Msg Timeouts
Request Msg Timeouts Failures
Key Msg Timeouts
Key Msg Timeouts Failures
:
:
:
:
:
:
0
0
0
0
0
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
697
show ap name wlandot11 service policy
show ap name wlandot11 service policy
To display the QoS policies for each Basic Service Set Identifier (BSSID) for an access point use commands
show apnameap -namewlan dot1124ghzservice-policy
show apnameap -namewlan dot115ghzservice-policy
Syntax Description
Command Default
Command History
Examples
ap- name
Name of the Cisco lightweight access point.
service-policy
Service policy information for access point.
None
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following example shows how to display QoS policies for each BSSID.
Deviceshow ap name <ap-name> wlan dot11 24ghz service-policy
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
698
show ap slots
show ap slots
To display a slot summary of all connected Cisco lightweight access points, use the show ap slots command.
show ap slots
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display a slot summary of all connected Cisco lightweight access points:
Controller# show ap slots
AP Name
Slots AP Model
Slot0
Slot1
Slot2
Slot3
---------- ------ ----------- ----------- ---------- --------- -------3602a
2
3502I
802.11b/g
802.11a
Unknown
Unknown
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
699
show ap summary
show ap summary
To display the status summary of all Cisco lightweight access points attached to the device, use the show ap
summary command.
show ap summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use this command to display a list that contains each lightweight access point name, number of slots,
manufacturer, MAC address, location, and the device port number.
Examples
This example shows how to display a summary of all connected access points:
Controller# show ap summary
Number of APs: 1
Global AP User Name: Cisco
Global AP Dot1x User Name: Not configured
AP Name
AP Model Ethernet MAC
Radio MAC
State
---------------------------------------------------------------------------------------3602a
3502I
003a.99eb.3fa8 d0c2.8267.8b00 Registered
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
700
show ap tcp-adjust-mss
show ap tcp-adjust-mss
To display information about the Cisco lightweight access point TCP Maximum Segment Size (MSS), use
the show ap tcp-adjust-mss command.
show ap tcp-adjust-mss
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display information about the access point TCP MSS information:
Controller# show ap tcp-adjust-mss
AP Name
TCP State
MSS Size
-----------------------------------------------------3602a
Disabled
0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
701
show ap universal summary
show ap universal summary
To show universal summary of all connected Cisco APs, use theshow ap universal summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show universal summary of all connected Cisco APs:
Device# show ap universal summary
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
702
show ap uptime
show ap uptime
To display the up time of all connected Cisco lightweight access points, use the show ap uptime command.
show ap uptime
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to the display up time of all connected access points:
Controller# show ap uptime
Number of APs : 1
Global AP User Name : Cisco
Global AP Dot1x User Name : Not configured
AP Name Ethernet MAC
AP Up Time
Association Up Time
------- --------------- ------------------------------ ----------------------------3602a
003a.99eb.3fa8 5 hours 13 minutes 40 seconds 5 hours 12 minutes 15 seconds
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
703
show wireless ap summary
show wireless ap summary
To display the status summary of all wireless access points, use the show wireless apsummary command.
show wirelessap summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
10.4
This command was introduced
This example shows how to display a summary of all wireless access points:
Controller# show wireless ap summary
Sub-Domain Access Point Summary
Maximum AP limit: 1010
Total AP Licence Installed: 1000
Total AP Licence Available: 1000
Total AP joined :0
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
704
show wireless client ap
show wireless client ap
To display the clients on a Cisco lightweight access point, use the show wireless client ap command.
show wireless client ap [name ap-name] dot11 {24ghz| 5ghz}
Syntax Description
name ap-name
(Optional) Displays the name of the Cisco lightweight access point.
dot11
Displays 802.11 parameters.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The show client ap command might list the status of automatically disabled clients. Use the show exclusionlist
command to view clients on the exclusion list (blacklisted).
Examples
This example shows how to display client information on a specific Cisco lightweight access point in the 2.4
GHz band:
Device# show wireless client ap name AP01 dot11 24ghz
MAC Address
AP Id Status
WLAN Id Authenticated
----------------- ------ ---------- ------- ------------xx:xx:xx:xx:xx:xx 1
Associated 1
No
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
705
test ap name
test ap name
To enable automatic testing of the path Maximum Transmit Unit (MTU) between the access point and the
device, use the test ap name command.
test ap name ap-name pmtu {disable size size| enable}
Syntax Description
ap-name
Name of the target Cisco lightweight access point.
pmtu
Tests the MTU configuration for the access point.
disable
Disables path MTU testing and manually configures the MTU value in bytes.
size size
Specifies the path MTU size.
Note
The range is from 576 to
1700.
enable
Enables the path MTU testing for the access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable the path MTU configuration for all access points associated to the device:
Controller# test ap name 3602a pmtu enable
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
706
test capwap ap name
test capwap ap name
To test Control and Provisioning of Wireless Access Points (CAPWAP) parameters for a specific Cisco
lightweight access points, use the test capwap ap name command.
test capwap ap name ap-name {encryption {enable| disable}| message token}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
encryption
Tests the Datagram Transport Layer Security (DTLS) encryption.
enable
Tests if DTLS encryption is enabled.
disable
Tests if DTLS encryption is disabled.
message token
Specifies an RRM neighbor message to send.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to test if DTLS encryption is enabled for a specific access point:
Controller# test capwap ap name 3602a encryption enable
This example shows how to test if DTLS encryption is disabled for a specific access point:
Controller# test capwap ap name 3602a encryption disable
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
707
trapflags ap
trapflags ap
To enable the sending of specific Cisco lightweight access point traps, use the trapflags ap command. To
disable the sending of Cisco lightweight access point traps, use the no form of this command.
trapflags ap {register| interfaceup}
no trapflags ap {register| interfaceup}
Syntax Description
register
Enables sending a trap when a Cisco lightweight access point registers with a
Cisco switch.
interfaceup
Enables sending a trap when a Cisco lightweight access point interface (A or
B) comes up.
Command Default
Enabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to prevent traps from sending access point-related traps:
Device(config)# no trapflags ap register
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
708
PART
IX
Mobility
• Mobility Commands, page 711
Mobility Commands
• mobility anchor, page 712
• wireless mobility, page 714
• wireless mobility controller, page 715
• wireless mobility controller (ip_address) , page 717
• wireless mobility controller peer-group, page 718
• wireless mobility group keepalive, page 719
• wireless mobility group member ip, page 720
• wireless mobility group name , page 721
• wireless mobility load-balance, page 722
• show wireless mobility, page 723
• clear wireless mobility statistics, page 724
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
711
mobility anchor
mobility anchor
To configure mobility sticky anchoring, use the mobility anchor sticky command. To disable the sticky
anchoring, use the no form of the command.
To configure guest anchoring, use the mobility anchor ip-address command.
To delete the guest anchor, use the no form of the command.
To configure the device as an auto-anchor, use the mobility anchor command.
mobility anchor {ip-address| sticky}
no mobility anchor {ip-address| sticky}
Syntax Description
sticky
The client is anchored to the first switch that it associates.
Note
This command is by default enabled and ensures low roaming latency. This
ensures that the point of presence for the client does not change when the client
joins the mobility domain and roams within the domain.
ip-address
Configures the IP address for the guest anchor device to this WLAN.
Command Default
Sticky configuration is enabled by default.
Command Modes
WLAN Configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
• The wlan_id or guest_lan_id must exist and be disabled.
• Auto-anchor mobility is enabled for the WLAN or wired guest LAN when you configure the first mobility
anchor.
• Deleting the last anchor disables the auto-anchor mobility feature and resumes normal mobility for new
associations.
• Mobility uses the following ports, that are allowed through the firewall:
◦16666
◦16667
◦16668
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
712
mobility anchor
Examples
This example shows how to enable the sticky mobility anchor:
Device(config-wlan)# mobility anchor sticky
This example shows how to configure guest anchoring:
Device(config-wlan)# mobility anchor 209.165.200.224
This example shows how to configure the device as an auto-anchor:
Device(config-wlan)# mobility anchor
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
713
wireless mobility
wireless mobility
To configure the inter mobility manager, use the wireless mobility command.
wireless mobility {dscp value }
Syntax Description
dscp value
Command Default
The default DSCP value is 48.
Command Modes
Global Configuration
Command History
Examples
Configures the Mobility inter DSCP value.
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
This example shoes how to configure mobility inter DSCP with an value of 20:
Device(config)# wireless mobility dscp 20
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
714
wireless mobility controller
wireless mobility controller
To configure mobility controller settings, use the wireless mobility controller command. To remove a
mobility controller settings, use the no form of the command.
wireless mobility controller peer-group peer-group-name [ bidge-domain-id id | member ip ip-address
[public-ip | public-ip-address ]| multicast ip multicast-address ]
nowireless mobility controller peer-group peer-group-name [ bidge-domain-id id | member ip ip-address
[public-ip | public-ip-address ]| multicast ip multicast-address ]
Syntax Description
peer-group peer-group-name
Creates a mobility peer group.
bidge-domain-id id
Configures bridge domain ID for the mobility peer group.
member ip ip-address public-ip
public-ip-address
Adds or deletes a peer group member.
The public-ip public-ip-address is optional and is
only when the mobility peer is NATed.
Configures multicast settings of a peer group.
Note
multicast ip multicast-address
Command Default
None.
Command Modes
Global Configuration.
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
In the Converged Access solution, WLANs are mapped to VLANs, and VLANs are usually mapped to subnets.
For seamless roaming, the same VLAN configured on two controllers is expected to be mapped to the same
subnet. This identical mapping from one controller to the next is important for roaming, because the controllers
taking care of the roaming event need to determine if they need:
• To address a Layer 2 roaming event (when WLAN to VLAN and subnet mapping are identical on the
anchor and the foreign controller), or
• a Layer 3 roaming event (when WLAN to VLAN and subnet mapping are different between the anchor
and the foreign controller).
This determination is made by comparing the WLAN SSID string and the VLAN ID between controllers. In
cases where the WLAN SSID and VLAN ID are identical, the expectation is that the subnet associated to the
VLAN is identical as well.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
715
wireless mobility controller
There may be cases where this mapping is not identical. For example, suppose that WLAN1 on controller 1
is mapped to VLAN 14, and that VLAN 14 on controller1 is mapped to the subnet 10.10.14.0/24. Also suppose
that WLAN 1 on controller2 is mapped to VLAN 14, but that VLAN 14 on controller2 is mapped to this
subnet 172.31.24.0/24. Controllers 1 and 2 will compare WLAN1 and the associated VLAN and conclude
that they are addressing a Layer 2 roaming event, whereas the roaming even is Layer 3, as VLAN 14 does
not have the same Layer 3 significance on both controllers.
