Consolidated Platform Command Reference, Cisco IOS XE 3.3SE

Consolidated Platform Command Reference, Cisco IOS XE 3.3SE
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE
(Catalyst 3650 Switches)
First Published: September 06, 2013
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2013
Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface
Preface xxxi
Document Conventions xxxi
Related Documentation xxxiii
Obtaining Documentation and Submitting a Service Request xxxiii
CHAPTER 1
Using the Command-Line Interface 1
Using the Command-Line Interface 1
Understanding Command Modes 1
Understanding the Help System 3
Understanding Abbreviated Commands 4
Understanding no and default Forms of Commands 4
Understanding CLI Error Messages 4
Using Configuration Logging 5
Using Command History 5
Changing the Command History Buffer Size 5
Recalling Commands 5
Disabling the Command History Feature 6
Using Editing Features 6
Enabling and Disabling Editing Features 6
Editing Commands through Keystrokes 7
Editing Command Lines that Wrap 9
Searching and Filtering Output of show and more Commands 9
Accessing the CLI 10
Accessing the CLI through a Console Connection or through Telnet 10
PART I
CleanAir 11
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
iii
Contents
CHAPTER 2
CleanAir Commands 13
ap dot11 5ghz cleanair 15
ap dot11 5ghz cleanair alarm air-quality 16
ap dot11 5ghz cleanair alarm device 17
default ap dot11 5ghz cleanair device 19
ap dot11 5ghz rrm channel cleanair-event 21
ap dot11 5ghz rrm channel device 22
ap dot11 24ghz cleanair 23
ap dot11 24ghz cleanair alarm air-quality 24
ap dot11 24ghz cleanair alarm device 25
default ap dot11 24ghz cleanair device 27
ap dot11 24ghz rrm channel cleanair-event 29
ap dot11 24ghz rrm channel device 30
ap name mode se-connect 31
default ap dot11 5ghz cleanair device 32
default ap dot11 5ghz rrm channel cleanair-event 34
default ap dot11 5ghz rrm channel device 35
default ap dot11 24ghz cleanair alarm device 36
default ap dot11 24ghz cleanair device 38
default ap dot11 24ghz rrm channel cleanair-event 40
show ap dot11 5ghz cleanair air-quality summary 41
show ap dot11 5ghz cleanair air-quality worst 42
show ap dot11 5ghz cleanair config 43
show ap dot11 5ghz cleanair device type 45
show ap dot11 24ghz cleanair air-quality summary 47
show ap dot11 24ghz cleanair air-quality worst 48
show ap dot11 24ghz cleanair config 49
show ap dot11 24ghz cleanair summary 51
Flexible NetFlow 53
PART II
CHAPTER 3
Flexible NetFlow Commands 55
cache 58
clear flow exporter 60
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
iv
Contents
clear flow monitor 61
collect 63
collect counter 65
collect interface 66
collect timestamp absolute 67
collect transport tcp flags 68
collect wireless ap mac address (wireless) 69
collect wireless client mac address (wireless) 70
datalink flow monitor 71
datalink flow monitor (wireless) 72
debug flow exporter 73
debug flow monitor 74
debug flow record 75
debug sampler 76
description 77
destination 78
dscp 80
export-protocol netflow-v9 81
exporter 82
flow exporter 83
flow monitor 84
flow record 85
ip flow monitor 86
ipv6 flow monitor 88
ip flow monitor (wireless) 90
ipv6 flow monitor (wireless) 91
match application name (wireless) 92
match datalink dot1q priority 93
match datalink dot1q vlan 94
match datalink ethertype 95
match datalink mac 96
match datalink vlan 98
match flow cts 99
match flow direction 100
match interface 101
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
v
Contents
match ipv4 102
match ipv4 destination address 103
match ipv4 source address 104
match ipv4 ttl 105
match ipv6 106
match ipv6 destination address 107
match ipv6 hop-limit 108
match ipv6 source address 109
match transport 110
match transport icmp ipv4 111
match transport icmp ipv6 112
match wireless ssid (wireless) 113
mode random 1 out-of 114
option 115
record 117
sampler 118
show flow exporter 119
show flow interface 122
show flow monitor 124
show flow record 129
show flow record wireless avc basic (wireless) 130
show sampler 131
source 133
template data timeout 135
transport 136
ttl 137
PART III
Interface and Hardware Components 139
CHAPTER 4
Interface and Hardware Commands 141
client vlan 144
debug fastethernet 145
debug ilpower 146
debug interface 148
debug lldp packets 150
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
vi
Contents
debug nmsp 151
debug platform fallback-bridging 152
debug platform poe 154
debug platform port-security 155
duplex 156
errdisable detect cause 158
errdisable detect cause small-frame 160
errdisable recovery cause 161
errdisable recovery cause small-frame 164
errdisable recovery interval 165
interface 166
interface range 168
ip mtu 169
ipv6 mtu 171
l2protocol-tunnel point-to-point 173
l2protocol-tunnel drop-threshold point-to-point 175
l2protocol-tunnel shutdown-threshold point-to-point 177
lldp (interface configuration) 179
logging event power-inline-status 181
mdix auto 182
mode (power-stack configuration) 183
network-policy 185
network-policy profile (global configuration) 186
network-policy profile (network-policy configuration) 187
nmsp attachment suppress 189
power-priority 190
power inline 192
power inline consumption 195
power inline police 198
power supply 200
psp 202
show CAPWAP summary 203
show controllers cpu-interface 204
show controllers ethernet phy macsec 206
show controllers ethernet-controller 208
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
vii
Contents
show controllers power inline 217
show controllers tcam 218
show controllers utilization 220
show env 222
show errdisable detect 225
show errdisable recovery 226
show interfaces 227
show interfaces counters 231
show interfaces switchport 233
show interfaces transceiver 237
show mgmt-infra trace messages ilpower 239
show mgmt-infra trace messages ilpower-ha 241
show mgmt-infra trace messages platform-mgr-poe 242
show network-policy profile 243
show platform CAPWAP summary 244
show power inline 245
show system mtu 251
show wireless interface summary 252
small-frame violation rate 253
speed 254
stack-power 256
switchport backup interface 258
switchport block 260
system mtu 261
voice-signaling vlan (network-policy configuration) 262
voice vlan (network-policy configuration) 264
wireless ap-manager interface 266
wireless exclusionlist 267
wireless linktest 268
wireless management interface 269
wireless peer-blocking forward-upstream 270
PART IV
IP Multicast 271
CHAPTER 5
IP Multicast Commands 273
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
viii
Contents
cache-memory-max 275
clear ip mfib counters 276
clear ip mroute 277
ip igmp filter 279
ip igmp max-groups 280
ip igmp profile 282
ip igmp snooping 284
ip igmp snooping last-member-query-count 285
ip igmp snooping querier 287
ip igmp snooping report-suppression 289
ip igmp snooping vlan mrouter 290
ip igmp snooping vlan static 291
ip multicast auto-enable 293
ip multicast vlan 294
ip pim accept-register 295
ip pim bsr-candidate 296
ip pim rp-candidate 298
ip pim send-rp-announce 300
ip pim spt-threshold 302
match message-type 303
match service-type 304
match service-instance 305
mrinfo 306
redistribute mdns-sd 308
service-list mdns-sd 309
service-policy-query 311
service-routing mdns-sd 312
service-policy 313
show ip igmp filter 314
show ip igmp profile 315
show ip igmp snooping 316
show ip igmp snooping groups 318
show ip igmp snooping igmpv2-tracking 320
show ip igmp snooping mrouter 321
show ip igmp snooping querier 322
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
ix
Contents
show ip igmp snooping wireless mcast-spi-count 324
show ip igmp snooping wireless mgid 325
show ip pim autorp 326
show ip pim bsr-router 327
show ip pim bsr 328
show ip pim tunnel 329
show mdns cache 331
show mdns requests 333
show mdns statistics 334
show platform ip multicast 335
wireless mdns-bridging 342
wireless multicast 343
Layer 2/3 345
PART V
CHAPTER 6
Layer 2/3 Commands 347
channel-group 349
channel-protocol 352
clear lacp 353
clear pagp 354
clear spanning-tree counters 355
clear spanning-tree detected-protocols 356
debug etherchannel 357
debug lacp 359
debug pagp 360
debug platform pm 362
debug platform udld 364
debug spanning-tree 365
interface port-channel 367
lacp max-bundle 369
lacp port-priority 370
lacp system-priority 372
pagp learn-method 373
pagp port-priority 375
port-channel load-balance 376
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
x
Contents
port-channel load-balance extended 378
port-channel min-links 380
show etherchannel 381
show lacp 384
show pagp 388
show platform etherchannel 390
show platform pm 391
show udld 392
switchport 396
switchport access vlan 398
switchport mode 401
switchport nonegotiate 403
udld 405
udld port 407
udld reset 409
PART VI
Lightweight Access Point 411
CHAPTER 7
Cisco Lightweight Access Point Commands 413
ap auth-list ap-policy 420
ap bridging 421
ap capwap multicast 422
ap capwap retransmit 423
ap capwap timers 424
ap cdp 426
ap core-dump 428
ap country 429
ap crash-file 430
ap dot11 24ghz preamble 431
ap dot11 24ghz dot11g 432
ap dot11 5ghz channelswitch mode 433
ap dot11 5ghz power-constraint 434
ap dot11 beaconperiod 435
ap dot11 beamforming 436
ap dot11 cac media-stream 438
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xi
Contents
ap dot11 cac multimedia 441
ap dot11 cac video 443
ap dot11 cac voice 445
ap dot11 cleanair 448
ap dot11 cleanair alarm air-quality 449
ap dot11 cleanair alarm device 450
ap dot11 cleanair device 452
ap dot11 dot11n 454
ap dot11 dtpc 457
ap dot11 edca-parameters 459
ap dot11 rrm group-mode 461
ap dot11 rrm channel cleanair-event 462
ap dot11 l2roam rf-params 463
ap dot11 media-stream 465
ap dot11 rrm ccx location-measurement 467
ap dot11 rrm channel dca 468
ap dot11 rrm group-member 470
ap dot11 rrm logging 471
ap dot11 rrm monitor 473
ap dot11 rrm ndp-type 475
ap dot11 5ghz dot11ac frame-burst 476
ap dot1x max-sessions 477
ap dot1x username 478
ap ethernet duplex 479
ap group 480
ap image 481
ap ipv6 tcp adjust-mss 482
ap led 483
ap link-encryption 484
ap link-latency 485
ap mgmtuser username 486
ap name ap-groupname 488
ap name antenna band mode 489
ap name bhrate 490
ap name bridgegroupname 491
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xii
Contents
ap name bridging 492
ap name cdp interface 493
ap name console-redirect 494
ap name capwap retransmit 495
ap name command 496
ap name core-dump 497
ap name country 498
ap name crash-file 499
ap name dot11 24ghz rrm coverage 500
ap name dot11 49ghz rrm profile 502
ap name dot11 5ghz rrm channel 504
ap name dot11 antenna 505
ap name dot11 antenna extantgain 507
ap name dot11 cleanair 508
ap name dot11 dot11n antenna 509
ap name dot11 dual-band cleanair 510
ap name dot11 dual-band shutdown 511
ap name dot11 rrm ccx 512
ap name dot11 rrm profile 513
ap name dot11 txpower 515
ap name dot1x-user 516
ap name ethernet 518
ap name ethernet duplex 519
ap name key-zeroize 520
ap name image 521
ap name ipv6 tcp adjust-mss 522
ap name jumbo mtu 523
ap name lan 524
ap name led 525
ap name link-encryption 526
ap name link-latency 527
ap name location 528
ap name mgmtuser 529
ap name mode 531
ap name monitor-mode 533
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xiii
Contents
ap name monitor-mode dot11b 534
ap name name 535
ap name no dot11 shutdown 536
ap name power 537
ap name shutdown 538
ap name slot shutdown 539
ap name sniff 540
ap name ssh 541
ap name telnet 542
ap name power injector 543
ap name power pre-standard 544
ap name reset-button 545
ap name reset 546
ap name slot 547
ap name static-ip 549
ap name stats-timer 551
ap name syslog host 552
ap name syslog level 553
ap name tcp-adjust-mss 554
ap name tftp-downgrade 555
ap power injector 556
ap power pre-standard 557
ap reporting-period 558
ap reset-button 559
service-policy type control subscriber 560
ap static-ip 561
ap syslog 562
ap name no controller 564
ap tcp-adjust-mss size 565
ap tftp-downgrade 566
config wireless wps rogue client mse 567
clear ap name tsm dot11 all 568
clear ap config 569
clear ap eventlog-all 570
clear ap join statistics 571
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xiv
Contents
clear ap mac-address 572
clear ap name wlan statistics 573
debug ap mac-address 574
show ap cac voice 575
show ap capwap 577
show ap cdp 579
show ap config dot11 580
show ap config dot11 dual-band summary 581
show ap config fnf 582
show ap config 583
show ap crash-file 584
show ap data-plane 585
show ap dot11 l2roam 586
show ap dot11 cleanair air-quality 587
show ap dot11 cleanair config 588
show ap dot11 cleanair summary 590
show ap dot11 591
show ap env summary 596
show ap ethernet statistics 597
show ap gps-location summary 598
show ap groups 599
show ap groups extended 600
show ap image 601
show ap is-supported 602
show ap join stats summary 603
show ap link-encryption 604
show ap mac-address 605
show ap monitor-mode summary 607
show ap name auto-rf 608
show ap name bhmode 611
show ap name bhrate 612
show ap name cac voice 613
show ap name config fnf 614
show ap name dot11 call-control 615
show ap name cable-modem 616
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xv
Contents
show ap name capwap retransmit 617
show ap name ccx rm 618
show ap name cdp 619
show ap name channel 620
show ap name config 621
show ap name config dot11 623
show ap name config slot 627
show ap name core-dump 631
show ap name data-plane 632
show ap name dot11 633
show ap name dot11 cleanair 636
show ap name env 637
show ap name ethernet statistics 638
show ap name eventlog 639
show ap gps-location summary 640
show ap name image 641
show ap name inventory 642
show ap name lan port 643
show ap name link-encryption 644
show ap name service-policy 645
show ap name tcp-adjust-mss 646
show ap name wlan 647
show ap name wlandot11 service policy 649
show ap slots 650
show ap summary 651
show ap tcp-adjust-mss 652
show ap universal summary 653
show ap uptime 654
show wireless ap summary 655
show wireless client ap 656
test ap name 657
test capwap ap name 658
trapflags ap 659
wireless wps rogue ap rldp alarm-only 660
wireless wps rogue ap rldp auto-contain 661
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xvi
Contents
PART VII
CHAPTER 8
Mobility 663
Mobility Commands 665
mobility anchor 666
wireless mobility 668
wireless mobility controller peer-group 669
wireless mobility group keepalive 670
wireless mobility group member ip 671
wireless mobility group name 672
wireless mobility load-balance 673
show wireless mobility 674
clear wireless mobility statistics 675
PART VIII
CHAPTER 9
Network Management 677
Network Management Commands 679
monitor capture (interface/control plane) 681
monitor capture buffer 685
monitor capture clear 686
monitor capture export 687
monitor capture file 688
monitor capture limit 690
monitor capture match 691
monitor capture start 692
monitor capture stop 693
monitor session 694
monitor session destination 696
monitor session filter 700
monitor session source 702
show monitor 705
show monitor capture 708
snmp-server enable traps 710
snmp-server enable traps bridge 714
snmp-server enable traps call-home 715
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xvii
Contents
snmp-server enable traps cpu 716
snmp-server enable traps envmon 717
snmp-server enable traps errdisable 718
snmp-server enable traps flash 719
snmp-server enable traps license 720
snmp-server enable traps mac-notification 721
snmp-server enable traps port-security 722
snmp-server enable traps power-ethernet 723
snmp-server enable traps snmp 724
snmp-server enable traps stackwise 725
snmp-server enable traps storm-control 727
snmp-server enable traps stpx 728
snmp-server enable traps transceiver 729
snmp-server enable traps vstack 730
snmp-server engineID 731
snmp-server host 732
switchport mode access 737
switchport voice vlan 738
Radio Resource Management 739
PART IX
CHAPTER 10
Radio Resource Management Commands 741
airtime-fairness dot11 mode (apgroup) 744
airtime-fairness dot11 optimization (apgroup) 745
airtime-fairness dot11 policy 746
airtime-fairness policy (wlan) 747
ap dot11 rf-profile 748
ap dot11 rrm 749
ap dot11 rrm ccx 752
ap dot11 rrm channel 753
ap dot11 24ghz rrm channel cleanair-event rogue-contribution 755
ap dot11 24ghz or 5ghz rrm channel dca add 756
ap dot11 24ghz or 5ghz rrm channel dca remove 757
ap dot11 5ghz rrm channel dca chan-width-11n 758
ap dot11 rrm coverage 759
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xviii
Contents
ap dot11 rrm group-member 761
ap dot11 rrm monitor 762
ap dot11 rrm profile 764
ap dot11 rrm tpc-threshold 765
ap dot11 rrm txpower 766
ap dot11 airtime-fairness mode 767
ap dot11 airtime-fairness policy-name 768
policy-weight 769
ap group 770
ap name dot11 airtime-fairness mode 771
ap name dot11 airtime-fairness optimization 772
ap name no dot11 airtime-fairness wlan-name policy-name 773
ap name dot11 airtime-fairness wlan-name policy 774
band-select client 775
band-select cycle 776
band-select expire 777
band-select probe-response 778
channel 779
channel foreign 780
channel width 781
coverage 782
coverage exception 783
coverage level 784
clear wireless airtime-fairness statistics 785
dot11n-only 786
load-balancing 787
high-density clients count 788
high-density clients wlan 789
high-density multicast data-rate 790
high-density rx-sop threshold 791
rate 792
rate mcs 794
trap threshold 795
tx-power 796
tx-power v1 threshold 797
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xix
Contents
no ap dot11 airtime-fairness policy-name 798
remote-lan 799
rf-profile dot11 24ghz 800
rf-profile dot11 5ghz 801
show ap airtime-fairness ap-group 802
show ap airtime-fairness (ap) 803
show ap airtime-fairness (per radio) 804
show ap airtime-fairness policy (all) 805
show ap airtime-fairness wlan 806
show ap dot11 24ghz 807
show ap dot11 5ghz 809
show ap dot11 airtime-fairness (radio bands) 811
show ap dot11 24ghz rf-profile summary 812
show ap dot11 5ghz rf-profile summary 813
show ap name dot11 airtime-fairness summary 814
show ap name dot11 airtime-fairness policy statistics 815
show ap name dot11 airtime-fairness wlan name statistics 816
show ap rf-profile summary 817
show ap rf-profile name 818
show wireless mobility controller ap 820
shutdown 821
wlan 822
Security 823
PART X
CHAPTER 11
Security Commands 825
aaa accounting dot1x 828
aaa accounting identity 830
aaa authentication dot1x 832
aaa authorization network 833
aaa new-model 834
authentication host-mode 836
authentication mac-move permit 838
authentication priority 839
authentication violation 842
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xx
Contents
auto security 844
auto security-port 846
cisp enable 848
clear errdisable interface vlan 850
clear mac address-table 852
deny (MAC access-list configuration) 854
device-role (IPv6 snooping) 858
device-role (IPv6 nd inspection) 859
device-tracking policy 860
dot1x critical (global configuration) 862
dot1x pae 863
dot1x supplicant force-multicast 864
dot1x test eapol-capable 866
dot1x test timeout 867
dot1x timeout 868
epm access-control open 871
ip admission 872
ip admission name 873
ip device tracking maximum 876
ip device tracking probe 877
ip dhcp snooping database 878
ip dhcp snooping information option format remote-id 880
ip dhcp snooping verify no-relay-agent-address 881
ip source binding 882
ip verify source 883
ipv6 snooping policy 884
limit address-count 886
mab request format attribute 32 887
match (access-map configuration) 889
no authentication logging verbose 891
no dot1x logging verbose 892
no mab logging verbose 893
permit (MAC access-list configuration) 894
protocol (IPv6 snooping) 898
radius server 899
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxi
Contents
security level (IPv6 snooping) 901
show aaa clients 902
show aaa command handler 903
show aaa local 904
show aaa servers 906
show aaa sessions 907
show authentication sessions 908
show auto security 911
show cisp 913
show dot1x 915
show eap pac peer 917
show ip dhcp snooping statistics 918
show radius server-group 921
show storm-control 923
show vlan access-map 925
show vlan group 926
storm-control 927
switchport port-security aging 930
switchport port-security mac-address 932
switchport port-security maximum 935
switchport port-security violation 937
tracking (IPv6 snooping) 939
trusted-port 941
wireless dot11-padding 942
wireless security dot1x 943
wireless security lsc 945
wireless security strong-password 947
wireless wps ap-authentication 948
wireless wps auto-immune 949
wireless wps cids-sensor 950
wireless wps client-exclusion 951
wireless wps mfp infrastructure 953
wireless wps rogue 954
wireless wps shun-list re-sync 955
vlan access-map 956
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxii
Contents
vlan filter 958
vlan group 960
PART XI
CHAPTER 12
Stack Manager and High Availability 963
Stack Manager and High Availability Commands 965
debug platform stack-manager 966
main-cpu 967
mode sso 968
policy config-sync prc reload 969
redundancy 970
redundancy config-sync mismatched-commands 971
redundancy force-switchover 973
redundancy reload 974
reload 975
session 977
show platform stack-manager 978
show redundancy 979
show redundancy config-sync 983
show switch 985
stack-mac persistent timer 989
stack-mac update force 990
standby console enable 991
switch stack port 992
switch priority 994
switch provision 995
switch renumber 997
PART XII
System Management 999
CHAPTER 13
System Management Commands 1001
arp 1005
boot 1006
cat 1008
clear location 1009
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxiii
Contents
clear location statistics 1010
clear nmsp statistics 1011
clear wireless ccx statistics 1012
clear wireless client tsm dot11 1013
clear wireless location s69 statistics 1014
copy 1015
copy startup-config tftp: 1016
copy tftp: startup-config 1017
debug call-admission wireless all 1018
debug rfid 1019
debug voice diagnostics mac-address 1020
debug wps mfp 1021
delete 1022
dir 1023
emergency-install 1025
exit 1027
flash_init 1028
help 1029
license right-to-use 1030
location 1032
location algorithm 1036
location expiry 1037
location notify-threshold 1038
location plm calibrating 1039
location rfid 1040
location rssi-half-life 1041
mac address-table move update 1042
mgmt_init 1044
mkdir 1045
more 1046
nmsp notification interval 1047
no debug all 1049
readrtc 1050
rename 1051
reset 1052
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxiv
Contents
rmdir 1053
sdm prefer 1054
set 1055
show ap name config general 1058
show avc client 1060
show avc wlan 1061
show cable-diagnostics tdr 1063
show debug 1066
show env 1067
show flow monitor 1070
show license right-to-use 1075
show location 1077
show location ap-detect 1078
show mac address-table move update 1080
show nmsp 1081
show sdm prefer 1083
show tech-support wireless 1085
show wireless ap summary (MA) 1087
show wireless ap summary 1088
show wireless band-select 1089
show wireless client calls 1090
show wireless client dot11 1091
show wireless client location-calibration 1092
show wireless client probing 1093
show wireless client summary 1094
show wireless client timers 1095
show wireless client voice diagnostics 1096
show wireless country 1097
show wireless detail 1100
show wireless dtls connections 1101
show wireless flow-control 1102
show wireless flow-control statistics 1103
show wireless load-balancing 1104
show wireless mobility summary 1105
show wireless performance 1106
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxv
Contents
show wireless pmk-cache 1107
show wireless probe 1108
show wireless sip preferred-call-no 1109
show wireless summary 1110
show wireless wlan summary 1111
show wlan name 1112
shutdown 1115
system env temperature threshold yellow 1116
test cable-diagnostics tdr 1118
traceroute mac 1119
traceroute mac ip 1122
trapflags 1125
trapflags client 1126
type 1127
unset 1128
version 1130
wireless client 1131
wireless client mac-address deauthenticate 1133
wireless client mac-address 1134
wireless load-balancing 1139
wireless sip preferred-call-no 1140
writertc 1141
PART XIII
CHAPTER 14
QoS 1143
QoS Commands 1145
auto qos 1146
class 1147
class-map 1150
match (class-map configuration) 1152
match non-client-nrt 1155
match wlan user-priority 1156
policy-map 1157
priority 1160
queue-buffers ratio 1162
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxvi
Contents
queue-limit 1164
service-policy (Wired) 1166
service-policy (WLAN) 1168
set 1170
show ap name service-policy 1177
show ap name dot11 1178
show class-map 1181
show wireless client calls 1182
show wireless client dot11 1183
show wireless client mac-address (Call Control) 1184
show wireless client mac-address (TCLAS) 1185
show wireless client voice diagnostics 1186
show policy-map 1187
show wlan 1192
trust device 1195
CHAPTER 15
Auto QoS Command Reference 1197
auto qos classify 1198
auto qos trust 1204
auto qos video 1211
auto qos voip 1221
show auto qos 1233
PART XIV
VideoStream 1235
CHAPTER 16
VideoStream Commands 1237
ap dot11 media-stream multicast-direct 1238
show ap dot11 1240
show wireless media-stream group 1242
wireless media-stream multicast-direct 1243
wireless media-stream 1244
PART XV
CHAPTER 17
VLAN 1247
VLAN Commands 1249
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxvii
Contents
client vlan 1250
clear vtp counters 1251
debug platform vlan 1252
debug sw-vlan 1253
debug sw-vlan ifs 1255
debug sw-vlan notification 1256
debug sw-vlan vtp 1258
interface vlan 1260
show platform vlan 1262
show vlan 1263
show vtp 1267
show wireless vlan group 1274
switchport priority extend 1275
switchport trunk 1276
vlan 1279
vlan dot1q tag native 1285
vtp (global configuration) 1286
vtp (interface configuration) 1291
vtp primary 1292
wireless broadcast vlan 1294
PART XVI
WLAN 1295
CHAPTER 18
WLAN Commands 1297
aaa-override 1299
accounting-list 1300
ap name ap-name lan port-id port-id poe 1301
ap name ap-name lan override 1302
band-select 1303
broadcast-ssid 1304
call-snoop 1305
channel-scan defer-priority 1307
channel-scan defer-time 1308
chd 1309
client association limit 1310
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxviii
Contents
client vlan 1312
ccx aironet-iesupport 1313
datalink flow monitor 1314
device-classification 1316
default 1317
dtim dot11 1320
exclusionlist 1321
exit 1322
exit (WLAN AP Group) 1323
ip access-group 1324
ip flow monitor 1325
ip verify source mac-check 1326
load-balance 1327
mobility anchor 1328
nac 1330
passive-client 1331
peer-blocking 1332
port 1333
poe 1334
radio 1335
radio-policy 1337
remote-lan 1339
remote-lan 1340
roamed-voice-client re-anchor 1341
security web-auth 1342
service-policy (WLAN) 1343
session-timeout 1345
show remote-lan all 1346
show remote-lan id 1347
show remote-lan name 1348
show remote-lan summary 1349
show running-config remote-lan 1350
show wlan 1351
show wireless wlan summary 1354
shutdown 1355
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxix
Contents
sip-cac 1356
static-ip tunneling 1357
vlan 1358
universal-admin 1359
wgb non-cisco 1360
wlan (AP Group Configuration) 1361
wlan 1362
wlan shutdown 1363
wmm 1364
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxx
Preface
• Document Conventions, page xxxi
• Related Documentation, page xxxiii
• Obtaining Documentation and Submitting a Service Request, page xxxiii
Document Conventions
This document uses the following conventions:
Convention
Description
^ or Ctrl
Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For
example, the key combination ^D or Ctrl-D means that you hold down the Control
key while you press the D key. (Keys are indicated in capital letters but are not
case sensitive.)
bold font
Commands and keywords and user-entered text appear in bold font.
Italic font
Document titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
Courier
font
Bold Courier
Terminal sessions and information the system displays appear in courier font.
font
Bold Courier
font indicates text that the user must enter.
[x]
Elements in square brackets are optional.
...
An ellipsis (three consecutive nonbolded periods without spaces) after a syntax
element indicates that the element can be repeated.
|
A vertical line, called a pipe, indicates a choice within a set of keywords or
arguments.
[x | y]
Optional alternative keywords are grouped in brackets and separated by vertical
bars.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxxi
Preface
Document Conventions
Convention
Description
{x | y}
Required alternative keywords are grouped in braces and separated by vertical
bars.
[x {y | z}]
Nested set of square brackets or braces indicate optional or required choices
within optional or required elements. Braces and a vertical bar within square
brackets indicate a required choice within an optional element.
string
A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
<>
Nonprinting characters such as passwords are in angle brackets.
[]
Default responses to system prompts are in square brackets.
!, #
An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Reader Alert Conventions
This document may use the following conventions for reader alerts:
Note
Tip
Caution
Timesaver
Warning
Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Means the following information will help you solve a problem.
Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Means the described action saves time. You can save time by performing the action described in the
paragraph.
IMPORTANT SAFETY INSTRUCTIONS
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with
standard practices for preventing accidents. Use the statement number provided at the end of each warning
to locate its translation in the translated safety warnings that accompanied this device. Statement 1071
SAVE THESE INSTRUCTIONS
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxxii
Preface
Related Documentation
Related Documentation
Note
Before installing or upgrading the switch, refer to the switch release notes.
• Cisco Catalyst 3650 Switch documentation, located at:
http://www.cisco.com/go/cat3650_docs
• Cisco SFP, SFP+, and QSFP+ modules documentation, including compatibility matrixes, located at:
http://www.cisco.com/en/US/products/hw/modules/ps5455/tsd_products_support_series_home.html
• Error Message Decoder, located at:
https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information,
see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco
technical documentation, at:
http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxxiii
Preface
Obtaining Documentation and Submitting a Service Request
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
xxxiv
Using the Command-Line Interface
This chapter contains the following topics:
• Using the Command-Line Interface, page 1
Using the Command-Line Interface
This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your switch.
Understanding Command Modes
The Cisco IOS user interface is divided into many different modes. The commands available to you depend
on which mode you are currently in. Enter a question mark (?) at the system prompt to obtain a list of commands
available for each command mode.
When you start a session on the switch, you begin in user mode, often called user EXEC mode. Only a limited
subset of the commands are available in user EXEC mode. For example, most of the user EXEC commands
are one-time commands, such as show commands, which show the current configuration status, and clear
commands, which clear counters or interfaces. The user EXEC commands are not saved when the switch
reboots.
To have access to all commands, you must enter privileged EXEC mode. Normally, you must enter a password
to enter privileged EXEC mode. From this mode, you can enter any privileged EXEC command or enter
global configuration mode.
Using the configuration modes (global, interface, and line), you can make changes to the running configuration.
If you save the configuration, these commands are stored and used when the switch reboots. To access the
various configuration modes, you must start at global configuration mode. From global configuration mode,
you can enter interface configuration mode and line configuration mode.
This table describes the main command modes, how to access each one, the prompt you see in that mode, and
how to exit the mode. The examples in the table use the hostname Switch.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
1
Using the Command-Line Interface
Understanding Command Modes
Table 1: Command Mode Summary
Mode
Access Method
Prompt
Exit Method
About This Mode
User EXEC
Begin a session with
your switch.
Switch>
Enter logout or
quit.
Use this mode to
• Change
terminal
settings.
• Perform basic
tests.
• Display
system
information.
Privileged EXEC
While in user EXEC
mode, enter the
enable command.
Global
configuration
While in privileged
EXEC mode, enter
the configure
command.
VLAN
configuration
While in global
configuration mode,
enter the vlan
vlan-id command.
Interface
configuration
While in global
configuration mode,
enter the interface
command (with a
specific interface).
Switch#
Switch(config)#
Switch(config-vlan)#
Switch(config-if)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
2
Enter disable to
exit.
Use this mode to
verify commands
that you have
entered. Use a
password to protect
access to this mode.
To exit to privileged
EXEC mode, enter
exit or end, or press
Ctrl-Z.
Use this mode to
configure
parameters that
apply to the entire
switch.
To exit to global
configuration mode,
enter the exit
command.
Use this mode to
configure VLAN
parameters. When
VTP mode is
transparent, you can
To return to
create
privileged EXEC
extended-range
mode, press Ctrl-Z
VLANs (VLAN IDs
or enter end.
greater than 1005)
and save
configurations in the
switch startup
configuration file.
To exit to global
Use this mode to
configuration mode, configure
enter exit.
parameters for the
Ethernet ports.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
Using the Command-Line Interface
Understanding the Help System
Mode
Access Method
Line configuration
While in global
configuration mode,
specify a line with
the line vty or line
console command.
Prompt
Exit Method
Switch(config-line)#
About This Mode
To exit to global
Use this mode to
configuration mode, configure
enter exit.
parameters for the
terminal line.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
For more detailed information on the command modes, see the command reference guide for this release.
Understanding the Help System
You can enter a question mark (?) at the system prompt to display a list of commands available for each
command mode. You can also obtain a list of associated keywords and arguments for any command.
Table 2: Help Summary
Command
Purpose
help
Obtains a brief description of the help system in any
command mode.
abbreviated-command-entry ?
Obtains a list of commands that begin with a
particular character string.
Switch# di?
dir disable disconnect
abbreviated-command-entry <Tab>
Completes a partial command name.
Switch# sh conf<tab>
Switch# show configuration
Lists all commands available for a particular
command mode.
?
Switch> ?
command ?
Lists the associated keywords for a command.
Switch> show ?
command keyword ?
Lists the associated arguments for a keyword.
Switch(config)# cdp holdtime ?
<10-255> Length of time (in sec) that
receiver must keep this packet
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
3
Using the Command-Line Interface
Understanding Abbreviated Commands
Understanding Abbreviated Commands
You need to enter only enough characters for the switch to recognize the command as unique.
This example shows how to enter the show configuration privileged EXEC command in an abbreviated form:
Switch# show conf
Understanding no and default Forms of Commands
Almost every configuration command also has a no form. In general, use the no form to disable a feature or
function or reverse the action of a command. For example, the no shutdown interface configuration command
reverses the shutdown of an interface. Use the command without the keyword no to re-enable a disabled
feature or to enable a feature that is disabled by default.
Configuration commands can also have a default form. The default form of a command returns the command
setting to its default. Most commands are disabled by default, so the default form is the same as the no form.
However, some commands are enabled by default and have variables set to certain default values. In these
cases, the default command enables the command and sets variables to their default values.
Understanding CLI Error Messages
This table lists some error messages that you might encounter while using the CLI to configure your switch.
Table 3: Common CLI Error Messages
Error Message
Meaning
How to Get Help
% Ambiguous command: "show
con"
You did not enter enough
characters for your switch to
recognize the command.
Re-enter the command followed by
a question mark (?) with a space
between the command and the
question mark.
The possible keywords that you can
enter with the command appear.
% Incomplete command.
You did not enter all the keywords Re-enter the command followed by
or values required by this
a question mark (?) with a space
command.
between the command and the
question mark.
The possible keywords that you can
enter with the command appear.
% Invalid input detected at
‘^’ marker.
You entered the command
Enter a question mark (?) to display
incorrectly. The caret (^) marks the all the commands that are available
point of the error.
in this command mode.
The possible keywords that you can
enter with the command appear.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
4
Using the Command-Line Interface
Using Configuration Logging
Using Configuration Logging
You can log and view changes to the switch configuration. You can use the Configuration Change Logging
and Notification feature to track changes on a per-session and per-user basis. The logger tracks each
configuration command that is applied, the user who entered the command, the time that the command was
entered, and the parser return code for the command. This feature includes a mechanism for asynchronous
notification to registered applications whenever the configuration changes. You can choose to have the
notifications sent to the syslog.
Note
Only CLI or HTTP changes are logged.
Using Command History
The software provides a history or record of commands that you have entered. The command history feature
is particularly useful for recalling long or complex commands or entries, including access lists. You can
customize this feature to suit your needs.
Changing the Command History Buffer Size
By default, the switch records ten command lines in its history buffer. You can alter this number for a current
terminal session or for all sessions on a particular line. These procedures are optional.
Beginning in privileged EXEC mode, enter this command to change the number of command lines that the
switch records during the current terminal session:
Switch# terminal history
[size
number-of-lines]
The range is from 0 to 256.
Beginning in line configuration mode, enter this command to configure the number of command lines the
switch records for all sessions on a particular line:
Switch(config-line)# history
[size
number-of-lines]
The range is from 0 to 256.
Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in this table. These actions are
optional.
Note
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
5
Using the Command-Line Interface
Using Editing Features
Table 4: Recalling Commands
Action
Result
Press Ctrl-P or the up arrow key.
Recalls commands in the history buffer, beginning
with the most recent command. Repeat the key
sequence to recall successively older commands.
Press Ctrl-N or the down arrow key.
Returns to more recent commands in the history
buffer after recalling commands with Ctrl-P or the
up arrow key. Repeat the key sequence to recall
successively more recent commands.
show history
While in privileged EXEC mode, lists the last several
commands that you just entered. The number of
commands that appear is controlled by the setting of
the terminal history global configuration command
and the history line configuration command.
Switch(config)# help
Disabling the Command History Feature
The command history feature is automatically enabled. You can disable it for the current terminal session or
for the command line. These procedures are optional.
To disable the feature during the current terminal session, enter the terminal no history privileged EXEC
command.
To disable command history for the line, enter the no history line configuration command.
Using Editing Features
This section describes the editing features that can help you manipulate the command line.
Enabling and Disabling Editing Features
Although enhanced editing mode is automatically enabled, you can disable it, re-enable it, or configure a
specific line to have enhanced editing. These procedures are optional.
To globally disable enhanced editing mode, enter this command in line configuration mode:
Switch (config-line)# no editing
To re-enable the enhanced editing mode for the current terminal session, enter this command in privileged
EXEC mode:
Switch# terminal editing
To reconfigure a specific line to have enhanced editing mode, enter this command in line configuration mode:
Switch(config-line)# editing
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
6
Using the Command-Line Interface
Using Editing Features
Editing Commands through Keystrokes
This table shows the keystrokes that you need to edit command lines. These keystrokes are optional.
Note
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Table 5: Editing Commands through Keystrokes
Capability
Keystroke
Move around the command line to Press Ctrl-B, or press the left
make changes or corrections.
arrow key.
Purpose
Moves the cursor back one
character.
Press Ctrl-F, or press the right
arrow key.
Moves the cursor forward one
character.
Press Ctrl-A.
Moves the cursor to the beginning
of the command line.
Press Ctrl-E.
Moves the cursor to the end of the
command line.
Press Esc B.
Moves the cursor back one word.
Press Esc F.
Moves the cursor forward one
word.
Press Ctrl-T.
Transposes the character to the left
of the cursor with the character
located at the cursor.
Recall commands from the buffer Press Ctrl-Y.
and paste them in the command
line. The switch provides a buffer
with the last ten items that you
deleted.
Recalls the most recent entry in the
buffer.
Press Esc Y.
Recalls the next buffer entry.
The buffer contains only the last
10 items that you have deleted or
cut. If you press Esc Y more than
ten times, you cycle to the first
buffer entry.
Delete entries if you make a
mistake or change your mind.
Press the Delete or Backspace key. Erases the character to the left of
the cursor.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
7
Using the Command-Line Interface
Using Editing Features
Capability
Capitalize or lowercase words or
capitalize a set of letters.
Keystroke
Purpose
Press Ctrl-D.
Deletes the character at the cursor.
Press Ctrl-K.
Deletes all characters from the
cursor to the end of the command
line.
Press Ctrl-U or Ctrl-X.
Deletes all characters from the
cursor to the beginning of the
command line.
Press Ctrl-W.
Deletes the word to the left of the
cursor.
Press Esc D.
Deletes from the cursor to the end
of the word.
Press Esc C.
Capitalizes at the cursor.
Press Esc L.
Changes the word at the cursor to
lowercase.
Press Esc U.
Capitalizes letters from the cursor
to the end of the word.
Designate a particular keystroke as Press Ctrl-V or Esc Q.
an executable command, perhaps
as a shortcut.
Scroll down a line or screen on
displays that are longer than the
terminal screen can display.
Note
Press the Return key.
Scrolls down one line.
Press the Space bar.
Scrolls down one screen.
The More prompt is used
for any output that has
more lines than can be
displayed on the terminal
screen, including show
command output. You can
use the Return and Space
bar keystrokes whenever
you see the More prompt.
Redisplay the current command
Press Ctrl-L or Ctrl-R.
line if the switch suddenly sends a
message to your screen.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
8
Redisplays the current command
line.
Using the Command-Line Interface
Searching and Filtering Output of show and more Commands
Editing Command Lines that Wrap
You can use a wraparound feature for commands that extend beyond a single line on the screen. When the
cursor reaches the right margin, the command line shifts ten spaces to the left. You cannot see the first ten
characters of the line, but you can scroll back and check the syntax at the beginning of the command. The
keystroke actions are optional.
To scroll back to the beginning of the command entry, press Ctrl-B or the left arrow key repeatedly. You can
also press Ctrl-A to immediately move to the beginning of the line.
Note
The arrow keys function only on ANSI-compatible terminals such as VT100s.
In this example, the access-list global configuration command entry extends beyond one line. When the cursor
first reaches the end of the line, the line is shifted ten spaces to the left and redisplayed. The dollar sign ($)
shows that the line has been scrolled to the left. Each time the cursor reaches the end of the line, the line is
again shifted ten spaces to the left.
Switch(config)#
Switch(config)#
Switch(config)#
Switch(config)#
access-list 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1
$ 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1.20 255.25
$t tcp 131.108.2.5 255.255.255.0 131.108.1.20 255.255.255.0 eq
$108.2.5 255.255.255.0 131.108.1.20 255.255.255.0 eq 45
After you complete the entry, press Ctrl-A to check the complete syntax before pressing the Return key to
execute the command. The dollar sign ($) appears at the end of the line to show that the line has been scrolled
to the right:
Switch(config)# access-list 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1$
The software assumes that you have a terminal screen that is 80 columns wide. If you have a width other than
that, use the terminal width privileged EXEC command to set the width of your terminal.
Use line wrapping with the command history feature to recall and modify previous complex command entries.
Searching and Filtering Output of show and more Commands
You can search and filter the output for show and more commands. This is useful when you need to sort
through large amounts of output or if you want to exclude output that you do not need to see. Using these
commands is optional.
To use this functionality, enter a show or more command followed by the pipe character (|), one of the
keywords begin, include, or exclude, and an expression that you want to search for or filter out:
command | {begin | include | exclude} regular-expression
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output are
not displayed, but the lines that contain Output appear.
This example shows how to include in the output display only lines where the expression protocol appears:
Switch# show interfaces | include protocol
Vlan1 is up, line protocol is up
Vlan10 is up, line protocol is down
GigabitEthernet1/0/1 is up, line protocol is down
GigabitEthernet1/0/2 is up, line protocol is up
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
9
Using the Command-Line Interface
Accessing the CLI
Accessing the CLI
You can access the CLI through a console connection, through Telnet, or by using the browser.
You manage the switch stack and the stack member interfaces through the active switch. You cannot manage
stack members on an individual switch basis. You can connect to the active switch through the console port
or the Ethernet management port of one or more stack members. Be careful with using multiple CLI sessions
to the active switch. Commands you enter in one session are not displayed in the other sessions. Therefore,
it is possible to lose track of the session from which you entered commands.
Note
We recommend using one CLI session when managing the switch stack.
If you want to configure a specific stack member port, you must include the stack member number in the CLI
command interface notation.
To debug a specific stack member, you can access it from the active switch by using the session
stack-member-number privileged EXEC command. The stack member number is appended to the system
prompt. For example, Switch-2# is the prompt in privileged EXEC mode for stack member 2, and where the
system prompt for the active switch is Switch. Only the show and debug commands are available in a CLI
session to a specific stack member.
Accessing the CLI through a Console Connection or through Telnet
Before you can access the CLI, you must connect a terminal or a PC to the switch console or connect a PC to
the Ethernet management port and then power on the switch, as described in the hardware installation guide
that shipped with your switch.
CLI access is available before switch setup. After your switch is configured, you can access the CLI through
a remote Telnet session or SSH client.
You can use one of these methods to establish a connection with the switch:
• Connect the switch console port to a management station or dial-up modem, or connect the Ethernet
management port to a PC. For information about connecting to the console or Ethernet management
port, see the switch hardware installation guide.
• Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management station.
The switch must have network connectivity with the Telnet or SSH client, and the switch must have an
enable secret password configured.
The switch supports up to 16 simultaneous Telnet sessions. Changes made by one Telnet user are reflected
in all other Telnet sessions.
The switch supports up to five simultaneous secure SSH sessions.
After you connect through the console port, through the Ethernet management port, through a Telnet session
or through an SSH session, the user EXEC prompt appears on the management station.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
10
PART
I
CleanAir
• CleanAir Commands, page 13
CleanAir Commands
• ap dot11 5ghz cleanair , page 15
• ap dot11 5ghz cleanair alarm air-quality, page 16
• ap dot11 5ghz cleanair alarm device, page 17
• default ap dot11 5ghz cleanair device, page 19
• ap dot11 5ghz rrm channel cleanair-event, page 21
• ap dot11 5ghz rrm channel device, page 22
• ap dot11 24ghz cleanair, page 23
• ap dot11 24ghz cleanair alarm air-quality, page 24
• ap dot11 24ghz cleanair alarm device, page 25
• default ap dot11 24ghz cleanair device, page 27
• ap dot11 24ghz rrm channel cleanair-event, page 29
• ap dot11 24ghz rrm channel device, page 30
• ap name mode se-connect, page 31
• default ap dot11 5ghz cleanair device, page 32
• default ap dot11 5ghz rrm channel cleanair-event, page 34
• default ap dot11 5ghz rrm channel device, page 35
• default ap dot11 24ghz cleanair alarm device, page 36
• default ap dot11 24ghz cleanair device, page 38
• default ap dot11 24ghz rrm channel cleanair-event, page 40
• show ap dot11 5ghz cleanair air-quality summary, page 41
• show ap dot11 5ghz cleanair air-quality worst, page 42
• show ap dot11 5ghz cleanair config, page 43
• show ap dot11 5ghz cleanair device type, page 45
• show ap dot11 24ghz cleanair air-quality summary, page 47
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
13
• show ap dot11 24ghz cleanair air-quality worst, page 48
• show ap dot11 24ghz cleanair config, page 49
• show ap dot11 24ghz cleanair summary, page 51
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
14
ap dot11 5ghz cleanair
ap dot11 5ghz cleanair
To enable CleanAir for detecting 5-GHz devices, use the ap dot11 5ghz cleanair command in global
configuration mode.
ap dot11 5ghz cleanair
Command Default
Disabled.
Command Modes
Global configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable this CleanAir command before you configure other CleanAir commands.
Examples
This example shows how to enable CleanAir for 5-GHz devices:
Switch(config)# ap dot11 5ghz cleanair
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
15
ap dot11 5ghz cleanair alarm air-quality
ap dot11 5ghz cleanair alarm air-quality
To configure the alarm when the Air Quality (AQ) reaches the threshold value for the 5-GHz devices, use the
ap dot11 5ghz cleanair alarm air-quality command. To disable the alarm when the AQ reaches the threshold
value for the 5-GHz devices, use the no form of this command.
ap dot11 5ghz cleanair alarm air-quality threshold threshold _value
Syntax Description
threshold threshold _value
Command Default
The default threshold value for AQ is 10.
Command Modes
Global configuration (config).
Command History
Configures the threshold value for air quality. The range is from
1 to 100.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 5ghz cleanaircommand before you configure this command.
Examples
This example shows how to set the threshold value for the AQ:
Switch(config)# ap dot11 5ghz cleanair alarm air-quality threshold 30
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
16
ap dot11 5ghz cleanair alarm device
ap dot11 5ghz cleanair alarm device
To configure the alarm for the 5-GHz interference devices, use the ap dot11 5ghz cleanair alarm device
command.
ap dot11 5ghz cleanair alarm device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | superag
| tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
radar
Configures the alarm for radars.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled and for all other interference devices is disabled.
Command Modes
Global configuration (config).
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
17
ap dot11 5ghz cleanair alarm device
Examples
This example shows how to enable the alarm to notify interferences from a radar device:
Switch(config)# ap dot11 5ghz cleanair alarm device radar
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
18
default ap dot11 5ghz cleanair device
default ap dot11 5ghz cleanair device
To configure the default state of the alarm for 5-GHz interference devices, use the default ap dot11 5ghz
cleanair device command in global configuration mode.
default ap dot11 5ghz cleanair device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report
| superag | tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
radar
Configures the alarm for radars.
report
Enables interference device reports.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other interference devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
19
default ap dot11 5ghz cleanair device
Usage Guidelines
You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Switch(config)# default ap dot11 5ghz cleanair device video
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
20
ap dot11 5ghz rrm channel cleanair-event
ap dot11 5ghz rrm channel cleanair-event
To enable Event-Driven RRM (EDRRM) and configure the sensitivity for 5-GHz devices, use the ap dot11
5ghz rrm channel cleanair-event command in global configuration mode. To disable EDRRM, use the no
form of the command.
ap dot11 5ghz rrm channel cleanair-event [sensitivity {high| low| medium}]
no ap dot11 5ghz rrm channel cleanair-event [sensitivity {high| low| medium}]
Syntax Description
sensitivity
(Optional) Configures the EDRRM sensitivity of the CleanAir event.
high
(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as
indicated by the air quality (AQ) value.
low
(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
medium
(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
Command Default
EDRRM is disabled and the EDRRM sensitivity is low.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable EDRRM using the ap dot11 5ghz rrm channel cleanair-event command before you
configure the sensitivity.
Examples
This example shows how to enable EDRRM and set the EDRRM sensitivity to high:
Switch(config)# ap dot11 5ghz rrm channel cleanair-event
Switch(config)# ap dot11 5ghz rrm channel cleanair-event sensitivity high
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
21
ap dot11 5ghz rrm channel device
ap dot11 5ghz rrm channel device
To configure persistent non-Wi-Fi device avoidance in the 802.11a channel, use the ap dot11 5ghz rrm
channel device command in global configuration mode. To disable persistent device avoidance, use the no
form of this command.
ap dot11 5ghz rrm channel device
no ap dot11 5ghz rrm channel device
Syntax Description
This command has no arguments or keywords.
Command Default
The CleanAir persistent device state is disabled.
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
CleanAir-capable monitor mode access points collect information about persistent devices on all configured
channels and stores the information in the switch. Local and bridge mode access points detect interference
devices on the serving channels only.
Examples
This example shows how to enable persistent device avoidance on 802.11a devices:
Switch(config)# ap dot11 5ghz rrm channel device
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
22
ap dot11 24ghz cleanair
ap dot11 24ghz cleanair
To enable CleanAir for detecting 2.4-GHz devices, use the ap dot11 24ghz cleanair command in global
configuration mode. To disable CleanAir for detecting 2.4-GHz devices, use the no form of this command.
ap dot11 24ghz cleanair
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable this CleanAir command before you configure other CleanAir commands.
Examples
This example shows how to enable CleanAir for 2.4-GHz devices:
Switch(config)# ap dot11 24ghz cleanair
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
23
ap dot11 24ghz cleanair alarm air-quality
ap dot11 24ghz cleanair alarm air-quality
To configure the alarm for the threshold value of Air Quality (AQ) for all 2.4-GHz devices, use the ap dot11
24ghz cleanair alarm air-quality command in global configuration mode. To disable the alarm for the
threshold value of AQ for all 2.4-GHz devices, use the no form of this command.
ap dot11 24ghz cleanair alarm air-quality threshold threshold_value
Syntax Description
threshold threshold_value
Command Default
The default threshold value for AQ is 10.
Command Modes
Global configuration (config)
Command History
Configures the threshold value for AQ. The range is from 1 to
100.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.
Examples
This example shows how to set the threshold value for the AQ:
Switch(config)# ap dot11 24ghz cleanair alarm air-quality threshold 50
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
24
ap dot11 24ghz cleanair alarm device
ap dot11 24ghz cleanair alarm device
To configure the alarm for the 2.4-GHz interference devices, use the ap dot11 24ghz cleanair alarm device
command in global configuration mode. To disable the alarm for the 2.4-GHz interference devices, use the
no form of this command.
ap dot11 24ghz cleanairalarm {device | bt-discovery | bt-link canopy| cont-tx | dect-like | fh | inv | jammer
| mw-oven | nonstd | superag | tdd-tx video | wimax-fixed | wimax-mobile | xbox | zigbee}
Syntax Description
Command Default
bt-discovery
Configures the alarm for Bluetooth interference devices.
bt-link
Configures the alarm for any Bluetooth link.
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11 frequency hopping (FH) devices.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
mw-oven
Configures the alarm for microwave ovens.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
xbox
Configures the alarm for Xbox interference devices.
zigbee
Configures the alarm for 802.15.4 interference devices.
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
25
ap dot11 24ghz cleanair alarm device
Command Modes
Command History
Global configuration (config).
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.
Examples
This example shows how to enable the alarm to notify interferences from a Zigbee device:
Switch(config)# ap dot11 24ghz cleanair alarm device zigbee
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
26
default ap dot11 24ghz cleanair device
default ap dot11 24ghz cleanair device
To configure the default state of report generation for 2.4-GHz interference devices, use the default ap dot11
24ghz cleanair device command in global configuration mode.
default ap dot11 24ghz cleanair device {ble-beacon| bt-discovery | bt-link | canopy | cont-tx | dect-like
| fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile |
xbox | zigbee}
Syntax Description
ble-beacon
Configure the BLE beacon feature.
bt-discovery
Configures the alarm for Bluetooth
interference devices.
bt-link
Configures the alarm for any
Bluetooth link.
canopy
Configures the alarm for canopy
interference devices.
cont-tx
Configures the alarm for
continuous transmitters.
dect-like
Configures the alarm for Digital
Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11
frequency hopping devices.
inv
Configures the alarm for devices
using spectrally inverted Wi-Fi
signals.
jammer
Configures the alarm for jammer
interference devices.
mw-oven
Configures the alarm for
microwave ovens.
nonstd
Configures the alarm for devices
using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11
SuperAG interference devices.
tdd-tx
Configures the alarm for Time
Division Duplex (TDD)
transmitters.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
27
default ap dot11 24ghz cleanair device
video
Configures the alarm for video
cameras.
wimax-fixed
Configures the alarm for WiMax
fixed interference devices.
wimax-mobile
Configures the alarm for WiMax
mobile interference devices.
xbox
Configures the alarm for Xbox
interference devices.
zigbee
Configures the alarm for 802.15.4
interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
This command was modified. The
ble-beacon keyword was added.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanaircommand before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Switch(config)# default ap dot11 24ghz cleanair device video
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
28
ap dot11 24ghz rrm channel cleanair-event
ap dot11 24ghz rrm channel cleanair-event
To enable Event-Driven RRM (EDRRM) and the sensitivity for 2.4-GHz devices, use the ap dot11 24ghz
rrm channel cleanair-event command in global configuration mode. To disable EDRRM, use the no form
of this command.
ap dot11 24ghz rrm channel cleanair-event sensitivity {high | low | medium}
no ap dot11 24ghz rrm channel cleanair-event [sensitivity{high | low | medium}]
Syntax Description
sensitivity
(Optional) Configures the EDRRM sensitivity of the CleanAir event.
high
(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as
indicated by the air quality (AQ) value.
low
(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
medium
(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
Command Default
EDRRM is disabled and the sensitivity is low.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable EDRRM using the ap dot11 24ghz rrm channel cleanair-event command before you
configure the sensitivity.
Examples
This example shows how to enable EDRRM and set the EDRRM sensitivity to low:
Switch(config)# ap dot11 24ghz rrm channel cleanair-event
Switch(config)# ap dot11 24ghz rrm channel cleanair-event sensitivity low
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
29
ap dot11 24ghz rrm channel device
ap dot11 24ghz rrm channel device
To configure persistent non-Wi-Fi device avoidance in the 802.11b channel, use the ap dot11 24ghz rrm
channel device command in global configuration mode. To disable persistent device avoidance, use the no
form of this command.
ap dot11 24ghz rrm channel device
no ap dot11 24ghz rrm channel device
Syntax Description
This command has no arguments or keywords.
Command Default
Persistent device avoidance is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
CleanAir-capable monitor mode access points collect information about persistent devices on all configured
channels and stores the information in the switch. Local and bridge mode access points detect interference
devices on the serving channels only.
Examples
This example shows how to enable persistent device avoidance:
Switch(config)# ap dot11 24ghz rrm channel device
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
30
ap name mode se-connect
ap name mode se-connect
To configure the access point for SE-Connect mode, use the ap name ap_name mode se-connect command
in privileged exec mode.
ap name ap_name mode se-connect
Syntax Description
ap_name
Name of the access point.
Command Default
No access point is configured for SE-Connect mode.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The access point will reboot after you change the mode.
SE-connect mode enables a user to connect a Spectrum Expert application running on an external Microsoft
Windows XP or Vista PC to a Cisco CleanAir-enabled access point in order to display and analyze detailed
spectrum data. The Spectrum Expert application connects directly to the access point, by passing the controller.
An access point in SE-Connect mode does not provide any Wi-Fi, RF, or spectrum data to the controller. All
CleanAir system functionality is suspended while the AP is in this mode, and no clients are served. This mode
is intended for remote troubleshooting only.
Examples
This example shows how to change the mode of the access point to SE-Connect:
Switch# ap name AS-5508-5-AP3 mode se-connect
Changing the AP's mode will cause the AP to reboot.
Are you sure you want to continue? (y/n)[y]: y
% switch-1:wcm:Cisco AP does not support the seconnect mode
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
31
default ap dot11 5ghz cleanair device
default ap dot11 5ghz cleanair device
To configure the default state of the alarm for 5-GHz interference devices, use the default ap dot11 5ghz
cleanair device command in global configuration mode.
default ap dot11 5ghz cleanair device {canopy | cont-tx | dect-like | inv | jammer | nonstd | radar | report
| superag | tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
radar
Configures the alarm for radars.
report
Enables interference device reports.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other interference devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
32
default ap dot11 5ghz cleanair device
Usage Guidelines
You must enable CleanAir using the ap dot11 5ghz cleanair command before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Switch(config)# default ap dot11 5ghz cleanair device video
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
33
default ap dot11 5ghz rrm channel cleanair-event
default ap dot11 5ghz rrm channel cleanair-event
To configure the default state of Event-Driven radio resource management (EDRRM) and the EDRRM
sensitivity for 5-GHz devices, use the default ap dot11 5ghz rrm channel cleanair-event command in
global configuration mode.
default ap dot11 5ghz rrm channel cleanair-event [sensitivity {high | low | medium}]
Syntax Description
sensitivity
(Optional) Configures the EDRRM sensitivity of the CleanAir event.
high
(Optional) Specifies the highest sensitivity to non-Wi–Fi interference as
indicated by the Air Quality (AQ) value.
low
(Optional) Specifies the least sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
medium
(Optional) Specifies medium sensitivity to non-Wi–Fi interference as indicated
by the AQ value.
Command Default
EDRRM is disabled and the sensitivity is low.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable EDRRM before you configure the sensitivity.
Examples
This example shows how to set the default EDRRM state and sensitivity:
Switch(config)# default ap dot11 5ghz rrm channel cleanair-event
Switch(config)# default ap dot11 5ghz rrm channel cleanair-event sensitivity
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
34
default ap dot11 5ghz rrm channel device
default ap dot11 5ghz rrm channel device
To configure the default state of the persistent non-Wi-Fi device avoidance in the 802.11a channels, use the
default ap dot11 5ghz rrm channel device command in global configuration mode.
default ap dot11 5ghz rrm channel device
Syntax Description
This command has no arguments or keywords.
Command Default
Persistent device state is disabled.
Command Modes
Global configuration (config)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure persistent non-Wi-Fi device avoidance in the 802.11a channels:
Switch(config)# default ap dot11 5ghz rrm channel device
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
35
default ap dot11 24ghz cleanair alarm device
default ap dot11 24ghz cleanair alarm device
To configure the default value of the alarm for 2.4-GHz interference devices, use the default ap dot11 24ghz
cleanair alarm device command in global configuration mode.
default ap dot11 24ghz cleanair alarm device {bt-discovery | bt-link | canopy | cont-tx | dect-like | fh |
inv | jammer | mw-oven| nonstd | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee}
Syntax Description
bt-discovery
Configures the alarm for Bluetooth interference devices.
bt-link
Configures the alarm for any Bluetooth link.
canopy
Configures the alarm for canopy interference devices.
cont-tx
Configures the alarm for continuous transmitters.
dect-like
Configures the alarm for Digital Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11 frequency hopping (FH) devices.
inv
Configures the alarm for devices using spectrally inverted Wi-Fi signals.
jammer
Configures the alarm for jammer interference devices.
mw-oven
Configures the alarm for microwave ovens.
nonstd
Configures the alarm for devices using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11 SuperAG interference devices.
tdd-tx
Configures the alarm for Time Division Duplex (TDD) transmitters.
video
Configures the alarm for video cameras.
wimax-fixed
Configures the alarm for WiMax fixed interference devices.
wimax-mobile
Configures the alarm for WiMax mobile interference devices.
xbox
Configures the alarm for Xbox interference devices.
zigbee
Configures the alarm for 802.15.4 interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all the other devices is disabled.
Command Modes
Global configuration (config)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
36
default ap dot11 24ghz cleanair alarm device
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanair command before you configure this command.
Examples
This example shows how to configure the default CleanAir 2.4-GHz interference devices alarm:
Switch(config)# default ap dot11 24ghz cleanair alarm device inv
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
37
default ap dot11 24ghz cleanair device
default ap dot11 24ghz cleanair device
To configure the default state of report generation for 2.4-GHz interference devices, use the default ap dot11
24ghz cleanair device command in global configuration mode.
default ap dot11 24ghz cleanair device {ble-beacon| bt-discovery | bt-link | canopy | cont-tx | dect-like
| fh | inv | jammer | mw-oven | nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile |
xbox | zigbee}
Syntax Description
ble-beacon
Configure the BLE beacon feature.
bt-discovery
Configures the alarm for Bluetooth
interference devices.
bt-link
Configures the alarm for any
Bluetooth link.
canopy
Configures the alarm for canopy
interference devices.
cont-tx
Configures the alarm for
continuous transmitters.
dect-like
Configures the alarm for Digital
Enhanced Cordless Communication
(DECT)-like phones.
fh
Configures the alarm for 802.11
frequency hopping devices.
inv
Configures the alarm for devices
using spectrally inverted Wi-Fi
signals.
jammer
Configures the alarm for jammer
interference devices.
mw-oven
Configures the alarm for
microwave ovens.
nonstd
Configures the alarm for devices
using nonstandard Wi-Fi channels.
superag
Configures the alarm for 802.11
SuperAG interference devices.
tdd-tx
Configures the alarm for Time
Division Duplex (TDD)
transmitters.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
38
default ap dot11 24ghz cleanair device
video
Configures the alarm for video
cameras.
wimax-fixed
Configures the alarm for WiMax
fixed interference devices.
wimax-mobile
Configures the alarm for WiMax
mobile interference devices.
xbox
Configures the alarm for Xbox
interference devices.
zigbee
Configures the alarm for 802.15.4
interference devices.
Command Default
The alarm for Wi-Fi inverted devices is enabled. The alarm for all other devices is disabled.
Command Modes
Global configuration (config).
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
This command was modified. The
ble-beacon keyword was added.
Usage Guidelines
You must enable CleanAir using the ap dot11 24ghz cleanaircommand before you configure this command.
Examples
This example shows how to enable CleanAir to report when a video camera interferes:
Switch(config)# default ap dot11 24ghz cleanair device video
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
39
default ap dot11 24ghz rrm channel cleanair-event
default ap dot11 24ghz rrm channel cleanair-event
To configure the default Event-Driven radio resource management (EDRRM) state and sensitivity for 2.4-GHz
devices, use the default ap dot11 24ghz rrm channel cleanair-event command in global configuration
mode.
default ap dot11 24ghz rrm channel cleanair-event [sensitivity {high | low | medium}]
Syntax Description
sensitivity
Configures the EDRRM sensitivity of the CleanAir event.
high
Specifies the highest sensitivity to non-Wi–Fi interference as indicated by the
Air Quality (AQ) value.
low
Specifies the least sensitivity to non-Wi–Fi interference as indicated by the AQ
value.
medium
Specifies medium sensitivity to non-Wi–Fi interference as indicated by the AQ
value.
Command Default
EDRRM is disabled and the sensitivity is low.
Command Modes
Global configuration (config)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable EDRRM and set the default EDRRM sensitivity:
Switch(config)# default ap dot11 24ghz rrm channel cleanair-event
Switch(config)# default ap dot11 24ghz rrm channel cleanair-event sensitivity
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
40
show ap dot11 5ghz cleanair air-quality summary
show ap dot11 5ghz cleanair air-quality summary
To display the CleanAir AQ data for 5-GHz band, use the show ap dot11 5ghz cleanair air-quality summary
command in user EXEC mode or privileged EXEC mode.
show ap dot11 5ghz cleanair air-quality summary
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CleanAir AQ data for 5-GHz band:
Switch# show ap dot11 5ghz cleanair air-quality summary
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP270ca.9b86.4546
1
99
99
0
No
AP2894.0f26.22df
6
98
97
0
No
AP2894.0f58.cc6b
11
99
99
0
No
AP2894.0f39.1040
6
97
97
0
No
AP2894.0f63.c6da
11
99
99
0
No
AP2894.0f58.d013
6
97
97
0
No
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
41
show ap dot11 5ghz cleanair air-quality worst
show ap dot11 5ghz cleanair air-quality worst
To display the worst AQ data for 5-GHz band, use the show ap dot11 5ghz cleanair air-quality worst
command in user EXEC mode or privileged EXEC mode.
show ap dot11 5ghz cleanair air-quality worst
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the worst AQ data for 5-GHz band:
Switch# show ap dot11 5ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP2894.0f39.1040
6
97
97
0
No
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
42
show ap dot11 5ghz cleanair config
show ap dot11 5ghz cleanair config
To display the CleanAir configuration for 5-GHz band, use the show ap dot11 5ghz cleanair config command.
show ap dot11 5ghz cleanair config
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In Release 3.3SE, you can configure this command on the Mobility Agent (MA).
Examples
This example shows how to display the CleanAir configuration for 5-GHz band on the Mobility Controller:
Switch# show ap dot11 5ghz cleanair config
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
: Enabled
:
:
:
:
Enabled
15
Enabled
1
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
: Enabled
: HIGH
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
43
show ap dot11 5ghz cleanair config
CleanAir Persistent Devices state............ : Enabled
This example shows how to display the CleanAir configuration for 5-GHz band on the Mobility Agent:
Switch# show ap dot11 5ghz cleanair config
Mobility Controller Link Status..................
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
: UP
: Enabled
:
:
:
:
Enabled
15
Enabled
10
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Enabled
Enabled
Disabled
Disabled
Disabled
Enabled
: Disabled
: LOW
: Disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
44
show ap dot11 5ghz cleanair device type
show ap dot11 5ghz cleanair device type
To display the 5-GHz interference devices, use the show ap dot11 5ghz cleanair device type command.
show ap dot11 5ghz cleanair device type {all | canopy | cont-tx | dect-like | inv | jammer | nonstd |
persistent | superag | tdd-tx | video | wimax-fixed | wimax-mobile}
Syntax Description
Command Modes
all
Displays all CleanAir interferer devices for 5-GHz band.
canopy
Displays CleanAir interferers of type canopy for 5-GHz band.
cont-tx
Displays CleanAir interferers of type continuous transmitter for 5-GHz band.
dect-like
Displays CleanAir interferers of type Digital Enhanced Cordless
Communication (DECT)-like phone for 5-GHz band.
inv
Displays CleanAir interferer devices using spectrally inverted WiFi signals for
5-GHz band.
jammer
Displays CleanAir interferers of type jammer for 5-GHz band.
nonstd
Displays CleanAir interferer devices using non-standard Wi-Fi channels for
5-GHz band.
persistent
Displays CleanAir persistent device interferers for 5-GHz band.
superag
Displays CleanAir interferers of type SuperAG for 5-GHz band.
tdd-tx
Displays CleanAir Time Division Duplex (TDD) transmitters for 5-GHz band.
video
Displays CleanAir interferers of type video camera for 5-GHz band.
winmax-fixed
Displays CleanAir interferers of type WiMax fixed for 5-GHz band.
wimax-mobile
Displays CleanAir interferers of type WiMax mobile for 5-GHz band.
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
45
show ap dot11 5ghz cleanair device type
Usage Guidelines
Interference devices are listed only if there is an interference from any 5-GHz devices.
Examples
This example shows how to view all the 5-GHz interference devices:
Switch# show ap dot11 5ghz cleanair device type all
DC
ISI
RSSI
DevID
=
=
=
=
Duty Cycle (%)
Interference Severity Index (1-Low Interference, 100-High Interference)
Received Signal Strength Index (dBm)
Device ID
No
ClusterID
DevID Type
AP Name
ISI RSSI DC
Channel
-------------------------------------------------------------------------------------------------
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
46
show ap dot11 24ghz cleanair air-quality summary
show ap dot11 24ghz cleanair air-quality summary
To display the CleanAir AQ data for 2.4-GHz band, use the show ap dot11 24ghz cleanair air-quality
summary command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair air-quality summary
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CleanAir AQ data for 2.4-GHz band:
Switch# show ap dot11 24ghz cleanair air-quality summary
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP270ca.9b86.4546
1
99
99
0
No
AP2894.0f26.22df
6
98
97
0
No
AP2894.0f58.cc6b
11
99
99
0
No
AP2894.0f39.1040
6
97
97
0
No
AP2894.0f63.c6da
11
99
99
0
No
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
47
show ap dot11 24ghz cleanair air-quality worst
show ap dot11 24ghz cleanair air-quality worst
To display the worst air quality data for 2.4-GHz band, use the show ap dot11 24ghz cleanair air-quality
worst command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair air-quality worst
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the worst AQ data for 2.4-GHz band:
Switch# show ap dot11 24ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel
Avg AQ Min AQ Interferers DFS
-------------------------------------------------------------AP2895.0f39.1040
6
97
97
0
No
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
48
show ap dot11 24ghz cleanair config
show ap dot11 24ghz cleanair config
To display the CleanAir configuration for 2.4-GHz band, use the show ap dot11 24ghz cleanair config
command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair config
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In Release 3.3SE, you can configure this command on the Mobility Agent (MA).
Examples
This example shows how to display the CleanAir configuration for 2.4-GHz band on the Mobility Controller:
Switch# show ap dot11 24ghz cleanair config
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
: Enabled
:
:
:
:
Enabled
15
Enabled
1
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
49
show ap dot11 24ghz cleanair config
CleanAir Event-driven RRM State.............. : Enabled
CleanAir Driven RRM Sensitivity.............. : HIGH
CleanAir Persistent Devices state............ : Enabled
This example shows how to display the CleanAir configuration for 2.4-GHz band on the Mobility Agent:
Switch# show ap dot11 24ghz cleanair config
Mobility Controller Link Status..................
CleanAir Solution................................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional CleanAir Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
: UP
: Enabled
:
:
:
:
Enabled
15
Enabled
10
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
:
:
:
:
:
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Enabled
Enabled
Disabled
Disabled
Disabled
Enabled
: Disabled
: LOW
: Disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
50
show ap dot11 24ghz cleanair summary
show ap dot11 24ghz cleanair summary
To display a summary of 2.4-GHz CleanAir devices, use the show ap dot11 24ghz cleanair summary
command in user EXEC mode or privileged EXEC mode.
show ap dot11 24ghz cleanair summary
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show ap dot11 24ghz cleanair summary command:
Switch# show ap dot11 24ghz cleanair summary
AP Name
MAC Address
Slot ID Spectrum Capable Spectrum Intelligence
Spectrum Oper State
----------------------------------------------------------------------------------------------------------------AP1cdf.0f95.1719
0817.35c7.1a60
0 Disabled
Disabled
Down
AS-5508-5-AP3
0817.35dd.9f40
0 Disabled
Disabled
Down
AP270ca.9b86.4546
0c85.259e.c350
0 Enabled
Enabled
Up
AP2894.0f26.22df
0c85.25ab.cca0
0 Enabled
Enabled
Up
AP2894.0f58.cc6b
0c85.25c7.b7a0
0 Enabled
Enabled
Up
AP2894.0f39.1040
0c85.25de.2c10
0 Enabled
Enabled
Up
AP2894.0f63.c6da
0c85.25de.c8e0
0 Enabled
Enabled
Up
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
51
show ap dot11 24ghz cleanair summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
52
PART
II
Flexible NetFlow
• Flexible NetFlow Commands, page 55
Flexible NetFlow Commands
• cache, page 58
• clear flow exporter, page 60
• clear flow monitor, page 61
• collect, page 63
• collect counter, page 65
• collect interface, page 66
• collect timestamp absolute, page 67
• collect transport tcp flags, page 68
• collect wireless ap mac address (wireless), page 69
• collect wireless client mac address (wireless), page 70
• datalink flow monitor, page 71
• datalink flow monitor (wireless), page 72
• debug flow exporter, page 73
• debug flow monitor, page 74
• debug flow record, page 75
• debug sampler, page 76
• description, page 77
• destination, page 78
• dscp, page 80
• export-protocol netflow-v9, page 81
• exporter, page 82
• flow exporter, page 83
• flow monitor, page 84
• flow record, page 85
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
55
• ip flow monitor, page 86
• ipv6 flow monitor, page 88
• ip flow monitor (wireless), page 90
• ipv6 flow monitor (wireless), page 91
• match application name (wireless), page 92
• match datalink dot1q priority, page 93
• match datalink dot1q vlan, page 94
• match datalink ethertype, page 95
• match datalink mac, page 96
• match datalink vlan, page 98
• match flow cts, page 99
• match flow direction, page 100
• match interface, page 101
• match ipv4, page 102
• match ipv4 destination address, page 103
• match ipv4 source address, page 104
• match ipv4 ttl, page 105
• match ipv6, page 106
• match ipv6 destination address, page 107
• match ipv6 hop-limit, page 108
• match ipv6 source address, page 109
• match transport, page 110
• match transport icmp ipv4, page 111
• match transport icmp ipv6, page 112
• match wireless ssid (wireless), page 113
• mode random 1 out-of, page 114
• option, page 115
• record, page 117
• sampler, page 118
• show flow exporter, page 119
• show flow interface, page 122
• show flow monitor, page 124
• show flow record, page 129
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
56
• show flow record wireless avc basic (wireless), page 130
• show sampler, page 131
• source, page 133
• template data timeout, page 135
• transport, page 136
• ttl, page 137
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
57
cache
cache
To configure a flow cache parameter for a flow monitor, use the cache command in flow monitor configuration
mode. To remove a flow cache parameter for a flow monitor, use the no form of this command.
cache {timeout {active| inactive} seconds| type normal}
no cache {timeout {active| inactive} | type}
Syntax Description
Command Default
timeout
Specifies the flow timeout.
active
Specifies the active flow timeout.
inactive
Specifies the inactive flow timeout.
seconds
The timeout value in seconds. The range is 1 to 604800 (7 days).
type
Specifies the type of the flow cache.
normal
Configures a normal cache type. The entries in the flow cache will
be aged out according to the timeout active seconds and timeout
inactive seconds settings. This is the default cache type.
The default flow monitor flow cache parameters are used.
The following flow cache parameters for a flow monitor are enabled:
• Cache type: normal
• Active flow timeout: 1800 seconds
• Inactive flow timeout: 15 seconds
Command Modes
Command History
Usage Guidelines
Flow monitor configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Each flow monitor has a cache that it uses to store all the flows it monitors. Each cache has various configurable
elements, such as the time that a flow is allowed to remain in it. When a flow times out, it is removed from
the cache and sent to any exporters that are configured for the corresponding flow monitor.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
58
cache
The cache timeout active command controls the aging behavior of the normal type of cache. If a flow has
been active for a long time, it is usually desirable to age it out (starting a new flow for any subsequent packets
in the flow). This age out process allows the monitoring application that is receiving the exports to remain up
to date. By default, this timeout is 1800 seconds (30 minutes), but it can be adjusted according to system
requirements. A larger value ensures that long-lived flows are accounted for in a single flow record; a smaller
value results in a shorter delay between starting a new long-lived flow and exporting some data for it. When
you change the active flow timeout, the new timeout value takes effect immediately.
The cache timeout inactive command also controls the aging behavior of the normal type of cache. If a flow
has not seen any activity for a specified amount of time, that flow will be aged out. By default, this timeout
is 15 seconds, but this value can be adjusted depending on the type of traffic expected. If a large number of
short-lived flows is consuming many cache entries, reducing the inactive timeout can reduce this overhead.
If a large number of flows frequently get aged out before they have finished collecting their data, increasing
this timeout can result in better flow correlation. When you change the inactive flow timeout, the new timeout
value takes effect immediately.
The cache type normal command specifies the normal cache type. This is the default cache type. The entries
in the cache will be aged out according to the timeout active seconds and timeout inactive seconds settings.
When a cache entry is aged out, it is removed from the cache and exported via any exporters configured for
the monitor associated with the cache.
To return a cache to its default settings, use the default cache flow monitor configuration command.
Note
Examples
When a cache becomes full, new flows will not be monitored.
The following example shows how to configure the active timeout for the flow monitor cache:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)# cache timeout active 4800
The following example shows how to configure the inactive timer for the flow monitor cache:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)# cache timeout inactive 30
The following example shows how to configure a normal cache:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)# cache type normal
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
59
clear flow exporter
clear flow exporter
To clear the statistics for a Flexible NetFlow flow exporter, use the clear flow exporter command in privileged
EXEC mode.
clear flow exporter [[name] exporter-name] statistics
Syntax Description
Command Modes
Command History
Usage Guidelines
name
(Optional) Specifies the name of a flow exporter.
exporter-name
(Optional) Name of a flow exporter that was previously configured.
statistics
Clears the flow exporter statistics.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The clear flow exporter command removes all statistics from the flow exporter. These statistics will not be
exported and the data gathered in the cache will be lost.
You can view the flow exporter statistics by using the show flow exporter statistics privileged EXEC
command.
Examples
The following example clears the statistics for all of the flow exporters configured on the switch:
Switch# clear flow exporter statistics
The following example clears the statistics for the flow exporter named FLOW-EXPORTER-1:
Switch# clear flow exporter FLOW-EXPORTER-1 statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
60
clear flow monitor
clear flow monitor
To clear a flow monitor cache or flow monitor statistics and to force the export of the data in the flow monitor
cache, use the clear flow monitor command in privileged EXEC mode.
clear flow monitor [name] monitor-name [[cache] force-export| statistics]
Syntax Description
Command Modes
Command History
Usage Guidelines
Note
name
Specifies the name of a flow monitor.
monitor-name
Name of a flow monitor that was previously configured.
cache
(Optional) Clears the flow monitor cache information.
force-export
(Optional) Forces the export of the flow monitor cache statistics.
statistics
(Optional) Clears the flow monitor statistics.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The clear flow monitor cache command removes all entries from the flow monitor cache. These entries will
not be exported and the data gathered in the cache will be lost.
The statistics for the cleared cache entries are maintained.
The clear flow monitor force-export command removes all entries from the flow monitor cache and exports
them using all flow exporters assigned to the flow monitor. This action can result in a short-term increase in
CPU usage. Use this command with caution.
The clear flow monitor statistics command clears the statistics for this flow monitor.
Note
The current entries statistic will not be cleared by the clear flow monitor statistics command because
this is an indicator of how many entries are in the cache and the cache is not cleared with this command.
You can view the flow monitor statistics by using the show flow monitor statistics privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
61
clear flow monitor
Examples
The following example clears the statistics and cache entries for the flow monitor named FLOW-MONITOR-1:
Switch# clear flow monitor name FLOW-MONITOR-1
The following example clears the statistics and cache entries for the flow monitor named FLOW-MONITOR-1
and forces an export:
Switch# clear flow monitor name FLOW-MONITOR-1 force-export
The following example clears the cache for the flow monitor named FLOW-MONITOR-1 and forces an
export:
Switch# clear flow monitor name FLOW-MONITOR-1 cache force-export
The following example clears the statistics for the flow monitor named FLOW-MONITOR-1:
Switch# clear flow monitor name FLOW-MONITOR-1 statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
62
collect
collect
To configure non-key fields for the flow monitor record and to enable capturing the values in the fields for
the flow created with the record, use the collect command in flow record configuration mode.
collect {counter| interface| timestamp| transport| wireless}
Syntax Description
counter
Configures the number of bytes or packets in a flow as a non-key field for a flow
record. For more information, see collect counter, on page 65.
interface
Configures the input and output interface name as a non-key field for a flow record.
For more information, see collect interface, on page 66.
timestamp
Configures the absolute time of the first seen or last seen packet in a flow as a non-key
field for a flow record. For more information, see collect timestamp absolute, on
page 67.
transport
Enables the collecting of transport TCP flags from a flow record. For more
information, see collect transport tcp flags, on page 68.
wireless
Enables the collection of access point MAC addresses. For more information, see
collect wireless ap mac address (wireless), on page 69.
Command Default
Non-key fields are not configured for the flow monitor record.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The values in non-key fields are added to flows to provide additional information about the traffic in the flows.
A change in the value of a non-key field does not create a new flow. In most cases, the values for non-key
fields are taken from only the first packet in the flow.
The collect commands are used to configure non-key fields for the flow monitor record and to enable capturing
the values in the fields for the flow created with the record. The values in non-key fields are added to flows
to provide additional information about the traffic in the flows. A change in the value of a non-key field does
not create a new flow. In most cases the values for non-key fields are taken from only the first packet in the
flow.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
63
collect
Note
Examples
Although it is visible in the command-line help string, the flow username keyword is not supported.
The following example configures the total number of bytes in the flows as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect counter bytes long
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
64
collect counter
collect counter
To configure the number of bytes or packets in a flow as a non-key field for a flow record, use the collect
counter command in flow record configuration mode. To disable the use of the number of bytes or packets
in a flow (counters) as a non-key field for a flow record, use the no form of this command.
collect counter {bytes layer2 long| bytes long| packets long}
no collect counter {bytes layer2 long| bytes long| packets long}
Syntax Description
bytes layer2 long
Configures the number of Layer 2 bytes seen in a flow as a non-key field, and
enables collecting the total number of Layer 2 bytes from the flow using a 64-bit
counter.
bytes long
Configures the number of bytes seen in a flow as a non-key field, and enables
collecting the total number of bytes from the flow using a 64-bit counter.
packets long
Configures the number of packets seen in a flow as a non-key field and enables
collecting the total number of packets from the flow using a 64-bit counter.
Command Default
The number of bytes or packets in a flow is not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The collect counter bytes long command configures a 64-bit counter for the number of bytes seen in a flow.
The collect counter packets long command configures a 64-bit counter that will be incremented for each
packet seen in the flow. It is unlikely that a 64-bit counter will ever restart at 0.
To return this command to its default settings, use the no collect counter or default collect counter flow
record configuration command.
Examples
The following example configures the total number of bytes in the flows as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)#collect counter bytes long
The following example configures the total number of packets from the flows as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect counter packets long
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
65
collect interface
collect interface
To configure the input and output interface name as a non-key field for a flow record, use the collect interface
command in flow record configuration mode. To disable the use of the input and output interface as a non-key
field for a flow record, use the no form of this command.
collect interface {input| output}
no collect interface {input| output}
Syntax Description
input
Configures the input interface name as a non-key field and enables collecting the
input interface from the flows.
output
Configures the output interface name as a non-key field and enables collecting the
output interface from the flows.
Command Default
The input and output interface names are not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The Flexible NetFlow collect commands are used to configure non-key fields for the flow monitor record and
to enable capturing the values in the fields for the flow created with the record. The values in non-key fields
are added to flows to provide additional information about the traffic in the flows. A change in the value of
a non-key field does not create a new flow. In most cases, the values for non-key fields are taken from only
the first packet in the flow.
To return this command to its default settings, use the no collect interface or default collect interface flow
record configuration command.
Examples
The following example configures the output interface as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect interface output
The following example configures the input interface as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect interface input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
66
collect timestamp absolute
collect timestamp absolute
To configure the absolute time of the first seen or last seen packet in a flow as a non-key field for a flow
record, use the collect timestamp absolute command in flow record configuration mode. To disable the use
of the first seen or last seen packet in a flow as a non-key field for a flow record, use the no form of this
command.
collect timestamp absolute {first| last}
no collect timestamp absolute {first| last}
Syntax Description
first
Configures the absolute time of the first seen packet in a flow as a non-key field and
enables collecting time stamps from the flows.
last
Configures the absolute time of the last seen packet in a flow as a non-key field and
enables collecting time stamps from the flows.
Command Default
The absolute time field is not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The collect commands are used to configure non-key fields for the flow monitor record and to enable capturing
the values in the fields for the flow created with the record. The values in non-key fields are added to flows
to provide additional information about the traffic in the flows. A change in the value of a non-key field does
not create a new flow. In most cases the values for non-key fields are taken from only the first packet in the
flow.
Examples
The following example configures time stamps based on the absolute time of the first seen packet in a flow
as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect timestamp absolute first
The following example configures time stamps based on the absolute time of the last seen packet in a flow
as a non-key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect timestamp absolute last
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
67
collect transport tcp flags
collect transport tcp flags
To enable the collecting of transport TCP flags from a flow, use the collect transport tcp flags command in
flow record configuration mode. To disable the collecting of transport TCP flags from the flow, use the no
form of this command.
collect transport tcp flags
no collect transport tcp flags
Syntax Description
This command has no arguments or keywords.
Command Default
The transport layer fields are not configured as a non-key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The values of the transport layer fields are taken from all packets in the flow. You cannot specify which TCP
flag to collect. You can only specify to collect transport TCP flags. All TCP flags will be collected with this
command. The following transport TCP flags are collected:
• ack—TCP acknowledgement flag
• cwr—TCP congestion window reduced flag
• ece—TCP ECN echo flag
• fin—TCP finish flag
• psh—TCP push flag
• rst—TCP reset flag
• syn—TCP synchronize flag
• urg—TCP urgent flag
To return this command to its default settings, use the no collect collect transport tcp flags or default collect
collect transport tcp flags flow record configuration command.
Examples
The following example collects the TCP flags from a flow:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect transport tcp flags
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
68
collect wireless ap mac address (wireless)
collect wireless ap mac address (wireless)
To enable the collection of MAC addresses of the access points that the wireless client is associated with, use
the collect wireless ap mac address command in the flow record configuration mode. To disable the collection
of access point MAC addresses, use the no form of this command.
collect wireless ap mac address
no collect wirelessap mac address
Syntax Description
This command has no arguments or keywords.
Command Default
The collection of access point MAC addresses is not enabled by default.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Flexible NetFlow collect commands are used to configure non-key fields for the flow monitor record and
to enable capturing the values in the fields for the flow created with the record. The values in non-key fields
are added to flows to provide additional information about the traffic in the flows. A change in the value of
a non-key field does not create a new flow. In most cases, the values for non-key fields are taken from only
the first packet in the flow.
Examples
The following example configures the flow record to enable the collection of MAC addresses of the access
points that the wireless client is associated with:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect wireless ap mac address
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
69
collect wireless client mac address (wireless)
collect wireless client mac address (wireless)
To enable the collection of MAC addresses of the wireless clients that the access point is associated with, use
the collect wireless client mac address command in the flow record configuration mode. To disable the
collection of access point MAC addresses, use the no form of this command.
collect wirelessclient mac address
no collect wireless client mac address
Syntax Description
This command has no arguments or keywords.
Command Default
The collection of wireless client MAC addresses is not enabled by default.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Flexible NetFlow collect commands are used to configure non-key fields for the flow monitor record and
to enable capturing the values in the fields for the flow created with the record. The values in non-key fields
are added to flows to provide additional information about the traffic in the flows. A change in the value of
a non-key field does not create a new flow. In most cases, the values for non-key fields are taken from only
the first packet in the flow.
Examples
The following example configures the flow record to enable the collection of MAC addresses of the access
points that the wireless client is associated with:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# collect wireless client mac address
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
70
datalink flow monitor
datalink flow monitor
To apply a Flexible NetFlow flow monitor to an interface, use the datalink flow monitor command in interface
configuration mode. To disable a Flexible NetFlow flow monitor, use the no form of this command.
datalink flow monitor monitor-name {input| output| sampler sampler-name}
no datalink flow monitor monitor-name {input| output| sampler sampler-name}
Syntax Description
monitor-name
Name of the flow monitor to apply to the interface.
sampler sampler-name
Enables the specified flow sampler for the flow monitor.
input
Monitors traffic that the switch receives on the interface.
output
Monitors traffic that the switch sends on the interface.
Command Default
A flow monitor is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Before you apply a flow monitor to an interface with the datalink flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command and the flow sampler
using the sampler global configuration command.
To enable a flow sampler for the flow monitor, you must have already created the sampler.
Note
Examples
The datalink flow monitor command only monitors non-IPv4 and non-IPv6 traffic. To monitor IPv4
traffic, use the ip flow monitor command. To monitor IPv6 traffic, use the ipv6 flow monitor command.
This example shows how to enable Flexible NetFlow datalink monitoring on an interface:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# datalink flow monitor FLOW-MONITOR-1 sampler FLOW-SAMPLER-1 input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
71
datalink flow monitor (wireless)
datalink flow monitor (wireless)
To enable NetFlow monitoring in a WLAN, use the datalink flow monitor command in WLAN configuration
mode. To disable NetFlow monitoring, use the no form of this command.
datalink flow monitor datalink-monitor-name{input | output}
no datalink flow monitor datalink-monitor-name{input | output}
Syntax Description
datalink-monitor-name
Flow monitor name. The name is case sensitive and consists of alphanumeric
characters, with a maximum of 31 characters.
input
Specifies the NetFlow monitor for ingress traffic.
output
Specifies the NetFlow monitor for egress traffic.
Command Default
Flow monitor is not configured by default for WLAN interface.
Command Modes
WLAN configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Before you apply a flow monitor to an interface with the datalink flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command.
Examples
This example shows how to enable NetFlow monitoring on a WLAN:
Switch(config)# wlan wlan1
Switch(config-wlan)# datalink flow monitor test output
This example shows how to disable NetFlow monitor on a WLAN:
Switch(config)# wlan wlan1
Switch(config-wlan)# no datalink flow monitor test output
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
72
debug flow exporter
debug flow exporter
To enable debugging output for Flexible NetFlow flow exporters, use the debug flow exporter command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug flow exporter [[name] exporter-name] [error| event| packets number]
no debug flow exporter [[name] exporter-name] [error| event| packets number]
Syntax Description
Command Modes
Command History
Examples
name
(Optional) Specifies the name of a flow exporter.
exporter-name
(Optional) The name of a flow exporter that was previously configured.
error
(Optional) Enables debugging for flow exporter errors.
event
(Optional) Enables debugging for flow exporter events.
packets
(Optional) Enables packet-level debugging for flow exporters.
number
(Optional) The number of packets to debug for packet-level debugging of
flow exporters. The range is 1 to 65535.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following example indicates that a flow exporter packet has been queued for process send:
Switch# debug flow exporter
May 21 21:29:12.603: FLOW EXP: Packet queued for process send
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
73
debug flow monitor
debug flow monitor
To enable debugging output for Flexible NetFlow flow monitors, use the debug flow monitor command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug flow monitor [error| [name] monitor-name [cache [error]| error| packets packets]]
no debug flow monitor [error| [name] monitor-name [cache [error]| error| packets packets]]
Syntax Description
Command Modes
Command History
Examples
error
(Optional) Enables debugging for flow monitor errors for all flow monitors
or for the specified flow monitor.
name
(Optional) Specifies the name of a flow monitor.
monitor-name
(Optional) Name of a flow monitor that was previously configured.
cache
(Optional) Enables debugging for the flow monitor cache.
cache error
(Optional) Enables debugging for flow monitor cache errors.
packets
(Optional) Enables packet-level debugging for flow monitors.
packets
(Optional) Number of packets to debug for packet-level debugging of flow
monitors. The range is 1 to 65535.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following example shows that the cache for FLOW-MONITOR-1 was deleted:
Switch# debug flow monitor FLOW-MONITOR-1 cache
May 21 21:53:02.839: FLOW MON: 'FLOW-MONITOR-1' deleted cache
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
74
debug flow record
debug flow record
To enable debugging output for Flexible NetFlow flow records, use the debug flow record command in
privileged EXEC mode. To disable debugging output, use the no form of this command.
debug flow record [[name] record-name| options {sampler-table}| [detailed| error]]
no debug flow record [[name] record-name| options {sampler-table}| [detailed| error]]
Syntax Description
Command Modes
Command History
Examples
name
(Optional) Specifies the name of a flow record.
record-name
(Optional) Name of a user-defined flow record that was previously
configured.
options
(Optional) Includes information on other flow record options.
sampler-table
(Optional) Includes information on the sampler tables.
detailed
(Optional) Displays detailed information.
error
(Optional) Displays errors only.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following example enables debugging for the flow record:
Switch# debug flow record FLOW-record-1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
75
debug sampler
debug sampler
To enable debugging output for Flexible NetFlow samplers, use the debug sampler command in privileged
EXEC mode. To disable debugging output, use the no form of this command.
debug sampler [detailed| error| [name] sampler-name [detailed| error| sampling samples]]
no debug sampler [detailed| error| [name] sampler-name [detailed| error| sampling]]
Syntax Description
Command Modes
Command History
Examples
detailed
(Optional) Enables detailed debugging for sampler elements.
error
(Optional) Enables debugging for sampler errors.
name
(Optional) Specifies the name of a sampler.
sampler-name
(Optional) Name of a sampler that was previously configured.
sampling samples
(Optional) Enables debugging for sampling and specifies the number of
samples to debug.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following sample output shows that the debug process has obtained the ID for the sampler named
SAMPLER-1:
Switch#
*May 28
get ID
*May 28
get ID
debug sampler detailed
04:14:30.883: Sampler: Sampler(SAMPLER-1: flow monitor FLOW-MONITOR-1 (ip,Et1/0,O)
succeeded:1
04:14:30.971: Sampler: Sampler(SAMPLER-1: flow monitor FLOW-MONITOR-1 (ip,Et0/0,I)
succeeded:1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
76
description
description
To configure a description for a flow monitor, flow exporter, or flow record, use the description command
in the appropriate configuration mode. To remove a description, use the no form of this command.
description description
no description description
Syntax Description
description
Text string that describes the flow monitor, flow exporter, or flow record.
Command Default
The default description for a flow sampler, flow monitor, flow exporter, or flow record is "User defined."
Command Modes
The following command modes are supported:
Flow exporter configuration
Flow monitor configuration
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default setting, use the no description or default description command in the
appropriate configuration mode.
Examples
The following example configures a description for a flow monitor:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)# description Monitors traffic to 172.16.0.1 255.255.0.0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
77
destination
destination
To configure an export destination for a flow exporter, use the destination command in flow exporter
configuration mode. To remove an export destination for a flow exporter, use the no form of this command.
destination {hostname| ip-address} vrf vrf-label
no destination {hostname| ip-address} vrf vrf-label
Syntax Description
hostname
Hostname of the device to which you want to send the NetFlow information.
ip-address
IPv4 address of the workstation to which you want to send the NetFlow information.
vrf
(Optional) Specifies that the export data packets are to be sent to the named Virtual
Private Network (VPN) routing and forwarding (VRF) instance for routing to the
destination, instead of to the global routing table.
vrf-label
Name of the VRF instance.
Command Default
An export destination is not configured.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Each flow exporter can have only one destination address or hostname.
When you configure a hostname instead of the IP address for the device, the hostname is resolved immediately
and the IPv4 address is stored in the running configuration. If the hostname-to-IP-address mapping that was
used for the original Domain Name System (DNS) name resolution changes dynamically on the DNS server,
the switch does not detect this, and the exported data continues to be sent to the original IP address, resulting
in a loss of data.
To return this command to its default setting, use the no destination or default destination command in flow
exporter configuration mode.
Examples
The following example shows how to configure the networking device to export the Flexible NetFlow cache
entry to a destination system:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# destination 10.0.0.4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
78
destination
The following example shows how to configure the networking device to export the Flexible NetFlow cache
entry to a destination system using a VRF named VRF-1:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# destination 172.16.0.2 vrf VRF-1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
79
dscp
dscp
To configure a differentiated services code point (DSCP) value for flow exporter datagrams, use the dscp
command in flow exporter configuration mode. To remove a DSCP value for flow exporter datagrams, use
the no form of this command.
dscp dscp
no dscp dscp
Syntax Description
dscp
DSCP to be used in the DSCP field in exported datagrams. The range is 0 to 63. The
default is 0.
Command Default
The differentiated services code point (DSCP) value is 0.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default setting, use the no dscp or default dscp flow exporter configuration
command.
Examples
The following example sets 22 as the value of the DSCP field in exported datagrams:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# dscp 22
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
80
export-protocol netflow-v9
export-protocol netflow-v9
To configure NetFlow Version 9 export as the export protocol for a Flexible NetFlow exporter, use the
export-protocol netflow-v9 command in flow exporter configuration mode.
export-protocol netflow-v9
Syntax Description
This command has no arguments or keywords.
Command Default
NetFlow Version 9 is enabled.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The switch does not support NetFlow v5 export format, only NetFlow v9 export format is supported.
Examples
The following example configures NetFlow Version 9 export as the export protocol for a NetFlow exporter:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# export-protocol netflow-v9
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
81
exporter
exporter
To add a flow exporter for a flow monitor, use the exporter command in the appropriate configuration mode.
To remove a flow exporter for a flow monitor, use the no form of this command.
exporter exporter-name
no exporter exporter-name
Syntax Description
exporter-name
Command Default
An exporter is not configured.
Command Modes
Flow monitor configuration
Command History
Usage Guidelines
Name of a flow exporter that was previously configured.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
You must have already created a flow exporter by using the flow exporter command before you can apply
the flow exporter to a flow monitor with the exporter command.
To return this command to its default settings, use the no exporter or default exporter flow monitor
configuration command.
Examples
The following example configures an exporter for a flow monitor:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)# exporter EXPORTER-1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
82
flow exporter
flow exporter
To create a Flexible NetFlow flow exporter, or to modify an existing Flexible NetFlow flow exporter, and
enter Flexible NetFlow flow exporter configuration mode, use the flow exporter command in global
configuration mode. To remove a Flexible NetFlow flow exporter, use the no form of this command.
flow exporter exporter-name
no flow exporter exporter-name
Syntax Description
exporter-name
Name of the flow exporter that is being created or modified.
Command Default
Flexible NetFlow flow exporters are not present in the configuration.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Flow exporters export the data in the flow monitor cache to a remote system, such as a server running NetFlow
collector, for analysis and storage. Flow exporters are created as separate entities in the configuration. Flow
exporters are assigned to flow monitors to provide data export capability for the flow monitors. You can create
several flow exporters and assign them to one or more flow monitors to provide several export destinations.
You can create one flow exporter and apply it to several flow monitors.
Examples
The following example creates a flow exporter named FLOW-EXPORTER-1 and enters Flexible NetFlow
flow exporter configuration mode:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
83
flow monitor
flow monitor
To create a flow monitor, or to modify an existing flow monitor, and enter flow monitor configuration mode,
use the flow monitor command in global configuration mode. To remove a flow monitor, use the no form of
this command.
flow monitor monitor-name
no flow monitor monitor-name
Syntax Description
monitor-name
Name of the flow monitor that is being created or modified.
Command Default
Flexible NetFlow flow monitors are not present in the configuration.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic
monitoring. Flow monitors consist of a flow record and a cache. You add the record to the flow monitor after
you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is
applied to the first interface. Flow data is collected from the network traffic during the monitoring process
based on the key and nonkey fields in the flow monitor's record and stored in the flow monitor cache.
Examples
The following example creates a flow monitor named FLOW-MONITOR-1 and enters flow monitor
configuration mode:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
84
flow record
flow record
To create a Flexible NetFlow flow record, or to modify an existing Flexible NetFlow flow record, and enter
Flexible NetFlow flow record configuration mode, use the flow record command in global configuration
mode. To remove a Flexible NetFlow record, use the no form of this command.
flow record record-name
no flow record record-name
Syntax Description
record-name
Name of the flow record that is being created or modified.
Command Default
A Flexible NetFlow flow record is not configured.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record defines the keys that Flexible NetFlow uses to identify packets in the flow, as well as other
fields of interest that Flexible NetFlow gathers for the flow. You can define a flow record with any combination
of keys and fields of interest. The switch supports a rich set of keys. A flow record also defines the types of
counters gathered per flow. You can configure 64-bit packet or byte counters.
Examples
The following example creates a flow record named FLOW-RECORD-1, and enters Flexible NetFlow flow
record configuration mode:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
85
ip flow monitor
ip flow monitor
To enable a Flexible NetFlow flow monitor for IPv4 traffic that the switch is receiving or forwarding, use the
ip flow monitor command in interface configuration mode. To disable a flow monitor, use the no form of
this command.
ip flow monitor monitor-name [sampler sampler-name] {input| output}
no ip flow monitor monitor-name [sampler sampler-name] {input| output}
Syntax Description
monitor-name
Name of the flow monitor to apply to the interface.
sampler sampler-name
(Optional) Enables the specified flow sampler for the flow monitor.
input
Monitors IPv4 traffic that the switch receives on the interface.
output
Monitors IPv4 traffic that the switch transmits on the interface.
Command Default
A flow monitor is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Before you can apply a flow monitor to an interface with the ip flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command.
When you add a sampler to a flow monitor, only packets that are selected by the named sampler will be entered
into the cache to form flows. Each use of a sampler causes separate statistics to be stored for that usage.
You cannot add a sampler to a flow monitor after the flow monitor has been enabled on the interface. You
must first remove the flow monitor from the interface and then enable the same flow monitor with a sampler.
Note
The statistics for each flow must be scaled to give the expected true usage. For example, with a 1 in 100
sampler it is expected that the packet and byte counters will have to be multiplied by 100.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
86
ip flow monitor
Examples
The following example enables a flow monitor for monitoring input traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 input
The following example enables the same flow monitor on the same interface for monitoring input and output
traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 input
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 output
The following example enables two different flow monitors on the same interface for monitoring input and
output traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 input
Switch(config-if)# ip flow monitor FLOW-MONITOR-2 output
The following example enables the same flow monitor on two different interfaces for monitoring input and
output traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 input
Switch(config-if)# exit
Switch(config)# interface gigabitethernet2/0/3
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 output
The following example enables a flow monitor for monitoring input traffic, with a sampler to limit the input
packets that are sampled:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
The following example shows what happens when you try to add a sampler to a flow monitor that has already
been enabled on an interface without a sampler:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
% Flow Monitor: Flow Monitor 'FLOW-MONITOR-1' is already on in full mode and cannot be
enabled with a sampler.
The following example shows how to remove a flow monitor from an interface so that it can be enabled with
the sampler:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# no ip flow monitor FLOW-MONITOR-1 input
Switch(config-if)# ip flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
87
ipv6 flow monitor
ipv6 flow monitor
To enable a flow monitor for IPv6 traffic that the switch is receiving or forwarding, use the ipv6 flow monitor
command in interface configuration mode. To disable a flow monitor, use the no form of this command.
ipv6 flow monitor monitor-name [sampler sampler-name] {input| output}
no ipv6 flow monitor monitor-name [sampler sampler-name] {input| output}
Syntax Description
monitor-name
Name of the flow monitor to apply to the interface.
sampler sampler-name
(Optional) Enables the specified flow sampler for the flow monitor.
input
Monitors IPv6 traffic that the switch receives on the interface.
output
Monitors IPv6 traffic that the switch transmits on the interface.
Command Default
A flow monitor is not enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Before you can apply a flow monitor to the interface with the ipv6 flow monitor command, you must have
already created the flow monitor using the flow monitor global configuration command.
When you add a sampler to a flow monitor, only packets that are selected by the named sampler will be entered
into the cache to form flows. Each use of a sampler causes separate statistics to be stored for that usage.
You cannot add a sampler to a flow monitor after the flow monitor has been enabled on the interface. You
must first remove the flow monitor from the interface and then enable the same flow monitor with a sampler.
Note
The statistics for each flow must be scaled to give the expected true usage. For example, with a 1 in 100
sampler it is expected that the packet and byte counters will have to be multiplied by 100.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
88
ipv6 flow monitor
Examples
The following example enables a flow monitor for monitoring input traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 input
The following example enables the same flow monitor on the same interface for monitoring input and output
traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 input
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 output
The following example enables two different flow monitors on the same interface for monitoring input and
output traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 input
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-2 output
The following example enables the same flow monitor on two different interfaces for monitoring input and
output traffic:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 input
Switch(config-if)# exit
Switch(config)# interface gigabitethernet2/0/3
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 output
The following example enables a flow monitor for monitoring input traffic, with a sampler to limit the input
packets that are sampled:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-1 input
The following example shows what happens when you try to add a sampler to a flow monitor that has already
been enabled on an interface without a sampler:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
% Flow Monitor: Flow Monitor 'FLOW-MONITOR-1' is already on in full mode and cannot be
enabled with a sampler.
The following example shows how to remove a flow monitor from an interface so that it can be enabled with
the sampler:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# no ipv6 flow monitor FLOW-MONITOR-1 input
Switch(config-if)# ipv6 flow monitor FLOW-MONITOR-1 sampler SAMPLER-2 input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
89
ip flow monitor (wireless)
ip flow monitor (wireless)
To configure IPv4 NetFlow monitoring, use the ip flow monitor command in WLAN configuration mode.
To remove IPv4 NetFlow monitoring, use the no form of this command.
ip flow monitor ip-monitor-name {input | output}
no ip flow monitor ip-monitor-name {input | output}
Syntax Description
ip-monitor-name
Flow monitor name.
input
Enables a flow monitor for IPv4 ingress traffic.
output
Enables a flow monitor for IPv4 egress traffic.
Command Default
A flow monitor is not enabled.
Command Modes
WLAN configuration
Usage Guidelines
Before you can apply a IPv4 flow monitor to an interface with the ip flow monitor command, you need to
create the flow monitor using the flow monitor global configuration command.
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure an IP flow monitor for ingress traffic:
Switch(config)# wlan wlan1
Switch(config-wlan)# ip flow monitor test input
This example shows how to disable an IP flow monitor:
Switch(config)# wlan wlan1
Switch(config-wlan)# no ip flow monitor test input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
90
ipv6 flow monitor (wireless)
ipv6 flow monitor (wireless)
To configure IPv6 NetFlow monitoring, use the ipv6 flow monitor command in wlan configuration mode.
To remove IPv6 NetFlow monitoring, use the no form of this command.
ipv6 flow monitor ipv6-monitor-name {input | output}
no ipv6 flow monitor ipv6-monitor-name {input | output}
Syntax Description
ipv6-monitor-name
Flow monitor name.
input
Enables a flow monitor for IPv6 ingress traffic.
output
Enables a flow monitor for IPv6 egress traffic.
Command Default
A flow monitor is not enabled.
Command Modes
Wlan configuration
Usage Guidelines
Before you can apply an IPv6 flow monitor to an interface with the ipv6 flow monitor command, you need
to create the flow monitor using the flow monitor global configuration command.
The collect commands are used to configure nonkey fields for the flow monitor record and to enable capturing
the values in the fields for the flow created with the record. The values in nonkey fields are added to flows to
provide additional information about the traffic in the flows. A change in the value of a nonkey field does not
create a new flow. In most cases the values for nonkey fields are taken from only the first packet in the flow.
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure an IPv6 flow monitor for ingress traffic:
Switch(config)# wlan wlan1
Switch(config-wlan)# ipv6 flow monitor test input
This example shows how to disable an IPv6 flow monitor:
Switch(config)# wlan wlan1
Switch(config-wlan)# no ipv6 flow monitor test input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
91
match application name (wireless)
match application name (wireless)
This command is specific to the Application Visibility and Control (AVC) feature. To specify a match to the
application name, use the match application name in flow record configuration mode. To disable the use of
the application name as a key field for a flow record, use the no form of this command.
match application name
no match application name
Syntax Description
This command has no arguments or keywords.
Command Default
The application name is not configured as a key field, by default.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command is specific to the AVC feature. For more information, see the System Management Configuration
Guide, Cisco IOS XE Release 3SE.
Examples
This command is specific to the AVC feature. For examples, see the System Management Configuration
Guide, Cisco IOS XE Release 3SE.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
92
match datalink dot1q priority
match datalink dot1q priority
To configure the 802.1Q (dot1q) priority value as a key field for a flow record, use the match datalink dot1q
priority command in flow record configuration mode. To disable the use of the priority as a key field for a
flow record, use the no form of this command.
match datalink dot1q priority
no match datalink dot1q priority
Syntax Description
This command has no arguments or keywords.
Command Default
The priority field is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The observation point of the match datalink dot1q priority command is the interface to which the flow
monitor that contains the flow record with the command is applied.
Examples
The following example configures the 802.1Q priority as a key field for a flow record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match datalink dot1q priority
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
93
match datalink dot1q vlan
match datalink dot1q vlan
To configure the 802.1Q (dot1q) VLAN value as a key field for a flow record, use the match datalink dot1q
vlan command in flow record configuration mode. To disable the use of the 802.1Q VLAN value as a key
field for a flow record, use the no form of this command.
match datalink dot1q vlan {input| output}
no match datalink dot1q vlan {input| output}
Syntax Description
input
Configures the VLAN ID of traffic being received by the switch as a key field.
output
Configures the VLAN ID of traffic being transmitted by the switch as a key field.
Command Default
The 802.1Q VLAN ID is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The input and output keywords of the match datalink dot1q vlan command are used to specify the observation
point that is used by the match datalink dot1q vlan command to create flows based on the unique 802.1q
VLAN IDs in the network traffic.
Examples
The following example configures the 802.1Q VLAN ID of traffic being received by the switch as a key field
for a flow record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match datalink dot1q vlan input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
94
match datalink ethertype
match datalink ethertype
To configure the EtherType of the packet as a key field for a flow record, use the match datalink ethertype
command in flow record configuration mode. To disable the EtherType of the packet as a key field for a flow
record, use the no form of this command.
match datalink ethertype
no match datalink ethertype
Syntax Description
This command has no arguments or keywords.
Command Default
The EtherType of the packet is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
When you configure the EtherType of the packet as a key field for a flow record using the match datalink
ethertype command, the traffic flow that is created is based on the type of flow monitor that is assigned to
the interface:
• When a datalink flow monitor is assigned to an interface using the datalink flow monitor interface
configuration command, it creates unique flows for different Layer 2 protocols.
• When an IP flow monitor is assigned to an interface using the ip flow monitor interface configuration
command, it creates unique flows for different IPv4 protocols.
• When an IPv6 flow monitor is assigned to an interface using the ipv6 flow monitor interface configuration
command, it creates unique flows for different IPv6 protocols.
To return this command to its default settings, use the no match datalink ethertype or default match datalink
ethertype flow record configuration command.
Examples
The following example configures the EtherType of the packet as a key field for a Flexible NetFlow flow
record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match datalink ethertype
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
95
match datalink mac
match datalink mac
To configure the use of MAC addresses as a key field for a flow record, use the match datalink mac command
in flow record configuration mode. To disable the use of MAC addresses as a key field for a flow record, use
the no form of this command.
match datalink mac {destination address {input| output}| source address {input| output}}
no match datalink mac {destination address{input| output}| source address{input| output}}
Syntax Description
destination address
Configures the use of the destination MAC address as a key field.
input
Specifies the MAC address of input packets.
output
Specifies the MAC address of output packets.
source address
Configures the use of the source MAC address as a key field.
Command Default
MAC addresses are not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The input and output keywords are used to specify the observation point that is used by the match datalink
mac command to create flows based on the unique MAC addressees in the network traffic.
Note
When a datalink flow monitor is assigned to an interface or VLAN record, it creates flows only for non-IPv6
or non-IPv4 traffic.
To return this command to its default settings, use the no match datalink mac or default match datalink
mac flow record configuration command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
96
match datalink mac
Examples
The following example configures the use of the source MAC addresses of packets that are transmitted by
the switch as a key field for a flow record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match datalink mac source address output
The following example configures the use of the destination MAC address of packets that are received by the
switch as a key field for a flow record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match datalink mac destination address input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
97
match datalink vlan
match datalink vlan
To configure the VLAN ID as a key field for a flow record, use the match datalink vlan command in flow
record configuration mode. To disable the use of the VLAN ID value as a key field for a flow record, use the
no form of this command.
match datalink vlan {input| output}
no match datalink vlan {input| output}
Syntax Description
input
Configures the VLAN ID of traffic being received by the switch as a key field.
output
Configures the VLAN ID of traffic being transmitted by the switch as a key field.
Command Default
The VLAN ID is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The input and output keywords of the match datalink vlan command are used to specify the observation
point that is used by the match datalink vlan command to create flows based on the unique VLAN IDs in
the network traffic.
Examples
The following example configures the VLAN ID of traffic being received by the switch as a key field for a
flow record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match datalink vlan input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
98
match flow cts
match flow cts
To configure CTS source group tag and destination group tag for a flow record, use thematch flow cts
command in flow record configuration mode. To disable the group tag as key field for a flow record, use the
no form of this command.
match flow cts {source| destination} group-tag
no match flow cts {source| destination} group-tag
Syntax Description
cts destination group-tag
Configures the CTS destination field group as a key field.
cts source group-tag
Configures the CTS source field group as a key field.
Command Default
The CTS destination or source field group, flow direction and the flow sampler ID are not configured as key
fields.
Command Modes
Flexible NetFlow flow record configuration (config-flow-record)
Policy inline configuration (config-if-policy-inline)
Command History
Release
Modification
Cisco IOS XE 3.7.3E
This command was introduced.
Cisco IOS XE Denali 16.2.1
This command was reintroduced.
This command was not supported
in Cisco IOS XE Denali 16.1.x
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the source group-tag as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match flow cts source group-tag
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
99
match flow direction
match flow direction
To configure the flow direction as key fields for a flow record, use the match flow direction command in
flow record configuration mode. To disable the use of the flow direction as key fields for a flow record, use
the no form of this command.
match flow direction
no match flow direction
Syntax Description
This command has no arguments or keywords.
Command Default
The flow direction is not configured as key fields.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
The match flow direction command captures the direction of the flow as a key field. This feature is most
useful when a single flow monitor is configured for input and output flows. It can be used to find and eliminate
flows that are being monitored twice, once on input and once on output. This command can help to match up
pairs of flows in the exported data when the two flows are flowing in opposite directions.
Examples
The following example configures the direction the flow was monitored in as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match flow direction
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
100
match interface
match interface
To configure the input and output interfaces as key fields for a flow record, use the match interface command
in flow record configuration mode. To disable the use of the input and output interfaces as key fields for a
flow record, use the no form of this command.
match interface {input| output}
no match interface {input| output}
Syntax Description
input
Configures the input interface as a key field.
output
Configures the output interface as a key field.
Command Default
The input and output interfaces are not configured as key fields.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the input interface as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match interface input
The following example configures the output interface as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match interface output
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
101
match ipv4
match ipv4
To configure one or more of the IPv4 fields as a key field for a flow record, use the match ipv4 command in
flow record configuration mode. To disable the use of one or more of the IPv4 fields as a key field for a flow
record, use the no form of this command.
match ipv4 {destination address| protocol| source address| tos| ttl| version}
no match ipv4 {destination address| protocol| source address| tos| ttl| version}
Syntax Description
destination address
Configures the IPv4 destination address as a key field. For more information
see match ipv4 destination address, on page 103.
protocol
Configures the IPv4 protocol as a key field.
source address
Configures the IPv4 destination address as a key field. For more information
see match ipv4 source address, on page 104.
tos
Configures the IPv4 ToS as a key field.
ttl
Configures the IPv4 time-to-live (TTL) field as a key field for a flow record.
For more information see match ipv4 ttl, on page 105.
version
Configures the IP version from IPv4 header as a key field.
Command Default
The use of one or more of the IPv4 fields as a key field for a user-defined flow record is not enabled.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv4 protocol as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv4 protocol
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
102
match ipv4 destination address
match ipv4 destination address
To configure the IPv4 destination address as a key field for a flow record, use the match ipv4 destination
address command in flow record configuration mode. To disable the IPv4 destination address as a key field
for a flow record, use the no form of this command.
match ipv4 destination address
no match ipv4 destination address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv4 destination address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv4 destination address or default match
ipv4 destination address flow record configuration command.
Examples
The following example configures the IPv4 destination address as a key field for a flow record:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv4 destination address
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
103
match ipv4 source address
match ipv4 source address
To configure the IPv4 source address as a key field for a flow record, use the match ipv4 source address
command in flow record configuration mode. To disable the use of the IPv4 source address as a key field for
a flow record, use the no form of this command.
match ipv4 source address
no match ipv4 source address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv4 source address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv4 source address or default match ipv4
source address flow record configuration command.
Examples
The following example configures the IPv4 source address as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv4 source address
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
104
match ipv4 ttl
match ipv4 ttl
To configure the IPv4 time-to-live (TTL) field as a key field for a flow record, use the match ipv4 ttl command
in flow record configuration mode. To disable the use of the IPv4 TTL field as a key field for a flow record,
use the no form of this command.
match ipv4 ttl
no match ipv4 ttl
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv4 time-to-live (TTL) field is not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match ipv4 ttl command.
Examples
The following example configures IPv4 TTL as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv4 ttl
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
105
match ipv6
match ipv6
To configure one or more of the IPv6 fields as a key field for a flow record, use the match ipv6 command in
flow record configuration mode. To disable the use of one or more of the IPv6 fields as a key field for a flow
record, use the no form of this command.
match ipv6 {destination address| hop-limit| protocol| source address| traffic-class| version}
no match ipv6 {destination address| hop-limit| protocol| source address| traffic-class| version}
Syntax Description
destination address
Configures the IPv4 destination address as a key field. For more
information see match ipv6 destination address, on page 107.
hop-limit
Configures the IPv6 hop limit as a key field. For more information see
match ipv6 hop-limit, on page 108.
protocol
Configures the IPv6 protocol as a key field.
source address
Configures the IPv4 destination address as a key field. For more
information see match ipv6 source address, on page 109.
traffic-class
Configures the IPv6 traffic class as a key field.
version
Configures the IPv6 version from IPv6 header as a key field.
Command Default
The IPv6 fields are not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv6 protocol field as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv6 protocol
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
106
match ipv6 destination address
match ipv6 destination address
To configure the IPv6 destination address as a key field for a flow record, use the match ipv6 destination
address command in flow record configuration mode. To disable the IPv6 destination address as a key field
for a flow record, use the no form of this command.
match ipv6 destination address
no match ipv6 destination address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv6 destination address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv6 destination address or default match
ipv6 destination address flow record configuration command.
Examples
The following example configures the IPv6 destination address as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv6 destination address
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
107
match ipv6 hop-limit
match ipv6 hop-limit
To configure the IPv6 hop limit as a key field for a flow record, use the match ipv6 hop-limit command in
flow record configuration mode. To disable the use of a section of an IPv6 packet as a key field for a flow
record, use the no form of this command.
match ipv6 hop-limit
no match ipv6 hop-limit
Syntax Description
This command has no arguments or keywords.
Command Default
The use of the IPv6 hop limit as a key field for a user-defined flow record is not enabled by default.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the hop limit of the packets in the flow as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv6 hop-limit
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
108
match ipv6 source address
match ipv6 source address
To configure the IPv6 source address as a key field for a flow record, use the match ipv6 source address
command in flow record configuration mode. To disable the use of the IPv6 source address as a key field for
a flow record, use the no form of this command.
match ipv6 source address
no match ipv6 source address
Syntax Description
This command has no arguments or keywords.
Command Default
The IPv6 source address is not configured as a key field.
Command Modes
Flow record configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
To return this command to its default settings, use the no match ipv6 source address or default match ipv6
source address flow record configuration command.
Examples
The following example configures a IPv6 source address as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match ipv6 source address
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
109
match transport
match transport
To configure one or more of the transport fields as a key field for a flow record, use the match transport
command in flow record configuration mode. To disable the use of one or more of the transport fields as a
key field for a flow record, use the no form of this command.
match transport {destination-port| icmp ipv4| icmp ipv6| igmp type| source-port}
no match transport {destination-port| icmp ipv4| icmp ipv6| igmp type| source-port}
Syntax Description
destination-port
Configures the transport destination port as a key field.
icmp ipv4
Configures the ICMP IPv4 type field and the code field as key fields. For
more information see, match transport icmp ipv4, on page 111.
icmp ipv6
Configures the ICMP IPv6 type field and the code field as key fields. For
more information see, match transport icmp ipv6, on page 112.
igmp type
Configures time stamps based on the system uptime as a key field.
source-port
Configures the transport source port as a key field.
Command Default
The transport fields are not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the destination port as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match transport destination-port
The following example configures the source port as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match transport source-port
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
110
match transport icmp ipv4
match transport icmp ipv4
To configure the ICMP IPv4 type field and the code field as key fields for a flow record, use the match
transport icmp ipv4 command in flow record configuration mode. To disable the use of the ICMP IPv4 type
field and code field as key fields for a flow record, use the no form of this command.
match transport icmp ipv4 {code| type}
no match transport icmp ipv4 {code| type}
Syntax Description
code
Configures the IPv4 ICMP code as a key field.
type
Configures the IPv4 ICMP type as a key field.
Command Default
The ICMP IPv4 type field and the code field are not configured as key fields.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv4 ICMP code field as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match transport icmp ipv4 code
The following example configures the IPv4 ICMP type field as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match transport icmp ipv4 type
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
111
match transport icmp ipv6
match transport icmp ipv6
To configure the ICMP IPv6 type field and the code field as key fields for a flow record, use the match
transport icmp ipv6 command in flow record configuration mode. To disable the use of the ICMP IPv6 type
field and code field as key fields for a flow record, use the no form of this command.
match transport icmp ipv6 {code| type}
no match transport icmp ipv6 {code| type}
Syntax Description
code
Configures the IPv6 ICMP code as a key field.
type
Configures the IPv6 ICMP type as a key field.
Command Default
The ICMP IPv6 type field and the code field are not configured as key fields.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields distinguish
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the IPv6 ICMP code field as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match transport icmp ipv6 code
The following example configures the IPv6 ICMP type field as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match transport icmp ipv6 type
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
112
match wireless ssid (wireless)
match wireless ssid (wireless)
To configure the SSID of the wireless network as a key field for a flow record, use the match wireless ssid
command in flow record configuration mode. To disable the use of the SSID of the wireless network as a key
field for a flow record, use the no form of this command
match wireless ssid
no match wireless ssid
Syntax Description
This command has no arguments or keywords.
Command Default
The SSID of the wireless network is not configured as a key field.
Command Modes
Flow record configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A flow record requires at least one key field before it can be used in a flow monitor. The key fields differentiate
flows, with each flow having a unique set of values for the key fields. The key fields are defined using the
match command.
Examples
The following example configures the SSID of the wireless network as a key field:
Switch(config)# flow record FLOW-RECORD-1
Switch(config-flow-record)# match wireless ssid
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
113
mode random 1 out-of
mode random 1 out-of
To enable random sampling and to specify the packet interval for a Flexible NetFlow sampler, use the mode
random 1 out-of command in sampler configuration mode. To remove the packet interval information for a
Flexible NetFlow sampler, use the no form of this command.
mode random 1 out-of window-size
no mode
Syntax Description
window-size
Specifies the window size from which to select packets. The range is 2 to
1024.
Command Default
The mode and the packet interval for a sampler are not configured.
Command Modes
Sampler configuration
Command History
Usage Guidelines
Note
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A total of four unique samplers are supported on the switch. Packets are chosen in a manner that should
eliminate any bias from traffic patterns and counter any attempt by users to avoid monitoring.
The deterministic keyword is not supported, even though it is visible in the command-line help string.
The following example enables random sampling with a window size of 1000:
Switch(config)# sampler SAMPLER-1
Switch(config-sampler)# mode random 1 out-of 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
114
option
option
To configure optional data parameters for a flow exporter for Flexible NetFlow, use the option command in
flow exporter configuration mode. To remove optional data parameters for a flow exporter, use the no form
of this command.
option {application-table| exporter-stats| interface-table| sampler-table| usermac-table} [timeout seconds]
no option {application-table| exporter-stats| interface-table| sampler-table| usermac-table}
Syntax Description
Configures the application table option for flow exporters.
application-table
This keyword is specific to the AVC feature. For more information,
see the System Management Configuration Guide, Cisco IOS XE
Release 3SE.
exporter-stats
Configures the exporter statistics option for flow exporters.
interface-table
Configures the interface table option for flow exporters.
sampler-table
Configures the export sampler table option for flow exporters.
usermac-table
(Optional) Configures the wireless usermac to username table option.
timeout seconds
(Optional) Configures the option resend time in seconds for flow
exporters. The range is 1 to 86400. The default is 600.
Command Default
The timeout is 600 seconds. All other optional data parameters are not configured.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The option application-table command causes the periodic sending of an options table, which will allow the
collector to map the Network Based Application Recognition (NBAR) application IDs provided in the flow
records to application names. The optional timeout can alter the frequency at which the reports are sent. This
keyword is specific to the AVC feature. For more information, see the System Management Configuration
Guide, Cisco IOS XE Release 3SE.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
115
option
The option exporter-stats command causes the periodic sending of the exporter statistics, including the
number of records, bytes, and packets sent. This command allows the collector to estimate packet loss for the
export records it receives. The optional timeout alters the frequency at which the reports are sent.
The option interface-table command causes the periodic sending of an options table, which allows the
collector to map the interface SNMP indexes provided in the flow records to interface names. The optional
timeout can alter the frequency at which the reports are sent.
The option usermac-table command causes the periodic sending of an options table, which allows the collector
to map the user names of the wireless clients provided in the flow records to their MAC address. The optional
timeout can alter the frequency at which the reports are sent.
The option sampler-table command causes the periodic sending of an options table, which details the
configuration of each sampler and allows the collector to map the sampler ID provided in any flow record to
a configuration that it can use to scale up the flow statistics. The optional timeout can alter the frequency at
which the reports are sent.
To return this command to its default settings, use the no option or default option flow exporter configuration
command.
Examples
The following example shows how to enable the periodic sending of the application option table, which allows
the collector to map the application ID to the application name:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# option application-table
The following example shows how to enable the periodic sending of the application option table at a lower
frequency than usual, just once per day:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# option application-table timeout 86400
The following example shows how to enable the periodic sending of the sampler option table, which allows
the collector to map the sampler ID to the sampler type and rate:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# option sampler-table
The following example shows how to enable the periodic sending of the usermac option table, which allows
the collector to map the wireless user mac to the user name:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# option usermac-table
The following example shows how to enable the periodic sending of the exporter statistics, including the
number of records, bytes, and packets sent:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# option exporter-stats
The following example shows how to enable the periodic sending of an options table, which allows the
collector to map the interface SNMP indexes provided in the flow records to interface names:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# option interface-table
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
116
record
record
To add a flow record for a Flexible NetFlow flow monitor, use the record command in flow monitor
configuration mode. To remove a flow record for a Flexible NetFlow flow monitor, use the no form of this
command.
record record-name
no record
Syntax Description
record-name
Name of a user-defined flow record that was previously configured.
Command Default
A flow record is not configured.
Command Modes
Flow monitor configuration
Command History
Usage Guidelines
Note
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Each flow monitor requires a record to define the contents and layout of its cache entries. The flow monitor
can use one of the wide range of predefined record formats, or advanced users may create their own record
formats.
You must use the no ip flow monitor command to remove a flow monitor from all of the interfaces to
which you have applied it before you can modify the parameters for the record command for the flow
monitor.
The following example configures the flow monitor to use FLOW-RECORD-1:
Switch(config)# flow monitor FLOW-MONITOR-1
Switch(config-flow-monitor)# record FLOW-RECORD-1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
117
sampler
sampler
To create a Flexible NetFlow flow sampler, or to modify an existing Flexible NetFlow flow sampler, and to
enter Flexible NetFlow sampler configuration mode, use the sampler command in global configuration mode.
To remove a sampler, use the no form of this command.
sampler sampler-name
no sampler sampler-name
Syntax Description
sampler-name
Name of the flow sampler that is being created or modified.
Command Default
Flexible NetFlow flow samplers are not configured.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Flow samplers are used to reduce the load placed by Flexible NetFlow on the networking device to monitor
traffic by limiting the number of packets that are analyzed. You configure a rate of sampling that is 1 out of
a range of 2-1024 packets. Flow samplers are applied to interfaces in conjunction with a flow monitor to
implement sampled Flexible NetFlow.
To enable flow sampling, you configure the record that you want to use for traffic analysis and assign it to a
flow monitor. When you apply a flow monitor with a sampler to an interface, the sampled packets are analyzed
at the rate specified by the sampler and compared with the flow record associated with the flow monitor. If
the analyzed packets meet the criteria specified by the flow record, they are added to the flow monitor cache.
Examples
The following example creates a flow sampler name SAMPLER-1:
Switch(config)# sampler SAMPLER-1
Switch(config-sampler)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
118
show flow exporter
show flow exporter
To display flow exporter status and statistics, use the show flow exporter command in privileged EXEC
mode.
show flow exporter [broker [detail| picture]| export-ids netflow-v9| [name] exporter-name [statistics|
templates]| option application {engines| table}| statistics| templates]
Syntax Description
broker
(Optional) Displays information about the state of the broker for the Flexible
NetFlow flow exporter.
detail
(Optional) Displays detailed information about the flow exporter broker.
picture
(Optional) Displays a picture of the broker state.
export-ids netflow-v9
(Optional) Displays the NetFlow Version 9 export fields that can be exported
and their IDs.
name
(Optional) Specifies the name of a flow exporter.
exporter-name
(Optional) Name of a flow exporter that was previously configured.
statistics
(Optional) Displays statistics for all flow exporters or for the specified flow
exporter.
templates
(Optional) Displays template information for all flow exporters or for the
specified flow exporter.
option application engines
(Optional) Displays the application engines option for flow exporters.
option application table
(Optional) Displays the application table option for flow exporters.
This option is specific to the AVC feature. For more information, see the
System Management Configuration Guide, Cisco IOS XE Release 3SE.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
119
show flow exporter
Examples
The following example displays the status and statistics for all of the flow exporters configured on a switch:
Switch# show flow exporter
Flow Exporter FLOW-EXPORTER-1:
Description:
Exports to the datacenter
Export protocol:
NetFlow Version 9
Transport Configuration:
Destination IP address: 192.168.0.1
Source IP address:
192.168.0.2
Transport Protocol:
UDP
Destination Port:
9995
Source Port:
55864
DSCP:
0x0
TTL:
255
Output Features:
Used
This table describes the significant fields shown in the display:
Table 6: show flow exporter Field Descriptions
Field
Description
Flow Exporter
The name of the flow exporter that you configured.
Description
The description that you configured for the exporter,
or the default description User defined.
Transport Configuration
The transport configuration fields for this exporter.
Destination IP address
The IP address of the destination host.
Source IP address
The source IP address used by the exported packets.
Transport Protocol
The transport layer protocol used by the exported
packets.
Destination Port
The destination UDP port to which the exported
packets are sent.
Source Port
The source UDP port from which the exported packets
are sent.
DSCP
The differentiated services code point (DSCP) value.
TTL
The time-to-live value.
Output Features
Specifies whether the output-features command,
which causes the output features to be run on Flexible
NetFlow export packets, has been used or not.
The following example displays the status and statistics for all of the flow exporters configured on a switch:
Switch# show flow exporter name FLOW-EXPORTER-1 statistics
Flow Exporter FLOW-EXPORTER-1:
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
120
show flow exporter
Packet send statistics (last cleared 2w6d ago):
Successfully sent:
0
(0 bytes)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
121
show flow interface
show flow interface
To display the Flexible NetFlow configuration and status for an interface, use the show flow interface
command in privileged EXEC mode.
show flow interface [type number]
Syntax Description
Command Modes
Command History
Examples
type
(Optional) The type of interface on which you want to display Flexible NetFlow
accounting configuration information.
number
(Optional) The number of the interface on which you want to display Flexible
NetFlow accounting configuration information.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following example displays the Flexible NetFlow accounting configuration on Ethernet interfaces 0/0
and 0/1:
Switch# show flow interface gigabitethernet1/0/1
Interface Ethernet1/0
monitor:
FLOW-MONITOR-1
direction:
Output
traffic(ip):
on
Switch# show flow interface gigabitethernet1/0/2
Interface Ethernet0/0
monitor:
FLOW-MONITOR-1
direction:
Input
traffic(ip):
sampler SAMPLER-2#
The table below describes the significant fields shown in the display.
Table 7: show flow interface Field Descriptions
Field
Description
Interface
The interface to which the information applies.
monitor
The name of the flow monitor that is configured on
the interface.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
122
show flow interface
Field
Description
direction:
The direction of traffic that is being monitored by the
flow monitor.
The possible values are:
• Input—Traffic is being received by the
interface.
• Output—Traffic is being transmitted by the
interface.
traffic(ip)
Indicates if the flow monitor is in normal mode or
sampler mode.
The possible values are:
• on—The flow monitor is in normal mode.
• sampler—The flow monitor is in sampler mode
(the name of the sampler will be included in the
display).
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
123
show flow monitor
show flow monitor
To display the status and statistics for a Flexible NetFlow flow monitor, use the show flow monitor command
in privileged EXEC mode.
show flow monitor [broker [detail| picture]| [name] monitor-name [cache [format {csv| record| table}]]|
provisioning| statistics]
Syntax Description
Command Modes
Command History
Usage Guidelines
broker
(Optional) Displays information about the state of the broker for the flow
monitor
detail
(Optional) Displays detailed information about the flow monitor broker.
picture
(Optional) Displays a picture of the broker state.
name
(Optional) Specifies the name of a flow monitor.
monitor-name
(Optional) Name of a flow monitor that was previously configured.
cache
(Optional) Displays the contents of the cache for the flow monitor.
format
(Optional) Specifies the use of one of the format options for formatting the
display output.
csv
(Optional) Displays the flow monitor cache contents in comma-separated
variables (CSV) format.
record
(Optional) Displays the flow monitor cache contents in record format.
table
(Optional) Displays the flow monitor cache contents in table format.
provisioning
(Optional) Displays the flow monitor provisioning information.
statistics
(Optional) Displays the statistics for the flow monitor.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The cache keyword uses the record format by default.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
124
show flow monitor
The uppercase field names in the display output of the show flowmonitor monitor-name cache command
are key fields that Flexible NetFlow uses to differentiate flows. The lowercase field names in the display
output of the show flow monitor monitor-name cache command are nonkey fields from which Flexible
NetFlow collects values as additional data for the cache.
Examples
The following example displays the status for a flow monitor:
Switch# show flow monitor FLOW-MONITOR-1
Flow Monitor FLOW-MONITOR-1:
Description:
Used for basic traffic analysis
Flow Record:
flow-record-1
Flow Exporter:
flow-exporter-1
flow-exporter-2
Cache:
Type:
normal
Status:
allocated
Size:
4096 entries / 311316 bytes
Inactive Timeout: 15 secs
Active Timeout:
1800 secs
This table describes the significant fields shown in the display.
Table 8: show flow monitor monitor-name Field Descriptions
Field
Description
Flow Monitor
Name of the flow monitor that you configured.
Description
Description that you configured or the monitor, or
the default description User defined.
Flow Record
Flow record assigned to the flow monitor.
Flow Exporter
Exporters that are assigned to the flow monitor.
Cache
Information about the cache for the flow monitor.
Type
Flow monitor cache type. The value is always normal,
as it is the only supported cache type.
Status
Status of the flow monitor cache.
The possible values are:
• allocated—The cache is allocated.
• being deleted—The cache is being deleted.
• not allocated—The cache is not allocated.
Size
Current cache size.
Inactive Timeout
Current value for the inactive timeout in seconds.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
125
show flow monitor
Field
Description
Active Timeout
Current value for the active timeout in seconds.
The following example displays the status, statistics, and data for the flow monitor named FLOW-MONITOR-1:
Switch# show flow monitor FLOW-MONITOR-1 cache
Cache type:
Normal (Platform cache)
Cache size:
Unknown
Current entries:
1
Flows added:
Flows aged:
- Active timeout
(
3
2
2
300 secs)
DATALINK MAC SOURCE ADDRESS INPUT:
DATALINK MAC DESTINATION ADDRESS INPUT:
IPV6 SOURCE ADDRESS:
IPV6 DESTINATION ADDRESS:
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
IP VERSION:
IP PROTOCOL:
IP TOS:
IP TTL:
tcp flags:
counter bytes long:
counter packets long:
0000.0000.1000
6400.F125.59E6
2001:DB8::1
2001:DB8:1::1
1111
2222
6
6
0x05
11
0x20
132059538
1158417
This table describes the significant fields shown in the display.
Table 9: show flow monitor monitor-name cache Field Descriptions
Field
Description
Cache type
Flow monitor cache type. The value is always normal,
as it is the only supported cache type.
Cache Size
Number of entries in the cache.
Current entries
Number of entries in the cache that are in use.
Flows added
Flows added to the cache since the cache was created.
Flows aged
Flows expired from the cache since the cache was
created.
Active timeout
Current value for the active timeout in seconds.
Inactive timeout
Current value for the inactive timeout in seconds.
DATALINK MAC SOURCE ADDRESS INPUT
MAC source address of input packets.
DATALINK MAC DESTINATION ADDRESS
INPUT
MAC destination address of input packets.
IPV6 SOURCE ADDRESS
IPv6 source address.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
126
show flow monitor
Field
Description
IPV6 DESTINATION ADDRESS
IPv6 destination address.
TRNS SOURCE PORT
Source port for the transport protocol.
TRNS DESTINATION PORT
Destination port for the transport protocol.
IP VERSION
IP version.
IP PROTOCOL
Protocol number.
IP TOS
IP type of service (ToS) value.
IP TTL
IP time-to-live (TTL) value.
tcp flags
Value of the TCP flags.
counter bytes
Number of bytes that have been counted.
counter packets
Number of packets that have been counted.
The following example displays the status, statistics, and data for the flow monitor named FLOW-MONITOR-1
in a table format:
Switch# show flow monitor FLOW-MONITOR-1 cache format table
Cache type:
Normal (Platform cache)
Cache size:
Unknown
Current entries:
1
Flows added:
Flows aged:
- Active timeout
(
300 secs)
3
2
2
DATALINK MAC SRC ADDR INPUT DATALINK MAC DST ADDR INPUT IPV6 SRC ADDR IPV6 DST ADDR
TRNS SRC PORT TRNS DST PORT IP VERSION IP PROT IP TOS IP TTL tcp flags bytes long
pkts long
=========================== =========================== ============= =============
============= ============= ========== ======= ====== ====== ========= ==========
=========
0000.0000.1000
6400.F125.59E6
2001:DB8::1
2001:DB8:1::1
1111
2222
6
6 0x05
11 0x20
132059538
1158417
The following example displays the status, statistics, and data for the flow monitor named
FLOW-MONITOR-IPv6 (the cache contains IPv6 data) in record format:
Switch# show flow monitor name FLOW-MONITOR-IPv6 cache format record
Cache type:
Normal (Platform cache)
Cache size:
Unknown
Current entries:
1
Flows added:
Flows aged:
- Active timeout
(
300 secs)
DATALINK MAC SOURCE ADDRESS INPUT:
DATALINK MAC DESTINATION ADDRESS INPUT:
IPV6 SOURCE ADDRESS:
IPV6 DESTINATION ADDRESS:
3
2
2
0000.0000.1000
6400.F125.59E6
2001::2
2002::2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
127
show flow monitor
TRNS SOURCE PORT:
TRNS DESTINATION PORT:
IP VERSION:
IP PROTOCOL:
IP TOS:
IP TTL:
tcp flags:
counter bytes long:
counter packets long:
1111
2222
6
6
0x05
11
0x20
132059538
1158417
The following example displays the status and statistics for a flow monitor:
Switch# show flow monitor FLOW-MONITOR-1 statistics
Cache type:
Normal (Platform cache)
Cache size:
Unknown
Current entries:
1
Flows added:
Flows aged:
- Active timeout
(
300 secs)
3
2
2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
128
show flow record
show flow record
To display the status and statistics for a Flexible NetFlow flow record, use the show flow record command
in privileged EXEC mode.
show flow record [broker [detail| picture]| [name] record-name]
Syntax Description
broker
(Optional) Displays information about the state of the broker for the Flexible
NetFlow flow record.
detail
(Optional) Displays detailed information about the flow record broker.
picture
(Optional) Displays a picture of the broker state.
name
(Optional) Specifies the name of a flow record.
record-name
(Optional) Name of a user-defined flow record that was previously configured.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The following example displays the status and statistics for FLOW-RECORD-1:
Switch# show flow record FLOW-RECORD-1
flow record FLOW-RECORD-1:
Description:
User defined
No. of users:
0
Total field space: 24 bytes
Fields:
match ipv6 destination address
match transport source-port
collect interface input
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
129
show flow record wireless avc basic (wireless)
show flow record wireless avc basic (wireless)
This command is specific to the AVC feature. To view default flow record information, use the show flow
record wireless avc basic command in privileged EXEC mode.
show flow record wireless avc basic
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
If a user-defined flow record has not been specified, then the default flow record wireless avc basic is mapped
to the flow monitor.
This command is specific to the AVC feature. For more information, see the System Management Configuration
Guide, Cisco IOS XE Release 3SE.
Examples
This command is specific to the AVC feature. For examples, see the System Management Configuration
Guide, Cisco IOS XE Release 3SE.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
130
show sampler
show sampler
To display the status and statistics for a Flexible NetFlow sampler, use the show sampler command in
privileged EXEC mode.
show sampler [broker [detail| picture]| [name] sampler-name]
Syntax Description
broker
(Optional) Displays information about the state of the broker for the Flexible
NetFlow sampler.
detail
(Optional) Displays detailed information about the sampler broker.
picture
(Optional) Displays a picture of the broker state.
name
(Optional) Specifies the name of a sampler.
sampler-name
(Optional) Name of a sampler that was previously configured.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The following example displays the status and statistics for all of the flow samplers configured:
Switch# show sampler
Sampler SAMPLER-1:
ID:
2083940135
export ID:
0
Description:
User defined
Type:
Invalid (not in use)
Rate:
1 out of 32
Samples:
0
Requests:
0
Users (0):
Sampler SAMPLER-2:
ID:
3800923489
export ID:
1
Description:
User defined
Type:
random
Rate:
1 out of 100
Samples:
1
Requests:
124
Users (1):
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
131
show sampler
flow monitor FLOW-MONITOR-1 (datalink,vlan1)
0 out of 0
This table describes the significant fields shown in the display.
Table 10: show sampler Field Descriptions
Field
Description
ID
ID number of the flow sampler.
Export ID
ID of the flow sampler export.
Description
Description that you configured for the flow sampler,
or the default description User defined.
Type
Sampling mode that you configured for the flow
sampler.
Rate
Window size (for packet selection) that you
configured for the flow sampler. The range is 2 to
32768.
Samples
Number of packets sampled since the flow sampler
was configured or the switch was restarted. This is
equivalent to the number of times a positive response
was received when the sampler was queried to
determine if the traffic needed to be sampled. See the
explanation of the Requests field in this table.
Requests
Number of times the flow sampler was queried to
determine if the traffic needed to be sampled.
Users
Interfaces on which the flow sampler is configured.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
132
source
source
To configure the source IP address interface for all of the packets sent by a Flexible NetFlow flow exporter,
use the source command in flow exporter configuration mode. To remove the source IP address interface for
all of the packets sent by a Flexible NetFlow flow exporter, use the no form of this command.
source interface-type interface-number
no source
Syntax Description
interface-type
Type of interface whose IP address you want to use for the source IP address
of the packets sent by a Flexible NetFlow flow exporter.
interface-number
Interface number whose IP address you want to use for the source IP address
of the packets sent by a Flexible NetFlow flow exporter.
Command Default
The IP address of the interface over which the Flexible NetFlow datagram is transmitted is used as the source
IP address.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The benefits of using a consistent IP source address for the datagrams that Flexible NetFlow sends include
the following:
• The source IP address of the datagrams exported by Flexible NetFlow is used by the destination system
to determine from which switch the Flexible NetFlow data is arriving. If your network has two or more
paths that can be used to send Flexible NetFlow datagrams from the switch to the destination system
and you do not specify the source interface from which the source IP address is to be obtained, the switch
uses the IP address of the interface over which the datagram is transmitted as the source IP address of
the datagram. In this situation the destination system might receive Flexible NetFlow datagrams from
the same switch, but with different source IP addresses. When the destination system receives Flexible
NetFlow datagrams from the same switch with different source IP addresses, the destination system
treats the Flexible NetFlow datagrams as if they were being sent from different switches. To avoid having
the destination system treat the Flexible NetFlow datagrams as if they were being sent from different
switches, you must configure the destination system to aggregate the Flexible NetFlow datagrams it
receives from all of the possible source IP addresses in the switch into a single Flexible NetFlow flow.
• If your switch has multiple interfaces that can be used to transmit datagrams to the destination system,
and you do not configure the source command, you will have to add an entry for the IP address of each
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
133
source
interface into any access lists that you create for permitting Flexible NetFlow traffic. Creating and
maintaining access lists for permitting Flexible NetFlow traffic from known sources and blocking it
from unknown sources is easier when you limit the source IP address for Flexible NetFlow datagrams
to a single IP address for each switch that is exporting Flexible NetFlow traffic.
Caution
The interface that you configure as the source interface must have an IP address configured, and it must
be up.
Tip
When a transient outage occurs on the interface that you configured with the source command, the Flexible
NetFlow exporter reverts to the default behavior of using the IP address of the interface over which the
datagrams are being transmitted as the source IP address for the datagrams. To avoid this problem, use a
loopback interface as the source interface because loopback interfaces are not subject to the transient
outages that can occur on physical interfaces.
To return this command to its default settings, use the no source or default source flow exporter configuration
command.
Examples
The following example shows how to configure Flexible NetFlow to use a loopback interface as the source
interface for NetFlow traffic:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# source loopback 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
134
template data timeout
template data timeout
To specify a timeout period for resending flow exporter template data, use the template data timeout command
in flow exporter configuration mode. To remove the template resend timeout for a flow exporter, use the no
form of this command.
template data timeout seconds
no template data timeout seconds
Syntax Description
seconds
Timeout value in seconds. The range is 1 to 86400. The default is 600.
Command Default
The default template resend timeout for a flow exporter is 600 seconds.
Command Modes
Flow exporter configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Flow exporter template data describes the exported data records. Data records cannot be decoded without the
corresponding template. The template data timeout command controls how often those templates are exported.
To return this command to its default settings, use the no template data timeout or default template data
timeout flow record exporter command.
Examples
The following example configures resending templates based on a timeout of 1000 seconds:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# template data timeout 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
135
transport
transport
To configure the transport protocol for a flow exporter for Flexible NetFlow, use the transport command in
flow exporter configuration mode. To remove the transport protocol for a flow exporter, use the no form of
this command.
transport udp udp-port
no transport udp udp-port
Syntax Description
udp udp-port
Specifies User Datagram Protocol (UDP) as the transport protocol and the
UDP port number.
Command Default
Flow exporters use UDP on port 9995.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default settings, use the no transport or default transport flow exporter
configuration command.
Examples
The following example configures UDP as the transport protocol and a UDP port number of 250:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# transport udp 250
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
136
ttl
ttl
To configure the time-to-live (TTL) value, use the ttl command in flow exporter configuration mode. To
remove the TTL value, use the no form of this command.
ttl ttl
no ttl ttl
Syntax Description
ttl
Time-to-live (TTL) value for exported datagrams. The range is 1 to 255. The default is
255.
Command Default
Flow exporters use a TTL of 255.
Command Modes
Flow exporter configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To return this command to its default settings, use the no ttl or default ttl flow exporter configuration command.
Examples
The following example specifies a TTL of 15:
Switch(config)# flow exporter FLOW-EXPORTER-1
Switch(config-flow-exporter)# ttl 15
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
137
ttl
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
138
PART
III
Interface and Hardware Components
• Interface and Hardware Commands, page 141
Interface and Hardware Commands
• client vlan, page 144
• debug fastethernet, page 145
• debug ilpower, page 146
• debug interface, page 148
• debug lldp packets, page 150
• debug nmsp, page 151
• debug platform fallback-bridging, page 152
• debug platform poe, page 154
• debug platform port-security, page 155
• duplex, page 156
• errdisable detect cause, page 158
• errdisable detect cause small-frame, page 160
• errdisable recovery cause, page 161
• errdisable recovery cause small-frame, page 164
• errdisable recovery interval, page 165
• interface, page 166
• interface range, page 168
• ip mtu, page 169
• ipv6 mtu, page 171
• l2protocol-tunnel point-to-point, page 173
• l2protocol-tunnel drop-threshold point-to-point, page 175
• l2protocol-tunnel shutdown-threshold point-to-point, page 177
• lldp (interface configuration), page 179
• logging event power-inline-status, page 181
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
141
• mdix auto, page 182
• mode (power-stack configuration), page 183
• network-policy, page 185
• network-policy profile (global configuration), page 186
• network-policy profile (network-policy configuration), page 187
• nmsp attachment suppress, page 189
• power-priority , page 190
• power inline, page 192
• power inline consumption, page 195
• power inline police, page 198
• power supply, page 200
• psp, page 202
• show CAPWAP summary, page 203
• show controllers cpu-interface, page 204
• show controllers ethernet phy macsec, page 206
• show controllers ethernet-controller, page 208
• show controllers power inline, page 217
• show controllers tcam, page 218
• show controllers utilization, page 220
• show env, page 222
• show errdisable detect, page 225
• show errdisable recovery, page 226
• show interfaces, page 227
• show interfaces counters, page 231
• show interfaces switchport, page 233
• show interfaces transceiver, page 237
• show mgmt-infra trace messages ilpower, page 239
• show mgmt-infra trace messages ilpower-ha, page 241
• show mgmt-infra trace messages platform-mgr-poe, page 242
• show network-policy profile, page 243
• show platform CAPWAP summary, page 244
• show power inline, page 245
• show system mtu, page 251
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
142
• show wireless interface summary, page 252
• small-frame violation rate, page 253
• speed, page 254
• stack-power , page 256
• switchport backup interface, page 258
• switchport block, page 260
• system mtu, page 261
• voice-signaling vlan (network-policy configuration), page 262
• voice vlan (network-policy configuration), page 264
• wireless ap-manager interface, page 266
• wireless exclusionlist, page 267
• wireless linktest, page 268
• wireless management interface, page 269
• wireless peer-blocking forward-upstream, page 270
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
143
client vlan
client vlan
To configure a WLAN interface or an interface group, use the client vlan command. To disable the WLAN
interface, use the no form of this command.
client vlan interface-id-name-or-group-name
no client vlan
Syntax Description
interface-id-name-or-group-name
Command Default
The default interface is configured.
Command Modes
WLAN configuration
Command History
Interface ID, name, or VLAN group name. The interface ID can
also be in digits too.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You must disable the WLAN before using this command. See Related Commands section for more information
on how to disable a WLAN.
Examples
This example shows how to enable a client VLAN on a WLAN:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# wlan wlan1
Switch(config-wlan)# client vlan client-vlan1
Switch(config-wlan)# end
This example shows how to disable a client VLAN on a WLAN:
Switch# configure terminal
Enter configuration commands, one per line.
Switch(config)# wlan wlan1
Switch(config-wlan)# no client vlan
Switch(config-wlan)# end
Related Commands
End with CNTL/Z.
Command
Description
wlan
Creates or disables a WLAN.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
144
debug fastethernet
debug fastethernet
To enable debugging of the Ethernet management port, use the debug fastethernet command in EXEC mode.
To disable debugging, use the no form of this command.
debug fastethernet {af| events| packets}
no debug fastethernet {af| events| packets}
Syntax Description
af
Displays Ethernet management port software-address-filter debug messages.
events
Displays Ethernet management port event debug messages.
packets
Displays Ethernet management port packet debug messages.
Command Default
Debugging is disabled.
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The undebug fastethernet { af | events | packets} command is the same as the no debug fastethernet{af|
events | packets} command.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Related Commands
Command
Description
show debugging
Displays information about the types of debugging
that are enabled.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
145
debug ilpower
debug ilpower
To enable debugging of the power controller and Power over Ethernet (PoE) system, use the debug ilpower
command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug ilpower {cdp| controller| event| ha| ipc| police| port| powerman| registries| scp | sense}
no debug ilpower {cdp| controller| event| ha| ipc| police| port| powerman| registries| scp | sense}
Syntax Description
cdp
Displays PoE Cisco Discovery Protocol (CDP) debug messages.
controller
Displays PoE controller debug messages.
event
Displays PoE event debug messages.
ha
Displays PoE high-availability messages.
ipc
Displays PoE Inter-Process Communication (IPC) debug messages.
police
Displays PoE police debug messages.
port
Displays PoE port manager debug messages.
powerman
Displays PoE power management debug messages.
registries
Displays PoE registries debug messages.
scp
Displays PoE SCP debug messages.
sense
Displays PoE sense debug messages.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This command is supported only on PoE-capable switches.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
146
debug ilpower
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
147
debug interface
debug interface
To enable debugging of interface-related activities, use the debug interface command in privileged EXEC
mode. To disable debugging, use the no form of this command.
debug interface {interface-id| counters {exceptions| protocol memory} | null interface-number| port-channel
port-channel-number| states|vlan vlan-id}
no debug interface {interface-id| counters {exceptions| protocol memory} | null interface-number|
port-channel port-channel-number| states|vlan vlan-id}
Syntax Description
interface-id
ID of the physical interface. Displays debug messages for the specified
physical port, identified by type switch number/module number/port, for
example, gigabitethernet 1/0/2.
null interface-number
Displays debug messages for null interfaces. The interface number is always
0.
port-channel
port-channel-number
Displays debug messages for the specified EtherChannel port-channel
interface. The port-channel-number range is 1 to 48.
vlan vlan-id
Displays debug messages for the specified VLAN. The vlan range is 1 to
4094.
counters
Displays counters debugging information.
exceptions
Displays debug messages when a recoverable exceptional condition occurs
during the computation of the interface packet and data rate statistics.
protocol memory
Displays debug messages for memory operations of protocol counters.
states
Displays intermediary debug messages when an interface's state transitions.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
If you do not specify a keyword, all debug messages appear.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
148
debug interface
The undebug interface command is the same as the no debug interface command.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
149
debug lldp packets
debug lldp packets
To enable debugging of Link Layer Discovery Protocol (LLDP) packets, use the debug lldp packets command
in privileged EXEC mode. To disable debugging, use the no form of this command.
debug lldp packets
no debug lldp packets
Syntax Description
This command has no arguments or keywords.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The undebug lldp packets command is the same as the no debug lldp packets command.
When you enable debugging on a switch stack, it is enabled only on the active switch. To enable debugging
on a stack member, you can start a session from the active switch by using the session switch-number EXEC
command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
150
debug nmsp
debug nmsp
To enable debugging of the Network Mobility Services Protocol (NMSP) on the switch, use the debug nmsp
command in privileged EXEC mode. To disable debugging, use the no form of this command.
Syntax Description
all
Displays all NMSP debug messages.
connection
Displays debug messages for NMSP connection events.
error
Displays debugging information for NMSP error messages.
event
Displays debug messages for NMSP events.
rx
Displays debugging information for NMSP receive messages.
tx
Displays debugging information for NMSP transmit messages.
packet
Displays debug messages for NMSP packet events.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The undebug nmsp command is the same as the no debug nmsp command.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
151
debug platform fallback-bridging
debug platform fallback-bridging
To enable debugging of the platform-dependent fallback bridging manager, use the debug platform
fallback-bridging command in EXEC mode. To disable debugging, use the no form of this command.
debug platform fallback-bridging [error| retry| rpc {events| messages}]
no debug platform fallback-bridging [error| retry| rpc {events| messages}]
Syntax Description
error
(Optional) Displays fallback bridging manager error condition messages.
retry
(Optional) Displays fallback bridging manager retry messages.
rpc {events | messages}
(Optional) Displays fallback bridging debugging information. The keywords
have these meanings:
• events—Displays remote procedure call (RPC) events.
• messages —Displays RPC messages.
Command Default
Debugging is disabled.
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
15.0
This command was introduced.
If you do not specify a keyword, all fallback bridging manager debug messages appear.
The undebug platform fallback-bridging command is the same as the no debug platform fallback-bridging
command.
When you enable debugging on a switch stack, it is enabled only on the stack master. To enable debugging
on a stack member, you can start a session from the stack master by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member. You also can
use the remote command stack-member-number LINE EXEC command on the stack master switch to enable
debugging on a member switch without first starting a session.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
152
debug platform fallback-bridging
Related Commands
Command
Description
show debugging
Displays information about the types of debugging
that are enabled.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
153
debug platform poe
debug platform poe
To enable debugging of a Power over Ethernet (PoE) port, use the debug platform poe command in privileged
EXEC mode. To disable debugging, use the no form of this command.
debug platform poe [error| info] [switch switch-number]
no debug platform poe [error| info] [switch switch-number]
Syntax Description
error
(Optional) Displays PoE-related error debug messages.
info
(Optional) Displays PoE-related information debug messages.
switch switch-number
(Optional) Specifies the stack member. This keyword is supported only on
stacking-capable switches.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The undebug platform poe command is the same as the no debug platform poe command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
154
debug platform port-security
debug platform port-security
To enable debugging of platform-dependent port-security information, use the debug platform port-security
command in EXEC mode. To disable debugging, use the no form of this command.
debug platform port-security {add| aging| all| delete| errors| rpc| warnings}
no debug platform port-security {add| aging| all| delete| errors| rpc| warnings}
Syntax Description
add
Displays secure address addition debug messages.
aging
Displays secure address aging debug messages.
all
Displays all port-security debug messages.
delete
Displays secure address deletion debug messages.
errors
Displays port-security error debug messages.
rpc
Displays remote procedure call (RPC) debug messages.
warnings
Displays warning debug messages.
Command Default
Debugging is disabled.
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The undebug platform port-security command is the same as the no debug platform port-security command.
When you enable debugging on a switch stack, it is enabled only on the active switch. To enable debugging
on a stack member, you can start a session from the active switch by using the session switch-number EXEC
command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
155
duplex
duplex
To specify the duplex mode of operation for a port, use the duplex command in interface configuration mode.
To return to the default value, use the no form of this command.
duplex {auto| full| half}
no duplex {auto| full| half}
Syntax Description
Command Default
auto
Enables automatic duplex configuration. The port automatically detects whether it should
run in full- or half-duplex mode, depending on the attached device mode.
full
Enables full-duplex mode.
half
Enables half-duplex mode (only for interfaces operating at 10 or 100 Mb/s). You cannot
configure half-duplex mode for interfaces operating at 1000 or 10,000 Mb/s.
The default is auto for Gigabit Ethernet ports.
You cannot configure the duplex mode on 10-Gigabit Ethernet ports; it is always full.
Duplex options are not supported on the 1000BASE-x or 10GBASE-x (where -x is -BX, -CWDM, -LX, -SX,
or -ZX) small form-factor pluggable (SFP) modules.
Command Modes
Command History
Usage Guidelines
Note
Interface configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
For Gigabit Ethernet ports, setting the port to auto has the same effect as specifying full if the attached device
does not autonegotiate the duplex parameter.
Half-duplex mode is supported on Gigabit Ethernet interfaces if the duplex mode is auto and the connected
device is operating at half duplex. However, you cannot configure these interfaces to operate in half-duplex
mode.
Certain ports can be configured to be either full duplex or half duplex. How this command is applied depends
on the device to which the switch is attached.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
156
duplex
If both ends of the line support autonegotiation, we highly recommend using the default autonegotiation
settings. If one interface supports autonegotiation and the other end does not, configure duplex and speed on
both interfaces, and use the auto setting on the supported side.
If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed setting
and then forces the speed setting to the negotiated value. The duplex setting remains as configured on each
end of the link, which could result in a duplex setting mismatch.
You can configure the duplex setting when the speed is set to auto.
Caution
Changing the interface speed and duplex mode configuration might shut down and reenable the interface
during the reconfiguration.
You can verify your setting by entering the show interfaces privileged EXEC command.
Examples
This example shows how to configure an interface for full-duplex operation:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# duplex full
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
157
errdisable detect cause
errdisable detect cause
To enable error-disable detection for a specific cause or for all causes, use the errdisable detect cause
command in global configuration mode. To disable the error-disable detection feature, use the no form of this
command.
errdisable detect cause {all| arp-inspection| bpduguard shutdown vlan| dhcp-rate-limit| dtp-flap|
gbic-invalid| inline-power| link-flap| loopback| pagp-flap| pppoe-ia-rate-limit | psp shutdown vlan|
security-violation shutdown vlan| sfp-config-mismatch}
no errdisable detect cause {all| arp-inspection| bpduguard shutdown vlan| dhcp-rate-limit| dtp-flap|
gbic-invalid| inline-power| link-flap| loopback| pagp-flap| pppoe-ia-rate-limit | psp shutdown vlan|
security-violation shutdown vlan| sfp-config-mismatch}
Syntax Description
all
Enables error detection for all error-disabled causes.
arp-inspection
Enables error detection for dynamic Address Resolution Protocol (ARP)
inspection.
bpduguard shutdown vlan
Enables per-VLAN error-disable for BPDU guard.
dhcp-rate-limit
Enables error detection for DHCP snooping.
dtp-flap
Enables error detection for the Dynamic Trunking Protocol (DTP)
flapping.
gbic-invalid
Enables error detection for an invalid Gigabit Interface Converter (GBIC)
module.
Note
inline-power
This error refers to an invalid small form-factor pluggable (SFP)
module.
Enables error detection for the Power over Ethernet (PoE) error-disabled
cause.
Note
This keyword is supported only on switches with PoE
ports.
link-flap
Enables error detection for link-state flapping.
loopback
Enables error detection for detected loopbacks.
pagp-flap
Enables error detection for the Port Aggregation Protocol (PAgP) flap
error-disabled cause.
pppoe-ia-rate-limit
Enables error detection for the PPPoE Intermediate Agent rate-limit
error-disabled cause.
psp shutdown vlan
Enables error detection for protocol storm protection (PSP).
security-violation shutdown vlan Enables voice aware 802.1x security.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
158
errdisable detect cause
sfp-config-mismatch
Enables error detection on an SFP configuration mismatch.
Command Default
Detection is enabled for all causes. All causes, except per-VLAN error disabling, are configured to shut down
the entire port.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A cause (such as a link-flap or dhcp-rate-limit) is the reason for the error-disabled state. When a cause is
detected on an interface, the interface is placed in an error-disabled state, an operational state that is similar
to a link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For
the bridge protocol data unit (BPDU) guard, voice-aware 802.1x security, and port-security features, you can
configure the switch to shut down only the offending VLAN on the port when a violation occurs, instead of
shutting down the entire port.
If you set a recovery mechanism for the cause by entering the errdisable recovery global configuration
command, the interface is brought out of the error-disabled state and allowed to retry the operation when all
causes have timed out. If you do not set a recovery mechanism, you must enter the shutdown and then the
no shutdown commands to manually recover an interface from the error-disabled state.
For protocol storm protection, excess packets are dropped for a maximum of two virtual ports. Virtual port
error disabling using the psp keyword is not supported for EtherChannel and Flexlink interfaces.
To verify your settings, enter the show errdisable detect privileged EXEC command.
Examples
This example shows how to enable error-disabled detection for the link-flap error-disabled cause:
Switch(config)# errdisable detect cause link-flap
This command shows how to globally configure BPDU guard for a per-VLAN error-disabled state:
Switch(config)# errdisable detect cause bpduguard shutdown vlan
This command shows how to globally configure voice-aware 802.1x security for a per-VLAN error-disabled
state:
Switch(config)# errdisable detect cause security-violation shutdown vlan
You can verify your setting by entering the show errdisable detect privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
159
errdisable detect cause small-frame
errdisable detect cause small-frame
To allow any switch port to be error disabled if incoming VLAN-tagged packets are small frames (67 bytes
or less) and arrive at the minimum configured rate (the threshold), use the errdisable detect cause small-frame
global configuration command on the switch stack or on a standalone switch. Use the no form of this command
to return to the default setting.
errdisable detect cause small-frame
no errdisable detect cause small-frame
Syntax Description
This command has no arguments or keywords.
Command Default
This feature is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This command globally enables the small-frame arrival feature. Use the small violation-rate interface
configuration command to set the threshold for each port.
You can configure the port to be automatically re-enabled by using the errdisable recovery cause small-frame
global configuration command. You configure the recovery time by using the errdisable recovery interval
interval global configuration command.
Examples
This example shows how to enable the switch ports to be put into the error-disabled mode if incoming small
frames arrive at the configured threshold:
Switch(config)# errdisable detect cause small-frame
You can verify your setting by entering the show interfaces privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
160
errdisable recovery cause
errdisable recovery cause
To enable the error-disabled mechanism to recover from a specific cause, use the errdisable recovery cause
command in global configuration mode. To return to the default setting, use the no form of this command.
errdisable recovery cause {all| arp-inspection| bpduguard| channel-misconfig| dhcp-rate-limit| dtp-flap|
gbic-invalid| inline-power| link-flap| loopback| mac-limit| pagp-flap| port-mode-failure|
pppoe-ia-rate-limit| psecure-violation| psp| security-violation| sfp-config-mismatch| storm-control| udld|
vmps}
no errdisable recovery cause {all| arp-inspection| bpduguard| channel-misconfig| dhcp-rate-limit|
dtp-flap| gbic-invalid| inline-power| link-flap| loopback| mac-limit| pagp-flap| port-mode-failure|
pppoe-ia-rate-limit| psecure-violation| psp| security-violation| sfp-config-mismatch| storm-control| udld|
vmps}
Syntax Description
all
Enables the timer to recover from all error-disabled causes.
arp-inspection
Enables the timer to recover from the Address Resolution Protocol
(ARP) inspection error-disabled state.
bpduguard
Enables the timer to recover from the bridge protocol data unit
(BPDU) guard error-disabled state.
channel-misconfig
Enables the timer to recover from the EtherChannel misconfiguration
error-disabled state.
dhcp-rate-limit
Enables the timer to recover from the DHCP snooping error-disabled
state.
dtp-flap
Enables the timer to recover from the Dynamic Trunking Protocol
(DTP) flap error-disabled state.
gbic-invalid
Enables the timer to recover from an invalid Gigabit Interface
Converter (GBIC) module error-disabled state.
Note
inline-power
This error refers to an invalid small form-factor pluggable
(SFP) error-disabled state.
Enables the timer to recover from the Power over Ethernet (PoE)
error-disabled state.
This keyword is supported only on switches with PoE ports.
link-flap
Enables the timer to recover from the link-flap error-disabled state.
loopback
Enables the timer to recover from a loopback error-disabled state.
mac-limit
Enables the timer to recover from the mac limit error-disabled state.
pagp-flap
Enables the timer to recover from the Port Aggregation Protocol
(PAgP)-flap error-disabled state.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
161
errdisable recovery cause
port-mode-failure
Enables the timer to recover from the port mode change failure
error-disabled state.
pppoe-ia-rate-limit
Enables the timer to recover from the PPPoE IA rate limit
error-disabled state.
psecure-violation
Enables the timer to recover from a port security violation disable
state.
psp
Enables the timer to recover from the protocol storm protection (PSP)
error-disabled state.
security-violation
Enables the timer to recover from an IEEE 802.1x-violation disabled
state.
sfp-config-mismatch
Enables error detection on an SFP configuration mismatch.
storm-control
Enables the timer to recover from a storm control error.
udld
Enables the timer to recover from the UniDirectional Link Detection
(UDLD) error-disabled state.
vmps
Enables the timer to recover from the VLAN Membership Policy
Server (VMPS) error-disabled state.
Command Default
Recovery is disabled for all causes.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A cause (such as all or BDPU guard) is defined as the reason that the error-disabled state occurred. When a
cause is detected on an interface, the interface is placed in the error-disabled state, an operational state similar
to link-down state.
When a port is error-disabled, it is effectively shut down, and no traffic is sent or received on the port. For
the BPDU guard and port-security features, you can configure the switch to shut down only the offending
VLAN on the port when a violation occurs, instead of shutting down the entire port.
If you do not enable the recovery for the cause, the interface stays in the error-disabled state until you enter
the shutdown and the no shutdown interface configuration commands. If you enable the recovery for a cause,
the interface is brought out of the error-disabled state and allowed to retry the operation again when all the
causes have timed out.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
162
errdisable recovery cause
Otherwise, you must enter the shutdown and then the no shutdown commands to manually recover an
interface from the error-disabled state.
You can verify your settings by entering the show errdisable recovery privileged EXEC command.
Examples
This example shows how to enable the recovery timer for the BPDU guard error-disabled cause:
Switch(config)# errdisable recovery cause bpduguard
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
163
errdisable recovery cause small-frame
errdisable recovery cause small-frame
Use the errdisable recovery cause small-frame global configuration command on the switch to enable the
recovery timer for ports to be automatically re-enabled after they are error disabled by the arrival of small
frames. Use the no form of this command to return to the default setting.
errdisable recovery cause small-frame
no errdisable recovery cause small-frame
Syntax Description
This command has no arguments or keywords.
Command Default
This feature is disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command enables the recovery timer for error-disabled ports. You configure the recovery time by using
the errdisable recovery interval interface configuration command.
Examples
This example shows how to set the recovery timer:
Switch(config)# errdisable recovery cause small-frame
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
164
errdisable recovery interval
errdisable recovery interval
To specify the time to recover from an error-disabled state, use the errdisable recovery interval command
in global configuration mode. To return to the default setting, use the no form of this command.
errdisable recovery interval timer-interval
no errdisable recovery interval timer-interval
Syntax Description
timer-interval
Time to recover from the error-disabled state. The range is 30 to 86400 seconds.
The same interval is applied to all causes. The default interval is 300 seconds.
Command Default
The default recovery interval is 300 seconds.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The error-disabled recovery timer is initialized at a random differential from the configured interval value.
The difference between the actual timeout value and the configured value can be up to 15 percent of the
configured interval.
You can verify your settings by entering the show errdisable recovery privileged EXEC command.
Examples
This example shows how to set the timer to 500 seconds:
Switch(config)# errdisable recovery interval 500
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
165
interface
interface
To configure an interface, use the interface command.
interface {Auto-Template Auto-Template interface-number| Capwap Capwap interface-number | Gigabit
Ethernet Gigabit Ethernet interface number| Group VI Group VI interface number Internal Interface
Internal Interface number Loopback Loopback interface number Null Null interface Port-channel interface
numberPort-channel interface number TenGigabit Ethernet interface number Tunnel interface number
Vlan interface number}
Syntax Description
Auto-Template Auto-template
interface-number
Enables you to configure auto-template interface. Values range
from 1 to 999.
Capwap Capwap interface number
Enables you to configure CAPWAP tunnel interface. Values
range from 0 to 2147483647.