When this disconnect between VLANs and their associated subnet occurs, you may want to configure your
Converged Access controllers for different bridge domain IDs. Two controllers in the same bridge domain
ID are expected to have the same VLAN to subnet mapping. We recommend that you configure the same
bridge domain ID on all controllers that share the same VLAN to subnet mapping, and between which roaming
is expected.
Examples
This example shows how to configure a bridge domain ID.
Device (config)# wireless mobility controller peer-group SPG1 bridge-domain-id 111
Examples
This example shows how to create and configure a peer group with a bridge ID of 111:
Device(config)# controller peer-group TestDocPeerGroup bridge-domain-id 111
Examples
This example shows how to disable a peer group with a bridge ID of 111:
Device(config)# no controller peer-group TestDocPeerGroup bridge-domain-id 111
Examples
This examples shows the configuration for a NATed member (the IP 172.19.13.15 is outside the NAT):
Device (config)# wireless mobility group ip 1.4.91.2 public-ip 172.19.13.15
Examples
This examples shows the configuration of a member when it is not NATed (the IP 1.4.91.2 is inside the NAT):
Device (config)# wireless mobility group ip 1.4.91.2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
716
wireless mobility controller (ip_address)
wireless mobility controller (ip_address)
To configure the mobility controller, use the wireless mobility controller command.
To convert the switch from MC to MA, use the no wireless mobility controllerform of the command.
To delete the mobility controllers IP address, use the no wirelessmobility controller ip-address
wireless mobility controller [ip ip-address [public-ip public-ip-address ]]
no wireless mobility controller
no wireless mobility controllerip ip-address
Syntax Description
ip ip-address
IP address of mobility controller.
public-ip public-ip-address
Command Default
None.
Command Modes
Global Configuration.
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This command is valid only for the converged access switch.
The NAted address is used to establish communication, and the configured Wireless Management interface
is used to identify the peer controller during the CAPWAP exchanges.
Examples
This examples shows how the controller communicates with the wireless management interface :
Device (config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.6
Examples
This examples shows how to add a NAT option along with the wireless managed interface, when the target
controller uses NAT:
Device (config)# wireless mobility controller peer-group SPG1 member ip 10.10.20.6 public-ip
10.21.21.2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
717
wireless mobility controller peer-group
wireless mobility controller peer-group
To configure mobility peer groups, use the wireless mobility controller peer-group command, to remove
the configuration, use the no form of this command.
wireless mobility controller peer-group peer-group member IP ip-addressmode centralized
Syntax Description
peer group
Name of the peer group.
member IP
Adds a peer group member.
ip-address
IP address of the peer group member to be added.
mode centralized
Configures the management mode of the peer group member as
centrally managed.
Command Default
The centralized mode is off.
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
Device enable
Device# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)# wireless mobility controller peer-group peer1 member ip 10.0.0.1 mode
centralized
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
718
wireless mobility group keepalive
wireless mobility group keepalive
To configure the mobility group parameter and keep alive its ping parameters, use the wireless mobility
group keepalive command. To remove a mobility group parameter, use the no form of the command.
wireless mobility group keepalive {count number| interval interval}
no wireless mobility group keepalive {count numbe r| interval interval}
Syntax Description
count number
Number of times that a ping request is sent to a mobility group member before
the member is considered unreachable. The range is from 3 to 20. The default is
3.
interval interval
Interval of time between each ping request sent to a mobility group member. The
range is from 1 to 30 seconds. The default value is 10 seconds.
Command Default
3 seconds for count and 10 seconds for interval.
Command Modes
Global Configuration.
Command History
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The default values for interval is ten seconds and the default for retries is set to three.
Examples
This example shows how to specify the amount of time between each ping request sent to a mobility group
member to 10 seconds:
Device(config)# wireless mobility group keepalive count 10
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
719
wireless mobility group member ip
wireless mobility group member ip
To add or delete users from mobility group member list, use the wireless mobility group member ip
command. To remove a member from the mobility group, use the no form of the command.
wireless mobility group member ip ip-address [public-ip public-ip-address ] [group group-name ]
no wireless mobility group member ip ip-address
Syntax Description
ip-address
The IP address of the member controller.
public-ip public-ip-address
(Optional) Member controller public IP address.
Note
This command is used only when the member is behind a NAT.
Only static IP NAT is supported.
group group-name
(Optional) Member controller group name.
Note
This command is used only when the member added in not in the
same group as the local mobility controller.
Command Default
None.
Command Modes
Global Configuration.
Command History
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The mobility group is used when there is more than one Mobility Controller (MC) in a given deployment.
The mobility group can be assigned with a name or it can use the default group name. The mobility group
members need to be configured on all the members of the group to roam within the group.
Examples
This example shows how to add a member in a mobility group:
Device(config)# mobility group member ip 10.104.171.101 group TestDocGroup
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
720
wireless mobility group name
wireless mobility group name
To configure hte mobility domain name, use the wireless mobility group name command. To remove the
mobility domain name, use the no form of the command.
Note
If you are configuring the mobility group in a network where network address translation (NAT) is enabled,
enter the IP address that is sent to the controller from the NAT device rather than the controller’s
management interface IP address. Otherwise, mobility will fail among controllers in the mobility group.
wireless mobility group name domain-name
no wireless mobility group name
Syntax Description
domain-name
Command Default
Default.
Command Modes
Global Configuration.
Command History
Examples
Creates a mobility group by entering this command. The domain name can be
up to 31 case-sensitive characters.
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a mobility domain name lab1:
Device(config)# mobility group domain lab1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
721
wireless mobility load-balance
wireless mobility load-balance
This command is used to load-balance the mobile clients on a mobility anchor (MA) from a switch peer group
(SPG) that is least loaded and is chosen to act as the point of presence for the mobile client.
To configure the mobility load-balance status, use the wireless mobility load-balance command.
To disable the mobility load-balance, use the no wirelessmobility load-balanceform of the command.
To configure the client load on the switch where mobility load-balance is turned on, use the no wirelessmobility
load-balance threshold form of the command.
wireless mobility load-balance [threshold threshold ]
[no]wireless mobility load-balance [threshold]
[no]wireless mobility load-balance
Syntax Description
threshold threshold
Configures the threshold for the number of clients that can be anchored
locally.
Command Default
Load balance enabled and set at a value of 1000.
Command Modes
Global Configuration.
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
• This command is only supported on a mobility agent.
• By default, the threshold can accommodate more than fifty percent of the total clients on the node. Any
client joining the switch after the reaching the configured threshold value is automatically anchored to
the least loaded switch within the same switch peer group.
Examples
This example shows how to configure the mobility load-balance status with a threshold set at 150.
Device(config)# wireless mobility load-balance threshold 150
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
722
show wireless mobility
show wireless mobility
To view the wireless mobility summary, use the show wireless mobility command.
show wireless mobility {load-balance summary agent mobility-agent-ip client summary |ap-list ip-address
ip-address| controller client summary|dtls connections|statistics summary}
Syntax Description
load-balance summary
Shows the mobility load-balance properties.
agent mobility-agent-ip client summary
Shows the active clients on a mobility agent.
ap-list ip-address ip-address
Shows the list of Cisco APs known to the mobility group.
controller client summary
Shows the active clients in the subdomain.
dtls connections
Shows the DTLS server status.
statistics
Shows the statistics for the Mobility manager.
summary
Shows the summary of the mobility manager.
Command Default
None
Command Modes
Global Configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to display a summary of the mobility manager:
Device (config)# show wireless mobility ap-list
AP name
AP radio MAC
Controller IP
Learnt from
-----------------------------------------------------------------------------------------------------TSIM_AP-101
0000.2000.6600
9.9.9.2
Self
TSIM_AP-102
0000.2000.6700
9.9.9.2
Self
TSIM_AP-103
0000.2000.6800
9.9.9.2
Self
TSIM_AP-400
0000.2001.9100
9.9.9.2
Self
TSIM_AP-402
0000.2001.9300
9.9.9.2
Self
TSIM_AP-403
0000.2001.9400
9.9.9.2
Self
TSIM_AP-406
0000.2001.9700
9.9.9.2
Self
TSIM_AP-407
0000.2001.9800
9.9.9.2
Self
TSIM_AP-409
0000.2001.9a00
9.9.9.2
Self
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
723
clear wireless mobility statistics
clear wireless mobility statistics
To clear wireless statistics, use the clear wireless mobility statistics command.
clear wireless mobility statistics
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.2SE Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can clear all the information by using the clear wireless mobility statistics command.
Examples
This example shows how to clear wireless mobility statistics:
Device (config)# clear wireless mobility statistics
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
724
PART
X
Network Management
• Network Management Commands, page 727
Network Management Commands
• ip wccp, page 729
• monitor capture (interface/control plane), page 731
• monitor capture buffer, page 735
• monitor capture clear, page 736
• monitor capture export, page 737
• monitor capture file, page 738
• monitor capture limit, page 740
• monitor capture match, page 741
• monitor capture start, page 742
• monitor capture stop, page 743
• monitor session, page 744
• monitor session destination, page 746
• monitor session filter, page 750
• monitor session source, page 752
• show ip sla statistics, page 755
• show monitor, page 757
• show monitor capture, page 760
• show platform ip wccp, page 762
• snmp-server enable traps, page 763
• snmp-server enable traps bridge, page 767
• snmp-server enable traps bulkstat, page 768
• snmp-server enable traps call-home, page 769
• snmp-server enable traps cef, page 770
• snmp-server enable traps cpu, page 771
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
727
• snmp-server enable traps envmon, page 772
• snmp-server enable traps errdisable, page 773
• snmp-server enable traps flash, page 774
• snmp-server enable traps isis, page 775
• snmp-server enable traps license, page 776
• snmp-server enable traps mac-notification, page 777
• snmp-server enable traps ospf, page 778
• snmp-server enable traps pim, page 780
• snmp-server enable traps port-security, page 781
• snmp-server enable traps power-ethernet, page 782
• snmp-server enable traps snmp, page 783
• snmp-server enable traps stackwise, page 784
• snmp-server enable traps storm-control, page 786
• snmp-server enable traps stpx, page 787
• snmp-server enable traps transceiver, page 788
• snmp-server enable traps vrfmib, page 789
• snmp-server enable traps vstack, page 790
• snmp-server engineID, page 791
• snmp-server host, page 792
• switchport mode access, page 797
• switchport voice vlan, page 798
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
728
ip wccp
ip wccp
To enable the web cache service, and specify the service number that corresponds to a dynamic service that
is defined by the application engine, use the ip wccp global configuration command on the device. Use the
no form of this command to disable the service.
ip wccp {web-cache | service-number} [group-address groupaddress] [group-list access-list] [redirect-list
access-list] [password encryption-number password]
no ip wccp {web-cache | service-number} [group-address groupaddress] [group-list access-list] [redirect-list
access-list] [password encryption-number password]
Syntax Description
web-cache
Specifies the web-cache service (WCCP Version 1 and Version 2).
service-number
Dynamic service identifier, which means the service definition is
dictated by the cache. The dynamic service number can be from 0 to
254. The maximum number of services is 256, which includes the
web-cache service specified with the web-cache keyword.
group-address groupaddress
(Optional) Specifies the multicast group address used by the devices
and the application engines to participate in the service group.
group-list access-list
(Optional) If a multicast group address is not used, specifies a list of
valid IP addresses that correspond to the application engines that are
participating in the service group.
redirect-list access-list
(Optional) Specifies the redirect service for specific hosts or specific
packets from hosts.
password encryption-number
password
(Optional) Specifies an encryption number. The range is 0 to 7. Use
0 for not encrypted, and use 7 for proprietary. Also, specifies a
password name up to seven characters in length. The device combines
the password with the MD5 authentication value to create security
for the connection between the device and the application engine.