GigabitEthernet Gigabit Ethernet interface Enables you to configure Gigabit Ethernet IEEE 802.3z
interface. Values range from 0 to 9.
number
Group VI Group VI interface number
Enables you to configure the internal interface. Values range
from 0 to 9.
Internal Interface Internal Interface
Enables you to configure internal interface.
Loopback Loopback Interface number
Enables you to configure loopback interface. Values range from
0 to 2147483647.
Null Null interface number
Enables you to configure null interface. Value is 0.
Port-channel interface number
Enables you to configure Ethernet channel interfaces. Values
range from 1 to 128.
TenGigabitEthernet interface number
Enables you to configure a 10-Gigabit Ethernet interface. Values
range from 0 to 9.
Tunnel interface number
Enables you to configure the tunnel interface. Values range
from 0 to 2147483647.
Vlan interface number
Enables you to configure switch VLAN interfaces. Values range
from 0 to 4098.
Command Default
None
Command Modes
Global configuration
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
166
interface
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can not use the "no" form of this command.
Examples
This example shows how you can configure interface:
Switch# interface Tunnel 15
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
167
interface range
interface range
To configure an interface range, use the interface range command.
interface range {Gigabit Ethernet interface-number | Loopback interface-number | Port Channel
interface-number | TenGigabit Ethernet interface-number Tunnel interface-number Vlan
interface-number Macro WORD}
Syntax Description
GigabitEthernet interface-number
Configures the Gigabit Ethernet IEEE 802.3z interface. Values
range from 1 to 9.
Loopback interface-number
Configures the loopback interface. Values range from 0 to
2147483647.
Port-Channel interface-number
Configures 10-Gigabit Ethernet channel of interfaces. Values
range from 1 to 128.
TenGigabit Ethernet interface-number Configures 10-Gigabit Ethernet interfaces. Values range from 0
to 9.
Tunnel interface-number
Configures the tunnel interface. Values range from 0 to
2147483647.
VLAN interface-number
Configures the switch VLAN interfaces. Values range from 1 to
4095.
Macro WORD
Configures the keywords to interfaces. Support up to 32 characters.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how you can configure interface range:
Switch(config)# interface range vlan 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
168
ip mtu
ip mtu
To set the IP maximum transmission unit (MTU) size of routed packets on all routed ports of the switch or
switch stack, use the ip mtu command in interface configuration mode. To restore the default IP MTU size,
use the no form of this command.
ip mtu bytes
no ip mtu bytes
Syntax Description
bytes
MTU size, in bytes. The range is from 68 up to the system MTU value (in bytes).
Command Default
The default IP MTU size for frames received and sent on all switch interfaces is 1500 bytes.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The upper limit of the IP value is based on the switch or switch stack configuration and refers to the currently
applied system MTU value. For more information about setting the MTU sizes, see the system mtu global
configuration command.
To return to the default IP MTU setting, you can apply the default ip mtu command or the no ip mtu command
on the interface.
You can verify your setting by entering the show ip interface interface-id or show interfaces interface-id
privileged EXEC command.
Examples
The following example sets the maximum IP packet size for VLAN 200 to 1000 bytes:
Switch(config)# interface vlan 200
Switch(config-if)# ip mtu 1000
The following example sets the maximum IP packet size for VLAN 200 to the default setting of 1500 bytes:
Switch(config)# interface vlan 200
Switch(config-if)# default ip mtu
This is an example of partial output from the show ip interface interface-id command. It displays the current
IP MTU setting for the interface.
Switch# show ip interface gigabitethernet4/0/1
GigabitEthernet4/0/1 is up, line protocol is up
Internet address is 18.0.0.1/24
Broadcast address is 255.255.255.255
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
169
ip mtu
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
<output truncated>
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
170
ipv6 mtu
ipv6 mtu
To set the IPv6 maximum transmission unit (MTU) size of routed packets on all routed ports of the switch or
switch stack, use the ipv6 mtu command in interface configuration mode. To restore the default IPv6 MTU
size, use the no form of this command.
ipv6 mtu bytes
no ipv6 mtu bytes
Syntax Description
bytes
MTU size, in bytes. The range is from 1280 up to the system MTU value (in bytes).
Command Default
The default IPv6 MTU size for frames received and sent on all switch interfaces is 1500 bytes.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The upper limit of the IPv6 MTU value is based on the switch or switch stack configuration and refers to the
currently applied system MTU value. For more information about setting the MTU sizes, see the system mtu
global configuration command.
To return to the default IPv6 MTU setting, you can apply the default ipv6 mtu command or the no ipv6 mtu
command on the interface.
You can verify your setting by entering the show ipv6 interface interface-id or show interface interface-id
privileged EXEC command.
Examples
The following example sets the maximum IPv6 packet size for an interface to 2000 bytes:
Switch(config)# interface gigabitethernet4/0/1
Switch(config-if)# ipv6 mtu 2000
The following example sets the maximum IPv6 packet size for an interface to the default setting of 1500 bytes:
Switch(config)# interface gigabitethernet4/0/1
Switch(config-if)# default ipv6 mtu
This is an example of partial output from the show ipv6 interface interface-id command. It displays the
current IPv6 MTU setting for the interface.
Switch# show ipv6 interface gigabitethernet4/0/1
GigabitEthernet4/0/1 is up, line protocol is up
Internet address is 18.0.0.1/24
Broadcast address is 255.255.255.255
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
171
ipv6 mtu
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
<output truncated>
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
172
l2protocol-tunnel point-to-point
l2protocol-tunnel point-to-point
To enable point-to-point tunneling on an access port, an IEEE 802.1Q tunnel port, or a port channel for Port
Aggregation Protocol (PAgP), Link Aggregation Control Protocol (LACP), or UniDirectional Link Detection
(UDLD) packets, use the l2protocol-tunnel point-to-point interface configuration command on the switch
stack or on a standalone switch. To disable tunneling on the interface, use the no form of this command.
l2protocol-tunnel point-to-point [pagp | lacp | udld]
no l2protocol-tunnel point-to-point [pagp | lacp | udld]
Syntax Description
pagp
(Optional) Enables point-to-point tunneling of PAgP.
lacp
(Optional) Enables point-to-point tunneling of LACP.
udld
(Optional) Enables point-to-point tunneling of UDLD.
Command Default
The default is that no Layer 2 protocol packets are tunneled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You must enter this command, with or without protocol types, to tunnel Layer 2 packets.
If you enter this command for a port channel, all ports in the channel must have the same configuration.
Layer 2 protocol tunneling across a service-provider network ensures that Layer 2 information is propagated
across the network to all customer locations. When protocol tunneling is enabled, protocol packets are
encapsulated with a well-known Cisco multicast address for transmission across the network. When the packets
reach their destination, the well-known MAC address is replaced by the Layer 2 protocol MAC address.
In a service-provider network, you can use Layer 2 protocol tunneling to enhance the creation of EtherChannels
by emulating a point-to-point network topology. When protocol tunneling is enabled on the service-provider
switch for PAgP or LACP, remote customer switches receive the protocol data units (PDUs) and can negotiate
automatic creation of EtherChannels.
To enable tunneling of PAgP, LACP, and UDLD packets, you must have a point-to-point network topology.
To decrease the link-down detection time, you should also enable UDLD on the interface when you enable
tunneling of PAgP or LACP packets.
You can enable point-to-point protocol tunneling for PAgP, LACP, and UDLD individually or for all three
protocols.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
173
l2protocol-tunnel point-to-point
Caution PAgP, LACP, and UDLD tunneling is only intended to emulate a point-to-point topology. An erroneous
configuration that sends tunneled packets to many ports could lead to a network failure.
The configuration is saved in NVRAM.
For more information about Layer 2 protocol tunneling, see the software configuration guide for this release.
Examples
This example shows how to enable point-to-point protocol tunneling for PAgP and UDLD packets and to
configure the PAgP drop threshold as 1000 packets per second:
Switch(config-if)# l2protocol-tunnel point-to-point pagp
Switch(config-if)# l2protocol-tunnel point-to-point udld
Switch(config-if)# l2protocol-tunnel drop-threshold point-to-point pagp 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
174
l2protocol-tunnel drop-threshold point-to-point
l2protocol-tunnel drop-threshold point-to-point
To configure the maximum number of point-to-point tunneled packets that can be processed for the specified
protocol before packets are dropped, use the l2protocol-tunnel drop-threshold point-to-point interface
configuration command on the switch stack or on a standalone switch. To disable the drop threshold, use the
no form of this command.
l2protocol-tunnel drop-threshold point-to-point [pagp | lacp | udld] packets
no l2protocol-tunnel drop-threshold point-to-point [pagp | lacp | udld] packets
Syntax Description
pagp
(Optional) Specifies a drop threshold for point-to-point tunneling of Port Aggregation
Protocol (PAgP) packets.
lacp
(Optional) Specifies a drop threshold for point-to-point tunneling of Link
Aggregation Control Protocol (LACP) packets.
udld
(Optional) Specifies a drop threshold for point-to-point tunneling of UniDirectional
Link Detection (UDLD) packets.
packets
Threshold in packets per second to be received for encapsulation before the interface
drops packets. The range is 1 to 4096. The default is no threshold.
Command Default
The default is no drop threshold for the number of Layer 2 protocol packets.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the drop-threshold to control the number of protocol packets per second that are received on an
interface before it drops packets. When no protocol option is specified with a keyword, the threshold is applied
to each of the tunneled Layer 2 protocol types. If you also set a shutdown threshold on the interface, the
drop-threshold value must be less than or equal to the shutdown-threshold value.
When the drop threshold is reached, the interface drops Layer 2 protocol packets until the rate at which they
are received is below the drop threshold.
The configuration is saved in NVRAM.
For more information about Layer 2 protocol tunneling, see the software configuration guide for this release.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
175
l2protocol-tunnel drop-threshold point-to-point
Examples
This example shows how to enable point-to-point protocol tunneling for PAgP and UDLD packets and to
configure the PAgP drop threshold as 1000 packets per second:
Switch(config-if)# l2protocol-tunnel point-to-point pagp
Switch(config-if)# l2protocol-tunnel point-to-point udld
Switch(config-if)# l2protocol-tunnel drop-threshold point-to-point pagp 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
176
l2protocol-tunnel shutdown-threshold point-to-point
l2protocol-tunnel shutdown-threshold point-to-point
To configure the maximum number of point-to-point tunneled packets that can be received per second for the
specified protocol before the interface shuts down, use the l2protocol-tunnel shutdown-threshold
point-to-point interface configuration command on the switch stack or on a standalone switch. Use the no
form of this command to disable the shutdown threshold.
l2protocol-tunnel shutdown-threshold point-to-point [pagp | lacp | udld] packets
no l2protocol-tunnel shutdown-threshold point-to-point [pagp | lacp | udld] packets
Syntax Description
pagp
(Optional) Specifies a shutdown threshold for point-to-point tunneling of Port
Aggregation Protocol (PAgP) packets.
lacp
(Optional) Specifies a shutdown threshold for point-to-point tunneling of Link
Aggregation Control Protocol (LACP) packets.
udld
(Optional) Specifies a shutdown threshold for point-to-point tunneling of
UniDirectional Link Detection (UDLD) packets.
packets
Threshold in packets per second to be received for encapsulation before the interface
shuts down. The range is 1 to 4096. The default is no threshold.
Command Default
The default is no shutdown threshold for the number of Layer 2 protocol packets.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Enter the shutdown-threshold keyword to control the number of protocol packets per second that are received
on an interface before it shuts down. When no protocol option is specified with the keyword, the threshold is
applied to each of the tunneled Layer 2 protocol types. If you also set a drop threshold on the interface, the
shutdown-threshold value must be greater than or equal to the drop-threshold value.
When the shutdown threshold is reached, the interface is error-disabled. If you enable error recovery by
entering the errdisable recovery cause l2ptguard global configuration command, the interface is brought
out of the error-disabled state and allowed to retry the operation again when all the causes have timed out. If
the error recovery mechanism is not enabled for l2ptguard, the interface stays in the error-disabled state until
you enter the shutdown and no shutdown interface configuration commands.
The configuration is saved in NVRAM.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
177
l2protocol-tunnel shutdown-threshold point-to-point
For more information about Layer 2 protocol tunneling, see the software configuration guide for this release.
Examples
This example shows how to enable point-to-point protocol tunneling for PAgP and UDLD packets and to
configure the PAgP shutdown threshold as 1000 packets per second:
Switch(config-if)# l2protocol-tunnel point-to-point pagp
Switch(config-if)# l2protocol-tunnel point-to-point udld
Switch(config-if)# l2protocol-tunnel shutdown-threshold point-to-point pagp 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
178
lldp (interface configuration)
lldp (interface configuration)
To enable Link Layer Discovery Protocol (LLDP) on an interface, use the lldp command in interface
configuration mode. To disable LLDP on an interface, use the no form of this command.
Syntax Description
med-tlv-select
Selects an LLDP Media Endpoint Discovery (MED) time-length-value
(TLV) element to send.
tlv
String that identifies the TLV element. Valid values are the following:
• inventory-management— LLDP MED Inventory Management
TLV.
• location— LLDP MED Location TLV.
• network-policy— LLDP MED Network Policy TLV.
receive
Enables the interface to receive LLDP transmissions.
tlv-select
Selects the LLDP TLVs to send.
power-management
Sends the LLDP Power Management TLV.
transmit
Enables LLDP transmission on the interface.
Command Default
LLDP is enabled on supported interfaces.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This command is supported on 802.1 media types.
If the interface is configured as a tunnel port, LLDP is automatically disabled.
Examples
The following example shows how to disable LLDP transmission on an interface:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# no lldp transmit
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
179
lldp (interface configuration)
The following example shows how to enable LLDP transmission on an interface:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# lldp transmit
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
180
logging event power-inline-status
logging event power-inline-status
To enable the logging of Power over Ethernet (PoE) events, use the logging event power-inline-status
command in interface configuration mode. To disable the logging of PoE status events, use the no form of
this command.
logging event power-inline-status
no logging event power-inline-status
Syntax Description
This command has no arguments or keywords.
Command Default
Logging of PoE events is enabled.
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The no form of this command does not disable PoE error events.
Examples
This example shows how to enable logging of PoE events on a port:
Switch(config-if)# interface gigabitethernet1/0/1
Switch(config-if)# logging event power-inline-status
Switch(config-if)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
181
mdix auto
mdix auto
To enable the automatic medium-dependent interface crossover (auto-MDIX) feature on the interface, use
the mdix auto command in interface configuration mode. To disable auto-MDIX, use the no form of this
command.
mdix auto
no mdix auto
Syntax Description
This command has no arguments or keywords.
Command Default
Auto-MDIX is enabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
When auto-MDIX is enabled, the interface automatically detects the required cable connection type
(straight-through or crossover) and configures the connection appropriately.
When you enable auto-MDIX on an interface, you must also set the interface speed and duplex to auto so
that the feature operates correctly.
When auto-MDIX (and autonegotiation of speed and duplex) is enabled on one or both of the connected
interfaces, link up occurs, even if the cable type (straight-through or crossover) is incorrect.
Auto-MDIX is supported on all 10/100 and 10/100/1000 Mb/s interfaces and on 10/100/1000BASE-TX small
form-factor pluggable (SFP) module interfaces. It is not supported on 1000BASE-SX or -LX SFP module
interfaces.
You can verify the operational state of auto-MDIX on the interface by entering the show controllers
ethernet-controller interface-id phy privileged EXEC command.
Examples
This example shows how to enable auto-MDIX on a port:
Switch# configure terminal
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# speed auto
Switch(config-if)# duplex auto
Switch(config-if)# mdix auto
Switch(config-if)# end
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
182
mode (power-stack configuration)
mode (power-stack configuration)
To configure power stack mode for the power stack, use the mode command in power-stack configuration
mode. To return to the default settings, use the no form of the command.
mode {power-shared| redundant} [strict]
no mode
Syntax Description
power-shared
Sets the power stack to operate in power-shared mode. This is the default.
redundant
Sets the power stack to operate in redundant mode. The largest power supply
is removed from the power pool to be used as backup power in case one of
the other power supplies fails.
strict
(Optional) Configures the power stack mode to run a strict power budget.
The stack power needs cannot exceed the available power.
Command Default
The default modes are power-shared and nonstrict.
Command Modes
Power-stack configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This command is available only on switch stacks running the IP Base or IP Services feature set.
To access power-stack configuration mode, enter the stack-power stack power stack name global configuration
command.
Entering the no mode command sets the switch to the defaults of power-shared and non-strict mode.
Note
For stack power, available power is the total power available for PoE from all power supplies in the power
stack, available power is the power allocated to all powered devices connected to PoE ports in the stack,
and consumed power is the actual power consumed by the powered devices.
In power-shared mode, all of the input power can be used for loads, and the total available power appears
as one large power supply. The power budget includes all power from all supplies. No power is set aside for
power supply failures. If a power supply fails, load shedding (shutting down of powered devices or switches)
might occur.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
183
mode (power-stack configuration)
In redundant mode, the largest power supply is removed from the power pool to use as backup power in case
one of the other power supplies fails. The available power budget is the total power minus the largest power
supply. This reduces the available power in the pool for switches and powered devices, but in case of a failure
or an extreme power load, there is less chance of having to shut down switches or powered devices.
In strict mode, when a power supply fails and the available power drops below the budgeted power, the system
balances the budget through load shedding of powered devices, even if the actual power is less than the
available power. In nonstrict mode, the power stack can run in an over-allocated state and is stable as long as
the actual power does not exceed the available power. In this mode, a powered device drawing more than
normal power could cause the power stack to start shedding loads. This is normally not a problem because
most devices do not run at full power. The chances of multiple powered devices in the stack requiring maximum
power at the same time is small.
In both strict and nonstrict modes, power is denied when there is no power available in the power budget.
Examples
This is an example of setting the power stack mode for the stack named power1 to power-shared with strict
power budgeting. All power in the stack is shared, but when the total available power is allotted, no more
devices are allowed power.
Switch(config)# stack-power stack power1
Switch(config-stackpower)# mode power-shared strict
Switch(config-stackpower)# exit
This is an example of setting the power stack mode for the stack named power2 to redundant. The largest
power supply in the stack is removed from the power pool to provide redundancy in case one of the other
supplies fails.
Switch(config)# stack-power stack power2
Switch(config-stackpower)# mode redundant
Switch(config-stackpower)# exit
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
184
network-policy
network-policy
To apply a network-policy profile to an interface, use the network-policy command in interface configuration
mode. To remove the policy, use the no form of this command.
network-policy profile-number
no network-policy
Syntax Description
profile-number
The network-policy profile number to apply to the interface.
Command Default
No network-policy profiles are applied.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile number interface configuration command to apply a profile to an interface.
You cannot apply the switchport voice vlan command on an interface if you first configure a network-policy
profile on it. However, if switchport voice vlan vlan-id is already configured on the interface, you can apply
a network-policy profile on the interface. The interface then has the voice or voice-signaling VLAN
network-policy profile applied.
Examples
This example shows how to apply network-policy profile 60 to an interface:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# network-policy 60
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
185
network-policy profile (global configuration)
network-policy profile (global configuration)
To create a network-policy profile and to enter network-policy configuration mode, use the network-policy
profile command in global configuration mode. To delete the policy and to return to global configuration
mode, use the no form of this command.
network-policy profile profile-number
no network-policy profile profile-number
Syntax Description
profile-number
Network-policy profile number. The range is 1 to 4294967295.
Command Default
No network-policy profiles are defined.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile global configuration command to create a profile and to enter network-policy
profile configuration mode.
To return to privileged EXEC mode from the network-policy profile configuration mode, enter the exit
command.
When you are in network-policy profile configuration mode, you can create the profile for voice and voice
signaling by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP),
and tagging mode.
These profile attributes are contained in the Link Layer Discovery Protocol for Media Endpoint Devices
(LLDP-MED) network-policy time-length-value (TLV).
Examples
This example shows how to create network-policy profile 60:
Switch(config)# network-policy profile 60
Switch(config-network-policy)#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
186
network-policy profile (network-policy configuration)
network-policy profile (network-policy configuration)
To configure the network-policy profile created by using the network-policy profile global configuration
command, use the network-policy profile configuration mode command. To delete a profile, use the no form
of this command without additional parameters. To change its configured attributes, use the no form with
parameters.
network-policy profile profile-number {voice | voice-signaling} vlan [vlan-id {cos cvalue| dscp dvalue}]
[[dot1p {cos cvalue | dscp dvalue}] | none | untagged]
no network-policy profile profile-number {voice | voice-signaling} vlan [vlan-id {cos cvalue| dscp dvalue}]
[[dot1p {cos cvalue | dscp dvalue}] | none | untagged]
Syntax Description
voice
Specifies the voice application type.
voice-signaling
Specifies the voice-signaling application type.
vlan
Specifies the native VLAN for voice traffic.
vlan-id
(Optional) Specifies the VLAN for voice traffic. The range
is 1 to 4094.
cos cvalue
(Optional) Specifies the Layer 2 priority class of service (CoS)
for the configured VLAN. The range is 0 to 7; the default is
5.
dscp dvalue
(Optional) Specifies the differentiated services code point
(DSCP) value for the configured VLAN. The range is 0 to
63; the default is 46.
dot1p
(Optional) Configures the phone to use IEEE 802.1p priority
tagging and to use VLAN 0 (the native VLAN).
none
(Optional) Does not instruct the IP phone about the voice
VLAN. The phone uses the configuration from the phone key
pad.
untagged
(Optional) Configures the phone to send untagged voice
traffic. This is the default for the phone.
Command Default
No network policies are defined.
Command Modes
Network-policy configuration
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
187
network-policy profile (network-policy configuration)
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile command to configure the attributes of a network-policy profile.
The voice application type is for dedicated IP phones and similar devices that support interactive voice services.
These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security
through isolation from data applications.
The voice-signaling application type is for network topologies that require a different policy for voice signaling
than for voice media. This application type should not be advertised if all of the same network policies apply
as those advertised in the voice policy TLV.
This example shows how to configure the voice application type for VLAN 100 with a priority 4 CoS:
Switch(config)# network-policy profile 1
Switch(config-network-policy)# voice vlan 100 cos 4
This example shows how to configure the voice application type for VLAN 100 with a DSCP value of 34:
Switch(config)# network-policy profile 1
Switch(config-network-policy)# voice vlan 100 dscp 34
This example shows how to configure the voice application type for the native VLAN with priority tagging:
Switch(config-network-policy)# voice vlan dot1p cos 4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
188
nmsp attachment suppress
nmsp attachment suppress
To suppress the reporting of attachment information from a specified interface, use the nmsp attachment
suppress command in interface configuration mode. To return to the default setting, use the no form of this
command.
nmsp attachment suppress
no nmsp attachment suppress
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use the nmsp attachment suppress interface configuration command to configure an interface to not send
location and attachment notifications to a Cisco Mobility Services Engine (MSE).
Examples
This example shows how to configure an interface to not send attachment information to the MSE:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# nmsp attachment suppress
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
189
power-priority
power-priority
To configure Cisco StackPower power-priority values for a switch in a power stack and for its high-priority
and low-priority PoE ports, use the power-priority command in switch stack-power configuration mode. To
return to the default setting, use the no form of the command.
power-priority {high value| low value| switch value}
no power-priority {high| low| switch}
Syntax Description
Command Default
high value
Sets the power priority for the ports configured as high-priority ports. The range is 1
to 27, with 1 as the highest priority. The high value must be lower than the value set
for the low-priority ports and higher than the value set for the switch.
low value
Sets the power priority for the ports configured as low-priority ports. The range is 1
to 27. The low value must be higher than the value set for the high-priority ports and
the value set for the switch.
switch value
Sets the power priority for the switch. The range is 1 to 27. The switch value must be
lower than the values set for the low and high-priority ports.
If no values are configured, the power stack randomly determines a default priority.
The default ranges are 1 to 9 for switches, 10 to 18 for high-priority ports, 19 to 27 for low-priority ports.
On non-PoE switches, the high and low values (for port priority) have no effect.
Command Modes
Command History
Usage Guidelines
Switch stack-power configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
To access switch stack-power configuration mode, enter the stack-power switch switch-number global
configuration command.
Cisco StackPower power-priority values determine the order for shutting down switches and ports when power
is lost and load shedding must occur. Priority values are from 1 to 27; the highest numbers are shut down first.
We recommend that you configure different priority values for each switch and for its high priority ports and
low priority ports to limit the number of devices shut down at one time during a loss of power. If you try to
configure the same priority value on different switches in a power stack, the configuration is allowed, but you
receive a warning message.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
190
power-priority
Note
Examples
This command is available only on switch stacks running the IP Base or IP Services feature set.
This is an example of setting the power priority for switch 1 in power stack a to 7, for the high-priority ports
to 11, and for the low-priority ports to 20.
Switch(config)# stack-power switch 1
Switch(config-switch-stackpower)# stack-id power_stack_a
Switch(config-switch-stackpower)# power-priority high 11
Switch(config-switch-stackpower)# power-priority low 20
Switch(config-switch-stackpower)# power-priority switch 7
Switch(config-switch-stackpower)# exit
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
191
power inline
power inline
To configure the power management mode on Power over Ethernet (PoE) ports, use the power inline command
in interface configuration mode. To return to the default settings, use the no form of this command.
power inline {auto [max max-wattage]| never| port priority {high | low} | static [max max-wattage]}
no power inline {auto| never| port priority {high | low}| static [max max-wattage]}
Syntax Description
Command Default
auto
Enables powered-device detection.
If enough power is available,
automatically allocates power to
the PoE port after device detection.
Allocation is first-come, first-serve.
max max-wattage
(Optional) Limits the power
allowed on the port. The range is
4000 to 30000 mW. If no value is
specified, the maximum is allowed.
never
Disables device detection, and
disables power to the port.
port
Configures the power priority of
the port. The default priority is low.
priority {high|low}
Sets the power priority of the port.
In case of a power supply failure,
ports configured as low priority are
turned off first and ports configured
as high priority are turned off last.
The default priority is low.
static
Enables powered-device detection.
Pre-allocates (reserves) power for
a port before the switch discovers
the powered device. This action
guarantees that the device
connected to the interface receives
enough power.
The default is auto (enabled).
The maximum wattage is 30,000 mW.
The default port priority is low.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
192
power inline
Command Default
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This command is supported only on PoE-capable ports. If you enter this command on a port that does not
support PoE, this error message appears:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# power inline auto
^
% Invalid input detected at '^' marker.
In a switch stack, this command is supported on all ports in the stack that support PoE.
Use the max max-wattage option to disallow higher-power powered devices. With this configuration, when
the powered device sends Cisco Discovery Protocol (CDP) messages requesting more power than the maximum
wattage, the switch removes power from the port. If the powered-device IEEE class maximum is greater than
the maximum wattage, the switch does not power the device. The power is reclaimed into the global power
budget.
Note
The switch never powers any class 0 or class 3 device if the power inline max max-wattage command
is configured for less than 30 W.
If the switch denies power to a powered device (the powered device requests more power through CDP
messages or if the IEEE class maximum is greater than the maximum wattage), the PoE port is in a power-deny
state. The switch generates a system message, and the Oper column in the show power inline privileged
EXEC command output shows power-deny.
Use the power inline static max max-wattage command to give a port high priority. The switch allocates
PoE to a port configured in static mode before allocating power to a port configured in auto mode. The switch
reserves power for the static port when it is configured rather than upon device discovery. The switch reserves
the power on a static port even when there is no connected device and whether or not the port is in a shutdown
or in a no shutdown state. The switch allocates the configured maximum wattage to the port, and the amount
is never adjusted through the IEEE class or by CDP messages from the powered device. Because power is
pre-allocated, any powered device that uses less than or equal to the maximum wattage is guaranteed power
when it is connected to a static port. However, if the powered device IEEE class is greater than the maximum
wattage, the switch does not supply power to it. If the switch learns through CDP messages that the powered
device needs more than the maximum wattage, the powered device is shut down.
If the switch cannot pre-allocate power when a port is in static mode (for example, because the entire power
budget is already allocated to other auto or static ports), this message appears: Command rejected: power
inline static: pwr not available. The port configuration remains unchanged.
When you configure a port by using the power inline auto or the power inline static interface configuration
command, the port autonegotiates by using the configured speed and duplex settings. This is necessary to
determine the power requirements of the connected device (whether or not it is a powered device). After the
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
193
power inline
power requirements have been determined, the switch hardcodes the interface by using the configured speed
and duplex settings without resetting the interface.
When you configure a port by using the power inline never command, the port reverts to the configured
speed and duplex settings.
If a port has a Cisco powered device connected to it, you should not use the power inline never command
to configure the port. A false link-up can occur, placing the port in an error-disabled state.
Use the power inline port priority {high | low} command to configure the power priority of a PoE port.
Powered devices connected to ports with low port priority are shut down first in case of a power shortage.
You can verify your settings by entering the show power inline EXEC command.
Examples
This example shows how to enable detection of a powered device and to automatically power a PoE port on
a switch:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# power inline auto
This example shows how to configure a PoE port on a switch to allow a class 1 or a class 2 powered device:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# power inline auto max 7000
This example shows how to disable powered-device detection and to not power a PoE port on a switch:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# power inline never
This example shows how to set the priority of a port to high, so that it would be one of the last ports to be
shut down in case of power supply failure:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# power inline port priority high
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
194
power inline consumption
power inline consumption
To override the amount of power specified by the IEEE classification for a powered device, use the power
inline consumption command in global or interface configuration to specify the wattage used by each device.
To return to the default power setting, use the no form of this command.
power inline consumption [default] wattage
no power inline consumption [default]
Syntax Description
default
The default keyword appears only in the global configuration. The command has
the same effect with or without the keyword.
wattage
Specifies the power that the switch budgets for the port. The range is 4000 to 15400
mW.
Command Default
The default power on each Power over Ethernet (PoE) port is15400 mW.
Command Modes
Global configuration
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This command is supported only on the LAN Base image.
When Cisco powered devices are connected to PoE ports, the switch uses Cisco Discovery Protocol (CDP)
to determine the CDP-specific power consumption of the devices, which is the amount of power to allocate
based on the CDP messages. The switch adjusts the power budget accordingly. This does not apply to IEEE
third-party powered devices. For these devices, when the switch grants a power request, the switch adjusts
the power budget according to the powered-device IEEE classification. If the powered device is a class 0
(class status unknown) or a class 3, the switch budgets 15400 mW for the device, regardless of the CDP-specific
amount of power needed.
If the powered device reports a higher class than its CDP-specific consumption or does not support power
classification (defaults to class 0), the switch can power fewer devices because it uses the IEEE class information
to track the global power budget.
With PoE+, powered devices use IEEE 802.3at and LLDP power with media dependent interface (MDI) type,
length, and value descriptions (TLVs), Power-via-MDA TLVs, for negotiating power up to 30 W. Cisco
pre-standard devices and Cisco IEEE powered devices can use CDP or the IEEE 802.3at power-via-MDI
power negotiation mechanism to request power levels up to 30 W.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
195
power inline consumption
Note
The initial allocation for Class 0, Class 3, and Class 4 powered devices is 15.4 W. When a device starts
up and uses CDP or LLDP to send a request for more than 15.4 W, it can be allocated up to the maximum
of 30 W.
By using the power inline consumption wattage configuration command, you can override the default power
requirement of the IEEE classification. The difference between what is mandated by the IEEE classification
and what is actually needed by the device is reclaimed into the global power budget for use by additional
devices. You can then extend the switch power budget and use it more effectively.
Before entering the power inline consumption wattage configuration command, we recommend that you
enable policing of the real-time power consumption by using the power inline police [action log] interface
configuration command.
Caution
You should carefully plan your switch power budget and make certain not to oversubscribe the power
supply.
When you enter the power inline consumption default wattage or the no power inline consumption default
global configuration command, or the power inline consumption wattage or the no power inline consumption
interface configuration command, this caution message appears.
%CAUTION: Interface Gi1/0/1: Misconfiguring the 'power inline consumption/allocation'
command may cause damage to the switch and void your warranty. Take precaution not to
oversubscribe the power supply.
It is recommended to enable power policing if the switch supports it.
Refer to documentation.
Note
When you manually configure the power budget, you must also consider the power loss over the cable
between the switch and the powered device.
For more information about the IEEE power classifications, see the “Configuring Interface Characteristics”
chapter in the software configuration guide for this release.
This command is supported only on PoE-capable ports. If you enter this command on a switch or port that
does not support PoE, an error message appears.
In a switch stack, this command is supported on all switches or ports in the stack that support PoE.
You can verify your settings by entering the show power inline consumption privileged EXEC command.
Examples
This example shows how to use the command in global configuration mode to configure the switch to
budget 5000 mW to each PoE port:
Switch(config)# power inline consumption default 5000
%CAUTION: Interface Gi1/0/1: Misconfiguring the 'power inline consumption/allocation'
command may cause damage to the switch and void your warranty. Take precaution not to
oversubscribe the power supply.
It is recommended to enable power policing if the switch supports it.
Refer to documentation.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
196
power inline consumption
This example shows how to use the command in interface configuration mode to configure the switch to
budget 12000 mW to the powered device connected to a specific PoE port:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# power inline consumption 12000
%CAUTION: Interface Gi1/0/2: Misconfiguring the 'power inline consumption/allocation'
command may cause damage to the switch and void your warranty. Take precaution not to
oversubscribe the power supply.
It is recommended to enable power policing if the switch supports it.
Refer to documentation.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
197
power inline police
power inline police
To enable policing of real-time power consumption on a powered device, use the power inline police command
in interface configuration mode. To disable this feature, use the no form of this command
power inline police [action {errdisable| log}]
no power inline police
Syntax Description
action errdisable
(Optional) Configures the switch to turn off power to the port if the real-time power
consumption exceeds the maximum power allocation on the port. This is the default
action.
action log
(Optional) Configures the switch to generate a syslog message while still providing
power to a connected device if the real-time power consumption exceeds the
maximum power allocation on the port.
Command Default
Policing of the real-time power consumption of the powered device is disabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This command is supported only on the LAN Base image.
This command is supported only on Power over Ethernet (PoE)-capable ports. If you enter this command on
a switch or port that does not support PoE, an error message appears.
In a switch stack, this command is supported on all switches or ports in the stack that support PoE and real-time
power-consumption monitoring.
When policing of the real-time power consumption is enabled, the switch takes action when a powered device
consumes more power than the allocated maximum amount.
When PoE is enabled, the switch senses the real-time power consumption of the powered device. This feature
is called power monitoring or power sensing. The switch also polices the power usage with the power policing
feature.
When power policing is enabled, the switch uses one of the these values as the cutoff power on the PoE port
in this order:
1 The user-defined power level that limits the power allowed on the port when you enter the power inline
auto max max-wattage or the power inline static max max-wattage interface configuration command
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
198
power inline police
2 The switch automatically sets the power usage of the device by using CDP power negotiation or by the
IEEE classification and LLPD power negotiation.
If you do not manually configure the cutoff-power value, the switch automatically determines it by using CDP
power negotiation or the device IEEE classification and LLDP power negotiation. If CDP or LLDP are not
enabled, the default value of 30 W is applied. However without CDP or LLDP, the switch does not allow
devices to consume more than 15.4 W of power because values from 15400 to 30000 mW are only allocated
based on CDP or LLDP requests. If a powered device consumes more than 15.4 W without CDP or LLDP
negotiation, the device might be in violation of the maximum current Imax limitation and might experience
an Icut fault for drawing more current than the maximum. The port remains in the fault state for a time before
attempting to power on again. If the port continuously draws more than 15.4 W, the cycle repeats.
When a powered device connected to a PoE+ port restarts and sends a CDP or LLDP packet with a power
TLV, the switch locks to the power-negotiation protocol of that first packet and does not respond to power
requests from the other protocol. For example, if the switch is locked to CDP, it does not provide power to
devices that send LLDP requests. If CDP is disabled after the switch has locked on it, the switch does not
respond to LLDP power requests and can no longer power on any accessories. In this case, you should restart
the powered device.
If power policing is enabled, the switch polices power usage by comparing the real-time power consumption
to the maximum power allocated on the PoE port. If the device uses more than the maximum power allocation
(or cutoff power) on the port, the switch either turns power off to the port, or the switch generates a syslog
message and updates the LEDs (the port LEDs are blinking amber) while still providing power to the device.
• To configure the switch to turn off power to the port and put the port in the error-disabled state, use the
power inline police interface configuration command.
• To configure the switch to generate a syslog message while still providing power to the device, use the
power inline police action log command.
If you do not enter the action log keywords, the default action is to shut down the port, turn off power to it,
and put the port in the PoE error-disabled state. To configure the PoE port to automatically recover from the
error-disabled state, use the errdisable detect cause inline-power global configuration command to enable
error-disabled detection for the PoE cause and the errdisable recovery cause inline-power interval interval
global configuration command to enable the recovery timer for the PoE error-disabled cause.
Caution
If policing is disabled, no action occurs when the powered device consumes more than the maximum
power allocation on the port, which could adversely affect the switch.
You can verify your settings by entering the show power inline police privileged EXEC command.
Examples
This example shows how to enable policing of the power consumption and configuring the switch to generate
a syslog message on the PoE port on a switch:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# power inline police action log
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
199
power supply
power supply
To configure and manage the internal power supplies on a switch, use the power supply command in privileged
EXEC mode.
power supply stack-member-number slot {A| B} {off| on}
Syntax Description
stack-member-number
Stack member number for which to configure the internal power
supplies. The range is 1 to 9, depending on the number of switches
in the stack.
This parameter is available only on stacking-capable switches.
slot
Selects the switch power supply to set.
A
Selects the power supply in slot A.
B
Selects the power supply in slot B.
Note
off
Sets the switch power supply to off.
on
Sets the switch power supply to on.
Command Default
The switch power supply is on.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Power supply slot B is the closest slot to the outer edge
of the switch.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The power supply command applies to a switch or to a switch stack where all switches are the same platform.
In a switch stack with the same platform switches, you must specify the stack member before entering the
slot {A | B} off or on keywords.
To return to the default setting, use the power supply stack-member-number on command.
You can verify your settings by entering the show env power privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
200
power supply
Examples
This example shows how to set the power supply in slot A to off:
Switch> power supply 2 slot A off
Disabling Power supply A may result in a power loss to PoE devices and/or switches ...
Continue? (yes/[no]): yes
Switch
Jun 10 04:52:54.389: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered off
Jun 10 04:52:56.717: %PLATFORM_ENV-1-FAN_NOT_PRESENT: Fan is not present
This example shows how to set the power supply in slot A to on:
Switch> power supply 1 slot B on
Jun 10 04:54:39.600: %PLATFORM_ENV-6-FRU_PS_OIR: FRU Power Supply 1 powered on
This example shows the output of the show env power command:
Switch> show env power
SW PID
-- -----------------1A PWR-1RUC2-640WAC
1B Not Present
Serial#
Status
---------- --------------DCB1705B05B OK
Sys Pwr
------Good
PoE Pwr
------Good
Watts
----250/390
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
201
psp
psp
To control the rate at which protocol packets are sent to the switch, use the psp global configuration command
to specify the upper threshold for the packet flow rate. The supported protocols are Address Resolution Protocol
(ARP), ARP snooping, Dynamic Host Configuration Protocol (DHCP) v4, DHCP snooping, Internet Group
Management Protocol (IGMP), and IGMP snooping. Use the no form of this command to disable protocol
storm protection.
psp {arp | dhcp | igmp} pps value
no psp {arp | dhcp | igmp}
Syntax Description
arp
Sets protocol packet flow rate for ARP and ARP snooping.
dhcp
Sets protocol packet flow rate for DHCP and DHCP snooping.
igmp
Sets protocol packet flow rate for IGMP and IGMP snooping.
pps value
Specifies the threshold value for the number of packets per second.
If the traffic exceeds this value, protocol storm protection is
enforced. The range is from 5 to 50 packets per second.
Command Default
Protocol storm protection is disabled by default.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
To set error-disable detection protocol storm protection, use the errdisable detect cause psp global
configuration command.
When protocol storm protection is configured, a counter records the number of dropped packets. To see the
number of dropped packets for a specific protocol, use the show psp statistics {arp | dhcp | igmp} privileged
EXEC command. To see the number of dropped packets for all protocols, use the show psp statistics all
command. To clear the counter for a protocol, use the clear psp counter [arp | dhcp | igmp] command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
202
show CAPWAP summary
show CAPWAP summary
To display all the CAPWAP tunnels established by the controller to access points and other mobility controllers
use the show CAPWAP summary command.
show CAPWAP summary
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CAPWAP tunnels established by the controllers to the access points and
other controllers.
Switch# show capwap summary
CAPWAP Tunnels General Statistics:
Number of Capwap Data Tunnels = 8
Number of Capwap Mobility Tunnels = 0
Number of Capwap Multicast Tunnels = 0
Name APName Type PhyPortIf Mode McastIf
------ -------------------------------- ---- --------- --------------Ca4 AP-Behind-Router data - unicast Ca0 AP1142-kat data - unicast Ca5 APRFCHAMBER2-EDISON data - unicast Ca6 KATANA_2_RF data - unicast Ca1 AP-1040-RF data - unicast Ca7 KATANA_1_RF data - unicast Ca2 AP3500-2027 data - unicast Ca3 AP-1040-out data - unicast -
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
203
show controllers cpu-interface
show controllers cpu-interface
To display the state of the CPU network interface ASIC and the send and receive statistics for packets reaching
the CPU, use the show controllers cpu-interface command in privileged EXEC mode.
show controllers cpu-interface [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
(Optional) Specifies the stack member number.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives
troubleshooting the switch.
Examples
This is a partial output example from the show controllers cpu-interface command:
Switch# show controllers cpu-interface switch 1
cpu-queue-frames retrieved dropped invalid hol-block
----------------
--------- ------- ------- ---------
Routing Protocol
0
L2 Protocol
241567
sw forwarding
0
broadcast
68355
icmp
0
icmp redirect
0
logging
0
rpf-fail
0
DOT1X authentication 328174
Forus Traffic
0
Forus Resolution
0
Wireless q5
0
Wireless q1
0
Wireless q2
0
Wireless q3
0
Wireless q4
0
Learning cache
0
Topology control
820408
Proto snooping
0
BFD Low latency
0
Transit Traffic
0
Multi End station
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
204
show controllers cpu-interface
Health Check
Crypto control
Exception
General Punt
NFL sampled data
STG cache
EGR exception
show forward
Multicast data
Gold packet
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
205
show controllers ethernet phy macsec
show controllers ethernet phy macsec
To display the internal Media Access Control Security (MACsec) counters or registers on the device, use the
show controllers ethernet phy macsec command in privileged EXEC mode.
show controllers ethernet [interface-id] phy macsec {counters | registers}
Syntax Description
Command Modes
Command History
interface-id
(Optional) The physical interface.
counters
Displays the status of the internal counters on the switch
physical layer device (PHY) for the device or the
interface.
registers
Displays the status of the internal registers on the switch
PHY for the device or the interface.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The displayed information is useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example output from the show controllers ethernet phy macsec counters command:
Switch# show controllers ethernet gigabitethernet1/0/1 phy macsec counters
GigabitEthernet1/0/1 (gpn: 1, port-number: 1)
----------------------------------------------------------========== Active RX SA ==========
ILU Entry
: 1
SCI
: 0x1B2140EC4C0000
AN
: 0x0000
NextPN
: 0x0013
Decrypt Key
: 0x1E902BE3AF08549BAC995474C5F55526
========== RX SA Stats ==========
IGR_HIT
: 0xE
IGR_OK
: 0xE
IGR_UNCHK
: 0x0
IGR_DELAY
: 0x0
IGR_LATE
: 0x0
IGR_INVLD
: 0x0
IGR_NOTVLD
: 0x0
========== Active TX SA ==========
ELU Entry
: 2
SCI
: 0x22BDCF9A010002
AN
: 0x0000
NextPN
: 0x0022
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
206
show controllers ethernet phy macsec
Encrypt Key
: 0x1E902BE3AF08549BAC995474C5F55526
========== TX SA Stats ==========
EGR_HIT
: 0x682
EGR_PKT_PROT
: 0x0
EGR_PKT_ENC
: 0x682
========== Port Stats ==========
IGR_UNTAG
: 0x0
IGR_NOTAG
: 0x57B
IGR_BADTAG
: 0x0
IGR_UNKSCI
: 0x0
IGR_MISS
: 0x52B
00-10-18, 03-06, 01-02
This is an example output from the show controllers ethernet phy macsec registers command:
Switch# show controllers ethernet gigabitethernet1/0/1 phy macsec registers
GigabitEthernet1/0/1 (gpn: 1, port-number: 1)
----------------------------------------------------------Macsec Registers
----------------------------------------------------------0000: 88E58100 Ethertypes Register
0001: 00400030 Sizes Register
0002: 00000010 Cfg Default Vlan
0003: 00000000 Reset Control Register
0007: 00000001 Port Number Register
0009: 0000100C EGR Gen Register
000B: 2FB40000 IGR Gen Register
000E: 00000000 Replay Window Register
0010: 00000047 ISC Gen Register
001C: 00000000 LC Interrupt Register
001D: 0000003A LC Interrupt Mask Register
001E: 00000000 FIPS Control Register
001F: 00000F0F ET Match Control Register
0030: 888E8808 ET Match 0 Register
0031: 88CC8809 ET Match 1 Register
0032: 00000000 ET Match 2 Register
0033: 00000000 ET Match 3 Register
0040: 00019C49 Wire Mac Control 0 Register
0041: 000200C1 Wire Mac Control 1 Register
0042: 00000008 Wire Mac Control 2 Register
0043: 00000020 Wire Mac Autneg Control Regist
0047: 0007FE43 Wire Mac Hidden0 Register
0050: 00009FC9 Sys Mac Control 0 Register
0051: 000100B1 Sys Mac Control 1 Register
0052: 00000000 Sys Mac Control 2 Register
0053: 00000030 Sys Mac Autneg Control Registe
0057: 0007FE43 Sys Mac Hidden0 Register
0070: 00000040 SLC Cfg Gen Register
0074: 00000004 Pause Control Register
0076: 00002006 SLC Ram Control Register
0060: 00000004 CiscoIP Enable Register
00-10-18, 03-06, 01-02
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
207
show controllers ethernet-controller
show controllers ethernet-controller
To display per-interface send and receive statistics read from the hardware with keywords, use the show
controllers ethernet-controller command in EXEC mode.
show controllers ethernet-controller [interface-id] [down-when-looped| phy [detail]] [port-asic statistics
{exceptions| interface interface-id {l2| l3}| l3-ifid if-id| port-ifid if-id| vlan-ifid if-id} [switch
stack-member-number] [asic asic-number]]
Syntax Description
interface-id
(Optional) ID of the physical interface.
down-when-looped
(Optional) Displays states related to down-when-looped detection.
phy
(Optional) Displays the status of the internal registers on the switch physical
layer device (PHY) for the device or the interface. This display includes the
operational state of the automatic medium-dependent interface crossover
(auto-MDIX) feature on an interface.
detail
(Optional) Displays details about the PHY internal registers.
port-asic
(Optional) Displays information about the port ASIC internal registers.
statistics
Displays port ASIC statistics, including the Rx/Sup Queue and miscellaneous
statistics.
exceptions
Displays port ASIC exception statistics.
interface interface-id
Specifies the interface for which to display port ASIC statistics.
l2
Displays statistics for the Layer 2 interface.
l3
Displays statistics for the Layer 3 interface.
l3-ifid if-id
Specifies the Layer 3 IF interface ID for which to display port ASIC
statistics.
port-ifid if-id
Specifies the PortIF interface ID for which to display port ASIC statistics.
vlan-ifid if-id
Specifies the VLANIF interface ID for which to display port ASIC statistics.
switch stack-member-number (Optional) Specifies the stack member number for which to display send
and receive statistics.
asic asic-number
Command Modes
(Optional) Specifies the ASIC number.
User EXEC (only supported with the interface-id keywords in user EXEC mode)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
208
show controllers ethernet-controller
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Without keywords, this command provides the RMON statistics for all interfaces or for the specified interface.
To display the interface internal registers, use the phy keyword. To display information about the port ASIC,
use the port-asic keyword.
When you enter the phy or port-asic keywords, the displayed information is useful primarily for Cisco
technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers ethernet-controller command for an interface:
Switch# show controllers ethernet-controller gigabitethernet6/0/1
Transmit GigabitEthernet6/0/1
Receive
0 Bytes
0 Bytes
0 Unicast frames
0 Unicast frames
0 Multicast frames
0 Multicast frames
0 Broadcast frames
0 Broadcast frames
0 Too old frames
0 Unicast bytes
0 Deferred frames
0 Multicast bytes
0 MTU exceeded frames
0 Broadcast bytes
0 1 collision frames
0 Alignment errors
0 2 collision frames
0 FCS errors
0 3 collision frames
0 Oversize frames
0 4 collision frames
0 Undersize frames
0 5 collision frames
0 Collision fragments
0 6 collision frames
0 7 collision frames
0 Minimum size frames
0 8 collision frames
0 65 to 127 byte frames
0 9 collision frames
0 128 to 255 byte frames
0 10 collision frames
0 256 to 511 byte frames
0 11 collision frames
0 512 to 1023 byte frames
0 12 collision frames
0 1024 to 1518 byte frames
0 13 collision frames
0 Overrun frames
0 14 collision frames
0 Pause frames
0 15 collision frames
0 Symbol error frames
0 Excessive collisions
0 Late collisions
0 Invalid frames, too large
0 VLAN discard frames
0 Valid frames, too large
0 Excess defer frames
0 Invalid frames, too small
0 64 byte frames
0 Valid frames, too small
0 127 byte frames
0 255 byte frames
0 Too old frames
0 511 byte frames
0 Valid oversize frames
0 1023 byte frames
0 System FCS error frames
0 1518 byte frames
0 RxPortFifoFull drop frame
0 Too large frames
0 Good (1 coll) frames
Table 11: Transmit Field Descriptions
Field
Description
Bytes
The total number of bytes sent on an interface.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
209
show controllers ethernet-controller
Field
Description
Unicast Frames
The total number of frames sent to unicast addresses.
Multicast frames
The total number of frames sent to multicast
addresses.
Broadcast frames
The total number of frames sent to broadcast
addresses.
Too old frames
The number of frames dropped on the egress port
because the packet aged out.
Deferred frames
The number of frames that are not sent after the time
exceeds 2*maximum-packet time.
MTU exceeded frames
The number of frames that are larger than the
maximum allowed frame size.
1 collision frames
The number of frames that are successfully sent on
an interface after one collision occurs.
2 collision frames
The number of frames that are successfully sent on
an interface after two collisions occur.
3 collision frames
The number of frames that are successfully sent on
an interface after three collisions occur.
4 collision frames
The number of frames that are successfully sent on
an interface after four collisions occur.
5 collision frames
The number of frames that are successfully sent on
an interface after five collisions occur.
6 collision frames
The number of frames that are successfully sent on
an interface after six collisions occur.
7 collision frames
The number of frames that are successfully sent on
an interface after seven collisions occur.
8 collision frames
The number of frames that are successfully sent on
an interface after eight collisions occur.
9 collision frames
The number of frames that are successfully sent on
an interface after nine collisions occur.
10 collision frames
The number of frames that are successfully sent on
an interface after ten collisions occur.
11 collision frames
The number of frames that are successfully sent on
an interface after 11 collisions occur.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
210
show controllers ethernet-controller
Field
Description
12 collision frames
The number of frames that are successfully sent on
an interface after 12 collisions occur.
13 collision frames
The number of frames that are successfully sent on
an interface after 13 collisions occur.
14 collision frames
The number of frames that are successfully sent on
an interface after 14 collisions occur.
15 collision frames
The number of frames that are successfully sent on
an interface after 15 collisions occur.
Excessive collisions
The number of frames that could not be sent on an
interface after 16 collisions occur.
Late collisions
After a frame is sent, the number of frames dropped
because late collisions were detected while the frame
was sent.
VLAN discard frames
The number of frames dropped on an interface
because the CFI1 bit is set.
Excess defer frames
The number of frames that are not sent after the time
exceeds the maximum-packet time.
64 byte frames
The total number of frames sent on an interface that
are 64 bytes.
127 byte frames
The total number of frames sent on an interface that
are from 65 to 127 bytes.
255 byte frames
The total number of frames sent on an interface that
are from 128 to 255 bytes.
511 byte frames
The total number of frames sent on an interface that
are from 256 to 511 bytes.
1023 byte frames
The total number of frames sent on an interface that
are from 512 to 1023 bytes.
1518 byte frames
The total number of frames sent on an interface that
are from 1024 to 1518 bytes.
Too large frames
The number of frames sent on an interface that are
larger than the maximum allowed frame size.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
211
show controllers ethernet-controller
Field
Description
Good (1 coll) frames
The number of frames that are successfully sent on
an interface after one collision occurs. This value does
not include the number of frames that are not
successfully sent after one collision occurs.
1 CFI = Canonical Format Indicator
Table 12: Receive Field Descriptions
Field
Description
Bytes
The total amount of memory (in bytes) used by frames
received on an interface, including the FCS2 value
and the incorrectly formed frames. This value
excludes the frame header bits.
Unicast frames
The total number of frames successfully received on
the interface that are directed to unicast addresses.
Multicast frames
The total number of frames successfully received on
the interface that are directed to multicast addresses.
Broadcast frames
The total number of frames successfully received on
an interface that are directed to broadcast addresses.
Unicast bytes
The total amount of memory (in bytes) used by
unicast frames received on an interface, including the
FCS value and the incorrectly formed frames. This
value excludes the frame header bits.
Multicast bytes
The total amount of memory (in bytes) used by
multicast frames received on an interface, including
the FCS value and the incorrectly formed frames.
This value excludes the frame header bits.
Broadcast bytes
The total amount of memory (in bytes) used by
broadcast frames received on an interface, including
the FCS value and the incorrectly formed frames.
This value excludes the frame header bits.
Alignment errors
The total number of frames received on an interface
that have alignment errors.
FCS errors
The total number of frames received on an interface
that have a valid length (in bytes) but do not have the
correct FCS values.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
212
show controllers ethernet-controller
Field
Description
Oversize frames
The number of frames received on an interface that
are larger than the maximum allowed frame size.
Undersize frames
The number of frames received on an interface that
are smaller than 64 bytes.
Collision fragments
The number of collision fragments received on an
interface.
Minimum size frames
The total number of frames that are the minimum
frame size.
65 to 127 byte frames
The total number of frames that are from 65 to 127
bytes.
128 to 255 byte frames
The total number of frames that are from 128 to 255
bytes.
256 to 511 byte frames
The total number of frames that are from 256 to 511
bytes.
512 to 1023 byte frames
The total number of frames that are from 512 to 1023
bytes.
1024 to 1518 byte frames
The total number of frames that are from 1024 to 1518
bytes.
Overrun frames
The total number of overrun frames received on an
interface.
Pause frames
The number of pause frames received on an interface.
Symbol error frames
The number of frames received on an interface that
have symbol errors.
Invalid frames, too large
The number of frames received that were larger than
maximum allowed MTU3 size (including the FCS
bits and excluding the frame header) and that have
either an FCS error or an alignment error.
Valid frames, too large
The number of frames received on an interface that
are larger than the maximum allowed frame size.
Invalid frames, too small
The number of frames received that are smaller than
64 bytes (including the FCS bits and excluding the
frame header) and that have either an FCS error or
an alignment error.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
213
show controllers ethernet-controller
Field
Description
Valid frames, too small
The number of frames received on an interface that
are smaller than 64 bytes (or 68 bytes for
VLAN-tagged frames) and that have valid FCS
values. The frame size includes the FCS bits but
excludes the frame header bits.
Too old frames
The number of frames dropped on the ingress port
because the packet aged out.
Valid oversize frames
The number of frames received on an interface that
are larger than the maximum allowed frame size and
have valid FCS values. The frame size includes the
FCS value but does not include the VLAN tag.
System FCS error frames
The total number of frames received on an interface
that have a valid length (in bytes) but that do not have
the correct FCS values.
RxPortFifoFull drop frames
The total number of frames received on an interface
that are dropped because the ingress queue is full.
2 FCS = frame check sequence
3 MTU = maximum transmission unit
This is an example of output from the show controllers ethernet-controller phy command for a specific
interface:
Switch# show controllers ethernet-controller gigabitethernet1/0/2 phy
Control Register
: 0001 0001 0100 0000
Control STATUS
: 0111 1001 0100 1001
Phy ID 1
: 0000 0001 0100 0001
Phy ID 2
: 0000 1100 0010 0100
Auto-Negotiation Advertisement
: 0000 0011 1110 0001
Auto-Negotiation Link Partner
: 0000 0000 0000 0000
Auto-Negotiation Expansion Reg
: 0000 0000 0000 0100
Next Page Transmit Register
: 0010 0000 0000 0001
Link Partner Next page Registe
: 0000 0000 0000 0000
1000BASE-T Control Register
: 0000 1111 0000 0000
1000BASE-T Status Register
: 0100 0000 0000 0000
Extended Status Register
: 0011 0000 0000 0000
PHY Specific Control Register
: 0000 0000 0111 1000
PHY Specific Status Register
: 1000 0001 0100 0000
Interrupt Enable
: 0000 0000 0000 0000
Interrupt Status
: 0000 0000 0100 0000
Extended PHY Specific Control
: 0000 1100 0110 1000
Receive Error Counter
: 0000 0000 0000 0000
Reserved Register 1
: 0000 0000 0000 0000
Global Status
: 0000 0000 0000 0000
LED Control
: 0100 0001 0000 0000
Manual LED Override
: 0000 1000 0010 1010
Extended PHY Specific Control
: 0000 0000 0001 1010
Disable Receiver 1
: 0000 0000 0000 1011
Disable Receiver 2
: 1000 0000 0000 0100
Extended PHY Specific Status
: 1000 0100 1000 0000
Auto-MDIX
: On
[AdminState=1
Flags=0x00052248]
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
214
show controllers ethernet-controller
This is an example of output from the show controllers ethernet-controller tengigabitethernet1/0/1 phy
command:
Switch# show controllers ethernet-controller tengigabitethernet1/0/1 phy
TenGigabitEthernet1/0/1 (gpn: 29, port-number: 1)
----------------------------------------------------------X2 Serial EEPROM Contents:
Non-Volatile Register (NVR) Fields
X2 MSA Version supported :0x1E
NVR Size in bytes :0x100
Number of bytes used :0x100
Basic Field Address :0xB
Customer Field Address :0x77
Vendor Field Address :0xA7
Extended Vendor Field Address :0x100
Reserved :0x0
Transceiver type :0x2 =X2
Optical connector type :0x1 =SC
Bit encoding:0x1 =NRZ
Normal BitRate in multiple of 1M b/s :0x2848
Protocol Type:0x1 =10GgE
Standards Compliance Codes :
10GbE Code Byte 0 :0x4 =10GBASE-ER
10GbE Code Byte 1 :0x0
SONET/SDH Code Byte 0:0x0
SONET/SDH Code Byte 1:0x0
SONET/SDH Code Byte 2:0x0
SONET/SDH Code Byte 3:0x0
10GFC Code Byte 0 :0x0
10GFC Code Byte 1 :0x0
10GFC Code Byte 2 :0x0
10GFC Code Byte 3 :0x0
Transmission range in10m :0xFA0
Fibre Type :
Fibre Type Byte 0 :0x20 =SM, Generic
Fibre Type Byte 1 :0x0 =Unspecified
<output truncated>
This is an example of output from the show controllers ethernet-controller port-asic configuration command:
Switch# show controllers ethernet-controller port-asic configuration
========================================================================
Switch 1, PortASIC 0 Registers
-----------------------------------------------------------------------DeviceType
: 000101BC
Reset
: 00000000
PmadMicConfig
: 00000001
PmadMicDiag
: 00000003
SupervisorReceiveFifoSramInfo
: 000007D0 000007D0 40000000
SupervisorTransmitFifoSramInfo
: 000001D0 000001D0 40000000
GlobalStatus
: 00000800
IndicationStatus
: 00000000
IndicationStatusMask
: FFFFFFFF
InterruptStatus
: 00000000
InterruptStatusMask
: 01FFE800
SupervisorDiag
: 00000000
SupervisorFrameSizeLimit
: 000007C8
SupervisorBroadcast
: 000A0F01
GeneralIO
: 000003F9 00000000 00000004
StackPcsInfo
: FFFF1000 860329BD 5555FFFF FFFFFFFF
FF0FFF00 86020000 5555FFFF 00000000
StackRacInfo
: 73001630 00000003 7F001644 00000003
24140003 FD632B00 18E418E0 FFFFFFFF
StackControlStatus
: 18E418E0
stackControlStatusMask
: FFFFFFFF
TransmitBufferFreeListInfo
: 00000854 00000800 00000FF8 00000000
0000088A 0000085D 00000FF8 00000000
TransmitRingFifoInfo
: 00000016 00000016 40000000 00000000
0000000C 0000000C 40000000 00000000
TransmitBufferInfo
: 00012000 00000FFF 00000000 00000030
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
215
show controllers ethernet-controller
TransmitBufferCommonCount
TransmitBufferCommonCountPeak
TransmitBufferCommonCommonEmpty
NetworkActivity
DroppedStatistics
FrameLengthDeltaSelect
SneakPortFifoInfo
MacInfo
:
:
:
:
:
:
:
:
00000F7A
0000001E
000000FF
00000000 00000000 00000000 02400000
00000000
00000001
00000000
0EC0801C 00000001 0EC0801B 00000001
00C0001D 00000001 00C0001E 00000001
<output truncated>
This is an example of output from the show controllers ethernet-controller port-asic statistics command:
Switch# show controllers ethernet-controller port-asic statistics
===========================================================================
Switch 1, PortASIC 0 Statistics
--------------------------------------------------------------------------0 RxQ-0, wt-0 enqueue frames
0 RxQ-0, wt-0 drop frames
4118966 RxQ-0, wt-1 enqueue frames
0 RxQ-0, wt-1 drop frames
0 RxQ-0, wt-2 enqueue frames
0 RxQ-0, wt-2 drop frames
0 RxQ-1, wt-0 enqueue frames
296 RxQ-1, wt-1 enqueue frames
2836036 RxQ-1, wt-2 enqueue frames
0 RxQ-1, wt-0 drop frames
0 RxQ-1, wt-1 drop frames
0 RxQ-1, wt-2 drop frames
0 RxQ-2, wt-0 enqueue frames
0 RxQ-2, wt-1 enqueue frames
158377 RxQ-2, wt-2 enqueue frames
0 RxQ-2, wt-0 drop frames
0 RxQ-2, wt-1 drop frames
0 RxQ-2, wt-2 drop frames
0 RxQ-3, wt-0 enqueue frames
0 RxQ-3, wt-1 enqueue frames
0 RxQ-3, wt-2 enqueue frames
0 RxQ-3, wt-0 drop frames
0 RxQ-3, wt-1 drop frames
0 RxQ-3, wt-2 drop frames
15
0
0
0
0
74
0
0
0
TxBufferFull Drop Count
TxBufferFrameDesc BadCrc16
TxBuffer Bandwidth Drop Cou
TxQueue Bandwidth Drop Coun
TxQueue Missed Drop Statist
RxBuffer Drop DestIndex Cou
SneakQueue Drop Count
Learning Queue Overflow Fra
Learning Cam Skip Count
0
0
0
0
0
0
0
0
Rx Fcs Error Frames
Rx Invalid Oversize Frames
Rx Invalid Too Large Frames
Rx Invalid Too Large Frames
Rx Invalid Too Small Frames
Rx Too Old Frames
Tx Too Old Frames
System Fcs Error Frames
15 Sup Queue 0 Drop Frames
0 Sup Queue 8 Drop Frames
0 Sup Queue 1 Drop Frames
0 Sup Queue 9 Drop Frames
0 Sup Queue 2 Drop Frames
0 Sup Queue 10 Drop Frames
0 Sup Queue 3 Drop Frames
0 Sup Queue 11 Drop Frames
0 Sup Queue 4 Drop Frames
0 Sup Queue 12 Drop Frames
0 Sup Queue 5 Drop Frames
0 Sup Queue 13 Drop Frames
0 Sup Queue 6 Drop Frames
0 Sup Queue 14 Drop Frames
0 Sup Queue 7 Drop Frames
0 Sup Queue 15 Drop Frames
===========================================================================
Switch 1, PortASIC 1 Statistics
--------------------------------------------------------------------------0 RxQ-0, wt-0 enqueue frames
0 RxQ-0, wt-0 drop frames
52 RxQ-0, wt-1 enqueue frames
0 RxQ-0, wt-1 drop frames
0 RxQ-0, wt-2 enqueue frames
0 RxQ-0, wt-2 drop frames
<output truncated>
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
216
show controllers power inline
show controllers power inline
To display the values in the registers of the specified Power over Ethernet (PoE) controller, use the show
controllers power inline EXEC command.
show controllers power inline [ instance ] [module switch-number]
Syntax Description
instance
(Optional) Power controller instance, where each instance corresponds to four
ports. The possible range is 0 to 11, depending on the number of ports.
module switch number
(Optional) Limits the display to ports on the specified stack member. The switch
number is 1 to 9.
This keyword is available only on stacking-capable switches.
Command Modes
Privileged EXEC
User EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Though visible on all switches, this command is valid only for PoE switches. It provides no information for
switches that do not support PoE.
The output provides information that might be useful for Cisco technical support representatives troubleshooting
the switch.
Examples
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
217
show controllers tcam
show controllers tcam
To display the state of the registers for all hardware memory in the system and for all hardware interface
ASICs that are content-addressable memory-controllers, use the show controllers tcam privileged EXEC
command.
show controllers tcam [asic [number]] [detail]
Syntax Description
Command Modes
Command History
asic
(Optional) Displays port ASIC hardware information.
number
(Optional) Displays information for the specified port ASIC number. The range
is from 0 to 15.
detail
(Optional) Displays detailed hardware register information.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives
troubleshooting the switch.
Examples
This is an example of output from the show controllers tcam command:
Switch# show controllers tcam
-----------------------------------------------------------------------TCAM-0 Registers
-----------------------------------------------------------------------REV:
00B30103
SIZE:
00080040
ID:
00000000
CCR:
00000000_F0000020
RPID0:
RPID1:
RPID2:
RPID3:
00000000_00000000
00000000_00000000
00000000_00000000
00000000_00000000
HRR0:
HRR1:
HRR2:
HRR3:
HRR4:
HRR5:
HRR6:
HRR7:
00000000_E000CAFC
00000000_00000000
00000000_00000000
00000000_00000000
00000000_00000000
00000000_00000000
00000000_00000000
00000000_00000000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
218
show controllers tcam
<output truncated>
GMR31:
GMR32:
GMR33:
FF_FFFFFFFF_FFFFFFFF
FF_FFFFFFFF_FFFFFFFF
FF_FFFFFFFF_FFFFFFFF
=============================================================================
TCAM related PortASIC 1 registers
=============================================================================
LookupType:
89A1C67D_24E35F00
LastCamIndex:
0000FFE0
LocalNoMatch:
000069E0
ForwardingRamBaseAddress:
00022A00 0002FE00 00040600 0002FE00 0000D400
00000000 003FBA00 00009000 00009000 00040600
00000000 00012800 00012900
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
219
show controllers utilization
show controllers utilization
To display bandwidth utilization, use the show controllers utilization command in EXEC mode.
show controllers [interface-id] utilization
Syntax Description
interface-id
Command Default
None
Command Modes
User EXEC
(Optional) ID of the physical interface.
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show controllers utilization command:
Switch> show controllers utilization
Port
Receive Utilization Transmit Utilization
Gi1/0/1
0
0
Gi1/0/2
0
0
Gi1/0/3
0
0
Gi1/0/4
0
0
Gi1/0/5
0
0
Gi1/0/6
0
0
Gi1/0/7
0
0
<output truncated>
Gi2/0/1
0
0
Gi2/0/2
0
0
<output truncated>
Switch Receive Bandwidth Percentage Utilization : 0
Switch Transmit Bandwidth Percentage Utilization : 0
Switch Fabric Percentage Utilization : 0
This is an example of output from the show controllers utilization command on a specific port:
Switch> show controllers gigabitethernet1/0/1 utilization
Receive Bandwidth Percentage Utilization
: 0
Transmit Bandwidth Percentage Utilization : 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
220
show controllers utilization
Table 13: Show controllers utilization Field Descriptions
Field
Description
Receive Bandwidth Percentage
Utilization
Displays the received bandwidth usage of the switch, which is the sum
of the received traffic on all the ports divided by the switch receive
capacity.
Transmit Bandwidth Percentage Displays the transmitted bandwidth usage of the switch, which is the sum
Utilization
of the transmitted traffic on all the ports divided it by the switch transmit
capacity.
Fabric Percentage Utilization
Displays the average of the transmitted and received bandwidth usage of
the switch.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
221
show env
show env
To display fan, temperature, and power information, use the show env command in EXEC mode.
show env {all| fan| power [all| switch [stack-member-number]]| stack [stack-member-number] | temperature
[status]}
Syntax Description
all
Displays the fan and temperature environmental status and the status of
the internal power supplies.
fan
Displays the switch fan status.
power
Displays the internal power status of the active switch.
all
(Optional) Displays the status of all the internal power supplies in a
standalone switch when the command is entered on the switch, or in all
the stack members when the command is entered on the active switch.
switch
(Optional) Displays the status of the internal power supplies for each
switch in the stack or for the specified switch.
This keyword is available only on stacking-capable switches.
stack-member-number
(Optional) Number of the stack member for which to display the status
of the internal power supplies or the environmental status.
The range is 1 to 9.
stack
Displays all environmental status for each switch in the stack or for the
specified switch.
This keyword is available only on stacking-capable switches.
temperature
Displays the switch temperature status.
status
(Optional) Displays the switch internal temperature (not the external
temperature) and the threshold values.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
222
show env
Usage Guidelines
Use the show env EXEC command to display the information for the switch being accessed—a standalone
switch or the active switch. Use this command with the stack and switch keywords to display all information
for the stack or for the specified stack member.
If you enter the show env temperature status command, the command output shows the switch temperature
state and the threshold level.
You can also use the show env temperature command to display the switch temperature status. The command
output shows the green and yellow states as OK and the red state as FAULTY. If you enter the show env all
command, the command output is the same as the show env temperature status command output.
Examples
This is an example of output from the show env all command:
Switch>show env all
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is OK
FAN PS-2 is NOT PRESENT
Switch 1: SYSTEM TEMPERATURE is OK
SW PID
Serial#
Status
-- ------------------ ---------- --------------1A PWR-C2-250WAC
LIT16372A1M OK
1B Not Present
Sys Pwr
------Good
PoE Pwr
------Good
Watts
----250
This is an example of output from the show env fan command:
Switch>show env fan
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is NOT PRESENT
FAN PS-2 is OK
This is an example of output from the show env power all command on the active switch:
Switch# show env power all
SW PID
Serial#
Status
-- ------------------ ---------- --------------1A PWR-C2-250WAC
LIT16372A1M OK
1B Not Present
Sys Pwr
------Good
PoE Pwr
------Good
Watts
----250
This is an example of output from the show env stack command on the active switch:
Switch> show env stack
SWITCH: 1
Switch 1 FAN 1 is OK
Switch 1 FAN 2 is OK
Switch 1 FAN 3 is OK
FAN PS-1 is NOT PRESENT
FAN PS-2 is OK
Switch 1: SYSTEM TEMPERATURE
Temperature Value: 28 Degree
Temperature State: GREEN
Yellow Threshold : 41 Degree
Red Threshold
: 56 Degree
is OK
Celsius
Celsius
Celsius
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
223
show env
This example shows how to display the temperature value, state, and the threshold values on a standalone
switch. The table describes the temperature states in the command output.
Switch> show env temperature
Temperature Value: 33 Degree
Temperature State: GREEN
Yellow Threshold : 65 Degree
Red Threshold
: 75 Degree
status
Celsius
Celsius
Celsius
Table 14: States in the show env temperature status Command Output
State
Description
Green
The switch temperature is in the normal operating
range.
Yellow
The temperature is in the warning range. You should
check the external temperature around the switch.
Red
The temperature is in the critical range. The switch
might not run properly if the temperature is in this
range.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
224
show errdisable detect
show errdisable detect
To display error-disabled detection status, use the show errdisable detect command in EXEC mode.
show errdisable detect
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A gbic-invalid error reason refers to an invalid small form-factor pluggable (SFP) module.
The error-disable reasons in the command output are listed in alphabetical order. The mode column shows
how error-disable is configured for each feature.
You can configure error-disabled detection in these modes:
• port mode—The entire physical port is error-disabled if a violation occurs.
• vlan mode—The VLAN is error-disabled if a violation occurs.
• port/vlan mode—The entire physical port is error-disabled on some ports and is per-VLAN error-disabled
on other ports.
Examples
This is an example of output from the show errdisable detect command:
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
225
show errdisable recovery
show errdisable recovery
To display the error-disabled recovery timer information, use the show errdisable recovery command in
EXEC mode.
show errdisable recovery
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Note
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
A gbic-invalid error-disable reason refers to an invalid small form-factor pluggable (SFP) module interface.
Though visible in the output, the unicast-flood field is not valid.
This is an example of output from the show errdisable recovery command:
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
226
show interfaces
show interfaces
To display the administrative and operational status of all interfaces or for a specified interface, use the show
interfaces command in privileged EXEC mode.
show interfaces [interface-id| vlan vlan-id] [accounting| capabilities [module number]| debounce|
description| etherchannel| flowcontrol| private-vlan mapping| pruning| stats| status [err-disabled]| trunk]
Syntax Description
interface-id
(Optional) ID of the interface. Valid interfaces include physical
ports (including type, stack member for stacking-capable switches,
module, and port number) and port channels. The port channel
range is 1 to 48.
vlan vlan-id
(Optional) VLAN identification. The range is 1 to 4094.
accounting
(Optional) Displays accounting information on the interface,
including active protocols and input and output packets and octets.
Note
The display shows only packets processed in software;
hardware-switched packets do not appear.
capabilities
(Optional) Displays the capabilities of all interfaces or the specified
interface, including the features and options that you can configure
on the interface. Though visible in the command line help, this
option is not available for VLAN IDs.
module number
(Optional) Displays capabilities of all interfaces on the switch or
specified stack member.
This option is not available if you entered a specific interface ID.
description
(Optional) Displays the administrative status and description set
for an interface.
etherchannel
(Optional) Displays interface EtherChannel information.
flowcontrol
(Optional) Displays interface flow control information.
private-vlan mapping
(Optional) Displays private-VLAN mapping information for the
VLAN switch virtual interfaces (SVIs). This keyword is not
available if the switch is running the LAN base feature set.
pruning
(Optional) Displays trunk VTP pruning information for the
interface.
stats
(Optional) Displays the input and output packets by switching the
path for the interface.
status
(Optional) Displays the status of the interface. A status of
unsupported in the Type field means that a non-Cisco small
form-factor pluggable (SFP) module is inserted in the module slot.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
227
show interfaces
Note
err-disabled
(Optional) Displays interfaces in an error-disabled state.
trunk
(Optional) Displays interface trunk information. If you do not
specify an interface, only information for active trunking ports
appears.
Though visible in the command-line help strings, the crb, fair-queue, irb, mac-accounting, precedence,
random-detect, rate-limit, and shape keywords are not supported.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The show interfaces capabilities command with different keywords has these results:
• Use the show interface capabilities module number command to display the capabilities of all interfaces
on that switch in the stack. If there is no switch with that module number in the stack, there is no output.
• Use the show interfaces interface-id capabilities to display the capabilities of the specified interface.
• Use the show interfaces capabilities (with no module number or interface ID) to display the capabilities
of all interfaces in the stack.
Examples
This is an example of output from the show interfaces command for an interface on stack member 3:
Switch# show interfaces gigabitethernet3/0/2
GigabitEthernet3/0/2 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is 2037.064d.4381 (bia 2037.064d.4381)
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Auto-duplex, Auto-speed, media type is 10/100/1000BaseTX
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
228
show interfaces
Received 0 broadcasts (0 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 input packets with dribble condition detected
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
This is an example of output from the show interfaces accounting command:
This is an example of output from the show interfaces capabilities command for an interface:
This is an example of output from the show interfaces interface description command when the interface
has been described as Connects to Marketing by using the description interface configuration command:
Switch# show interfaces gigabitethernet1/0/2 description
Interface
Status
Protocol Description
Gi1/0/2
up
down
Connects to Marketing
This is an example of output from the show interfaces etherchannel command when port channels are
configured on the switch:
Switch# show interfaces etherchannel
---Port-channel34:
Age of the Port-channel
= 28d:18h:51m:46s
Logical slot/port
= 12/34
Number of ports = 0
GC
= 0x00000000
HotStandBy port = null
Passive port list
=
Port state
= Port-channel L3-Ag Ag-Not-Inuse
Protocol
=
Port security
= Disabled
This is an example of output from the show interfaces interface-id pruning command when pruning is enabled
in the VTP domain:
Switch# show interfaces gigabitethernet1/0/2 pruning
Port
Vlans pruned for lack of request by neighbor
Gi1/0/2
3,4
Port
Gi1/0/2
Vlans traffic requested of neighbor
1-3
This is an example of output from the show interfaces stats command for a specified VLAN interface:
Switch# show interfaces vlan 1 stats
Switching path
Pkts In
Chars In
Processor
1165354
136205310
Route cache
0
0
Total
1165354
136205310
Pkts Out
570800
0
570800
Chars Out
91731594
0
91731594
This is an example of partial output from the show interfaces status command. It displays the status of all
interfaces:
These are examples of output from the show interfaces status command for a specific interface when private
VLANs are configured. Port 22 is configured as a private-VLAN host port. It is associated with primary
VLAN 20 and secondary VLAN 25:
Switch# show interfaces gigabitethernet1/0/22 status
Port
Name
Status
Vlan
Duplex
Gi1/0/22
connected
20,25
a-full
Speed
a-100
Type
10/100BaseTX
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
229
show interfaces
In this example, port 20 is configured as a private-VLAN promiscuous port. The display shows only the
primary VLAN 20:
Switch# show interfaces gigabitethernet1/0/20 status
Port
Name
Status
Vlan
Duplex
Gi1/0/20
connected
20
a-full
Speed
a-100
Type
10/100BaseTX
This is an example of output from the show interfaces status err-disabled command. It displays the status
of interfaces in the error-disabled state:
Switch# show interfaces status err-disabled
Port
Name
Status
Reason
Gi1/0/2
err-disabled
gbic-invalid
Gi2/0/3
err-disabled
dtp-flap
This is an example of output from the show interfaces interface-id pruning command:
Switch# show interfaces gigabitethernet1/0/2 pruning
Port Vlans pruned for lack of request by neighbor
This is an example of output from the show interfaces interface-id trunk command. It displays trunking
information for the port.
Switch# show interfaces gigabitethernet1/0/1 trunk
Port
Mode
Encapsulation Status
Gi1/0/1
on
802.1q
other
Port
Gi1/0/1
Vlans allowed on trunk
none
Port
Gi1/0/1
Vlans allowed and active in management domain
none
Port
Gi1/0/1
Vlans in spanning tree forwarding state and not pruned
none
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
230
Native vlan
10
show interfaces counters
show interfaces counters
To display various counters for the switch or for a specific interface, use the show interfaces counters
command in privileged EXEC mode.
show interfaces [interface-id] counters [errors| etherchannel| module stack-member-number| protocol
status| trunk]
Syntax Description
Note
interface-id
(Optional) ID of the physical interface, including type, stack member
(stacking-capable switches only) module, and port number.
errors
(Optional) Displays error counters.
etherchannel
(Optional) Displays EtherChannel counters, including octets, broadcast
packets, multicast packets, and unicast packets received and sent.
module
stack-member-number
(Optional) Displays counters for the specified stack member.
protocol status
(Optional) Displays the status of protocols enabled on interfaces.
trunk
(Optional) Displays trunk counters.
None
Command Modes
Privileged EXEC
Usage Guidelines
In this command, the module keyword refers to the stack member
number. The module number that is part of the interface ID is always
zero.
Though visible in the command-line help string, the vlan vlan-id keyword is not supported.
Command Default
Command History
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
If you do not enter any keywords, all counters for all interfaces are included.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
231
show interfaces counters
Examples
This is an example of partial output from the show interfaces counters command. It displays all counters for
the switch.
Switch# show interfaces counters
Port
InOctets
InUcastPkts
Gi1/0/1
0
0
Gi1/0/2
0
0
Gi1/0/3
95285341
43115
Gi1/0/4
0
0
InMcastPkts
0
0
1178430
0
InBcastPkts
0
0
1950
0
<output truncated>
This is an example of partial output from the show interfaces counters module command for stack member
2. It displays all counters for the specified switch in the stack.
Switch# show interfaces counters module 2
Port
InOctets
InUcastPkts
Gi1/0/1
520
2
Gi1/0/2
520
2
Gi1/0/3
520
2
Gi1/0/4
520
2
InMcastPkts
0
0
0
0
InBcastPkts
0
0
0
0
<output truncated>
This is an example of partial output from the show interfaces counters protocol status command for all
interfaces:
Switch# show interfaces counters protocol status
Protocols allocated:
Vlan1: Other, IP
Vlan20: Other, IP, ARP
Vlan30: Other, IP, ARP
Vlan40: Other, IP, ARP
Vlan50: Other, IP, ARP
Vlan60: Other, IP, ARP
Vlan70: Other, IP, ARP
Vlan80: Other, IP, ARP
Vlan90: Other, IP, ARP
Vlan900: Other, IP, ARP
Vlan3000: Other, IP
Vlan3500: Other, IP
GigabitEthernet1/0/1: Other, IP, ARP, CDP
GigabitEthernet1/0/2: Other, IP
GigabitEthernet1/0/3: Other, IP
GigabitEthernet1/0/4: Other, IP
GigabitEthernet1/0/5: Other, IP
GigabitEthernet1/0/6: Other, IP
GigabitEthernet1/0/7: Other, IP
GigabitEthernet1/0/8: Other, IP
GigabitEthernet1/0/9: Other, IP
GigabitEthernet1/0/10: Other, IP, CDP
<output truncated>
This is an example of output from the show interfaces counters trunk command. It displays trunk counters
for all interfaces.
Switch# show interfaces counters trunk
Port
TrunkFramesTx
TrunkFramesRx
Gi1/0/1
0
0
Gi1/0/2
0
0
Gi1/0/3
80678
0
Gi1/0/4
82320
0
Gi1/0/5
0
0
WrongEncap
0
0
0
0
0
<output truncated>
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
232
show interfaces switchport
show interfaces switchport
To display the administrative and operational status of a switching (nonrouting) port, including port blocking
and port protection settings, use the show interfaces switchport command in privileged EXEC mode.
show interfaces [interface-id] switchport [backup [detail]| module number]
Syntax Description
interface-id
(Optional) ID of the interface. Valid interfaces include physical ports (including
type, stack member for stacking-capable switches, module, and port number) and
port channels. The port channel range is 1 to 48.
backup
(Optional) Displays Flex Link backup interface configuration for the specified
interface or all interfaces.
detail
(Optional) Displays detailed backup information for the specified interface or all
interfaces on the switch or the stack.
module number
(Optional) Displays switchport configuration of all interfaces on the switch or
specified stack member.
This option is not available if you entered a specific interface ID.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use the show interface switchport module number command to display the switch port characteristics of
all interfaces on that switch in the stack. If there is no switch with that module number in the stack, there is
no output.
Examples
This is an example of output from the show interfaces switchport command for a port. The table that follows
describes the fields in the display.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
233
show interfaces switchport
Note
Private VLANs are not supported in this release, so those fields are not applicable.
Switch# show interfaces gigabitethernet1/0/1 switchport
Name: Gi1/0/1
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: down
Administrative Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 10 (VLAN0010)
Administrative Native VLAN tagging: enabled
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings: none
Operational private-vlan: none
Trunking VLANs Enabled: 11-20
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
Appliance trust: none
Field
Description
Name
Displays the port name.
Switchport
Displays the administrative and operational status of
the port. In this display, the port is in switchport
mode.
Administrative Mode
Displays the administrative and operational modes.
Operational Mode
Administrative Trunking Encapsulation
Operational Trunking Encapsulation
Displays the administrative and operational
encapsulation method and whether trunking
negotiation is enabled.
Negotiation of Trunking
Access Mode VLAN
Displays the VLAN ID to which the port is
configured.
Trunking Native Mode VLAN
Lists the VLAN ID of the trunk that is in native mode.
Lists the allowed VLANs on the trunk. Lists the active
VLANs on the trunk.
Trunking VLANs Enabled
Trunking VLANs Active
Pruning VLANs Enabled
Lists the VLANs that are pruning-eligible.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
234
show interfaces switchport
Field
Description
Protected
Displays whether or not protected port is enabled
(True) or disabled (False) on the interface.
Unknown unicast blocked
Displays whether or not unknown multicast and
unknown unicast traffic is blocked on the interface.
Unknown multicast blocked
Voice VLAN
Displays the VLAN ID on which voice VLAN is
enabled.
Appliance trust
Displays the class of service (CoS) setting of the data
packets of the IP phone.
This is an example of output from the show interfaces switchport backup command:
Switch# show interfaces switchport backup
Switch Backup Interface Pairs:
Active Interface
Backup Interface
State
-------------------------------------------------------------Gi1/0/1
Gi1/0/2
Active Up/Backup Standby
Gi3/0/3
Gi4/0/5
Active Down/Backup Up
Po1
Po2
Active Standby/Backup Up
In this example of output from the show interfaces switchport backup command, VLANs 1 to 50, 60, and
100 to 120 are configured on the switch:
Switch(config)# interface gigabitethernet 2/0/6
Switch(config-if)# switchport backup interface gigabitethernet 2/0/8
prefer vlan 60,100-120
When both interfaces are up, Gi2/0/8 forwards traffic for VLANs 60, 100 to 120, and Gi2/0/6 will forward
traffic for VLANs 1 to 50.