By default, no password is configured, and no authentication is
performed.
Command Default
WCCP services are not enabled on the device.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE
3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
729
ip wccp
Usage Guidelines
WCCP transparent caching bypasses Network Address Translation (NAT) when Cisco Express Forwarding
switching is enabled. To work around this situation, configure WCCP transparent caching in the outgoing
direction, enable Cisco Express Forwarding switching on the content engine interface, and specify the ip wccp
web-cache redirect out command. Configure WCCP in the incoming direction on the inside interface by
specifying the ip wccp redirect exclude in command on the router interface facing the cache. This configuration
prevents the redirection of any packets arriving on that interface.
You can also include a redirect list when configuring a service group. The specified redirect list will deny
packets with a NAT (source) IP address and prevent redirection.
This command instructs a device to enable or disable support for the specified service number or the web-cache
service name. A service number can be from 0 to 254. Once the service number or name is enabled, the router
can participate in the establishment of a service group.
When the no ip wccp command is entered, the device terminates participation in the service group, deallocates
space if none of the interfaces still have the service configured, and terminates the WCCP task if no other
services are configured.
The keywords following the web-cache keyword and the service-number argument are optional and may be
specified in any order, but only may be specified once.
Examples
The following example configures a web cache, the interface connected to the application engine or the server,
and the interface connected to the client:
Device(config)# ip wccp web-cache
Device(config)# interface gigabitethernet1/0/1
Device(config-if)# no switchport
Device(config-if)# ip address 172.20.10.30 255.255.255.0
Device(config-if)# no shutdown
Device(config-if)# exit
Device(config)# interface gigabitethernet1/0/2
Device(config-if)# no switchport
Device(config-if)#
*Dec 6 13:11:29.507: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/3, changed state to down
Device(config-if)#
Device(config-if)#
Device(config-if)#
Device(config-if)#
Device(config-if)#
Related Commands
ip address 175.20.20.10 255.255.255.0
no shutdown
ip wccp web-cache redirect in
ip wccp web-cache group-listen
exit
Command
Description
show platform ip wccp
Displays platform-dependent WCCP information.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
730
monitor capture (interface/control plane)
monitor capture (interface/control plane)
To configure monitor capture points specifying an attachment point and the packet flow direction or add more
attachment points to a capture point, use the monitor capture command in privileged EXEC mode. To disable
the monitor capture with the specified attachment point and the packet flow direction or disable one of multiple
attachment points on a capture point, use the no form of this command.
monitor capture {capture-name}{interface interface-type interface-id | control-plane}{in | out | both}
no monitor capture {capture-name}{interface interface-type interface-id | control-plane}{in | out | both}
Syntax Description
capture-name
The name of the capture to be defined.
interface interface-type Specifies an interface with interface-type and interface-id as an attachment point.
The arguments have these meanings:
interface-id
• GigabitEthernet interface-id—A Gigabit Ethernet IEEE 802.3z interface.
• vlan vlan-id—A VLAN. The range for vlan-id is 1 to 4095.
• capwap capwap-id—Specifies a Control and Provisioning of Wireless
Access Points Protocol (CAPWAP) tunneling interface. For a list of
CAPWAP tunnels that can be used as attachment points, use the show
capwap summary command.
Note
control-plane
Specifies the control plane as an attachment point.
in | out | both
Specifies the traffic direction to be captured.
Command Default
A Wireshark capture is not configured.
Command Modes
Privileged EXEC
Command History
This is the only attachment point that can be used for a wireless
capture. When using this interface as an attachment point, no other
interface types can be used as attachment points on the same capture
point.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
731
monitor capture (interface/control plane)
Usage Guidelines
Once an attachment point has been associated with a capture point using this command, the only way to change
its direction is to remove the attachment point using the no form of the command and reattach the attachment
point with the new direction. An attachment point's direction cannot be overridden.
If an attachment point is removed from a capture point and only one attachment point is associated with it,
the capture point is effectively deleted.
Multiple attachment points can be associated with a capture point by re-running this command with another
attachment point. An example is provided below.
Multiple capture points can be defined, but only one can be active at a time. In other words, you have to stop
one before you can start the other.
Packets captured in the output direction of an interface might not reflect the changes made by switch rewrite
(includes TTL, VLAN tag, CoS, checksum, MAC addresses, DSCP, precedent, UP, etc.).
No specific order applies when defining a capture point; you can define capture point parameters in any order.
The Wireshark CLI allows as many parameters as possible on a single line. This limits the number of commands
required to define a capture point.
Neither VRFs, management ports, nor private VLANs can be used as attachment points.
Wireshark cannot capture packets on a destination SPAN port.
When a VLAN is used as a Wireshark attachment point, packets are captured in the input direction only.
Wireless (CAPWAP) Usage Considerations
The only form of wireless capture is a CAPWAP tunnel capture.
When capturing CAPWAP tunnels, no other interface types can be used as attachment points on the same
capture point.. Also, the only different type of attachment point allowed on the same capture point is the
control plane. The combination of control plane and CAPWAP tunnel attachment points should be able to
capture all wireless-related traffic.
Capturing multiple CAPWAP tunnels is supported. ACLs for each CAPWAP tunnel will be combined and
sent to the switch as a single ACL.
Core filters will not be applied and can be omitted when capturing a CAPWAP tunnel. When control plane
and CAPWAP tunnels are mixed, the core filter will not be applied on the control plane packets either.
To capture a CAPWAP non-data tunnel, capture traffic on the management VLAN and apply an appropriate
ACL to filter the traffic. Note that this ACL will be combined with the core filter ACL and assigned to the
switch as a single ACL.
Examples
To define a capture point using a physical interface as an attachment point:
Device# monitor capture mycap interface GigabitEthernet1/0/1 in
Device# monitor capture mycap match ipv4 any any
Note
The second command defines the core filter for the capture point. This is required for a functioning capture
point unless you are using a CAPWAP tunneling attachment point in your capture point.
If you are using CAPWAP tunneling attachment points in your capture point, you cannot use core filters.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
732
monitor capture (interface/control plane)
To define a capture point with multiple attachment points:
Device# monitor capture mycap interface GigabitEthernet1/0/1 in
Device# monitor capture mycap match ipv4 any any
Device# monitor capture mycap control-plane in
Device# show monitor capture mycap parameter
monitor capture mycap interface GigabitEthernet1/0/1 in
monitor capture mycap control-plane in
To remove an attachment point from a capture point defined with multiple attachment points:
Device# show monitor capture mycap parameter
monitor capture mycap interface GigabitEthernet1/0/1 in
monitor capture mycap control-plane in
Device# no monitor capture mycap control-plane
Device# show monitor capture mycap parameter
monitor capture mycap interface GigabitEthernet1/0/1 in
To define a capture point with a CAPWAP attachment point:
Device# show capwap summary
CAPWAP Tunnels General Statistics:
Number of Capwap Data Tunnels
Number of Capwap Mobility Tunnels
Number of Capwap Multicast Tunnels
= 1
= 0
= 0
Name
APName
Type PhyPortIf Mode
McastIf
------ -------------------------------- ---- --------- --------- ------Ca0
AP442b.03a9.6715
data Gi3/0/6
unicast
Name
SrcIP
SrcPort DestIP
DstPort DtlsEn MTU
Xact
------ --------------- ------- --------------- ------- ------ ----- ---Ca0
10.10.14.32
5247
10.10.14.2
38514
No
1449 0
Device#
Device#
Device#
Device#
monitor
monitor
monitor
monitor
capture
capture
capture
capture
mycap
mycap
mycap
mycap
interface capwap 0 both
file location flash:mycap.pcap
file buffer-size 1
start
*Aug 20 11:02:21.983: %BUFCAP-6-ENABLE: Capture Point mycap enabled.on
Device# show monitor capture mycap parameter
monitor capture mycap interface capwap 0 in
monitor capture mycap interface capwap 0 out
monitor capture mycap file location flash:mycap.pcap buffer-size 1
Device#
Device# show monitor capture mycap
Status Information for Capture mycap
Target Type:
Interface: CAPWAP,
Ingress:
0
Egress:
0
Status : Active
Filter Details:
Capture all packets
Buffer Details:
Buffer Type: LINEAR (default)
File Details:
Associated file name: flash:mycap.pcap
Size of buffer(in MB): 1
Limit Details:
Number of Packets to capture: 0 (no limit)
Packet Capture duration: 0 (no limit)
Packet Size to capture: 0 (no limit)
Packets per second: 0 (no limit)
Packet sampling rate: 0 (no sampling)
Device#
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
733
monitor capture (interface/control plane)
Device# show monitor capture file flash:mycap.pcap
1
0.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
2
0.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
3
2.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
4
2.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
5
3.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
6
4.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
7
4.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
8
5.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
9
5.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
10
6.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
11
8.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
12
9.225986
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
13
9.225986
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
14
9.225986
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
15
9.231998
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
16
9.231998
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
17
9.231998
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
18
9.236987
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
19 10.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
20 10.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
21 12.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
22 12.239993
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
23 12.244997
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
24 12.244997
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
25 12.250994
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
26 12.256990
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
27 12.262987
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
28 12.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
29 12.802012
10.10.14.3 -> 10.10.14.255 NBNS Name query NB WPAD.<00>
30 13.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
Related Commands
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
Command
Description
monitor capture buffer
Configures the buffer for monitor capture (WireShark).
monitor capture file
Configures monitor capture (WireShark) storage file attributes.
show monitor capture
show monitor capture
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
734
SN=0, FN=0,
monitor capture buffer
monitor capture buffer
To configure the buffer for monitor capture (WireShark), use the monitor capture buffer command in
privileged EXEC mode. To disable the monitor capture buffer or change the buffer back to a default linear
buffer from a circular buffer, use the no form of this command.
monitor capture {capture-name} buffer {circular [size buffer-size ] | size buffer-size}
no monitor capture {capture-name} buffer [circular ]
Syntax Description
capture-name
The name of the capture whose buffer is to be configured.
circular
Specifies that the buffer is of a circular type. The circular type of buffer
continues to capture data, even after the buffer is consumed, by overwriting
the data captured previously.
size buffer-size
(Optional) Specifies the size of the buffer. The range is from 1 MB to 100 MB.