Switch# show interfaces switchport backup
Switch Backup Interface Pairs:
Active Interface
Backup Interface
State
-----------------------------------------------------------------------GigabitEthernet2/0/6
GigabitEthernet2/0/8
Active Up/Backup Up
Vlans on Interface Gi 2/0/6: 1-50
Vlans on Interface Gi 2/0/8: 60, 100-120
When a Flex Link interface goes down (LINK_DOWN), VLANs preferred on this interface are moved to the
peer interface of the Flex Link pair. In this example, if interface Gi2/0/6 goes down, Gi2/0/8 carries all VLANs
of the Flex Link pair.
Switch# show interfaces switchport backup
Switch Backup Interface Pairs:
Active Interface
Backup Interface
State
-----------------------------------------------------------------------GigabitEthernet2/0/6
GigabitEthernet2/0/8
Active Down/Backup Up
Vlans on Interface Gi 2/0/6:
Vlans on Interface Gi 2/0/8: 1-50, 60, 100-120
When a Flex Link interface comes up, VLANs preferred on this interface are blocked on the peer interface
and moved to the forwarding state on the interface that has just come up. In this example, if interface Gi2/0/6
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
235
show interfaces switchport
comes up, then VLANs preferred on this interface are blocked on the peer interface Gi2/0/8 and forwarded
on Gi2/0/6.
Switch# show interfaces switchport backup
Switch Backup Interface Pairs:
Active Interface
Backup Interface
State
-----------------------------------------------------------------------GigabitEthernet2/0/6
GigabitEthernet2/0/8
Active Up/Backup Up
Vlans on Interface Gi 2/0/6: 1-50
Vlans on Interface Gi 2/0/8: 60, 100-120
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
236
show interfaces transceiver
show interfaces transceiver
To display the physical properties of a small form-factor pluggable (SFP) module interface, use the show
interfaces transceiver command in EXEC mode.
show interfaces [interface-id] transceiver [detail| module number| properties| supported-list|
threshold-table]
Syntax Description
interface-id
(Optional) ID of the physical interface, including type, stack member
(stacking-capable switches only) module, and port number.
detail
(Optional) Displays calibration properties, including high and low numbers
and any alarm information for any Digital Optical Monitoring (DoM)-capable
transceiver if one is installed in the switch.
module number
(Optional) Limits display to interfaces on module on the switch.
The range is 1 to 9.
This option is not available if you entered a specific interface ID.
Command Modes
properties
(Optional) Displays speed, duplex, and inline power settings on an interface.
supported-list
(Optional) Lists all supported transceivers.
threshold-table
(Optional) Displays alarm and warning threshold table.
User EXEC
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show interfaces interface-id transceiver properties command:
This is an example of output from the show interfaces interface-id transceiver detail command:
Switch# show interfaces gigabitethernet1/1/1 transceiver detail
ITU Channel not available (Wavelength not available),
Transceiver is internally calibrated.
mA:milliamperes, dBm:decibels (milliwatts), N/A:not applicable.
++:high alarm, +:high warning, -:low warning, -- :low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are uncalibrated.
High Alarm
High Warn
Low Warn
Low Alarm
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
237
show interfaces transceiver
Port
------Gi1/1/1
Temperature
Threshold
Threshold Threshold Threshold
(Celsius)
(Celsius)
(Celsius) (Celsius) (Celsius)
----------------- ---------- --------- --------- --------29.9
74.0
70.0
0.0
-4.0
High Alarm High Warn Low Warn
Low Alarm
Voltage
Threshold
Threshold Threshold Threshold
(Volts)
(Volts)
(Volts)
(Volts)
(Volts)
------------------------ --------- --------- --------3.28
3.60
3.50
3.10
3.00
Port
------Gi1/1/1
Optical
Transmit Power
(dBm)
----------------1.8
High Alarm
Threshold
(dBm)
---------7.9
High Warn
Threshold
(dBm)
--------3.9
Low Warn
Threshold
(dBm)
--------0.0
Low Alarm
Threshold
(dBm)
---------4.0
Port
------Gi1/1/1
Optical
Receive Power
(dBm)
-----------------23.5
High Alarm
Threshold
(dBm)
----------5.0
High Warn
Threshold
(dBm)
---------9.0
Low Warn
Threshold
(dBm)
---------28.2
Low Alarm
Threshold
(dBm)
---------32.2
Port
------Gi1/1/1
This is an example of output from the show interfaces transceiver threshold-table command:
Switch# show interfaces transceiver threshold-table
Optical Tx
Optical Rx
Temp
Laser Bias
current
------------- ------------- ----------------DWDM GBIC
Min1
-4.00
Min2
0.00
Max2
4.00
Max1
7.00
DWDM SFP
Min1
-4.00
Min2
0.00
Max2
4.00
Max1
8.00
RX only WDM GBIC
Min1
N/A
Min2
N/A
Max2
N/A
Max1
N/A
DWDM XENPAK
Min1
-5.00
Min2
-1.00
Max2
3.00
Max1
7.00
DWDM X2
Min1
-5.00
Min2
-1.00
Max2
3.00
Max1
7.00
DWDM XFP
Min1
-5.00
Min2
-1.00
Max2
3.00
Max1
7.00
CWDM X2
Min1
N/A
Min2
N/A
Max2
N/A
Max1
N/A
---------
-32.00
-28.00
-9.00
-5.00
-4
0
70
74
N/A
N/A
N/A
N/A
4.65
4.75
5.25
5.40
-32.00
-28.00
-9.00
-5.00
-4
0
70
74
N/A
N/A
N/A
N/A
3.00
3.10
3.50
3.60
-32.00
-28.30
-9.00
-5.00
-4
0
70
74
N/A
N/A
N/A
N/A
4.65
4.75
5.25
5.40
-28.00
-24.00
-7.00
-3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-28.00
-24.00
-7.00
-3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
-28.00
-24.00
-7.00
-3.00
-4
0
70
74
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
0
0
0
0
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
<output truncated>
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
238
Voltage
show mgmt-infra trace messages ilpower
show mgmt-infra trace messages ilpower
To display inline power messages within a trace buffer, use the show mgmt-infra trace messages ilpower
command in privileged EXEC mode.
show mgmt-infra trace messages ilpower [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Specifies the stack member number for which to display
inline power messages within a trace buffer.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an output example from the show mgmt-infra trace messages ilpower command:
Switch# show mgmt-infra trace messages ilpower
[10/23/12 14:05:10.984 UTC 1 3] Initialized inline power system configuration fo
r slot 1.
[10/23/12 14:05:10.984 UTC 2 3] Initialized inline power system configuration fo
r slot 2.
[10/23/12 14:05:10.984 UTC 3 3] Initialized inline power system configuration fo
r slot 3.
[10/23/12 14:05:10.984 UTC 4 3] Initialized inline power system configuration fo
r slot 4.
[10/23/12 14:05:10.984 UTC 5 3] Initialized inline power system configuration fo
r slot 5.
[10/23/12 14:05:10.984 UTC 6 3] Initialized inline power system configuration fo
r slot 6.
[10/23/12 14:05:10.984 UTC 7 3] Initialized inline power system configuration fo
r slot 7.
[10/23/12 14:05:10.984 UTC 8 3] Initialized inline power system configuration fo
r slot 8.
[10/23/12 14:05:10.984 UTC 9 3] Initialized inline power system configuration fo
r slot 9.
[10/23/12 14:05:10.984 UTC a 3] Inline power subsystem initialized.
[10/23/12 14:05:18.908 UTC b 264] Create new power pool for slot 1
[10/23/12 14:05:18.909 UTC c 264] Set total inline power to 450 for slot 1
[10/23/12 14:05:20.273 UTC d 3] PoE is not supported on .
[10/23/12 14:05:20.288 UTC e 3] PoE is not supported on .
[10/23/12 14:05:20.299 UTC f 3] PoE is not supported on .
[10/23/12 14:05:20.311 UTC 10 3] PoE is not supported on .
[10/23/12 14:05:20.373 UTC 11 98] Inline power process post for switch 1
[10/23/12 14:05:20.373 UTC 12 98] PoE post passed on switch 1
[10/23/12 14:05:20.379 UTC 13 3] Slot #1: PoE initialization for board id 16387
[10/23/12 14:05:20.379 UTC 14 3] Set total inline power to 450 for slot 1
[10/23/12 14:05:20.379 UTC 15 3] Gi1/0/1 port config Initialized
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
239
show mgmt-infra trace messages ilpower
[10/23/12
[10/23/12
[10/23/12
[10/23/12
[10/23/12
[10/23/12
14:05:20.379
14:05:20.380
14:05:20.380
14:05:20.380
14:05:50.440
14:05:50.440
UTC
UTC
UTC
UTC
UTC
UTC
16
17
18
19
1a
1b
3]
3]
3]
3]
3]
3]
Interface Gi1/0/1 initialization done.
Gi1/0/24 port config Initialized
Interface Gi1/0/24 initialization done.
Slot #1: initialization done.
Slot #1: PoE initialization for board id 16387
Duplicate init event
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
240
show mgmt-infra trace messages ilpower-ha
show mgmt-infra trace messages ilpower-ha
To display inline power high availability messages within a trace buffer, use the show mgmt-infra trace
messages ilpower-ha command in privileged EXEC mode.
show mgmt-infra trace messages ilpower-ha [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Specifies the stack member number for which to display
inline power messages within a trace buffer.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an output example from the show mgmt-infra trace messages ilpower-ha command:
Switch# show mgmt-infra trace messages ilpower-ha
[10/23/12 14:04:48.087 UTC 1 3] NG3K_ILPOWER_HA: Created NGWC ILP CF client succ
essfully.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
241
show mgmt-infra trace messages platform-mgr-poe
show mgmt-infra trace messages platform-mgr-poe
To display platform manager Power over Ethernet (PoE) messages within a trace buffer, use the show
mgmt-infra trace messages platform-mgr-poe privileged EXEC command.
show mgmt-infra trace messages platform-mgr-poe [switch stack-member-number]
Syntax Description
switch stack-member-number
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
(Optional) Specifies the stack member number for which to display
messages within a trace buffer.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of partial output from the show mgmt-infra trace messages platform-mgr-poe command:
Switch# show mgmt-infra trace messages platform-mgr-poe
[10/23/12 14:04:06.431 UTC 1 5495] PoE Info: get power controller param sent:
[10/23/12 14:04:06.431 UTC 2 5495] PoE Info: POE_SHUT sent for port 1 (0:0)
[10/23/12 14:04:06.431 UTC 3 5495] PoE Info: POE_SHUT sent for port 2 (0:1)
[10/23/12 14:04:06.431 UTC 4 5495] PoE Info: POE_SHUT sent for port 3 (0:2)
[10/23/12 14:04:06.431 UTC 5 5495] PoE Info: POE_SHUT sent for port 4 (0:3)
[10/23/12 14:04:06.431 UTC 6 5495] PoE Info: POE_SHUT sent for port 5 (0:4)
[10/23/12 14:04:06.431 UTC 7 5495] PoE Info: POE_SHUT sent for port 6 (0:5)
[10/23/12 14:04:06.431 UTC 8 5495] PoE Info: POE_SHUT sent for port 7 (0:6)
[10/23/12 14:04:06.431 UTC 9 5495] PoE Info: POE_SHUT sent for port 8 (0:7)
[10/23/12 14:04:06.431 UTC a 5495] PoE Info: POE_SHUT sent for port 9 (0:8)
[10/23/12 14:04:06.431 UTC b 5495] PoE Info: POE_SHUT sent for port 10 (0:9)
[10/23/12 14:04:06.431 UTC c 5495] PoE Info: POE_SHUT sent for port 11 (0:10)
[10/23/12 14:04:06.431 UTC d 5495] PoE Info: POE_SHUT sent for port 12 (0:11)
[10/23/12 14:04:06.431 UTC e 5495] PoE Info: POE_SHUT sent for port 13 (e:0)
[10/23/12 14:04:06.431 UTC f 5495] PoE Info: POE_SHUT sent for port 14 (e:1)
[10/23/12 14:04:06.431 UTC 10 5495] PoE Info: POE_SHUT sent for port 15 (e:2)
[10/23/12 14:04:06.431 UTC 11 5495] PoE Info: POE_SHUT sent for port 16 (e:3)
[10/23/12 14:04:06.431 UTC 12 5495] PoE Info: POE_SHUT sent for port 17 (e:4)
[10/23/12 14:04:06.431 UTC 13 5495] PoE Info: POE_SHUT sent for port 18 (e:5)
[10/23/12 14:04:06.431 UTC 14 5495] PoE Info: POE_SHUT sent for port 19 (e:6)
[10/23/12 14:04:06.431 UTC 15 5495] PoE Info: POE_SHUT sent for port 20 (e:7)
[10/23/12 14:04:06.431 UTC 16 5495] PoE Info: POE_SHUT sent for port 21 (e:8)
[10/23/12 14:04:06.431 UTC 17 5495] PoE Info: POE_SHUT sent for port 22 (e:9)
[10/23/12 14:04:06.431 UTC 18 5495] PoE Info: POE_SHUT sent for port 23 (e:10)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
242
show network-policy profile
show network-policy profile
To display the network-policy profiles, use the show network policy profile command in privileged EXEC
mode.
show network-policy profile [profile-number] [detail]
Syntax Description
profile-number
(Optional) Displays the network-policy profile number. If no profile is entered,
all network-policy profiles appear.
detail
(Optional) Displays detailed status and statistics information.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show network-policy profile command:
Switch# show network-policy profile
Network Policy Profile 10
voice vlan 17 cos 4
Interface:
none
Network Policy Profile 30
voice vlan 30 cos 5
Interface:
none
Network Policy Profile 36
voice vlan 4 cos 3
Interface:
Interface_id
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
243
show platform CAPWAP summary
show platform CAPWAP summary
To display the tunnel identifier and the type all the CAPWAP tunnels established by the controller to the
access points and other mobility controllers, use the show platform CAPWAP summary command.
show platform CAPWAP summary
Syntax Description
This command has no arguments or keywords.
Command Default
Command Modes
Command History
Examples
Global configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example displays the tunnel identifier and details:
Switch# show platform capwap summary
Tunnel ID | Type | Src IP | Dst IP | SPrt | DPrt | S | A
------------------------------------------------------------------------------0x0088498000000983 data 9.6.44.61 9.12.138.101 5247 41894 1 1
0x00966dc000000010 data 9.6.44.61 9.6.47.101 5247 62526 1 2
0x00938e800000095b data 9.6.44.61 9.12.138.100 5247 45697 1 1
0x00ab1a8000000bd1 data 9.6.44.61 9.12.139.101 5247 38906 1 0
0x00896e40000000bd data 9.6.44.61 9.12.136.100 5247 1836 1 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
244
show power inline
show power inline
To display the Power over Ethernet (PoE) status for the specified PoE port, the specified stack member, or
for all PoE ports in the switch stack, use the show power inline command in EXEC mode.
show power inline [police| priority] [interface-id | module stack-member-number] [detail]
Syntax Description
police
(Optional) Displays the power policing information about
real-time power consumption.
priority
(Optional) Displays the power inline port priority for each port.
interface-id
(Optional) ID of the physical interface.
module stack-member-number
(Optional) Limits the display to ports on the specified stack
member.
This keyword is supported only on stacking-capable switches.
detail
Command Modes
(Optional) Displays detailed output of the interface or module.
User EXEC
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This is an example of output from the show power inline command. The table that follows describes the
output fields.
Switch> show power inline
Module
Available
Used
Remaining
(Watts)
(Watts)
(Watts)
----------------------------1
n/a
n/a
n/a
2
n/a
n/a
n/a
3
1440.0
15.4
1424.6
4
720.0
6.3
713.7
Interface Admin Oper
Power
Device
(Watts)
--------- ------ ---------- ------- ------------------Gi3/0/1
auto
off
0.0
n/a
Gi3/0/2
auto
off
0.0
n/a
Gi3/0/3
auto
off
0.0
n/a
Gi3/0/4
auto
off
0.0
n/a
Gi3/0/5
auto
off
0.0
n/a
Gi3/0/6
auto
off
0.0
n/a
Class Max
----n/a
n/a
n/a
n/a
n/a
n/a
---30.0
30.0
30.0
30.0
30.0
30.0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
245
show power inline
Gi3/0/7
auto
off
Gi3/0/8
auto
off
Gi3/0/9
auto
off
Gi3/0/10 auto
off
Gi3/0/11 auto
off
Gi3/0/12 auto
off
<output truncated>
0.0
0.0
0.0
0.0
0.0
0.0
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
30.0
30.0
30.0
30.0
30.0
30.0
This is an example of output from the show power inline interface-id command on a switch port:
Switch> show power inline gigabitethernet1/0/1
Interface Admin Oper
Power
Device
Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ---Gi1/0/1
auto
off
0.0
n/a
n/a
30.0
This is an example of output from the show power inline module switch-number command on stack member
3. The table that follows describes the output fields.
Switch> show power inline module 3
Module
Available
Used
Remaining
(Watts)
(Watts)
(Watts)
----------------------------3
865.0
864.0
1.0
Interface Admin Oper
Power
Device
(Watts)
--------- ------ ---------- ------- ------------------Gi3/0/1
auto
power-deny 4.0
n/a
Gi3/0/2
auto
off
0.0
n/a
Gi3/0/3
auto
off
0.0
n/a
Gi3/0/4
auto
off
0.0
n/a
Gi3/0/5
auto
off
0.0
n/a
Gi3/0/6
auto
off
0.0
n/a
Gi3/0/7
auto
off
0.0
n/a
Gi3/0/8
auto
off
0.0
n/a
Gi3/0/9
auto
off
0.0
n/a
Gi3/0/10 auto
off
0.0
n/a
<output truncated>
Class Max
----n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
---15.4
15.4
15.4
15.4
15.4
15.4
15.4
15.4
15.4
15.4
Table 15: show power inline Field Descriptions
Field
Description
Available
The total amount of configured power4 on the PoE
switch in watts (W).
Used
The amount of configured power that is allocated to
PoE ports in watts.
Remaining
The amount of configured power in watts that is not
allocated to ports in the system. (Available – Used =
Remaining)
Admin
Administration mode: auto, off, static.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
246
show power inline
Field
Description
Oper
Operating mode:
• on—The powered device is detected, and power
is applied.
• off—No PoE is applied.
• faulty—Device detection or a powered device
is in a faulty state.
• power-deny—A powered device is detected,
but no PoE is available, or the maximum
wattage exceeds the detected powered-device
maximum.
Power
The maximum amount of power that is allocated to
the powered device in watts. This value is the same
as the value in the Cutoff Power field in the show
power inline police command output.
Device
The device type detected: n/a, unknown, Cisco
powered-device, IEEE powered-device, or the name
from CDP.
Class
The IEEE classification: n/a or a value from 0 to 4.
Max
The maximum amount of power allocated to the
powered device in watts.
AdminPowerMax
The maximum amount power allocated to the powered
device in watts when the switch polices the real-time
power consumption. This value is the same as the
Max field value.
AdminConsumption
The power consumption of the powered device in
watts when the switch polices the real-time power
consumption. If policing is disabled, this value is the
same as the AdminPowerMax field value.
4 The configured power is the power that you manually specify or that the switch specifies by using CDP power negotiation or the IEEE classification, which
is different than the real-time power that is monitored with the power sensing feature.
This is an example of output from the show power inline police command on a stacking-capable switch:
Switch> show power inline police
Module
Available
Used
Remaining
(Watts)
(Watts)
(Watts)
----------------------------1
370.0
0.0
370.0
3
865.0
864.0
1.0
Admin Oper
Admin
Oper
Cutoff Oper
Interface State State
Police
Police
Power Power
--------- ------ ----------- ---------- ---------- ------ ------
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
247
show power inline
Gi1/0/1
auto
off
Gi1/0/2
auto
off
Gi1/0/3
auto
off
Gi1/0/4
off
off
Gi1/0/5
off
off
Gi1/0/6
off
off
Gi1/0/7
auto
off
Gi1/0/8
auto
off
Gi1/0/9
auto
on
Gi1/0/10 auto
on
Gi1/0/11 auto
on
Gi1/0/12 auto
on
Gi1/0/13 auto
errdisable
<output truncated>
none
log
errdisable
none
log
errdisable
none
log
none
log
log
errdisable
errdisable
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
ok
log
ok
n/a
n/a
5.4
5.4
n/a
5.4
5.4
n/a
5.4
n/a
5.4
5.4
5.4
5.4
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
5.1
4.2
5.9
4.2
0.0
In the previous example:
• The Gi1/0/1 port is shut down, and policing is not configured.
• The Gi1/0/2 port is shut down, but policing is enabled with a policing action to generate a syslog message.
• The Gi1/0/3 port is shut down, but policing is enabled with a policing action is to shut down the port.
• Device detection is disabled on the Gi1/0/4 port, power is not applied to the port, and policing is disabled.
• Device detection is disabled on the Gi1/0/5 port, and power is not applied to the port, but policing is
enabled with a policing action to generate a syslog message.
• Device detection is disabled on the Gi1/0/6 port, and power is not applied to the port, but policing is
enabled with a policing action to shut down the port.
• The Gi1/0/7 port is up, and policing is disabled, but the switch does not apply power to the connected
device.
• The Gi1/0/8 port is up, and policing is enabled with a policing action to generate a syslog message, but
the switch does not apply power to the powered device.
• The Gi1/0/9 port is up and connected to a powered device, and policing is disabled.
• The Gi1/0/10 port is up and connected to a powered device, and policing is enabled with a policing
action to generate a syslog message. The policing action does not take effect because the real-time power
consumption is less than the cutoff value.
• The Gi1/0/11 port is up and connected to a powered device, and policing is enabled with a policing
action to generate a syslog message.
• The Gi1/0/12 port is up and connected to a powered device, and policing is enabled with a policing
action to shut down the port. The policing action does not take effect because the real-time power
consumption is less than the cutoff value.
• The Gi1/0/13 port is up and connected to a powered device, and policing is enabled with a policing
action to shut down the port.
This is an example of output from the show power inline police interface-id command on a standalone switch.
The table that follows describes the output fields.
Switch> show power inline police gigabitethernet1/0/1
Interface Admin Oper
Admin
Oper
Cutoff
State State
Police
Police
Power
--------- ------ ---------- ---------- ---------- -----Gi1/0/1
auto
off
none
n/a
n/a
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
248
Oper
Power
----0.0
show power inline
Table 16: show power inline police Field Descriptions
Field
Description
Available
The total amount of configured power5 on the switch
in watts (W).
Used
The amount of configured power allocated to PoE
ports in watts.
Remaining
The amount of configured power in watts that is not
allocated to ports in the system. (Available – Used =
Remaining)
Admin State
Administration mode: auto, off, static.
Oper State
Operating mode:
• errdisable—Policing is enabled.
• faulty—Device detection on a powered device
is in a faulty state.
• off—No PoE is applied.
• on—The powered device is detected, and power
is applied.
• power-deny—A powered device is detected,
but no PoE is available, or the real-time power
consumption exceeds the maximum power
allocation.
Note
Admin Police
The operating mode is the current PoE state
for the specified PoE port, the specified stack
member, or for all PoE ports on the switch.
Status of the real-time power-consumption policing
feature:
• errdisable—Policing is enabled, and the switch
shuts down the port when the real-time power
consumption exceeds the maximum power
allocation.
• log—Policing is enabled, and the switch
generates a syslog message when the real-time
power consumption exceeds the maximum
power allocation.
• none—Policing is disabled.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
249
show power inline
Field
Description
Oper Police
Policing status:
• errdisable—The real-time power consumption
exceeds the maximum power allocation, and
the switch shuts down the PoE port.
• log—The real-time power consumption exceeds
the maximum power allocation, and the switch
generates a syslog message.
• n/a—Device detection is disabled, power is not
applied to the PoE port, or no policing action is
configured.
• ok—Real-time power consumption is less than
the maximum power allocation.
Cutoff Power
The maximum power allocated on the port. When the
real-time power consumption is greater than this
value, the switch takes the configured policing action.
Oper Power
The real-time power consumption of the powered
device.
5 The configured power is the power that you manually specify or that the switch specifies by using CDP power negotiation or the IEEE classification, which
is different than the real-time power that is monitored with the power sensing feature.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
250
show system mtu
show system mtu
To display the global maximum transmission unit (MTU) or maximum packet size set for the switch, use the
show system mtu command in privileged EXEC mode.
show system mtu
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
For information about the MTU values and the stack configurations that affect the MTU values, see the system
mtu command.
Examples
This is an example of output from the show system mtu command:
Switch# show system mtu
Global Ethernet MTU is 1500 bytes.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
251
show wireless interface summary
show wireless interface summary
To display the wireless interface status and configuration, use the show wireless interface summary
privileged EXEC command.
show wireless interface summary
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Examples
This example shows how to display the summary of wireless interfaces:
Switch# show wireless interface summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
252
small-frame violation rate
small-frame violation rate
To configure the rate (threshold) for an interface to be error-disabled when it receives VLAN-tagged packets
that are small frames (67 bytes or less), use the small-frame violation rate interface configuration command.
Use the no form of this command to return to the default setting.
small-frame violation rate pps
no small-frame violation rate pps
Syntax Description
pps
Specifies the threshold at which an interface receiving small frames will be
error-disabled. The range is 1 to 10,000 packets per second (pps).
Command Default
This feature is disabled.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This command enables the rate (threshold) for a port to be error-disabled when it receives small frames. Small
frames are considered packets that are 67 frames or less.
Use the errdisable detect cause small-frame global configuration command to globally enable the small-frames
threshold for each port.
You can configure the port to be automatically reenabled by using the errdisable recovery cause small-frame
global configuration command. You configure the recovery time by using the errdisable recovery interval
interval global configuration command.
Examples
This example shows how to enable the small-frame arrival rate feature so that the port is error-disabled if
incoming small frames arrived at 10,000 pps:
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# small-frame violation rate 10000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
253
speed
speed
To specify the speed of a 10/100/1000/2500/5000 Mb/s port, use the speed command in interface configuration
mode. To return to the default value, use the no form of this command.
speed {10| 100| 1000| 2500| 5000| auto [10| 100| 1000| 2500| 5000]| nonegotiate}
no speed
Syntax Description
10
Specifies that the port runs at 10 Mb/s.
100
Specifies that the port runs at 100 Mb/s.
1000
Specifies that the port runs at 1000 Mb/s. This option is valid and visible only on
10/100/1000 Mb/s ports.
2500
Specifies that the port runs at 2500 Mb/s. This option is valid and visible only on
mGig supported Ethernet ports.
5000
Specifies that the port runs at 5000 Mb/s. This option is valid and visible only on
mGig supported Ethernet ports.
auto
Automatically detects the speed the port should run at based on the port at the other
end of the link. If you use the 10, 100, 1000, 1000, 2500, 5000 keywords with the
auto keyword, the port only autonegotiates at the specified speeds.
nonegotiate
Disables autonegotiation, and the port runs at 1000 Mb/s.
Command Default
The default is auto.
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.3.1
This command was modified. The
following keywords were added:
2500, and 5000. These keywords
are visible only on mGig
supporting devices.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
254
speed
Usage Guidelines
You cannot configure speed on the 10-Gigabit Ethernet ports.
Except for the 1000BASE-T small form-factor pluggable (SFP) modules, you can configure the speed to not
negotiate (nonegotiate) when an SFP module port is connected to a device that does not support autonegotiation.
The new keywords: 2500, and 5000 are visible only on mGig supporting devices.
If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed setting
and then forces the speed setting to the negotiated value. The duplex setting remains as configured on each
end of the link, which could result in a duplex setting mismatch.
If both ends of the line support autonegotiation, we highly recommend the default autonegotiation settings.
If one interface supports autonegotiation and the other end does not, do use the auto setting on the supported
side, but set the duplex and speed on the other side.
Caution
Changing the interface speed and duplex mode configuration might shut down and reenable the interface
during the reconfiguration.
For guidelines on setting the switch speed and duplex parameters, see the “Configuring Interface Characteristics”
chapter in the software configuration guide for this release.
You can verify your settings by entering the show interfaces privileged EXEC command.
Examples
This example shows how to set speed on a port to 100 Mb/s:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# speed 100
This example shows how to set a port to autonegotiate at only 10 Mb/s:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# speed auto 10
This example shows how to set a port to autonegotiate at only 10 or 100 Mb/s:
Switch(config)# interface gigabitethernet1/0/1
Switch(config-if)# speed auto 10 100
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
255
stack-power
stack-power
To configure StackPower parameters for the power stack or for a switch in the power stack, use the stack
power command in global configuration mode. To return to the default setting, use the no form of the command,
stack-power {stack power-stack-name| switch stack-member-number}
no stack-power {stack power-stack-name| switch stack-member-number}
Syntax Description
stack power-stack-name
Specifies the name of the power stack. The name can be up to 31 characters.
Entering these keywords followed by a carriage return enters power stack
configuration mode.
switch stack-member-number
Specifies the switch number in the stack (1 to 4) to enter switch stack-power
configuration mode for the switch.
Command Default
There is no default.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
When you enter the stack-power stack power stack name command, you enter power stack configuration
mode, and these commands are available:
• default—Returns a command to its default setting.
• exit—Exits ARP access-list configuration mode.
• mode—Sets the power mode for the power stack. See the mode command.
• no—Negates a command or returns to default settings.
If you enter the stack-power switch switch-number command with a switch number that is not participating
in StackPower, you receive an error message.
When you enter the stack-power switch switch-number command with the number of a switch participating
in StackPower, you enter switch stack power configuration mode, and these commands are available:
• default—Returns a command to its default setting.
• exit—Exits switch stack power configuration mode.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
256
stack-power
• no—Negates a command or returns to default settings.
• power-priority—Sets the power priority for the switch and the switch ports. See the power-priority
command.
• stack-id name—Enters the name of the power stack to which the switch belongs. If you do not enter
the power stack-ID, the switch does not inherit the stack parameters. The name can be up to 31 characters.
• standalone—Forces the switch to operate in standalone power mode. This mode shuts down both stack
power ports.
Examples
This example removes switch 2, which is connected to the power stack, from the power pool and shutting
down both power ports:
Switch(config)# stack-power switch 2
Switch(config-switch-stackpower)# standalone
Switch(config-switch-stackpower)# exit
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
257
switchport backup interface
switchport backup interface
To configure Flex Links, use the switchport backup interface command in interface configuration mode on
a Layer 2 interface on the switch stack or on a standalone switch. To remove the Flex Links configuration,
use the no form of this command.
switchport backup interface interface-id [mmu primary vlan vlan-id| multicast fast-convergence|
preemption {delay seconds| mode {bandwidth| forced| off}}| prefer vlan vlan-id]
no switchport backup interface interface-id [mmu primary vlan| multicast fast-convergence| preemption
{delay| mode}| prefer vlan]
Syntax Description
interface-id
ID of the physical interface.
mmu
(Optional) Configures the MAC move update (MMU) for a backup
interface pair.
primary vlan vlan-id
(Optional) VLAN ID of the primary VLAN. The range is 1 to 4094.
multicast fast-convergence
(Optional) Configures multicast fast convergence on the backup interface.
preemption
(Optional) Configures a preemption scheme for a backup interface pair.
delay seconds
Specifies a preemption delay. The range is 1 to 300 seconds. The default
is 35 seconds.
mode
Specifies the preemption mode.
bandwidth
Specifies that a higher bandwidth interface is preferred.
forced
Specifies that an active interface is preferred.
off
Specifies that no preemption occurs from backup to active.
prefer vlan vlan-id
(Optional) Specifies that VLANs are carried on the backup interfaces of
a Flex Link pair. VLAN ID range is 1 to 4094.
Command Default
The default is to have no Flex Links defined. The preemption mode is off. No preemption occurs. Preemption
delay is set to 35 seconds.
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
258
switchport backup interface
Usage Guidelines
Flex Links are a pair of interfaces that provide backup to each other. With Flex Links configured, one link
acts as the primary interface and forwards traffic, while the other interface is in standby mode, ready to begin
forwarding traffic if the primary link shuts down. The interface being configured is referred to as the active
link; the specified interface is identified as the backup link. The feature provides an alternative to the Spanning
Tree Protocol (STP), allowing users to turn off STP and still retain basic link redundancy.
This command is available only for Layer 2 interfaces.
You can configure only one Flex Link backup link for any active link, and it must be a different interface
from the active interface.
• An interface can belong to only one Flex Link pair. An interface can be a backup link for only one active
link. An active link cannot belong to another Flex Link pair.
• A backup link does not have to be the same type (Fast Ethernet or Gigabit Ethernet, for instance) as the
active link. However, you should configure both Flex Links with similar characteristics so that there are
no loops or changes in behavior if the standby link begins to forward traffic.
• Neither of the links can be a port that belongs to an EtherChannel. However, you can configure two port
channels (EtherChannel logical interfaces) as Flex Links, and you can configure a port channel and a
physical interface as Flex Links, with either the port channel or the physical interface as the active link.
• If STP is configured on the switch, Flex Links do not participate in STP in all valid VLANs. If STP is
not running, be sure that there are no loops in the configured topology.
Examples
This example shows how to configure two interfaces as Flex Links:
Switch# configure terminal
Switch(conf)# interface gigabitethernet1/0/1
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2
Switch(conf-if)# end
This example shows how to configure the Gigabit Ethernet interface to always preempt the backup:
Switch# configure terminal
Switch(conf)# interface gigabitethernet1/0/1
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 preemption forced
Switch(conf-if)# end
This example shows how to configure the Gigabit Ethernet interface preemption delay time:
Switch# configure terminal
Switch(conf)# interface gigabitethernet1/0/1
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 preemption delay 150
Switch(conf-if)# end
This example shows how to configure the Gigabit Ethernet interface as the MMU primary VLAN:
Switch# configure terminal
Switch(conf)# interface gigabitethernet1/0/1
Switch(conf-if)# switchport backup interface gigabitethernet1/0/2 mmu primary vlan 1021
Switch(conf-if)# end
You can verify your setting by entering the show interfaces switchport backup privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
259
switchport block
switchport block
To prevent unknown multicast or unicast packets from being forwarded, use the switchport block command
in interface configuration mode. To allow forwarding unknown multicast or unicast packets, use the no form
of this command.
switchport block {multicast| unicast}
no switchport block {multicast| unicast}
Syntax Description
multicast
Specifies that unknown multicast traffic should be blocked.
Note
unicast
Only pure Layer 2 multicast traffic is blocked. Multicast packets that contain
IPv4 or IPv6 information in the header are not blocked.
Specifies that unknown unicast traffic should be blocked.
Command Default
Unknown multicast and unicast traffic is not blocked.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
By default, all traffic with unknown MAC addresses is sent to all ports. You can block unknown multicast or
unicast traffic on protected or nonprotected ports. If unknown multicast or unicast traffic is not blocked on a
protected port, there could be security issues.
With multicast traffic, the port blocking feature blocks only pure Layer 2 packets. Multicast packets that
contain IPv4 or IPv6 information in the header are not blocked.
Blocking unknown multicast or unicast traffic is not automatically enabled on protected ports; you must
explicitly configure it.
For more information about blocking packets, see the software configuration guide for this release.
Examples
This example shows how to block unknown unicast traffic on an interface:
Switch(config-if)# switchport block unicast
You can verify your setting by entering the show interfaces interface-id switchport privileged EXEC
command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
260
system mtu
system mtu
To set the global maximum packet size or MTU size for switched packets on Gigabit Ethernet and 10-Gigabit
Ethernet ports, use the system mtu command in global configuration mode. To restore the global MTU value
to its default value use the no form of this command.
system mtu bytes
no system mtu
Syntax Description
bytes
The global MTU size in bytes. The range is 1500 to 9198 bytes; the default is 1500
bytes.
Command Default
The default MTU size for all ports is 1500 bytes.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
You can verify your setting by entering the show system mtu privileged EXEC command.
The switch does not support the MTU on a per-interface basis.
If you enter a value that is outside the allowed range for the specific type of interface, the value is not accepted.
Examples
This example shows how to set the global system MTU size to 6000 bytes:
Switch(config)# system mtu 6000
Global Ethernet MTU is set to 6000 bytes.
Note: this is the Ethernet payload size, not the total
Ethernet frame size, which includes the Ethernet
header/trailer and possibly other tags, such as ISL or
802.1q tags.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
261
voice-signaling vlan (network-policy configuration)
voice-signaling vlan (network-policy configuration)
To create a network-policy profile for the voice-signaling application type, use the voice-signaling vlan
command in network-policy configuration mode. To delete the policy, use the no form of this command.
voice-signaling vlan {vlan-id [cos cos-value| dscp dscp-value]| dot1p [cos l2-priority| dscp dscp]| none|
untagged}
Syntax Description
Command Default
vlan-id
(Optional) The VLAN for voice traffic. The range is 1 to 4094.
cos cos-value
(Optional) Specifies the Layer 2 priority class of service (CoS) for the configured
VLAN. The range is 0 to 7; the default is 5.
dscp dscp-value
(Optional) Specifies the differentiated services code point (DSCP) value for the
configured VLAN. The range is 0 to 63; the default is 46.
dot1p
(Optional) Configures the phone to use IEEE 802.1p priority tagging and to use
VLAN 0 (the native VLAN).
none
(Optional) Does not instruct the Cisco IP phone about the voice VLAN. The phone
uses the configuration from the phone key pad.
untagged
(Optional) Configures the phone to send untagged voice traffic. This is the default
for the phone.
No network-policy profiles for the voice-signaling application type are defined.
The default CoS value is 5.
The default DSCP value is 46.
The default tagging mode is untagged.
Command Modes
Command History
Usage Guidelines
Network-policy profile configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile global configuration command to create a profile and to enter network-policy
profile configuration mode.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
262
voice-signaling vlan (network-policy configuration)
The voice-signaling application type is for network topologies that require a different policy for voice signaling
than for voice media. This application type should not be advertised if all of the same network policies apply
as those advertised in the voice policy TLV.
When you are in network-policy profile configuration mode, you can create the profile for voice-signaling
by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and
tagging mode.
These profile attributes are contained in the Link Layer Discovery Protocol for Media Endpoint Devices
(LLDP-MED) network-policy time-length-value (TLV).
To return to privileged EXEC mode from the network-policy profile configuration mode, enter the exit
command.
Examples
This example shows how to configure voice-signaling for VLAN 200 with a priority 2 CoS:
Switch(config)# network-policy profile 1
Switch(config-network-policy)# voice-signaling vlan 200 cos 2
This example shows how to configure voice-signaling for VLAN 400 with a DSCP value of 45:
Switch(config)# network-policy profile 1
Switch(config-network-policy)# voice-signaling vlan 400 dscp 45
This example shows how to configure voice-signaling for the native VLAN with priority tagging:
Switch(config-network-policy)# voice-signaling vlan dot1p cos 4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
263
voice vlan (network-policy configuration)
voice vlan (network-policy configuration)
To create a network-policy profile for the voice application type, use the voice vlan command in network-policy
configuration mode. To delete the policy, use the no form of this command.
voice vlan {vlan-id [cos cos-value| dscp dscp-value]| dot1p [cos l2-priority| dscp dscp]| none| untagged}
Syntax Description
Command Default
vlan-id
(Optional) The VLAN for voice traffic. The range is 1 to 4094.
cos cos-value
(Optional) Specifies the Layer 2 priority class of service (CoS) for the configured
VLAN. The range is 0 to 7; the default is 5.
dscp dscp-value
(Optional) Specifies the differentiated services code point (DSCP) value for the
configured VLAN. The range is 0 to 63; the default is 46.
dot1p
(Optional) Configures the phone to use IEEE 802.1p priority tagging and to use
VLAN 0 (the native VLAN).
none
(Optional) Does not instruct the Cisco IP phone about the voice VLAN. The phone
uses the configuration from the phone key pad.
untagged
(Optional) Configures the phone to send untagged voice traffic. This is the default
for the phone.
No network-policy profiles for the voice application type are defined.
The default CoS value is 5.
The default DSCP value is 46.
The default tagging mode is untagged.
Command Modes
Command History
Usage Guidelines
Network-policy profile configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the network-policy profile global configuration command to create a profile and to enter network-policy
profile configuration mode.
The voice application type is for dedicated IP telephones and similar devices that support interactive voice
services. These devices are typically deployed on a separate VLAN for ease of deployment and enhanced
security through isolation from data applications.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
264
voice vlan (network-policy configuration)
When you are in network-policy profile configuration mode, you can create the profile for voice by specifying
the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and tagging mode.
These profile attributes are contained in the Link Layer Discovery Protocol for Media Endpoint Devices
(LLDP-MED) network-policy time-length-value (TLV).
To return to privileged EXEC mode from the network-policy profile configuration mode, enter the exit
command.
Examples
This example shows how to configure the voice application type for VLAN 100 with a priority 4 CoS:
Switch(config)# network-policy profile 1
Switch(config-network-policy)# voice vlan 100 cos 4
This example shows how to configure the voice application type for VLAN 100 with a DSCP value of 34:
Switch(config)# network-policy profile 1
Switch(config-network-policy)# voice vlan 100 dscp 34
This example shows how to configure the voice application type for the native VLAN with priority tagging:
Switch(config-network-policy)# voice vlan dot1p cos 4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
265
wireless ap-manager interface
wireless ap-manager interface
To configure the wireless AP-manager interface, use the wireless ap-manager interface command.
wireless ap-managerinterface {TenGigabitEthernet interface-number| Vlan interface-number}
Syntax Description
TenGigabitEthernet interface-name
Configures 10-Gigabit Ethernet interface. Values range from
0 to 9.
Vlan interface-name
Configures VLANs. Values range from 1 to 4095.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the wireless AP-manager:
Switch# wireless ap-manager interface vlan
<1-4095> Vlan interface number
This example shows how to configure the wireless AP-manager:
Switch# #wireless ap-manager interface vlan 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
266
wireless exclusionlist
wireless exclusionlist
To manage exclusion list entries, use the wireless exclusionlist global configuration command. To remove
the exclusion list entries, use the no form of the command.
wireless exclusionlist mac-addr description description
no wireless exclusionlist mac-addr
Syntax Description
mac-addr
The MAC address of the local excluded entry.
description description
Specifies the description for an exclusion-list entry.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to create a local exclusion list entry for the MAC address xxx.xxx.xxx:
Switch# wireless exclusionlist xxx.xxx.xxx
This example shows how to create a description for the local exclusion list entry for the MAC address
xxx.xxx.xxx:
Switch# wireless exclusionlist xxx.xxx.xxx description sample
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
267
wireless linktest
wireless linktest
To configure linktest frame size and number of frames to send, use the wireless linktest command.
wireless linktest {frame-size size| number-of-frames value}
Syntax Description
frame-size size
Specifies the link test frame size for each packet. The values range from
1 to 1400.
number-of-frames value
Specifies the number of frames to be sent for the link test. The values
range from 1 to 100.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the link test frame size of each frame as 10:
Switch# wireless linktest frame-size 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
268
wireless management interface
wireless management interface
To configure wireless management parameters on an interface, use the wireless management interface global
configuration command. To remove a wireless management parameters on an interface, use the no form of
the command.
wireless management interface interface-name {TenGigabitEthernet interface-name| Vlan interface-name}
no wireless management interface
Syntax Description
interface-name
The interface number.
TenGigabitEthernet interface-name The 10-Gigabit Ethernet interface number. The values range from 0
to 9.
Vlan interface-name
Command Default
None
Command Modes
Global configuration
Command History
Examples
The VLAN interface number. The values range from 1 to 4095.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure VLAN 10 on the wireless interface:
Switch# wireless management interface Vlan 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
269
wireless peer-blocking forward-upstream
wireless peer-blocking forward-upstream
To configure peer-to-peer blocking for forward upstream, use the wireless peer-blocking forward-upstream
command. To remove a peer-to-peer blocking, use the no form of the command.
wireless peer-blocking forward-upstream interface{GigabitEthernet interface-number TenGigabitEthernet
interface-number}
no wireless peer-blocking forward-upstream {GigabitEthernet interface-number TenGigabitEthernet
interface-number}
Syntax Description
GigabitEthernet interface
The Gigabit Ethernet interface number. Values range from 0 to 9.
TenGigabitEthernet interface
The 10-Gigabit Ethernet interface number. Values range from 0 to 9.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure peer-to-peer blocking for interface 10-gigabit ethernet interface:
Switch(config)# wireless peer-blocking forward-upstream TenGigabitEthernet 1/1/4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
270
PART
IV
IP Multicast
• IP Multicast Commands, page 273
IP Multicast Commands
• cache-memory-max, page 275
• clear ip mfib counters, page 276
• clear ip mroute, page 277
• ip igmp filter, page 279
• ip igmp max-groups, page 280
• ip igmp profile, page 282
• ip igmp snooping, page 284
• ip igmp snooping last-member-query-count, page 285
• ip igmp snooping querier, page 287
• ip igmp snooping report-suppression, page 289
• ip igmp snooping vlan mrouter, page 290
• ip igmp snooping vlan static, page 291
• ip multicast auto-enable, page 293
• ip multicast vlan, page 294
• ip pim accept-register, page 295
• ip pim bsr-candidate, page 296
• ip pim rp-candidate, page 298
• ip pim send-rp-announce, page 300
• ip pim spt-threshold, page 302
• match message-type, page 303
• match service-type, page 304
• match service-instance, page 305
• mrinfo, page 306
• redistribute mdns-sd, page 308
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
273
• service-list mdns-sd, page 309
• service-policy-query, page 311
• service-routing mdns-sd, page 312
• service-policy, page 313
• show ip igmp filter, page 314
• show ip igmp profile, page 315
• show ip igmp snooping, page 316
• show ip igmp snooping groups, page 318
• show ip igmp snooping igmpv2-tracking, page 320
• show ip igmp snooping mrouter, page 321
• show ip igmp snooping querier, page 322
• show ip igmp snooping wireless mcast-spi-count, page 324
• show ip igmp snooping wireless mgid, page 325
• show ip pim autorp, page 326
• show ip pim bsr-router, page 327
• show ip pim bsr, page 328
• show ip pim tunnel, page 329
• show mdns cache, page 331
• show mdns requests, page 333
• show mdns statistics, page 334
• show platform ip multicast, page 335
• wireless mdns-bridging, page 342
• wireless multicast, page 343
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
274
cache-memory-max
cache-memory-max
To set a percentage of the system memory for cache, use the cache-memory-max command. To remove a
percentage of system memory for cache, use the no form of this command.
cache-memory-max cache-config-percentage
no cache-memory-max cache-config-percentage
Syntax Description
cache-config-percentage
Command Default
10 percent.
Command Modes
mDNS configuration
Command History
Usage Guidelines
Note
A percentage of the system memory for cache.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The number of services learned in a network could be large, so there is an upper limit on the amount of cache
memory that can be used. The memory is set by default to a maximum of 10 percent of the system memory.
You can override the default value by using this command.
When you try to add new records, and the cache is full, the records in the cache that are close to expiring are
deleted to provide space for the new records.
Examples
This example sets 20 percent of the system memory for cache:
Switch(config-mdns)# cache-memory-max 20
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
275
clear ip mfib counters
clear ip mfib counters
To clear all active IPV4 multicast forwarding information base (MFIB) traffic counters, use the clear ip mfib
counters privileged exec command.
clear ip mfib [global | vrf *] counters [group-address] [hostname | source-address]
Syntax Description
global
(Optional) Resets the IP multicast forwarding information base cache to the
global default configuration.
vrf *
(Optional) Clears the IP multicast forwarding information base cache for all
VPN routing and forwarding instances.
group-address
(Optional) Limits the active multicast forwarding information base (MFIB)
traffic counters to the indicated group address.
hostname | source-address (Optional) Limits the active multicast forwarding information base (MFIB)
traffic counters to the indicated host name or source address.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example shows how to reset all active MFIB traffic counters for all multicast tables:
Switch# clear ip mfib counters
The following example shows how to reset the IP multicast forwarding information base cache counters to
the global default configuration:
Switch# clear ip mfib global counters
The following example shows how to clear the IP multicast forwarding information base cache for the all
VPN routing and forwarding instances:
Switch# clear ip mfib vrf * counters
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
276
clear ip mroute
clear ip mroute
To delete entries from the IP multicast routing table, use the clear ip mroute privileged EXEC command.
clear ip mroute [vrf vrf-name]{* | ip-address | group-address}[hostname | source-address]
Syntax Description
vrf vrf-name
(Optional) Specifies the name that is assigned to the multicast VPN
routing and forwarding (VRF) instance.
*
Specifies all Multicast routes.
ip-address
Multicast routes for the IP address.
group-address
Multicast routes for the group address.
hostname
(Optional) Multicast routes for the host name.
source-address
(Optional) Multicast routes for the source address.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The group-address variable specifies one of the following:
• Name of the multicast group as defined in the DNS hosts table or with the ip host command.
• IP address of the multicast group in four-part, dotted notation.
If you specify a group name or address, you can also enter the source argument to specify a name or address
of a multicast source that is sending to the group. A source does not need to be a member of the group.
Examples
The following example shows how to delete all entries from the IP multicast routing table:
Switch# clear ip mroute *
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
277
clear ip mroute
The following example shows how to delete all sources on the 228.3.0.0 subnet that are sending to the multicast
group 224.2.205.42 from the IP multicast routing table. This example shows how to delete all sources on
network 228.3, not individual sources:
Switch# clear ip mroute 224.2.205.42 228.3.0.0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
278
ip igmp filter
ip igmp filter
To control whether or not all hosts on a Layer 2 interface can join one or more IP multicast groups by applying
an Internet Group Management Protocol (IGMP) profile to the interface, use the ip igmp filter interface
configuration command on the switch stack or on a standalone switch. To remove the specified profile from
the interface, use the no form of this command.
ip igmp filter profile number
no ip igmp filter
Syntax Description
profile number
The IGMP profile number to be applied. The range is 1 to 4294967295.
Command Default
No IGMP filters are applied.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You can apply IGMP filters only to Layer 2 physical interfaces; you cannot apply IGMP filters to routed ports,
switch virtual interfaces (SVIs), or ports that belong to an EtherChannel group.
An IGMP profile can be applied to one or more switch port interfaces, but one port can have only one profile
applied to it.
Examples
You can verify your setting by using the show running-config privileged EXEC command and by specifying
an interface.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
279
ip igmp max-groups
ip igmp max-groups
To set the maximum number of Internet Group Management Protocol (IGMP) groups that a Layer 2 interface
can join or to configure the IGMP throttling action when the maximum number of entries is in the forwarding
table, use the ip igmp max-groups interface configuration command on the switch stack or on a standalone
switch. To set the maximum back to the default, which is to have no maximum limit, or to return to the default
throttling action, which is to drop the report, use the no form of this command.
ip igmp max-groups {max number | action { deny | replace}}
no ip igmp max-groups {max number | action}
Syntax Description
Command Default
max number
The maximum number of IGMP groups that an interface can join. The range is
0 to 4294967294. The default is no limit.
action deny
Drops the next IGMP join report when the maximum number of entries is in the
IGMP snooping forwarding table. This is the default action.
action replace
Replaces the existing group with the new group for which the IGMP report was
received when the maximum number of entries is in the IGMP snooping
forwarding table.
The default maximum number of groups is no limit.
After the switch learns the maximum number of IGMP group entries on an interface, the default throttling
action is to drop the next IGMP report that the interface receives and to not add an entry for the IGMP group
to the interface.
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You can use this command only on Layer 2 physical interfaces and on logical EtherChannel interfaces. You
cannot set IGMP maximum groups for routed ports, switch virtual interfaces (SVIs), or ports that belong to
an EtherChannel group.
Follow these guidelines when configuring the IGMP throttling action:
• If you configure the throttling action as deny and set the maximum group limitation, the entries that
were previously in the forwarding table are not removed but are aged out. After these entries are aged
out, when the maximum number of entries is in the forwarding table, the switch drops the next IGMP
report received on the interface.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
280
ip igmp max-groups
• If you configure the throttling action as replace and set the maximum group limitation, the entries that
were previously in the forwarding table are removed. When the maximum number of entries is in the
forwarding table, the switch replaces a randomly selected multicast entry with the received IGMP report.
• When the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups
{deny | replace} command has no effect.
Examples
This example shows how to limit to 25 the number of IGMP groups that a port can join:
Switch(config)# interface gigabitethernet1/0/2
Switch(config-if)# ip igmp max-groups 25
This example shows how to configure the switch to replace the existing group with the new group for which
the IGMP report was received when the maximum number of entries is in the forwarding table:
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# ip igmp max-groups action replace
You can verify your setting by using the show running-config privileged EXEC command and by specifying
an interface.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
281
ip igmp profile
ip igmp profile
To create an Internet Group Management Protocol (IGMP) profile and enter IGMP profile configuration
mode, use the ip igmp profile global configuration command on the switch stack or on a standalone switch.
From this mode, you can specify the configuration of the IGMP profile to be used for filtering IGMP
membership reports from a switch port. To delete the IGMP profile, use the no form of this command.
ip igmp profile profile number
no ip igmp profile profile number
Syntax Description
profile number
The IGMP profile number being configured. The range is from 1 to
4294967295.
Command Default
No IGMP profiles are defined. When configured, the default action for matching an IGMP profile is to deny
matching addresses.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
When you are in IGMP profile configuration mode, you can create the profile by using these commands:
• deny—Specifies that matching addresses are denied; this is the default condition.
• exit—Exits from igmp-profile configuration mode.
• no—Negates a command or resets to its defaults.
• permit—Specifies that matching addresses are permitted.
• range—Specifies a range of IP addresses for the profile. This can be a single IP address or a range with
a start and an end address.
When entering a range, enter the low IP multicast address, a space, and the high IP multicast address.
You can apply an IGMP profile to one or more Layer 2 interfaces, but each interface can have only one profile
applied to it.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
282
ip igmp profile
Examples
This example shows how to configure IGMP profile 40 that permits the specified range of IP multicast
addresses:
Switch(config)# ip igmp profile 40
Switch(config-igmp-profile)# permit
Switch(config-igmp-profile)# range 233.1.1.1 233.255.255.255
You can verify your settings by using the show ip igmp profile privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
283
ip igmp snooping
ip igmp snooping
To globally enable Internet Group Management Protocol (IGMP) snooping on the switch or to enable it on a
per-VLAN basis, use the ip igmp snooping global configuration command on the switch stack or on a
standalone switch. To return to the default setting, use the no form of this command.
ip igmp snooping [vlan vlan-id]
no ip igmp snooping [vlan vlan-id]
Syntax Description
Command Default
vlan vlan-id
(Optional) Enables IGMP snooping on the specified VLAN. The range is 1 to
1001 and 1006 to 4094.
IGMP snooping is globally enabled on the switch.
IGMP snooping is enabled on VLAN interfaces.
Command Modes
Command History
Usage Guidelines
Global configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
When IGMP snooping is enabled globally, it is enabled in all of the existing VLAN interfaces. When IGMP
snooping is globally disabled, it is disabled on all of the existing VLAN interfaces.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This example shows how to globally enable IGMP snooping:
Switch(config)# ip igmp snooping
This example shows how to enable IGMP snooping on VLAN 1:
Switch(config)# ip igmp snooping vlan 1
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
284
ip igmp snooping last-member-query-count
ip igmp snooping last-member-query-count
To configure how often Internet Group Management Protocol (IGMP) snooping will send query messages in
response to receiving an IGMP leave message, use the ip igmp snooping last-member-query-count
command in global configuration mode. To set count to the default value, use the no form of the command.
ip igmp snooping [vlan vlan-id] last-member-query-count count
no ip igmp snooping [vlan vlan-id] last-member-query-count count
Syntax Description
vlan vlan-id
(Optional) Sets the count value on a specific VLAN ID. The range is from 1 to
1001. Do not enter leading zeroes.
count
The interval at which query messages are sent, in milliseconds. The range is from
1 to 7. The default is 2.
Command Default
A query is sent every 2 milliseconds.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
When a multicast host leaves a group, the host sends an IGMP leave message. To check if this host is the last
to leave the group, IGMP query messages are sent when the leave message is seen until the
last-member-query-interval timeout period expires. If no response to the last-member queries are received
before the timeout period expires, the group record is deleted.
Use the ip igmp snooping last-member-query-interval command to configure the timeout period.
When both IGMP snooping immediate-leave processing and the query count are configured, immediate-leave
processing takes precedence.
Note
Do not set the count to 1 because the loss of a single packet (the query packet from the switch to the host
or the report packet from the host to the switch) may result in traffic forwarding being stopped even if
there is still a receiver. Traffic continues to be forwarded after the next general query is sent by the switch,
but the interval during which a receiver may not receive the query could be as long as 1 minute (with the
default query interval).
The leave latency in Cisco IOS software may increase by up to one last-member-query-interval (LMQI) value
when the switch is processing more than one leave within an LMQI. In this case, the average leave latency is
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
285
ip igmp snooping last-member-query-count
determined by the (count + 0.5) * LMQI. The result is that the default leave latency can range from 2.0 to 3.0
seconds with an average of 2.5 seconds under a higher load of IGMP leave processing. The leave latency
under load for the minimum LMQI value of 100 milliseconds and a count of 1 is from 100 to 200 milliseconds,
with an average of 150 milliseconds. This is done to limit the impact of higher rates of IGMP leave messages.
Examples
The following example sets the last member query count to 5:
Switch(config)# ip igmp snooping last-member-query-count 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
286
ip igmp snooping querier
ip igmp snooping querier
To globally enable the Internet Group Management Protocol (IGMP) querier function in Layer 2 networks,
use the ip igmp snooping querier global configuration command. Use the command with keywords to enable
and configure the IGMP querier feature on a VLAN interface. To return to the default settings, use the no
form of this command.
ip igmp snooping [vlan vlan-id] querier [address ip-address | max-response-time response-time |
query-interval interval-count | tcn query {count count | interval interval} | timer expiry expiry-time |
version version]
no ip igmp snooping [vlan vlan-id] querier [address | max-response-time | query-interval | tcn query
{count | interval} | timer expiry | version]
Syntax Description
Command Default
vlan vlan-id
(Optional) Enables IGMP snooping and the IGMP querier function on
the specified VLAN. The range is 1 to 1001 and 1006 to 4094.
address ip-address
(Optional) Specifies a source IP address. If you do not specify an IP
address, the querier tries to use the global IP address configured for the
IGMP querier.
max-response-time
response-time
(Optional) Sets the maximum time to wait for an IGMP querier report.
The range is 1 to 25 seconds.
query-interval interval-count
(Optional) Sets the interval between IGMP queriers. The range is 1 to
18000 seconds.
tcn query
(Optional) Sets parameters related to Topology Change Notifications
(TCNs).
count count
Sets the number of TCN queries to be executed during the TCN interval
time. The range is 1 to 10.
interval interval
Sets the TCN query interval time. The range is 1 to 255.
timer expiry expiry-time
(Optional) Sets the length of time until the IGMP querier expires. The
range is 60 to 300 seconds.
version version
(Optional) Selects the IGMP version number that the querier feature uses.
Select 1 or 2.
The IGMP snooping querier feature is globally disabled on the switch.
When enabled, the IGMP snooping querier disables itself if it detects IGMP traffic from a multicast router.
Command Modes
Global configuration
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
287
ip igmp snooping querier
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use this command to enable IGMP snooping to detect the IGMP version and IP address of a device that sends
IGMP query messages, which is also called a querier.
By default, the IGMP snooping querier is configured to detect devices that use IGMP Version 2 (IGMPv2)
but does not detect clients that are using IGMP Version 1 (IGMPv1). You can manually configure the
max-response-time value when devices use IGMPv2. You cannot configure the max-response-time when
devices use IGMPv1. (The value cannot be configured and is set to zero).
Non-RFC compliant devices running IGMPv1 might reject IGMP general query messages that have a non-zero
value as the max-response-time value. If you want the devices to accept the IGMP general query messages,
configure the IGMP snooping querier to run IGMPv1.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This example shows how to globally enable the IGMP snooping querier feature:
Switch(config)# ip igmp snooping querier
This example shows how to set the IGMP snooping querier maximum response time to 25 seconds:
Switch(config)# ip igmp snooping querier max-response-time 25
This example shows how to set the IGMP snooping querier interval time to 60 seconds:
Switch(config)# ip igmp snooping querier query-interval 60
This example shows how to set the IGMP snooping querier TCN query count to 25:
Switch(config)# ip igmp snooping querier tcn count 25
This example shows how to set the IGMP snooping querier timeout to 60 seconds:
Switch(config)# ip igmp snooping querier timer expiry 60
This example shows how to set the IGMP snooping querier feature to version 2:
Switch(config)# ip igmp snooping querier version 2
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
288
ip igmp snooping report-suppression
ip igmp snooping report-suppression
To enable Internet Group Management Protocol (IGMP) report suppression, use the ip igmp snooping
report-suppression global configuration command on the switch stack or on a standalone switch. To disable
IGMP report suppression and to forward all IGMP reports to multicast routers, use the no form of this command.
ip igmp snooping report-suppression
no ip igmp snooping report-suppression
Syntax Description
This command has no arguments or keywords.
Command Default
IGMP report suppression is enabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This
feature is not supported when the query includes IGMPv3 reports.
The switch uses IGMP report suppression to forward only one IGMP report per multicast router query to
multicast devices. When IGMP report suppression is enabled (the default), the switch sends the first IGMP
report from all hosts for a group to all the multicast routers. The switch does not send the remaining IGMP
reports for the group to the multicast routers. This feature prevents duplicate reports from being sent to the
multicast devices.
If the multicast router query includes requests only for IGMPv1 and IGMPv2 reports, the switch forwards
only the first IGMPv1 or IGMPv2 report from all hosts for a group to all of the multicast routers. If the
multicast router query also includes requests for IGMPv3 reports, the switch forwards all IGMPv1, IGMPv2,
and IGMPv3 reports for a group to the multicast devices.
If you disable IGMP report suppression by entering the no ip igmp snooping report-suppression command,
all IGMP reports are forwarded to all of the multicast routers.
Examples
This example shows how to disable report suppression:
Switch(config)# no ip igmp snooping report-suppression
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
289
ip igmp snooping vlan mrouter
ip igmp snooping vlan mrouter
To add a multicast router port, use the ip igmp snooping mrouter global configuration command on the
switch stack or on a standalone switch. To return to the default settings, use the no form of this command.
Command Default
By default, there are no multicast router ports.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
The configuration is saved in NVRAM.
Examples
This example shows how to configure a port as a multicast router port:
Switch(config)# ip igmp snooping vlan 1 mrouter interface gigabitethernet1/0/2
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
290
ip igmp snooping vlan static
ip igmp snooping vlan static
To enable Internet Group Management Protocol (IGMP) snooping and to statically add a Layer 2 port as a
member of a multicast group, use the ip igmp snooping vlan static global configuration command on the
switch stack or on a standalone switch. Use the no form of this command to remove ports specified as members
of a static multicast group.
ip igmp snooping vlan vlan-id static ip-address interface interface-id
no ip igmp snooping vlan vlan-id static ip-address interface interface-id
Syntax Description
vlan-id
Enables IGMP snooping on the specified VLAN. The range is 1 to 1001 and 1006
to 4094.
ip-address
Adds a Layer 2 port as a member of a multicast group with the specified group IP
address.
interface interface-id Specifies the interface of the member port. The interface-id value has these options:
• fastethernet interface number—A Fast Ethernet IEEE 802.3 interface.
• gigabitethernet interface number—A Gigabit Ethernet IEEE 802.3z interface.
• tengigabitethernet interface number—A 10-Gigabit Ethernet IEEE 802.3z
interface.
• port-channel interface number—A channel interface. The range is 0 to 128.
Command Default
By default, there are no ports statically configured as members of a multicast group.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
The configuration is saved in NVRAM.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
291
ip igmp snooping vlan static
Examples
This example shows how to statically configure a host on an interface:
Switch(config)# ip igmp snooping vlan 1 static 224.2.4.12 interface
gigabitEthernet1/0/1
Configuring port gigabitethernet1/0/1 on group 224.2.4.12
You can verify your settings by entering the show ip igmp snooping privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
292
ip multicast auto-enable
ip multicast auto-enable
To support authentication, authorization, and accounting (AAA) enabling of IP multicast, use the ip multicast
auto-enable command. This command allows multicast routing to be enabled dynamically on dialup interfaces
using AAA attributes from a RADIUS server. To disable IP multicast for AAA, use the no form of the
command.
ip multicast auto-enable
no ip multicast auto-enable
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to enable authentication, authorization, and accounting (AAA) on IP multicast:
Switch(config)# ip multicast auto-enable
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
293
ip multicast vlan
ip multicast vlan
To configure IP multicast on a single VLAN, use the ip multicast vlan command in global configuration
mode. To remove the VLAN from the WLAN, use the no form of the command.
ip multicast vlan {vlan-name | vlan-id}
no ip multicast vlan{vlan-name | vlan-id}
Syntax Description
vlan-name
Specifies the VLAN name.
vlan-id
Specifies the VLAN ID.
Command Default
Disabled.
Command Modes
WLAN configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This example configures vlan_id01 as a multicast VLAN.
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# wireless multicast
Switch(config)# wlan test-wlan 1
Switch(config-wlan)# ip multicast vlan vlan_id01
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
294
ip pim accept-register
ip pim accept-register
To configure a candidate rendezvous point (RP) switch to filter Protocol Independent Multicast (PIM) register
messages, use the ip pim accept-register command in global configuration mode. To disable this function,
use the no form of this command.
ip pim [vrf vrf-name ] accept-register {list access-list}
no ip pim [vrf vrf-name ] accept-register
Syntax Description
vrf vrf-name
(Optional) Configures a PIM register filter on candidate RPs for (S, G) traffic
associated with the multicast Virtual Private Network (VPN) routing and forwarding
(MVRF) instance specified for the vrf-name argument.
list access-list
Specifies the access-list argument as a number or name that defines the (S, G) traffic
in PIM register messages to be permitted or denied. The range is 100 to 199 and an
expanded range of 2000 to 2699. An IP-named access list can also be used.
Command Default
No PIM register filters are configured.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use this command to prevent unauthorized sources from registering with the RP. If an unauthorized source
sends a register message to the RP, the RP will immediately send back a register-stop message.
The access list provided for the ip pim accept-register command should only filter on IP source addresses
and IP destination addresses. Filtering on other fields (for example, IP protocol or UDP port number) will not
be effective and may cause undesired traffic to be forwarded from the RP down the shared tree to multicast
group members. If more complex filtering is desired, use the ip multicast boundary command instead.
Examples
The following example shows how to permit register packets for any source address sending to any group
range, with the exception of source address 172.16.10.1 sending to the SSM group range (232.0.0.0/8). These
are denied. These statements should be configured on all candidate RPs because candidate RPs will receive
PIM registers from first hop routers or switches.
Switch(config)# ip pim accept-register list ssm-range
Switch(config)# ip access-list extended ssm-range
Switch(config-ext-nacl)# deny ip any 232.0.0.0 0.255.255.255
Switch(config-ext-nacl)# permit ip any any
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
295
ip pim bsr-candidate
ip pim bsr-candidate
To configure the switch to be a candidate BSR, use the ip pim bsr-candidate command in global configuration
mode. To remove the switch as a candidate BSR, use the no form of this command.
ip pim [vrf vrf-name] bsr-candidate interface-id [hash-mask-length] [priority]
no ip pim [vrf vrf-name] bsr-candidate
Syntax Description
vrf vrf-name
(Optional) Configures the switch to be a candidate BSR for the Multicast Virtual Private
Network (MVPN) routing and forwarding (MVRF) instance specified for the vrf-name
argument.
interface-id
ID of the interface on this switch from which the BSR address is derived to make it a
candidate. This interface must be enabled for Protocol Independent Multicast (PIM)
using the ip pim command. Valid interfaces include physical ports, port channels, and
VLANs.
hash-mask-length
(Optional) Length of a mask (32 bits maximum) that is to be ANDed with the group
address before the PIMv2 hash function is called. All groups with the same seed hash
correspond to the same rendezvous point ( RP). For example, if this value is 24, only
the first 24 bits of the group addresses matter. The hash mask length allows one RP to
be used for multiple groups. The default hash mask length is 0.
priority
(Optional) Priority of the candidate BSR (C-BSR). The range is from 0 to 255. The
default priority is 0. The C-BSR with the highest priority value is preferred.
Command Default
The switch is not configured to announce itself as a candidate BSR.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The interface specified for this command must be enabled for Protocol Independent Multicast (PIM) using
the ip pim command.
This command configures the switch to send BSR messages to all of its PIM neighbors, with the address of
the designated interface as the BSR address.
This command should be configured on backbone switches that have good connectivity to all parts of the PIM
domain.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
296
ip pim bsr-candidate
The BSR mechanism is specified in RFC 2362. Candidate RP (C-RP) switches unicast C-RP advertisement
packets to the BSR. The BSR then aggregates these advertisements in BSR messages, which it regularly
multicasts with a TTL of 1 to the ALL-PIM-ROUTERS group address, 224.0.0.13. The multicasting of these
messages is handled by hop-by-hop RPF flooding; so no preexisting IP multicast routing setup is required
(unlike with AutoRP). In addition, the BSR does not preselect the designated RP for a particular group range
(unlike AutoRP); instead, each switch that receives BSR messages will elect RPs for group ranges based on
the information in the BSR messages.
Cisco switches always accept and process BSR messages. There is no command to disable this function.
Cisco switches perform the following steps to determine which C-RP is used for a group:
• A longest match lookup is performed on the group prefix that is announced by the BSR C-RPs.
• If more than one BSR-learned C-RP are found by the longest match lookup, the C-RP with the lowest
priority (configured with the ip pim rp-candidate command) is preferred.
• If more than one BSR-learned C-RP have the same priority, the BSR hash function is used to select the
RP for a group.
• If more than one BSR-learned C-RP return the same hash value derived from the BSR hash function,
the BSR C-RP with the highest IP address is preferred.
Examples
The following example shows how to configure the IP address of the switch on Gigabit Ethernet interface
1/0/0 to be a BSR C-RP with a hash mask length of 0 and a priority of 192:
Switch(config)# ip pim bsr-candidate GigabitEthernet1/0/1 0 192
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
297
ip pim rp-candidate
ip pim rp-candidate
To configure the switch to advertise itself to the BSR as a Protocol Independent Multicast (PIM) Version 2
(PIMv2) candidate rendezvous point (C-RP), use the ip pim rp-candidate command in global configuration
mode. To remove this switch as a C-RP, use the no form of this command.
ip pim [vrf vrf-name] rp-candidate interface-id [group-list access-list-number]
no ip pim [vrf vrf-name] rp-candidate interface-id [group-list access-list-number]
Syntax Description
vrf vrf-name
(Optional) Configures the switch to advertise itself to the BSR as PIMv2 C-RP
for the Multicast Virtual Private Network (MVPN) routing and forwarding
(MVRF) instance specified for the vrf-name argument.
interface-id
ID of the interface whose associated IP address is advertised as a candidate RP
address. Valid interfaces include physical ports, port channels, and VLANs.
group-list
access-list-number
(Optional) Specifies the standard IP access list number that defines the group
prefixes that are advertised in association with the RP address.
Command Default
The switch is not configured to announce itself to the BSR as a PIMv2 C-RP.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use this command to configure the switch to send PIMv2 messages so that it advertises itself as a candidate
RP to the BSR.
This command should be configured on backbone switches that have good connectivity to all parts of the PIM
domain.
The IP address associated with the interface specified by interface-id will be advertised as the C-RP address.
The interface specified for this command must be enabled for Protocol Independent Multicast (PIM) using
the ip pim command.
If the optional group-list keyword and access-list-number argument are configured, the group prefixes defined
by the standard IP access list will also be advertised in association with the RP address.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
298
ip pim rp-candidate
Examples
The following example shows how to configure the switch to advertise itself as a C-RP to the BSR in its PIM
domain. The standard access list number 4 specifies the group prefix associated with the RP that has the
address identified by Gigabit Ethernet interface 1/0/1.
Switch(config)# ip pim rp-candidate GigabitEthernet1/0/1 group-list 4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
299
ip pim send-rp-announce
ip pim send-rp-announce
To use Auto-RP to configure groups for which the switch will act as a rendezvous point (RP), use the ip pim
send-rp-announce command in global configuration mode. To unconfigure this switch as an RP, use the no
form of this command.
ip pim [vrf vrf-name] send-rp-announce interface-id scope ttl-value [group-list access-list-number] [interval
seconds]
no ip pim [vrf vrf-name] send-rp-announce interface-id
Syntax Description
vrf vrf-name
(Optional) Uses Auto-RP to configure groups for which the switch will act as a
rendezvous point (RP) for the vrf-name argument.
interface-id
Enter the interface ID of the interface that identifies the RP address. Valid interfaces
include physical ports, port channels, and VLANs.
scope ttl-value
Specifies the time-to-live (TTL) value in hops that limits the number of Auto-RP
announcements. Enter a hop count that is high enough so that the RP-announce
messages reach all mapping agents in the network. There is no default setting. The
range is 1 to 255.
group-list
access-list-number
(Optional) Specifies the standard IP access list number that defines the group
prefixes that are advertised in association with the RP address. Enter an IP standard
access list number from 1 to 99. If no access list is configured, the RP is used for
all groups.
interval seconds
(Optional) Specifies the interval between RP announcements in seconds. The total
holdtime of the RP announcements is automatically set to three times the value of
the interval. The default interval is 60 seconds. The range is 1 to 16383.
Command Default
Auto-RP is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Enter this command on the switch that you want to be an RP. When you are using Auto-RP to distribute
group-to-RP mappings, this command causes the router to send an Auto-RP announcement message to the
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
300
ip pim send-rp-announce
well-known group CISCO-RP-ANNOUNCE (224.0.1.39). This message announces the router as a candidate
RP for the groups in the range described by the access list.
Examples
The following example shows how to configure the switch to send RP announcements out all Protocol
Independent Multicast (PIM)-enabled interfaces for a maximum of 31 hops. The IP address by which the
switch wants to be identified as RP is the IP address associated with Gigabit Ethernet interface 1/0/1 at an
interval of 120 seconds:
Switch(config)# ip pim send-rp-announce GigabitEthernet1/0/1 scope 31 group-list 5 interval
120
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
301
ip pim spt-threshold
ip pim spt-threshold
To specify the threshold that must be reached before moving to shortest-path tree (spt), use the ip pim
spt-threshold command in global configuration mode. To remove the threshold, use the no form of this
command.
ip pim {kbps | infinity} [group-list access-list]
no ip pim {kbps | infinity} [group-list access-list]
Syntax Description
kbps
The threshold that must be reached before moving to shortest-path tree (spt). 0 is
the only valid entry even though the range is 0 to 4294967. A 0 entry always switches
to the source-tree.
infinity
Specifies that all sources for the specified group use the shared tree, never switching
to the source tree.
group-list access-list
(Optional) Specifies an access list number or a specific access list that you have
created by name. If the value is 0 or if the group-list access-list option is not used,
the threshold applies to all groups.
Command Default
Switches to the PIM shortest-path tree (spt).
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example makes all sources for access list 16 use the shared tree:
Switch(config)# ip pim spt-threshold infinity group-list 16
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
302
match message-type
match message-type
To set the message type to match for a service list, use the match message-type command.
match message-type {announcement| any| query}
Syntax Description
announcement
Allows only service advertisements or announcements for the device.
any
Allows any match type.
query
Allows only a query from the client for a certain device in the network.
Command Default
None
Command Modes
Service list configuration.
Command History
Usage Guidelines
Note
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Multiple service maps of the same name with different sequence numbers can be created and the evaluation
of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual
statements, each one has a permit or deny result. Evaluation of service list consists of a list scan, in a
predetermined order, and an evaluation of the criteria of each statement that matches. A list scan is stopped
once the first statement match is found and an action permit/deny associated with the statement match is
performed. The default action after scanning through the entire list is to deny.
It is not possible to use the match command if you have used the service-list mdns-sd service-list-name
query command. The match command can be used only for the permit or deny option.
This example shows how to set the announcement message type to be matched:
Switch(config-mdns-sd-sl)# match message-type announcement
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
303
match service-type
match service-type
To set the value of the mDNS service type string to match, use the match service-type command.
match service-type line
Syntax Description
line
Command Default
None
Command Modes
Service list configuration
Command History
Regular expression to match service type in packets.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
It is not possible to use the match command if you have used the service-list mdns-sd service-list-name
query command. The match command can be used only for the permit or deny option.
Examples
This example shows how to set the value of the mDNS service type string to match:
Switch(config-mdns-sd-sl)# match service-type _ipp._tcp
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
304
match service-instance
match service-instance
To set the service instance to match for a service list, use the match service-instance command.
match servcie-instance line
Syntax Description
line
Command Default
None
Command Modes
Service list configuration
Command History
Regular expression to match service instance in packets.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
It is not possible to use the match command if you have used the service-list mdns-sd service-list-name
query command. The match command can be used only for the permit or deny option.
Examples
This example shows how to set the service instance to match:
Switch(config-mdns-sd-sl)# match service-instance servInst 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
305
mrinfo
mrinfo
To query which neighboring multicast routers or multilayer switches are acting as peers, use the mrinfo
command in user EXEC or privileged EXEC mode.
mrinfo [vrf route-name] [hostname | address][interface-id]
Syntax Description
vrf route-name
(Optional) Specifies the VPN routing or forwarding instance.
hostname | address
(Optional) The Domain Name System (DNS) name or IP address of the
multicast router or multilayer switch to query. If omitted, the switch queries
itself.
interface-id
(Optional) Specifies the interface ID.
Command Default
The command is disabled.
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The mrinfo command is the original tool of the multicast backbone (MBONE) to determine which neighboring
multicast routers or switches are peering with multicast routers or switches. Cisco routers have supported
responding to mrinfo requests since Cisco IOS Release 10.2.
You can query a multicast router or multilayer switch using the mrinfo command. The output format is
identical to the multicast routed version of the Distance Vector Multicast Routing Protocol (DVMRP). (The
mrouted software is the UNIX software that implements DVMRP.)
Examples
The following is sample output from the mrinfo command:
Switch# mrinfo
vrf 192.0.1.0
192.31.7.37 (barrnet-gw.cisco.com) [version cisco 11.1] [flags: PMSA]:
192.31.7.37 -> 192.31.7.34 (sj-wall-2.cisco.com) [1/0/pim]
192.31.7.37 -> 192.31.7.47 (dirtylab-gw-2.cisco.com) [1/0/pim]
192.31.7.37 -> 192.31.7.44 (dirtylab-gw-1.cisco.com) [1/0/pim]
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
306
mrinfo
Note
The flags indicate the following:
• P: prune-capable
• M: mtrace-capable
• S: Simple Network Management Protocol (SNMP)-capable
• A: Auto-Rendezvous Point (RP)-capable
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
307
redistribute mdns-sd
redistribute mdns-sd
To redistribute services or service announcements across subnets, use the redistribute mdns-sd command.
To disable redistribution of services or service announcements across subnets, use the no form of this command.
redistribute mdns-sd
no redistribute mdns-sd
This command has no arguments or keywords.
Command Default
The redistribution of services or service announcements across subnets is disabled.
Command Modes
mDNS configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
To redistribute service announcements across interfaces, use the redistribute mdns-sd command. This
command sends out unsolicited announcements received on one interface to all of the other interfaces. The
outgoing announcements are filtered as per the out-service policy defined for the interface or in absence of a
per-interface service policy based on the global out-service policy.
In the absence of a redistribute option, services can be discovered by querying in a Layer 3 domain that is not
local to the service provider.
Examples
This example shows how to redistribute services or service announcements across subnets:
Switch(config-mdns)# redistribute mdns-sd
Note
If redistribution is enabled globally, global configuration is given higher priority than interface configuration.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
308
service-list mdns-sd
service-list mdns-sd
To enter mDNS service discovery service-list mode on the switch, use the service-list mdns-sd command.
To exit mDNS service discovery service-list mode, use the no form of the command.
service-list mdns-sd service-list-name {permit | deny} sequence-number [query]
no service-list mdns-sd service-list-name {permit | deny} sequence-number [query]
Syntax Description
service-list-name
Name of the service list.
permit sequence number
Permits a filter on the service list
to be applied to the sequence
number.
deny sequence number
Denies a filter on the service list to
be applied to the sequence number.
query
Associates a query for the service
list name.
Command Default
Disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Service filters are modeled around access lists and route maps.
Multiple service maps of the same name with different sequence numbers can be created and the evaluation
of the filters will be ordered on the sequence number. Service lists are an ordered sequence of individual
statements, each has a permit or deny result. Evaluation of a service list consists of a list scan, in a predetermined
order, and an evaluation of the criteria of each statement that matches. A list scan is aborted once the first
statement match is found and an action, permit or deny associated with the statement match is performed.
Default action after scanning through the entire list will be to deny.
This command can be used to enter mDNS service discovery service-list mode.
In this mode you can:
• Create a service list and apply a filter on the service list according to the permit or deny option applied
to the sequence number.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
309
service-list mdns-sd
Examples
This example shows how to create a service list and apply a filter on the service list according to the permit
or deny option applied to the sequence number:
Switch(config)# service-list mdns-sd sl1 permit 3
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
310
service-policy-query
service-policy-query
To configure service list query periodicity, use the service-policy-query command. To delete the configuration,
use the no form of this command.
service-policy-query [service-list-query-name service-list-query-periodicity]
no service-policy-query
Syntax Description
service-list-query-name service-list-query-periodicity (Optional) Configures the service list query
periodicity.
Command Default
Disabled.
Command Modes
mDNS configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
As there are devices that do not send unsolicited announcements and to force learning of services and to keep
them refreshed in the cache, this command contains an active query feature which ensures that services listed
in the active query list will be queried.
Examples
This example shows how to configure service list query periodicity:
Switch(config-mdns)# service-policy-query sl-query1 100
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
311
service-routing mdns-sd
service-routing mdns-sd
To enable mDNS gateway functionality for a device and enter multicast DNS configuration mode, use the
service-routing mdns-sd command. To restore default settings and return to global config mode, enter the
no form of the command.
service-routing mdns-sd
no service-routing mdns-sd
This command has no arguments or keywords.
Command Default
Disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
mDNS gateway functionality can only be enabled or disabled globally, not on a per-interface basis. The service
filter policy and redistribution can be configured globally as well as on a per-interface basis. Any interface
specific configuration overrides the global configuration.
Examples
This example shows how to enable mDNS gateway functionality for a device and enter multicast DNS
configuration mode:
Switch(config)# service-routing mdns-sd
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
312
service-policy
service-policy
To apply a filter on incoming or outgoing service discovery information on a service list, use the service-policy
command. To remove the filter, use the no form of the command.
service-policy service-policy-name {IN | OUT}
no service-policy service-policy-name {IN | OUT}
Syntax Description
service-policy-name IN
Applies a filter on incoming service discovery information.
service-policy-name OUT
Applies a filter on outgoing service discovery information.
Command Default
Disabled.
Command Modes
mDNS configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Switch intercepts mDNS packets. If they are mDNS messages destined to a wireless client (for example,
the destination MAC is client's MAC address), and the client's mobility state is either local or foreign, the
destination MAC address is overwritten with the client's MAC address and enqueues the packet to be sent out
on the associated CAPWAP tunnel.
Examples
This example applies a filter on incoming service discovery information on a service list:
Switch(config-mdns)#
service-policy serv-pol1 IN
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
313
show ip igmp filter
show ip igmp filter
To display Internet Group Management Protocol (IGMP) filter information, use the show ip igmp filter
command in privileged EXEC command mode.
show ip igmp [vrf vrf-name] filter
Syntax Description
vrf vrf-name
(Optional) Supports the multicast VPN routing and forwarding (VRF)
instance.
Command Default
IGMP filters are enabled by default.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The show ip igmp filter command displays information about all filters defined on the switch.
Examples
The following is sample output from the show ip igmp filter command:
Switch# show ip igmp filter
IGMP filter enabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
314
show ip igmp profile
show ip igmp profile
To display all configured Internet Group Management Protocol (IGMP) profiles or a specified IGMP profile,
use the show ip igmp profile privileged EXEC command.
show ip igmp [vrf vrf-name] profile [profile number]
Syntax Description
vrf vrf-name
(Optional) Supports the multicast VPN routing and forwarding (VRF) instance.
profile number
(Optional) The IGMP profile number to be displayed. The range is 1 to
4294967295. If no profile number is entered, all IGMP profiles are displayed.
Command Default
IGMP profiles undefined by default.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example shows the output of the show ip igmp profile privileged EXEC command for profile
number 40 on the switch:
Switch# show ip igmp profile 40
IGMP Profile 40
permit
range 233.1.1.1 233.255.255.255
This example shows the output of the show ip igmp profile privileged EXEC command for all profiles
configured on the switch:
Switch# show ip igmp profile
IGMP Profile 3
range 230.9.9.0 230.9.9.0
IGMP Profile 4
permit
range 229.9.9.0 229.255.255.255
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
315
show ip igmp snooping
show ip igmp snooping
To display the Internet Group Management Protocol (IGMP) snooping configuration of the switch or the
VLAN, use the show ip igmp snooping command in user or privileged EXEC command mode.
show ip igmp snooping [groups | mrouter | querier] [vlan vlan-id] [detail]
Syntax Description
groups
(Optional) Displays the IGMP snooping multicast table.
mrouter
(Optional) Displays the IGMP snooping multicast router ports.
querier
(Optional) Displays the configuration and operation information for the IGMP
querier.
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094.
detail
(Optional) Displays operational state information.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Examples
This is an example of output from the show ip igmp snooping vlan 1 command. It shows snooping
characteristics for a specific VLAN:
Switch# show ip igmp snooping vlan 1
Global IGMP Snooping configuration:
------------------------------------------IGMP snooping
: Enabled
IGMPv3 snooping (minimal)
: Enabled
Report suppression
: Enabled
TCN solicit query
: Disabled
TCN flood query count
: 2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
316
show ip igmp snooping
Robustness variable
Last member query count
Last member query interval
: 2
: 2
: 1000
Vlan 1:
-------IGMP snooping
IGMPv2 immediate leave
Multicast router learning mode
CGMP interoperability mode
Robustness variable
Last member query count
Last member query interval
:
:
:
:
:
:
:
Enabled
Disabled
pim-dvmrp
IGMP_ONLY
2
2
1000
This is an example of output from the show ip igmp snooping command. It displays snooping characteristics
for all VLANs on the switch:
Switch# show ip igmp snooping
Global IGMP Snooping configuration:
------------------------------------------IGMP snooping
: Enabled
IGMPv3 snooping (minimal)
: Enabled
Report suppression
: Enabled
TCN solicit query
: Disabled
TCN flood query count
: 2
Robustness variable
: 2
Last member query count
: 2
Last member query interval
: 1000
Vlan 1:
-------IGMP snooping
IGMPv2 immediate leave
Multicast router learning mode
CGMP interoperability mode
Robustness variable
Last member query count
Last member query interval
Vlan 2:
-------IGMP snooping
IGMPv2 immediate leave
Multicast router learning mode
CGMP interoperability mode
Robustness variable
Last member query count
Last member query interval
<output truncated>
:
:
:
:
:
:
:
Enabled
Disabled
pim-dvmrp
IGMP_ONLY
2
2
1000
:
:
:
:
:
:
:
Enabled
Disabled
pim-dvmrp
IGMP_ONLY
2
2
1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
317
show ip igmp snooping groups
show ip igmp snooping groups
To display the Internet Group Management Protocol (IGMP) snooping multicast table for the switch or the
multicast information, use the show ip igmp snooping groups privileged EXEC command.
show ip igmp snooping groups [vlan vlan-id ] [[count] | ip_address]
Syntax Description
Command Modes
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094. Use this
option to display the multicast table for a specified multicast VLAN or specific
multicast information.
count
(Optional) Displays the total number of entries for the specified command options
instead of the actual entries.
ip_address
(Optional) Characteristics of the multicast group with the specified group IP address.
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Examples
This is an example of output from the show ip igmp snooping groups command without any keywords. It
displays the multicast table for the switch:
Switch# show ip igmp snooping groups
Vlan
Group
Type
Version
Port List
------------------------------------------------------------1
224.1.4.4
igmp
Gi1/0/11
1
224.1.4.5
igmp
Gi1/0/11
2
224.0.1.40
igmp
v2
Gi1/0/15
104
224.1.4.2
igmp
v2
Gi2/0/1, Gi2/0/2
104
224.1.4.3
igmp
v2
Gi2/0/1, Gi2/0/2
This is an example of output from the show ip igmp snooping groups count command. It displays the total
number of multicast groups on the switch:
Switch# show ip igmp snooping groups count
Total number of multicast groups: 2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
318
show ip igmp snooping groups
This is an example of output from the show ip igmp snooping groups vlan vlan-id ip-address command.
It shows the entries for the group with the specified IP address:
Switch# show ip igmp snooping groups vlan 104 224.1.4.2
Vlan
Group
Type
Version
Port List
------------------------------------------------------------104
224.1.4.2
igmp
v2
Gi2/0/1, Gi1/0/15
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
319
show ip igmp snooping igmpv2-tracking
show ip igmp snooping igmpv2-tracking
To display group and IP address entries, use the show ip igmp snooping igmpv2-tracking command in
privileged EXEC mode.
Note
The command displays group and IP address entries only for wireless multicast IGMP joins and not for
wired joins. This command also displays output only if wireless multicast is enabled.
show ip igmp snooping igmpv2-tracking
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
320
show ip igmp snooping mrouter
show ip igmp snooping mrouter
To display the Internet Group Management Protocol (IGMP) snooping dynamically learned and manually
configured multicast router ports for the switch or for the specified multicast VLAN, use the show ip igmp
snooping mrouter privileged EXEC command.
show ip igmp snooping mrouter [vlan vlan-id]
Syntax Description
Command Modes
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
When multicast VLAN registration (MVR) is enabled, the show ip igmp snooping mrouter command displays
MVR multicast router information and IGMP snooping information.
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Examples
This is an example of output from the show ip igmp snooping mrouter command. It shows how to display
multicast router ports on the switch:
Switch#
Vlan
---1
show ip igmp snooping mrouter
ports
----Gi2/0/1(dynamic)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
321
show ip igmp snooping querier
show ip igmp snooping querier
To display the configuration and operation information for the IGMP querier configured on a switch, use the
show ip igmp snooping querier user EXEC command.
show ip igmp snooping querier [vlan vlan-id] [detail ]
Syntax Description
Command Modes
vlan vlan-id
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094.
detail
(Optional) Displays detailed IGMP querier information.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the show ip igmp snooping querier command to display the IGMP version and the IP address of a
detected device, also called a querier, that sends IGMP query messages. A subnet can have multiple multicast
routers but has only one IGMP querier. In a subnet running IGMPv2, one of the multicast routers is elected
as the querier. The querier can be a Layer 3 switch.
The show ip igmp snooping querier command output also shows the VLAN and the interface on which the
querier was detected. If the querier is the switch, the output shows the Port field as Router. If the querier is a
router, the output shows the port number on which the querier is learned in the Port field.
The show ip igmp snooping querier detail user EXEC command is similar to the show ip igmp snooping
querier command. However, the show ip igmp snooping querier command displays only the device IP
address most recently detected by the switch querier.
The show ip igmp snooping querier detail command displays the device IP address most recently detected
by the switch querier and this additional information:
• The elected IGMP querier in the VLAN
• The configuration and operational information pertaining to the switch querier (if any) that is configured
in the VLAN
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain Output appear.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
322
show ip igmp snooping querier
Examples
This is an example of output from the show ip igmp snooping querier command:
Switch> show ip igmp snooping querier
Vlan
IP Address
IGMP Version
Port
--------------------------------------------------1
172.20.50.11
v3
Gi1/0/1
2
172.20.40.20
v2
Router
This is an example of output from the show ip igmp snooping querier detail command:
Switch> show ip igmp snooping querier detail
Vlan
IP Address
IGMP Version
Port
------------------------------------------------------------1
1.1.1.1
v2
Fa8/0/1
Global IGMP switch querier status
-------------------------------------------------------admin state
: Enabled
admin version
: 2
source IP address
: 0.0.0.0
query-interval (sec)
: 60
max-response-time (sec)
: 10
querier-timeout (sec)
: 120
tcn query count
: 2
tcn query interval (sec)
: 10
Vlan 1:
IGMP switch querier status
-------------------------------------------------------elected querier is 1.1.1.1
on port Fa8/0/1
-------------------------------------------------------admin state
: Enabled
admin version
: 2
source IP address
: 10.1.1.65
query-interval (sec)
: 60
max-response-time (sec)
: 10
querier-timeout (sec)
: 120
tcn query count
: 2
tcn query interval (sec)
: 10
operational state
: Non-Querier
operational version
: 2
tcn query pending count
: 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
323
show ip igmp snooping wireless mcast-spi-count
show ip igmp snooping wireless mcast-spi-count
To display the statistics of the number of multicast stateful packet inspections (SPIs) per multicast group ID
(MGID) sent to the switch, use the show ip igmp snooping wireless mcast-spi-count command in privileged
EXEC mode.
show ip igmp snooping wireless mcast-spi-count
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This is an example of output from the show ip igmp snooping wireless mcast-spi-count command:
Switch# show ip igmp snooping wireless mcast-spi-count
Stats for Mcast Client Add/Delete SPI Messages Sent to WCM
MGID
ADD MSGs
Del MSGs
--------------------------------4160
1323
667
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
324
show ip igmp snooping wireless mgid
show ip igmp snooping wireless mgid
To display multicast group ID (MGID) mappings, use the show ip igmp snooping wireless mgid command
in privileged EXEC mode.
show ip igmp snooping wireless mgid
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This is an example of output from the show ip igmp snooping wireless mgid command:
Switch# show ip igmp snooping wireless mgid
Total number of L2-MGIDs
= 0
Total number of MCAST MGIDs = 0
Wireless multicast is Enabled in the system
Vlan
bcast
nonip-mcast
mcast
mgid
Stdby Flags
1
Disabled
Disabled
Enabled
Disabled 0:0:1:0
25
Disabled
Disabled
Enabled
Disabled 0:0:1:0
34
Disabled
Disabled
Enabled
Disabled 0:0:1:0
200
Disabled
Disabled
Enabled
Disabled 0:0:1:0
1002 Enabled
Enabled
Enabled
Disabled 0:0:1:0
1003 Enabled
Enabled
Enabled
Disabled 0:0:1:0
1004 Enabled
Enabled
Enabled
Disabled 0:0:1:0
1005 Enabled
Enabled
Enabled
Disabled 0:0:1:0
Index MGID
(S, G, V)
--------------------------------------------------------
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
325
show ip pim autorp
show ip pim autorp
To display global information about auto-rp, use the show ip pim autorp command in privileged EXEC
mode.
show ip pim autorp
Syntax Description
This command has no arguments or keywords.
Command Default
auto-rp is enabled by default.
Command Modes
Privileged EXEC mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command displays whether auto-rp is enabled or disabled.
Examples
The following command output displays that auto-rp is enabled:
Switch# show ip pim autorp
AutoRP Information:
AutoRP is enabled.
RP Discovery packet MTU is 0.
224.0.1.40 is joined on GigabitEthernet1/0/1.
PIM AutoRP Statistics: Sent/Received
RP Announce: 0/0, RP Discovery: 0/0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
326
show ip pim bsr-router
show ip pim bsr-router
To display information related to Protocol Independent Multicast (PIM) bootstrap router (BSR) protocol
processing, use the show ip pim bsr-router command in user EXEC or privileged EXEC mode.
show ip pim bsr-router
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In addition to auto-rp, the BSR RP method can be configured. After the BSR RP method is configured, this
command will display the BSR router information.
Examples
The following is sample output from the show ip pim bsr-router command:
Switch# show ip pim bsr-router
PIMv2 Bootstrap information
This system is the Bootstrap Router (BSR)
BSR address: 172.16.143.28
Uptime: 04:37:59, BSR Priority: 4, Hash mask length: 30
Next bootstrap message in 00:00:03 seconds
Next Cand_RP_advertisement in 00:00:03 seconds.
RP: 172.16.143.28(Ethernet0), Group acl: 6
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
327
show ip pim bsr
show ip pim bsr
To display information related to Protocol Independent Multicast (PIM) bootstrap router (BSR) protocol
processing, use the show ip pim bsr command in user EXEC or privileged EXEC mode.
show ip pim bsr
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
In addition to auto-rp, the BSR RP method can be configured. After the BSR RP method is configured, this
command will display the BSR router information.
Examples
The following is sample output from the show ip pim bsr command:
Switch# show ip pim bsr
PIMv2 Bootstrap information
This system is the Bootstrap Router (BSR)
BSR address: 172.16.143.28
Uptime: 04:37:59, BSR Priority: 4, Hash mask length: 30
Next bootstrap message in 00:00:03 seconds
Next Cand_RP_advertisement in 00:00:03 seconds.
RP: 172.16.143.28(Ethernet0), Group acl: 6
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
328
show ip pim tunnel
show ip pim tunnel
To display information about the Protocol Independent Multicast (PIM) register encapsulation and decapsulation
tunnels on an interface, use the show ip pim tunnel command.
show ip pim [vrf vrf-name] tunnel [Tunnel interface-number | verbose]
Syntax Description
vrf vrf-name
(Optional) Specifies a virtual routing and forwarding (VRF) configuration.
Tunnel interface-number
(Optional) Specifies the tunnel interface number.
verbose
(Optional) Provides additional information, such as the MAC encapsulation
header and platform-specific information.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the show ip pim tunnel to display information about PIM tunnel interfaces.
PIM tunnel interfaces are used by the IPv4 Multicast Forwarding Information Base (MFIB) for the PIM sparse
mode (PIM-SM) registration process. Two types of PIM tunnel interfaces are used by the the IPv4 MFIB:
• A PIM encapsulation tunnel (PIM Encap Tunnel)
• A PIM decapsulation tunnel (PIM Decap Tunnel)
The PIM Encap Tunnel is dynamically created whenever a group-to-rendezvous point (RP) mapping is learned
(through auto-RP, bootstrap router (BSR), or static RP configuration). The PIM Encap Tunnel is used to
encapsulate multicast packets sent by first-hop designated routers (DRs) that have directly connected sources.
Similar to the PIM Encap Tunnel, the PIM Decap Tunnel interface is dynamically created—but it is created
only on the RP whenever a group-to-RP mapping is learned. The PIM Decap Tunnel interface is used by the
RP to decapsulate PIM register messages.
Note
PIM tunnels will not appear in the running configuration.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
329
show ip pim tunnel
The following syslog message appears when a PIM tunnel interface is created:
* %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel<interface_number>,
changed state to up
Examples
The following is sample output from the show ip pim tunnel taken from an RP. The output is used to verify
the PIM Encap and Decap Tunnel on the RP:
Switch# show ip pim tunnel
Tunnel0
Type : PIM Encap
RP
: 70.70.70.1*
Source: 70.70.70.1
Tunnel1*
Type : PIM Decap
RP
: 70.70.70.1*
Source: -R2#
Note
The asterisk (*) indicates that the router is the RP. The RP will always have a PIM Encap and Decap
Tunnel interface.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
330
show mdns cache
show mdns cache
To display mDNS cache information for the switch, use the show mdns cache privileged EXEC command.
show mdns cache [interface type number | name record-name [type record-type] | type record-type]
Syntax Description
interface type-number
(Optional) Specifies a particular interface type and number for which
mDNS cache information is to be displayed.
name record-name
(Optional) Specifies a particular name for which mDNS cache information
is to be displayed.
type record-type
(Optional) Specifies a particular type for which mDNS cache information
is to be displayed.
Command Default
None
Command Modes
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain output appear.
Examples
This is an example of output from the show mdns cache command without any keywords:
Switch# show mdns cache
=================================================================================================================================
[<NAME>]
[<TYPE>][<CLASS>][<TTL>/Remaining][Accessed][If-name][Mac
Address][<RR Record Data>]
_airplay._tcp.local
PTR
IN
b878.2e33.c7c5 CAMPUS APPLE TV1._airplay._tcp.local
4500/4455
0
Vl121
CAMPUS APPLE TV1._airplay._tcp.local SRV
b878.2e33.c7c5 CAMPUS-APPLE-TV1.local
IN
120/75
2
Vl121
CAMPUS-APPLE-TV1.local
b878.2e33.c7c5 121.1.0.254
IN
120/75
2
Vl121
4500/4455
2
Vl121
A
CAMPUS APPLE TV1._airplay._tcp.local TXT
IN
b878.2e33.c7c5 (162) 'deviceid=B8:78:2E:33:C7:C6'
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
331
show mdns cache
'features=0x5a7ffff7''flags=0x4'
'model=AppleT~'~
_ipp._tcp.local
PTR
IN
2894.0fed.447f EPSON XP-400 Series._ipp._tcp.local
4500/4465
2
Vl2
EPSON XP-400 Series._ipp._tcp.local
2894.0fed.447f EPSONC053AA.local
SRV
IN
120/85
2
Vl2
EPSONC053AA.local
2894.0fed.447f 121.1.0.251
A
IN
120/85
2
Vl2
4500/4465
2
Vl2
_smb._tcp.local
PTR
IN
2894.0fed.447f EPSON XP-400 Series._smb._tcp.local
4500/4465
2
Vl2
EPSON XP-400 Series._smb._tcp.local
2894.0fed.447f EPSONC053AA.local
SRV
IN
120/85
2
Vl2
EPSON XP-400 Series._smb._tcp.local
2894.0fed.447f (1)'' R2-Access1#
TXT
IN
4500/4465
2
Vl2
EPSON XP-400 Series._ipp._tcp.local TXT
IN
2894.0fed.447f (384)'txtvers=1' N XP-400 Series'
'usbFG=EPSON''usb_MDL=XP~'~
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
332
show mdns requests
show mdns requests
To display information for outstanding mDNS requests, including record name and record type information,
for the switch, use the show mdns requests privileged EXEC command.
show mdns requests [detail | name record-name | type record-type [ name record-name ]]
Syntax Description
detail
Displays detailed mDNS requests information.
name record-name
Displays detailed mDNS requests information based on name.
type record-type
Displays detailed mDNS requests information based on type.
Command Default
None
Command Modes
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain output appear.
Examples
This is an example of output from the show mdns requests command without any keywords:
Switch# show mdns requests
MDNS Outstanding Requests
======================================================
Request name :
_airplay._tcp.local
Request type :
PTR
Request class :
IN
-------------------------------------------------Request name :
*.*
Request type :
PTR
Request class :
IN
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
333
show mdns statistics
show mdns statistics
To display mDNS statistics for the switch, use the show mdns statistics privileged EXEC command.
show mdns statistics {all | service-list list-name | service-policy {all | interface type-number }}
Syntax Description
all
Displays the service policy, service list, and interface information.
service-list list-name
Displays the service list information.
service-policy
Displays the service policy information.
interface type number
Displays interface information.
Command Default
None
Command Modes
Privileged EXEC
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not
appear, but the lines that contain output appear.
Examples
This is an example of output from the show mdns statistics all command:
Switch# show mdns statistics all
mDNS Statistics
mDNS packets sent
: 0
mDNS packets received
: 0
mDNS packets dropped
: 0
mDNS cache memory in use: 64224(bytes)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
334
show platform ip multicast
show platform ip multicast
To display platform-dependent IP multicast tables and other information, use the show platform ip multicast
privileged EXEC command.
show platform ip multicast {groups | hardware [detail] | interfaces | retry}
Syntax Description
Command Modes
Command History
groups
Displays IP multicast routes per group.
hardware [detail]
Displays IP multicast routes loaded into hardware. The optional detail
keyword is used to show port members in the destination index and route
index.
interfaces
Displays IP multicast interfaces.
retry
Displays the IP multicast routes in the retry queue.
Privileged EXEC
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use this command only when you are working directly with a technical support representative while
troubleshooting a problem. Do not use this command unless a technical support representative asks you to do
so.
Examples
This example shows how to display platform IP multicast routes per group:
Switch# show platform ip multicast groups
Total Number of entries:3
MROUTE ENTRY vrf 0 (*, 224.0.0.0)
Token: 0x0000001f6 flags: C
No RPF interface.
Number of OIF: 0
Flags: 0x10
Pkts : 0
OIF Details:No OIF interface.
DI details
---------Handle:0x603cf7f8 Res-Type:ASIC_RSC_DI Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_INVALID ref_count:1
Hardware Indices/Handles: index0:0x51f6 index1:0x51f6
Cookie length 56
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x4 0xe0 0x0 0x0 0x0 0x0 0x0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
335
show platform ip multicast
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
Detailed Resource Information (ASIC# 0)
---------------------------------------al_rsc_di
RM:index = 0x51f6
RM:pmap = 0x0
RM:cmi = 0x0
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f6
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
Detailed Resource Information (ASIC# 1)
---------------------------------------al_rsc_di
RM:index = 0x51f6
RM:pmap = 0x0
RM:cmi = 0x0
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f6
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
==============================================================
RI details
---------SI details
---------RM:generic lbl = 0x0
RM:di_handle = 0x51f6
RM:fd const lbl = 0x0
RM:skipid_idx = 0x0
RM:rcp serviceid = 0x0
RM:dejavu prechken= 0x1
RM:local cpu = 0x0
RM:local data = 0x1
RM:remote cpu = 0x0
RM:remote data = 0x1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
336
show platform ip multicast
==============================================================
HTM details
----------Handle:0x5d604490 Res-Type:ASIC_RSC_STP_INDEX Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_IPV4_MCAST_ROUTE_STARG ref_count:1
Hardware Indices/Handles: handle0:0x5d604518 handle1:0x5d604580
Detailed Resource Information (ASIC# 0)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x5d604518)
KEY - grp_addr:224.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:240.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 4095 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 164
capwap_mgid_present: 0 mgid 0
Detailed Resource Information (ASIC# 1)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x5d604580)
KEY - grp_addr:224.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:240.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 4095 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 164
capwap_mgid_present: 0 mgid 0
==============================================================
MROUTE ENTRY vrf 0 (*, 224.0.1.40)
Token: 0x0000001f8 flags: C IC
RPF interface: Vl121(74238750229529173)): SVI
Token:0x00000021 flags: F IC NS
Number of OIF: 1
Flags: 0x10
Pkts : 0
OIF Details:
Vl121
F IC NS
DI details
---------Handle:0x603d0000 Res-Type:ASIC_RSC_DI Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_INVALID ref_count:1
Hardware Indices/Handles: index0:0x51f7 index1:0x51f7
Cookie length 56
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x20 0xe0 0x0 0x1 0x28 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
Detailed Resource Information (ASIC# 0)
---------------------------------------al_rsc_di
RM:index = 0x51f7
RM:pmap = 0x0
RM:cmi = 0x33f
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
337
show platform ip multicast
al_rsc_cmi
RM:index = 0x51f7
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
Detailed Resource Information (ASIC# 1)
---------------------------------------al_rsc_di
RM:index = 0x51f7
RM:pmap = 0x0
RM:cmi = 0x33f
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f7
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
==============================================================
RI details
---------SI details
---------RM:generic lbl = 0x0
RM:di_handle = 0x51f7
RM:fd const lbl = 0x8
RM:skipid_idx = 0x0
RM:rcp serviceid = 0x0
RM:dejavu prechken= 0x1
RM:local cpu = 0x0
RM:local data = 0x1
RM:remote cpu = 0x1
RM:remote data = 0x1
==============================================================
HTM details
----------Handle:0x603d0440 Res-Type:ASIC_RSC_STP_INDEX Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_IPV4_MCAST_ROUTE_STARG ref_count:1
Hardware Indices/Handles: handle0:0x603cfae0 sm handle 0:0x603d0590 handle1:0x603d0520
sm handle 1:0x603d1770
Detailed Resource Information (ASIC# 0)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x603cfae0)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
338
show platform ip multicast
KEY - grp_addr:224.0.1.40 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 6 station_index: 165
capwap_mgid_present: 0 mgid 0
Detailed Resource Information (ASIC# 1)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x603d0520)
KEY - grp_addr:224.0.1.40 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 6 station_index: 165
capwap_mgid_present: 0 mgid 0
==============================================================
MROUTE ENTRY vrf 0 (*, 239.255.255.250)
Token: 0x0000003b7d flags: C
No RPF interface.
Number of OIF: 1
Flags: 0x10
Pkts : 95
OIF Details:
Vl131
F NS
DI details
---------Handle:0x606ffba0 Res-Type:ASIC_RSC_DI Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_INVALID ref_count:1
Hardware Indices/Handles: index0:0x51f8 index1:0x51f8
Cookie length 56
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x20 0xef 0xff 0xff 0xfa 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x0
Detailed Resource Information (ASIC# 0)
---------------------------------------al_rsc_di
RM:index = 0x51f8
RM:pmap = 0x0
RM:cmi = 0x0
RM:rcp_pmap = 0x0
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f8
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
Detailed Resource Information (ASIC# 1)
---------------------------------------al_rsc_di
RM:index = 0x51f8
RM:pmap = 0x0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
339
show platform ip multicast
RM:cmi = 0x0
RM:rcp_pmap = 0x1
RM:force data copy = 0
RM:remote cpu copy = 0
RM:remote data copy = 0
RM:local cpu copy = 0
RM:local data copy = 0
al_rsc_cmi
RM:index = 0x51f8
RM:cti_lo[0] = 0x0
RM:cti_lo[1] = 0x0
RM:cti_lo[2] = 0x0
RM:cpu_q_vpn[0] = 0x0
RM:cpu_q_vpn[1] = 0x0
RM:cpu_q_vpn[2] = 0x0
RM:npu_index = 0x0
RM:strip_seg = 0x0
RM:copy_seg = 0x0
==============================================================
RI details
---------ASIC# 0
Replication list :
-----------------Total #ri : 0
start_ri : 15
common_ret : 0
ASIC# 1
Replication list :
-----------------Total #ri : 6
start_ri : 15
common_ret : 0
Replication entry rep_ri 0xF #elem = 1
0) ri[0]=50 port=58 dirty=0
ASIC# 2
Replication list :
-----------------Total #ri : 0
start_ri : 0
common_ret : 0
SI details
---------RM:generic lbl = 0x0
RM:di_handle = 0x51f8
RM:fd const lbl = 0x8
RM:skipid_idx = 0x0
RM:rcp serviceid = 0x0
RM:dejavu prechken= 0x1
RM:local cpu = 0x0
RM:local data = 0x1
RM:remote cpu = 0x0
RM:remote data = 0x1
==============================================================
HTM details
-----------
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
340
show platform ip multicast
Handle:0x606ff6f8 Res-Type:ASIC_RSC_STP_INDEX Asic-Num:255
Feature-ID:AL_FID_L3_MULTICAST_IPV4 Lkp-ftr-id:LKP_FEAT_IPV4_MCAST_ROUTE_STARG ref_count:1
Hardware Indices/Handles: handle0:0x606ff3e0 sm handle 0:0x60ab9160 handle1:0x606ff378
sm handle 1:0x60ab6cc0
Detailed Resource Information (ASIC# 0)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x606ff3e0)
KEY - grp_addr:239.255.255.250 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 178
capwap_mgid_present: 0 mgid 0
Detailed Resource Information (ASIC# 1)
---------------------------------------Number of HTM Entries: 1
Entry #0: (handle 0x606ff378)
KEY - grp_addr:239.255.255.250 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
MASK - grp_addr:0.0.0.0 decap_tunnel: 0 encap_tunnel: 0 vrf_id: 0 mtr_id: 0
AD: local_source_punt: 1 afd_label_or_clientid: 0 mcast_bridge_frame: 0 mcast_rep_frame: 0
rpf_valid: 1 rpf_le_ptr: 0 afd_client_flag: 0 dest_mod_bridge: 0 dest_mod_route: 1
cpp_type: 0 dest_mod_index: 0 rp_index: 0 priority: 3 rpf_le: 0 station_index: 178
capwap_mgid_present: 0 mgid 0
==============================================================
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
341
wireless mdns-bridging
wireless mdns-bridging
To enable Ethernet mDNS support, use the wireless mdns-bridging command. To disable Ethernet mDNS
support, use the no form of this command.
wireless mdns-bridging
no wireless mdns-bridging
This command has no keywords or arguments.
Command Default
Ethernet mDNS support is enabled by default.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use this command only if you have enabled wireless multicast.
Examples
This example shows how to enable Ethernet mDNS support:
Switch# configure terminal
Enter configuration commands, one per line.
Switch(config)# wireless multicast
Switch(config)# wireless mdns-bridging
End with CNTL/Z.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
342
wireless multicast
wireless multicast
To enable Ethernet multicast support, use the wireless multicast command.
wireless multicast [non-ip [vlan vlan-id]]
Syntax Description
non-ip
(Optional) Configures multicast non-IP support.
vlan vlan-id
(Optional) Specifies multicast non-IP for a VLAN. The interface number
ranges between 1 and 4095.
Command Default
Disabled
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure multicast non-IP VLAN:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# wireless multicast non-ip vlan 20
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
343
wireless multicast
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
344
PART
V
Layer 2/3
• Layer 2/3 Commands, page 347
Layer 2/3 Commands
• channel-group, page 349
• channel-protocol, page 352
• clear lacp, page 353
• clear pagp, page 354
• clear spanning-tree counters, page 355
• clear spanning-tree detected-protocols, page 356
• debug etherchannel, page 357
• debug lacp, page 359
• debug pagp, page 360
• debug platform pm, page 362
• debug platform udld, page 364
• debug spanning-tree , page 365
• interface port-channel, page 367
• lacp max-bundle, page 369
• lacp port-priority, page 370
• lacp system-priority, page 372
• pagp learn-method, page 373
• pagp port-priority, page 375
• port-channel load-balance, page 376
• port-channel load-balance extended, page 378
• port-channel min-links, page 380
• show etherchannel, page 381
• show lacp, page 384
• show pagp, page 388
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
347
• show platform etherchannel, page 390
• show platform pm, page 391
• show udld, page 392
• switchport, page 396
• switchport access vlan, page 398
• switchport mode, page 401
• switchport nonegotiate, page 403
• udld, page 405
• udld port, page 407
• udld reset, page 409
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
348
channel-group
channel-group
To assign an Ethernet port to an EtherChannel group, or to enable an EtherChannel mode, or both, use the
channel-group command in interface configuration mode. To remove an Ethernet port from an EtherChannel
group, use the no form of this command.
channel-group { auto | channel-group-number mode {active| auto [non-silent]| desirable [non-silent]| on|
passive}}
no channel-group
Syntax Description
Enables auto-LAG feature on
individual port interface.
auto
By default, the auto-LAG feature
is enabled on the port.
Command Default
channel-group-number
Channel group number. The range
is 1 to 128.
mode
Specifies the EtherChannel mode.
active
Unconditionally enables Link
Aggregation Control Protocol
(LACP).
auto
Enables the Port Aggregation
Protocol (PAgP) only if a PAgP
device is detected.
non-silent
(Optional) Configures the interface
for nonsilent operation when
connected to a partner that is
PAgP-capable. Use in PAgP mode
with the auto or desirable keyword
when traffic is expected from the
other device.
desirable
Unconditionally enables PAgP.
on
Enables the on mode.
passive
Enables LACP only if a LACP
device is detected.
No channel groups are assigned.
No mode is configured.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
349
channel-group
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
For Layer 2 EtherChannels, the channel-group command automatically creates the port-channel interface
when the channel group gets its first physical port. You do not have to use the interface port-channel command
in global configuration mode to manually create a port-channel interface. If you create the port-channel
interface first, the channel-group-number can be the same as the port-channel-number, or you can use a new
number. If you use a new number, the channel-group command dynamically creates a new port channel.
Although it is not necessary to disable the IP address that is assigned to a physical port that is part of a channel
group, we strongly recommend that you do so.
You create Layer 3 port channels by using the interface port-channel command followed by the no switchport
interface configuration command. Manually configure the port-channel logical interface before putting the
interface into the channel group.
After you configure an EtherChannel, configuration changes that you make on the port-channel interface
apply to all the physical ports assigned to the port-channel interface. Configuration changes applied to the
physical port affect only the port where you apply the configuration. To change the parameters of all ports in
an EtherChannel, apply configuration commands to the port-channel interface, for example, spanning-tree
commands or commands to configure a Layer 2 EtherChannel as a trunk.
Active mode places a port into a negotiating state in which the port initiates negotiations with other ports by
sending LACP packets. A channel is formed with another port group in either the active or passive mode.
Auto mode places a port into a passive negotiating state in which the port responds to PAgP packets it receives
but does not start PAgP packet negotiation. A channel is formed only with another port group in desirable
mode. When auto is enabled, silent operation is the default.
Desirable mode places a port into an active negotiating state in which the port starts negotiations with other
ports by sending PAgP packets. An EtherChannel is formed with another port group that is in the desirable
or auto mode. When desirable is enabled, silent operation is the default.
If you do not specify non-silent with the auto or desirable mode, silent is assumed. The silent mode is used
when the switch is connected to a device that is not PAgP-capable and rarely, if ever, sends packets. An
example of a silent partner is a file server or a packet analyzer that is not generating traffic. In this case, running
PAgP on a physical port prevents that port from ever becoming operational. However, it allows PAgP to
operate, to attach the port to a channel group, and to use the port for transmission. Both ends of the link cannot
be set to silent.
In on mode, a usable EtherChannel exists only when both connected port groups are in the on mode.
Caution
Use care when using the on mode. This is a manual configuration, and ports on both ends of the
EtherChannel must have the same configuration. If the group is misconfigured, packet loss or spanning-tree
loops can occur.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
350
channel-group
Passive mode places a port into a negotiating state in which the port responds to received LACP packets but
does not initiate LACP packet negotiation. A channel is formed only with another port group in active mode.
Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running PAgP
and LACP can coexist on the same switch or on different switches in the stack (but not in a cross-stack
configuration). Individual EtherChannel groups can run either PAgP or LACP, but they cannot interoperate.
If you set the protocol by using the channel-protocol interface configuration command, the setting is not
overridden by the channel-group interface configuration command.
Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an IEEE 802.1x
port. If you try to enable IEEE 802.1x authentication on an EtherChannel port, an error message appears, and
IEEE 802.1x authentication is not enabled.
Do not configure a secure port as part of an EtherChannel or configure an EtherChannel port as a secure port.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the software
configuration guide for this release.
Caution
Examples
Do not enable Layer 3 addresses on the physical EtherChannel ports. Do not assign bridge groups on the
physical EtherChannel ports because it creates loops.
This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two
static-access ports in VLAN 10 to channel 5 with the PAgP mode desirable:
Switch# configure terminal
Switch(config)# interface range GigabitEthernet 2/0/1 - 2
Switch(config-if-range)# switchport mode access
Switch(config-if-range)# switchport access vlan 10
Switch(config-if-range)# channel-group 5 mode desirable
Switch(config-if-range)# end
This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two
static-access ports in VLAN 10 to channel 5 with the LACP mode active:
Switch# configure terminal
Switch(config)# interface range GigabitEthernet 2/0/1 - 2
Switch(config-if-range)# switchport mode access
Switch(config-if-range)# switchport access vlan 10
Switch(config-if-range)# channel-group 5 mode active
Switch(config-if-range)# end
This example shows how to configure a cross-stack EtherChannel in a switch stack. It uses LACP passive
mode and assigns two ports on stack member 2 and one port on stack member 3 as static-access ports in VLAN
10 to channel 5:
Switch# configure terminal
Switch(config)# interface range GigabitEthernet 2/0/4 - 5
Switch(config-if-range)# switchport mode access
Switch(config-if-range)# switchport access vlan 10
Switch(config-if-range)# channel-group 5 mode passive
Switch(config-if-range)# exit
Switch(config)# interface GigabitEthernet 3/0/3
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan 10
Switch(config-if)# channel-group 5 mode passive
Switch(config-if)# exit
You can verify your settings by entering the show running-config privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
351
channel-protocol
channel-protocol
To restrict the protocol used on a port to manage channeling, use the channel-protocol command in interface
configuration mode. To return to the default setting, use the no form of this command.
channel-protocol {lacp| pagp}
no channel-protocol
Syntax Description
lacp
Configures an EtherChannel with the Link Aggregation Control Protocol (LACP).
pagp
Configures an EtherChannel with the Port Aggregation Protocol (PAgP).
Command Default
No protocol is assigned to the EtherChannel.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the channel-protocol command only to restrict a channel to LACP or PAgP. If you set the protocol by
using the channel-protocol command, the setting is not overridden by the channel-group interface
configuration command.
You must use the channel-group interface configuration command to configure the EtherChannel parameters.
The channel-group command also can set the mode for the EtherChannel.
You cannot enable both the PAgP and LACP modes on an EtherChannel group.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
You cannot configure PAgP on cross-stack configurations.
Examples
This example shows how to specify LACP as the protocol that manages the EtherChannel:
Switch(config-if)# channel-protocol lacp
You can verify your settings by entering the show etherchannel [channel-group-number] protocol privileged
EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
352
clear lacp
clear lacp
To clear Link Aggregation Control Protocol (LACP) channel-group counters, use the clear lacp command
in privileged EXEC mode.
clear lacp [channel-group-number] counters
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Clears traffic counters.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can clear all counters by using the clear lacp counters command, or you can clear only the counters for
the specified channel group by using the clear lacp channel-group-number counters command.
Examples
This example shows how to clear all channel-group information:
Switch# clear lacp counters
This example shows how to clear LACP traffic counters for group 4:
Switch# clear lacp 4 counters
You can verify that the information was deleted by entering the show lacp counters or the show lacp
channel-group-number counters privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
353
clear pagp
clear pagp
To clear the Port Aggregation Protocol (PAgP) channel-group information, use the clear pagp command in
privileged EXEC mode.
clear pagp [channel-group-number] counters
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Clears traffic counters.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can clear all counters by using the clear pagp counters command, or you can clear only the counters
for the specified channel group by using the clear pagp channel-group-number counters command.
Examples
This example shows how to clear all channel-group information:
Switch# clear pagp counters
This example shows how to clear PAgP traffic counters for group 10:
Switch# clear pagp 10 counters
You can verify that the information was deleted by entering the show pagp privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
354
clear spanning-tree counters
clear spanning-tree counters
To clear the spanning-tree counters, use the clear spanning-tree counters command in privileged EXEC
mode.
clear spanning-tree counters [interface interface-id]
Syntax Description
interface interface-id
(Optional) Clears all spanning-tree counters on the specified
interface. Valid interfaces include physical ports, VLANs, and port
channels.
The VLAN range is 1 to 4094.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If the interface-id value is not specified, spanning-tree counters are cleared for all interfaces.
Examples
This example shows how to clear spanning-tree counters for all interfaces:
Switch# clear spanning-tree counters
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
355
clear spanning-tree detected-protocols
clear spanning-tree detected-protocols
To restart the protocol migration process and force renegotiation with neighboring switches on the interface,
use the clear spanning-tree detected-protocols command in privileged EXEC mode.
clear spanning-tree detected-protocols [interface interface-id]
Syntax Description
interface interface-id
(Optional) Restarts the protocol migration process on the specified interface.
Valid interfaces include physical ports, VLANs, and port channels.
The VLAN range is 1 to 4094.
The port-channel range is 1 to 128.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
A switch running the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol or the Multiple Spanning
Tree Protocol (MSTP) supports a built-in protocol migration method that enables it to interoperate with legacy
IEEE 802.1D switches. If a rapid-PVST+ or an MSTP switch receives a legacy IEEE 802.1D configuration
bridge protocol data unit (BPDU) with the protocol version set to 0, the switch sends only IEEE 802.1D
BPDUs on that port. A multiple spanning-tree (MST) switch can also detect that a port is at the boundary of
a region when it receives a legacy BPDU, an MST BPDU (Version 3) associated with a different region, or
a rapid spanning-tree (RST) BPDU (Version 2).
The switch does not automatically revert to the rapid-PVST+ or the MSTP mode if it no longer receives IEEE
802.1D BPDUs because it cannot learn whether the legacy switch has been removed from the link unless the
legacy switch is the designated switch. Use the clear spanning-tree detected-protocols command in this
situation.
Examples
This example shows how to restart the protocol migration process on a port:
Switch# clear spanning-tree detected-protocols interface gigabitethernet2/0/1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
356
debug etherchannel
debug etherchannel
To enable debugging of EtherChannels, use the debug etherchannel command in privileged EXEC mode.
To disable debugging, use the no form of the command.
debug etherchannel [all | detail | error | event | idb ]
no debug etherchannel [all | detail | error | event | idb ]
Syntax Description
all
(Optional) Displays all EtherChannel debug messages.
detail
(Optional) Displays detailed EtherChannel debug messages.
error
(Optional) Displays EtherChannel error debug messages.
event
(Optional) Displays EtherChannel event messages.
idb
(Optional) Displays PAgP interface descriptor block debug messages.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The undebug etherchannel command is the same as the no debug etherchannel command.
Although the linecard keyword is displayed in the command-line help, it is not supported.
When you enable debugging on a stack, it is enabled only on the active switch. To enable debugging on the
standby switch , start a session from the active switch by using the session switch-number command in
privileged EXEC mode. Enter the debug command at the command-line prompt of the standby switch.
To enable debugging on the standby switch without first starting a session on the active switch, use the remote
command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display all EtherChannel debug messages:
Switch# debug etherchannel all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
357
debug etherchannel
This example shows how to display debug messages related to EtherChannel events:
Switch# debug etherchannel event
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
358
debug lacp
debug lacp
To enable debugging of Link Aggregation Control Protocol (LACP) activity, use the debug lacp command
in privileged EXEC mode. To disable LACP debugging, use the no form of this command.
debug lacp [all | event | fsm | misc | packet]
no debug lacp [all | event | fsm | misc | packet]
Syntax Description
all
(Optional) Displays all LACP debug messages.
event
(Optional) Displays LACP event debug messages.
fsm
(Optional) Displays messages about changes within the LACP finite state machine.
misc
(Optional) Displays miscellaneous LACP debug messages.
packet
(Optional) Displays the receiving and transmitting LACP control packets.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The undebug etherchannel command is the same as the no debug etherchannel command.
When you enable debugging on a stack, it is enabled only on the active switch. To enable debugging on the
standby switch , start a session from the active switch by using the session switch-number command in
privileged EXEC mode. Enter the debug command at the command-line prompt of the standby switch.
To enable debugging on the standby switch without first starting a session on the active switch, use the remote
command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display all LACP debug messages:
Switch# debug LACP all
This example shows how to display debug messages related to LACP events:
Switch# debug LACP event
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
359
debug pagp
debug pagp
To enable debugging of Port Aggregation Protocol (PAgP) activity, use the debug pagp command in privileged
EXEC mode. To disable PAgP debugging, use the no form of this command.
debug pagp [all | dual-active | event | fsm | misc | packet]
no debug pagp [all | dual-active | event | fsm | misc | packet]
Syntax Description
all
(Optional) Displays all PAgP debug messages.
dual-active
(Optional) Displays dual-active detection messages.
event
(Optional) Displays PAgP event debug messages.
fsm
(Optional) Displays messages about changes within the
PAgP finite state machine.
misc
(Optional) Displays miscellaneous PAgP debug messages.
packet
(Optional) Displays the receiving and transmitting PAgP
control packets.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The undebug pagp command is the same as the no debug pagp command.
When you enable debugging on a stack, it is enabled only on the active switch. To enable debugging on the
standby switch , start a session from the active switch by using the session switch-number command in
privileged EXEC mode. Enter the debug command at the command-line prompt of the standby switch.
To enable debugging on the standby switch without first starting a session on the active switch, use the remote
command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display all PAgP debug messages:
Switch# debug pagp all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
360
debug pagp
This example shows how to display debug messages related to PAgP events:
Switch# debug pagp event
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
361
debug platform pm
debug platform pm
To enable debugging of the platform-dependent port manager software module, use the debug platform pm
command in privileged EXEC mode. To disable debugging, use the no form of this command.
debug platform pm {all| counters| errdisable| fec| if-numbers| l2-control| link-status| platform| pm-spi|
pm-vectors [detail]| ses| vlans}
no debug platform pm {all| counters| errdisable| fec| if-numbers| l2-control| link-status| platform| pm-spi|
pm-vectors [detail]| ses| vlans}
Syntax Description
all
Displays all port manager debug messages.
counters
Displays counters for remote procedure call (RPC) debug messages.
errdisable
Displays error-disabled-related events debug messages.
fec
Displays forwarding equivalence class (FEC) platform-related events
debug messages.
if-numbers
Displays interface-number translation event debug messages.
l2-control
Displays Layer 2 control infra debug messages.
link-status
Displays interface link-detection event debug messages.
platform
Displays port manager function event debug messages.
pm-spi
Displays port manager stateful packet inspection (SPI) event debug
messages.
pm-vectors
Displays port manager vector-related event debug messages.
detail
(Optional) Displays vector-function details.
ses
Displays service expansion shelf (SES) related event debug messages.
vlans
Displays VLAN creation and deletion event debug messages.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
362
debug platform pm
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The undebug platform pm command is the same as the no debug platform pm command.
When you enable debugging on a stack, it is enabled only on the active switch. To enable debugging on the
standby switch , start a session from the active switch by using the session switch-number command in
privileged EXEC mode. Enter the debug command at the command-line prompt of the standby switch.
To enable debugging on the standby switch without first starting a session on the active switch, use the remote
command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display debug messages related to the creation and deletion of VLANs:
Switch# debug platform pm vlans
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
363
debug platform udld
debug platform udld
To enable debugging of the platform-dependent UniDirectional Link Detection (UDLD) software, use the
debug platform udld command in privileged EXEC mode. To disable debugging, use the no form of this
command.
debug platform udld [error| event] [switch switch-number]
no debug platform udld [error| event] [switch switch-number]
Syntax Description
error
(Optional) Displays error condition debug messages.
event
(Optional) Displays UDLD-related platform event debug messages.
switch switch-number
(Optional) Displays UDLD debug messages for the specified stack member.
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The undebug platform udld command is the same as the no debug platform udld command.
When you enable debugging on a switch stack, it is enabled only on the active switch. To enable debugging
on a stack member, you can start a session from the active switch by using the session switch-number EXEC
command. Then enter the debug command at the command-line prompt of the stack member.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
364
debug spanning-tree
debug spanning-tree
To enable debugging of spanning-tree activities, use the debug spanning-tree command in EXEC mode. To
disable debugging, use the no form of this command.
debug spanning-tree {all | backbonefast | bpdu | bpdu-opt | config | etherchannel | events | exceptions |
general | ha | mstp | pvst+| root | snmp | synchronization | switch | uplinkfast}
no debug spanning-tree {all | backbonefast | bpdu | bpdu-opt | config | etherchannel | events | exceptions
| general | mstp | pvst+| root | snmp | synchronization | switch | uplinkfast}
Syntax Description
all
Displays all spanning-tree debug messages.
backbonefast
Displays BackboneFast-event debug messages.
bpdu
Displays spanning-tree bridge protocol data unit (BPDU)
debug messages.
bpdu-opt
Displays optimized BPDU handling debug messages.
config
Displays spanning-tree configuration change debug
messages.
etherchannel
Displays EtherChannel-support debug messages.
events
Displays spanning-tree topology event debug messages.
exceptions
Displays spanning-tree exception debug messages.
general
Displays general spanning-tree activity debug messages.
ha
Displays high-availability spanning-tree debug messages.
mstp
Debugs Multiple Spanning Tree Protocol (MSTP) events.
pvst+
Displays per-VLAN spanning-tree plus (PVST+) event
debug messages.
root
Displays spanning-tree root-event debug messages.
snmp
Displays spanning-tree Simple Network Management
Protocol (SNMP) handling debug messages.
switch
Displays switch shim command debug messages. This
shim is the software module that is the interface between
the generic Spanning Tree Protocol (STP) code and the
platform-specific code of various switch platforms.
synchronization
Displays the spanning-tree synchronization event debug
messages.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
365
debug spanning-tree
uplinkfast
Command Default
Debugging is disabled.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Displays UplinkFast-event debug messages.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The undebug spanning-tree command is the same as the no debug spanning-tree command.
When you enable debugging on a stack, it is enabled only on the active switch. To enable debugging on the
standby switch , start a session from the active switch by using the session switch-number command in
privileged EXEC mode. Enter the debug command at the command-line prompt of the standby switch.
To enable debugging on the standby switch without first starting a session on the active switch, use the remote
command switch-number LINE command in privileged EXEC mode.
Examples
This example shows how to display all spanning-tree debug messages:
Switch# debug spanning-tree all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
366
interface port-channel
interface port-channel
To access or create a port channel, use the interface port-channel command in global configuration mode.
Use the no form of this command to remove the port channel.
interface port-channel port-channel-number
no interface port-channel
Syntax Description
port-channel-number
Channel group number. The range is 1 to 128.
Command Default
No port channel logical interfaces are defined.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
For Layer 2 EtherChannels, you do not have to create a port-channel interface before assigning physical ports
to a channel group. Instead, you can use the channel-group interface configuration command, which
automatically creates the port-channel interface when the channel group obtains its first physical port. If you
create the port-channel interface first, the channel-group-number can be the same as the port-channel-number,
or you can use a new number. If you use a new number, the channel-group command dynamically creates a
new port channel.
You create Layer 3 port channels by using the interface port-channel command followed by the no switchport
interface configuration command. You should manually configure the port-channel logical interface before
putting the interface into the channel group.
Only one port channel in a channel group is allowed.
Caution
When using a port-channel interface as a routed port, do not assign Layer 3 addresses on the physical
ports that are assigned to the channel group.
Caution
Do not assign bridge groups on the physical ports in a channel group used as a Layer 3 port channel
interface because it creates loops. You must also disable spanning tree.
Follow these guidelines when you use the interface port-channel command:
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
367
interface port-channel
• If you want to use the Cisco Discovery Protocol (CDP), you must configure it on the physical port and
not on the port channel interface.
• Do not configure a port that is an active member of an EtherChannel as an IEEE 802.1x port. If IEEE
802.1x is enabled on a not-yet active port of an EtherChannel, the port does not join the EtherChannel.
For a complete list of configuration guidelines, see the “Configuring EtherChannels” chapter in the software
configuration guide for this release.
Examples
This example shows how to create a port channel interface with a port channel number of 5:
Switch(config)# interface port-channel 5
You can verify your setting by entering the show running-config privileged EXEC or show etherchannel
channel-group-number detail privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
368
lacp max-bundle
lacp max-bundle
To define the maximum number of active LACP ports allowed in a port channel, use the lacp max-bundle
command in interface configuration mode. To return to the default setting, use the no form of this command.
lacp max-bundle max_bundle_number
no lacp max-bundle
Syntax Description
max_bundle_number
Command Default
None
Command Modes
Interface configuration
Command History
Usage Guidelines
The maximum number of active LACP ports in the port channel. The
range is 1 to 8. The default is 8.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in hot-standby mode. When there are more than eight ports in an LACP channel
group, the switch on the controlling end of the link uses port priorities to determine which ports are bundled
into the channel and which ports are put in hot-standby mode. Port priorities on the other switch (the
noncontrolling end of the link) are ignored.
The lacp max-bundle command must specify a number greater than the number specified by the port-channel
min-links command.
Use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby
mode (denoted with an H port-state flag in the output display).
Examples
This example shows how to specify a maximum of five active LACP ports in port channel 2:
Switch(config)# interface port-channel 2
Switch(config-if)# lacp max-bundle 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
369
lacp port-priority
lacp port-priority
To configure the port priority for the Link Aggregation Control Protocol (LACP), use the lacp port-priority
command in interface configuration mode. To return to the default setting, use the no form of this command.
lacp port-priority priority
no lacp port-priority
Syntax Description
priority
Command Default
The default is 32768.
Command Modes
Interface configuration
Command History
Usage Guidelines
Port priority for LACP. The range is 1 to 65535.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The lacp port-priority interface configuration command determines which ports are bundled and which ports
are put in hot-standby mode when there are more than eight ports in an LACP channel group.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in standby mode.
In port-priority comparisons, a numerically lower value has a higher priority: When there are more than eight
ports in an LACP channel group, the eight ports with the numerically lowest values (highest priority values)
for LACP port priority are bundled into the channel group, and the lower-priority ports are put in hot-standby
mode. If two or more ports have the same LACP port priority (for example, they are configured with the
default setting of 65535), then an internal value for the port number determines the priority.
Note
The LACP port priorities are only effective if the ports are on the switch that controls the LACP link. See
the lacp system-priority global configuration command for determining which switch controls the link.
Use the show lacp internal privileged EXEC command to display LACP port priorities and internal port
number values.
For information about configuring LACP on physical ports, see the configuration guide for this release.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
370
lacp port-priority
Examples
This example shows how to configure the LACP port priority on a port:
Switch# interface gigabitethernet2/0/1
Switch(config-if)# lacp port-priority 1000
You can verify your settings by entering the show lacp [channel-group-number] internal privileged EXEC
command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
371
lacp system-priority
lacp system-priority
To configure the system priority for the Link Aggregation Control Protocol (LACP), use the lacp
system-priority command in global configuration mode on the switch. To return to the default setting, use
the no form of this command.
lacp system-priority priority
no lacp system-priority
Syntax Description
priority
Command Default
The default is 32768.
Command Modes
Global configuration
Command History
Usage Guidelines
System priority for LACP. The range is 1 to 65535.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The lacp system-priority command determines which switch in an LACP link controls port priorities.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in standby mode. When there are more than eight ports in an LACP channel group,
the switch on the controlling end of the link uses port priorities to determine which ports are bundled into the
channel and which ports are put in hot-standby mode. Port priorities on the other switch (the noncontrolling
end of the link) are ignored.
In priority comparisons, numerically lower values have a higher priority. Therefore, the system with the
numerically lower value (higher priority value) for LACP system priority becomes the controlling system. If
both switches have the same LACP system priority (for example, they are both configured with the default
setting of 32768), the LACP system ID (the switch MAC address) determines which switch is in control.
The lacp system-priority command applies to all LACP EtherChannels on the switch.
Use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby
mode (denoted with an H port-state flag in the output display).
Examples
This example shows how to set the LACP system priority:
Switch(config)# lacp system-priority 20000
You can verify your settings by entering the show lacp sys-id privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
372
pagp learn-method
pagp learn-method
To learn the source address of incoming packets received from an EtherChannel port, use the pagp
learn-method command in interface configuration mode. To return to the default setting, use the no form of
this command.
pagp learn-method {aggregation-port| physical-port}
no pagp learn-method
Syntax Description
aggregation-port
Specifies address learning on the logical port channel. The switch sends packets to
the source using any port in the EtherChannel. This setting is the default. With
aggregation-port learning, it is not important on which physical port the packet arrives.
physical-port
Specifies address learning on the physical port within the EtherChannel. The switch
sends packets to the source using the same port in the EtherChannel from which it
learned the source address. The other end of the channel uses the same port in the
channel for a particular destination MAC or IP address.
Command Default
The default is aggregation-port (logical port channel).
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The learn method must be configured the same at both ends of the link.
The switch supports address learning only on aggregate ports even though the physical-port keyword is
provided in the command-line interface (CLI). The pagp learn-method and the pagp port-priority interface
configuration commands have no effect on the switch hardware, but they are required for PAgP interoperability
with devices that only support address learning by physical ports.
When the link partner to the switch is a physical learner, we recommend that you configure the switch as a
physical-port learner by using the pagp learn-method physical-port interface configuration command. We
also recommend that you set the load-distribution method based on the source MAC address by using the
port-channel load-balance src-mac global configuration command. Use the pagp learn-method interface
configuration command only in this situation.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
373
pagp learn-method
Examples
This example shows how to set the learning method to learn the address on the physical port within the
EtherChannel:
Switch(config-if)# pagp learn-method physical-port
This example shows how to set the learning method to learn the address on the port channel within the
EtherChannel:
Switch(config-if)# pagp learn-method aggregation-port
You can verify your settings by entering the show running-config privileged EXEC command or the show
pagp channel-group-number internal privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
374
pagp port-priority
pagp port-priority
To select a port over which all Port Aggregation Protocol (PAgP) traffic through the EtherChannel is sent,
use the pagp port-priority command in interface configuration mode. If all unused ports in the EtherChannel
are in hot-standby mode, they can be placed into operation if the currently selected port and link fails. To
return to the default setting, use the no form of this command.
pagp port-priority priority
no pagp port-priority
Syntax Description
priority
Command Default
The default is 128.
Command Modes
Interface configuration
Command History
Usage Guidelines
Priority number. The range is from 0 to 255.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The physical port with the highest priority that is operational and has membership in the same EtherChannel
is the one selected for PAgP transmission.
The switch supports address learning only on aggregate ports even though the physical-port keyword is
provided in the command-line interface (CLI). The pagp learn-method and the pagp port-priority interface
configuration commands have no effect on the switch hardware, but they are required for PAgP interoperability
with devices that only support address learning by physical ports, such as the Catalyst 1900 switch.
When the link partner to the switch is a physical learner, we recommend that you configure the switch as a
physical-port learner by using the pagp learn-method physical-port interface configuration command. We
also recommend that you set the load-distribution method based on the source MAC address by using the
port-channel load-balance src-mac global configuration command. Use the pagp learn-method interface
configuration command only in this situation.
Examples
This example shows how to set the port priority to 200:
Switch(config-if)# pagp port-priority 200
You can verify your setting by entering the show running-config privileged EXEC command or the show
pagp channel-group-number internal privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
375
port-channel load-balance
port-channel load-balance
To set the load-distribution method among the ports in the EtherChannel, use the port-channel load-balance
command in global configuration mode. To reset the load-balancing mechanism to the default setting, use the
no form of this command.
port-channel load-balance {dst-ip| dst-mac| dst-mixed-ip-port| dst-port| extended| src-dst-ip| src-dst-mac|
src-dst-mixed-ip-port| src-dst-port| src-ip| src-mac| src-mixed-ip-port| src-port}
no port-channel load-balance
Syntax Description
dst-ip
Specifies load distribution based on the destination host IP address.
dst-mac
Specifies load distribution based on the destination host MAC address. Packets
to the same destination are sent on the same port, but packets to different
destinations are sent on different ports in the channel.
dst-mixed-ip-port
Specifies load distribution based on the destination IPv4 or IPv6 address and the
TCP/UDP (Layer 4) port number.
dst-port
Specifies load distribution based on the destination TCP/UDP (Layer 4) port
number for both IPv4 and IPv6.
extended
Sets extended load balance methods among the ports in the EtherChannel. See
the port-channel load-balance extended command.
src-dst-ip
Specifies load distribution based on the source and destination host IP address.
src-dst-mac
Specifies load distribution based on the source and destination host MAC address.
src-dst-mixed-ip-port
Specifies load distribution based on the source and destination host IP address
and TCP/UDP (layer 4) port number.
src-dst-port
Specifies load distribution based on the source and destination TCP/UDP (Layer
4) port number.
src-ip
Specifies load distribution based on the source host IP address.
src-mac
Specifies load distribution based on the source MAC address. Packets from
different hosts use different ports in the channel, but packets from the same host
use the same port.
src-mixed-ip-port
Specifies load distribution based on the source host IP address and TCP/UDP
(Layer 4) port number.
src-port
Specifies load distribution based on the TCP/UDP (Layer 4) port number.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
376
port-channel load-balance
Command Default
The default is src-mac.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can verify your setting by entering the show running-config privileged EXEC command or the show
etherchannel load-balance privileged EXEC command.
Examples
This example shows how to set the load-distribution method to dst-mac:
Switch(config)# port-channel load-balance dst-mac
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
377
port-channel load-balance extended
port-channel load-balance extended
To set combinations of load-distribution methods among the ports in the EtherChannel, use the port-channel
load-balance extended command in global configuration mode. To reset the extended load-balancing
mechanism to the default setting, use the no form of this command.
port-channel load-balance extended[dst-ip| dst-mac| dst-port| ipv6-label| l3-proto| src-ip| src-mac|
src-port]
no port-channel load-balance extended
Syntax Description
dst-ip
(Optional) Specifies load distribution based on the destination host IP address.
dst-mac
(Optional) Specifies load distribution based on the destination host MAC address.
Packets to the same destination are sent on the same port, but packets to different
destinations are sent on different ports in the channel.
dst-port
(Optional) Specifies load distribution based on the destination TCP/UDP (Layer 4)
port number for both IPv4 and IPv6.
ipv6-label
(Optional) Specifies load distribution based on the source MAC address and IPv6
flow label.
l3-proto
(Optional) Specifies load distribution based on the source MAC address and Layer
3 protocols.
src-ip
(Optional) Specifies load distribution based on the source host IP address.
src-mac
(Optional) Specifies load distribution based on the source MAC address. Packets
from different hosts use different ports in the channel, but packets from the same
host use the same port.
src-port
(Optional) Specifies load distribution based on the TCP/UDP (Layer 4) port number.
Command Default
The default is src-mac.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
378
port-channel load-balance extended
Usage Guidelines
For information about when to use these forwarding methods, see the Layer 2/3 Configuration Guide (Catalyst
3650 Switches) for this release.
You can verify your setting by entering the show running-config privileged EXEC command or the show
etherchannel load-balance privileged EXEC command.
Examples
This example shows how to set the extended load-distribution method:
Switch(config)# port-channel load-balance extended dst-ip dst-mac src-ip
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
379
port-channel min-links
port-channel min-links
To define the minimum number of LACP ports that must be bundled in the link-up state and bundled in the
EtherChannel in order that a port channel becomes active, use the port-channel min-links command in
interface configuration mode. To return to the default setting, use the no form of this command.
port-channel min-links min_links_number
no port-channel min-links
Syntax Description
min_links_number
Command Default
None
Command Modes
Interface configuration
Command History
Usage Guidelines
The minimum number of active LACP ports in the port channel. The range
is 2 to 8. The default is 1.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
An LACP channel group can have up to 16 Ethernet ports of the same type. Up to eight ports can be active,
and up to eight ports can be in hot-standby mode. When there are more than eight ports in an LACP channel
group, the switch on the controlling end of the link uses port priorities to determine which ports are bundled
into the channel and which ports are put in hot-standby mode. Port priorities on the other switch (the
noncontrolling end of the link) are ignored.
The port-channel min-links command must specify a number a less than the number specified by the lacp
max-bundle command.
Use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby
mode (denoted with an H port-state flag in the output display).
Examples
This example shows how to specify a minimum of three active LACP ports before port channel 2 becomes
active:
Switch(config)# interface port-channel 2
Switch(config-if)# port-channel min-links 3
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
380
show etherchannel
show etherchannel
To display EtherChannel information for a channel, use the show etherchannel command in user EXEC
mode.
show etherchannel [channel-group-number | {detail | port | port-channel | protocol | summary }] | [auto|
detail| load-balance | port| port-channel| protocol| summary]
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
auto
(Optional) Displays that Etherchannel is created
automatically.
detail
(Optional) Displays detailed EtherChannel information.
load-balance
(Optional) Displays the load-balance or frame-distribution
scheme among ports in the port channel.
port
(Optional) Displays EtherChannel port information.
port-channel
(Optional) Displays port-channel information.
protocol
(Optional) Displays the protocol that is being used in the
channel.
summary
(Optional) Displays a one-line summary per channel group.
Command Default
None
Command Modes
User EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
If you do not specify a channel group number, all channel groups are displayed.
In the output, the passive port list field is displayed only for Layer 3 port channels. This field means that the
physical port, which is still not up, is configured to be in the channel group (and indirectly is in the only port
channel in the channel group).
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
381
show etherchannel
Examples
This is an example of output from the show etherchannel auto command:
switch# show etherchannel auto
Flags: D - down
P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3
S - Layer2
U - in use
f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
d - default port
A - formed by Auto LAG
Number of channel-groups in use: 1
Number of aggregators:
1
Group Port-channel Protocol
Ports
------+-------------+-----------+----------------------------------------------1
Po1(SUA)
LACP
Gi1/0/45(P) Gi2/0/21(P) Gi3/0/21(P)
This is an example of output from the show etherchannel channel-group-number detail command:
Switch> show etherchannel 1 detail
Group state = L2
Ports: 2
Maxports = 16
Port-channels: 1 Max Port-channels = 16
Protocol:
LACP
Ports in the group:
------------------Port: Gi1/0/1
-----------Port state
= Up Mstr In-Bndl
Channel group = 1
Mode = Active
Port-channel =
Po1GC = Port index
=
0Load = 0x00
Flags: S - Device is sending Slow LACPDUs
A - Device is in active mode.
Gcchange = Pseudo port-channel = Po1
Protocol = LACP
F - Device is sending fast LACPDU
P - Device is in passive mode.
Local information:
Port
Gi1/0/1
Gi1/0/2
Flags
SA
A
State
bndl
bndl
LACP port
Priority
32768
32768
Admin
Key
0x1
0x0
Oper
Key
0x1
0x1
Port
Port
Number State
0x101 0x3D
0x0
0x3D
Age of the port in the current state: 01d:20h:06m:04s
Port-channels in the group:
---------------------Port-channel: Po1
(Primary Aggregator)
Age of the Port-channel = 01d:20h:20m:26s
Logical slot/port = 10/1
Number of ports = 2
HotStandBy port
= null
Port state
= Port-channel Ag-Inuse
Protocol
= LACP
Ports in the Port-channel:
Index Load
Port
EC state
No of bits
------+------+------+------------------+----------0
00
Gi1/0/1
Active
0
0
00
Gi1/0/2
Active
0
Time since last port bundled:
01d:20h:24m:44s
Gi1/0/2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
382
show etherchannel
This is an example of output from the show etherchannel channel-group-number summary command:
Switch> show etherchannel 1 summary
Flags: D - down P - in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3 S - Layer2
u - unsuitable for bundling
U - in use f - failed to allocate aggregator
d - default port
Number of channel-groups in use: 1
Number of aggregators: 1
Group Port-channel Protocol
Ports
------+-------------+-----------+---------------------------------------1
Po1(SU)
LACP
Gi1/0/1(P) Gi1/0/2(P)
This is an example of output from the show etherchannel channel-group-number port-channel command:
Switch> show etherchannel 1 port-channel
Port-channels in the group:
---------------------Port-channel: Po1 (Primary Aggregator)
-----------Age of the Port-channel = 01d:20h:24m:50s
Logical slot/port = 10/1 Number of ports = 2
Logical slot/port = 10/1 Number of ports = 2
Port state = Port-channel Ag-Inuse
Protocol = LACP
Ports in the Port-channel:
Index Load
Port
EC state
No of bits
------+------+------+------------------+----------0
00
Gi1/0/1 Active
0
0
00
Gi1/0/2 Active
0
Time since last port bundled: 01d:20h:24m:44s Gi1/0/2
This is an example of output from show etherchannel protocol command:
Switch# show etherchannel protocol
Channel-group listing:
----------------------Group: 1
---------Protocol: LACP
Group: 2
---------Protocol: PAgP
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
383
show lacp
show lacp
To display Link Aggregation Control Protocol (LACP) channel-group information, use the show lacp command
in user EXEC mode.
show lacp [channel-group-number] {counters| internal| neighbor| sys-id}
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Displays traffic information.
internal
Displays internal information.
neighbor
Displays neighbor information.
sys-id
Displays the system identifier that is being used by LACP. The system
identifier consists of the LACP system priority and the switch MAC
address.
Command Default
None
Command Modes
User EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You can enter any show lacp command to display the active channel-group information. To display specific
channel information, enter the show lacp command with a channel-group number.
If you do not specify a channel group, information for all channel groups appears.
You can enter the channel-group-number to specify a channel group for all keywords except sys-id.
Examples
This is an example of output from the show lacp counters user EXEC command. The table that follows
describes the fields in the display.
Switch> show lacp counters
LACPDUs
Marker
Marker Response
LACPDUs
Port
Sent Recv
Sent Recv
Sent Recv
Pkts Err
--------------------------------------------------------------------Channel group:1
Gi2/0/1
19
10
0
0
0
0
0
Gi2/0/2
14
6
0
0
0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
384
show lacp
Table 17: show lacp counters Field Descriptions
Field
Description
LACPDUs Sent and Recv
The number of LACP packets sent and received by
a port.
Marker Sent and Recv
The number of LACP marker packets sent and
received by a port.
Marker Response Sent and Recv
The number of LACP marker response packets sent
and received by a port.
LACPDUs Pkts and Err
The number of unknown and illegal packets received
by LACP for a port.
This is an example of output from the show lacp internal command:
Switch> show lacp 1 internal
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting Fast LACPDUs
A - Device is in Active mode
P - Device is in Passive mode
Channel group 1
Port
Gi2/0/1
Gi2/0/2
Flags
SA
SA
State
bndl
bndl
LACP port
Priority
32768
32768
Admin
Key
0x3
0x3
Oper
Key
0x3
0x3
Port
Number
0x4
0x5
Port
State
0x3D
0x3D
The following table describes the fields in the display:
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
385
show lacp
Table 18: show lacp internal Field Descriptions
Field
Description
State
State of the specific port. These are the allowed
values:
• – —Port is in an unknown state.
• bndl—Port is attached to an aggregator and
bundled with other ports.
• susp—Port is in a suspended state; it is not
attached to any aggregator.
• hot-sby—Port is in a hot-standby state.
• indiv—Port is incapable of bundling with any
other port.
• indep—Port is in an independent state (not
bundled but able to handle data traffic. In this
case, LACP is not running on the partner port).
• down—Port is down.
LACP Port Priority
Port priority setting. LACP uses the port priority to
put ports in standby mode when there is a hardware
limitation that prevents all compatible ports from
aggregating.
Admin Key
Administrative key assigned to this port. LACP
automatically generates an administrative key value
as a hexadecimal number. The administrative key
defines the ability of a port to aggregate with other
ports. A port’s ability to aggregate with other ports is
determined by the port physical characteristics (for
example, data rate and duplex capability) and
configuration restrictions that you establish.
Oper Key
Runtime operational key that is being used by this
port. LACP automatically generates this value as a
hexadecimal number.
Port Number
Port number.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
386
show lacp
Field
Description
Port State
State variables for the port, encoded as individual bits
within a single octet with these meanings:
• bit0: LACP_Activity
• bit1: LACP_Timeout
• bit2: Aggregation
• bit3: Synchronization
• bit4: Collecting
• bit5: Distributing
• bit6: Defaulted
• bit7: Expired
Note
In the list above, bit7 is the MSB and bit0 is
the LSB.
This is an example of output from the show lacp neighbor command:
Switch> show lacp neighbor
Flags: S - Device is sending Slow LACPDUs
A - Device is in Active mode
F - Device is sending Fast LACPDUs
P - Device is in Passive mode
Channel group 3 neighbors
Partner’s information:
Port
Gi2/0/1
Partner
System ID
32768,0007.eb49.5e80
Partner
Port Number
0xC
Age
19s
Partner
Flags
SP
LACP Partner
Port Priority
32768
Partner
Oper Key
0x3
Partner
Port State
0x3C
Partner
System ID
32768,0007.eb49.5e80
Partner
Port Number
0xD
Age
15s
LACP Partner
Port Priority
32768
Partner
Oper Key
0x3
Partner
Port State
0x3C
Partner’s information:
Port
Gi2/0/2
Partner
Flags
SP
This is an example of output from the show lacp sys-id command:
Switch> show lacp sys-id
32765,0002.4b29.3a00
The system identification is made up of the system priority and the system MAC address. The first two bytes
are the system priority, and the last six bytes are the globally administered individual MAC address associated
to the system.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
387
show pagp
show pagp
To display Port Aggregation Protocol (PAgP) channel-group information, use the show pagp command in
EXEC mode.
show pagp [channel-group-number] {counters| dual-active| internal| neighbor}
Syntax Description
channel-group-number
(Optional) Channel group number. The range is 1 to 128.
counters
Displays traffic information.
dual-active
Displays the dual-active status.
internal
Displays internal information.
neighbor
Displays neighbor information.
Command Default
None
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can enter any show pagp command to display the active channel-group information. To display the
nonactive information, enter the show pagp command with a channel-group number.
Examples
This is an example of output from the show pagp 1 counters command:
Switch> show pagp 1 counters
Information
Flush
Port
Sent
Recv
Sent
Recv
---------------------------------------Channel group: 1
Gi1/0/1
45
42
0
0
Gi1/0/2
45
41
0
0
This is an example of output from the show pagp dual-active command:
Switch> show pagp dual-active
PAgP dual-active detection enabled: Yes
PAgP dual-active version: 1.1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
388
show pagp
Channel group 1
Dual-Active
Port
Detect Capable
Gi1/0/1
No
Gi1/0/2
No
Partner
Name
Switch
Switch
Partner
Port
Gi3/0/3
Gi3/0/4
Partner
Version
N/A
N/A
<output truncated>
This is an example of output from the show pagp 1 internal command:
Switch> show pagp 1 internal
Flags: S - Device is sending Slow hello.
A - Device is in Auto mode.
Timers: H - Hello timer is running.
S - Switching timer is running.
C - Device is in Consistent state.
Q - Quit timer is running.
I - Interface timer is running.
Channel group 1
Port
Gi1/0/1
Gi1/0/2
Flags State
SC
U6/S7
SC
U6/S7
Timers
H
H
Hello
Interval
30s
30s
Partner PAgP
Count
Priority
1
128
1
128
Learning Group
Method Ifindex
Any
16
Any
16
This is an example of output from the show pagp 1 neighbor command:
Switch> show pagp 1 neighbor
Flags:
S - Device is sending Slow hello.
A - Device is in Auto mode.
Channel group 1 neighbors
Partner
Port
Name
Gi1/0/1
switch-p2
Gi1/0/2
switch-p2
C - Device is in Consistent state.
P - Device learns on physical port.
Partner
Device ID
0002.4b29.4600
0002.4b29.4600
Partner
Port
Gi01//1
Gi1/0/2
Partner
Age Flags
9s SC
24s SC
Group
Cap.
10001
10001
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
389
show platform etherchannel
show platform etherchannel
To display platform-dependent EtherChannel information, use the show platform etherchannel command
in privileged EXEC mode.
show platform etherchannel channel-group-number {group-mask| load-balance mac src-mac dst-mac [ip
src-ip dst-ip [port src-port dst-port]]} [switch switch-number]
Syntax Description
channel-group-number
Channel group number. The range is 1 to 128.
group-mask
Displays EtherChannel group mask.
load-balance
Tests EtherChannel load-balance hash algorithm.
mac src-mac dst-mac
Specifies the source and destination MAC addresses.
ip src-ip dst-ip
(Optional) Specifies the source and destination IP addresses.
port src-port dst-port
(Optional) Specifies the source and destination layer port numbers.
switch switch-number
(Optional) Specifies the stack member.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use this command only when you are working directly with a technical support representative while
troubleshooting a problem.
Do not use this command unless a technical support representative asks you to do so.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
390
show platform pm
show platform pm
To display platform-dependent port manager information, use the show platform pm command in privileged
EXEC mode.
show platform pm {etherchannel channel-group-number group-mask| interface-numbers| port-data
interface-id| port-state| spi-info| spi-req-q}
Syntax Description
etherchannel channel-group-number Displays the EtherChannel group-mask table for the specified
channel group. The range is 1 to 128.
group-mask
interface-numbers
Displays interface numbers information.
port-data interface-id
Displays port data information for the specified interface.
port-state
Displays port state information.
spi-info
Displays stateful packet inspection (SPI) information.
spi-req-q
Displays stateful packet inspection (SPI) maximum wait time for
acknowledgment.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use this command only when you are working directly with your technical support representative while
troubleshooting a problem.
Do not use this command unless your technical support representative asks you to do so.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
391
show udld
show udld
To display UniDirectional Link Detection (UDLD) administrative and operational status for all ports or the
specified port, use the show udld command in user EXEC mode.
show udld [Auto-Template | Capwap | GigabitEthernet | GroupVI | InternalInterface | Loopback | Null
| Port-channel | TenGigabitEthernet | Tunnel | Vlan] interface_number
show udld neighbors
Syntax Description
Auto-Template
(Optional) Displays UDLD operational status of the
auto-template interface. The range is from 1 to 999.
Capwap
(Optional) Displays UDLD operational status of the CAPWAP
interface. The range is from 0 to 2147483647.
GigabitEthernet
(Optional) Displays UDLD operational status of the
GigabitEthernet interface. The range is from 0 to 9.
GroupVI
(Optional) Displays UDLD operational status of the group virtual
interface. The range is from 1 to 255.
InternalInterface
(Optional) Displays UDLD operational status of the internal
interface. The range is from 0 to 9.
Loopback
(Optional) Displays UDLD operational status of the loopback
interface. The range is from 0 to 2147483647.
Null
(Optional) Displays UDLD operational status of the null
interface.
Port-channel
(Optional) Displays UDLD operational status of the Ethernet
channel interfaces. The range is from 1 to 128.
TenGigabitEthernet
(Optional) Displays UDLD operational status of the Ten Gigabit
Ethernet interface. The range is from 0 to 9.
Tunnel
(Optional) Displays UDLD operational status of the tunnel
interface. The range is from 0 to 2147483647.
Vlan
(Optional) Displays UDLD operational status of the VLAN
interface. The range is from 1 to 4095.
interface-id
(Optional) ID of the interface and port number. Valid interfaces
include physical ports, VLANs, and port channels.
neighbors
(Optional) Displays neighbor information only.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
392
show udld
Command Default
None
Command Modes
User EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If you do not enter an interface ID, administrative and operational UDLD status for all interfaces appear.
Examples
This is an example of output from the show udld interface-id command. For this display, UDLD is enabled
on both ends of the link, and UDLD detects that the link is bidirectional. The table that follows describes the
fields in this display.
Switch> show udld gigabitethernet2/0/1
Interface gi2/0/1
--Port enable administrative configuration setting: Follows device default
Port enable operational state: Enabled
Current bidirectional state: Bidirectional
Current operational state: Advertisement - Single Neighbor detected
Message interval: 60
Time out interval: 5
Entry 1
Expiration time: 146
Device ID: 1
Current neighbor state: Bidirectional
Device name: Switch-A
Port ID: Gi2/0/1
Neighbor echo 1 device: Switch-B
Neighbor echo 1 port: Gi2/0/2
Message interval: 5
CDP Device name: Switch-A
Table 19: show udld Field Descriptions
Field
Description
Interface
The interface on the local device configured for
UDLD.
Port enable administrative configuration setting
How UDLD is configured on the port. If UDLD is
enabled or disabled, the port enable configuration
setting is the same as the operational enable state.
Otherwise, the enable operational setting depends on
the global enable setting.
Port enable operational state
Operational state that shows whether UDLD is
actually running on this port.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
393
show udld
Field
Description
Current bidirectional state
The bidirectional state of the link. An unknown state
appears if the link is down or if it is connected to an
UDLD-incapable device. A bidirectional state appears
if the link is a normal two-way connection to a
UDLD-capable device. All other values mean
miswiring.
Current operational state
The current phase of the UDLD state machine. For a
normal bidirectional link, the state machine is most
often in the Advertisement phase.
Message interval
How often advertisement messages are sent from the
local device. Measured in seconds.
Time out interval
The time period, in seconds, that UDLD waits for
echoes from a neighbor device during the detection
window.
Entry 1
Information from the first cache entry, which contains
a copy of echo information received from the
neighbor.
Expiration time
The amount of time in seconds remaining before this
cache entry is aged out.
Device ID
The neighbor device identification.
Current neighbor state
The neighbor’s current state. If both the local and
neighbor devices are running UDLD normally, the
neighbor state and local state should be bidirectional.
If the link is down or the neighbor is not
UDLD-capable, no cache entries appear.
Device name
The device name or the system serial number of the
neighbor. The system serial number appears if the
device name is not set or is set to the default (Switch).
Port ID
The neighbor port ID enabled for UDLD.
Neighbor echo 1 device
The device name of the neighbors’ neighbor from
which the echo originated.
Neighbor echo 1 port
The port number ID of the neighbor from which the
echo originated.
Message interval
The rate, in seconds, at which the neighbor is sending
advertisement messages.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
394
show udld
Field
Description
CDP device name
The CDP device name or the system serial number.
The system serial number appears if the device name
is not set or is set to the default (Switch).
This is an example of output from the show udld neighbors command:
Switch# show udld neighbors
Port
Device Name
-------- -------------------Gi2/0/1 Switch-A
Gi3/0/1 Switch-A
Device ID
---------1
2
Port-ID
-------Gi2/0/1
Gi3/0/1
OperState
-------------Bidirectional
Bidirectional
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
395
switchport
switchport
To put an interface that is in Layer 3 mode into Layer 2 mode for Layer 2 configuration, use the switchport
command in interface configuration mode. To put an interface in Layer 3 mode, use the no form of this
command.
switchport
no switchport
Syntax Description
This command has no arguments or keywords.
Command Default
By default, all interfaces are in Layer 2 mode.
Command Modes
Interface configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Use the no switchport command (without parameters) to set the interface to the routed-interface status and
to erase all Layer 2 configurations. You must use this command before assigning an IP address to a routed
port.
This command is not supported on switches running the LAN Base feature set.
Entering the no switchport command shuts the port down and then reenables it, which might generate messages
on the device to which the port is connected.
When you put an interface that is in Layer 2 mode into Layer 3 mode (or the reverse), the previous configuration
information related to the affected interface might be lost, and the interface is returned to its default
configuration.
Note
If an interface is configured as a Layer 3 interface, you must first enter the switchport command to
configure the interface as a Layer 2 port. Then you can enter the switchport access vlan and switchport
mode commands.
The switchport command is not used on platforms that do not support Cisco-routed ports. All physical ports
on such platforms are assumed to be Layer 2-switched interfaces.
You can verify the port status of an interface by entering the show running-config privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
396
switchport
Examples
This example shows how to cause an interface to cease operating as a Layer 2 port and become a Cisco-routed
port:
Switch(config-if)# no switchport
This example shows how to cause the port interface to cease operating as a Cisco-routed port and convert to
a Layer 2 switched interface:
Switch(config-if)# switchport
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
397
switchport access vlan
switchport access vlan
To configure a port as a static-access port, use the switchport access vlan command in interface configuration
mode. To reset the access mode to the default VLAN mode for the switch, use the no form of this command.
switchport access vlan {vlan-id | name vlan_name}
no switchport access vlan
Syntax Description
vlan-id
VLAN ID of the access mode VLAN; the range is 1 to 4094.
Command Default
The default access VLAN and trunk interface native VLAN is a default VLAN corresponding to the platform
or interface hardware.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE Denali 16.2.1
The name vlan_name keyword was introduced.
The port must be in access mode before the switchport access vlan command can take effect.
If the switchport mode is set to access vlan vlan-id, the port operates as a member of the specified VLAN.
An access port can be assigned to only one VLAN.
The no switchport access command resets the access mode VLAN to the appropriate default VLAN for the
device.
Examples
This example shows how to change a switched port interface that is operating in access mode to operate in
VLAN 2 instead of the default VLAN:
Switch(config-if)# switchport access vlan 2
Examples
This example show how to first populate the VLAN database by associating a VLAN ID with a VLAN name,
and then configure the VLAN (using the name) on an interface, in the access mode: You can also verify your
configuration by entering the show interfaces interface-id switchport in privileged EXEC command and
examining information in the Access Mode VLAN: row.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
398
switchport access vlan
Part 1 - Making the entry in the VLAN database:
Switch# configure terminal
Switch(config)# vlan 33
Switch(config-vlan)# name test
Switch(config-vlan)# end
Switch#
Part 2 - Checking the VLAN database
Switch # show vlan id 33
VLAN Name
Status
Ports
---- -------------------------------- --------- ------------------------------33
test
active
VLAN Type SAID
MTU
Parent RingNo BridgeNo Stp BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ -----33
enet 100033
1500
0
0
Remote SPAN VLAN
---------------Disabled
Primary Secondary Type
Ports
------- --------- -------------- ------------------------------------------
Part 3 - Assigning VLAN to the interface by using the name of the VLAN
Switch # configure terminal
Switch(config)# interface GigabitEthernet3/1/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport access vlan name test
Switch(config-if)# end
Switch#
Part 4 - Verifying configuration
Switch # show running-config interface GigabitEthernet3/1/1
Building configuration...
Current configuration : 113 bytes
!
interface GigabitEthernet3/1/1
switchport access vlan 33
switchport mode access
Switch#
Part 5 - Verifying interface switchport
Switch # show interface GigabitEthernet3/1/1 switchport
Name: Gi3/1/1
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Access Mode VLAN: 33 (test)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Voice VLAN: None
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
399
switchport access vlan
Appliance trust: none
Switch#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
400
switchport mode
switchport mode
To configure the VLAN membership mode of a port, use the switchport mode command in interface
configuration mode. To reset the mode to the appropriate default for the device, use the no form of this
command.
switchport mode {access| dynamic | {auto| desirable}| trunk}
noswitchport mode {access| dynamic | {auto| desirable}| trunk}
Syntax Description
access
Sets the port to access mode (either static-access or dynamic-access depending on the
setting of the switchport access vlan interface configuration command). The port is
set to access unconditionally and operates as a nontrunking, single VLAN interface that
sends and receives nonencapsulated (non-tagged) frames. An access port can be assigned
to only one VLAN.
dynamic auto
Sets the port trunking mode dynamic parameter to auto to specify that the interface
convert the link to a trunk link. This is the default switchport mode.
dynamic desirable Sets the port trunking mode dynamic parameter to desirable to specify that the interface
actively attempt to convert the link to a trunk link.
trunk
Sets the port to trunk unconditionally. The port is a trunking VLAN Layer 2 interface.
The port sends and receives encapsulated (tagged) frames that identify the VLAN of
origination. A trunk is a point-to-point link between two switches or between a switch
and a router.
Command Default
The default mode is dynamic auto.
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Note
Although visible in the CLI, the dot1q-tunnel keyword is not supported.
A configuration that uses the access,or trunk keywords takes effect only when you configure the port in the
appropriate mode by using the switchport mode command. The static-access and trunk configuration are
saved, but only one configuration is active at a time.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
401
switchport mode
When you enter access mode, the interface changes to permanent nontrunking mode and negotiates to convert
the link into a nontrunk link even if the neighboring interface does not agree to the change.
When you enter trunk mode, the interface changes to permanent trunking mode and negotiates to convert
the link into a trunk link even if the interface connecting to it does not agree to the change.
When you enter dynamic auto mode, the interface converts the link to a trunk link if the neighboring interface
is set to trunk or desirable mode.
When you enter dynamic desirable mode, the interface becomes a trunk interface if the neighboring interface
is set to trunk, desirable, or auto mode.
To autonegotiate trunking, the interfaces must be in the same VLAN Trunking Protocol (VTP) domain. Trunk
negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a point-to-point protocol. However,
some internetworking devices might forward DTP frames improperly, which could cause misconfigurations.
To avoid this problem, configure interfaces connected to devices that do not support DTP to not forward DTP
frames, which turns off DTP.
• If you do not intend to trunk across those links, use the switchport mode access interface configuration
command to disable trunking.