Command Default
A linear buffer is configured.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When you first configure a WireShark capture, a circular buffer of a small size is suggested.
Examples
To configure a circular buffer with a size of 1 MB:
Device# monitor capture mycap buffer circular size 1
Related Commands
Command
Description
monitor capture (interface/control plane)
Configures monitor capture (WireShark) specifying an attachment
point and the packet flow direction.
monitor capture file
Configures monitor capture (WireShark) storage file attributes.
show monitor capture
show monitor capture
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
735
monitor capture clear
monitor capture clear
To clears the monitor capture (WireShark) buffer, use the monitor capture clear command in privileged
EXEC mode.
monitor capture {capture-name} clear
Syntax Description
capture-name
Command Default
The buffer content is not cleared.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The name of the capture whose buffer is to be cleared.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture clear command either during capture or after the capture has stopped either because
one or more end conditions has been met, or you entered the monitor capture stop command. If you enter
the monitor capture clear command after the capture has stopped, the monitor capture export command
that is used to store the contents of the captured packets in a file will have no impact because the buffer has
no captured packets.
If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new
capture to avoid memory loss.
Examples
To clear the buffer contents for capture mycap:
Device#
monitor capture mycap clear
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
736
monitor capture export
monitor capture export
To export a monitor capture (WireShark) to a file, use the monitor capture export command in privileged
EXEC mode.
monitor capture {capture-name} export file-location : file-name
Syntax Description
capture-name
The name of the capture to be exported.
file-location : file-name
(Optional) Specifies the location and file name of the capture storage file.
Acceptable values for file-location :
• flash—On-board flash storage
• (usbflash0:)— USB drive
Command Default
The captured packets are not stored.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture export command only when the storage destination is a capture buffer. The file
may be stored either remotely or locally. Use this command either during capture or after the packet capture
has stopped. The packet capture is stopped when one or more end conditions have been met or you entered
the monitor capture stop command.
When WireShark is used on switches in a stack, packet captures can be stored only on the devices specified
for file-location above that are connected to the active switch. Example: flash1 is connected to the active
switch. flash2 is connected to the secondary switch. Only flash1 can be used to store packet captures.
Note
Examples
Attempts to store packet captures on unsupported devices or devices not connected to the active switch
will probably result in errors.
To export the capture buffer contents to mycap.pcap on a flash drive:
Device# monitor capture mycap export flash:mycap.pcap
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
737
monitor capture file
monitor capture file
To configure monitor capture (WireShark) storage file attributes, use the monitor capture file command in
privileged EXEC mode. To remove a storage file attribute, use the no form of this command.
monitor capture {capture-name} file{[ buffer-size temp-buffer-size ][ location file-location : file-name ][
ring number-of-ring-files ][ size total-size ]}
no monitor capture {capture-name} file{[ buffer-size ][ location ][ ring ][ size ]}
Syntax Description
capture-name
The name of the capture to be modified.
buffer-size temp-buffer-size
(Optional) Specifies the size of the temporary buffer. The range for
temp-buffer-size is 1 to 100 MB. This is specified to reduce packet loss.
location file-location : file-name
(Optional) Specifies the location and file name of the capture storage
file. Acceptable values for file-location :
• flash—On-board flash storage
• (usbflash0:)— USB drive
ring number-of-ring-files
(Optional) Specifies that the capture is to be stored in a circular file chain
and the number of files in the file ring.
size total-size
(Optional) Specifies the total size of the capture files.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture file command only when the storage destination is a file. The file may be stored
either remotely or locally. Use this command after the packet capture has stopped. The packet capture is
stopped when one or more end conditions have been met or you entered the monitor capture stop command.
When WireShark is used on switches in a stack, packet captures can be stored only on the devices specified
for file-location above that are connected to the active switch. Example: flash1 is connected to the active
switch. flash2 is connected to the secondary switch. Only flash1 can be used to store packet captures.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
738
monitor capture file
Note
Examples
Attempts to store packet captures on unsupported devices or devices not connected to the active switch
will probably result in errors.
To specify that the storage file name is mycap.pcap, stored on a flash drive:
Device# monitor capture mycap file location flash:mycap.pcap
Related Commands
Command
Description
monitor capture (interface/control plane)
Configures monitor capture (WireShark) specifying an
attachment point and the packet flow direction.
monitor capture buffer
Configures the buffer for monitor capture (WireShark).
show monitor capture
show monitor capture
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
739
monitor capture limit
monitor capture limit
To configure capture limits, use the monitor capture limit command in privileged EXEC mode. To remove
the capture limits, use the no form of this command.
monitor capture {capture-name} limit {[duration seconds][packet-length size][packets num]}
no monitor capture {capture-name} limit [duration][packet-length][packets]
Syntax Description
capture-name
The name of the capture to be assigned capture limits.
duration seconds
(Optional) Specifies the duration of the capture, in seconds. The range is
from 1 to 1000000.
packet-length size
(Optional) Specifies the packet length, in bytes. If the actual packet is longer
than the specified length, only the first set of bytes whose number is denoted
by the bytes argument is stored.
packets num
(Optional) Specifies the number of packets to be processed for capture.
Command Default
Capture limits are not configured.
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
To configure a session limit of 60 seconds and a packet segment length of 400 bytes:
Device# monitor capture mycap limit duration 60 packet-len 400
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
740
monitor capture match
monitor capture match
Note
Do not use this command when capturing a CAPWAP tunnel. Also, when control plane and CAPWAP
tunnels are mixed, this command will have no effect.
To define an explicit inline core filter for a monitor (Wireshark) capture, use the monitor capture match
command in privileged EXEC mode. To remove this filter, use the no form of this command.
monitor capture {capture-name} match {any | mac mac-match-string | ipv4 {any | host | protocol}{any |
host} | ipv6 {any | host | protocol}{any | host}}
no monitor capture {capture-name} match
Syntax Description
capture-name
The name of the capture to be assigned a core filter.
any
Specifies all packets.
mac mac-match-string
Specifies a Layer 2 packet.
ipv4
Specifies IPv4 packets.
host
Specifies the host.
protocol
Specifies the protocol.
ipv6
Specifies IPv6 packets.
Command Default
A core filter is not configured.
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
To define a capture point and the core filter for the capture point that matches to any IP version 4 packets on
the source or destination:
Device# monitor capture mycap interface GigabitEthernet1/0/1 in
Device# monitor capture mycap match ipv4 any any
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
741
monitor capture start
monitor capture start
To start the capture of packet data at a traffic trace point into a buffer, use the monitor capture start command
in privileged EXEC mode.
monitor capture {capture-name} start
Syntax Description
capture-name
Command Default
The buffer content is not cleared.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The name of the capture to be started.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture clear command to enable the packet data capture after the capture point is defined.
To stop the capture of packet data, use the monitor capture stop command.
Ensure that system resources such as CPU and memory are available before starting a capture.
Examples
To start capturing buffer contents:
Device#
monitor capture mycap start
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
742
monitor capture stop
monitor capture stop
To stop the capture of packet data at a traffic trace point, use the monitor capture stop command in privileged
EXEC mode.
monitor capture {capture-name} stop
Syntax Description
capture-name
Command Default
The packet data capture is ongoing.
Command Modes
Privileged EXEC
Command History
The name of the capture to be stopped.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use the monitor capture stop command to stop the capture of packet data that you started using the monitor
capture start command. You can configure two types of capture buffers: linear and circular. When the linear
buffer is full, data capture stops automatically. When the circular buffer is full, data capture starts from the
beginning and the data is overwritten.
Examples
To stop capturing buffer contents:
Device#
monitor capture mycap stop
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
743
monitor session
monitor session
To create a new Ethernet Switched Port Analyzer (SPAN) or a Remote Switched Port Analyzer (RSPAN)
session configuration for analyzing traffic between ports or add to an existing session configuration, use the
monitor session global configuration command. To clear SPAN or RSPAN sessions, use the no form of this
command.
monitor session session-number {destination | filter | source}
no monitor session {session-number [destination | filter | source] | all | local | range session-range | remote}
Syntax Description
session-number
all
Clears all monitor sessions.
local
Clears all local monitor sessions.
range session-range
Clears monitor sessions in the specified range.
remote
Clears all remote monitor sessions.
Command Default
No monitor sessions are configured.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to create a local SPAN session 1 to monitor traffic on Po13 (an EtherChannel port)
and limit SPAN traffic in the session only to VLAN 1281. Egress traffic replicates the source; ingress forwarding
is not enabled.
Device(config)#
Device(config)#
Device(config)#
replicate
Device(config)#
monitor session 1 source interface Po13
monitor session 1 filter vlan 1281
monitor session 1 destination interface GigabitEthernet2/0/36 encapsulation
monitor session 1 destination interface GigabitEthernet3/0/36 encapsulation
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
744
monitor session
replicate
The following is the output of a show monitor session all command after completing these setup instructions:
Device# show monitor session all
Session 1
--------Type
Source Ports
Both
Destination Ports
Encapsulation
Ingress
Filter VLANs
...
Related Commands
:
:
:
:
: Local Session
:
: Po13
Gi2/0/36,Gi3/0/36
Replicate
Disabled
1281
Command
Description
monitor session destination
Configures a FSPAN or FRSPAN destination session.
monitor session filter
Configures a FSPAN or FRSPAN session filter.
monitor session source
Configures a FSPAN or FRSPAN source session.
show monitor
Displays information about all SPAN and RSPAN sessions.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
745
monitor session destination
monitor session destination
To start a new Switched Port Analyzer (SPAN) session or Remote SPAN (RSPAN) destination session, to
enable ingress traffic on the destination port for a network security device (such as a Cisco IDS Sensor
Appliance), and to add or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, use
the monitor session destination global configuration command. To remove the SPAN or RSPAN session or
to remove destination interfaces from the SPAN or RSPAN session, use the no form of this command.
monitor session session-number destination {interface interface-id [, | -] [encapsulation {replicate | dot1q}
] {ingress [dot1q | untagged] } | {remote} vlan vlan-id
no monitor session session-number destination {interface interface-id [, | -] [encapsulation {replicate |
dot1q} ] {ingress [dot1q | untagged] } | {remote} vlan vlan-id
Syntax Description
session-number
interface interface-id
Specifies the destination or source interface for a SPAN or
RSPAN session. Valid interfaces are physical ports (including
type, stack member, module, and port number). For source
interface, port channel is also a valid interface type, and the
valid range is 1 to 128.