• To enable trunking to a device that does not support DTP, use the switchport mode trunk and switchport
nonegotiate interface configuration commands to cause the interface to become a trunk but to not
generate DTP frames.
Access ports and trunk ports are mutually exclusive.
The IEEE 802.1x feature interacts with switchport modes in these ways:
• If you try to enable IEEE 802.1x on a trunk port, an error message appears, and IEEE 802.1x is not
enabled. If you try to change the mode of an IEEE 802.1x-enabled port to trunk, the port mode is not
changed.
• If you try to enable IEEE 802.1x on a port set to dynamic auto or dynamic desirable, an error message
appears, and IEEE 802.1x is not enabled. If you try to change the mode of an IEEE 802.1x-enabled port
to dynamic auto or dynamic desirable, the port mode is not changed.
• If you try to enable IEEE 802.1x on a dynamic-access (VLAN Query Protocol [VQP]) port, an error
message appears, and IEEE 802.1x is not enabled. If you try to change an IEEE 802.1x-enabled port to
dynamic VLAN assignment, an error message appears, and the VLAN configuration is not changed.
You can verify your settings by entering the show interfaces interface-id switchport privileged EXEC
command and examining information in the Administrative Mode and Operational Mode rows.
Examples
This example shows how to configure a port for access mode:
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# switchport mode access
This example shows how set the port to dynamic desirable mode:
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# switchport mode dynamic desirable
This example shows how to configure a port for trunk mode:
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# switchport mode trunk
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
402
switchport nonegotiate
switchport nonegotiate
To specify that Dynamic Trunking Protocol (DTP) negotiation packets are not sent on the Layer 2 interface,
use the switchport nonegotiate command in interface configuration mode. Use the no form of this command
to return to the default setting.
switchport nonegotiate
no switchport nonegotiate
Syntax Description
This command has no arguments or keywords.
Command Default
The default is to use DTP negotiation to learn the trunking status.
Command Modes
Interface configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The no switchport nonegotiate command removes nonegotiate status.
This command is valid only when the interface switchport mode is access or trunk (configured by using the
switchport mode access or the switchport mode trunk interface configuration command). This command
returns an error if you attempt to execute it in dynamic (auto or desirable) mode.
Internetworking devices that do not support DTP might forward DTP frames improperly and cause
misconfigurations. To avoid this problem, turn off DTP by using the switchport nonegotiate command to
configure the interfaces connected to devices that do not support DTP to not forward DTP frames.
When you enter the switchport nonegotiate command, DTP negotiation packets are not sent on the interface.
The device does or does not trunk according to the mode parameter: access or trunk.
• If you do not intend to trunk across those links, use the switchport mode access interface configuration
command to disable trunking.
• To enable trunking on a device that does not support DTP, use the switchport mode trunk and switchport
nonegotiate interface configuration commands to cause the interface to become a trunk but to not
generate DTP frames.
Examples
This example shows how to cause a port to refrain from negotiating trunking mode and to act as a trunk or
access port (depending on the mode set):
Switch(config)# interface gigabitethernet2/0/1
Switch(config-if)# switchport nonegotiate
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
403
switchport nonegotiate
You can verify your setting by entering the show interfaces interface-id switchport privileged EXEC
command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
404
udld
udld
To enable aggressive or normal mode in the UniDirectional Link Detection (UDLD) and to set the configurable
message timer time, use the udld command in global configuration mode. To disable aggressive or normal
mode UDLD on all fiber-optic ports, use the no form of the command.
udld {aggressive| enable| message time message-timer-interval}
no udld {aggressive| enable| message}
Syntax Description
Command Default
aggressive
Enables UDLD in aggressive mode on all fiber-optic interfaces.
enable
Enables UDLD in normal mode on all fiber-optic interfaces.
message time
message-timer-interval
Configures the period of time between UDLD probe messages on ports that
are in the advertisement phase and are determined to be bidirectional. The
range is 1 to 90 seconds. The default is 15 seconds.
UDLD is disabled on all interfaces.
The message timer is set at 15 seconds.
Command Modes
Command History
Usage Guidelines
Global configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD detects
unidirectional links due to misconnected interfaces on fiber-optic connections. In aggressive mode, UDLD
also detects unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and due to
misconnected interfaces on fiber-optic links. For information about normal and aggressive modes, see the
Catalyst 2960-X Switch Layer 2 Configuration GuideCatalyst 2960-XR Switch Layer 2 Configuration
GuideLayer 2/3 Configuration Guide (Catalyst 3650 Switches).
If you change the message time between probe packets, you are making a compromise between the detection
speed and the CPU load. By decreasing the time, you can make the detection-response faster but increase the
load on the CPU.
This command affects fiber-optic interfaces only. Use the udld interface configuration command to enable
UDLD on other interface types.
You can use these commands to reset an interface shut down by UDLD:
• The udld reset privileged EXEC command to reset all interfaces shut down by UDLD.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
405
udld
• The shutdown and no shutdown interface configuration commands.
• The no udld enable global configuration command followed by the udld {aggressive | enable} global
configuration command to reenable UDLD globally.
• The no udld port interface configuration command followed by the udld port or udld port aggressive
interface configuration command to reenable UDLD on the specified interface.
• The errdisable recovery cause udld and errdisable recovery interval interval global configuration
commands to automatically recover from the UDLD error-disabled state.
Examples
This example shows how to enable UDLD on all fiber-optic interfaces:
Switch(config)# udld enable
You can verify your setting by entering the show udld privileged EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
406
udld port
udld port
To enable UniDirectional Link Detection (UDLD) on an individual interface or to prevent a fiber-optic interface
from being enabled by the udld global configuration command, use the udld port command in interface
configuration mode. To return to the udld global configuration command setting or to disable UDLD if entered
for a nonfiber-optic port, use the no form of this command.
udld port [aggressive]
no udld port [aggressive]
Syntax Description
Command Default
aggressive
(Optional) Enables UDLD in aggressive mode on the specified interface.
On fiber-optic interfaces, UDLD is disabled and fiber-optic interfaces enable UDLD according to the state of
the udld enable or udld aggressive global configuration command.
On nonfiber-optic interfaces, UDLD is disabled.
Command Modes
Command History
Usage Guidelines
Interface configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
A UDLD-capable port cannot detect a unidirectional link if it is connected to a UDLD-incapable port of
another switch.
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD detects
unidirectional links due to misconnected interfaces on fiber-optic connections. In aggressive mode, UDLD
also detects unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and due to
misconnected interfaces on fiber-optic links.
To enable UDLD in normal mode, use the udld port interface configuration command. To enable UDLD in
aggressive mode, use the udld port aggressive interface configuration command.
Use the no udld port command on fiber-optic ports to return control of UDLD to the udld enable global
configuration command or to disable UDLD on nonfiber-optic ports.
Use the udld port aggressive command on fiber-optic ports to override the setting of the udld enable or udld
aggressive global configuration command. Use the no form on fiber-optic ports to remove this setting and to
return control of UDLD enabling to the udld global configuration command or to disable UDLD on
nonfiber-optic ports.
You can use these commands to reset an interface shut down by UDLD:
• The udld reset privileged EXEC command resets all interfaces shut down by UDLD.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
407
udld port
• The shutdown and no shutdown interface configuration commands.
• The no udld enable global configuration command, followed by the udld {aggressive | enable} global
configuration command reenables UDLD globally.
• The no udld port interface configuration command, followed by the udld port or udld port aggressive
interface configuration command reenables UDLD on the specified interface.
• The errdisable recovery cause udld and errdisable recovery interval interval global configuration
commands automatically recover from the UDLD error-disabled state.
Examples
This example shows how to enable UDLD on an port:
Switch(config)# interface gigabitethernet6/0/1
Switch(config-if)# udld port
This example shows how to disable UDLD on a fiber-optic interface despite the setting of the udld global
configuration command:
Switch(config)# interface gigabitethernet6/0/1
Switch(config-if)# no udld port
You can verify your settings by entering the show running-config or the show udld interface privileged
EXEC command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
408
udld reset
udld reset
To reset all interfaces disabled by UniDirectional Link Detection (UDLD) and permit traffic to begin passing
through them again (though other features, such as spanning tree, Port Aggregation Protocol (PAgP), and
Dynamic Trunking Protocol (DTP) still have their normal effects, if enabled), use the udld reset command
in privileged EXEC mode.
udld reset
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If the interface configuration is still enabled for UDLD, these ports begin to run UDLD again and are disabled
for the same reason if the problem has not been corrected.
Examples
This example shows how to reset all interfaces disabled by UDLD:
Switch# udld reset
1 ports shutdown by UDLD were reset.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
409
udld reset
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
410
PART
VI
Lightweight Access Point
• Cisco Lightweight Access Point Commands, page 413
Cisco Lightweight Access Point Commands
• ap auth-list ap-policy, page 420
• ap bridging, page 421
• ap capwap multicast, page 422
• ap capwap retransmit, page 423
• ap capwap timers, page 424
• ap cdp, page 426
• ap core-dump, page 428
• ap country, page 429
• ap crash-file, page 430
• ap dot11 24ghz preamble, page 431
• ap dot11 24ghz dot11g, page 432
• ap dot11 5ghz channelswitch mode, page 433
• ap dot11 5ghz power-constraint, page 434
• ap dot11 beaconperiod, page 435
• ap dot11 beamforming, page 436
• ap dot11 cac media-stream, page 438
• ap dot11 cac multimedia, page 441
• ap dot11 cac video, page 443
• ap dot11 cac voice, page 445
• ap dot11 cleanair, page 448
• ap dot11 cleanair alarm air-quality, page 449
• ap dot11 cleanair alarm device, page 450
• ap dot11 cleanair device, page 452
• ap dot11 dot11n, page 454
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
413
• ap dot11 dtpc, page 457
• ap dot11 edca-parameters, page 459
• ap dot11 rrm group-mode, page 461
• ap dot11 rrm channel cleanair-event, page 462
• ap dot11 l2roam rf-params, page 463
• ap dot11 media-stream, page 465
• ap dot11 rrm ccx location-measurement, page 467
• ap dot11 rrm channel dca, page 468
• ap dot11 rrm group-member, page 470
• ap dot11 rrm logging, page 471
• ap dot11 rrm monitor, page 473
• ap dot11 rrm ndp-type, page 475
• ap dot11 5ghz dot11ac frame-burst, page 476
• ap dot1x max-sessions, page 477
• ap dot1x username, page 478
• ap ethernet duplex, page 479
• ap group, page 480
• ap image, page 481
• ap ipv6 tcp adjust-mss, page 482
• ap led, page 483
• ap link-encryption, page 484
• ap link-latency, page 485
• ap mgmtuser username, page 486
• ap name ap-groupname, page 488
• ap name antenna band mode, page 489
• ap name bhrate, page 490
• ap name bridgegroupname, page 491
• ap name bridging, page 492
• ap name cdp interface, page 493
• ap name console-redirect, page 494
• ap name capwap retransmit, page 495
• ap name command, page 496
• ap name core-dump, page 497
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
414
• ap name country, page 498
• ap name crash-file, page 499
• ap name dot11 24ghz rrm coverage, page 500
• ap name dot11 49ghz rrm profile, page 502
• ap name dot11 5ghz rrm channel, page 504
• ap name dot11 antenna, page 505
• ap name dot11 antenna extantgain, page 507
• ap name dot11 cleanair, page 508
• ap name dot11 dot11n antenna, page 509
• ap name dot11 dual-band cleanair, page 510
• ap name dot11 dual-band shutdown, page 511
• ap name dot11 rrm ccx, page 512
• ap name dot11 rrm profile, page 513
• ap name dot11 txpower, page 515
• ap name dot1x-user, page 516
• ap name ethernet, page 518
• ap name ethernet duplex, page 519
• ap name key-zeroize , page 520
• ap name image, page 521
• ap name ipv6 tcp adjust-mss, page 522
• ap name jumbo mtu, page 523
• ap name lan, page 524
• ap name led, page 525
• ap name link-encryption, page 526
• ap name link-latency, page 527
• ap name location, page 528
• ap name mgmtuser, page 529
• ap name mode, page 531
• ap name monitor-mode, page 533
• ap name monitor-mode dot11b, page 534
• ap name name, page 535
• ap name no dot11 shutdown, page 536
• ap name power, page 537
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
415
• ap name shutdown, page 538
• ap name slot shutdown, page 539
• ap name sniff, page 540
• ap name ssh, page 541
• ap name telnet, page 542
• ap name power injector, page 543
• ap name power pre-standard, page 544
• ap name reset-button, page 545
• ap name reset, page 546
• ap name slot, page 547
• ap name static-ip, page 549
• ap name stats-timer, page 551
• ap name syslog host, page 552
• ap name syslog level, page 553
• ap name tcp-adjust-mss, page 554
• ap name tftp-downgrade, page 555
• ap power injector, page 556
• ap power pre-standard, page 557
• ap reporting-period, page 558
• ap reset-button, page 559
• service-policy type control subscriber, page 560
• ap static-ip, page 561
• ap syslog, page 562
• ap name no controller , page 564
• ap tcp-adjust-mss size, page 565
• ap tftp-downgrade, page 566
• config wireless wps rogue client mse, page 567
• clear ap name tsm dot11 all, page 568
• clear ap config, page 569
• clear ap eventlog-all, page 570
• clear ap join statistics, page 571
• clear ap mac-address, page 572
• clear ap name wlan statistics, page 573
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
416
• debug ap mac-address, page 574
• show ap cac voice, page 575
• show ap capwap, page 577
• show ap cdp, page 579
• show ap config dot11, page 580
• show ap config dot11 dual-band summary, page 581
• show ap config fnf, page 582
• show ap config, page 583
• show ap crash-file, page 584
• show ap data-plane, page 585
• show ap dot11 l2roam, page 586
• show ap dot11 cleanair air-quality, page 587
• show ap dot11 cleanair config, page 588
• show ap dot11 cleanair summary, page 590
• show ap dot11, page 591
• show ap env summary, page 596
• show ap ethernet statistics, page 597
• show ap gps-location summary, page 598
• show ap groups, page 599
• show ap groups extended, page 600
• show ap image, page 601
• show ap is-supported, page 602
• show ap join stats summary, page 603
• show ap link-encryption, page 604
• show ap mac-address, page 605
• show ap monitor-mode summary, page 607
• show ap name auto-rf, page 608
• show ap name bhmode, page 611
• show ap name bhrate, page 612
• show ap name cac voice, page 613
• show ap name config fnf, page 614
• show ap name dot11 call-control, page 615
• show ap name cable-modem, page 616
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
417
• show ap name capwap retransmit, page 617
• show ap name ccx rm, page 618
• show ap name cdp, page 619
• show ap name channel, page 620
• show ap name config, page 621
• show ap name config dot11, page 623
• show ap name config slot, page 627
• show ap name core-dump, page 631
• show ap name data-plane, page 632
• show ap name dot11, page 633
• show ap name dot11 cleanair, page 636
• show ap name env, page 637
• show ap name ethernet statistics, page 638
• show ap name eventlog, page 639
• show ap gps-location summary, page 640
• show ap name image, page 641
• show ap name inventory, page 642
• show ap name lan port, page 643
• show ap name link-encryption, page 644
• show ap name service-policy, page 645
• show ap name tcp-adjust-mss, page 646
• show ap name wlan, page 647
• show ap name wlandot11 service policy, page 649
• show ap slots, page 650
• show ap summary, page 651
• show ap tcp-adjust-mss, page 652
• show ap universal summary, page 653
• show ap uptime, page 654
• show wireless ap summary, page 655
• show wireless client ap, page 656
• test ap name, page 657
• test capwap ap name, page 658
• trapflags ap, page 659
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
418
• wireless wps rogue ap rldp alarm-only, page 660
• wireless wps rogue ap rldp auto-contain, page 661
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
419
ap auth-list ap-policy
ap auth-list ap-policy
To configure authorization policy for all Cisco lightweight access points joined to the switch, use the ap
auth-list ap-policy command. To disable authorization policy for all Cisco lightweight access points joined
to the switch, use the no form of this command.
ap auth-list ap-policy {authorize-ap| lsc| mic| ssc}
no ap auth-list ap-policy {authorize-ap| lsc| mic| ssc}
Syntax Description
authorize-ap
Enables the authorization policy.
lsc
Enables access points with locally significant certificates to connect.
mic
Enables access points with manufacture-installed certificates to connect.
ssc
Enables access points with self signed certificates to connect.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the access point authorization policy:
Switch(config)# ap auth-list ap-policy authorize-ap
This example shows how to enable access points with locally significant certificates to connect:
Switch(config)# ap auth-list ap-policy lsc
This example shows how to enable access points with manufacture-installed certificates to connect:
Switch(config)# ap auth-list ap-policy mic
This example shows how to enable access points with self-signed certificates to connect:
Switch(config)# ap auth-list ap-policy ssc
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
420
ap bridging
ap bridging
To enable Ethernet to 802.11 bridging on a Cisco lightweight access point, use the ap bridging command.
To disable Ethernet to 802.11 bridging on a Cisco lightweight access point, use the no form of this command.
ap bridging
no ap bridging
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable Ethernet-to-Ethernet bridging on a lightweight access point:
Switch(config)# ap bridging
This example shows how to disable Ethernet-to-Ethernet bridging on a lightweight access point:
Switch(config)# no ap bridging
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
421
ap capwap multicast
ap capwap multicast
To configure the multicast address used by all access points to receive multicast traffic when multicast
forwarding is enabled and to configure the outer Quality of Service (QoS) level of those multicast packets
sent to the access points, use the ap capwap multicast command.
ap capwap multicast {multicast-ip-address| service-policy output pollicymap-name}
Syntax Description
multicast-ip-address
Multicast IP address.
service-policy
Specifies the tunnel QoS policy for multicast access points.
output
Assigns a policy map name to the output.
policymap-name
Service policy map name.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a multicast address used by all access points to receive multicast traffic
when multicast forwarding is enabled:
Switch(config)# ap capwap multicast 239.2.2.2
This example shows how to configure a tunnel multicast QoS service policy for multicast access points:
Switch(config)# ap capwap multicast service-policy output tunnmulpolicy
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
422
ap capwap retransmit
ap capwap retransmit
To configure Control and Provisioning of Wireless Access Points (CAPWAP) control packet retransmit count
and control packet retransmit interval, use the ap capwap retransmit command.
ap capwap retransmit {count retransmit-count| interval retransmit-interval}
Syntax Description
count retransmit-count
Specifies the access point CAPWAP control packet retransmit count.
Note
interval retransmit-interval
Specifies the access point CAPWAP control packet retransmit interval.
Note
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
The count is from 3 to 8
seconds.
The interval is from 2 to 5
seconds.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the CAPWAP control packet retransmit count for an access point:
Switch# ap capwap retransmit count 3
This example shows how to configure the CAPWAP control packet retransmit interval for an access point:
Switch# ap capwap retransmit interval 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
423
ap capwap timers
ap capwap timers
To configure advanced timer settings, use the ap capwap timers command.
ap capwap timers {discovery-timeout seconds| fast-heartbeat-timeout local seconds| heartbeat-timeout
seconds| primary-discovery-timeout seconds| primed-join-timeout seconds}
Syntax Description
discovery-timeout
Specifies the Cisco lightweight access point discovery timeout.
Note
seconds
The Cisco lightweight access point discovery timeout is how long a
Cisco switch waits for an unresponsive access point to answer before
considering that the access point failed to respond.
Cisco lightweight access point discovery timeout from 1 to 10 seconds.
Note
The default is 10
seconds.
fast-heartbeat-timeout
local
Enables the fast heartbeat timer that reduces the amount of time it takes to
detect a switch failure for local or all access points.
seconds
Small heartbeat interval (from 1 to 10 seconds) that reduces the amount of time
it takes to detect a switch failure.
Note
heartbeat-timeout
The fast heartbeat time-out interval is disabled by
default.
Specifies the Cisco lightweight access point heartbeat timeout.
Note
The Cisco lightweight access point heartbeat timeout controls how
often the Cisco lightweight access point sends a heartbeat keep-alive
signal to the Cisco switch.
This value should be at least three times larger than the fast heartbeat
timer.
seconds
Cisco lightweight access point heartbeat timeout value from 1 to 30 seconds.
Note
The default is 30
seconds.
primary-discovery-timeout Specifies the access point primary discovery request timer. The timer determines
the amount of time taken by an access point to discovery the configured primary,
secondary, or tertiary switch.
seconds
Access point primary discovery request timer from 30 to 3600 seconds.
Note
primed-join-timeout
The default is 120
seconds.
Specifies the authentication timeout. Determines the time taken by an access
point to determine that the primary switch has become unresponsive. The access
point makes no further attempts to join the switch until the connection to the
switch is restored.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
424
ap capwap timers
seconds
Authentication response timeout from 120 to 43200 seconds.
Note
Command Default
None
Command Modes
Global configuration
Command History
Examples
The default is 120
seconds.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure an access point discovery timeout with the timeout value of 7:
Switch(config)# ap capwap timers discovery-timeout 7
This example shows how to enable the fast heartbeat interval for all access points:
Switch(config)# ap capwap timers fast-heartbeat-timeout 6
This example shows how to configure an access point heartbeat timeout to 20:
Switch(config)# ap capwap timers heartbeat-timeout 20
This example shows how to configure the access point primary discovery request timer to 1200 seconds:
Switch(config)# ap capwap timers primary-discovery-timeout 1200
This example shows how to configure the authentication timeout to 360 seconds:
Switch(config)# ap capwap timers primed-join-timeout 360
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
425
ap cdp
ap cdp
To enable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the ap cdp command.
To disable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the no form of this
command.
ap cdp [interface {ethernet ethernet-id| radio radio-id}]
no ap cdp [interface {ethernet ethernet-id| radio radio-id}]
Syntax Description
interface
(Optional) Specifies CDP in a specific interface.
ethernet
Specifies CDP for an Ethernet interface.
ethernet-id
Ethernet interface number from 0 to 3.
radio
Specifies CDP for a radio interface.
radio-id
Radio number from 0 to 3.
Command Default
Disabled on all access points.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The no ap cdp command disables CDP on all access points that are joined to the switch and all access points
that join in the future. CDP remains disabled on both current and future access points even after the switch
or access point reboots. To enable CDP, enter the ap cdp command.
CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all
access points joined to the switch, you can disable and then reenable CDP on individual access points
using the ap name Cisco-AP cdp command. After you disable CDP on all access points joined to the
switch, you can enable and then disable CDP on individual access points.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
426
ap cdp
Examples
This example shows how to enable CDP on all access points:
Switch(config)# ap cdp
This example shows how to enable CDP for Ethernet interface number 0 on all access points:
Switch(config)# ap cdp ethernet 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
427
ap core-dump
ap core-dump
To enable a Cisco lightweight access point’s memory core dump settings, use the ap core-dump command.
To disable a Cisco lightweight access point’s memory core dump settings, use the no form of this command.
ap core-dump tftp-ip-addr filename {compress| uncompress}
no ap core-dump
Syntax Description
tftp-ip-addr
IP address of the TFTP server to which the access point sends core dump
files.
filename
Name that the access point uses to label the core file.
compress
Compresses the core dump file.
uncompress
Uncompresses the core dump file.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The access point must be able to reach the TFTP server.
Examples
This example shows how to configure and compress the core dump file:
Switch(config)# ap core-dump 192.0.2.51 log compress
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
428
ap country
ap country
To configure one or more country codes for a switch, use the ap country command.
ap country country-code
Syntax Description
country-code
Two-letter or three-letter country code or several country codes separated
by a comma.
Command Default
US (country code of the United States of America).
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco switch must be installed by a network administrator or qualified IT professional and the installer
must select the proper country code. Following installation, access to the unit should be password protected
by the installer to maintain compliance with regulatory requirements and to ensure proper unit functionality.
See the related product guide for the most recent country codes and regulatory domains.
Examples
This example shows how to configure country codes on the switch to IN (India) and FR (France):
Switch(config)# ap country IN,FR
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
429
ap crash-file
ap crash-file
To delete crash and radio core dump files, use the ap crash-file command.
ap crash-file {clear-all| delete filename}
Syntax Description
clear-all
Deletes all the crash and radio core dump files.
delete
Deletes a single crash and radio core dump file.
filename
Name of the file to delete.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to delete all crash files:
Switch# ap crash-file clear-all
This example shows how to delete crash file 1:
Switch# ap crash-file delete crash-file-1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
430
ap dot11 24ghz preamble
ap dot11 24ghz preamble
To enable only a short preamble as defined in subclause 17.2.2.2 , use the ap dot11 24ghz preamble
command. To enable long preambles (for backward compatibility with pre-802.11b devices, if these devices
are still present in your network) or short preambles (recommended unless legacy pre-802.11b devices are
present in the network), use the no form of this command.
ap dot11 24ghz preamble short
no ap dot11 24ghz preamble short
Syntax Description
short
Command Default
short preambles
Command Modes
Global configuration
Command History
Specifies the short 802.11b preamble.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Note
You must reboot the Cisco switch (reset system) with the Save command before you can use the ap dot11
24ghz preamble command.
This parameter may need to be set to long to optimize this Cisco switch for some legacy clients, including
SpectraLink NetLink telephones.
This command can be used any time that the CLI interface is active.
Examples
This example shows how to enable both long and short preamblest:
Switch(config)# no ap dot11 24ghz preamble short
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
431
ap dot11 24ghz dot11g
ap dot11 24ghz dot11g
To enable the Cisco wireless LAN solution 802.11g network, use the ap dot11 24ghz dot11g command. To
disable the Cisco wireless LAN solution 802.11g network, use the no form of this command.
ap dot11 24ghz dot11g
no ap dot11 24ghz dot11g
Syntax Description
This command has no keywords and arguments.
Command Default
Enabled
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Before you enter the ap dot11 24ghz dot11g command, disable the 802.11 Cisco radio with the ap dot11
24ghz shutdown command.
After you configure the support for the 802.11g network, use the no ap dot11 24ghz shutdown command to
enable the 802.11 2.4 Ghz radio.
Examples
This example shows how to enable the 802.11g network:
Switch(config)# ap dot11 24ghz dot11g
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
432
ap dot11 5ghz channelswitch mode
ap dot11 5ghz channelswitch mode
To configure a 802.11h channel switch announcement, use the ap dot11 5ghz channelswitch mode command.
To disable a 802.11h channel switch announcement, use the no form of this command.
ap dot11 5ghz channelswitch mode value
no ap dot11 5ghz channelswitch mode
Syntax Description
value
802.11h channel announcement value.
Note
You can specify anyone of the following two values:
• 0—Indicates that the channel switch announcement is
disabled.
• 1—Indicates that the channel switch announcement is
enabled.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the 802.11h switch announcement:
Switch(config)# ap dot11 5ghz channelswitch mode 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
433
ap dot11 5ghz power-constraint
ap dot11 5ghz power-constraint
To configure the 802.11h power constraint value, use the ap dot11 5ghz power-constraint command. To
remove the 802.11h power constraint value, use the no form of this command.
ap dot11 5ghz power-constraint value
no ap dot11 5ghz power-constraint
Syntax Description
value
802.11h power constraint value.
Note
Command Default
None
Command Modes
Global configuration
Command History
Examples
The range is from 0 to 30
dBm.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the 802.11h power constraint to 5 dBm:
Switch(config)# ap dot11 5ghz power-constraint 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
434
ap dot11 beaconperiod
ap dot11 beaconperiod
To change the beacon period globally for 2.4 GHz or 5 GHz bands, use the ap dot11 beaconperiod command.
Note
Disable the 802.11 network before using this command. See the “Usage Guidelines” section.
ap dot11 {24ghz| 5ghz} beaconperiod time
Syntax Description
24ghz
Specifies the settings for 2.4 GHz band.
5ghz
Specifies the settings for 5 GHz band.
beaconperiod
Specifies the beacon for a network globally.
time
Beacon interval in time units (TU). One TU is 1024 microseconds. The range
is from 20 to 1000.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
In Cisco wireless LAN 802.11 networks, all Cisco lightweight access point wireless LANs broadcast a beacon
at regular intervals. This beacon notifies clients that the wireless service is available and allows the clients to
synchronize with the lightweight access point.
Before you change the beacon period, make sure that you have disabled the 802.11 network by using the ap
dot11 {24ghz | 5ghz} shutdown command. After changing the beacon period, enable the 802.11 network by
using the no ap dot11 {24ghz | 5ghz} shutdown command.
Examples
This example shows how to configure the 5 GHZ band for a beacon period of 120 time units:
Switch(config)# ap dot11 5ghz beaconperiod 120
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
435
ap dot11 beamforming
ap dot11 beamforming
To enable beamforming on the network or on individual radios, use the ap dot11 beamforming command.
ap dot11 {24ghz| 5ghz} beamforming
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
beamforming
Specifies beamforming on the network.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
When you enable beamforming on the network, it is automatically enabled for all the radios applicable to that
network type.
Follow these guidelines for using beamforming:
• Beamforming is supported for legacy orthogonal frequency-division multiplexing (OFDM) data rates
(6, 9, 12, 18, 24, 36, 48, and 54 Mbps).
Note
Beamforming is not supported for Direct Sequence Spread Spectrum data rates ( 1 and
2 Mbps) and Complementary-Code Key (CCK) data rates (5.5 and 11 Mbps).
• Beamforming is supported only on access points that support 802.11n (AP1260, AP3500, and AP3600).
• Two or more antennas must be enabled for transmission.
• All three antennas must be enabled for reception.
• OFDM rates must be enabled.
If the antenna configuration restricts operation to a single transmit antenna, or if OFDM rates are disabled,
beamforming is not used.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
436
ap dot11 beamforming
Examples
This example shows how to enable beamforming on the 5 GHz band:
Switch(config)# ap dot11 5ghz beamforming
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
437
ap dot11 cac media-stream
ap dot11 cac media-stream
To configure media stream Call Admission Control (CAC) voice and video quality parameters for 2.4 GHz
and 5 GHz bands, use the ap dot11 cac media-stream command.
ap dot11 {24ghz| 5ghz} cac media-stream multicast-direct {max-retry-percent retryPercent|
min-client-rate{eighteen| eleven| fiftyFour| fivePointFive| fortyEight| nine| oneFifty|
oneFortyFourPointFour| oneThirty| oneThirtyFive| seventyTwoPointTwo| six| sixtyFive| thirtySix|
threeHundred| twelve| twentyFour| two| twoSeventy}}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
multicast-direct
Specifies CAC parameters for multicast-direct media streams.
max-retry-percent
Specifies the percentage of maximum retries that are allowed for multicast-direct
media streams.
retryPercent
Percentage of maximum retries that are allowed for multicast-direct media streams.
Note
min-client-rate
The range is from 0 to
100.
Specifies the minimum transmission data rate to the client for multicast-direct
media streams (rate at which the client must transmit in order to receive
multicast-direct unicast streams).
If the transmission rate is below this rate, either the video will not start or the
client may be classified as a bad client. The bad client video can be demoted for
better effort QoS or subject to denial.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
438
ap dot11 cac media-stream
min-client-rate
You can choose the following rates:
• eighteen
• eleven
• fiftyFour
• fivePointFive
• fortyEight
• nine
• one
• oneFifty
• oneFortyFourPointFour
• oneThirty
• oneThirtyFive
• seventyTwoPointTwo
• six
• sixtyFive
• thirtySix
• threeHundred
• twelve
• twentyFour
• two
• twoSeventy
Command Default
The default value for the maximum retry percent is 80. If it exceeds 80, either the video will not start or the
client might be classified as a bad client. The bad client video will be demoted for better effort QoS or is
subject to denial.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
439
ap dot11 cac media-stream
Usage Guidelines
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.
Examples
This example shows how to configure the maximum retry percent for multicast-direct media streams as 90
on a 802.11a network:
Switch(config)# ap dot11 5ghz cac media-stream multicast max-retry-percent 90
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
440
ap dot11 cac multimedia
ap dot11 cac multimedia
To configure multimedia Call Admission Control (CAC) voice and video quality parameters for 2.4 GHz and
5 GHz bands, use the ap dot11 cac multimedia command.
ap dot11 {24ghz| 5ghz} cac multimedia max-bandwidth bandwidth
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
max-bandwidth
Specifies the percentage of maximum bandwidth allocated to Wi-Fi Multimedia
(WMM) clients for voice and video applications on the 2.4 GHz or 5 GHz band.
bandwidth
Percentage of the maximum bandwidth allocated to WMM clients for voice and
video applications on the 802.11a or 802.11b/g network. Once the client reaches
the specified value, the access point rejects new multimedia flows this radio band.
The range is from 5 to 85%.
Command Default
The default value is 75%.
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
441
ap dot11 cac multimedia
Examples
This example shows how to configure the percentage of the maximum bandwidth allocated to WMM clients
for voice and video applications on the 5 GHz band:
Switch(config)# ap dot11 5ghz cac multimedia max-bandwidth 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
442
ap dot11 cac video
ap dot11 cac video
To configure Call Admission Control (CAC) parameters for the video category, use the ap dot11 cac video
command. To disable the CAC parameters for video category, use the no form of this command.
ap dot11 {24ghz| 5ghz} cac video {acm| max-bandwidth value| roam-bandwidth value}
no ap dot11 {24ghz| 5ghz} cac video {acm| max-bandwidth value| roam-bandwidth value}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
acm
Enables bandwidth-based video CAC for the 2.4 GHz or 5 GHz band.
Note
max-bandwidth
Sets the percentage of the maximum bandwidth allocated to clients for video
applications on the 2.4 GHz or 5 GHz band.
value
Bandwidth percentage value from 5 to 85%.
roam-bandwidth
Sets the percentage of the CAC maximum allocated bandwidth reserved for
roaming video clients on the 2.4 GHz or 5 GHz band.
value
Bandwidth percentage value from 0 to 85%.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
To disable bandwidth-based video CAC for the 2.4 GHz or 5 GHz
band, use the no ap dot11 {24ghz | 5ghz} cac video acm command.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
443
ap dot11 cac video
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm command.
Examples
This example shows how to enable the bandwidth-based CAC:
Switch(config)# ap dot11 24ghz cac video acm
This example shows how to specify the percentage of the maximum allocated bandwidth for video applications
on the selected radio band:
Switch(config)# ap dot11 24ghz cac video max-bandwidth 50
This example shows how to configure the percentage of the maximum allocated bandwidth reserved for
roaming video clients on the selected radio band:
Switch(config)# ap dot11 24ghz cac video roam-bandwidth 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
444
ap dot11 cac voice
ap dot11 cac voice
To configure Call Admission Control (CAC) parameters for the voice category, use the ap dot11 cac voice
command.
ap dot11 {24ghz| 5ghz} cac voice{acm| load-based| max-bandwidth value| roam-bandwidth value| sip
[bandwidth bw] sample-interval value| stream-size x max-streams y| tspec-inactivity-timeout{enable|
ignore}}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
acm
Enables bandwidth-based voice CAC for the 2.4 GHz
or 5 GHz band.
Note
load-based
To disable bandwidth-based voice CAC for
the 2.4 GHz or 5 GHz band, use the no ap
dot11 {24ghz | 5ghz} cac voice acm
command.
Enable load-based CAC on voice access category.
Note
To disable load-based CAC on voice access
category for the 2.4 GHz or 5 GHz band, use
the no ap dot11 {24ghz | 5ghz} cac voice
load-based command.
max-bandwidth
Sets the percentage of the maximum bandwidth
allocated to clients for voice applications on the 2.4
GHz or 5 GHz band.
value
Bandwidth percentage value from 5 to 85%.
roam-bandwidth
Sets the percentage of the CAC maximum allocated
bandwidth reserved for roaming voice clients on the
2.4 GHz or 5 GHz band.
value
Bandwidth percentage value from 0 to 85%.
sip
Specifies the CAC codec name and sample interval as
parameters and calculates the required bandwidth per
call for the 802.11 networks.
bandwidth
(Optional) Specifies bandwidth for a SIP-based call.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
445
ap dot11 cac voice
bw
Bandwidth in kbps. The following bandwidth values
specify parameters for the SIP codecs:
• 64kbps—Specifies CAC parameters for the SIP
G711 codec.
• 8kbps—Specifies CAC parameters for the SIP
G729 codec.
Note
sample-interval
Specifies the packetization interval for SIP codec.
value
Packetization interval in msecs. The sample interval
for SIP codec value is 20 seconds.
stream-size
Specifies the number of aggregated voice Wi-Fi
Multimedia (WMM) traffic specification (TSPEC)
streams at a specified data rate for the 2.4 GHz or 5
GHz band.
x
Stream size. The range of the stream size is from 84000
to 92100.
max-streams
Specifies the maximum number of streams per TSPEC.
y
Number (1 to 5) of voice streams.
Note
The default number of streams is 2 and the
mean data rate of a stream is 84 kbps.
tspec-inactivity-timeout
Specifies TSPEC inactivity timeout processing mode.
Note
Use this keyword to process or ignore the
Wi-Fi Multimedia (WMM) traffic
specifications (TSPEC) inactivity timeout
received from an access point. When the
inactivity timeout is ignored, a client TSPEC
is not deleted even if the access point reports
an inactivity timeout for that client.
enable
Processes the TSPEC inactivity timeout messages.
ignore
Ignores the TSPEC inactivity timeout messages.
Note
Command Default
None
Command Modes
Global configuration
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
446
The default value is 64
Kbps.
The default is ignore
(disabled).
ap dot11 cac voice
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
CAC commands require that the WLAN you are planning to modify is configured for the Wi-Fi Multimedia
(WMM) protocol and the quality of service (QoS) level be set to Platinum.
Before you can configure CAC parameters on a network, you must complete the following prerequisites:
• Disable all WLANs with WMM enabled by entering the wlan wlan_name shutdown command.
• Disable the radio network you want to configure by entering the ap dot11 {24ghz | 5ghz} shutdown
command.
• Save the new configuration.
• Enable voice or video CAC for the network you want to configure by entering the ap dot11 {24ghz |
5ghz} cac voice acm or ap dot11 {24ghz | 5ghz} cac video acm commands.
Examples
This example shows how to enable the bandwidth-based CAC:
Switch(config)# ap dot11 24ghz cac voice acm
This example shows how to enable the load-based CAC on the voice access category:
Switch(config)# ap dot11 24ghz cac voice load-based
This example shows how to specify the percentage of the maximum allocated bandwidth for voice applications
on the selected radio band:
Switch(config)# ap dot11 24ghz cac voice max-bandwidth 50
This example shows how to configure the percentage of the maximum allocated bandwidth reserved for
roaming voice clients on the selected radio band:
Switch(config)# ap dot11 24ghz cac voice roam-bandwidth 10
This example shows how to configure the bandwidth and voice packetization interval for the G729 SIP codec
on a 2.4 GHz band:
Switch(config)# ap dot11 24ghz cac voice sip bandwidth 8 sample-interval 40
This example shows how to configure the number of aggregated voice traffic specifications stream with a
stream size of 85000 and with a maximum of 5 streams:
Switch(config)# ap dot11 24ghz cac voice stream-size 85000 max-streams 5
This example shows how to enable the voice TSPEC inactivity timeout messages received from an access
point:
Switch(config)# ap dot11 24ghz cac voice tspec-inactivity-timeout enable
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
447
ap dot11 cleanair
ap dot11 cleanair
To configure CleanAir on 802.11 networks, use the ap dot11 cleanair command. To disable CleanAir on
802.11 networks, use the no form of this command.
ap dot11 {24ghz| 5ghz} cleanair
no ap dot11 {24ghz| 5ghz} cleanair
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
cleanair
Specifies CleanAir on the 2.4 GHz or 5 GHz band.
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the CleanAir settings on the 2.4 GHz band:
Switch(config)# ap dot11 24ghz cleanair
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
448
ap dot11 cleanair alarm air-quality
ap dot11 cleanair alarm air-quality
To configure CleanAir air-quality alarms for Cisco lightweight access points, use the ap dot11 cleanair
alarm air-quality command.
ap dot11 {24ghz| 5ghz} cleanair alarm air-quality [threshold value]
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
threshold
Specifies the air-quality alarm threshold.
value
Air quality alarm threshold (1 is bad air quality, and 100 is good air quality).
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the CleanAir 2.4 GHz air-quality threshold to 90:
Switch(config)# ap dot11 24ghz cleanair air-quality threshold 90
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
449
ap dot11 cleanair alarm device
ap dot11 cleanair alarm device
To configure the CleanAir interference devices alarms on the 2.4 GHz or 5 GHz bands, use the ap dot11
cleanair alarm device command. To disable the CleanAir interference devices alarms on the 802.11 networks,
use the no form of this command.
ap dot11 {24ghz| 5ghz} cleanair alarm device{all| bt-discovery| bt-link| canopy| cont-tx| dect-like| fh|
inv| jammer| mw-oven| nonstd| superag| tdd-tx| video| wimax-fixed| wimax-mobile| xbox| zigbee}
no ap dot11 {24ghz| 5ghz} cleanair
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
all
Specifies all the device types at once.
bt-discovery
Specifies the Bluetooth device in discovery mode.
bt-link
Specifies the Bluetooth active link.
canopy
Specifies the Canopy devices.
cont-tx
Specifies the continuous transmitter.
dect-like
Specifies a Digital Enhanced Cordless Communication (DECT)-like
phone.
fh
Specifies the frequency hopping devices.
inv
Specifies the devices using spectrally inverted Wi-Fi signals.
jammer
Specifies the jammer.
mw-oven
Specifies the microwave oven devices.
nonstd
Specifies the devices using nonstandard Wi-Fi channels.
superag
Specifies 802.11 SuperAG devices.
tdd-tx
Specifies the TDD transmitter.
video
Specifies video cameras.
wimax-fixed
Specifies a WiMax fixed device.
wimax-mobile
Specifies a WiMax mobile device.
xbox
Specifies the Xbox device.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
450
ap dot11 cleanair alarm device
zigbee
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Specifies the ZigBee device.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable alarms for ZigBee interference detection:
Switch(config)# no ap dot11 24ghz cleanair alarm device zigbee
This example shows how to enable alarms for detection of Bluetooth links:
Switch(config)# ap dot11 24ghz cleanair alarm device bt-link
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
451
ap dot11 cleanair device
ap dot11 cleanair device
To configure CleanAir interference device types, use the ap dot11 cleanair device command.
ap dot11 24ghz cleanair device [all| bt-discovery| bt-link| canopy| cont-tx| dect-like| fh| inv| jammer|
mw-oven| nonstd| superag| tdd-tx| video| wimax-fixed| wimax-mobile| xbox| zigbee]
Syntax Description
Command Default
all
Specifies all device types.
device
Specifies the CleanAir interference device type.
bt-discovery
Specifies the Bluetooth device in discovery mode.
bt-link
Specifies the Bluetooth active link.
canopy
Specifies the Canopy devices.
cont-tx
Specifies the continuous transmitter.
dect-like
Specifies a Digital Enhanced Cordless Communication
(DECT)-like phone.
fh
Specifies the 802.11 frequency hopping devices.
inv
Specifies the devices using spectrally inverted Wi-Fi signals.
jammer
Specifies the jammer.
mw-oven
Specifies the microwave oven devices.
nonstd
Specifies the devices using nonstandard Wi-Fi channels.
superag
Specifies 802.11 SuperAG devices.
tdd-tx
Specifies the TDD transmitter.
video
Specifies video cameras.
wimax-fixed
Specifies a WiMax fixed device.
wimax-mobile
Specifies a WiMax mobile device.
xbox
Specifies the Xbox device.
zigbee
Specifies the ZigBee device.
None
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
452
ap dot11 cleanair device
Command Modes
Command History
Examples
Global configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the switch to monitor ZigBee interferences:
Switch(config)# ap dot11 24ghz cleanair device zigbee
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
453
ap dot11 dot11n
ap dot11 dot11n
To configure settings for an 802.11n network, use the ap dot11 dot11n command.
ap dot11 {24ghz| 5ghz} dot11n {a-mpdu tx priority {priority_value all }| scheduler timeout rt
scheduler_value}| a-msdu tx priority {priority_value| all}| guard-interval {any| long}| mcs tx rate| rifs
rx}
Syntax Description
24ghz
Specifies the 2.4-GHz band.
5ghz
Specifies the 5-GHz band.
dot11n
Enables 802.11n support.
a-mpdu tx priority
Specifies the traffic that is associated with the priority level
that uses Aggregated MAC Protocol Data Unit (A-MPDU)
transmission.
priority_value
Aggregated MAC protocol data unit priority level from 0
to 7.
all
Specifies all of the priority levels at once.
a-msdu tx priority
Specifies the traffic that is associated with the priority level
that uses Aggregated MAC Service Data Unit (A-MSDU)
transmission.
priority_value
Aggregated MAC protocol data unit priority level from 0
to 7.
all
Specifies all of the priority levels at once.
scheduler timeout rt
Configures the 802.11n A-MPDU transmit aggregation
scheduler timeout value in milliseconds.
scheduler_value
The 802.11n A-MPDU transmit aggregation scheduler
timeout value from 1 to 10000 milliseconds.
guard-interval
Specifies the guard interval.
any
Enables either a short or a long guard interval.
long
Enables only a long guard interval.
mcs tx rate
Specifies the modulation and coding scheme (MCS) rates
at which data can be transmitted between the access point
and the client.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
454
ap dot11 dot11n
rate
Specifies the modulation and coding scheme data rates.
Note
Specifies the Reduced Interframe Space (RIFS) between
data frames.
rifs rx
Command Default
By default, priority 0 is enabled.
Command Modes
Global configuration
Command History
Usage Guidelines
The range is from 0 to
23.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Aggregation is the process of grouping packet data frames together rather than transmitting them separately.
The two aggregation methods available are:
• A-MPDU—This aggregation is performed in the software.
• A-MSDU—This aggregation is performed in the hardware
Aggregated MAC Protocol Data Unit priority levels assigned per traffic type are as follows:
• 0—Best effort
• 1—Background
• 2—Spare
• 3—Excellent effort
• 4—Controlled load
• 5—Video, less than 100-ms latency and jitter
• 6—Voice, less than 10-ms latency and jitter
• 7—Network control
• all—Configure all of the priority levels at once.
Note
Configure the priority levels to match the aggregation method used by the clients.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
455
ap dot11 dot11n
Examples
This example shows how to enable 802.11n support on a 2.4-GHz band:
Switch(config)# ap dot11 24ghz dot11n
This example shows how to configure all the priority levels at once so that the traffic that is associated with
the priority level uses A-MSDU transmission:
Switch(config)# ap dot11 24ghz dot11n a-msdu tx priority all
This example shows how to enable only long guard intervals:
Switch(config)# ap dot11 24ghz dot11n guard-interval long
This example shows how to specify MCS rates:
Switch(config)# ap dot11 24ghz dot11n mcs tx 5
This example shows how to enable RIFS:
Switch(config)# ap dot11 24ghz dot11n rifs rx
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
456
ap dot11 dtpc
ap dot11 dtpc
To configure Dynamic Transmit Power Control (DTPC) settings, Cisco Client eXtension (CCX) version 5
expedited bandwidth request feature, and the fragmentation threshold on an 802.11 network, use the ap dot11
dtpc command.
ap dot11 {24ghz| 5ghz} {dtpc| exp-bwreq| fragmentation threshold}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
dtpc
Specifies Dynamic Transport Power Control (DTPC) settings.
Note
Specifies Cisco Client eXtension (CCX) version 5 expedited bandwidth request
feature.
exp-bwreq
Note
fragmentation threshold
Command Default
None
Command Modes
Global configuration
Command History
The expedited bandwidth request feature is disabled by
default.
Specifies the fragmentation threshold.
Note
threshold
This option is enabled by
default.
This option can only used be when the network is disabled using the
ap dot11 {24ghz | 5ghz} shutdown command.
Threshold. The range is from 256 to 2346 bytes (inclusive).
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When the CCX version 5 expedited bandwidth request feature is enabled, the switch configures all joining
access points for this feature.
Examples
This example shows how to enable DTPC for the 5 GHz band:
Switch(config)# ap dot11 5ghz dtpc
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
457
ap dot11 dtpc
This example shows how to enable the CCX expedited bandwidth settings:
Switch(config)# ap dot11 5ghz exp-bwrep
This example shows how to configure the fragmentation threshold on the 5 GHz band with the threshold
number of 1500 bytes:
Switch(config)# ap dot11 5ghz fragmentation 1500
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
458
ap dot11 edca-parameters
ap dot11 edca-parameters
To enable a specific enhanced distributed channel access (EDCA) profile on the 2.4 GHz or 5 GHz bands,
use the ap dot11 edca-parameters command. To disable an EDCA profile on the 2.4 GHz or 5 GHz bands,
use the no form of this command.
ap dot11 {24ghz| 5ghz} edca-parameters {custom-voice| optimized-video-voice| optimized-voice| svp-voice|
wmm-default}
no ap dot11 {24ghz| 5ghz} edca-parameters {custom-voice| optimized-video-voice| optimized-voice|
svp-voice| wmm-default}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
edca-parameters
Specifies a specific enhanced distributed channel access (EDCA) profile on
the 802.11 networks.
custom-voice
Enables custom voice EDCA parameters.
optimized-video-voice
Enables EDCA voice- and video-optimized profile parameters. Choose this
option when both voice and video services are deployed on your network.
optimized-voice
Enables EDCA voice-optimized profile parameters. Choose this option when
voice services other than SpectraLink are deployed on your network.
svp-voice
Enables SpectraLink voice priority parameters. Choose this option if
SpectraLink phones are deployed on your network to improve the quality of
calls.
wmm-default
Enables the Wi-Fi Multimedia (WMM) default parameters. Choose this option
when voice or video services are not deployed on your network.
Command Default
wmm-default
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
10.3
The custom-voice keyword was
removed for Cisco 5700 Series
WLC.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
459
ap dot11 edca-parameters
Examples
This example shows how to enable SpectraLink voice priority parameters:
Switch(config)# ap dot11 24ghz edca-parameters svp-voice
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
460
ap dot11 rrm group-mode
ap dot11 rrm group-mode
To set the 802.11 automatic RF group selection mode on, use the ap dot11 rrm group-mode command. To
set the 802.11 automatic RF group selection mode off, use the no form of this command.
ap dot11 {5ghz| 24ghz} rrm group-mode {auto| leader| off| restart}
no ap dot11 {5ghz| 24ghz} rrm group-mode
Syntax Description
5ghz
Specifies the 2.4 GHz band.
24ghz
Specifies the 5 GHz band.
auto
Sets the 802.11 RF group selection to automatic update mode.
leader
Sets the 802.11 RF group selection to static mode, and sets this switch as the
group leader.
off
Sets the 802.11 RF group selection to off.
restart
Restarts the 802.11 RF group selection.
Command Default
auto
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to turn the auto RF group selection mode on the 5 GHz band:
Switch(config)# ap dot11 5ghz rrm group-mode auto
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
461
ap dot11 rrm channel cleanair-event
ap dot11 rrm channel cleanair-event
To configure CleanAir event-driven Radio Resource Management (RRM) parameters for all 802.11 Cisco
lightweight access points, use the ap dot11 rrm channel cleanair-event command. When this parameter
is configured, CleanAir access points can change their channel when a source of interference degrades the
operations, even if the RRM interval has not expired yet.
ap dot11 {24ghz| 5ghz} rrm channel {cleanair-event sensitivity value}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
sensitivity
Sets the sensitivity for CleanAir event-driven RRM.
value
Sensitivity value. You can specify any one of the following three optional
sensitivity values:
• low—Specifies low sensitivity.
• medium—Specifies medium sensitivity.
• high—Specifies high sensitivity.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to set the high sensitivity for CleanAir event-driven RRM:
Switch(config)# ap dot11 24ghz rrm channel cleanair-event sensitivity high
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
462
ap dot11 l2roam rf-params
ap dot11 l2roam rf-params
To configure the 2.4 GHz or 5 GHz Layer 2 client roaming parameters, use the ap dot11 l2roam rf-params
command.
ap dot11 {24ghz| 5ghz} l2roam rf-params custom min-rssi roam-hyst scan-thresh trans-time
Syntax Description
Command Default
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
custom
Specifies custom Layer 2 client roaming RF parameters.
min-rssi
Minimum received signal strength indicator (RSSI) that is required for the client to associate
to the access point. If the client’s average received signal power dips below this threshold,
reliable communication is usually impossible. Clients must already have found and roamed
to another access point with a stronger signal before the minimum RSSI value is reached.
The valid range is –80 to –90 dBm, and the default value is –85 dBm.
roam-hyst
How much greater the signal strength of a neighboring access point must be in order for
the client to roam to it. This parameter is intended to reduce the amount of roaming between
access points if the client is physically located on or near the border between the two
access points. The valid range is 2 to 4 dB, and the default value is 2 dB.
scan-thresh
Minimum RSSI that is allowed before the client should roam to a better access point.
When the RSSI drops below the specified value, the client must be able to roam to a better
access point within the specified transition time. This parameter also provides a power-save
method to minimize the time that the client spends in active or passive scanning. For
example, the client can scan slowly when the RSSI is above the threshold and scan more
rapidly when the RSSI is below the threshold. The valid range is –70 to –77 dBm, and the
default value is –72 dBm.
trans-time
Maximum time allowed for the client to detect a suitable neighboring access point to roam
to and to complete the roam, whenever the RSSI from the client’s associated access point
is below the scan threshold. The valid range is 1 to 10 seconds, and the default value is 5
seconds.
min-rssi
-85
roam-hyst
2
scan-thresh
-72
trans-time
5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
463
ap dot11 l2roam rf-params
Command Modes
Command History
Examples
Global configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure custom Layer 2 client roaming parameters on an 802.11a network:
Switch(config)# ap dot11 5ghz l2roam rf-params custom -80 2 -70 7
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
464
ap dot11 media-stream
ap dot11 media-stream
To configure media stream multicast-direct and video-direct settings on an 802.11 network, use the ap dot11
media-stream command.
ap dot11 {24ghz| 5ghz} media-stream {multicast-direct {admission-besteffort| client-maximum value|
radio-maximum value}| video-redirect}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
multicast-direct
Specifies the multicast-direct for the 2.4 GHz or a 5 GHz band.
admission-besteffort
Admits the media stream to the best-effort queue.
client-maximum value
Specifies the maximum number of streams allowed on a client.
radio-maximum value
Specifies the maximum number of streams allowed on a 2.4 GHz or
a 5 GHz band.
video-redirect
Specifies the media stream video-redirect for the 2.4 GHz or a 5 GHz
band.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Before you configure the media stream multicast-direct or video-redirect on a 802.11 network, ensure that
the network is nonoperational.
Examples
This example shows how to enable media stream multicast-direct settings on the 5 GHz band:
Switch(config)# ap dot11 5ghz media-stream multicast-direct
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
465
ap dot11 media-stream
This example shows how to admit the media stream to the best-effort queue if there is not enough bandwidth
to prioritize the flow:
Switch(config)# ap dot11 5ghz media-stream multicast-direct admission-besteffort
This example shows how to set the maximum number of streams allowed on a client:
Switch(config)# ap dot11 5ghz media-stream multicast-direct client-maximum 10
This example shows how to enable media stream traffic redirection on the 5 GHz band:
Switch(config)# ap dot11 5ghz media-stream video-redirect
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
466
ap dot11 rrm ccx location-measurement
ap dot11 rrm ccx location-measurement
To configure cisco client Extensions (CCX) client location measurements for 2.4 GHz and 5 GHz bands, use
the ap dot11 rrm ccx location-measurement command.
ap dot11 {24ghz| 5ghz} rrm ccx location-measurement {disable| interval}
Syntax Description
24ghz
Specifies the 2.4-GHz band.
5ghz
Specifies the 5-GHz band.
disable
Disables support for CCX client location measurements.
interval
Interval from 10 to 32400.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable support for 2.4 GHz CCX client location measurements:
Switch(config)# no ap dot11 24ghz rrm ccx location-measurement
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
467
ap dot11 rrm channel dca
ap dot11 rrm channel dca
To configure Dynamic Channel Assignment (DCA) algorithm parameters on 802.11 networks, use the ap
dot11 rrm channel dca command.
ap dot11 {24ghz| 5ghz} rrm channel dca{channel_number| anchor-time value| global{auto| once}| interval
value| min-metric value| sensitivity{high| low| medium}}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
channel_number
Channel number to be added to the DCA list.
Note
The range is from 1 to
14.
anchor-time
Specifies the anchor time for DCA.
value
Hour of time between 0 and 23. These values represent the hour from 12:00 a.m.
to 11:00 p.m.
global
Specifies the global DCA mode for the access points in the 802.11 networks.
auto
Enables auto-RF.
once
Enables one-time auto-RF.
interval
Specifies how often the DCA is allowed to run.
value
Interval between the times when DCA is allowed to run. Valid values are 0, 1,
2, 3, 4, 6, 8, 12, or 24 hours. 0 is 10 minutes (600 seconds). Default value is 0
(10 minutes).
min-metric
Specifies the DCA minimum RSSI energy metric.
value
Minimum RSSI energy metric value from –100 to –60.
sensitivity
Specifies how sensitive the DCA algorithm is to environmental changes (for
example, signal, load, noise, and interference) when determining whether or not
to change channels.
high
Specifies that the DCA algorithm is not particularly sensitive to environmental
changes. See the “Usage Guidelines” section for more information.
low
Specifies that the DCA algorithm is moderately sensitive to environmental
changes. See the “Usage Guidelines” section for more information.
medium
Specifies that the DCA algorithm is highly sensitive to environmental changes.
See the “Usage Guidelines” section for more information.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
468
ap dot11 rrm channel dca
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The DCA sensitivity thresholds vary by radio band as shown in the table below.
To aid in troubleshooting, the output of this command shows an error code for any failed calls. The table
below explains the possible error codes for failed calls.
Table 20: DCA Sensitivity Threshold
Examples
Sensitivity
2.4 Ghz DCA Sensitivity
Threshold
5 Ghz DCA Sensitivity Threshold
High
5 dB
5 dB
Medium
15 dB
20 dB
Low
30 dB
35 dB
This example shows how to configure the switch to start running DCA at 5 pm for the 2.4 GHz band:
Switch(config)# ap dot11 24ghz rrm channel dca anchor-time 17
This example shows how to set the DCA algorithm to run every 10 minutes for the 2.4 GHz band:
Switch(config)# ap dot11 24ghz rrm channel dca interval 0
This example shows how to configure the value of DCA algorithm’s sensitivity to low on the 2.4 GHz band:
Switch(config)# ap dot11 24ghz rrm channel dca sensitivity low
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
469
ap dot11 rrm group-member
ap dot11 rrm group-member
To configure members in an 802.11 static RF group, use the ap dot11 rrm group-member command. To
remove members from 802.11 RF group, use the no form of this command.
ap dot11 {24ghz| 5ghz} rrm group-member controller-name controller-ip
no ap dot11 {24ghz| 5ghz} rrm group-member controller-name controller-ip
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
controller-name
Name of the switch to be added.
controller-ip
IP address of the switch to be added.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to add a switch in the 5 GHz band RF group:
Switch(config)# ap dot11 5ghz rrm group-member cisco-controller 192.0.2.54
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
470
ap dot11 rrm logging
ap dot11 rrm logging
To configure report log settings on supported 802.11 networks, use the ap dot11 rrm logging command.
ap dot11 {24ghz| 5ghz} rrm logging {channel| coverage| foreign| load| noise| performance| txpower}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
channel
Turns the channel change logging mode on or off. The default mode is off
(Disabled).
coverage
Turns the coverage profile logging mode on or off. The default mode is off
(Disabled).
foreign
Turns the foreign interference profile logging mode on or off. The default mode
is off (Disabled).
load
Turns the load profile logging mode on or off. The default mode is off
(Disabled).
noise
Turns the noise profile logging mode on or off. The default mode is off
(Disabled).
performance
Turns the performance profile logging mode on or off. The default mode is off
(Disabled).
txpower
Turns the transit power change logging mode on or off. The default mode is
off (Disabled).
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to turn the 5 GHz logging channel selection mode on:
Switch(config)# ap dot11 5ghz rrm logging channel
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
471
ap dot11 rrm logging
This example shows how to turn the 5 GHz coverage profile violation logging selection mode on:
Switch(config)# ap dot11 5ghz rrm logging coverage
This example shows how to turn the 5 GHz foreign interference profile violation logging selection mode on:
Switch(config)# ap dot11 5ghz rrm logging foreign
This example shows how to turn the 5 GHz load profile logging mode on:
Switch(config)# ap dot11 5ghz rrm logging load
This example shows how to turn the 5 GHz noise profile logging mode on:
Switch(config)# ap dot11 5ghz rrm logging noise
This example shows how to turn the 5 GHz performance profile logging mode on:
Switch(config)# ap dot11 5ghz rrm logging performance
This example shows how to turn the 5 GHz transmit power change mode on:
Switch(config)# ap dot11 5ghz rrm logging txpower
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
472
ap dot11 rrm monitor
ap dot11 rrm monitor
To Configure monitor settings on the 802.11 networks, use the ap dot11 rrm monitor command.
ap dot11 {24ghz| 5ghz} rrm monitor{channel-list| {all| country| dca}| coverage| load| noise| signal}
seconds
Syntax Description
24ghz
Specifies the 802.11b parameters.
5ghz
Specifies the 802.11a parameters.
channel-list all
Monitors the noise, interference, and rogue monitoring channel list for all
channels.
channel-list country
Monitors the noise, interference, and rogue monitoring channel list for the
channels used in the configured country code.
channel-list dca
Monitors the noise, interference, and rogue monitoring channel list for the
channels used by automatic channel assignment.
coverage
Specifies the coverage measurement interval.
load
Specifies the load measurement interval.
noise
Specifies the noise measurement interval.
signal
Specifies the signal measurement interval.
rssi-normalization
Configure RRM Neighbor Discovery RSSI Normalization.
seconds
Measurement interval time from 60 to 3600 seconds.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
473
ap dot11 rrm monitor
Examples
This example shows how to monitor the channels used in the configured country:
Switch(config)# ap dot11 24ghz rrm monitor channel-list country
This example shows how to set the coverage measurement interval to 60 seconds:
Switch(config)# ap dot11 24ghz rrm monitor coverage 60
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
474
ap dot11 rrm ndp-type
ap dot11 rrm ndp-type
To configure the 802.11 access point radio resource management neighbor discovery protocol type, use the
ap dot11 rrm ndp-type command.
ap dot11 {24ghz| 5ghz} rrm ndp-type {protected| transparent}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
protected
Specifies the Tx RRM protected (encrypted) neighbor discovery protocol.
transparent
Specifies the Tx RRM transparent (not encrypted) neighbor discovery
protocol.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Before you configure the 802.11 access point RRM neighbor discovery protocol type, ensure that you have
disabled the network by entering the ap dot11 {24ghz | 5ghz} shutdown command.
This example shows how to enable the 802.11a access point RRM neighbor discovery protocol type as
protected:
Switch(config)# ap dot11 5ghz rrm ndp-type protected
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
475
ap dot11 5ghz dot11ac frame-burst
ap dot11 5ghz dot11ac frame-burst
To configure the 802.11ac Frame Burst use the apdot115ghzdot11acframe-burst command. Use the no
forms to disable the bursting of 802.11ac A-MPDUs.
ap dot115ghzdot11acframe-burst
noap dot115ghzdot11acframe-burst
ap dot115ghzdot11acframe-burstautomatic
noap dot115ghzdot11acframe-burstautomatic
Syntax Description
5ghz
Configures the 802.11a parameters.
frame-burst
Configures the bursting of 802.11ac A-MPDUs.
Command Default
No
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.6E
This command was introduced.
This is the example shows how to configure the bursting of 802.11ac A-MPDUs.
Switchap dot11 5ghz
dot11ac frame-burst
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
476
ap dot1x max-sessions
ap dot1x max-sessions
To configure the maximum number of simultaneous 802.1X sessions allowed per access point, use the ap
dot1x max-sessions command.
ap dot1x max-sessions num-of-sessions
Syntax Description
num-of-sessions
Command Default
None
Command Modes
Global configuration
Command History
Number of maximum 802.1X sessions initiated per AP at a time. The range
is from 0 to 255, where 0 indicates unlimited.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
It is required to limit the number of simultaneous 802.1X sessions initiated per access point to protect against
flooding attacks caused by using 802.1X messages.
Examples
This example shows how to configure the maximum number of simultaneous 802.1X sessions:
Switch(config)# ap dot1x max-sessions 100
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
477
ap dot1x username
ap dot1x username
To configure the 802.1X username and password for all access points that are currently joined to the switch
and any access points that join the switch in the future, use the ap dot1x username command. To disable
the 802.1X username and password for all access points that are currently joined to the switch, use the no
form of this command.
ap dot1x username user-id password{0| 8} password-string
no ap dot1x username user-idpassword{0| 8} password-string
Syntax Description
user-id
Username.
password
Specifies an 802.1X password for all access points.
0
Specifies an unencrypted password.
8
Specifies an AES encrypted password.
password_string
Password.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You should enter a strong password. Strong passwords have the following characteristics:
• They are at least eight characters long.
• They contain a combination of uppercase and lowercase letters, numbers, and symbols.
• They are not words in any language.
You can set the values for a specific access point.
Examples
This example shows how to configure the global authentication username and password for all access points:
Switch(config)# ap dot1x username cisco123 password 0 cisco2020
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
478
ap ethernet duplex
ap ethernet duplex
To configure the Ethernet port duplex and speed settings of the lightweight access points, use the ap ethernet
duplex command. To disable the Ethernet port duplex and speed settings of lightweight access points, use
the no form of this command.
ap ethernet duplex duplex speed speed
no ap ethernet
Syntax Description
duplex
Ethernet port duplex settings. You can specify the following
options to configure the duplex settings:
• auto—Specifies the Ethernet port duplex auto settings.
• half—Specifies the Ethernet port duplex half settings.
• full—Specifies the Ethernet port duplex full settings.
speed
Specifies the Ethernet port speed settings.
speed
Ethernet port speed settings. You can specify the following
options to configure the speed settings:
• auto—Specifies the Ethernet port speed to auto.
• 10—Specifies the Ethernet port speed to 10 Mbps.
• 100—Specifies the Ethernet port speed to 100 Mbps.
• 1000—Specifies the Ethernet port speed to 1000 Mbps.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Ethernet port duplex full settings as 1000 Mbps for all access points:
Switch(config)# ap ethernet duplex full speed 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
479
ap group
ap group
To create a new access point group, use the ap group command. To remove an access point group, use the
no form of this command.
ap group group-name
no ap group group-name
Syntax Description
group-name
Command Default
None
Command Modes
Global configuration
Command History
Access point group name.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
An error message appears if you try to delete an access point group that is used by at least one access point.
Before you can delete an AP group, move all APs in this group to another group. The access points are not
moved to the default-group access point group automatically. To see the APs, enter the show ap summary
command. To move access points, enter the ap name Cisco-AP ap-groupname Group-Name command.
Examples
This example shows how to create a new access point group:
Switch(config)# ap group sampleapgroup
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
480
ap image
ap image
To configure an image on all access points that are associated to the switch, use the ap image command.
ap image {predownload| reset| swap}
Syntax Description
predownload
Instructs all the access points to start predownloading an image.
reset
Instructs all the access points to reboot.
swap
Instructs all the access points to swap the image.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to predownload an image to all access points:
Switch# ap image predownload
This example shows how to reboot all access points:
Switch# ap image reset
This example shows how to swap the access point’s primary and secondary images:
Switch# ap image swap
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
481
ap ipv6 tcp adjust-mss
ap ipv6 tcp adjust-mss
To configure IPv6 TCP maximum segment size (MSS) value for all Cisco APs, use the ap ipv6 tcp adjust-mss
command.
ap ipv6 tcp adjust-mss size
no ap ipv6 tcp adjust-mss size
Syntax Description
adjust-mss
Configures IPv6 TCP MSS settings for all Cisco APs.
size
MSS value in the range of 500 to 1440.
Command Default
None
Command Modes
Global configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The MSS value must be in the range of 500 to 1440.
Examples
This example shows how to configure the IPv6 TCP MSS value to 600 for all Cisco APs:
Switch(config)# ap ipv6 tcp adjust-mss 600
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
482
ap led
ap led
To enable the LED state for an access point, use the ap led command. To disable the LED state for an access
point, use the no form of this command.
ap led
no ap led
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the LED state for an access point:
Switch(config)# ap led
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
483
ap link-encryption
ap link-encryption
To enable Datagram Transport Layer Security (DTLS) data encryption for access points, use the ap
link-encryption command. To disable the DTLS data encryption for access points, use the no form of this
command.
ap link-encryption
no ap link-encryption
Syntax Description
This command has no keywords and arguments.
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable data encryption for all the access points that are joined to the controller:
Switch(config)# ap link-encryption
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
484
ap link-latency
ap link-latency
To enable link latency for all access points that are currently associated to the switch, use the ap link-latency
command. To disable link latency all access points that are currently associated to the switch, use the no form
of this command.
ap link-latency [reset]
no ap link-latency
Syntax Description
reset
(Optional) Resets all link latency for all access points.
Command Default
Link latency is disabled by default.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command enables or disables link latency only for those access points that are currently joined to the
switch. It does not apply to access points that join in the future.
Examples
This example shows how to enable the link latency for all access points:
Switch(config)# ap link-latency
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
485
ap mgmtuser username
ap mgmtuser username
To configure the username, password, and secret password for access point management, use the ap mgmtuser
username command.
ap mgmtuser username username password password_type password secret secret_type secret
Syntax Description
username
Specifies the username for access point management.
password
Specifies the password for access point management.
password_type
Password type. You can specify any one of the following
two password types:
• 0—Specifies that an unencrypted password will
follow.
• 8—Specifies that an AES encrypted password will
follow.
password
Access point management password.
Note
The password does not get encrypted by
service-password encryption.
secret
Specifies the secret password for privileged access point
management.
secret_type
Secret type. You can specify any one of the following two
secret types:
• 0—Specifies that an unencrypted secret password
will follow.
• 8—Specifies that an AES encrypted secret password
will follow.
secret
Command Default
None
Command Modes
Global configuration
Command History
Access point management secret password.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
486
ap mgmtuser username
Usage Guidelines
To specify a strong password, the following password requirements should be met:
• The password should contain characters from at least three of the following classes: lowercase letters,
uppercase letters, digits, and special characters.
• No character in the password can be repeated more than three times consecutively.
• The password should not contain a management username or the reverse of a username.
• The password should not contain words such as Cisco, oscic, admin, nimda or any variant obtained by
changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for
s.
To specify a strong secret password, the following requirement should be met:
• The secret password should contain characters from at least three of the following classes: lowercase
letters, uppercase letters, digits, or special characters.
Examples
This example shows how to add a username, password, and secret password for access point management:
Switch(config)# ap mgmtuser username glbusr password 0 Arc_1234 secret 0 Mid_1234
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
487
ap name ap-groupname
ap name ap-groupname
To add a Cisco lightweight access point to a specific access point group, use the ap name ap-groupname
command.
ap name ap-name ap-groupname group-name
Syntax Description
ap-name
Name of the Cisco lightweight access point.
group-name
Descriptive name for the access point group.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
This example shows how to add the access point AP01 to the access point group superusers:
Switch# ap name AP01 ap-groupname superusers
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
488
ap name antenna band mode
ap name antenna band mode
To configure the antenna mode, use the ap name<AP name> antenna-band-mode{ single | dual } command.
ap nameap-name antenna-band-mode{single| dual}
Syntax Description
ap- name
Name of the Cisco lightweight access point.
antenna-band-mode
Instructs the access point to enable the band mode of antenna.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the antenna band mode of access point.
Switchap name <ap-name> antenna-band-mode single
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
489
ap name bhrate
ap name bhrate
To configure the Cisco bridge backhaul Tx rate, use the ap name bhrate command.
ap name ap-name bhrate kbps
Syntax Description
ap-name
Name of the Cisco access point.
kbps
Cisco bridge backhaul Tx rate in kbps. The valid values are 6000, 12000, 18000,
24000, 36000, 48000, and 54000.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Cisco bridge backhaul Tx rate to 54000 kbps:
Switch# ap name AP02 bhrate 54000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
490
ap name bridgegroupname
ap name bridgegroupname
To set a bridge group name on a Cisco lightweight access point, use the ap name bridgegroupname
command. To delete a bridge group name on a Cisco lightweight access point, use the no form of this command.
ap name ap-name bridgegroupname bridge_group_name
ap name ap-name no bridgegroupname
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Only access points with the same bridge group name can connect to each other. Changing the access point
bridgegroupname may strand the bridge access point.
Examples
This example shows how to set a bridge group name on Cisco access point’s bridge group name AP02:
Switch# ap name AP02 bridgegroupname West
This example shows how to delete a bridge group name on Cisco access point’s bridge group name AP02:
Switch# ap name AP02 no bridgegroupname
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
491
ap name bridging
ap name bridging
To enable Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the ap name bridging
command. To disable Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the no form of
this command.
ap name ap-name bridging
ap name ap-name no bridging
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable Ethernet-to-Ethernet bridging on an access point:
Switch# ap name TSIM_AP2 bridging
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
492
ap name cdp interface
ap name cdp interface
To enable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the ap name
command. To disable the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the no
form of this command.
ap name ap-name cdp interface {ethernet ethernet-id| radio radio-id}
ap name ap-name [no] cdp interface {ethernet ethernet-id| radio radio-id}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
ethernet
Enables CDP on an Ethernet interface.
ethernet-id
Ethernet interface number from 0 to 3.
radio
Enables CDP for a radio interface.
radio-id
Radio ID slot number from 0 to 3.
Command Default
Disabled on all access points.
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all access
points that are joined to the switch, you can disable and then reenable CDP on individual access points by
using the ap name ap-name cdp interface ethernet ethernet-id cisco_ap command. After you disable CDP
on all access points that are joined to the switch, you cannot enable and then disable CDP on individual access
points.
Examples
This example shows how to enable CDP for Ethernet interface number 0 on an access point:
Switch# ap name TSIM_AP2 cdp interface ethernet 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
493
ap name console-redirect
ap name console-redirect
To redirect the remote debug output of a Cisco lightweight access point to the console, use the ap name
console-redirect command. To disable the redirection of the remote debug output of a Cisco lightweight
access point to the console, use the no form of this command.
ap name ap-name console-redirect
ap name ap-name [no] console-redirect
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable redirecting remote debug output of a Cisco access point named AP02 to
the console:
Switch# ap name AP02 console-redirect
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
494
ap name capwap retransmit
ap name capwap retransmit
To configure the access point control packet retransmission interval and control packet retransmission count,
use the ap name capwap retransmit command.
ap name ap-name capwap retransmit {count count-value| interval interval-time}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
count
Sets the number of times control packet will be retransmitted.
count-value
Number of times that the control packet will be retransmitted from 3 to 8.
interval
Sets the control packet retransmission timeout interval.
interval-time
Control packet retransmission timeout from 2 to 5 seconds.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the retransmission interval for an access point:
Switch# ap name AP01 capwap retransmit interval 5
This example shows how to configure the retransmission retry count for a specific access point:
Switch# ap name AP01 capwap retransmit count 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
495
ap name command
ap name command
To execute a command remotely on a specific Cisco access point, use the ap name command command.
ap name ap-name command "command "
Syntax Description
ap-name
Name of the Cisco access point.
command
Command to be executed on a Cisco access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to remotely enter the show ip interface brief command on the Cisco access point
named TSIM_AP2:
Switch# ap name AP2 command "show ip interface brief"
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
496
ap name core-dump
ap name core-dump
To configure a Cisco lightweight access point’s memory core dump, use the ap name core-dump command.
To disable a Cisco lightweight access point’s memory core dump, use the no form of this command.
ap name ap-name core-dump tftp-ip-addr filename {compress| uncompress}
ap name ap-name [no]core-dump
Syntax Description
ap-name
Name of the access point.
tftp-ip-addr
IP address of the TFTP server to which the access point sends core
dump files.
filename
Name that the access point used to label the core file.
compress
Compresses the core dump file.
uncompress
Uncompresses the core dump file.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The access point must be able to reach the TFTP server before you can use this command.
Examples
This example shows how to configure and compress the core dump file:
Switch# ap name AP2 core-dump 192.1.1.1 log compress
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
497
ap name country
ap name country
To configure the country of operation for a Cisco lightweight access point, use the ap name country
command.
ap name ap-name country country-code
Syntax Description
ap-name
Name of the Cisco lightweight access point.
country-code
Two-letter or three-letter country code.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Cisco switchs must be installed by a network administrator or qualified IT professional and the installer must
select the proper country code. Following installation, access to the unit should be password protected by the
installer to maintain compliance with regulatory requirements and to ensure proper unit functionality. See the
related product guide for the most recent country codes and regulatory domains. Also, access point regulatory
domains are defined during the access point manufacturing process. You can change the access point country
code if the new country code matches a country that is valid within the access point regulatory domain. If you
try to enter a country that is not valid to the access point regulatory domain, the command fails.
Examples
This example shows how to configure the Cisco lightweight access point's country code to DE:
Switch# ap name AP2 country JP
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
498
ap name crash-file
ap name crash-file
To manage crash data and radio core files for the Cisco access point, use the ap name crash-file command.
ap name ap-name crash-file {get-crash-data| get-radio-core-dump {slot 0| slot 1}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
get-crash-data
Collects the latest crash data for a Cisco lightweight access point.
get-radio-core-dump
Gets a Cisco lightweight access point’s radio core dump
slot
Slot ID for Cisco access point.
0
Specifies Slot 0.
1
Specifies Slot 1.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to collect the latest crash data for access point AP3:
Switch# ap name AP3 crash-file get-crash-data
This example shows how to collect the radio core dump for access point AP02 and slot 0:
Switch# ap name AP02 crash-file get-radio-core-dump slot 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
499
ap name dot11 24ghz rrm coverage
ap name dot11 24ghz rrm coverage
To configure coverage hole detection settings on the 2.4 GHz band, use the ap name dot11 24ghz rrm
coverage command.
ap name ap-name dot11 24ghz rrm coverage {exception value| level value}
Syntax Description
ap-name
Name of the Cisco access point.
exception
Specifies the percentage of clients on an access point that are experiencing a low
signal level but cannot roam to another access point.
value
Percentage of clients. Valid values are from 0 to 100%.
Note
The default is
25%.
level
Specifies the minimum number of clients on an access point with a received signal
strength indication (RSSI) value at or below the data or voice RSSI threshold.
value
Minimum number of clients. Valid values are from 1 to 75.
Note
The default is
3.
Command Default
The default for the exception parameter is 25% and the default for the level parameter is 3.
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
If you enable coverage hole detection, the switch automatically determines, based on data that is received
from the access points, whether any access points have clients that are potentially located in areas with poor
coverage.
If both the number and percentage of failed packets exceed the values that you entered in the ap dot11 24ghz
rrm coverage data packet-count count and ap dot11 24ghz rrm coverage data fail-percentage percentage
commands for a 5-second period, the client is considered to be in a pre-alarm condition. The switch uses this
information to distinguish between real and false coverage holes and excludes clients with poor roaming logic.
A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values
entered in the ap dot11 24ghz rrm coverage exception and ap dot11 24ghz rrm coverage level commands
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
500
ap name dot11 24ghz rrm coverage
over a 90-second period. The switch determines whether the coverage hole can be corrected and, if appropriate,
mitigates the coverage hole by increasing the transmit power level for that specific access point.
Examples
This example shows how to specify the percentage of clients for an access point 2.4 GHz radio that is
experiencing a low signal level:
Switch# ap name AP2 dot11 24ghz rrm coverage exception 25%
This example shows how to specify the minimum number of clients on an 802.11b access point with an RSSI
value at or below the RSSI threshold:
Switch# ap name AP2 dot11 24ghz rrm coverage level 60
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
501
ap name dot11 49ghz rrm profile
ap name dot11 49ghz rrm profile
To configure Radio Resource Management (RRM) performance profile settings for a Cisco lightweight access
point on a 4.9 GHz public safety channel, use the ap name dot11 49ghz rrm profile command.
ap name ap-name dot11 49ghz rrm profile {clients value| customize| exception value| foreign value| level
value| noise value| throughput vaue| utilization value}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
clients
Sets the access point client threshold.
value
Access point client threshold from 1 to 75 clients.
Note
customize
The default client threshold is
12.
Turns on performance profile customization for an access point.
Note
Performance profile customization is off by
default.
exception value
Sets the 802.11a Cisco access point coverage exception level from 0 to100
percent.
foreign
Sets the foreign 802.11 transmitter interference threshold.
value
Foreign 802.11 transmitter interference threshold from 0 to 100 percent.
Note
The default is 10
percent.
level value
Sets the 802.11a Cisco access point client minimum exception level from 1 to
75 clients.
noise
Sets the 802.11 foreign noise threshold.
value
802.11 foreign noise threshold from –127 to 0 dBm.
Note
The default is –70
dBm.
throughput
Sets the data-rate throughput threshold.
value
802.11 throughput threshold from 1000 to 10000000 bytes per second.
Note
utilization
The default is 1,000,000 bytes per
second.
Sets the RF utilization threshold.
Note
The operating system generates a trap when this threshold is exceeded.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
502
ap name dot11 49ghz rrm profile
value
802.11 RF utilization threshold from 0 to 100 percent.
Note
Command Default
None
Command Modes
Any command mode
Command History
Examples
The default is 80
percent.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to set the AP1 clients threshold to 75 clients:
Switch# ap name AP1 dot11 49ghz rrm profile clients 75
This example shows how to turn performance on profile customization for Cisco lightweight access point
AP1 on the 4.9 GHz channel:
Switch# ap name AP1 dot11 49ghz rrm profile customize
This example shows how to set the foreign transmitter interference threshold for AP1 to 0 percent:
Switch# ap name AP1 dot11 49ghz rrm profile foreign 0
This example shows how to set the foreign noise threshold for AP1 to 0 dBm:
Switch# ap name AP1 dot11 49ghz rrm profile noise 0
This example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:
Switch# ap name AP1 dot11 49ghz rrm profile throughput 10000000
This example shows how to set the RF utilization threshold for AP1 to 100 percent:
Switch# ap name AP1 dot11 49ghz rrm profile utilization 100
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
503
ap name dot11 5ghz rrm channel
ap name dot11 5ghz rrm channel
To configure a new channel using an 802.11h channel announcement, use the ap name dot11 5ghz rrm
channel command.
ap name ap-name dot11 5ghz rrm channel channel
Syntax Description
ap-name
Name of the Cisco lightweight access point.
channel
New channel.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a new channel using the 802.11h channel:
Switch# ap name AP01 dot11 5ghz rrm channel 140
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
504
ap name dot11 antenna
ap name dot11 antenna
To configure radio antenna settings for Cisco lightweight access points on different 802.11 networks, use the
ap name dot11 antenna command.
ap name ap-name dot11 {24ghz| 5ghz} antenna {ext-ant-gain gain| mode {omni| sectorA| sectorB}|
selection {external| internal}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
ext-ant-gain
Specifies the external antenna gain for an 802.11 network.
Note
Before you enter this command, disable the Cisco radio by using the
ap dot11 {24ghz | 5ghz} shutdown command. After you enter this
command, reenable the Cisco radio by using the no ap dot11 {24ghz
| 5ghz} shutdown command.
gain
Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).
mode
Specifies that the Cisco lightweight access point is to use one internal antenna
for an 802.11 sectorized 180-degree coverage pattern or both internal antennas
for an 802.11 360-degree omnidirectional pattern.
omni
Specifies to use both internal antennas.
sectorA
Specifies to use only the side A internal antenna.
sectorB
Specifies to use only the side B internal antenna.
selection
Selects the internal or external antenna selection for a Cisco lightweight access
point on an 802.11 network.
external
Specifies the external antenna.
internal
Specifies the internal antenna.
Command Default
None
Command Modes
Any command mode
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
505
ap name dot11 antenna
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a 5 GHz external antenna gain of 0.5 dBm for AP1:
Switch# ap name AP1 dot11 5ghz antenna ext-ant-gain 0.5
This example shows how to configure access point AP01 antennas for a 360-degree omnidirectional pattern
on a 2.4 GHz band:
Switch# ap name AP01 dot11 24ghz antenna mode omni
This example shows how to configure access point AP02 on a 2.4 GHz band to use the internal antenna:
Switch# ap name AP02 dot11 24ghz antenna selection interval
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
506
ap name dot11 antenna extantgain
ap name dot11 antenna extantgain
To configure radio antenna settings for Cisco lightweight access points on 4.9 GHz and 5.8 GHz public safety
channels, use the ap name dot11 antenna extantgain command.
ap name ap-name dot11 {49ghz| 58ghz} {antenna extantgain gain}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
49ghz
Specifies 4.9 GHz public safety channel settings.
58ghz
Specifies 5.8 GHz public safety channel settings.
gain
Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Before you enter this command, disable the Cisco radio by using the ap dot11 {24ghz | 5ghz} shutdown
command. After you enter this command, reenable the Cisco radio by using the no ap dot11 {24ghz | 5ghz}
shutdown command.
Examples
This example shows how to configure an external antenna gain of 0.5 dBm for AP1 on a 4.9 GHz public
safety channel:
Switch# ap name AP1 dot11 49ghz antenna extantgain 0.5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
507
ap name dot11 cleanair
ap name dot11 cleanair
To configure CleanAir settings for a specific Cisco lightweight access point on 802.11 networks, use the ap
name dot11 cleanair command.
ap name ap-name dot11 {24ghz| 5ghz} cleanair
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
Command Default
Disabled.
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable CleanAir on the 2.4 GHz band:
Switch# ap name AP01 dot11 24ghz cleanair
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
508
ap name dot11 dot11n antenna
ap name dot11 dot11n antenna
To configure an access point to use a specific antenna, use the ap name dot11 dot11n antenna command.
ap name ap-name dot11 {24ghz| 5ghz} dot11n antenna {A| B| C| D}
Syntax Description
ap-name
Access point name.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
A
Specifies antenna port A.