,
(Optional) Specifies a series of interfaces or VLANs, or
separates a range of interfaces or VLANs from a previous
range. Enter a space before and after the comma.
-
(Optional) Specifies a range of interfaces or VLANs. Enter a
space before and after the hyphen.
encapsulation replicate
(Optional) Specifies that the destination interface replicates
the source interface encapsulation method. If not selected, the
default is to send packets in native form (untagged).
These keywords are valid only for local SPAN. For RSPAN,
the RSPAN VLAN ID overwrites the original VLAN ID;
therefore, packets are always sent untagged. The
encapsulation options are ignored with the no form of the
command.
encapsulation dot1q
(Optional) Specifies that the destination interface accepts the
source interface incoming packets with IEEE 802.1Q
encapsulation.
These keywords are valid only for local SPAN. For RSPAN,
the RSPAN VLAN ID overwrites the original VLAN ID;
therefore, packets are always sent untagged. The
encapsulation options are ignored with the no form of the
command.
ingress
Enables ingress traffic forwarding.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
746
monitor session destination
dot1q
(Optional) Accepts incoming packets with IEEE 802.1Q
encapsulation with the specified VLAN as the default VLAN.
untagged
(Optional) Accepts incoming packets with untagged
encapsulation with the specified VLAN as the default VLAN.
isl
Specifies ingress forwarding using ISL encapsulation.
remote
Specifies the remote VLAN for an RSPAN source or
destination session. The range is 2 to 1001 and 1006 to 4094.
The RSPAN VLAN cannot be VLAN 1 (the default VLAN)
or VLAN IDs 1002 to 1005 (reserved for Token Ring and
FDDI VLANs).
vlan vlan-id
Command Default
Sets the default VLAN for ingress traffic when used with only
the ingress keyword.
No monitor sessions are configured.
If encapsulation replicate is not specified on a local SPAN destination port, packets are sent in native form
with no encapsulation tag.
Ingress forwarding is disabled on destination ports.
You can specify all, local, range session-range, or remote with the no monitor session command to clear
all SPAN and RSPAN, all local SPAN, a range, or all RSPAN sessions.
Command Modes
Command History
Usage Guidelines
Global configuration
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
You can set a combined maximum of 8 local SPAN sessions and RSPAN source sessions. You can have a
total of 66 SPAN and RSPAN sessions on a switch or switch stack.
A SPAN or RSPAN destination must be a physical port.
You can have a maximum of 64 destination ports on a switch or a switch stack.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source
ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all
active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are
included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination
port.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
747
monitor session destination
You can monitor traffic on a single port or VLAN or on a series or range of ports or VLANs. You select a
series or range of interfaces or VLANs by using the [, | -] options.
If you specify a series of VLANs or interfaces, you must enter a space before and after the comma. If you
specify a range of VLANs or interfaces, you must enter a space before and after the hyphen (-).
EtherChannel ports can be configured as SPAN or RSPAN destination ports. A physical port that is a member
of an EtherChannel group can be used as a destination port, but it cannot participate in the EtherChannel group
while it is as a SPAN destination.
A port used as a destination port cannot be a SPAN or RSPAN source, nor can a port be a destination port for
more than one session at a time.
You can enable IEEE 802.1x authentication on a port that is a SPAN or RSPAN destination port; however,
IEEE 802.1x authentication is disabled until the port is removed as a SPAN destination. If IEEE 802.1x
authentication is not available on the port, the switch returns an error message. You can enable IEEE 802.1x
authentication on a SPAN or RSPAN source port.
If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic at
Layer 2.
Destination ports can be configured to function in these ways:
• When you enter monitor session session_number destination interface interface-id with no other
keywords, egress encapsulation is untagged, and ingress forwarding is not enabled.
• When you enter monitor session session_number destination interface interface-id ingress, egress
encapsulation is untagged; ingress encapsulation depends on the keywords that follow—dot1q or
untagged.
• When you enter monitor session session_number destination interface interface-id encapsulation
replicate with no other keywords, egress encapsulation replicates the source interface encapsulation;
ingress forwarding is not enabled. (This applies to local SPAN only; RSPAN does not support
encapsulation replication.)
• When you enter monitor session session_number destination interface interface-id encapsulation
replicate ingress, egress encapsulation replicates the source interface encapsulation; ingress encapsulation
depends on the keywords that follow—dot1q or untagged. (This applies to local SPAN only; RSPAN
does not support encapsulation replication.)
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source
port 1 on stack member 1 to destination port 2 on stack member 2:
Device(config)# monitor session 1 source interface gigabitethernet1/0/1 both
Device(config)# monitor session 1 destination interface gigabitethernet1/0/2
This example shows how to delete a destination port from an existing local SPAN session:
Device(config)# no monitor session 2 destination interface gigabitethernet1/0/2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
748
monitor session destination
This example shows how to configure RSPAN source session 1 to monitor a source interface and to configure
the destination RSPAN VLAN 900:
Device(config)# monitor session 1 source interface gigabitethernet1/0/1
Device(config)# monitor session 1 destination remote vlan 900
Device(config)# end
This example shows how to configure an RSPAN destination session 10 in the switch receiving the monitored
traffic:
Device(config)# monitor session 10 source remote vlan 900
Device(config)# monitor session 10 destination interface gigabitethernet1/0/2
This example shows how to configure the destination port for ingress traffic on VLAN 5 by using a security
device that supports IEEE 802.1Q encapsulation. Egress traffic replicates the source; ingress traffic uses IEEE
802.1Q encapsulation.
Device(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation
dot1q ingress dot1q vlan 5
This example shows how to configure the destination port for ingress traffic on VLAN 5 by using a security
device that does not support encapsulation. Egress traffic and ingress traffic are untagged.
Device(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress untagged
vlan 5
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session filter
Configures a FSPAN or FRSPAN session filter.
monitor session source
Configures a FSPAN or FRSPAN source session.
show monitor
Displays information about all SPAN and RSPAN sessions.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
749
monitor session filter
monitor session filter
To start a new flow-based SPAN (FSPAN) session or flow-based RSPAN (FRSPAN) source or destination
session, or to limit (filter) SPAN source traffic to specific VLANs, use the monitor session filter global
configuration command. To remove filters from the SPAN or RSPAN session, use the no form of this command.
monitor session session-number filter {vlan vlan-id [, | -] }
no monitor session session-number filter {vlan vlan-id [, | -] }
Syntax Description
session-number
vlan vlan-id
Specifies a list of VLANs as filters on trunk source ports to limit
SPAN source traffic to specific VLANs. The vlan-id range is 1 to
4094.
,
(Optional) Specifies a series of VLANs, or separates a range of
VLANs from a previous range. Enter a space before and after the
comma.
-
(Optional) Specifies a range of VLANs. Enter a space before and
after the hyphen.
Command Default
No monitor sessions are configured.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE This command was introduced.
Usage Guidelines
You can monitor traffic on a single VLAN or on a series or range of ports or VLANs. You select a series or
range of VLANs by using the [, | -] options.
If you specify a series of VLANs, you must enter a space before and after the comma. If you specify a range
of VLANs, you must enter a space before and after the hyphen (-).
VLAN filtering refers to analyzing network traffic on a selected set of VLANs on trunk source ports. By
default, all VLANs are monitored on trunk source ports. You can use the monitor session session_number
filter vlan vlan-id command to limit SPAN traffic on trunk source ports to only the specified VLANs.
VLAN monitoring and VLAN filtering are mutually exclusive. If a VLAN is a source, VLAN filtering cannot
be enabled. If VLAN filtering is configured, a VLAN cannot become a source.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
750
monitor session filter
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to limit SPAN traffic in an existing session only to specific VLANs:
Switch(config)# monitor session 1 filter vlan 100 - 110
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source
port 1 on stack member 1 to destination port 2 on stack member 2 and to filter IPv4 traffic using access list
number 122 in an FSPAN session:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both
Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
Switch(config)# monitor session 1 filter ip access-group 122
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session destination
Configures a FSPAN or FRSPAN destination session.
monitor session source
Configures a FSPAN or FRSPAN source session.
show monitor
Displays information about all SPAN and RSPAN sessions.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
751
monitor session source
monitor session source
To start a new Switched Port Analyzer (SPAN) session or Remote SPAN (RSPAN) source session, or to add
or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, use the monitor session
source global configuration command. To remove the SPAN or RSPAN session or to remove source interfaces
from the SPAN or RSPAN session, use the no form of this command.
monitor session session_number source {interface interface-id [, | -] [both | rx | tx] | [remote] vlan vlan-id
[, | -] [both | rx | tx]}
no monitor session session_number source {interface interface-id [, | -] [both | rx | tx] | [remote] vlan
vlan-id [, | -] [both | rx | tx]}
Syntax Description
session_number
interface interface-id
Specifies the source interface for a SPAN or RSPAN session. Valid
interfaces are physical ports (including type, stack member, module, and
port number). For source interface, port channel is also a valid interface
type, and the valid range is 1 to 48.
,
(Optional) Specifies a series of interfaces or VLANs, or separates a range
of interfaces or VLANs from a previous range. Enter a space before and
after the comma.
-
(Optional) Specifies a range of interfaces or VLANs. Enter a space before
and after the hyphen.
both | rx | tx
(Optional) Specifies the traffic direction to monitor. If you do not specify
a traffic direction, the source interface sends both transmitted and received
traffic.
remote
(Optional) Specifies the remote VLAN for an RSPAN source or destination
session. The range is 2 to 1001 and 1006 to 4094.
The RSPAN VLAN cannot be VLAN 1 (the default VLAN) or VLAN IDs
1002 to 1005 (reserved for Token Ring and FDDI VLANs).
vlan vlan-id
Command Default
When used with only the ingress keyword, sets default VLAN for ingress
traffic.
No monitor sessions are configured.
On a source interface, the default is to monitor both received and transmitted traffic.
On a trunk interface used as a source port, all VLANs are monitored.
Command Modes
Global configuration
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
752
monitor session source
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE
3.2SECisco IOS XE
3.3SE
This command was introduced.
Traffic that enters or leaves source ports or source VLANs can be monitored by using SPAN or RSPAN.
Traffic routed to source ports or source VLANs cannot be monitored.
A source can be a physical port, a port channel, or a VLAN.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source
ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all
active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are
included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination
port.
You can monitor traffic on a single port or VLAN or on a series or range of ports or VLANs. You select a
series or range of interfaces or VLANs by using the [, | -] options.
If you specify a series of VLANs or interfaces, you must enter a space before and after the comma. If you
specify a range of VLANs or interfaces, you must enter a space before and after the hyphen (-).
You can monitor individual ports while they participate in an EtherChannel, or you can monitor the entire
EtherChannel bundle by specifying the port-channel number as the RSPAN source interface.
A port used as a destination port cannot be a SPAN or RSPAN source, nor can a port be a destination port for
more than one session at a time.
You can enable IEEE 802.1x authentication on a SPAN or RSPAN source port.
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source
port 1 on stack member 1 to destination port 2 on stack member 2:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both
Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
This example shows how to configure RSPAN source session 1 to monitor multiple source interfaces and to
configure the destination RSPAN VLAN 900.
Switch(config)#
Switch(config)#
Switch(config)#
Switch(config)#
monitor session 1 source interface gigabitethernet1/0/1
monitor session 1 source interface port-channel 2 tx
monitor session 1 destination remote vlan 900
end
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
753
monitor session source
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session destination
Configures a FSPAN or FRSPAN destination session.
monitor session filter
Configures a FSPAN or FRSPAN session filter.
show monitor
Displays information about all SPAN and RSPAN sessions.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
754
show ip sla statistics
show ip sla statistics
To display current or aggregated operational status and statistics of all Cisco IOS IP Service Level Agreement
(SLA) operations or a specified operation, use the show ip sla statistics command in user EXEC or privileged
EXEC mode.
show ip sla statistics [ operation-number [details] | aggregated [ operation-number | details] | details]
Syntax Description
operation-number
(Optional) Number of the operation for which operational status and
statistics are displayed. Accepted values are from 1 to 2147483647.
details
(Optional) Specifies detailed output.
aggregated
(Optional) Specifies the IP SLA aggregated statistics.
Command Default
Displays output for all running IP SLA operations.
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE
3.3SE
This command was introduced.
Use the show ip sla statistics to display the current state of IP SLA operations, including how much life the
operation has left, whether the operation is active, and the completion time. The output also includes the
monitoring data returned for the last (most recently completed) operation. This generated operation ID is
displayed when you use the show ip sla configuration command for the base multicast operation, and as part
of the summary statistics for the entire operation.
Enter the show command for a specific operation ID to display details for that one responder.
Examples
The following is sample output from the show ip sla statistics command:
Device# show ip sla statistics
Current Operational State
Entry Number: 3
Modification Time: *22:15:43.000 UTC Sun Feb 11 2001
Diagnostics Text:
Last Time this Entry was Reset: Never
Number of Octets in use by this Entry: 1332
Number of Operations Attempted: 2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
755
show ip sla statistics
Current Seconds Left in Life: 3511
Operational State of Entry: active
Latest Completion Time (milliseconds): 544
Latest Operation Start Time: *22:16:43.000 UTC Sun Feb 11 2001
Latest Oper Sense: ok
Latest Sense Description: 200 OK
Total RTT: 544
DNS RTT: 12
TCP Connection RTT: 28
HTTP Transaction RTT: 504
HTTP Message Size: 9707
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
756
show monitor
show monitor
To display information about all Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) sessions, use
the show monitor command in EXEC mode.
show monitor [session {session_number | all | local | range list | remote} [detail]]
Syntax Description
(Optional) Displays information about specified SPAN
sessions.
session
session_number
all
(Optional) Displays all SPAN sessions.
local
(Optional) Displays only local SPAN sessions.
range list
(Optional) Displays a range of SPAN sessions, where list is
the range of valid sessions. The range is either a single
session or a range of sessions described by two numbers,
the lower one first, separated by a hyphen. Do not enter any
spaces between comma-separated parameters or in
hyphen-specified ranges.
Note
Command Modes
This keyword is available only in privileged EXEC
mode.
remote
(Optional) Displays only remote SPAN sessions.
detail
(Optional) Displays detailed information about the specified
sessions.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS
XE 3.3SE
This command was introduced.
The output is the same for the show monitor command and the show monitor session all command.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
757
show monitor
Examples
This is an example of output for the show monitor user EXEC command:
Device# show monitor
Session 1
--------Type : Local Session
Source Ports :
RX Only : Gi4/0/1
Both : Gi4/0/2-3,Gi4/0/5-6
Destination Ports : Gi4/0/20
Encapsulation : Replicate
Ingress : Disabled
Session 2
--------Type : Remote Source Session
Source VLANs :
TX Only : 10
Both : 1-9
Dest RSPAN VLAN : 105
This is an example of output for the show monitor user EXEC command for local SPAN source session 1:
Device# show monitor session 1
Session 1
--------Type : Local Session
Source Ports :
RX Only : Gi4/0/1
Both : Gi4/0/2-3,Gi4/0/5-6
Destination Ports : Gi4/0/20
Encapsulation : Replicate
Ingress : Disabled
This is an example of output for the show monitor session all user EXEC command when ingress traffic
forwarding is enabled:
Device# show monitor session all
Session 1
--------Type : Local Session
Source Ports :
Both : Gi4/0/2
Destination Ports : Gi4/0/3
Encapsulation : Native
Ingress : Enabled, default VLAN = 5
Ingress encap : DOT1Q
Session 2
--------Type : Local Session
Source Ports :
Both : Gi4/0/8
Destination Ports : Gi4/012
Encapsulation : Replicate
Ingress : Enabled, default VLAN = 4
Ingress encap : Untagged
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session destination
Configures a FSPAN or FRSPAN destination session.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
758
show monitor
Command
Description
monitor session filter
Configures a FSPAN or FRSPAN session filter.
monitor session source
Configures a FSPAN or FRSPAN source session.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
759
show monitor capture
show monitor capture
To display monitor capture (WireShark) content, use the show monitor capture file command in privileged
EXEC mode.
show monitor capture [capture-name [ buffer ] | file file-location : file-name ][ brief | detailed | display-filter
display-filter-string ]
Syntax Description
capture-name
(Optional) Specifies the name of the capture to be displayed.
buffer
(Optional) Specifies that a buffer associated with the named capture
is to be displayed.
file file-location : file-name
(Optional) Specifies the file location and name of the capture storage
file to be displayed.
brief
(Optional) Specifies the display content in brief.
detailed
(Optional) Specifies detailed display content.
display-filter display-filter-string
Filters the display content according to the display-filter-string.
Command Default
Displays all capture content.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
none
Examples
To display the capture for a capture called mycap:
Device# show monitor capture mycap
Status Information for Capture mycap
Target Type:
Interface: CAPWAP,
Ingress:
0
Egress:
0
Status : Active
Filter Details:
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
760
show monitor capture
Capture all packets
Buffer Details:
Buffer Type: LINEAR (default)
File Details:
Associated file name: flash:mycap.pcap
Size of buffer(in MB): 1
Limit Details:
Number of Packets to capture: 0 (no limit)
Packet Capture duration: 0 (no limit)
Packet Size to capture: 0 (no limit)
Packets per second: 0 (no limit)
Packet sampling rate: 0 (no sampling)
Related Commands
Command
Description
monitor capture (interface/control plane) Configures monitor capture (WireShark) specifying an attachment
point and the packet flow direction.
monitor capture buffer
Configures the buffer for monitor capture (WireShark).
monitor capture file
Configures monitor capture (WireShark) storage file attributes.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
761
show platform ip wccp
show platform ip wccp
To display platform-dependent Web Cache Communication Protocol (WCCP) information, use the show
platform ip wccp privileged EXEC command.
show platform ip wccp {cache-engines | interfaces | service-groups} [switch switch-number]
Syntax Description
Command Modes
Command History
Usage Guidelines
cache-engines
Displays WCCP cache engines.
interfaces
Displays WCCP interfaces.
service-groups
Displays WCCP service groups.
switch switch-number
(Optional) Displays WCCP information only for specified
switch-number.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Use this command only when you are working directly with a technical support representative while
troubleshooting a problem. Do not use this command unless a technical support representative asks you to do
so.
This command is available only if your device is running the IP Services feature set.
Examples
The following example displays WCCP interfaces:
Device# show platform ip wccp interfaces
WCCP Interfaces
**** WCCP Interface Gi1/0/3 iif_id:0x104a60000000087 (#SG:1), vrf:0 Ingress
le_handle:0x565dd208 IPv4 Sw-Label:3, Asic-Label:3
* Service group id:0 type: Well-known
token:126 vrf:0 (ref count:1)
Open service
prot: PROT_TCP l4_type: Dest ports
priority: 240
port[0]: 80
Related Commands
Command
Description
ip wccp
enables web cache service
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
762
snmp-server enable traps
snmp-server enable traps
To enable the device to send Simple Network Management Protocol (SNMP) notifications for various traps
or inform requests to the network management system (NMS), use the snmp-server enable traps command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps [auth-framework [sec-violation] | bridge | call-home | cluster | config |
config-copy | config-ctid | copy-config | cpu | dot1x | energywise | entity | envmon | errdisable |
event-manager | flash | fru-ctrl | license | mac-notification | port-security | power-ethernet | rep | snmp
| stackwise | storm-control | stpx | syslog | transceiver | tty | vlan-membership | vlancreate | vlandelete |
vstack | vtp ]
no snmp-server enable traps [auth-framework [sec-violation] | bridge | call-home | cluster | config |
config-copy | config-ctid | copy-config | cpu | dot1x | energywise | entity | envmon | errdisable |
event-manager | flash | fru-ctrl | license | mac-notification | port-security | power-ethernet | rep | snmp
| stackwise | storm-control | stpx | syslog | transceiver | tty | vlan-membership | vlancreate | vlandelete |
vstack | vtp ]
Syntax Description
auth-framework
(Optional) Enables SNMP CISCO-AUTH-FRAMEWORK-MIB
traps.
sec-violation
(Optional) Enables SNMP camSecurityViolationNotif notifications.
bridge
(Optional) Enables SNMP STP Bridge MIB traps.*
call-home
(Optional) Enables SNMP CISCO-CALLHOME-MIB traps.*
cluster
(Optional) Enables SNMP cluster traps.
config
(Optional) Enables SNMP configuration traps.
config-copy
(Optional) Enables SNMP configuration copy traps.
config-ctid
(Optional) Enables SNMP configuration CTID traps.
copy-config
(Optional) Enables SNMP copy-configuration traps.
cpu
(Optional) Enables CPU notification traps.*
dot1x
(Optional) Enables SNMP dot1x traps.*
energywise
(Optional) Enables SNMP energywise traps.*
entity
(Optional) Enables SNMP entity traps.
envmon
(Optional) Enables SNMP environmental monitor traps.*
errdisable
(Optional) Enables SNMP errdisable notification traps.*
event-manager
(Optional) Enables SNMP Embedded Event Manager traps.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
763
snmp-server enable traps
flash
(Optional) Enables SNMP FLASH notification traps.*
fru-ctrl
(Optional) Generates entity field-replaceable unit (FRU) control
traps. In a device stack, this trap refers to the insertion or removal of
a device in the stack.
license
(Optional) Enables license traps.*
mac-notification
(Optional) Enables SNMP MAC Notification traps.*
port-security
(Optional) Enables SNMP port security traps.*
power-ethernet
(Optional) Enables SNMP power Ethernet traps.*
rep
(Optional) Enables SNMP Resilient Ethernet Protocol traps.
snmp
(Optional) Enables SNMP traps.*
stackwise
(Optional) Enables SNMP stackwise traps.*
storm-control
(Optional) Enables SNMP storm-control trap parameters.*
stpx
(Optional) Enables SNMP STPX MIB traps.*
syslog
(Optional) Enables SNMP syslog traps.
transceiver
(Optional) Enables SNMP transceiver traps.*
tty
(Optional) Sends TCP connection traps. This is enabled by default.
vlan-membership
(Optional) Enables SNMP VLAN membership traps.
vlancreate
(Optional) Enables SNMP VLAN-created traps.
vlandelete
(Optional) Enables SNMP VLAN-deleted traps.
vstack
(Optional) Enables SNMP Smart Install traps.*
vtp
(Optional) Enables VLAN Trunking Protocol (VTP) traps.