B
Specifies antenna port B.
C
Specifies antenna port C.
D
Specifies antenna port D.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable antenna B on access point AP02:
Switch# ap name AP02 dot11 5ghz dot11n antenna B
This example shows how to disable antenna C on access point AP02:
Switch# ap name AP02 no dot11 5ghz dot11n C
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
509
ap name dot11 dual-band cleanair
ap name dot11 dual-band cleanair
To configure CleanAir for a dual band radio, use the ap name dot11 dual-band cleanair command.
ap name ap-name dot11 dual-band cleanair
ap name ap-name no dot11 dual-band cleanair
Syntax Description
ap-name
Name of the Cisco AP.
cleanair
Specifies the CleanAir feature.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable CleanAir for a dual band radio of the access point AP01:
Switch# ap name AP01 dot11 dual-band cleanair
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
510
ap name dot11 dual-band shutdown
ap name dot11 dual-band shutdown
To disable dual band radio on a Cisco AP, use the ap name dot11 dual-band shutdown command.
ap name ap-name dot11 dual-band shutdown
ap name ap-name no dot11 dual-band shutdown
Syntax Description
ap-name
Name of the Cisco AP.
shutdown
Disables the dual band radio on the Cisco AP.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable dual band radio on the Cisco access point AP01:
Switch# ap name AP01 dot11 dual-band shutdown
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
511
ap name dot11 rrm ccx
ap name dot11 rrm ccx
To configure Cisco Client eXtension (CCX) Radio Resource Management (RRM) settings for specific Cisco
lightweight access points on 802.11 networks, use the ap name dot11 rrm ccx command.
ap name ap-name dot11 {24ghz| 5ghz} rrm ccx {customize| location-measurement interval}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
customize
Enables 802.11 CCX options.
location-measurement
Configures the CCX client location measurements.
interval
Interval from 10 to 32400.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure CCX client location measurements for an access point in the 2.4 GHz
band:
Switch# ap name AP01 dot11 24ghz rrm ccx location-measurement 3200
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
512
ap name dot11 rrm profile
ap name dot11 rrm profile
To configure Radio Resource Management (RRM) performance profile settings for a Cisco lightweight access
point, use the ap name dot11 rrm profile command.
ap name ap-name dot11 {24ghz| 5ghz} rrm profile {clients value| customize| foreign value| noise value|
throughput value| utilization value}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
clients
Sets the access point client threshold.
value
Access point client threshold from 1 to 75 clients.
Note
customize
The default client threshold is
12.
Turns on performance profile customization for an access point.
Note
Performance profile customization is off by
default.
foreign
Sets the foreign 802.11 transmitter interference threshold.
value
Foreign 802.11 transmitter interference threshold from 0 to 100 percent.
Note
The default is 10
percent.
noise
Sets the 802.11 foreign noise threshold.
value
802.11 foreign noise threshold between –127 and 0 dBm.
Note
The default is —70
dBm.
throughput
Sets the data-rate throughput threshold.
value
802.11 throughput threshold from 1000 to 10000000 bytes per second.
Note
utilization
Sets the RF utilization threshold.
Note
value
The default is 1,000,000 bytes per
second.
The operating system generates a trap when this threshold is exceeded.
802.11 RF utilization threshold from 0 to 100 percent.
Note
The default is 80
percent.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
513
ap name dot11 rrm profile
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to set the AP1 clients threshold to 75 clients:
Switch# ap name AP1 dot11 24ghz rrm profile clients 75
This example shows how to turn performance profile customization on for 802.11a Cisco lightweight access
point AP1:
Switch# ap name AP1 dot11 5ghz rrm profile customize
This example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0 percent:
Switch# ap name AP1 dot11 5ghz rrm profile foreign 0
This example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:
Switch# ap name AP1 dot11 5ghz rrm profile noise 0
This example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:
Switch# ap name AP1 dot11 5ghz rrm profile throughput 10000000
This example shows how to set the RF utilization threshold for AP1 to 100 percent:
Switch# ap name AP1 dot11 5ghz rrm profile utilization 100
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
514
ap name dot11 txpower
ap name dot11 txpower
To configure the transmit power level for a single access point in an 802.11 network, use the ap name dot11
txpower command.
ap name ap-name dot11 {24ghz| 5ghz} {shutdown| txpower {auto| power-level}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
shutdown
Disables the 802.11 networks.
auto
Specifies the power level is automatically set by Radio Resource
Management (RRM) for the 802.11 Cisco radio.
power-level
Manual transmit power level number for the access point.
Command Default
The command default (txpower auto) is for automatic configuration by RRM.
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to automatically set the 2.4 GHz radio transmit power for access point AP1:
Switch# ap name AP1 dot11 24ghz txpower auto
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
515
ap name dot1x-user
ap name dot1x-user
To configure the global authentication username and password for an access point that is currently joined to
the switch, use the ap name dot1x-user command. To disable 802.1X authentication for a specific access
point, use the no form of this command.
ap name ap-name dot1x-user {global-override| username user-id password passwd}
ap name ap-name [no] dot1x-user
Syntax Description
ap-name
Name of the access point.
global-override
Forces the access point to use the switch's global authentication
settings.
username
Specifies to add a username.
user-id
Username.
password
Specifies to add a password.
passwd
Password.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You should enter a strong password. Strong passwords have the following characteristics:
• They are at least eight characters long.
• They contain a combination of uppercase and lowercase letters, numbers, and symbols.
• They are not words in any language.
You can set the values for a specific access point.
You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not
enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
516
ap name dot1x-user
Examples
This example shows how to configure a specific username and password for dot1x authentication:
Switch# ap name AP02 dot1x-user username Cisco123 password Cisco2020
This example shows how to disable the authentication for access point cisco_ap1:
Switch# ap name cisco_ap1 no dot1x-user
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
517
ap name ethernet
ap name ethernet
To configure ethernet port settings of a Cisco lightweight access point, use the ap name ethernet command.
To remove configured port settings or set of defaults, use the no form of this command.
ap name ap-name ethernet intf-number mode {access vlan-id| trunk [add| delete]} native-vlan vlan-id
ap name ap-name no ethernet intf-number mode {access| trunk native-vlan}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
intf-number
Ethernet interface number from 0 to 3.
mode
Configures access or trunk mode.
access
Configures the port in access mode.
vlan-id
VLAN identifier.
trunk
Specifies the port in trunk mode.
add
(Optional) Adds a VLAN or trunk mode.
delete
(Optional) Deletes a VLAN or trunk mode.
native-vlan
Specifies a native VLAN.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure access mode for a Cisco access point.
Switch# ap name AP2 ethernet 0 mode access 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
518
ap name ethernet duplex
ap name ethernet duplex
To configure the Ethernet port duplex and speed settings of the lightweight access points, use the ap name
ethernet duplex command.
ap name ap-name ethernet duplex {auto| full| half} speed{10| 100| 1000| auto}
Syntax Description
ap-name
Name of the Cisco access point.
auto
Specifies the Ethernet port duplex auto settings.
full
Specifies the Ethernet port duplex full settings.
half
Specifies the Ethernet port duplex half settings.
speed
Specifies the Ethernet port speed settings.
10
Specifies the Ethernet port speed to 10 Mbps.
100
Specifies the Ethernet port speed to 100 Mbps.
1000
Specifies the Ethernet port speed to 1000 Mbps.
auto
Specifies the Ethernet port setting for all connected access points.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Ethernet port to full duplex and 1 Gbps for an access point:
Switch# ap name AP2 ethernet duplex full 1000
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
519
ap name key-zeroize
ap name key-zeroize
To enable the FIPS key-zeroization on an Access Point, use the ap name<AP name> key-zeroizecommand.
ap nameap-name key-zeroize
Syntax Description
ap- name
Name of the Cisco lightweight access point.
key-zeroize
Instructs the access point to enable the FIPS key-zeroization on AP.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable FIPS key-zeroization.
Switchap name <AP Name> key-zeroize
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
520
ap name image
ap name image
To configure an image on a specific access point, use the ap name image command.
ap name ap-name image {predownload| swap}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
predownload
Instructs the access point to start the image predownload.
swap
Instructs the access point to swap the image.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to predownload an image to an access point:
Switch# ap name AP2 image predownload
This example shows how to swap an access point’s primary and secondary images:
Switch# ap name AP2 image swap
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
521
ap name ipv6 tcp adjust-mss
ap name ipv6 tcp adjust-mss
To configure IPv6 TCP maximum segment size (MSS) value for a Cisco AP, use the ap name ipv6 tcp
adjust-mss command.
ap name ap-name ipv6 tcp adjust-mss size
ap name ap-name no ipv6 tcp adjust-mss
Syntax Description
ap-name
Name of the Cisco AP.
adjust-mss
Configures IPv6 TCP MSS settings for all Cisco APs.
size
MSS value in the range of 500 to 1440.
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The MSS value must be in the range of 500 to 1440.
Examples
This example shows how to configure the IPv6 TCP MSS value to 600 for a Cisco access point AP01:
Switch# ap name AP01 ipv6 tcp adjust-mss 600
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
522
ap name jumbo mtu
ap name jumbo mtu
To configure the Jumbo MTU support, use the ap name<AP name>jumbo-mtucommand.
ap nameap-name {jumbo-mtu| no jumbo-mtu}
Syntax Description
ap- name
Name of the Cisco lightweight access point.
jumbo-mtu
Instructs the access point to enable the Jumbo MTU support.
no jumbo-mtu
Instructs the access point to disable the Jumbo MTU support.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Jumbo MTU support.
Switchap name <AP Name> jumbo-mtu
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
523
ap name lan
ap name lan
To configure LAN port configurations for APs, use the ap name lan command. To remove LAN port
configurations for APs, use theap name no lan command.
ap name ap-name [ no ]lan port-id port-id {shutdown|vlan-access}
Syntax Description
no
Removes LAN port configurations.
port-id
Configures the port.
port-id
The ID of the port. The range is 1-4
shotdown
Disables the Port.
vlan-access
Enables VLAN access to Port.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to enable VLAN access to port:
Switch# ap name AP1 lan port-id 1 vlan-access
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
524
ap name led
ap name led
To enable the LED state for an access point, use the ap name led command. To disable the LED state for
an access point, use the no form of this command.
ap name ap-name led
no ap name ap-name [led] led
Syntax Description
ap-name
Name of the Cisco lightweight access point.
led
Enables the access point’s LED state.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the LED state for an access point:
Switch# ap name AP2 led
This example shows how to disable the LED state for an access point:
Switch# ap name AP2 no led
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
525
ap name link-encryption
ap name link-encryption
To enable Datagram Transport Layer Security (DTLS) data encryption for specific Cisco lightweight access
points, use the ap name link-encryption command. To disable DTLS data encryption for specific Cisco
lightweight access points, use the no form of this command.
ap name ap-name link-encryption
ap name ap-name no link-encryption
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable data encryption for an access point:
Switch# ap name AP02 link-encryption
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
526
ap name link-latency
ap name link-latency
To enable link latency for a specific Cisco lightweight access point that is currently associated to the switch,
use the ap name link-latency command. To disable link latency for a specific Cisco lightweight access point
that is currently associated to the switch, use the no form of this command.
ap name ap-name link-latency
ap name ap-name no link-latency
Syntax Description
ap-name
Name of the Cisco lightweight access point.
Command Default
Link latency is disabled by default.
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
This command enables or disables link latency only for access points that are currently joined to the switch.
It does not apply to access points that join in the future.
Examples
This example shows how to enable link latency on access points:
Switch# ap name AP2 link-latency
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
527
ap name location
ap name location
To modify the descriptive location of a Cisco lightweight access point, use the ap name location command.
ap name ap-name location location
Syntax Description
ap-name
Name of the Cisco lightweight access point.
location
Location name of the access point (enclosed by double quotation marks).
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco lightweight access point must be disabled before changing this parameter.
Examples
This example shows how to configure the descriptive location for access point AP1:
Switch# ap name AP1 location Building1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
528
ap name mgmtuser
ap name mgmtuser
To configure the username, password, and secret password for access point management, use the ap name
mgmtuser command. To force a specific access point to use the switch’s global credentials, use the no form
of this command.
ap name ap-name mgmtuser username username password password secret secret
ap name ap-name no mgmtuser
Syntax Description
ap-name
Name of the Cisco lightweight access point.
username
Specifies the username for access point management.
username
Management username.
password
Specifies the password for access point management.
password
Access point management password.
secret
Specifies the secret password for privileged access point management.
secret
Access point management secret password.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
To specify a strong password, you should adhere to the following requirements:
• The password should contain characters from at least three of the following classes: lowercase letters,
uppercase letters, digits, and special characters.
• No character in the password can be repeated more than three times consecutively.
• The password cannot contain a management username or the reverse of a username.
• The password cannot contain words such as Cisco, oscic, admin, nimda or any variant obtained by
changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for
s.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
529
ap name mgmtuser
The following requirement is enforced on the secret password:
• The secret password cannot contain characters from at least three of the following classes: lowercase
letters, uppercase letters, digits, or special characters.
Examples
This example shows how to add a username, password, and secret password for access point management:
Switch# ap name AP01 mgmtuser username acd password Arc_1234 secret Mid_1234
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
530
ap name mode
ap name mode
To change a Cisco switch communication option for an individual Cisco lightweight access point, use the
ap name mode command.
ap name ap-name mode{local submode{none| wips}| monitor submode{none| wips}| rogue| se-connect|
sniffer}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
local
Converts from an indoor mesh access point (MAP or RAP) to a nonmesh
lightweight access point (local mode).
submode
Specifies wIPS submode on an access point.
none
Disables the wIPS on an access point.
monitor
Specifies monitor mode settings.
wips
Enables the wIPS submode on an access point.
rogue
Enables wired rogue detector mode on an access point.
se-connect
Enables spectrum expert mode on an access point.
sniffer
Enables wireless sniffer mode on an access point.
Command Default
Local
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
The sniffer mode captures and forwards all the packets from the clients on that channel to a remote machine
that runs AiroPeek or other supported packet analyzer software. It includes information on the timestamp,
signal strength, packet size and so on.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
531
ap name mode
Examples
This example shows how to set the switch to communicate with access point AP01 in local mode:
Switch# ap name AP01 mode local submode none
This example shows how to set the switch to communicate with access point AP01 in a wired rogue access
point detector mode:
Switch# ap name AP01 mode rogue
This example shows how to set the switch to communicate with access point AP02 in wireless sniffer mode:
Switch# ap name AP02 mode sniffer
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
532
ap name monitor-mode
ap name monitor-mode
To configure Cisco lightweight access point channel optimization, use the ap name monitor-mode command.
ap name ap-name monitor-mode {no-optimization| tracking-opt| wips-optimized}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
no-optimization
Specifies no channel scanning optimization for the access point.
tracking-opt
Enables tracking optimized channel scanning for the access point.
wips-optimized
Enables wIPS optimized channel scanning for the access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a Cisco wireless intrusion prevention system (wIPS) monitor mode on
access point AP01:
Switch# ap name AP01 monitor-mode wips
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
533
ap name monitor-mode dot11b
ap name monitor-mode dot11b
To configures 802.11b scanning channels for a monitor-mode access point, use the ap name monitor-mode
dot11b command.
ap name ap-name monitor-mode dot11b fast-channel channel1 [channel2] [channel3] [channel4]
Syntax Description
ap-name
Name of the access point.
fast-channel
Specifies the 2.4 GHz band scanning channel (or channels) for a
monitor-mode access point.
channel1
Scanning channel1.
channel2
(Optional) Scanning channel2.
channel3
(Optional) Scanning channel3.
channel4
(Optional) Scanning channel4.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure an access point in tracking optimized mode to listen to channels 1, 6,
and 11:
Switch# ap name AP01 monitor-mode dot11b fast-channel 1 6 11
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
534
ap name name
ap name name
To modify the name of a Cisco lightweight access point, use the ap name name command.
ap name ap-name name new-name
Syntax Description
ap-name
Current Cisco lightweight access point name.
new-name
Desired Cisco lightweight access point name.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to modify the name of access point AP1 to AP2:
Switch# ap name AP1 name AP2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
535
ap name no dot11 shutdown
ap name no dot11 shutdown
To enable radio transmission for an individual Cisco radio on an 802.11 network, use the ap name no dot11
shutdown command.
ap name ap-name no dot11{24ghz| 5ghz} shutdown
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz radios.
5ghz
Specifies the 5 GHz radios.
Command Default
The transmission is enabled for the entire network by default.
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Note
Use this command with the ap name Cisco-AP dot11 5ghz shutdown command when configuring 802.11
settings.
This command can be used any time that the CLI interface is active.
Examples
This example shows how to enable radio transmission on the 5 GHz band for access point AP1:
Switch# ap name AP1 no dot11 5ghz shutdown
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
536
ap name power
ap name power
To enable the Cisco Power over Ethernet (PoE) feature for access points, use the ap name power command.
To disable the Cisco PoE feature for access points, use the no form of this command.
ap name ap-name power {injector| pre-standard}
ap name ap-name no power {injector| pre-standard}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
injector
Specifies the power injector state for an access point.
pre-standard
Enables the inline power Cisco prestandard switch state for an access
point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the power injector state for all access points:
Switch# ap name AP01 power injector
This example shows how to enable the inline power Cisco prestandard switch state for access point AP02:
Switch# ap name AP02 power pre-standard
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
537
ap name shutdown
ap name shutdown
To disable a Cisco lightweight access point, use the ap name shutdown command. To enable a Cisco
lightweight access point, use the no form of this command.
ap name ap-name shutdown
ap name ap-name no shutdown
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example how to disable a specific Cisco lightweight access point:
Switch# ap name AP2 shutdown
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
538
ap name slot shutdown
ap name slot shutdown
To disable a slot on a Cisco lightweight access point, use the ap name slot shutdown command. To enable
a slot on a Cisco lightweight access point, use the no form of the command.
ap name ap-name slot {0| 1| 2| 3} shutdown
ap name ap-name no slot {0| 1| 2| 3} shutdown
Syntax Description
ap-name
Name of the Cisco lightweight access point.
0
Enables slot number 0 on a Cisco lightweight access point.
1
Enables slot number 1 on a Cisco lightweight access point.
2
Enables slot number 2 on a Cisco lightweight access point.
3
Enables slot number 3 on a Cisco lightweight access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable slot 0 on a Cisco access point named TSIM_AP2:
Switch# ap name TSIM_AP2 no slot 0 shutdown
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
539
ap name sniff
ap name sniff
To enable sniffing on an access point, use the ap name sniff command. To disable sniffing on an access
point, use the no form of this command.
ap name ap-name sniff {dot11a| dot11b}
ap name ap-name no sniff {dot11a| dot11b}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
dot11a
Specifies the 2.4 GHz band.
dot11b
Specifies the 5 GHz band.
channel
Valid channel to be sniffed. For the 5 GHz band, the range is 36 to 165.
For the 2.4 GHz band, the range is 1 to 14.
server-ip-address
IP address of the remote machine running Omnipeek, Airopeek, AirMagnet,
or Wireshark software.
Command Default
Channel 36
Command Modes
Any command mode
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
When the sniffer feature is enabled on an access point, it starts sniffing the signal on the given channel. It
captures and forwards all the packets to the remote computer that runs Omnipeek, Airopeek, AirMagnet, or
Wireshark software. It includes information about the timestamp, signal strength, packet size and so on.
Before an access point can act as a sniffer, a remote computer that runs one of the listed packet analyzers must
be set up so that it can receive packets that are sent by the access point.
Examples
This example shows how to enable the sniffing on the 5 GHz band for an access point on the primary wireless
LAN controller:
Switch# ap name AP2 sniff dot11a 36 192.0.2.54
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
540
ap name ssh
ap name ssh
To enable Secure Shell (SSH) connectivity on a specific Cisco lightweight access point, use the ap name
ssh command. To disable SSH connectivity on a specific Cisco lightweight access point, use the no form of
this command.
ap name ap-name ssh
ap name ap-name no ssh
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The Cisco lightweight access point associates with this Cisco switch for all network operations and in the
event of a hardware reset.
Examples
This example shows how to enable SSH connectivity on access point Cisco_ap2:
Switch# ap name Cisco_ap2 ssh
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
541
ap name telnet
ap name telnet
To enable Telnet connectivity on an access point, use the ap name telnet command. To disable Telnet
connectivity on an access point, use the no form of this command.
ap name ap-name telnet
ap name ap-name no telnet
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable Telnet connectivity on access point cisco_ap1:
Switch# ap name cisco_ap1 no telnet
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
542
ap name power injector
ap name power injector
To configure the power injector state for an access point, use the ap name power injector command. To
disable the Cisco Power over Ethernet (PoE) feature for access points, use the no form of this command.
ap name ap-name power injector {installed| override| switch-mac-address switch-MAC-address}
ap name ap-name no power injector
Syntax Description
ap-name
Name of he Cisco lightweight access point.
installed
Detects the MAC address of the current switch port that has a power
injector.
override
Overrides the safety checks and assumes a power injector is always
installed.
switch-mac-address
Specifies the MAC address of the switch port with an installed power
injector.
switch-MAC-address
MAC address of the switch port with an installed power injector.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the power injector state for an access point:
Switch# ap name AP01 power injector switch-mac-address aaaa.bbbb.cccc
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
543
ap name power pre-standard
ap name power pre-standard
To enable the inline power Cisco prestandard switch state for an access point, use the ap name power
pre-standard command. To disable the inline power Cisco prestandard switch state for an access point, use
the no form of this command.
ap name ap-name power pre-standard
ap name ap-name no power pre-standard
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the inline power Cisco prestandard switch state for access point AP02:
Switch# ap name AP02 power pre-standard
This example shows how to disable the inline power Cisco prestandard switch state for access point AP02:
Switch# ap name AP02 no power pre-standard
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
544
ap name reset-button
ap name reset-button
To configure the Reset button for an access point, use the ap name reset-button command.
ap name ap-name reset-button
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the Reset button for access point AP03:
Switch# ap name AP03 reset-button
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
545
ap name reset
ap name reset
To reset a specific Cisco lightweight access point, use the ap name reset command.
ap name ap-name reset
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to reset a Cisco lightweight access point named AP2:
Switch# ap name AP2 reset
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
546
ap name slot
ap name slot
To configure various slot parameters, use the ap name slot command. To disable a slot on a Cisco lightweight
access point, use the no form of this command.
ap name ap-name slot slot-number {channel {global| number channel-number| width channel-width}|
rtsthreshold value| shutdown| txpower {global| channel-level}}
ap name ap-name no slot {0| 1| 2| 3} shutdown
Syntax Description
ap-name
Name of the Cisco access point.
slot-number
Slot downlink radio to which the channel is assigned. You can specify the
following slot numbers:
• 0—Enables slot number 0 on a Cisco lightweight access point.
• 1—Enables slot number 1 on a Cisco lightweight access point.
• 2—Enables slot number 2 on a Cisco lightweight access point.
• 3—Enables slot number 3 on a Cisco lightweight access point.
Command Default
channel
Specifies the channel for the slot.
global
Specifies channel global properties for the slot.
number
Specifies the channel number for the slot.
channel-number
Channel number from 1 to 169.
width
Specifies the channel width for the slot.
channel-width
Channel width from 20 to 40.
rtsthreshold
Specifies the RTS/CTS threshold for an access point.
value
RTS/CTS threshold value from 0 to 65535.
shutdown
Shuts down the slot.
txpower
Specifies Tx power for the slot.
global
Specifies auto-RF for the slot.
channel-level
Transmit power level for the slot from 1 to 7.
None
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
547
ap name slot
Command Modes
Command History
Examples
Any command mode
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable slot 3 for the access point abc:
Switch# ap name abc slot 3
This example shows how to configure RTS for the access point abc:
Switch# ap name abc slot 3 rtsthreshold 54
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
548
ap name static-ip
ap name static-ip
To configure lightweight access point static IP settings, use the ap name static-ip command. To disable the
Cisco lightweight access point static IP address, use the no form of this command.
ap name ap-name static-ip {domain domain-name| ip-address ip-address netmask netmask gateway
gateway| nameserver ip-address}
ap name ap-name no static-ip
Syntax Description
ap-name
Name of the access point.
domain
Specifies the Cisco access point domain name.
domain-name
Domain to which a specific access point belongs.
ip-address
Specifies the Cisco access point static IP address.
ip-address
Cisco access point static IP address.
netmask
Specifies the Cisco access point static IP netmask.
netmask
Cisco access point static IP netmask.
gateway
Specifies the Cisco access point gateway.
gateway
IP address of the Cisco access point gateway.
nameserver
Specifies a DNS server so that a specific access point can discover the
switch using DNS resolution.
ip-address
IP address of the DNS server.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
549
ap name static-ip
Usage Guidelines
Examples
An access point cannot discover the switch using Domain Name System (DNS) resolution if a static IP address
is configured for the access point unless you specify a DNS server and the domain to which the access point
belongs.
This example shows how to configure an access point static IP address:
Switch# ap name AP2 static-ip ip-address 192.0.2.54 netmask 255.255.255.0 gateway 192.0.2.1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
550
ap name stats-timer
ap name stats-timer
To set the time in seconds that the Cisco lightweight access point sends its DOT11 statistics to the Cisco
switch, use the ap name stats-timer command.
ap name ap-name stats-timer timer-value
Syntax Description
ap-name
Name of the Cisco lightweight access point.
timer-value
Time in seconds from 0 to 65535. A zero value disables the timer.
Command Default
0 (Disabled).
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
A value of 0 (zero) means that the Cisco lightweight access point does not send any DOT11 statistics. The
acceptable range for the timer is from 0 to 65535 seconds, and the Cisco lightweight access point must be
disabled to set this value.
Examples
This example shows how to set the stats timer to 600 seconds for access point AP2:
Switch# ap name AP2 stats-timer 600
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
551
ap name syslog host
ap name syslog host
To configure a syslog server for a specific Cisco lightweight access point, use the ap name syslog host
command.
ap name ap-name syslog host syslog-host-ip-address
Syntax Description
ap-name
Name of the Cisco lightweight access point.
syslog-host-ip-address
IP address of the syslog server.
Command Default
255.255.255.255
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
By default, the syslog server IP address for each access point is 255.255.255.255, which indicates that it is
not yet set. When the default value is used, the global access point syslog server IP address is pushed to the
access point.
Examples
This example shows how to configure a syslog server:
Switch# ap name AP2 syslog host 192.0.2.54
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
552
ap name syslog level
ap name syslog level
To configure the system logging level, use the ap name syslog level command.
ap name ap-name syslog level {alert| critical| debug| emergency| errors| information| notification|
warning}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
alert
Specifies alert level system logging.
critical
Specifies critical level system logging.
debug
Specifies debug level system logging.
emergency
Specifies emergency level system logging.
errors
Specifies error level system logging.
information
Specifies information level system logging.
notification
Specifies notification level system logging.
warning
Specifies warning level system logging.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure alert level system logging:
Switch# ap name AP2 syslog level alert
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
553
ap name tcp-adjust-mss
ap name tcp-adjust-mss
To enable or disable the TCP maximum segment size (MSS) on a particular access point, use the ap name
tcp-adjust-mss command. To disable the TCP maximum segment size (MSS) on a particular access point,
use the no form of this command.
ap name ap-name tcp-adjust-mss size size
ap name ap-name no tcp-adjust-mss
Syntax Description
ap-name
Name of the access point.
size
Maximum segment size, from 536 to 1363 bytes.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When you enable this feature, the access point checks for TCP packets to and from wireless clients in its data
path. If the MSS of these packets is greater than the value that you configured or greater than the default value
for the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel, the access point changes the
MSS to the new configured value. If the MSS of these packets is greater than the value that you have configured
or greater than the default value for the CAPWAP tunnel, the access point changes the MSS to the newly
configured value.
Examples
This example shows how to enable the TCP MSS on access point Cisco_ap1:
Switch# ap name ciscoap tcp-adjust-mss size 1200
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
554
ap name tftp-downgrade
ap name tftp-downgrade
To configure the settings used for downgrading a lightweight access point to an autonomous access point,
use the ap name tftp-downgrade command.
ap name ap-name tftp-downgrade tftp-server-ip filename
Syntax Description
ap-name
Name of the Cisco lightweight access point.
tftp-server-ip
IP address of the TFTP server.
filename
Filename of the access point image file on the TFTP server.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the settings for downgrading access point AP1:
Switch# ap name Ap01 tftp-downgrade 172.21.12.45 ap3g1-k9w7-tar.124-25d.JA.tar
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
555
ap power injector
ap power injector
To configure the power injector state for all the Cisco lightweight access points that are joined to the switch,
use the ap power injector command. To delete the power injector state for all access points, use the no form
of this command.
ap power injector {installed| override| switch-mac-address switch-MAC-addr}
no ap power injector
Syntax Description
installed
Detects the MAC address of the current switch port that has a power
injector.
override
Overrides the safety checks and assumes a power injector is always
installed.
switch-mac-address
Specifies the MAC address of the switch port with an installed power
injector.
switch-MAC-address
Specifies the MAC address of the switch port with an installed power
injector.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the power injector state for all the Cisco lightweight access points that are
joined to the switch:
Switch(config)# ap power injector switch-mac-address aaaa.bbbb.cccc
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
556
ap power pre-standard
ap power pre-standard
To set the Cisco lightweight access points that are joined to the switch to be powered by a high-power Cisco
switch, use the ap power pre-standard command. To disable the pre standard power for all access points,
use the no form of this command.
ap power pre-standard
no ap power pre-standard
Syntax Description
This command has no keywords and arguments.
Command Default
Disabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to enable the inline power Cisco prestandard switch state for access point AP02:
Controller(config)# ap power pre-standard
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
557
ap reporting-period
ap reporting-period
To configure the access point rogue/error reporting period, use the ap reporting-period command. To
disable the access point rogue/error reporting period, use the no form of this command.
ap reporting-period value
no ap reporting-period
Syntax Description
value
Command Default
None
Command Modes
Global configuration
Command History
Examples
Time period in seconds from 10 to 120.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example show how to configure the access point rogue/error reporting:
Switch(config)# ap reporting-period 100
This example show how to disable the access point rogue/error reporting:
Switch(config)# no ap reporting-period 100
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
558
ap reset-button
ap reset-button
To configure the Reset button for all Cisco lightweight access points that are joined to the switch, use the ap
reset-button command. To disable the Reset button for all access points, use the no form of this command.
ap reset-button
no ap reset-button
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the Reset button for all access points that are joined to the controller:
Switch(config)# ap reset-button
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
559
service-policy type control subscriber
service-policy type control subscriber
To apply the global subscriber control policy, use the service-policy type control subscriber
<subscriber-policy-name>command.
service-policytypecontrolsubscriber<subscriber-policy-name>
Syntax Description
service-policy
Instructs the access point to apply global subscriber control
policy.
<subscriber-policy-name>
Name of the subscriber policy.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable the global subscriber control policy.
Switchno service-policy type control subscriber
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
560
ap static-ip
ap static-ip
To configure Cisco lightweight access point static IP address settings, use the ap static-ip command. To
disable access point static IP settings, use the no form of this command.
ap static-ip {domain domain-name| name-server ip-address}
no ap static-ip {domain| name-server}
Syntax Description
domain
Specifies the domain to which a specific access point or all access points
belong.
domain-name
Domain name.
name-server
Specifies a DNS server so that a specific access point or all access points
can discover the switch using DNS resolution.
ip-address
DNS server IP address.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
An access point cannot discover the switch using Domain Name System (DNS) resolution if a static IP address
is configured for the access point, unless you specify a DNS server and the domain to which the access point
belongs.
Examples
This example shows how to configure a static IP address for all access points:
Switch(config)# ap static-ip domain cisco.com
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
561
ap syslog
ap syslog
To configure the system logging settings for all Cisco lightweight access points that are joined to the switch,
use the ap syslog command.
ap syslog {host ipaddress| level{alert| critical| debug| emergency| errors| information| notification|
warning}}
Syntax Description
host
Specifies a global syslog server for all access points that join the switch.
ipaddress
IP address of the syslog server.
level
Specifies the system logging level for all the access points joined to the switch.
alert
Specifies alert level system logging for all Cisco access points.
critical
Specifies critical level system logging for all Cisco access points.
debug
Specifies debug level system logging for all Cisco access points.
emergency
Specifies emergency level system logging for all Cisco access points.
errors
Specifies errors level system logging for all Cisco access points.
information
Specifies information level system logging for all Cisco access points.
notification
Specifies notification level system logging for all Cisco access points.
warning
Specifies warning level system logging for all Cisco access points.
Command Default
None
Command Modes
Global configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
By default, the global syslog server IP address for all access points is 255.255.255.255. Make sure that the
access points can reach the subnet on which the syslog server resides before configuring the syslog server on
the switch. If the access points cannot reach this subnet, the access points are unable to send out syslog
messages.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
562
ap syslog
Examples
This example shows how to configure a global syslog server for all access points:
Switch(config)# ap syslog host 172.21.34.45
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
563
ap name no controller
ap name no controller
To change the order of configured primary, secondary and tertiary wireless LAN controllers use the following
commands.
ap nameap-name no controller primary
ap nameap-name no controller secondary
ap nameap-name no controller tertiary
Syntax Description
ap- name
Name of the Cisco lightweight access point.
no controller primary
Instructs the access point to unconfigure the primary controller.
no controller secondary
Instructs the access point to unconfigure the secondary controller.
no controller tertiary
Instructs the access point to unconfigure the tertiary controller.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
If you have the primary, secondary, and tertiary wireless LAN controllers configured for an access point and
you require swap the controller names and the corresponding IP addresses you can uncofigure the primary
and configure the secondary controller.
Examples
This example shows how to unconfigure the primary controller.
Switchap name <AP Name> no controller primary.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
564
ap tcp-adjust-mss size
ap tcp-adjust-mss size
To enable the TCP maximum segment size (MSS) on all Cisco lightweight access points, use the ap
tcp-adjust-mss size command. To disable the TCP maximum segment size (MSS) on all Cisco lightweight
access points no form of this command.
ap tcp-adjust-mss size size
no ap tcp-adjust-mss
Syntax Description
size
Command Default
None
Command Modes
Global configuration
Command History
Maximum segment size, from 536 to 1363 bytes.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When you enable this feature, the access point checks for TCP packets to and from wireless clients in its data
path. If the MSS of these packets is greater than the value that you configured or greater than the default value
for the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel, the access point changes the
MSS to the new configured value.
Examples
This example shows how to enable the TCP MSS on all access points with a segment size of 1200:
Switch(config)# ap tcp-adjust-mss 1200
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
565
ap tftp-downgrade
ap tftp-downgrade
To configure the settings used for downgrading a lightweight access point to an autonomous access point,
use the ap tftp-downgrade command. To disable the settings used for downgrading a lightweight access
point to an autonomous access point, use the no form of this command.
ap tftp-downgrade tftp-server-ip filename
no ap tftp-downgrade
Syntax Description
tftp-server-ip
IP address of the TFTP server.
filename
Filename of the access point image file on the TFTP server.
Command Default
None
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure the settings for downgrading all access points:
Switch(config)# ap tftp-downgrade 172.21.23.45 ap3g1-k9w7-tar.124-25d.JA.tar
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
566
config wireless wps rogue client mse
config wireless wps rogue client mse
To configure a rogue MSE client, use wirelesswps rogueclientmsecommand.
To view the summary of the wireless client statistics, use show wirelessclientclient-statisticssummary
command.
wirelesswpsrogueclientmse
showwirelessclientclient-statisticssummary
Syntax Description
rogueclient mse
Instructs the access point to enable configuring a rogue MSE client.
nowireless wps
Instructs the access point to disable the configuring a rogue MSE
client.
client-statisticssummary
Instructs to view the summary of the wireless client statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a rogue MSE client.
Switchwireless wps rogue client mse
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
567
clear ap name tsm dot11 all
clear ap name tsm dot11 all
To clear the traffic stream metrics (TSM) statistics for a particular access point or all the access points, use
the clear ap name tsm dot11 all command.
clear ap name ap-name tsm dot11 {24ghz| 5ghz} all
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
all
Specifies all access points.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the TSM statistics for an access point on the 2.4 GHz band:
Switch# clear ap name AP1 tsm dot11 24ghz all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
568
clear ap config
clear ap config
To clear (reset to the default values) a lightweight access point’s configuration settings, use the clear ap
config command.
clear ap config ap-name [eventlog| keep-ip-config]
Syntax Description
ap-name
Name of the Cisco lightweight access point.
eventlog
(Optional) Deletes the existing event log and creates an empty event log file
for a specific access point or for all access points joined to the switch.
keep-ip-config
(Optional) Specifies not to erase the static IP configuration of the Cisco access
point.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Entering this command does not clear the static IP address of the access point.
Examples
This example shows how to clear the access point’s configuration settings for the access point named AP01:
Switch# clear ap config AP01
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
569
clear ap eventlog-all
clear ap eventlog-all
To delete the existing event log and create an empty event log file for all access points, use the clear ap
eventlog-all command.
clear ap eventlog-all
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to delete the event log for all access points:
Switch# clear ap eventlog-all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
570
clear ap join statistics
clear ap join statistics
To clear the join statistics for all access points or for a specific access point, use the clear ap join statistics
command.
clear ap join statistics
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the join statistics of all the access points:
Switch# clear ap join statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
571
clear ap mac-address
clear ap mac-address
To clear the MAC address for the join statistics for a specific Cisco lightweight access point, use the clear
ap mac-address command.
clear ap mac-address mac join statistics
Syntax Description
mac
Access point MAC address.
join statistics
Clears join statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the join statistics of an access point:
Switch# clear ap mac-address aaaa.bbbb.cccc join statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
572
clear ap name wlan statistics
clear ap name wlan statistics
To clear WLAN statistics, use the clear ap name wlan statistics command.
clear ap name ap-name wlan statistics
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to clear the WLAN configuration elements of the access point cisco_ap:
Switch# clear ap name cisco_ap wlan statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
573
debug ap mac-address
debug ap mac-address
To enable debugging of access point on the mac-address, use the debug ap mac-address command.
debug ap mac-address mac-address
no debug ap mac-address mac-address
Syntax Description
mac-address
Command Default
None
Command Modes
Any command mode
Command History
Examples
Access point Ethernet MAC address or the MAC address of the 802.11 radio
interface.
Release
Modification
10.3Cisco IOS XE 3.3 SE
This command was introduced.
This example shows how to enable debugging mac-address on an AP :
Switch# debug ap mac-address
ap mac-address debugging is on
Examples
This example shows how to disable debugging mac-address on an AP :
Switch# no debug ap mac-address
ap mac-address debugging is off
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
574
show ap cac voice
show ap cac voice
To display the list of all access points with brief voice statistics, which include bandwidth used, maximum
bandwidth available, and the call information, use the show ap cac voice command.
show ap cac voice
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display voice CAC details that correspond to Cisco lightweight access points:
controller# show ap cac voice
1) AP Name: AP01
=============================
Wireless Bandwidth (In MeanTime mt)
Slot# Radio
Calls BW-Max BW-Alloc Bw-InUse (%age)
-----------------------------------------------------------------1
0
802.11b/g
0
23437
0
0
2
1
802.11a
0
23437
0
0
Wired Bandwidth (in Kbps)
Slot# Wlan-ID Wlan-Name
BW-Config
BW-Avail
----------------------------------------------------------------1
0
1
maria-open
0
0
2
0
12
24
0
0
3
1
1
maria-open
0
0
4
1
12
24
0
0
2) AP Name: AP02
=============================
Wireless Bandwidth (In MeanTime mt)
Slot# Radio
Calls BW-Max BW-Alloc Bw-InUse (%age)
-----------------------------------------------------------------1
0
802.11b/g
0
23437
0
0
2
1
802.11a
0
23437
0
0
Wired Bandwidth (in Kbps)
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
575
show ap cac voice
Slot# Wlan-ID Wlan-Name
BW-Config
BW-Avail
----------------------------------------------------------------1
0
1
maria-open
0
0
2
0
12
24
0
0
3
1
1
maria-open
0
0
4
1
12
24
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
576
show ap capwap
show ap capwap
To display the Control and Provisioning of Wireless Access Points (CAPWAP) configuration that is applied
to all access points, use the show ap capwap command.
show ap capwap {retransmit| timers| summary}
Syntax Description
retransmit
Displays the access point CAPWAP retransmit parameters.
timers
Displays the rogue access point entry timers.
summary
Displays the network configuration of the Cisco switch.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the access point CAPWAP retransmit parameters:
Controller# show ap capwap retransmit
Global control packet retransmit interval : 3
Global control packet retransmit count : 5
AP Name
Retransmit Interval
Retransmit Count
--------------------------------------------------------------------------------AP01
3
5
AP02
3
5
AP03
3
5
AP04
3
5
AP05
3
5
AP07
3
5
AP08
3
5
AP09
3
5
AP10
3
5
AP11
3
5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
577
show ap capwap
AP12
3
5
This example shows how to display the rogue access point entry timers:
Controller# show ap capwap timers
AP Discovery timer
AP Heart Beat timeout
Primary Discovery timer
Primed Join timeout
Fast Heartbeat
Fast Heartbeat timeout
:
:
:
:
:
:
10
30
120
0
Disabled
1
This example shows how to display the the network configuration of the Cisco switch:
Controller# show ap capwap summary
AP Fallback
AP Join Priority
AP Master
Primary backup Controller Name
Primary backup Controller IP
Secondary backup Controller Name
Secondary backup Controller IP
:
:
:
:
:
:
:
Enabled
Disabled
Disabled
0.0.0.0
0.0.0.0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
578
show ap cdp
show ap cdp
To display the Cisco Discovery Protocol (CDP) information for all Cisco lightweight access points that are
joined to the switch, use the show ap cdp command.
show ap cdp [neighbors [detail]]
Syntax Description
neighbors
(Optional) Displays neighbors using CDP.
detail
(Optional) Displays details about a specific access point neighbor that is
using CDP.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CDP status of all access points:
Switch# show ap cdp
This example shows how to display details about all neighbors that are using CDP:
Switch# show ap cdp neighbors
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
579
show ap config dot11
show ap config dot11
To display the detailed configuration of 802.11-58G radios on Cisco lightweight access points, use the show
ap config dot11 command.
show ap config dot11 58ghz summary
Syntax Description
58ghz
Displays the 802.11-58G radios.
summary
Displays a summary of the radios on the access points.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the detailed configuration of 802.11a-58G radios on access points:
Switch# show ap config dot11 58ghz summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
580
show ap config dot11 dual-band summary
show ap config dot11 dual-band summary
To view a summary of configuration settings for dual band radios of Cisco APs, use the show ap config dot11
dual-band summary command.
show ap config dot11 dual-band summary
Syntax Description
dual-band
Specifies the dual band radio.
summary
Displays a summary of configuration settings for dual band radios of
Cisco APs.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
581
show ap config fnf
show ap config fnf
To view Netflow input and output monitors for all Cisco APs, use the show ap config fnf command.
show ap config fnf
Syntax Description
fnf
Command Default
None
Command Modes
Any command mode
Command History
Netflow input and output monitors for all Cisco APs.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
582
show ap config
show ap config
To display configuration settings for all access points that join the switch, use the show ap config command.
show ap config {ethernet| general| global}
Syntax Description
ethernet
Displays ethernet VLAN tagging information for all Cisco APs.
general
Displays common information for all Cisco APs.
global
Displays global settings for all Cisco APs.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display global syslog server settings:
Switch# show ap config global
AP global system logging host
: 255.255.255.255
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
583
show ap crash-file
show ap crash-file
To display the list of both crash and radio core dump files generated by lightweight access points, use the
show ap crash-file command.
show ap crash-file
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the crash file generated by the access point:
Switch# show ap crash-file
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
584
show ap data-plane
show ap data-plane
To display the data plane status, use the show ap data-plane command.
show ap data-plane
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example show how to display the data plane status for all access points:
Switch# show ap data-plane
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
585
show ap dot11 l2roam
show ap dot11 l2roam
To display 802.11a or 802.11b/g Layer 2 client roaming information, use the show ap dot11 l2roam
command.
show ap dot11 {24ghz| 5ghz} l2roam {mac-address mac-address statistics| rf-param| statistics}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
mac-address mac-address statistics
Specifies the MAC address of a Cisco lightweight access point.
rf-param
Specifies the Layer 2 frequency parameters.
statistics
Specifies the Layer 2 client roaming statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display 802.11b Layer 2 client roaming information:
Switch# show ap dot11 24ghz l2roam rf-param
L2Roam 802.11bg RF Parameters
Config Mode
: Default
Minimum RSSI
: -85
Roam Hysteresis
: 2
Scan Threshold
: -72
Transition time
: 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
586
show ap dot11 cleanair air-quality
show ap dot11 cleanair air-quality
To display the air-quality summary information and air-quality worst information for the 802.11 networks,
use the show ap dot11 cleanair air-quality command.
show ap dot11 {24ghz| 5ghz} cleanair air-quality {summary| worst}
Syntax Description
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
summary
Displays a summary of 802.11 radio band air-quality information.
worst
Displays the worst air-quality information for 802.11 networks.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the worst air-quality information for the 5 GHz band:
Switch# show ap dot11 5ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel Avg AQ Min AQ Interferers DFS
------------ ------- ------ ------ ----------- ----CISCO_AP3500 36
95
70
0
40
This example shows how to display the worst air-quality information for the 2.4 GHz band:
Switch# show ap dot11 24ghz cleanair air-quality worst
AQ = Air Quality
DFS = Dynamic Frequency Selection
AP Name
Channel Avg AQ Min AQ Interferers DFS
------------ ------- ------ ------ ----------- ----CISCO_AP3500 1
83
57
3
5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
587
show ap dot11 cleanair config
show ap dot11 cleanair config
To display the CleanAir configuration for the 802.11 networks, use the show ap dot11 cleanair config
command.
show ap dot11 {24ghz| 5ghz} cleanair config
Syntax Description
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the CleanAir configuration for the 2.4 GHz band:
Switch# show ap dot11 24ghz cleanair config
Clean Air Solution...............................
Air Quality Settings:
Air Quality Reporting........................
Air Quality Reporting Period (min)...........
Air Quality Alarms...........................
Air Quality Alarm Threshold..................
Interference Device Settings:
Interference Device Reporting................
Bluetooth Link...........................
Microwave Oven...........................
802.11 FH................................
Bluetooth Discovery......................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
802.15.4.................................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
Microsoft Device.........................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Types Triggering Alarms:
Bluetooth Link...........................
Microwave Oven...........................
802.11 FH................................
: Disabled
:
:
:
:
Disabled
15
Enabled
10
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
Enabled
: Disabled
: Disabled
: Disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
588
show ap dot11 cleanair config
Bluetooth Discovery......................
TDD Transmitter..........................
Jammer...................................
Continuous Transmitter...................
DECT-like Phone..........................
Video Camera.............................
802.15.4.................................
WiFi Inverted............................
WiFi Invalid Channel.....................
SuperAG..................................
Canopy...................................
Microsoft Device.........................
WiMax Mobile.............................
WiMax Fixed..............................
Interference Device Alarms...................
Additional Clean Air Settings:
CleanAir Event-driven RRM State..............
CleanAir Driven RRM Sensitivity..............
CleanAir Persistent Devices state............
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
Enabled
Disabled
Disabled
Disabled
Disabled
Disabled
Enabled
: Disabled
: LOW
: Disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
589
show ap dot11 cleanair summary
show ap dot11 cleanair summary
To view CleanAir configurations for all 802.11a Cisco APs, use the show ap dot11 cleanair summary
command.
show ap dot11{24ghz| 5ghz} cleanair summary
Syntax Description
24ghz
Specifies the 2.4-GHz band
5ghz
Specifies the 5-GHz band
cleanair summary
Summary of CleanAir configurations for all 802.11a Cisco APs
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
590
show ap dot11
show ap dot11
To view 802.11a or 802.11b configuration information, use the show ap dot11 command.
show ap dot11{24ghz| 5ghz} {channel| coverage| group| load-info| logging| media-stream| monitor|
network| profile| receiver| service-policy| summary| txpower| ccx global}
Syntax Description
24ghz
Specifies the 2.4 GHz band.
5ghz
Specifies the 5 GHz band.
channel
Displays the automatic channel assignment configuration
and statistics.
coverage
Displays the configuration and statistics for coverage hole
detection.
group
Displays 802.11a or 802.11b Cisco radio RF grouping.
load-info
Displays channel utilization and client count information for
all Cisco APs.
logging
Displays 802.11a or 802.11b RF event and performance
logging.
media-stream
Display 802.11a or 802.11b Media Resource Reservation
Control configurations.
monitor
Displays the 802.11a or 802.11b default Cisco radio
monitoring.
network
Displays the 802.11a or 802.11b network configuration.
profile
Displays the 802.11a or 802.11b lightweight access point
performance profiles.
receiver
Displays the configuration and statistics of the 802.11a or
802.11b receiver.
service-policy
Displays the Quality of Service (QoS) service policies for
802.11a or 802.11b radio for all Cisco access points.
summary
Displays the 802.11a or 802.11b Cisco lightweight access
point name, channel, and transmit level summary.
txpower
Displays the 802.11a or 802.11b automatic transmit power
assignment.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
591
show ap dot11
ccx global
Command Default
None
Command Modes
Any command mode
Command History
Examples
Displays 802.11a or 802.11b Cisco Client eXtensions (CCX)
information for all Cisco access points that are joined to the
switch.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.3SE
The load-info parameter was added.
This example shows how to display the automatic channel assignment configuration and statistics:
Switch# show ap dot11 5ghz channel
Automatic Channel Assignment
Channel Assignment Mode
Channel Update Interval
Anchor time (Hour of the day)
Channel Update Contribution
Channel Assignment Leader
Last Run
DCA Sensitivity Level
DCA 802.11n Channel Width
Channel Energy Levels
Minimum
Average
Maximum
Channel Dwell Times
Minimum
Average
Maximum
802.11a 5 GHz Auto-RF Channel List
Allowed Channel List
57,161
Unused Channel List
65
802.11a 4.9 GHz Auto-RF Channel List
Allowed Channel List
Unused Channel List
15,16,17,18,19,20,21,22,23,24,25,26
DCA Outdoor AP option
:
:
:
:
:
:
:
:
AUTO
12 Hours
20
SNI.
web (9.9.9.2)
13105 seconds ago
MEDIUM (15 dB)
40 Mhz
: unknown
: unknown
: unknown
: unknown
: unknown
: unknown
: 36,40,44,48,52,56,60,64,149,153,1
: 100,104,108,112,116,132,136,140,1
:
: 1,2,3,4,5,6,7,8,9,10,11,12,13,14,
: Disabled
This example shows how to display the statistics for coverage hole detection:
Switch# show ap dot11 5ghz coverage
Coverage Hole Detection
802.11a Coverage Hole Detection Mode
802.11a Coverage Voice Packet Count
802.11a Coverage Voice Packet Percentage
802.11a Coverage Voice RSSI Threshold
802.11a Coverage Data Packet Count
802.11a Coverage Data Packet Percentage
802.11a Coverage Data RSSI Threshold
802.11a Global coverage exception level
:
:
:
:
:
:
:
:
Enabled
100 packet(s)
50 %
-80dBm
50 packet(s)
50 %
-80dBm
25
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
592
show ap dot11
802.11a Global client minimum exception level
: 3 clients
This example shows how to display Cisco radio RF group settings:
Switch# show ap dot11 5ghz group
Radio RF Grouping
802.11a
802.11a
802.11a
802.11a
Group
Group
Group
Group
Mode
Update Interval
Leader
Member
802.11a Last Run
:
:
:
:
STATIC
600 seconds
web (10.10.10.1)
web(10.10.10.1)
nb1(172.13.21.45) (*Unreachable)
: 438 seconds ago
Mobility Agents RF membership information
-----------------------------------------------------------No of 802.11a MA RF-members : 0
This example shows how to display 802.11a RF event and performance logging:
Switch# show ap dot11 5ghz logging
RF Event and Performance Logging
Channel Update Logging
Coverage Profile Logging
Foreign Profile Logging
Load Profile Logging
Noise Profile Logging
Performance Profile Logging
TxPower Update Logging
:
:
:
:
:
:
:
Off
Off
Off
Off
Off
Off
Off
This example shows how to display the 802.11a media stream configuration:
Switch# show ap dot11 5ghz media-stream
Multicast-direct
: Disabled
Best Effort
: Disabled
Video Re-Direct
: Disabled
Max Allowed Streams Per Radio
: Auto
Max Allowed Streams Per Client
: Auto
Max Video Bandwidth
: 0
Max Voice Bandwidth
: 75
Max Media Bandwidth
: 85
Min PHY Rate (Kbps)
: 6000
Max Retry Percentage
: 80
This example shows how to display the radio monitoring for the 802.11b network:
Switch# show ap dot11 5ghz monitor
Default 802.11a AP monitoring
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
Monitor Mode
Monitor Mode for Mesh AP Backhaul
Monitor Channels
RRM Neighbor Discover Type
AP Coverage Interval
AP Load Interval
AP Noise Interval
AP Signal Strength Interval
:
:
:
:
:
:
:
:
Enabled
disabled
Country channels
Transparent
180 seconds
60 seconds
180 seconds
60 seconds
This example shows how to display the global configuration and statistics of an 802.11a profile:
Switch#
Default
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
show ap dot11 5ghz profile
802.11a AP performance profiles
Global Interference threshold..............
Global noise threshold.....................
Global RF utilization threshold............
Global throughput threshold................
Global clients threshold...................
Global coverage threshold..................
Global coverage exception level............
Global client minimum exception lev........
10%
-70 dBm
80%
1000000 bps
12 clients
12 dB
80%
3 clients
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
593
show ap dot11
This example shows how to display the network configuration of an 802.11a profile:
Switch# show ap dot11 5ghz network
802.11a Network : Enabled
11nSupport : Enabled
802.11a Low Band : Enabled
802.11a Mid Band : Enabled
802.11a High Band : Enabled
802.11a Operational Rates
802.11a 6M : Mandatory
802.11a 9M : Supported
802.11a 12M : Mandatory
802.11a 18M : Supported
802.11a 24M : Mandatory
802.11a 36M : Supported
802.11a 48M : Supported
802.11a 54M : Supported
802.11n MCS Settings:
MCS 0 : Supported
MCS 1 : Supported
MCS 2 : Supported
MCS 3 : Supported
MCS 4 : Supported
MCS 5 : Supported
MCS 6 : Supported
MCS 7 : Supported
MCS 8 : Supported
MCS 9 : Supported
MCS 10 : Supported
MCS 11 : Supported
MCS 12 : Supported
MCS 13 : Supported
MCS 14 : Supported
MCS 15 : Supported
MCS 16 : Supported
MCS 17 : Supported
MCS 18 : Supported
MCS 19 : Supported
MCS 20 : Supported
MCS 21 : Supported
MCS 22 : Supported
MCS 23 : Supported
802.11n Status:
A-MPDU Tx:
Priority 0 : Enabled
Priority 1 : Disabled
Priority 2 : Disabled
Priority 3 : Disabled
Priority 4 : Enabled
Priority 5 : Enabled
Priority 6 : Disabled
Priority 7 : Disabled
A-MSDU Tx:
Priority 0 : Enabled
Priority 1 : Enabled
Priority 2 : Enabled
Priority 3 : Enabled
Priority 4 : Enabled
Priority 5 : Enabled
Priority 6 : Disabled
Priority 7 : Disabled
Guard Interval : Any
Rifs Rx : Enabled
Beacon Interval : 100
CF Pollable mandatory : Disabled
CF Poll Request Mandatory : Disabled
CFP Period : 4
CFP Maximum Duration : 60
Default Channel : 36
Default Tx Power Level : 1
DTPC Status : Enabled
Fragmentation Threshold : 2346
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
594
show ap dot11
Pico-Cell Status : Disabled
Pico-Cell-V2 Status : Disabled
TI Threshold : 0
Legacy Tx Beamforming setting : Disabled
Traffic Stream Metrics Status : Disabled
Expedited BW Request Status : Disabled
EDCA profile type check : default-wmm
Call Admision Control (CAC) configuration
Voice AC
Voice AC - Admission control (ACM) : Disabled
Voice Stream-Size : 84000
Voice Max-Streams : 2
Voice Max RF Bandwidth : 75
Voice Reserved Roaming Bandwidth : 6
Voice Load-Based CAC mode : Enabled
Voice tspec inactivity timeout : Enabled
CAC SIP-Voice configuration
SIP based CAC : Disabled
SIP call bandwidth : 64
SIP call bandwith sample-size : 20
Video AC
Video AC - Admission control (ACM) : Disabled
Video max RF bandwidth : Infinite
Video reserved roaming bandwidth : 0
This example shows how to display the global configuration and statistics of an 802.11a profile:
Switch#
Default
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
802.11a
show ap dot11 5ghz receiver
802.11a AP performance profiles
Global Interference threshold..............
Global noise threshold.....................
Global RF utilization threshold............
Global throughput threshold................
Global clients threshold...................
Global coverage threshold..................
Global coverage exception level............
Global client minimum exception lev........
10%
-70 dBm
80%
1000000 bps
12 clients
12 dB
80%
3 clients
This example shows how to display the global configuration and statistics of an 802.11a profile:
Switch# show ap dot11 5ghz service-policy
This example shows how to display a summary of the 802.11b access point settings:
Switch#
AP Name
------CJ-1240
CJ-1130
show ap dot11 5ghz summary
MAC Address
Admin State
----------------- ----------00:21:1b:ea:36:60 ENABLED
00:1f:ca:cf:b6:60 ENABLED
Operation State
--------------UP
UP
Channel
------161
56*
TxPower
------1( )
1(*)
This example shows how to display the configuration and statistics of the 802.11a transmit power cost:
Switch# show ap dot11 5ghz txpower
Automatic Transmit Power Assignment
Transmit Power Assignment Mode
Transmit Power Update Interval
Transmit Power Threshold
Transmit Power Neighbor Count
Min Transmit Power
Max Transmit Power
Transmit Power Update Contribution
Transmit Power Assignment Leader
Last Run
:
:
:
:
:
:
:
:
:
AUTO
600 seconds
-70 dBm
3 APs
-10 dBm
30 dBm
SNI.
web (10.10.10.1)
437 seconds ago
This example shows how to display the configuration and statistics of the 802.11a transmit power cost:
Switch# show ap dot11 5ghz ccx global
802.11a Client Beacon Measurements:
disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
595
show ap env summary
show ap env summary
To show ap environment summary, use the show ap env summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show ap environment summary:
Switch#show ap env summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
596
show ap ethernet statistics
show ap ethernet statistics
To display Ethernet statistics for all Cisco lightweight access points, use the show ap ethernet statistics
command.
show ap ethernet statistics
This command has no keywords and arguments.
Command Default
None
Command Modes
User EXEC.
Privileged EXEC.
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display Ethernet statistics for all access points:
Switch# show ap ethernet statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
597
show ap gps-location summary
show ap gps-location summary
To show GPS location summary of all connected Cisco APs, use the show ap gps-location summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show GPS location summary of all connected Cisco APs:
Switch# show ap gps-location summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
598
show ap groups
show ap groups
To display information about all access point groups that are defined in the system, use the show ap groups
command.
show ap groups
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display information about all access point groups:
Switch# show ap groups
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
599
show ap groups extended
show ap groups extended
To view information about all AP groups defined in the system in detail, use the show ap groups extended
command.
show ap groups extended
Syntax Description
extended
Command Default
None
Command Modes
Privileged EXEC
Command History
Displays information about all AP groups defined in the system in detail.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
600
show ap image
show ap image
To display the images present on Cisco lightweight access points, use the show ap image command.
show ap image
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display images on the access points:
Switch# show ap image
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
601
show ap is-supported
show ap is-supported
To see if an AP model is supported or not, use the show ap is-supported command.
show ap is-supported model-part-number
Syntax Description
model-part-number
Command Default
None
Command Modes
Any command mode
Command History
Examples
Part number of the AP model. For example, AIR-LAP1142N-N-K9.
Release
Modification
Cisco IOS XE 3.7.0E
This command was introduced.
This example shows how to check if an AP model is supported or not:
Switch# show ap is-supported AIR-LAP1142N-N-K9
AP Support: Yes
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
602
show ap join stats summary
show ap join stats summary
To display the last join error detail for a specific access point, use the show ap join stats summary command.
show ap join stats summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
To obtain the MAC address of the 802.11 radio interface, enter the show interface command on the access
point.
Examples
This example shows how to display specific join information for an access point:
Switch# show ap join stats summary
Number of APs : 1
Base MAC
Ethernet MAC
AP Name
IP Address
Status
--------------- --------------- --------------------- ---------------- ------------c8f9.f91a.aa80 0000.0000.0000 N A
0.0.0.0
Not Joined
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
603
show ap link-encryption
show ap link-encryption
To display the link encryption status, use the show ap link-encryption command.
show ap link-encryption
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example show how to display the link-encryption status:
Switch# show ap link-encryption
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
604
show ap mac-address
show ap mac-address
To display join-related statistics collected and last join error details for access points, use the show ap
mac-address command.
show ap mac-address mac-address join stats {detailed| summary}
Syntax Description
mac-address
Access point Ethernet MAC address or the MAC address of the 802.11
radio interface.
join stats
Displays join information and statistics for Cisco access points.
detailed
Displays all join-related statistics collected.
summary
Displays the last join error detail.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display join information for a specific access point that is trying to join the switch:
Switch# show ap mac-address d0c2.8267.8b00 join stats detailed
Discovery phase statistics
Discovery requests received
Successful discovery responses sent
Unsuccessful discovery request processing
Reason for last unsuccessful discovery attempt
Time at last successful discovery attempt
Time at last unsuccessful discovery attempt
:
:
:
:
:
:
6
6
0
Not applicable
Nov 20 17:25:10.841
Not applicable
Join phase statistics
Join requests received
Successful join responses sent
Unsuccessful join request processing
Reason for last unsuccessful join attempt
Time at last successful join attempt
Time at last unsuccessful join attempt
:
:
:
:
:
:
3
3
0
Not applicable
Nov 20 17:25:20.998
Not applicable
Configuration phase statistics
Configuration requests received
Successful configuration responses sent
Unsuccessful configuration request processing
Reason for last unsuccessful configuration attempt
:
:
:
:
8
3
0
Not applicable
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
605
show ap mac-address
Time at last successful configuration attempt
Time at last unsuccessful configuration attempt
Last AP message decryption failure details
Reason for last message decryption failure
Last AP disconnect details
Reason for last AP connection failure
to the AP has reached maximum
Last join error summary
Type of error that occurred last
Reason for error that occurred last
to the AP has reached maximum
Time at which the last join error occurred
: Nov 20 17:25:21.177
: Not applicable
: Not applicable
: Number of message retransmission
: AP got or has been disconnected
: Number of message retransmission
: Nov 20 17:22:36.438
This example shows how to display specific join information for an access point:
Switch# show ap mac-address d0c2.8267.8b00 join stats detailed
Is the AP currently connected to controller..........................
Time at which the AP joined this controller last time................
Type of error that occurred last.....................................
rejected
Reason for error that occurred last..................................
is pending for the AP
Time at which the last join error occurred...........................
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
606
No
Aug 21 12:50:36:061
Lwapp join request
RADIUS authorization
Aug 21 12:50:34:374
show ap monitor-mode summary
show ap monitor-mode summary
To display the current channel-optimized monitor mode settings, use the show ap monitor-mode summary
command.
show ap monitor-mode summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to display current channel-optimized monitor mode settings:
Switch# show ap monitor-mode summary
AP Name Ethernet MAC
Status
Scanning Channel List
------- -------------------- -------- ---------------AP_004 xx:xx:xx:xx:xx:xx Tracking 1,6,11, 4
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
607
show ap name auto-rf
show ap name auto-rf
To display the auto-RF settings for a Cisco lightweight access point, use the show ap name auto-rf command.
show ap name ap-name auto-rf dot11 {24ghz| 5ghz}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
Command Default
None
Command Modes
Privileged EXEC.
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display auto-RF information for an access point:
Switch# show ap name AP01 auto-rf dot11 24ghz
Number of Slots
AP Name
MAC Address
Slot ID
Radio Type
Subband Type
:
:
:
:
:
:
Noise Information
Noise Profile
Channel
1
Channel
2
Channel
3
Channel
4
Channel
5
Channel
6
Channel
7
Channel
8
Channel
9
Channel 10
Channel 11
: Failed
:
24 dBm
:
48 dBm
:
72 dBm
:
96 dBm
: 120 dBm
: -112 dBm
: -88 dBm
: -64 dBm
: -40 dBm
: -16 dBm
:
8 dBm
Interference Information
Interference Profile
Channel
1
Channel
2
Channel
3
Channel
4
: Passed
: -128 dBm
: -71 dBm
: -72 dBm
: -73 dBm
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
608
2
TSIM_AP-1
0000.2000.02f0
0
802.11b/g
All
@
@
@
@
0%
1%
1%
2%
busy
busy
busy
busy
show ap name auto-rf
Channel
Channel
Channel
Channel
Channel
Channel
Channel
5
6
7
8
9
10
11
:
:
:
:
:
:
:
Rogue Histogram (20/40_ABOVE/40_BELOW)
Channel 36
Channel 40
Channel 44
Channel 48
Channel 52
Channel 56
Channel 60
Channel 64
Channel 100
Channel 104
Channel 108
-74
-75
-76
-77
-78
-79
-80
dBm
dBm
dBm
dBm
dBm
dBm
dBm
@
@
@
@
@
@
@
3%
4%
5%
5%
6%
7%
8%
busy
busy
busy
busy
busy
busy
busy
: 27/ 4/ 0
: 13/ 0/ 0
: 5/ 0/ 0
: 6/ 0/ 1
: 4/ 0/ 0
: 5/ 0/ 0
: 1/ 3/ 0
: 3/ 0/ 0
: 0/ 0/ 0
: 0/ 0/ 0
: 0/ 1/ 0
Load Information
Load Profile
Receive Utilization
Transmit Utilization
Channel Utilization
Attached Clients
:
:
:
:
:
Coverage Information
Coverage Profile
Failed Clients
: Passed
: 0 clients
Client Signal Strengths
RSSI -100 dBm
RSSI -92 dBm
RSSI -84 dBm
RSSI -76 dBm
RSSI -68 dBm
RSSI -60 dBm
RSSI -52 dBm
:
:
:
:
:
:
:
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
Client Signal to Noise Ratios
SNR
0 dB
SNR
5 dB
SNR
10 dB
SNR
15 dB
SNR
20 dB
SNR
25 dB
SNR
30 dB
SNR
35 dB
SNR
40 dB
SNR
45 dB
:
:
:
:
:
:
:
:
:
:
0
0
0
0
0
0
0
0
0
0
clients
clients
clients
clients
clients
clients
clients
clients
clients
clients
Nearby APs
AP 0000.2000.0300 slot 0
AP 0000.2000.0400 slot 0
AP 0000.2000.0600 slot 0
: -68 dBm on
: -68 dBm on
: -68 dBm on
Passed
10%
20%
50%
0 clients
11 (10.10.10.1)
11 (10.10.10.1)
11 (10.10.10.1)
Radar Information
Channel Assignment Information
Current Channel Average Energy
Previous Channel Average Energy
Channel Change Count
Last Channel Change Time
Recommended Best Channel
:
:
:
:
:
0 dBm
0 dBm
0
Wed Oct 17 08:13:36 2012
11
RF Parameter Recommendations
Power Level
RTS/CTS Threshold
Fragmentation Threshold
Antenna Pattern
:
:
:
:
1
2347
2346
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
609
show ap name auto-rf
Persistent Interference Devices
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
610
show ap name bhmode
show ap name bhmode
To display Cisco bridge backhaul mode, use the show ap name bhmode command.
show ap name ap-name bhmode
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display Cisco bridge backhaul mode of an access point:
Switch# show ap name TSIM_AP-1 bhmode
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
611
show ap name bhrate
show ap name bhrate
To display the Cisco bridge backhaul rate, use the show ap name bhrate command.
show ap name ap-name bhrate
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the Cisco bridge backhaul rate for an access point:
Switch# show ap name AP01 bhrate
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
612
show ap name cac voice
show ap name cac voice
To display voice call admission control details for a specific Cisco lightweight access point, use the show
ap name cac voice command.
show ap name ap-name cac voice
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display voice call admission control details for an access point:
Switch# show ap name AP01 cac voice
1) AP Name: AP01
=============================
Wireless Bandwidth (In MeanTime mt)
Slot# Radio
Calls BW-Max BW-Alloc Bw-InUse (%age)
-----------------------------------------------------------------1
0
802.11b/g
0
23437
0
0
2
1
802.11a
0
23437
0
0
Wired Bandwidth (in Kbps)
Slot# Wlan-ID Wlan-Name
BW-Config
BW-Avail
----------------------------------------------------------------1
0
1
maria-open
0
0
2
0
12
24
0
0
3
1
1
maria-open
0
0
4
1
12
24
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
613
show ap name config fnf
show ap name config fnf
To view the Netflow input and output monitors for a Cisco AP, use the show ap name config fnf command.
show ap name ap-name config fnf
Syntax Description
ap-name
Name of the Cisco lightweight access point
fnf
Netflow input and output monitors for a Cisco AP
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
614
show ap name dot11 call-control
show ap name dot11 call-control
To display call control information and the metrics for successful calls, use the show ap name dot11
call-control command.
show ap name ap-name dot11 {24ghz| 5ghz} call-control {call-info| metrics}
Syntax Description
ap-name
Name of the Cisco lightweight access point
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
call-info
Displays call information.
metrics
Displays call metrics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display metrics for successful calls for an access point:
Switch# show ap name AP01 dot11 24ghz call-control metrics
Slot#
Call Count
Call Duration
--------------------------------0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
615
show ap name cable-modem
show ap name cable-modem
To show AP CAPWAP CCX on a specific AP, use the show ap name cable-modemcommand.
show ap name ap-namecable-modem
Syntax Description
ap-name
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Name of the specific AP.
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show AP CAPWAP CCX on AP1:
Switch# show ap name ap1 cable-modem
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
616
show ap name capwap retransmit
show ap name capwap retransmit
To display Control and Provisioning of Wireless Access Points (CAPWAP) retransmit settings, use the show
ap name capwap retransmit command.
show ap name ap-name capwap retransmit
Syntax Description
ap-name
Name of the Cisco lightweight access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CAPWAP retransmit settings of an access point:
Switch# show ap name AP01 capwap retransmit
AP Name
-------AP01
Retransmit Interval Retransmit Count
------------------- ---------------3
5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
617
show ap name ccx rm
show ap name ccx rm
To display an access point’s Cisco Client eXtensions (CCX) radio management status information, use the
show ap name ccx rm command.
show ap name ap-name ccx rm status
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CCX radio management information for an access point:
Switch# show ap name AP01 ccx rm status
802.11b/g Radio
Beacon Request
Channel Load Request
Frame Request
Noise Histogram Request
Path Loss Request
Interval
Iteration
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
60
0
802.11a Radio
Beacon Request
Channel Load Request
Frame Request
Noise Histogram Request
Path Loss Request
Interval
Iteration
:
:
:
:
:
:
:
Disabled
Disabled
Disabled
Disabled
Disabled
60
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
618
show ap name cdp
show ap name cdp
To display the Cisco Discovery Protocol (CDP) information for an access point, use the show ap name cdp
command.
show ap name ap-name cdp [neighbors [detail]]
Syntax Description
ap-name
Name of the Cisco lightweight access point.
neighbors
(Optional) Displays neighbors that are using CDP.
detail
(Optional) Displays details about a specific access point neighbor that is
using CDP.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CDP information for an access point:
Switch# show ap name AP01 cdp neighbors detail
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
619
show ap name channel
show ap name channel
To display the available channels for a specific mesh access point, use the show ap name channel command.
show ap name ap-name channel
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the available channels for a particular access point:
Switch# show ap name AP01 channel
Slot ID
Allowed Channel List
Slot ID
Allowed Channel List
: 0
: 1, 2, 3, 4, 5, 6, 7, 8, 9
10, 11
: 1
: 36, 40, 44, 48, 52, 56, 60, 64, 100
104, 108, 112, 116, 132, 136, 140, 149,
153
157, 161
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
620
show ap name config
show ap name config
To display common information and Ethernet VLAN tagging information for a specific Cisco lightweight
access point, use the show ap name config command.
show ap name ap-name config {ethernet| general}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
ethernet
Displays Ethernet tagging configuration information for an access point.
general
Displays common information for an access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display Ethernet tagging information for an access point:
Switch# show ap name AP01 config ethernet
VLAN Tagging Information for AP01
This example shows how to display common information for an access point:
Switch# show ap name AP01 config general
Cisco AP Name
Cisco AP Identifier
Country Code
Regulatory Domain Allowed by Country
AP Country Code
AP Regulatory Domain
Switch Port Number
MAC Address
IP Address Configuration
IP Address
IP Netmask
Gateway IP Address
Fallback IP Address Being Used
Domain
Name Server
CAPWAP Path MTU
Telnet State
SSH State
Cisco AP Location
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
AP01
5
US - United States
802.11bg:-A
802.11a:-A
US - United States
Unconfigured
Te1/0/1
0000.2000.02f0
Static IP assigned
10.10.10.12
255.255.0.0
10.10.10.1
10.10.10.12
Cisco
0.0.0.0
1485
Enabled
Disabled
sanjose
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
621
show ap name config
Cisco AP Group Name
Primary Cisco Controller Name
Primary Cisco Controller IP Address
Secondary Cisco Controller Name
Secondary Cisco Controller IP Address
Tertiary Cisco Controller Name
Tertiary Cisco Controller IP Address
Administrative State
Operation State
AP Mode
AP Submode
Remote AP Debug
Logging Trap Severity Level
Software Version
Boot Version
Stats Reporting Period
LED State
PoE Pre-Standard Switch
PoE Power Injector MAC Address
Power Type/Mode
Number of Slots
AP Model
AP Image
IOS Version
Reset Button
AP Serial Number
AP Certificate Type
Management Frame Protection Validation
AP User Mode
AP User Name
AP 802.1X User Mode
AP 802.1X User Name
Cisco AP System Logging Host
AP Up Time
seconds
AP CAPWAP Up Time
Join Date and Time
Join Taken Time
seconds
Join Priority
Ethernet Port Duplex
Ethernet Port Speed
AP Link Latency
Rogue Detection
AP TCP MSS Adjust
AP TCP MSS Size
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
default-group
CAPWAP Controller
10.10.10.1
Not Configured
Not Configured
Enabled
Registered
Local
Not Configured
Disabled
informational
7.4.0.5
7.4.0.5
180
Enabled
Disabled
Disabled
Power Injector/Normal Mode
2
1140AG
C1140-K9W8-M
SIM1140K001
Manufacture Installed
Disabled
Customized
cisco
Not Configured
Not Configured
255.255.255.255
15 days 16 hours 19 minutes 57
: 4 minutes 56 seconds
: 10/18/2012 04:48:56
: 15 days 16 hours 15 minutes 0
:
:
:
:
:
:
:
1
Auto
Auto
Disabled
Disabled
Disabled
6146
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
622
show ap name config dot11
show ap name config dot11
To display 802.11 configuration information that corresponds to specific Cisco lightweight access points, use
the show ap name config dot11 command.
show ap name ap-name config dot11 {24ghz| 49ghz| 58ghz| 5hgz| dual-band}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
49ghz
Displays 802.11-4.9G network settings.
58ghz
Displays 802.11-5.8G network settings.
5hgz
Displays the 5 GHz band settings.
dual-band
Displays the dual band radio settings.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.3SE
The dual-band parameter was added.
This example shows how to display 802.11b configuration information that corresponds to a specific Cisco
lightweight access point:
Switch# show ap name AP01 config dot11 24ghz
Cisco AP Identifier
Cisco AP Name
Country Code
Regulatory Domain Allowed by Country
AP Country Code
AP Regulatory Domain
Switch Port Number
MAC Address
IP Address Configuration
IP Address
IP Netmask
Gateway IP Address
Fallback IP Address Being Used
:
:
:
:
:
:
:
:
:
:
:
:
:
5
AP01
US - United States
802.11bg:-A
802.11a:-A
US - United States
-A
Te1/0/1
0000.2000.02f0
Static IP assigned
10.10.10.12
255.255.0.0
10.10.10.1
10.10.10.12
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
623
show ap name config dot11
Domain
Name Server
CAPWAP Path MTU
Telnet State
SSH State
Cisco AP Location
Cisco AP Group Name
Administrative State
Operation State
AP Mode
AP Submode
Remote AP Debug
Logging Trap Severity Level
Software Version
Boot Version
Mini IOS Version
Stats Reporting Period
LED State
PoE Pre-Standard Switch
PoE Power Injector MAC Address
Power Type/Mode
Number of Slots
AP Model
AP Image
IOS Version
Reset Button
AP Serial Number
AP Certificate Type
Management Frame Protection Validation
AP User Mode
AP User Name
AP 802.1X User Mode
AP 802.1X User Name
Cisco AP System Logging Host
AP Up Time
seconds
AP CAPWAP Up Time
Join Date and Time
Join Taken Time
seconds
Attributes for Slot 0
Radio Type
Administrative State
Operation State
Cell ID
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Cisco
0.0.0.0
1485
Enabled
Disabled
sanjose
default-group
Enabled
Registered
Local
Not Configured
Disabled
informational
7.4.0.5
7.4.0.5
3.0.51.0
180
Enabled
Disabled
Disabled
Power Injector/Normal Mode
2
1140AG
C1140-K9W8-M
SIM1140K001
Manufacture Installed
Disabled
Customized
cisco
Not Configured
Not Configured
255.255.255.255
15 days 17 hours 9 minutes 41
: 54 minutes 40 seconds
: 10/18/2012 04:48:56
: 15 days 16 hours 15 minutes 0
:
:
:
:
802.11n - 2.4 GHz
Enabled
Up
0
:
:
:
:
:
:
Automatic
1
100
4
60
000020000200
Operation Rate Set
1000 Kbps
2000 Kbps
5500 Kbps
11000 Kbps
6000 Kbps
9000 Kbps
12000 Kbps
18000 Kbps
24000 Kbps
36000 Kbps
48000 Kbps
54000 Kbps
:
:
:
:
:
:
:
:
:
:
:
:
MANDATORY
MANDATORY
MANDATORY
MANDATORY
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
MCS Set
MCS 0
MCS 1
MCS 2
: SUPPORTED
: SUPPORTED
: SUPPORTED
Station Configuration
Configuration
Number of WLANs
Medium Occupancy Limit
CFP Period
CFP Maximum Duration
BSSID
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
624
show ap name config dot11
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
:
:
:
:
:
100
2346
True
True
US
Multi Domain Capability
Configuration
First Channel
Number of Channels
Country String
:
:
:
:
Automatic
0
0
US
MAC Operation Parameters
Configuration
Fragmentation Threshold
Packet Retry Limit
Legacy Tx Beamforming Setting
:
:
:
:
Automatic
2346
64
Disabled
Tx Power
Number of Supported Power Levels
Tx Power Level 1
Tx Power Level 2
Tx Power Level 3
Tx Power Level 4
Tx Power Level 5
Tx Power Level 6
Tx Power Level 7
Tx Power Level 8
Tx Power Configuration
Current Tx Power Level
:
:
:
:
:
:
:
:
:
:
:
8
20 dBm
17 dBm
14 dBm
11 dBm
8 dBm
5 dBm
2 dBm
-1 dBm
Automatic
1
Phy OFDM Parameters
Configuration
Current Channel
Extension Channel
Channel Width
Allowed Channel List
:
:
:
:
:
Automatic
11
None
20 MHz
1, 2, 3, 4, 5, 6, 7, 8, 9
10, 11
0
Internal
0
Diversity enabled
Beacon Period
Fragmentation Threshold
Multi Domain Capability Implemented
Multi Domain Capability Enabled
Country String
TI Threshold
Antenna Type
Internal Antenna Gain (in .5 dBi units)
Diversity
:
:
:
:
802.11n Antennas
Tx
Rx
: A, B, C
: A, B, C
Performance Profile Parameters
Configuration
Interference Threshold
Noise Threshold
: Automatic
: 10%
: -70 dBm
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
625
show ap name config dot11
RF Utilization Threshold
Data Rate Threshold
Client Threshold
Coverage SNR Threshold
Coverage Exception Level
Client Minimum Exception Level
RTS/CTS Threshold
Short Retry Limit
Long Retry Limit
Max Tx MSDU Lifetime
Max Rx Lifetime
CleanAir Management Information
CleanAir Capable
CleanAir Management Admin State
CleanAir Management Operation State
Rapid Udpate Mode
Spectrum Expert connection
CleanAir NSI Key
88
Spectrum Expert connections counter
CleanAir Sensor State
Rogue Containment Information
Containment Count
:
:
:
:
:
:
80%
1000000 bps
12 clients
15 dB
25%
3 clients
: 2347
: 7
: 4
: 512
: 512
:
:
:
:
:
:
Yes
Enabled
Up
Disabled
Disabled
377313C8F290E246E640C4EF177BED
: 0
: Configured
: 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
626
show ap name config slot
show ap name config slot
To display configuration information for slots on a specific Cisco lightweight access point, use the show ap
name config slot command.
show ap name ap-name config slot {0| 1| 2| 3}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
0
Displays slot number 0.
1
Displays slot number 1.
2
Displays slot number 2.