Command Default
The sending of SNMP traps is disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
764
snmp-server enable traps
Usage Guidelines
The command options marked with an asterisk in the table above have subcommands. For more information
on these subcommands, see the Related Commands section below.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
When supported, use the snmp-server enable traps command to enable sending of traps or informs.
Note
Though visible in the command-line help strings, the fru-ctrl, insertion, and removal keywords are not
supported on the device. The snmp-server enable informs global configuration command is not supported.
To enable the sending of SNMP inform notifications, use the snmp-server enable traps global
configuration command combined with the snmp-server host host-addr informs global configuration
command.
Note
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable more than one type of SNMP trap:
Device(config)# snmp-server enable traps cluster
Device(config)# snmp-server enable traps config
Device(config)# snmp-server enable traps vtp
Related Commands
Command
Description
snmp-server enable traps bridge
Generates STP bridge MIB traps.
snmp-server enable traps bulkstat
Enables data-collection-MIB notifications.
snmp-server enable traps call-home
Enables SNMP CISCO-CALLHOME-MIB traps.
snmp-server enable traps cef
Enables SNMP CEF traps.
snmp-server enable traps cpu
Enables CPU notifications.
snmp-server enable traps envmon
Enables SNMP environmental traps.
snmp-server enable traps errdisable
Enables SNMP errdisable notifications.
snmp-server enable traps flash
Enables SNMP flash notifications.
snmp-server enable traps isis
Enables IS-IS traps.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
765
snmp-server enable traps
Command
Description
snmp-server enable traps license
Enables license traps.
snmp-server enable traps mac-notification
Enables SNMP MAC notification traps.
snmp-server enable traps ospf
Enables SNMP Open Shortest Path First (OSPF) traps.
snmp-server enable traps pim
Enables SNMP PIM traps.
snmp-server enable traps port-security
Enables SNMP port security traps.
snmp-server enable traps power-ethernet
Enables SNMP PoE traps.
snmp-server enable traps snmp
Enables SNMP traps.
snmp-server enable traps stackwise
Enables SNMP StackWise traps.
snmp-server enable traps storm-control
Enables SNMP storm-control trap parameters.
snmp-server enable traps stpx
Enables SNMP STPX MIB traps.
snmp-server enable traps transceiver
Enable SNMP transceiver traps.
snmp-server enable traps vrfmib
Allows SNMP vrfmib traps.
snmp-server enable traps vstack
Enables SNMP smart install traps.
snmp-server host
Specifies the recipient (host) of a SNMP notification
operation.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
766
snmp-server enable traps bridge
snmp-server enable traps bridge
To generate STP bridge MIB traps, use the snmp-server enable traps bridge command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps bridge [newroot] [topologychange]
no snmp-server enable traps bridge [newroot] [topologychange]
Syntax Description
newroot
(Optional) Enables SNMP STP bridge MIB new root traps.
topologychange
(Optional) Enables SNMP STP bridge MIB topology change traps.
Command Default
The sending of bridge SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to send bridge new root traps to the NMS:
Device(config)# snmp-server enable traps bridge newroot
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
767
snmp-server enable traps bulkstat
snmp-server enable traps bulkstat
To enable data-collection-MIB traps, use the snmp-server enable traps bulkstat command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps bulkstat [collection | transfer]
no snmp-server enable traps bulkstat [collection | transfer]
Syntax Description
collection
(Optional) Enables data-collection-MIB collection traps.
transfer
(Optional) Enables data-collection-MIB transfer traps.
Command Default
The sending of data-collection-MIB traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate data-collection-MIB collection traps:
Device(config)# snmp-server enable traps bulkstat collection
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
768
snmp-server enable traps call-home
snmp-server enable traps call-home
To enable SNMP CISCO-CALLHOME-MIB traps, use the snmp-server enable traps call-home command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps call-home [message-send-fail | server-fail]
no snmp-server enable traps call-home [message-send-fail | server-fail]
Syntax Description
message-send-fail
(Optional) Enables SNMP message-send-fail traps.
server-fail
(Optional) Enables SNMP server-fail traps.
Command Default
The sending of SNMP CISCO-CALLHOME-MIB traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP message-send-fail traps:
Device(config)# snmp-server enable traps call-home message-send-fail
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
769
snmp-server enable traps cef
snmp-server enable traps cef
To enable SNMP Cisco Express Forwarding (CEF) traps, use the snmp-server enable traps cef command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps cef [inconsistency | peer-fib-state-change | peer-state-change | resource-failure]
no snmp-server enable traps cef [inconsistency | peer-fib-state-change | peer-state-change |
resource-failure]
Syntax Description
inconsistency
(Optional) Enables SNMP CEF Inconsistency traps.
peer-fib-state-change
(Optional) Enables SNMP CEF Peer FIB State change traps.
peer-state-change
(Optional) Enables SNMP CEF Peer state change traps.
resource-failure
(Optional) Enables SNMP CEF Resource Failure traps.
Command Default
The sending of SNMP CEF traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP CEF inconsistency traps:
Device(config)# snmp-server enable traps cef inconsistency
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
770
snmp-server enable traps cpu
snmp-server enable traps cpu
To enable CPU notifications, use the snmp-server enable traps cpu command in global configuration mode.
Use the no form of this command to return to the default setting.
snmp-server enable traps cpu [threshold]
no snmp-server enable traps cpu [threshold]
Syntax Description
threshold
(Optional) Enables CPU threshold notification.
Command Default
The sending of CPU notifications is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate CPU threshold notifications:
Device(config)# snmp-server enable traps cpu threshold
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
771
snmp-server enable traps envmon
snmp-server enable traps envmon
To enable SNMP environmental traps, use the snmp-server enable traps envmon command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps envmon [fan][shutdown][status] [supply][temperature]
no snmp-server enable traps envmon [fan][shutdown][status] [supply][temperature]
Syntax Description
fan
(Optional) Enables fan traps.
shutdown
(Optional) Enables environmental monitor shutdown traps.
status
(Optional) Enables SNMP environmental status-change traps.
supply
(Optional) Enables environmental monitor power-supply traps.
temperature
(Optional) Enables environmental monitor temperature traps.
Command Default
The sending of environmental SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate fan traps:
Device(config)# snmp-server enable traps envmon fan
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
772
snmp-server enable traps errdisable
snmp-server enable traps errdisable
To enable SNMP notifications of error-disabling, use the snmp-server enable traps errdisable command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps errdisable [notification-rate number-of-notifications]
no snmp-server enable traps errdisable [notification-rate number-of-notifications]
Syntax Description
(Optional) Specifies number of notifications per minute as the
notification rate. Accepted values are from 0 to 10000.
notification-rate
number-of-notifications
Command Default
The sending of SNMP notifications of error-disabling is disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE This command was introduced.
Usage Guidelines
Note
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to set the number SNMP notifications of error-disabling to 2:
Device(config)# snmp-server enable traps errdisable notification-rate 2
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
773
snmp-server enable traps flash
snmp-server enable traps flash
To enable SNMP flash notifications, use the snmp-server enable traps flash command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps flash [insertion][removal]
no snmp-server enable traps flash [insertion][removal]
Syntax Description
insertion
(Optional) Enables SNMP flash insertion notifications.
removal
(Optional) Enables SNMP flash removal notifications.
Command Default
The sending of SNMP flash notifications is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP flash insertion notifications:
Device(config)# snmp-server enable traps flash insertion
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
774
snmp-server enable traps isis
snmp-server enable traps isis
To enable intermediate system-to-intermediate system (IS-IS) link-state routing protocol traps, use the
snmp-server enable traps isis command in global configuration mode. Use the no form of this command to
return to the default setting.
snmp-server enable traps isis [errors | state-change]
no snmp-server enable traps isis [errors | state-change]
Syntax Description
errors
(Optional) Enables IS-IS error traps.
state-change
(Optional) Enables IS-IS state change traps.
Command Default
The sending of IS-IS traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate IS-IS error traps:
Device(config)# snmp-server enable traps isis errors
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
775
snmp-server enable traps license
snmp-server enable traps license
To enable license traps, use the snmp-server enable traps license command in global configuration mode.
Use the no form of this command to return to the default setting.
snmp-server enable traps license [deploy][error][usage]
no snmp-server enable traps license [deploy][error][usage]
Syntax Description
deploy
(Optional) Enables license deployment traps.
error
(Optional) Enables license error traps.
usage
(Optional) Enables license usage traps.
Command Default
The sending of license traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate license deployment traps:
Device(config)# snmp-server enable traps license deploy
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
776
snmp-server enable traps mac-notification
snmp-server enable traps mac-notification
To enable SNMP MAC notification traps, use the snmp-server enable traps mac-notification command in
global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps mac-notification [change][move][threshold]
no snmp-server enable traps mac-notification [change][move][threshold]
Syntax Description
change
(Optional) Enables SNMP MAC change traps.
move
(Optional) Enables SNMP MAC move traps.
threshold
(Optional) Enables SNMP MAC threshold traps.
Command Default
The sending of SNMP MAC notification traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP MAC notification change traps:
Device(config)# snmp-server enable traps mac-notification change
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
777
snmp-server enable traps ospf
snmp-server enable traps ospf
To enable SNMP Open Shortest Path First (OSPF) traps, use the snmp-server enable traps ospf command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps ospf [cisco-specific | errors | lsa | rate-limit rate-limit-time max-number-of-traps
| retransmit | state-change]
no snmp-server enable traps ospf [cisco-specific | errors | lsa | rate-limit rate-limit-time max-number-of-traps
| retransmit | state-change]
Syntax Description
cisco-specific
(Optional) Enables Cisco-specific traps.
errors
(Optional) Enables error traps.
lsa
(Optional) Enables link-state advertisement (LSA) traps.
rate-limit
(Optional) Enables rate-limit traps.
rate-limit-time
(Optional) Specifies window of time in seconds for rate-limit traps.
Accepted values are 2 to 60.
max-number-of-traps
(Optional) Specifies maximum number of rate-limit traps to be sent in
window time.
retransmit
(Optional) Enables packet-retransmit traps.
state-change
(Optional) Enables state-change traps.
Command Default
The sending of OSPF SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
778
snmp-server enable traps ospf
Note
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable LSA traps:
Device(config)# snmp-server enable traps ospf lsa
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
779
snmp-server enable traps pim
snmp-server enable traps pim
To enable SNMP Protocol-Independent Multicast (PIM) traps, use the snmp-server enable traps pim
command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps pim [invalid-pim-message][neighbor-change][rp-mapping-change]
no snmp-server enable traps pim [invalid-pim-message][neighbor-change][rp-mapping-change]
Syntax Description
invalid-pim-message
(Optional) Enables invalid PIM message traps.
neighbor-change
(Optional) Enables PIM neighbor-change traps.
rp-mapping-change
(Optional) Enables rendezvous point (RP)-mapping change traps.
Command Default
The sending of PIM SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable invalid PIM message traps:
Device(config)# snmp-server enable traps pim invalid-pim-message
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
780
snmp-server enable traps port-security
snmp-server enable traps port-security
To enable SNMP port security traps, use the snmp-server enable traps port-security command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps port-security [trap-rate value]
no snmp-server enable traps port-security [trap-rate value]
Syntax Description
trap-rate value
(Optional) Sets the maximum number of port-security traps sent per second. The
range is from 0 to 1000; the default is 0 (no limit imposed; a trap is sent at every
occurrence).
Command Default
The sending of port security SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable port-security traps at a rate of 200 per second:
Device(config)# snmp-server enable traps port-security trap-rate 200
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
781
snmp-server enable traps power-ethernet
snmp-server enable traps power-ethernet
To enable SNMP power-over-Ethernet (PoE) traps, use the snmp-server enable traps power-ethernet
command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps power-ethernet {group number | police}
no snmp-server enable traps power-ethernet {group number | police}
Syntax Description
group number
Enables inline power group-based traps for the specified group number.
Accepted values are from 1 to 9.
police
Enables inline power policing traps.
Command Default
The sending of power-over-Ethernet SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable power-over-Ethernet traps for group 1:
Device(config)# snmp-server enable traps poower-over-ethernet group 1
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
782
snmp-server enable traps snmp
snmp-server enable traps snmp
To enable SNMP traps, use the snmp-server enable traps snmp command in global configuration mode.
Use the no form of this command to return to the default setting.
snmp-server enable traps snmp [authentication ][coldstart ][linkdown ] [linkup ][warmstart]
no snmp-server enable traps snmp [authentication ][coldstart ][linkdown ] [linkup ][warmstart]
Syntax Description
authentication
(Optional) Enables authentication traps.
coldstart
(Optional) Enables cold start traps.
linkdown
(Optional) Enables linkdown traps.
linkup
(Optional) Enables linkup traps.
warmstart
(Optional) Enables warmstart traps.
Command Default
The sending of SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable a warmstart SNMP trap:
Device(config)# snmp-server enable traps snmp warmstart
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
783
snmp-server enable traps stackwise
snmp-server enable traps stackwise
To enable SNMP StackWise traps, use the snmp-server enable traps stackwise command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps stackwise [GLS][ILS][SRLS] [insufficient-power][invalid-input-current]
[invalid-output-current][member-removed][member-upgrade-notification] [new-master][new-member]
[port-change][power-budget-warning][power-invalid-topology]
[power-link-status-changed][power-oper-status-changed]
[power-priority-conflict][power-version-mismatch][ring-redundant]
[stack-mismatch][unbalanced-power-supplies][under-budget][under-voltage]
no snmp-server enable traps stackwise [GLS][ILS][SRLS] [insufficient-power][invalid-input-current]
[invalid-output-current][member-removed][member-upgrade-notification] [new-master][new-member]
[port-change][power-budget-warning][power-invalid-topology]
[power-link-status-changed][power-oper-status-changed]
[power-priority-conflict][power-version-mismatch][ring-redundant]
[stack-mismatch][unbalanced-power-supplies][under-budget][under-voltage]
Syntax Description
GLS
(Optional) Enables StackWise stack power GLS trap.
ILS
(Optional) Enables StackWise stack power ILS trap.
SRLS
(Optional) Enables StackWise stack power SRLS trap.
insufficient-power
(Optional) Enables StackWise stack power unbalanced power supplies
trap.
invalid-input-current
(Optional) Enables StackWise stack power invalid input current trap.
invalid-output-current
(Optional) Enables StackWise stack power invalid output current
trap.
member-removed
(Optional) Enables StackWise stack member removed trap.
member-upgrade-notification
(Optional) Enables StackWise member to be reloaded for upgrade
trap.
new-master
(Optional) Enables StackWise new master trap.
new-member
(Optional) Enables StackWise stack new member trap.
port-change
(Optional) Enables StackWise stack port change trap.
power-budget-warning
(Optional) Enables StackWise stack power budget warning trap.
power-invalid-topology
(Optional) Enables StackWise stack power invalid topology trap.
power-link-status-changed
(Optional) Enables StackWise stack power link status changed trap.
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
784
snmp-server enable traps stackwise
power-oper-status-changed
(Optional) Enables StackWise stack power port oper status changed
trap.
power-priority-conflict
(Optional) Enables StackWise stack power priority conflict trap.
power-version-mismatch
(Optional) Enables StackWise stack power version mismatch
discovered trap.
ring-redundant
(Optional) Enables StackWise stack ring redundant trap.
stack-mismatch
(Optional) Enables StackWise stack mismatch trap.
unbalanced-power-supplies
(Optional) Enables StackWise stack power unbalanced power supplies
trap.
under-budget
(Optional) Enables StackWise stack power under budget trap.
under-voltage
(Optional) Enables StackWise stack power under voltage trap.
Command Default
The sending of SNMP StackWise traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate StackWise stack power GLS traps:
Device(config)# snmp-server enable traps stackwise GLS
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
785
snmp-server enable traps storm-control
snmp-server enable traps storm-control
To enable SNMP storm-control trap parameters, use the snmp-server enable traps storm-control command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps storm-control {trap-rate number-of-minutes}
no snmp-server enable traps storm-control {trap-rate}
Syntax Description
trap-rate number-of-minutes
(Optional) Specifies the SNMP storm-control trap rate in minutes.
Accepted values are from 0 to 1000.
Command Default
The sending of SNMP storm-control trap parameters is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to set the SNMP storm-control trap rate to 10 traps per minute:
Device(config)# snmp-server enable traps storm-control trap-rate 10
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
786
snmp-server enable traps stpx
snmp-server enable traps stpx
To enable SNMP STPX MIB traps, use the snmp-server enable traps stpx command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps stpx [inconsistency][loop-inconsistency][root-inconsistency]
no snmp-server enable traps stpx [inconsistency][loop-inconsistency][root-inconsistency]
Syntax Description
inconsistency
(Optional) Enables SNMP STPX MIB inconsistency update traps.
loop-inconsistency
(Optional) Enables SNMP STPX MIB loop inconsistency update traps.
root-inconsistency
(Optional) Enables SNMP STPX MIB root inconsistency update traps.
Command Default
The sending of SNMP STPX MIB traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP STPX MIB inconsistency update traps:
Device(config)# snmp-server enable traps stpx inconsistency
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
787
snmp-server enable traps transceiver
snmp-server enable traps transceiver
To enable SNMP transceiver traps, use the snmp-server enable traps transceiver command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps transceiver {all}
no snmp-server enable traps transceiver {all}
Syntax Description
all
(Optional) Enables all SNMP transceiver traps.
Command Default
The sending of SNMP transceiver traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to set all SNMP transceiver traps:
Device(config)# snmp-server enable traps transceiver all
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
788
snmp-server enable traps vrfmib
snmp-server enable traps vrfmib
To allow SNMP vrfmib traps, use the snmp-server enable traps vrfmib command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps vrfmib [vnet-trunk-down | vnet-trunk-up | vrf-down | vrf-up]
no snmp-server enable traps vrfmib [vnet-trunk-down | vnet-trunk-up | vrf-down | vrf-up]
Syntax Description
vnet-trunk-down
(Optional) Enables vrfmib trunk down traps.
vnet-trunk-up
(Optional) Enables vrfmib trunk up traps.
vrf-down
(Optional) Enables vrfmib vrf down traps.
vrf-up
(Optional) Enables vrfmib vrf up traps.
Command Default
The sending of SNMP vrfmib traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate vrfmib trunk down traps:
Device(config)# snmp-server enable traps vrfmib vnet-trunk-down
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
789
snmp-server enable traps vstack
snmp-server enable traps vstack
To enable SNMP smart install traps, use the snmp-server enable traps vstack command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps vstack [addition][failure][lost][operation]
no snmp-server enable traps vstack [addition][failure][lost][operation]
Syntax Description
addition
(Optional) Enables client added traps.
failure
(Optional) Enables file upload and download failure traps.
lost
(Optional) Enables client lost trap.
operation
(Optional) Enables operation mode change traps.
Command Default
The sending of SNMP smart install traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.2SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP Smart Install client-added traps:
Device(config)# snmp-server enable traps vstack addition
Command Reference, Cisco IOS XE Denali 16.2.1 (Catalyst 3650 Switches)
790
snmp-server engineID
snmp-server engineID
To configure a name for either the local or remote copy of SNMP, use the snmp-server engineID command
in global configuration mode.
snmp-server engineID {local engineid-string | remote ip-address [udp-port port-number] engineid-string}
Syntax Description
local engineid-string
Specifies a 24-character ID string with the name of the copy of SNMP. You
need not specify the entire 24-character engine ID if it has trailing zeros.
Specify only the portion of the engine ID up to the point where only zeros
remain in the value.
remote ip-address
Specifies the remote SNMP copy. Specify the ip-address of the device that
contains the remote copy of SNMP.
udp-port port-number
(Optional) Specifies the User Datagram Protocol (UDP) port on the remote
device. The default i