3
Displays slot number 3.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display configuration information for slots on an access point:
Switch# show ap name AP01 config slot 0
Cisco AP Identifier
Cisco AP Name
Country Code
Regulatory Domain Allowed by Country
AP Country Code
AP Regulatory Domain
Switch Port Number
MAC Address
IP Address Configuration
IP Address
IP Netmask
Gateway IP Address
Fallback IP Address Being Used
Domain
Name Server
CAPWAP Path MTU
Telnet State
SSH State
Cisco AP Location
Cisco AP Group Name
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
3
AP01
US - United States
802.11bg:-A
802.11a:-A
US - United States
-A
Te1/0/1
0000.2000.02f0
Static IP assigned
10.10.10.12
255.255.0.0
10.10.10.1
10.10.10.12
Cisco
0.0.0.0
1485
Enabled
Disabled
sanjose
default-group
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
627
show ap name config slot
Administrative State
Operation State
AP Mode
AP Submode
Remote AP Debug
Logging Trap Severity Level
Software Version
Boot Version
Mini IOS Version
Stats Reporting Period
LED State
PoE Pre-Standard Switch
PoE Power Injector MAC Address
Power Type/Mode
Number of Slots
AP Model
AP Image
IOS Version
Reset Button
AP Serial Number
AP Certificate Type
Management Frame Protection Validation
AP User Mode
AP User Name
AP 802.1X User Mode
AP 802.1X User Name
Cisco AP System Logging Host
AP Up Time
econds
AP CAPWAP Up Time
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
Join Date and Time
Join Taken Time
seconds
: 10/17/2012 08:13:36
: 14 days 19 hours 39 minutes 41
Attributes for Slot 0
Radio Type
Administrative State
Operation State
Cell ID
Enabled
Registered
Local
Not Configured
Disabled
informational
7.4.0.5
7.4.0.5
3.0.51.0
180
Enabled
Disabled
Disabled
Power Injector/Normal Mode
2
1140AG
C1140-K9W8-M
SIM1140K001
Manufacture Installed
Disabled
Customized
cisco
Not Configured
Not Configured
255.255.255.255
15 days 16 hours 1 minute 19 s
: 20 hours 21 minutes 37 seconds
:
:
:
:
802.11n - 2.4 GHz
Enabled
Up
0
:
:
:
:
:
:
Automatic
1
100
4
60
000020000200
Operation Rate Set
1000 Kbps
2000 Kbps
5500 Kbps
11000 Kbps
6000 Kbps
9000 Kbps
12000 Kbps
18000 Kbps
24000 Kbps
36000 Kbps
48000 Kbps
54000 Kbps
:
:
:
:
:
:
:
:
:
:
:
:
MANDATORY
MANDATORY
MANDATORY
MANDATORY
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
MCS Set
MCS 0
MCS 1
MCS 2
MCS 3
MCS 4
MCS 5
MCS 6
MCS 7
MCS 8
:
:
:
:
:
:
:
:
:
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
Station Configuration
Configuration
Number of WLANs
Medium Occupancy Limit
CFP Period
CFP Maximum Duration
BSSID
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
628
show ap name config slot
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
MCS
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
SUPPORTED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
DISABLED
:
:
:
:
:
100
2346
True
True
US
Multi Domain Capability
Configuration
First Channel
Number of Channels
Country String
:
:
:
:
Automatic
0
0
US
MAC Operation Parameters
Configuration
Fragmentation Threshold
Packet Retry Limit
: Automatic
: 2346
: 64
Tx Power
Number of Supported Power Levels
Tx Power Level 1
Tx Power Level 2
Tx Power Level 3
Tx Power Level 4
Tx Power Level 5
Tx Power Level 6
Tx Power Level 7
Tx Power Level 8
Tx Power Configuration
Current Tx Power Level
:
:
:
:
:
:
:
:
:
:
:
8
20 dBm
17 dBm
14 dBm
11 dBm
8 dBm
5 dBm
2 dBm
-1 dBm
Automatic
1
Phy OFDM Parameters
Configuration
Current Channel
Extension Channel
Channel Width
Allowed Channel List
:
:
:
:
:
Automatic
11
None
20 MHz
1, 2, 3, 4, 5, 6, 7, 8, 9
10, 11
0
Internal
0
Diversity enabled
Beacon Period
Fragmentation Threshold
Multi Domain Capability Implemented
Multi Domain Capability Enabled
Country String
TI Threshold
Antenna Type
Internal Antenna Gain (in .5 dBi units)
Diversity
:
:
:
:
802.11n Antennas
Tx
Rx
: A, B, C
: A, B, C
Performance Profile Parameters
Configuration
Interference Threshold
Noise Threshold
RF Utilization Threshold
Data Rate Threshold
Client Threshold
Coverage SNR Threshold
Coverage Exception Level
Client Minimum Exception Level
:
:
:
:
:
:
:
:
:
Automatic
10%
-70 dBm
80%
1000000 bps
12 clients
15 dB
25%
3 clients
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
629
show ap name config slot
Rogue Containment Information
Containment Count
: 0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
630
show ap name core-dump
show ap name core-dump
To display the memory core dump information for a lightweight access point, use the show ap name
core-dump command.
show ap name ap-name core-dump
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the memory core dump information:
Switch# show ap name 3602a core-dump
TFTP server IP : 172.31.25.21
Memory core dump file : 3602a.dump
Memory core dump file compressed : Disabled
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
631
show ap name data-plane
show ap name data-plane
To display the data plane status of a specific Cisco lightweight access point, use the show ap name data-plane
command.
show ap name ap-name data-plane
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the data plane status of an access point:
Switch# show ap name AP01 data-plane
AP Name
-----------------AP01
Min Data
Round Trip
-------------0.000s
Data
Round Trip
-------------0.000s
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
632
Max Data
Last
Round Trip
Update
-------------- -------0.000s
00:00:00
show ap name dot11
show ap name dot11
To display 802.11a or 802.11b configuration information that corresponds to specific Cisco lightweight access
points, use the show ap name dot11 command.
show ap name ap-name dot11 {24ghz| 5ghz} {ccx| cdp| profile| service-poicy output| stats| tsm {all|
client-mac}}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
ccx
Displays the Cisco Client eXtensions (CCX) radio management status
information.
cdp
Displays Cisco Discovery Protocol (CDP) information.
profile
Displays configuration and statistics of 802.11 profiling.
service-policy output
Displays downstream service policy information.
stats
Displays Cisco lightweight access point statistics.
tsm
Displays 802.11 traffic stream metrics statistics.
all
Displays the list of all access points to which the client has associations.
client-mac
MAC address of the client.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the service policy that is associated with the access point:
Switch# show ap name test-ap dot11 24ghz service-policy output
Policy Name
: test-ap1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
633
show ap name dot11
Policy State : Installed
This example shows how to display the CCX RRM 802.11 configuration for a specific access point:
Switch# show ap name AP01 dot11 24ghz ccx
This example show how to display CDP information for a specific access point:
Switch# show ap name AP01 dot11 24ghz cdp
AP Name
AP CDP State
--------------------- -------------AP03
Disabled
This example show how to display the configuration and statistics of 802.11b profiling for a specific access
point:
Switch# show ap name AP01 dot11 24ghz profile
802.11b
802.11b
802.11b
802.11b
802.11b
802.11b
Cisco
Cisco
Cisco
Cisco
Cisco
Cisco
AP
AP
AP
AP
AP
AP
performance profile mode
Interference threshold
noise threshold
RF utilization threshold
throughput threshold
clients threshold
:
:
:
:
:
:
GLOBAL
10 %
-70 dBm
80 %
1000000 bps
12 clients
This example show how to display downstream service policy information for a specific access point:
Switch# show ap name AP01 dot11 24ghz service-policy output
Policy Name : def-11gn
Policy State : Installed
This example show how to display statistics for a specific access point:
Switch# show ap name AP01 dot11 24ghz stats
Number of Users................................:
TxFragmentCount................................:
MulticastTxFrameCnt............................:
FailedCount....................................:
RetryCount.....................................:
MultipleRetryCount.............................:
FrameDuplicateCount............................:
RtsSuccessCount................................:
RtsFailureCount................................:
AckFailureCount................................:
RxIncompleteFragment...........................:
MulticastRxFrameCnt............................:
FcsErrorCount..................................:
TxFrameCount...................................:
WepUndecryptableCount..........................:
TxFramesDropped................................:
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Call Admission Control (CAC) Stats
Voice Bandwidth in use(% of config bw).........:
Video Bandwidth in use(% of config bw).........:
Total BW in use for Voice(%)...................:
Total BW in use for SIP Preferred call(%)......:
0
0
0
0
Load based Voice Call Stats
Total channel MT free..........................:
Total voice MT free............................:
Na Direct......................................:
Na Roam........................................:
0
0
0
0
WMM TSPEC CAC Call Stats
Total num of voice calls in progress...........:
Num of roaming voice calls in progress.........:
Total Num of voice calls since AP joined.......:
Total Num of roaming calls since AP joined.....:
0
0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
634
show ap name dot11
Total Num of exp bw requests received..........:
Total Num of exp bw requests admitted..........:
Num of voice calls rejected since AP joined....:
Num of roam calls rejected since AP joined.....:
Num of calls rejected due to insufficent bw....:
Num of calls rejected due to invalid params....:
Num of calls rejected due to PHY rate..........:
Num of calls rejected due to QoS policy........:
0
0
0
0
0
0
0
0
SIP CAC Call Stats
Total Num of calls in progress.................:
Num of roaming calls in progress...............:
Total Num of calls since AP joined.............:
Total Num of roaming calls since AP joined.....:
Total Num of Preferred calls received..........:
Total Num of Preferred calls accepted..........:
Total Num of ongoing Preferred calls...........:
Total Num of calls rejected(Insuff BW).........:
Total Num of roam calls rejected(Insuff BW)....:
0
0
0
0
0
0
0
0
0
Band Select Stats
Num of dual band client .......................:
Num of dual band client added..................:
Num of dual band client expired ...............:
Num of dual band client replaced...............:
Num of dual band client detected ..............:
Num of suppressed client ......................:
Num of suppressed client expired...............:
Num of suppressed client replaced..............:
0
0
0
0
0
0
0
0
This example show how to display the traffic stream configuration for all clients that correspond to a specific
access point:
Switch# show ap name AP01 dot11 24ghz tsm all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
635
show ap name dot11 cleanair
show ap name dot11 cleanair
To display CleanAir configuration information that corresponds to an access point, use the show ap name
dot11 cleanair command.
show ap name ap-name dot11 {24ghz| 5ghz} cleanair {air-quality| device}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
cleanair
Displays CleanAir configuration information.
air-quality
Displays CleanAir air-quality (AQ) data.
device
Displays CleanAir interferers for an access point on the 5 GHz band.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display CleanAir air-quality information for an access point in the 802.11b
network:
Switch# show ap name AP01 dot11 24ghz cleanair air-quality
AQ = Air Quality
DFS = Dynamic Frequency Selection
This example shows how to display CleanAir interferers information for an access point in the 802.11b
network:
Switch# show ap name AP01 dot11 24ghz cleanair device
DC
ISI
RSSI
DevID
=
=
=
=
Duty Cycle (%)
Interference Severity Index (1-Low Interference, 100-High Interference)
Received Signal Strength Index (dBm)
Device ID
No ClusterID DevID Type AP Name ISI RSSI DC Channel
-- --------- ----- ---- ------- --- ---- ----------
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
636
show ap name env
show ap name env
To show AP environment on a specific AP, use the show ap name envcommand.
show ap name ap-nameenv
Syntax Description
ap-name
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Name of the specific AP.
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show AP environment on AP1:
Switch# show ap name ap1 env
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
637
show ap name ethernet statistics
show ap name ethernet statistics
To display the Ethernet statistics of a specific Cisco lightweight access point, use the show ap name ethernet
statistics command.
show ap name ap-name ethernet statistics
Syntax Description
ap-name
Command Default
None.
Command Modes
User EXEC.
Name of the Cisco lightweight access point.
Privileged EXEC.
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the Ethernet statistics of an access point:
Switch# show ap name 3602a ethernet statistics
Ethernet Stats for AP 3602a
Interface Name
Status
Speed
Rx Packets
Tx Packets
Discarded Packets
----------------------------------------------------------------------------------------GigabitEthernet0
UP
1000 Mbps
3793
5036
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
638
show ap name eventlog
show ap name eventlog
To download and display the event log of a specific Cisco lightweight access point, use the show ap name
eventlog command.
show ap name ap-name eventlog
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the event log for a specific access point:
Switch# show ap name AP01 eventlog
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
639
show ap gps-location summary
show ap gps-location summary
To show GPS location summary of all connected Cisco APs, use the show ap gps-location summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show GPS location summary of all connected Cisco APs:
Switch# show ap gps-location summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
640
show ap name image
show ap name image
To display the detailed information about the predownloaded image for specified access points, use the show
ap name image command.
show ap name ap-name image
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display images present on all access points:
Switch# show ap name 3602a image
Total number of APs
: 1
Number of APs
Initiated
Predownloading
Completed predownloading
Not Supported
Failed to Predownload
:
:
:
:
:
0
0
0
1
0
AP Name
Primary Image
Backup Image
Predownload Status
Predownload Ver... Next
Retry Time
Retry Count
---------------------------------------------------------------------------------------------------------------------3602a
10.0.1.234
0.0.0.0
Not supported
None
NA
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
641
show ap name inventory
show ap name inventory
To display inventory information for an access point, use the show ap name inventory command.
show ap name ap-name inventory
Syntax Description
ap-name
Name of the Cisco lightweight access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display inventory information for an access point:
Switch# show ap name 3502b inventory
NAME: Cisco AP
PID: 1140AG ,
NAME:
PID: ,
, DESCR: Cisco Wireless Access Point
VID: V01, SN: SIM1140K001
, DESCR:
VID: , SN:
NAME:
, DESCR:
PID: , VID: , SN:
NAME: Cisco AP
, DESCR: Cisco Wireless Access Point
PID: 3502I , VID: V01, SN: FTX1525E94A
NAME: Dot11Radio0
PID: UNKNOWN, VID:
, DESCR: 802.11N 2.4GHz Radio
, SN: FOC1522BLNA
NAME: Dot11Radio1
PID: UNKNOWN, VID:
, DESCR: 802.11N 5GHz Radio
, SN: FOC1522BLNA
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
642
show ap name lan port
show ap name lan port
To display LAN information, use show ap name lan port command.
show ap name lan portsummary |port-id
Syntax Description
summary
Displays brief summary for LAN information.
port-id
Port ID of the port that the LAN information will be displayed.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7SE
This command was introduced.
This example shows how to display the brief summary for LAN information:
Switch# show ap name ap1 lan port summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
643
show ap name link-encryption
show ap name link-encryption
To display the link-encryption status for a specific Cisco lightweight access point, use the show ap name
link-encryption command.
show ap name ap-name link-encryption
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display the link-encryption status for a specific Cisco lightweight access point:
Switch# show ap name AP01 link-encryption
AP Name
-----------------AP01
Encryption
State
---------Disabled
Dnstream
Count
-------0
Upstream
Count
-------0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
644
Last
Update
-----Never
show ap name service-policy
show ap name service-policy
To display service-policy information for a specific Cisco lightweight access point, use the show ap name
service-policy command.
show ap name ap-name service-policy
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display service-policy information for a specific Cisco lightweight access point:
Switch# show ap name 3502b service-policy
NAME: Cisco AP
, DESCR: Cisco Wireless Access Point
PID: 3502I , VID: V01, SN: FTX1525E94A
NAME: Dot11Radio0
PID: UNKNOWN, VID:
, DESCR: 802.11N 2.4GHz Radio
, SN: FOC1522BLNA
NAME: Dot11Radio1
PID: UNKNOWN, VID:
, DESCR: 802.11N 5GHz Radio
, SN: FOC1522BLNA
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
645
show ap name tcp-adjust-mss
show ap name tcp-adjust-mss
To display TCP maximum segment size (MSS) for an access point, use the show ap name tcp-adjust-mss
command.
show ap name ap-name tcp-adjust-mss
Syntax Description
ap-name
Command Default
None
Command Modes
Any command mode
Command History
Examples
Name of the Cisco lightweight access point.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display TCP MSS for an access point:
Switch# show ap name AP01 tcp-adjust-mss
AP Name
TCP State
MSS Size
-----------------------------------------------------AP01
Disabled
6146
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
646
show ap name wlan
show ap name wlan
To display the Basic Service Set Identifier (BSSID) value for each WLAN defined on an access point and to
display WLAN statistics, use the show ap name wlan command.
show ap name ap-name wlan {dot11 {24ghz| 5ghz}| statistic}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
dot11
Displays 802.11 parameters.
24ghz
Displays 802.11b network settings.
5ghz
Displays 802.11a network settings.
statistic
Displays WLAN statistics.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display BSSID information of an access point in an 802.11b network:
Switch# show ap name AP01 wlan dot11 24ghz
Site Name
Site Description
: default-group
:
WLAN ID Interface BSSID
------------------------------------1
default
00:00:20:00:02:00
12
default
00:00:20:00:02:0b
This example shows how to display WLAN statistics for an access point:
Switch# show ap name AP01 wlan statistic
WLAN ID : 1
WLAN Profile Name
EAP
EAP
EAP
EAP
EAP
: maria-open
Id Request Msg Timeouts
Id Request Msg Timeouts Failures
Request Msg Timeouts
Request Msg Timeouts Failures
Key Msg Timeouts
:
:
:
:
:
0
0
0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
647
show ap name wlan
EAP Key Msg Timeouts Failures
WLAN ID : 12
WLAN Profile Name
EAP
EAP
EAP
EAP
EAP
EAP
: 0
: 24
Id Request Msg Timeouts
Id Request Msg Timeouts Failures
Request Msg Timeouts
Request Msg Timeouts Failures
Key Msg Timeouts
Key Msg Timeouts Failures
:
:
:
:
:
:
0
0
0
0
0
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
648
show ap name wlandot11 service policy
show ap name wlandot11 service policy
To display the QoS policies for each Basic Service Set Identifier (BSSID) for an access point use commands
show apnameap -namewlan dot1124ghzservice-policy
show apnameap -namewlan dot115ghzservice-policy
Syntax Description
Command Default
Command History
Examples
ap- name
Name of the Cisco lightweight access point.
service-policy
Service policy information for access point.
None
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
The following example shows how to display QoS policies for each BSSID.
Switchshow ap name <ap-name> wlan dot11 24ghz service-policy
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
649
show ap slots
show ap slots
To display a slot summary of all connected Cisco lightweight access points, use the show ap slots command.
show ap slots
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display a slot summary of all connected Cisco lightweight access points:
Controller# show ap slots
AP Name
Slots AP Model
Slot0
Slot1
Slot2
Slot3
---------- ------ ----------- ----------- ---------- --------- -------3602a
2
3502I
802.11b/g
802.11a
Unknown
Unknown
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
650
show ap summary
show ap summary
To display the status summary of all Cisco lightweight access points attached to the switch, use the show ap
summary command.
show ap summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use this command to display a list that contains each lightweight access point name, number of slots,
manufacturer, MAC address, location, and the switch port number.
Examples
This example shows how to display a summary of all connected access points:
Controller# show ap summary
Number of APs: 1
Global AP User Name: Cisco
Global AP Dot1x User Name: Not configured
AP Name
AP Model Ethernet MAC
Radio MAC
State
---------------------------------------------------------------------------------------3602a
3502I
003a.99eb.3fa8 d0c2.8267.8b00 Registered
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
651
show ap tcp-adjust-mss
show ap tcp-adjust-mss
To display information about the Cisco lightweight access point TCP Maximum Segment Size (MSS), use
the show ap tcp-adjust-mss command.
show ap tcp-adjust-mss
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to display information about the access point TCP MSS information:
Controller# show ap tcp-adjust-mss
AP Name
TCP State
MSS Size
-----------------------------------------------------3602a
Disabled
0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
652
show ap universal summary
show ap universal summary
To show universal summary of all connected Cisco APs, use theshow ap universal summary command.
There is no keyword or argument.
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
This example shows how to show universal summary of all connected Cisco APs:
Switch# show ap universal summary
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
653
show ap uptime
show ap uptime
To display the up time of all connected Cisco lightweight access points, use the show ap uptime command.
show ap uptime
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to the display up time of all connected access points:
Controller# show ap uptime
Number of APs : 1
Global AP User Name : Cisco
Global AP Dot1x User Name : Not configured
AP Name Ethernet MAC
AP Up Time
Association Up Time
------- --------------- ------------------------------ ----------------------------3602a
003a.99eb.3fa8 5 hours 13 minutes 40 seconds 5 hours 12 minutes 15 seconds
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
654
show wireless ap summary
show wireless ap summary
To display the status summary of all wireless access points, use the show wireless apsummary command.
show wirelessap summary
Syntax Description
This command has no keywords and arguments.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
10.4
This command was introduced
This example shows how to display a summary of all wireless access points:
Controller# show wireless ap summary
Sub-Domain Access Point Summary
Maximum AP limit: 1010
Total AP Licence Installed: 1000
Total AP Licence Available: 1000
Total AP joined :0
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
655
show wireless client ap
show wireless client ap
To display the clients on a Cisco lightweight access point, use the show wireless client ap command.
show wireless client ap [name ap-name] dot11 {24ghz| 5ghz}
Syntax Description
name ap-name
(Optional) Displays the name of the Cisco lightweight access point.
dot11
Displays 802.11 parameters.
24ghz
Displays the 2.4 GHz band.
5ghz
Displays the 5 GHz band.
Command Default
None
Command Modes
Any command mode
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The show client ap command might list the status of automatically disabled clients. Use the show exclusionlist
command to view clients on the exclusion list (blacklisted).
Examples
This example shows how to display client information on a specific Cisco lightweight access point in the 2.4
GHz band:
Switch# show wireless client ap name AP01 dot11 24ghz
MAC Address
AP Id Status
WLAN Id Authenticated
----------------- ------ ---------- ------- ------------xx:xx:xx:xx:xx:xx 1
Associated 1
No
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
656
test ap name
test ap name
To enable automatic testing of the path Maximum Transmit Unit (MTU) between the access point and the
switch, use the test ap name command.
test ap name ap-name pmtu {disable size size| enable}
Syntax Description
ap-name
Name of the target Cisco lightweight access point.
pmtu
Tests the MTU configuration for the access point.
disable
Disables path MTU testing and manually configures the MTU value in bytes.
size size
Specifies the path MTU size.
Note
The range is from 576 to
1700.
enable
Enables the path MTU testing for the access point.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to disable the path MTU configuration for all access points associated to the switch:
Controller# test ap name 3602a pmtu enable
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
657
test capwap ap name
test capwap ap name
To test Control and Provisioning of Wireless Access Points (CAPWAP) parameters for a specific Cisco
lightweight access points, use the test capwap ap name command.
test capwap ap name ap-name {encryption {enable| disable}| message token}
Syntax Description
ap-name
Name of the Cisco lightweight access point.
encryption
Tests the Datagram Transport Layer Security (DTLS) encryption.
enable
Tests if DTLS encryption is enabled.
disable
Tests if DTLS encryption is disabled.
message token
Specifies an RRM neighbor message to send.
Command Default
None
Command Modes
Any command mode
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to test if DTLS encryption is enabled for a specific access point:
Controller# test capwap ap name 3602a encryption enable
This example shows how to test if DTLS encryption is disabled for a specific access point:
Controller# test capwap ap name 3602a encryption disable
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
658
trapflags ap
trapflags ap
To enable the sending of specific Cisco lightweight access point traps, use the trapflags ap command. To
disable the sending of Cisco lightweight access point traps, use the no form of this command.
trapflags ap {register| interfaceup}
no trapflags ap {register| interfaceup}
Syntax Description
register
Enables sending a trap when a Cisco lightweight access point registers with a
Cisco switch.
interfaceup
Enables sending a trap when a Cisco lightweight access point interface (A or
B) comes up.
Command Default
Enabled
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to prevent traps from sending access point-related traps:
Switch(config)# no trapflags ap register
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
659
wireless wps rogue ap rldp alarm-only
wireless wps rogue ap rldp alarm-only
To configure an alarm when a rogue is detected, use wirelesswps rogueaprldp alarm-only command. Use
the no form of the command to disable the alarm.
[no] wireless wps rogue ap rldp alarm-only monitor-ap-only
Syntax Description
monitor-ap-only
Command Default
None
Command Modes
Global Configuration
Command History
Examples
Perform RLDP only on monitor AP
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.7.3E
The no form of the command was introduced.
This example shows how to configure an alarm for a detected rogue.
Switchwireless wps rogue ap rldp alarm-only
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
660
wireless wps rogue ap rldp auto-contain
wireless wps rogue ap rldp auto-contain
To configure RLDP, alarm and auto-contain if rogue is detected, use wirelesswps rogueaprldp auto-contain
command. Use the no form of the command to disable the alarm.
[no] wireless wps rogue ap rldp auto-contain monitor-ap-only
Syntax Description
monitor-ap-only
Command Default
None
Command Modes
Global Configuration
Command History
Examples
Perform RLDP only on monitor AP
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.7.3E
The no form of the command was introduced.
This example shows how to configure an alarm for a detected rogue.
Switchwireless wps rogue ap rldp auto-contain
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
661
wireless wps rogue ap rldp auto-contain
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
662
PART
VII
Mobility
• Mobility Commands, page 665
Mobility Commands
• mobility anchor, page 666
• wireless mobility, page 668
• wireless mobility controller peer-group, page 669
• wireless mobility group keepalive, page 670
• wireless mobility group member ip, page 671
• wireless mobility group name , page 672
• wireless mobility load-balance, page 673
• show wireless mobility, page 674
• clear wireless mobility statistics, page 675
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
665
mobility anchor
mobility anchor
To configure mobility sticky anchoring, use the mobility anchor sticky command. To disable the sticky
anchoring, use the no form of the command.
To configure guest anchoring, use the mobility anchor ip-address command.
To delete the guest anchor, use the no form of the command.
To configure the device as an auto-anchor, use the mobility anchor command.
mobility anchor {ip-address| sticky}
no mobility anchor {ip-address| sticky}
Syntax Description
sticky
The client is anchored to the first switch that it associates.
Note
This command is by default enabled and ensures low roaming latency. This
ensures that the point of presence for the client does not change when the client
joins the mobility domain and roams within the domain.
ip-address
Configures the IP address for the guest anchor switch to this WLAN.
Command Default
Sticky configuration is enabled by default.
Command Modes
WLAN Configuration
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
• The wlan_id or guest_lan_id must exist and be disabled.
• Auto-anchor mobility is enabled for the WLAN or wired guest LAN when you configure the first mobility
anchor.
• Deleting the last anchor disables the auto-anchor mobility feature and resumes normal mobility for new
associations.
• Mobility uses the following ports, that are allowed through the firewall:
◦16666
◦16667
◦16668
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
666
mobility anchor
Examples
This example shows how to enable the sticky mobility anchor:
Switch(config-wlan)# mobility anchor sticky
This example shows how to configure guest anchoring:
Switch(config-wlan)# mobility anchor 209.165.200.224
This example shows how to configure the device as an auto-anchor:
Switch(config-wlan)# mobility anchor
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
667
wireless mobility
wireless mobility
To configure the interswitch mobility manager, use the wireless mobility command.
wireless mobility {dscp value }
Syntax Description
dscp value
Command Default
The default DSCP value is 48.
Command Modes
Global Configuration
Command History
Examples
Configures the Mobility interswitch DSCP value.
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
This example shoes how to configure mobility interswitch DSCP with an value of 20:
Switch(config)# wireless mobility dscp 20
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
668
wireless mobility controller peer-group
wireless mobility controller peer-group
To configure mobility peer groups, use the wireless mobility controller peer-group command, to remove
the configuration, use the no form of this command.
wireless mobility controller peer-group peer-group member IP ip-addressmode centralized
Syntax Description
peer group
Name of the peer group.
member IP
Adds a peer group member.
ip-address
IP address of the peer group member to be added.
mode centralized
Configures the management mode of the peer group member as
centrally managed.
Command Default
The centralized mode is off.
Command Modes
Global configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.7.0 E
This command was introduced.
Switch enable
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# wireless mobility controller peer-group peer1 member ip 10.0.0.1 mode
centralized
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
669
wireless mobility group keepalive
wireless mobility group keepalive
To configure the mobility group parameter and keep alive its ping parameters, use the wireless mobility
group keepalive command. To remove a mobility group parameter, use the no form of the command.
wireless mobility group keepalive {count number| interval interval}
no wireless mobility group keepalive {count numbe r| interval interval}
Syntax Description
count number
Number of times that a ping request is sent to a mobility group member before
the member is considered unreachable. The range is from 3 to 20. The default is
3.
interval interval
Interval of time between each ping request sent to a mobility group member. The
range is from 1 to 30 seconds. The default value is 10 seconds.
Command Default
3 seconds for count and 10 seconds for interval.
Command Modes
Global Configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The default values for interval is ten seconds and the default for retries is set to three.
Examples
This example shows how to specify the amount of time between each ping request sent to a mobility group
member to 10 seconds:
Switch(config)# wireless mobility group keepalive count 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
670
wireless mobility group member ip
wireless mobility group member ip
To add or delete users from mobility group member list, use the wireless mobility group member ip
command. To remove a member from the mobility group, use the no form of the command.
wireless mobility group member ip ip-address [public-ip public-ip-address ] [group group-name ]
no wireless mobility group member ip ip-address
Syntax Description
ip-address
The IP address of the member controller.
public-ip public-ip-address
(Optional) Member controller public IP address.
Note
This command is used only when the member is behind a NAT.
Only static IP NAT is supported.
group group-name
(Optional) Member controller group name.
Note
This command is used only when the member added in not in the
same group as the local mobility controller.
Command Default
None.
Command Modes
Global Configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
The mobility group is used when there is more than one Mobility Controller (MC) in a given deployment.
The mobility group can be assigned with a name or it can use the default group name. The mobility group
members need to be configured on all the members of the group to roam within the group.
Examples
This example shows how to add a member in a mobility group:
Switch(config)# mobility group member ip 10.104.171.101 group TestDocGroup
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
671
wireless mobility group name
wireless mobility group name
To configure hte mobility domain name, use the wireless mobility group name command. To remove the
mobility domain name, use the no form of the command.
Note
If you are configuring the mobility group in a network where network address translation (NAT) is enabled,
enter the IP address that is sent to the controller from the NAT device rather than the controller’s
management interface IP address. Otherwise, mobility will fail among controllers in the mobility group.
wireless mobility group name domain-name
no wireless mobility group name
Syntax Description
domain-name
Command Default
Default.
Command Modes
Global Configuration.
Command History
Examples
Creates a mobility group by entering this command. The domain name can be
up to 31 case-sensitive characters.
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
This example shows how to configure a mobility domain name lab1:
Switch(config)# mobility group domain lab1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
672
wireless mobility load-balance
wireless mobility load-balance
This command is used to load-balance the mobile clients on a mobility anchor (MA) from a switch peer group
(SPG) that is least loaded and is chosen to act as the point of presence for the mobile client.
To configure the mobility load-balance status, use the wireless mobility load-balance command.
To disable the mobility load-balance, use the no wirelessmobility load-balanceform of the command.
To configure the client load on the switch where mobility load-balance is turned on, use the no wirelessmobility
load-balance threshold form of the command.
wireless mobility load-balance [threshold threshold ]
[no]wireless mobility load-balance [threshold]
[no]wireless mobility load-balance
Syntax Description
threshold threshold
Configures the threshold for the number of clients that can be anchored
locally.
Command Default
Load balance enabled and set at a value of 1000.
Command Modes
Global Configuration.
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
• This command is only supported on a mobility agent.
• By default, the threshold can accommodate more than fifty percent of the total clients on the node. Any
client joining the switch after the reaching the configured threshold value is automatically anchored to
the least loaded switch within the same switch peer group.
Examples
This example shows how to configure the mobility load-balance status with a threshold set at 150.
Switch(config)# wireless mobility load-balance threshold 150
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
673
show wireless mobility
show wireless mobility
To view the wireless mobility summary, use the show wireless mobility command.
show wireless mobility {load-balance summary agent mobility-agent-ip client summary |ap-list ip-address
ip-address| controller client summary|dtls connections|statistics summary}
Syntax Description
load-balance summary
Shows the mobility load-balance properties.
agent mobility-agent-ip client summary
Shows the active clients on a mobility agent.
ap-list ip-address ip-address
Shows the list of Cisco APs known to the mobility group.
controller client summary
Shows the active clients in the subdomain.
dtls connections
Shows the DTLS server status.
statistics
Shows the statistics for the Mobility manager.
summary
Shows the summary of the mobility manager.
Command Default
None
Command Modes
Global Configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to display a summary of the mobility manager:
Switch (config)# show wireless mobility ap-list
AP name
AP radio MAC
Controller IP
Learnt from
-----------------------------------------------------------------------------------------------------TSIM_AP-101
0000.2000.6600
9.9.9.2
Self
TSIM_AP-102
0000.2000.6700
9.9.9.2
Self
TSIM_AP-103
0000.2000.6800
9.9.9.2
Self
TSIM_AP-400
0000.2001.9100
9.9.9.2
Self
TSIM_AP-402
0000.2001.9300
9.9.9.2
Self
TSIM_AP-403
0000.2001.9400
9.9.9.2
Self
TSIM_AP-406
0000.2001.9700
9.9.9.2
Self
TSIM_AP-407
0000.2001.9800
9.9.9.2
Self
TSIM_AP-409
0000.2001.9a00
9.9.9.2
Self
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
674
clear wireless mobility statistics
clear wireless mobility statistics
To clear wireless statistics, use the clear wireless mobility statistics command.
clear wireless mobility statistics
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can clear all the information by using the clear wireless mobility statistics command.
Examples
This example shows how to clear wireless mobility statistics:
Switch (config)# clear wireless mobility statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
675
clear wireless mobility statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
676
PART
VIII
Network Management
• Network Management Commands, page 679
Network Management Commands
• monitor capture (interface/control plane), page 681
• monitor capture buffer, page 685
• monitor capture clear, page 686
• monitor capture export, page 687
• monitor capture file, page 688
• monitor capture limit, page 690
• monitor capture match, page 691
• monitor capture start, page 692
• monitor capture stop, page 693
• monitor session, page 694
• monitor session destination, page 696
• monitor session filter, page 700
• monitor session source, page 702
• show monitor, page 705
• show monitor capture, page 708
• snmp-server enable traps, page 710
• snmp-server enable traps bridge, page 714
• snmp-server enable traps call-home, page 715
• snmp-server enable traps cpu, page 716
• snmp-server enable traps envmon, page 717
• snmp-server enable traps errdisable, page 718
• snmp-server enable traps flash, page 719
• snmp-server enable traps license, page 720
• snmp-server enable traps mac-notification, page 721
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
679
• snmp-server enable traps port-security, page 722
• snmp-server enable traps power-ethernet, page 723
• snmp-server enable traps snmp, page 724
• snmp-server enable traps stackwise, page 725
• snmp-server enable traps storm-control, page 727
• snmp-server enable traps stpx, page 728
• snmp-server enable traps transceiver, page 729
• snmp-server enable traps vstack, page 730
• snmp-server engineID, page 731
• snmp-server host, page 732
• switchport mode access, page 737
• switchport voice vlan, page 738
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
680
monitor capture (interface/control plane)
monitor capture (interface/control plane)
To configure monitor capture points specifying an attachment point and the packet flow direction or add more
attachment points to a capture point, use the monitor capture command in privileged EXEC mode. To disable
the monitor capture with the specified attachment point and the packet flow direction or disable one of multiple
attachment points on a capture point, use the no form of this command.
monitor capture {capture-name}{interface interface-type interface-id | control-plane}{in | out | both}
no monitor capture {capture-name}{interface interface-type interface-id | control-plane}{in | out | both}
Syntax Description
capture-name
The name of the capture to be defined.
interface interface-type Specifies an interface with interface-type and interface-id as an attachment point.
The arguments have these meanings:
interface-id
• GigabitEthernet interface-id—A Gigabit Ethernet IEEE 802.3z interface.
• vlan vlan-id—A VLAN. The range for vlan-id is 1 to 4095.
• capwap capwap-id—Specifies a Control and Provisioning of Wireless
Access Points Protocol (CAPWAP) tunneling interface. For a list of
CAPWAP tunnels that can be used as attachment points, use the show
capwap summary command.
Note
control-plane
Specifies the control plane as an attachment point.
in | out | both
Specifies the traffic direction to be captured.
Command Default
A Wireshark capture is not configured.
Command Modes
Privileged EXEC
Command History
This is the only attachment point that can be used for a wireless
capture. When using this interface as an attachment point, no other
interface types can be used as attachment points on the same capture
point.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
681
monitor capture (interface/control plane)
Usage Guidelines
Once an attachment point has been associated with a capture point using this command, the only way to change
its direction is to remove the attachment point using the no form of the command and reattach the attachment
point with the new direction. An attachment point's direction cannot be overridden.
If an attachment point is removed from a capture point and only one attachment point is associated with it,
the capture point is effectively deleted.
Multiple attachment points can be associated with a capture point by re-running this command with another
attachment point. An example is provided below.
Multiple capture points can be defined, but only one can be active at a time. In other words, you have to stop
one before you can start the other.
Packets captured in the output direction of an interface might not reflect the changes made by switch rewrite
(includes TTL, VLAN tag, CoS, checksum, MAC addresses, DSCP, precedent, UP, etc.).
No specific order applies when defining a capture point; you can define capture point parameters in any order.
The Wireshark CLI allows as many parameters as possible on a single line. This limits the number of commands
required to define a capture point.
Neither VRFs, management ports, nor private VLANs can be used as attachment points.
Wireshark cannot capture packets on a destination SPAN port.
When a VLAN is used as a Wireshark attachment point, packets are captured in the input direction only.
Wireless (CAPWAP) Usage Considerations
The only form of wireless capture is a CAPWAP tunnel capture.
When capturing CAPWAP tunnels, no other interface types can be used as attachment points on the same
capture point.. Also, the only different type of attachment point allowed on the same capture point is the
control plane. The combination of control plane and CAPWAP tunnel attachment points should be able to
capture all wireless-related traffic.
Capturing multiple CAPWAP tunnels is supported. ACLs for each CAPWAP tunnel will be combined and
sent to the switch as a single ACL.
Core filters will not be applied and can be omitted when capturing a CAPWAP tunnel. When control plane
and CAPWAP tunnels are mixed, the core filter will not be applied on the control plane packets either.
To capture a CAPWAP non-data tunnel, capture traffic on the management VLAN and apply an appropriate
ACL to filter the traffic. Note that this ACL will be combined with the core filter ACL and assigned to the
switch as a single ACL.
Examples
To define a capture point using a physical interface as an attachment point:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in
Switch# monitor capture mycap match ipv4 any any
Note
The second command defines the core filter for the capture point. This is required for a functioning capture
point unless you are using a CAPWAP tunneling attachment point in your capture point.
If you are using CAPWAP tunneling attachment points in your capture point, you cannot use core filters.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
682
monitor capture (interface/control plane)
To define a capture point with multiple attachment points:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in
Switch# monitor capture mycap match ipv4 any any
Switch# monitor capture mycap control-plane in
Switch# show monitor capture mycap parameter
monitor capture mycap interface GigabitEthernet1/0/1 in
monitor capture mycap control-plane in
To remove an attachment point from a capture point defined with multiple attachment points:
Switch# show monitor capture mycap parameter
monitor capture mycap interface GigabitEthernet1/0/1 in
monitor capture mycap control-plane in
Switch# no monitor capture mycap control-plane
Switch# show monitor capture mycap parameter
monitor capture mycap interface GigabitEthernet1/0/1 in
To define a capture point with a CAPWAP attachment point:
Switch# show capwap summary
CAPWAP Tunnels General Statistics:
Number of Capwap Data Tunnels
Number of Capwap Mobility Tunnels
Number of Capwap Multicast Tunnels
= 1
= 0
= 0
Name
APName
Type PhyPortIf Mode
McastIf
------ -------------------------------- ---- --------- --------- ------Ca0
AP442b.03a9.6715
data Gi3/0/6
unicast
Name
SrcIP
SrcPort DestIP
DstPort DtlsEn MTU
Xact
------ --------------- ------- --------------- ------- ------ ----- ---Ca0
10.10.14.32
5247
10.10.14.2
38514
No
1449 0
Switch#
Switch#
Switch#
Switch#
monitor
monitor
monitor
monitor
capture
capture
capture
capture
mycap
mycap
mycap
mycap
interface capwap 0 both
file location flash:mycap.pcap
file buffer-size 1
start
*Aug 20 11:02:21.983: %BUFCAP-6-ENABLE: Capture Point mycap enabled.on
Switch# show monitor capture mycap parameter
monitor capture mycap interface capwap 0 in
monitor capture mycap interface capwap 0 out
monitor capture mycap file location flash:mycap.pcap buffer-size 1
Switch#
Switch# show monitor capture mycap
Status Information for Capture mycap
Target Type:
Interface: CAPWAP,
Ingress:
0
Egress:
0
Status : Active
Filter Details:
Capture all packets
Buffer Details:
Buffer Type: LINEAR (default)
File Details:
Associated file name: flash:mycap.pcap
Size of buffer(in MB): 1
Limit Details:
Number of Packets to capture: 0 (no limit)
Packet Capture duration: 0 (no limit)
Packet Size to capture: 0 (no limit)
Packets per second: 0 (no limit)
Packet sampling rate: 0 (no sampling)
Switch#
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
683
monitor capture (interface/control plane)
Switch# show monitor capture file flash:mycap.pcap
1
0.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
2
0.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
3
2.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
4
2.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
5
3.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
6
4.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
7
4.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
8
5.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
9
5.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
10
6.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
11
8.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
12
9.225986
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
13
9.225986
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
14
9.225986
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
15
9.231998
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
16
9.231998
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
17
9.231998
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
18
9.236987
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
19 10.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
20 10.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
21 12.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
22 12.239993
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
23 12.244997
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
24 12.244997
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
25 12.250994
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
26 12.256990
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
27 12.262987
10.10.14.2 -> 10.10.14.32 DTLSv1.0 Application Data
28 12.499974 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
29 12.802012
10.10.14.3 -> 10.10.14.255 NBNS Name query NB WPAD.<00>
30 13.000000 00:00:00:00:00:00 -> 3c:ce:73:39:c6:60 IEEE 802.11 Probe Request,
Flags=........
Related Commands
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
SN=0, FN=0,
Command
Description
monitor capture buffer
Configures the buffer for monitor capture (WireShark).
monitor capture file
Configures monitor capture (WireShark) storage file attributes.
show monitor capture
show monitor capture
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
684
SN=0, FN=0,
monitor capture buffer
monitor capture buffer
To configure the buffer for monitor capture (WireShark), use the monitor capture buffer command in
privileged EXEC mode. To disable the monitor capture buffer or change the buffer back to a default linear
buffer from a circular buffer, use the no form of this command.
monitor capture {capture-name} buffer {circular [size buffer-size ] | size buffer-size}
no monitor capture {capture-name} buffer [circular ]
Syntax Description
capture-name
The name of the capture whose buffer is to be configured.
circular
Specifies that the buffer is of a circular type. The circular type of buffer
continues to capture data, even after the buffer is consumed, by overwriting
the data captured previously.
size buffer-size
(Optional) Specifies the size of the buffer. The range is from 1 MB to 100 MB.
Command Default
A linear buffer is configured.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
When you first configure a WireShark capture, a circular buffer of a small size is suggested.
Examples
To configure a circular buffer with a size of 1 MB:
Switch# monitor capture mycap buffer circular size 1
Related Commands
Command
Description
monitor capture (interface/control plane)
Configures monitor capture (WireShark) specifying an attachment
point and the packet flow direction.
monitor capture file
Configures monitor capture (WireShark) storage file attributes.
show monitor capture
show monitor capture
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
685
monitor capture clear
monitor capture clear
To clears the monitor capture (WireShark) buffer, use the monitor capture clear command in privileged
EXEC mode.
monitor capture {capture-name} clear
Syntax Description
capture-name
Command Default
The buffer content is not cleared.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The name of the capture whose buffer is to be cleared.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture clear command either during capture or after the capture has stopped either because
one or more end conditions has been met, or you entered the monitor capture stop command. If you enter
the monitor capture clear command after the capture has stopped, the monitor capture export command
that is used to store the contents of the captured packets in a file will have no impact because the buffer has
no captured packets.
If you have more than one capture that is storing packets in a buffer, clear the buffer before starting a new
capture to avoid memory loss.
Examples
To clear the buffer contents for capture mycap:
Switch#
monitor capture mycap clear
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
686
monitor capture export
monitor capture export
To export a monitor capture (WireShark) to a file, use the monitor capture export command in privileged
EXEC mode.
monitor capture {capture-name} export file-location : file-name
Syntax Description
capture-name
The name of the capture to be exported.
file-location : file-name
(Optional) Specifies the location and file name of the capture storage file.
Acceptable values for file-location :
• flash—On-board flash storage
• (usbflash0:)— USB drive
Command Default
The captured packets are not stored.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture export command only when the storage destination is a capture buffer. The file
may be stored either remotely or locally. Use this command either during capture or after the packet capture
has stopped. The packet capture is stopped when one or more end conditions have been met or you entered
the monitor capture stop command.
When WireShark is used on switches in a stack, packet captures can be stored only on the devices specified
for file-location above that are connected to the active switch. Example: flash1 is connected to the active
switch. flash2 is connected to the secondary switch. Only flash1 can be used to store packet captures.
Note
Examples
Attempts to store packet captures on unsupported devices or devices not connected to the active switch
will probably result in errors.
To export the capture buffer contents to mycap.pcap on a flash drive:
Switch# monitor capture mycap export flash:mycap.pcap
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
687
monitor capture file
monitor capture file
To configure monitor capture (WireShark) storage file attributes, use the monitor capture file command in
privileged EXEC mode. To remove a storage file attribute, use the no form of this command.
monitor capture {capture-name} file{[ buffer-size temp-buffer-size ][ location file-location : file-name ][
ring number-of-ring-files ][ size total-size ]}
no monitor capture {capture-name} file{[ buffer-size ][ location ][ ring ][ size ]}
Syntax Description
capture-name
The name of the capture to be modified.
buffer-size temp-buffer-size
(Optional) Specifies the size of the temporary buffer. The range for
temp-buffer-size is 1 to 100 MB. This is specified to reduce packet loss.
location file-location : file-name
(Optional) Specifies the location and file name of the capture storage
file. Acceptable values for file-location :
• flash—On-board flash storage
• (usbflash0:)— USB drive
ring number-of-ring-files
(Optional) Specifies that the capture is to be stored in a circular file chain
and the number of files in the file ring.
size total-size
(Optional) Specifies the total size of the capture files.
Command Default
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture file command only when the storage destination is a file. The file may be stored
either remotely or locally. Use this command after the packet capture has stopped. The packet capture is
stopped when one or more end conditions have been met or you entered the monitor capture stop command.
When WireShark is used on switches in a stack, packet captures can be stored only on the devices specified
for file-location above that are connected to the active switch. Example: flash1 is connected to the active
switch. flash2 is connected to the secondary switch. Only flash1 can be used to store packet captures.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
688
monitor capture file
Note
Examples
Attempts to store packet captures on unsupported devices or devices not connected to the active switch
will probably result in errors.
To specify that the storage file name is mycap.pcap, stored on a flash drive:
Switch# monitor capture mycap file location flash:mycap.pcap
Related Commands
Command
Description
monitor capture (interface/control plane)
Configures monitor capture (WireShark) specifying an
attachment point and the packet flow direction.
monitor capture buffer
Configures the buffer for monitor capture (WireShark).
show monitor capture
show monitor capture
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
689
monitor capture limit
monitor capture limit
To configure capture limits, use the monitor capture limit command in privileged EXEC mode. To remove
the capture limits, use the no form of this command.
monitor capture {capture-name} limit {[duration seconds][packet-length size][packets num]}
no monitor capture {capture-name} limit [duration][packet-length][packets]
Syntax Description
capture-name
The name of the capture to be assigned capture limits.
duration seconds
(Optional) Specifies the duration of the capture, in seconds. The range is
from 1 to 1000000.
packet-length size
(Optional) Specifies the packet length, in bytes. If the actual packet is longer
than the specified length, only the first set of bytes whose number is denoted
by the bytes argument is stored.
packets num
(Optional) Specifies the number of packets to be processed for capture.
Command Default
Capture limits are not configured.
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
To configure a session limit of 60 seconds and a packet segment length of 400 bytes:
Switch# monitor capture mycap limit duration 60 packet-len 400
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
690
monitor capture match
monitor capture match
Note
Do not use this command when capturing a CAPWAP tunnel. Also, when control plane and CAPWAP
tunnels are mixed, this command will have no effect.
To define an explicit inline core filter for a monitor (Wireshark) capture, use the monitor capture match
command in privileged EXEC mode. To remove this filter, use the no form of this command.
monitor capture {capture-name} match {any | mac mac-match-string | ipv4 {any | host | protocol}{any |
host} | ipv6 {any | host | protocol}{any | host}}
no monitor capture {capture-name} match
Syntax Description
capture-name
The name of the capture to be assigned a core filter.
any
Specifies all packets.
mac mac-match-string
Specifies a Layer 2 packet.
ipv4
Specifies IPv4 packets.
host
Specifies the host.
protocol
Specifies the protocol.
ipv6
Specifies IPv6 packets.
Command Default
A core filter is not configured.
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
To define a capture point and the core filter for the capture point that matches to any IP version 4 packets on
the source or destination:
Switch# monitor capture mycap interface GigabitEthernet1/0/1 in
Switch# monitor capture mycap match ipv4 any any
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
691
monitor capture start
monitor capture start
To start the capture of packet data at a traffic trace point into a buffer, use the monitor capture start command
in privileged EXEC mode.
monitor capture {capture-name} start
Syntax Description
capture-name
Command Default
The buffer content is not cleared.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The name of the capture to be started.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Use the monitor capture clear command to enable the packet data capture after the capture point is defined.
To stop the capture of packet data, use the monitor capture stop command.
Ensure that system resources such as CPU and memory are available before starting a capture.
Examples
To start capturing buffer contents:
Switch#
monitor capture mycap start
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
692
monitor capture stop
monitor capture stop
To stop the capture of packet data at a traffic trace point, use the monitor capture stop command in privileged
EXEC mode.
monitor capture {capture-name} stop
Syntax Description
capture-name
The name of the capture to be stopped.
Command Default
The packet data capture is ongoing.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
Use the monitor capture stop command to stop the capture of packet data that you started using the monitor
capture start command. You can configure two types of capture buffers: linear and circular. When the linear
buffer is full, data capture stops automatically. When the circular buffer is full, data capture starts from the
beginning and the data is overwritten.
Examples
To stop capturing buffer contents:
Switch#
monitor capture mycap stop
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
693
monitor session
monitor session
To create a new Ethernet Switched Port Analyzer (SPAN) or a Remote Switched Port Analyzer (RSPAN)
session configuration for analyzing traffic between ports or add to an existing session configuration, use the
monitor session global configuration command. To clear SPAN or RSPAN sessions, use the no form of this
command.
monitor session session-number {destination | filter | source}
no monitor session {session-number [destination | filter | source] | all | local | range session-range | remote}
Syntax Description
session-number
all
Clears all monitor sessions.
local
Clears all local monitor sessions.
range session-range
Clears monitor sessions in the specified range.
remote
Clears all remote monitor sessions.
Command Default
No monitor sessions are configured.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to create a local SPAN session 1 to monitor traffic on Po13 (an EtherChannel port)
and limit SPAN traffic in the session only to VLAN 1281. Egress traffic replicates the source; ingress forwarding
is not enabled.
Switch(config)#
Switch(config)#
Switch(config)#
replicate
Switch(config)#
monitor session 1 source interface Po13
monitor session 1 filter vlan 1281
monitor session 1 destination interface GigabitEthernet2/0/36 encapsulation
monitor session 1 destination interface GigabitEthernet3/0/36 encapsulation
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
694
monitor session
replicate
The following is the output of a show monitor session all command after completing these setup instructions:
Switch# show monitor session all
Session 1
--------Type
Source Ports
Both
Destination Ports
Encapsulation
Ingress
Filter VLANs
...
Related Commands
:
:
:
:
: Local Session
:
: Po13
Gi2/0/36,Gi3/0/36
Replicate
Disabled
1281
Command
Description
monitor session destination
Configures a FSPAN or FRSPAN destination session.
monitor session filter
Configures a FSPAN or FRSPAN session filter.
monitor session source
Configures a FSPAN or FRSPAN source session.
show monitor
Displays information about all SPAN and RSPAN sessions.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
695
monitor session destination
monitor session destination
To start a new Switched Port Analyzer (SPAN) session or Remote SPAN (RSPAN) destination session, to
enable ingress traffic on the destination port for a network security device (such as a Cisco IDS Sensor
Appliance), and to add or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, use
the monitor session destination global configuration command. To remove the SPAN or RSPAN session or
to remove destination interfaces from the SPAN or RSPAN session, use the no form of this command.
monitor session session-number destination {interface interface-id [, | -] [encapsulation {replicate | dot1q}
] {ingress [dot1q | untagged] } | {remote} vlan vlan-id
no monitor session session-number destination {interface interface-id [, | -] [encapsulation {replicate |
dot1q} ] {ingress [dot1q | untagged] } | {remote} vlan vlan-id
Syntax Description
session-number
interface interface-id
Specifies the destination or source interface for a SPAN or
RSPAN session. Valid interfaces are physical ports (including
type, stack member, module, and port number). For source
interface, port channel is also a valid interface type, and the
valid range is 1 to 128.
,
(Optional) Specifies a series of interfaces or VLANs, or
separates a range of interfaces or VLANs from a previous
range. Enter a space before and after the comma.
-
(Optional) Specifies a range of interfaces or VLANs. Enter a
space before and after the hyphen.
encapsulation replicate
(Optional) Specifies that the destination interface replicates
the source interface encapsulation method. If not selected, the
default is to send packets in native form (untagged).
These keywords are valid only for local SPAN. For RSPAN,
the RSPAN VLAN ID overwrites the original VLAN ID;
therefore, packets are always sent untagged. The
encapsulation options are ignored with the no form of the
command.
encapsulation dot1q
(Optional) Specifies that the destination interface accepts the
source interface incoming packets with IEEE 802.1Q
encapsulation.
These keywords are valid only for local SPAN. For RSPAN,
the RSPAN VLAN ID overwrites the original VLAN ID;
therefore, packets are always sent untagged. The
encapsulation options are ignored with the no form of the
command.
ingress
Enables ingress traffic forwarding.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
696
monitor session destination
dot1q
(Optional) Accepts incoming packets with IEEE 802.1Q
encapsulation with the specified VLAN as the default VLAN.
untagged
(Optional) Accepts incoming packets with untagged
encapsulation with the specified VLAN as the default VLAN.
isl
Specifies ingress forwarding using ISL encapsulation.
remote
Specifies the remote VLAN for an RSPAN source or
destination session. The range is 2 to 1001 and 1006 to 4094.
The RSPAN VLAN cannot be VLAN 1 (the default VLAN)
or VLAN IDs 1002 to 1005 (reserved for Token Ring and
FDDI VLANs).
vlan vlan-id
Command Default
Sets the default VLAN for ingress traffic when used with only
the ingress keyword.
No monitor sessions are configured.
If encapsulation replicate is not specified on a local SPAN destination port, packets are sent in native form
with no encapsulation tag.
Ingress forwarding is disabled on destination ports.
You can specify all, local, range session-range, or remote with the no monitor session command to clear
all SPAN and RSPAN, all local SPAN, a range, or all RSPAN sessions.
Command Modes
Command History
Usage Guidelines
Global configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
You can set a combined maximum of 8 local SPAN sessions and RSPAN source sessions. You can have a
total of 66 SPAN and RSPAN sessions on a switch or switch stack.
A SPAN or RSPAN destination must be a physical port.
You can have a maximum of 64 destination ports on a switch or a switch stack.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source
ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all
active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are
included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination
port.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
697
monitor session destination
You can monitor traffic on a single port or VLAN or on a series or range of ports or VLANs. You select a
series or range of interfaces or VLANs by using the [, | -] options.
If you specify a series of VLANs or interfaces, you must enter a space before and after the comma. If you
specify a range of VLANs or interfaces, you must enter a space before and after the hyphen (-).
EtherChannel ports can be configured as SPAN or RSPAN destination ports. A physical port that is a member
of an EtherChannel group can be used as a destination port, but it cannot participate in the EtherChannel group
while it is as a SPAN destination.
A port used as a destination port cannot be a SPAN or RSPAN source, nor can a port be a destination port for
more than one session at a time.
You can enable IEEE 802.1x authentication on a port that is a SPAN or RSPAN destination port; however,
IEEE 802.1x authentication is disabled until the port is removed as a SPAN destination. If IEEE 802.1x
authentication is not available on the port, the switch returns an error message. You can enable IEEE 802.1x
authentication on a SPAN or RSPAN source port.
If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic at
Layer 2.
Destination ports can be configured to function in these ways:
• When you enter monitor session session_number destination interface interface-id with no other
keywords, egress encapsulation is untagged, and ingress forwarding is not enabled.
• When you enter monitor session session_number destination interface interface-id ingress, egress
encapsulation is untagged; ingress encapsulation depends on the keywords that follow—dot1q or
untagged.
• When you enter monitor session session_number destination interface interface-id encapsulation
replicate with no other keywords, egress encapsulation replicates the source interface encapsulation;
ingress forwarding is not enabled. (This applies to local SPAN only; RSPAN does not support
encapsulation replication.)
• When you enter monitor session session_number destination interface interface-id encapsulation
replicate ingress, egress encapsulation replicates the source interface encapsulation; ingress encapsulation
depends on the keywords that follow—dot1q or untagged. (This applies to local SPAN only; RSPAN
does not support encapsulation replication.)
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source
port 1 on stack member 1 to destination port 2 on stack member 2:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both
Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
This example shows how to delete a destination port from an existing local SPAN session:
Switch(config)# no monitor session 2 destination interface gigabitethernet1/0/2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
698
monitor session destination
This example shows how to configure RSPAN source session 1 to monitor a source interface and to configure
the destination RSPAN VLAN 900:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1
Switch(config)# monitor session 1 destination remote vlan 900
Switch(config)# end
This example shows how to configure an RSPAN destination session 10 in the switch receiving the monitored
traffic:
Switch(config)# monitor session 10 source remote vlan 900
Switch(config)# monitor session 10 destination interface gigabitethernet1/0/2
This example shows how to configure the destination port for ingress traffic on VLAN 5 by using a security
device that supports IEEE 802.1Q encapsulation. Egress traffic replicates the source; ingress traffic uses IEEE
802.1Q encapsulation.
Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 encapsulation
dot1q ingress dot1q vlan 5
This example shows how to configure the destination port for ingress traffic on VLAN 5 by using a security
device that does not support encapsulation. Egress traffic and ingress traffic are untagged.
Switch(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress untagged
vlan 5
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session filter
Configures a FSPAN or FRSPAN session filter.
monitor session source
Configures a FSPAN or FRSPAN source session.
show monitor
Displays information about all SPAN and RSPAN sessions.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
699
monitor session filter
monitor session filter
To start a new flow-based SPAN (FSPAN) session or flow-based RSPAN (FRSPAN) source or destination
session, or to limit (filter) SPAN source traffic to specific VLANs, use the monitor session filter global
configuration command. To remove filters from the SPAN or RSPAN session, use the no form of this command.
monitor session session-number filter {vlan vlan-id [, | -] }
no monitor session session-number filter {vlan vlan-id [, | -] }
Syntax Description
session-number
vlan vlan-id
Specifies a list of VLANs as filters on trunk source ports to limit
SPAN source traffic to specific VLANs. The vlan-id range is 1 to
4094.
,
(Optional) Specifies a series of VLANs, or separates a range of
VLANs from a previous range. Enter a space before and after the
comma.
-
(Optional) Specifies a range of VLANs. Enter a space before and
after the hyphen.
Command Default
No monitor sessions are configured.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE This command was introduced.
Usage Guidelines
You can monitor traffic on a single VLAN or on a series or range of ports or VLANs. You select a series or
range of VLANs by using the [, | -] options.
If you specify a series of VLANs, you must enter a space before and after the comma. If you specify a range
of VLANs, you must enter a space before and after the hyphen (-).
VLAN filtering refers to analyzing network traffic on a selected set of VLANs on trunk source ports. By
default, all VLANs are monitored on trunk source ports. You can use the monitor session session_number
filter vlan vlan-id command to limit SPAN traffic on trunk source ports to only the specified VLANs.
VLAN monitoring and VLAN filtering are mutually exclusive. If a VLAN is a source, VLAN filtering cannot
be enabled. If VLAN filtering is configured, a VLAN cannot become a source.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
700
monitor session filter
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to limit SPAN traffic in an existing session only to specific VLANs:
Switch(config)# monitor session 1 filter vlan 100 - 110
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source
port 1 on stack member 1 to destination port 2 on stack member 2 and to filter IPv4 traffic using access list
number 122 in an FSPAN session:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both
Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
Switch(config)# monitor session 1 filter ip access-group 122
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session destination
Configures a FSPAN or FRSPAN destination session.
monitor session source
Configures a FSPAN or FRSPAN source session.
show monitor
Displays information about all SPAN and RSPAN sessions.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
701
monitor session source
monitor session source
To start a new Switched Port Analyzer (SPAN) session or Remote SPAN (RSPAN) source session, or to add
or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, use the monitor session
source global configuration command. To remove the SPAN or RSPAN session or to remove source interfaces
from the SPAN or RSPAN session, use the no form of this command.
monitor session session_number source {interface interface-id [, | -] [both | rx | tx] | [remote] vlan vlan-id
[, | -] [both | rx | tx]}
no monitor session session_number source {interface interface-id [, | -] [both | rx | tx] | [remote] vlan
vlan-id [, | -] [both | rx | tx]}
Syntax Description
session_number
interface interface-id
Specifies the source interface for a SPAN or RSPAN session. Valid
interfaces are physical ports (including type, stack member, module, and
port number). For source interface, port channel is also a valid interface
type, and the valid range is 1 to 48.
,
(Optional) Specifies a series of interfaces or VLANs, or separates a range
of interfaces or VLANs from a previous range. Enter a space before and
after the comma.
-
(Optional) Specifies a range of interfaces or VLANs. Enter a space before
and after the hyphen.
both | rx | tx
(Optional) Specifies the traffic direction to monitor. If you do not specify
a traffic direction, the source interface sends both transmitted and received
traffic.
remote
(Optional) Specifies the remote VLAN for an RSPAN source or destination
session. The range is 2 to 1001 and 1006 to 4094.
The RSPAN VLAN cannot be VLAN 1 (the default VLAN) or VLAN IDs
1002 to 1005 (reserved for Token Ring and FDDI VLANs).
vlan vlan-id
Command Default
When used with only the ingress keyword, sets default VLAN for ingress
traffic.
No monitor sessions are configured.
On a source interface, the default is to monitor both received and transmitted traffic.
On a trunk interface used as a source port, all VLANs are monitored.
Command Modes
Global configuration
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
702
monitor session source
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE
3.3SECisco IOS XE
3.3SE
This command was introduced.
Traffic that enters or leaves source ports or source VLANs can be monitored by using SPAN or RSPAN.
Traffic routed to source ports or source VLANs cannot be monitored.
A source can be a physical port, a port channel, or a VLAN.
Each session can include multiple ingress or egress source ports or VLANs, but you cannot combine source
ports and source VLANs in a single session. Each session can include multiple destination ports.
When you use VLAN-based SPAN (VSPAN) to analyze network traffic in a VLAN or set of VLANs, all
active ports in the source VLANs become source ports for the SPAN or RSPAN session. Trunk ports are
included as source ports for VSPAN, and only packets with the monitored VLAN ID are sent to the destination
port.
You can monitor traffic on a single port or VLAN or on a series or range of ports or VLANs. You select a
series or range of interfaces or VLANs by using the [, | -] options.
If you specify a series of VLANs or interfaces, you must enter a space before and after the comma. If you
specify a range of VLANs or interfaces, you must enter a space before and after the hyphen (-).
You can monitor individual ports while they participate in an EtherChannel, or you can monitor the entire
EtherChannel bundle by specifying the port-channel number as the RSPAN source interface.
A port used as a destination port cannot be a SPAN or RSPAN source, nor can a port be a destination port for
more than one session at a time.
You can enable IEEE 802.1x authentication on a SPAN or RSPAN source port.
You can verify your settings by entering the show monitor privileged EXEC command. You can display
SPAN, RSPAN, FSPAN, and FRSPAN configuration on the switch by entering the show running-config
privileged EXEC command. SPAN information appears near the end of the output.
Examples
This example shows how to create a local SPAN session 1 to monitor both sent and received traffic on source
port 1 on stack member 1 to destination port 2 on stack member 2:
Switch(config)# monitor session 1 source interface gigabitethernet1/0/1 both
Switch(config)# monitor session 1 destination interface gigabitethernet1/0/2
This example shows how to configure RSPAN source session 1 to monitor multiple source interfaces and to
configure the destination RSPAN VLAN 900.
Switch(config)#
Switch(config)#
Switch(config)#
Switch(config)#
monitor session 1 source interface gigabitethernet1/0/1
monitor session 1 source interface port-channel 2 tx
monitor session 1 destination remote vlan 900
end
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
703
monitor session source
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session destination
Configures a FSPAN or FRSPAN destination session.
monitor session filter
Configures a FSPAN or FRSPAN session filter.
show monitor
Displays information about all SPAN and RSPAN sessions.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
704
show monitor
show monitor
To display information about all Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) sessions, use
the show monitor command in EXEC mode.
show monitor [session {session_number | all | local | range list | remote} [detail]]
Syntax Description
(Optional) Displays information about specified SPAN
sessions.
session
session_number
all
(Optional) Displays all SPAN sessions.
local
(Optional) Displays only local SPAN sessions.
range list
(Optional) Displays a range of SPAN sessions, where list is
the range of valid sessions. The range is either a single
session or a range of sessions described by two numbers,
the lower one first, separated by a hyphen. Do not enter any
spaces between comma-separated parameters or in
hyphen-specified ranges.
Note
Command Modes
This keyword is available only in privileged EXEC
mode.
remote
(Optional) Displays only remote SPAN sessions.
detail
(Optional) Displays detailed information about the specified
sessions.
User EXEC
Privileged EXEC
Command History
Usage Guidelines
Release
Modification
Cisco IOS XE 3.3SECisco IOS
XE 3.3SE
This command was introduced.
The output is the same for the show monitor command and the show monitor session all command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
705
show monitor
Examples
This is an example of output for the show monitor user EXEC command:
Switch# show monitor
Session 1
--------Type : Local Session
Source Ports :
RX Only : Gi4/0/1
Both : Gi4/0/2-3,Gi4/0/5-6
Destination Ports : Gi4/0/20
Encapsulation : Replicate
Ingress : Disabled
Session 2
--------Type : Remote Source Session
Source VLANs :
TX Only : 10
Both : 1-9
Dest RSPAN VLAN : 105
This is an example of output for the show monitor user EXEC command for local SPAN source session 1:
Switch# show monitor session 1
Session 1
--------Type : Local Session
Source Ports :
RX Only : Gi4/0/1
Both : Gi4/0/2-3,Gi4/0/5-6
Destination Ports : Gi4/0/20
Encapsulation : Replicate
Ingress : Disabled
This is an example of output for the show monitor session all user EXEC command when ingress traffic
forwarding is enabled:
Switch# show monitor session all
Session 1
--------Type : Local Session
Source Ports :
Both : Gi4/0/2
Destination Ports : Gi4/0/3
Encapsulation : Native
Ingress : Enabled, default VLAN = 5
Ingress encap : DOT1Q
Session 2
--------Type : Local Session
Source Ports :
Both : Gi4/0/8
Destination Ports : Gi4/012
Encapsulation : Replicate
Ingress : Enabled, default VLAN = 4
Ingress encap : Untagged
Related Commands
Command
Description
monitor session
Configures a new SPAN or RSPAN session.
monitor session destination
Configures a FSPAN or FRSPAN destination session.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
706
show monitor
Command
Description
monitor session filter
Configures a FSPAN or FRSPAN session filter.
monitor session source
Configures a FSPAN or FRSPAN source session.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
707
show monitor capture
show monitor capture
To display monitor capture (WireShark) content, use the show monitor capture file command in privileged
EXEC mode.
show monitor capture [capture-name [ buffer ] | file file-location : file-name ][ brief | detailed | display-filter
display-filter-string ]
Syntax Description
capture-name
(Optional) Specifies the name of the capture to be displayed.
buffer
(Optional) Specifies that a buffer associated with the named capture
is to be displayed.
file file-location : file-name
(Optional) Specifies the file location and name of the capture storage
file to be displayed.
brief
(Optional) Specifies the display content in brief.
detailed
(Optional) Specifies detailed display content.
display-filter display-filter-string
Filters the display content according to the display-filter-string.
Command Default
Displays all capture content.
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
none
Examples
To display the capture for a capture called mycap:
Switch# show monitor capture mycap
Status Information for Capture mycap
Target Type:
Interface: CAPWAP,
Ingress:
0
Egress:
0
Status : Active
Filter Details:
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
708
show monitor capture
Capture all packets
Buffer Details:
Buffer Type: LINEAR (default)
File Details:
Associated file name: flash:mycap.pcap
Size of buffer(in MB): 1
Limit Details:
Number of Packets to capture: 0 (no limit)
Packet Capture duration: 0 (no limit)
Packet Size to capture: 0 (no limit)
Packets per second: 0 (no limit)
Packet sampling rate: 0 (no sampling)
Related Commands
Command
Description
monitor capture (interface/control plane) Configures monitor capture (WireShark) specifying an attachment
point and the packet flow direction.
monitor capture buffer
Configures the buffer for monitor capture (WireShark).
monitor capture file
Configures monitor capture (WireShark) storage file attributes.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
709
snmp-server enable traps
snmp-server enable traps
To enable the switch to send Simple Network Management Protocol (SNMP) notifications for various traps
or inform requests to the network management system (NMS), use the snmp-server enable traps command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps [auth-framework [sec-violation] | bridge | call-home | cluster | config |
config-copy | config-ctid | copy-config | cpu | dot1x | energywise | entity | envmon | errdisable |
event-manager | flash | fru-ctrl | license | mac-notification | port-security | power-ethernet | rep | snmp
| stackwise | storm-control | stpx | syslog | transceiver | tty | vlan-membership | vlancreate | vlandelete |
vstack | vtp ]
no snmp-server enable traps [auth-framework [sec-violation] | bridge | call-home | cluster | config |
config-copy | config-ctid | copy-config | cpu | dot1x | energywise | entity | envmon | errdisable |
event-manager | flash | fru-ctrl | license | mac-notification | port-security | power-ethernet | rep | snmp
| stackwise | storm-control | stpx | syslog | transceiver | tty | vlan-membership | vlancreate | vlandelete |
vstack | vtp ]
Syntax Description
auth-framework
(Optional) Enables SNMP CISCO-AUTH-FRAMEWORK-MIB
traps.
sec-violation
(Optional) Enables SNMP camSecurityViolationNotif notifications.
bridge
(Optional) Enables SNMP STP Bridge MIB traps.*
call-home
(Optional) Enables SNMP CISCO-CALLHOME-MIB traps.*
cluster
(Optional) Enables SNMP cluster traps.
config
(Optional) Enables SNMP configuration traps.
config-copy
(Optional) Enables SNMP configuration copy traps.
config-ctid
(Optional) Enables SNMP configuration CTID traps.
copy-config
(Optional) Enables SNMP copy-configuration traps.
cpu
(Optional) Enables CPU notification traps.*
dot1x
(Optional) Enables SNMP dot1x traps.*
energywise
(Optional) Enables SNMP energywise traps.*
entity
(Optional) Enables SNMP entity traps.
envmon
(Optional) Enables SNMP environmental monitor traps.*
errdisable
(Optional) Enables SNMP errdisable notification traps.*
event-manager
(Optional) Enables SNMP Embedded Event Manager traps.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
710
snmp-server enable traps
flash
(Optional) Enables SNMP FLASH notification traps.*
fru-ctrl
(Optional) Generates entity field-replaceable unit (FRU) control
traps. In a switch stack, this trap refers to the insertion or removal of
a switch in the stack.
license
(Optional) Enables license traps.*
mac-notification
(Optional) Enables SNMP MAC Notification traps.*
port-security
(Optional) Enables SNMP port security traps.*
power-ethernet
(Optional) Enables SNMP power Ethernet traps.*
rep
(Optional) Enables SNMP Resilient Ethernet Protocol traps.
snmp
(Optional) Enables SNMP traps.*
stackwise
(Optional) Enables SNMP stackwise traps.*
storm-control
(Optional) Enables SNMP storm-control trap parameters.*
stpx
(Optional) Enables SNMP STPX MIB traps.*
syslog
(Optional) Enables SNMP syslog traps.
transceiver
(Optional) Enables SNMP transceiver traps.*
tty
(Optional) Sends TCP connection traps. This is enabled by default.
vlan-membership
(Optional) Enables SNMP VLAN membership traps.
vlancreate
(Optional) Enables SNMP VLAN-created traps.
vlandelete
(Optional) Enables SNMP VLAN-deleted traps.
vstack
(Optional) Enables SNMP Smart Install traps.*
vtp
(Optional) Enables VLAN Trunking Protocol (VTP) traps.
Command Default
The sending of SNMP traps is disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
711
snmp-server enable traps
Usage Guidelines
The command options marked with an asterisk in the table above have subcommands. For more information
on these subcommands, see the Related Commands section below.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
When supported, use the snmp-server enable traps command to enable sending of traps or informs.
Note
Though visible in the command-line help strings, the fru-ctrl, insertion, and removal keywords are not
supported on the switch. The snmp-server enable informs global configuration command is not supported.
To enable the sending of SNMP inform notifications, use the snmp-server enable traps global
configuration command combined with the snmp-server host host-addr informs global configuration
command.
Note
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable more than one type of SNMP trap:
Switch(config)# snmp-server enable traps cluster
Switch(config)# snmp-server enable traps config
Switch(config)# snmp-server enable traps vtp
Related Commands
Command
Description
snmp-server enable traps bridge
Generates STP bridge MIB traps.
snmp-server enable traps call-home
Enables SNMP CISCO-CALLHOME-MIB traps.
snmp-server enable traps cpu
Enables CPU notifications.
snmp-server enable traps envmon
Enables SNMP environmental traps.
snmp-server enable traps errdisable
Enables SNMP errdisable notifications.
snmp-server enable traps flash
Enables SNMP flash notifications.
snmp-server enable traps license
Enables license traps.
snmp-server enable traps mac-notification
Enables SNMP MAC notification traps.
snmp-server enable traps port-security
Enables SNMP port security traps.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
712
snmp-server enable traps
Command
Description
snmp-server enable traps power-ethernet
Enables SNMP PoE traps.
snmp-server enable traps snmp
Enables SNMP traps.
snmp-server enable traps stackwise
Enables SNMP StackWise traps.
snmp-server enable traps storm-control
Enables SNMP storm-control trap parameters.
snmp-server enable traps stpx
Enables SNMP STPX MIB traps.
snmp-server enable traps transceiver
Enable SNMP transceiver traps.
snmp-server enable traps vstack
Enables SNMP smart install traps.
snmp-server host
Specifies the recipient (host) of a SNMP notification
operation.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
713
snmp-server enable traps bridge
snmp-server enable traps bridge
To generate STP bridge MIB traps, use the snmp-server enable traps bridge command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps bridge [newroot] [topologychange]
no snmp-server enable traps bridge [newroot] [topologychange]
Syntax Description
newroot
(Optional) Enables SNMP STP bridge MIB new root traps.
topologychange
(Optional) Enables SNMP STP bridge MIB topology change traps.
Command Default
The sending of bridge SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to send bridge new root traps to the NMS:
Switch(config)# snmp-server enable traps bridge newroot
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
714
snmp-server enable traps call-home
snmp-server enable traps call-home
To enable SNMP CISCO-CALLHOME-MIB traps, use the snmp-server enable traps call-home command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps call-home [message-send-fail | server-fail]
no snmp-server enable traps call-home [message-send-fail | server-fail]
Syntax Description
message-send-fail
(Optional) Enables SNMP message-send-fail traps.
server-fail
(Optional) Enables SNMP server-fail traps.
Command Default
The sending of SNMP CISCO-CALLHOME-MIB traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP message-send-fail traps:
Switch(config)# snmp-server enable traps call-home message-send-fail
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
715
snmp-server enable traps cpu
snmp-server enable traps cpu
To enable CPU notifications, use the snmp-server enable traps cpu command in global configuration mode.
Use the no form of this command to return to the default setting.
snmp-server enable traps cpu [threshold]
no snmp-server enable traps cpu [threshold]
Syntax Description
threshold
(Optional) Enables CPU threshold notification.
Command Default
The sending of CPU notifications is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate CPU threshold notifications:
Switch(config)# snmp-server enable traps cpu threshold
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
716
snmp-server enable traps envmon
snmp-server enable traps envmon
To enable SNMP environmental traps, use the snmp-server enable traps envmon command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps envmon [fan][shutdown][status] [supply][temperature]
no snmp-server enable traps envmon [fan][shutdown][status] [supply][temperature]
Syntax Description
fan
(Optional) Enables fan traps.
shutdown
(Optional) Enables environmental monitor shutdown traps.
status
(Optional) Enables SNMP environmental status-change traps.
supply
(Optional) Enables environmental monitor power-supply traps.
temperature
(Optional) Enables environmental monitor temperature traps.
Command Default
The sending of environmental SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate fan traps:
Switch(config)# snmp-server enable traps envmon fan
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
717
snmp-server enable traps errdisable
snmp-server enable traps errdisable
To enable SNMP notifications of error-disabling, use the snmp-server enable traps errdisable command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps errdisable [notification-rate number-of-notifications]
no snmp-server enable traps errdisable [notification-rate number-of-notifications]
Syntax Description
notification-rate
number-of-notifications
(Optional) Specifies number of notifications per minute as the
notification rate. Accepted values are from 0 to 10000.
Command Default
The sending of SNMP notifications of error-disabling is disabled.
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE This command was introduced.
Usage Guidelines
Note
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to set the number SNMP notifications of error-disabling to 2:
Switch(config)# snmp-server enable traps errdisable notification-rate 2
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
718
snmp-server enable traps flash
snmp-server enable traps flash
To enable SNMP flash notifications, use the snmp-server enable traps flash command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps flash [insertion][removal]
no snmp-server enable traps flash [insertion][removal]
Syntax Description
insertion
(Optional) Enables SNMP flash insertion notifications.
removal
(Optional) Enables SNMP flash removal notifications.
Command Default
The sending of SNMP flash notifications is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP flash insertion notifications:
Switch(config)# snmp-server enable traps flash insertion
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
719
snmp-server enable traps license
snmp-server enable traps license
To enable license traps, use the snmp-server enable traps license command in global configuration mode.
Use the no form of this command to return to the default setting.
snmp-server enable traps license [deploy][error][usage]
no snmp-server enable traps license [deploy][error][usage]
Syntax Description
deploy
(Optional) Enables license deployment traps.
error
(Optional) Enables license error traps.
usage
(Optional) Enables license usage traps.
Command Default
The sending of license traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate license deployment traps:
Switch(config)# snmp-server enable traps license deploy
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
720
snmp-server enable traps mac-notification
snmp-server enable traps mac-notification
To enable SNMP MAC notification traps, use the snmp-server enable traps mac-notification command in
global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps mac-notification [change][move][threshold]
no snmp-server enable traps mac-notification [change][move][threshold]
Syntax Description
change
(Optional) Enables SNMP MAC change traps.
move
(Optional) Enables SNMP MAC move traps.
threshold
(Optional) Enables SNMP MAC threshold traps.
Command Default
The sending of SNMP MAC notification traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP MAC notification change traps:
Switch(config)# snmp-server enable traps mac-notification change
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
721
snmp-server enable traps port-security
snmp-server enable traps port-security
To enable SNMP port security traps, use the snmp-server enable traps port-security command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps port-security [trap-rate value]
no snmp-server enable traps port-security [trap-rate value]
Syntax Description
trap-rate value
(Optional) Sets the maximum number of port-security traps sent per second. The
range is from 0 to 1000; the default is 0 (no limit imposed; a trap is sent at every
occurrence).
Command Default
The sending of port security SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable port-security traps at a rate of 200 per second:
Switch(config)# snmp-server enable traps port-security trap-rate 200
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
722
snmp-server enable traps power-ethernet
snmp-server enable traps power-ethernet
To enable SNMP power-over-Ethernet (PoE) traps, use the snmp-server enable traps power-ethernet
command in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps power-ethernet {group number | police}
no snmp-server enable traps power-ethernet {group number | police}
Syntax Description
group number
Enables inline power group-based traps for the specified group number.
Accepted values are from 1 to 9.
police
Enables inline power policing traps.
Command Default
The sending of power-over-Ethernet SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable power-over-Ethernet traps for group 1:
Switch(config)# snmp-server enable traps poower-over-ethernet group 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
723
snmp-server enable traps snmp
snmp-server enable traps snmp
To enable SNMP traps, use the snmp-server enable traps snmp command in global configuration mode.
Use the no form of this command to return to the default setting.
snmp-server enable traps snmp [authentication ][coldstart ][linkdown ] [linkup ][warmstart]
no snmp-server enable traps snmp [authentication ][coldstart ][linkdown ] [linkup ][warmstart]
Syntax Description
authentication
(Optional) Enables authentication traps.
coldstart
(Optional) Enables cold start traps.
linkdown
(Optional) Enables linkdown traps.
linkup
(Optional) Enables linkup traps.
warmstart
(Optional) Enables warmstart traps.
Command Default
The sending of SNMP traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to enable a warmstart SNMP trap:
Switch(config)# snmp-server enable traps snmp warmstart
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
724
snmp-server enable traps stackwise
snmp-server enable traps stackwise
To enable SNMP StackWise traps, use the snmp-server enable traps stackwise command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps stackwise [GLS][ILS][SRLS] [insufficient-power][invalid-input-current]
[invalid-output-current][member-removed][member-upgrade-notification] [new-master][new-member]
[port-change][power-budget-warning][power-invalid-topology]
[power-link-status-changed][power-oper-status-changed]
[power-priority-conflict][power-version-mismatch][ring-redundant]
[stack-mismatch][unbalanced-power-supplies][under-budget][under-voltage]
no snmp-server enable traps stackwise [GLS][ILS][SRLS] [insufficient-power][invalid-input-current]
[invalid-output-current][member-removed][member-upgrade-notification] [new-master][new-member]
[port-change][power-budget-warning][power-invalid-topology]
[power-link-status-changed][power-oper-status-changed]
[power-priority-conflict][power-version-mismatch][ring-redundant]
[stack-mismatch][unbalanced-power-supplies][under-budget][under-voltage]
Syntax Description
GLS
(Optional) Enables StackWise stack power GLS trap.
ILS
(Optional) Enables StackWise stack power ILS trap.
SRLS
(Optional) Enables StackWise stack power SRLS trap.
insufficient-power
(Optional) Enables StackWise stack power unbalanced power supplies
trap.
invalid-input-current
(Optional) Enables StackWise stack power invalid input current trap.
invalid-output-current
(Optional) Enables StackWise stack power invalid output current
trap.
member-removed
(Optional) Enables StackWise stack member removed trap.
member-upgrade-notification
(Optional) Enables StackWise member to be reloaded for upgrade
trap.
new-master
(Optional) Enables StackWise new master trap.
new-member
(Optional) Enables StackWise stack new member trap.
port-change
(Optional) Enables StackWise stack port change trap.
power-budget-warning
(Optional) Enables StackWise stack power budget warning trap.
power-invalid-topology
(Optional) Enables StackWise stack power invalid topology trap.
power-link-status-changed
(Optional) Enables StackWise stack power link status changed trap.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
725
snmp-server enable traps stackwise
power-oper-status-changed
(Optional) Enables StackWise stack power port oper status changed
trap.
power-priority-conflict
(Optional) Enables StackWise stack power priority conflict trap.
power-version-mismatch
(Optional) Enables StackWise stack power version mismatch
discovered trap.
ring-redundant
(Optional) Enables StackWise stack ring redundant trap.
stack-mismatch
(Optional) Enables StackWise stack mismatch trap.
unbalanced-power-supplies
(Optional) Enables StackWise stack power unbalanced power supplies
trap.
under-budget
(Optional) Enables StackWise stack power under budget trap.
under-voltage
(Optional) Enables StackWise stack power under voltage trap.
Command Default
The sending of SNMP StackWise traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate StackWise stack power GLS traps:
Switch(config)# snmp-server enable traps stackwise GLS
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
726
snmp-server enable traps storm-control
snmp-server enable traps storm-control
To enable SNMP storm-control trap parameters, use the snmp-server enable traps storm-control command
in global configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps storm-control {trap-rate number-of-minutes}
no snmp-server enable traps storm-control {trap-rate}
Syntax Description
trap-rate number-of-minutes
(Optional) Specifies the SNMP storm-control trap rate in minutes.
Accepted values are from 0 to 1000.
Command Default
The sending of SNMP storm-control trap parameters is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to set the SNMP storm-control trap rate to 10 traps per minute:
Switch(config)# snmp-server enable traps storm-control trap-rate 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
727
snmp-server enable traps stpx
snmp-server enable traps stpx
To enable SNMP STPX MIB traps, use the snmp-server enable traps stpx command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps stpx [inconsistency][loop-inconsistency][root-inconsistency]
no snmp-server enable traps stpx [inconsistency][loop-inconsistency][root-inconsistency]
Syntax Description
inconsistency
(Optional) Enables SNMP STPX MIB inconsistency update traps.
loop-inconsistency
(Optional) Enables SNMP STPX MIB loop inconsistency update traps.
root-inconsistency
(Optional) Enables SNMP STPX MIB root inconsistency update traps.
Command Default
The sending of SNMP STPX MIB traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP STPX MIB inconsistency update traps:
Switch(config)# snmp-server enable traps stpx inconsistency
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
728
snmp-server enable traps transceiver
snmp-server enable traps transceiver
To enable SNMP transceiver traps, use the snmp-server enable traps transceiver command in global
configuration mode. Use the no form of this command to return to the default setting.
snmp-server enable traps transceiver {all}
no snmp-server enable traps transceiver {all}
Syntax Description
all
(Optional) Enables all SNMP transceiver traps.
Command Default
The sending of SNMP transceiver traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to set all SNMP transceiver traps:
Switch(config)# snmp-server enable traps transceiver all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
729
snmp-server enable traps vstack
snmp-server enable traps vstack
To enable SNMP smart install traps, use the snmp-server enable traps vstack command in global configuration
mode. Use the no form of this command to return to the default setting.
snmp-server enable traps vstack [addition][failure][lost][operation]
no snmp-server enable traps vstack [addition][failure][lost][operation]
Syntax Description
addition
(Optional) Enables client added traps.
failure
(Optional) Enables file upload and download failure traps.
lost
(Optional) Enables client lost trap.
operation
(Optional) Enables operation mode change traps.
Command Default
The sending of SNMP smart install traps is disabled.
Command Modes
Global configuration
Command History
Usage Guidelines
Note
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
If no trap types are specified, all trap types are sent.
Informs are not supported in SNMPv1.
To enable more than one type of trap, you must enter a separate snmp-server enable traps command for
each trap type.
Examples
This example shows how to generate SNMP Smart Install client-added traps:
Switch(config)# snmp-server enable traps vstack addition
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
730
snmp-server engineID
snmp-server engineID
To configure a name for either the local or remote copy of SNMP, use the snmp-server engineID command
in global configuration mode.
snmp-server engineID {local engineid-string | remote ip-address [udp-port port-number] engineid-string}
Syntax Description
local engineid-string
Specifies a 24-character ID string with the name of the copy of SNMP. You
need not specify the entire 24-character engine ID if it has trailing zeros.
Specify only the portion of the engine ID up to the point where only zeros
remain in the value.
remote ip-address
Specifies the remote SNMP copy. Specify the ip-address of the device that
contains the remote copy of SNMP.
udp-port port-number
(Optional) Specifies the User Datagram Protocol (UDP) port on the remote
device. The default is 162.
Command Default
None
Command Modes
Global configuration
Command History
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None
Examples
The following example configures a local engine ID of 123400000000000000000000:
Switch(config)# snmp-server engineID local 1234
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
731
snmp-server host
snmp-server host
To specify the recipient (host) of a Simple Network Management Protocol (SNMP) notification operation,
use the snmp-server host global configuration command on the switch. Use the no form of this command to
remove the specified host.
snmp-server host {host-addr } [vrf vrf-instance ] [informs | traps] [version {1 | 2c | 3 {auth | noauth |
priv} } ] {community-string [notification-type] }
no snmp-server host {host-addr } [vrf vrf-instance ] [informs | traps] [version {1 | 2c | 3 {auth | noauth
| priv} } ] {community-string [notification-type] }
Syntax Description
host-addr
Name or Internet address of the host (the targeted recipient).
vrf vrf-instance (Optional) Specifies the virtual private network (VPN) routing instance and name for this
host.
informs | traps (Optional) Sends SNMP traps or informs to this host.
version 1 | 2c |
3
(Optional) Specifies the version of the SNMP used to send the traps.
1—SNMPv1. This option is not available with informs.
2c—SNMPv2C.
3—SNMPv3. One of the authorization keywords (see next table row) must follow the
Version 3 keyword.
auth | noauth | auth (Optional)—Enables Message Digest 5 (MD5) and Secure Hash Algorithm (SHA)
priv
packet authentication.
noauth (Default)—The noAuthNoPriv security level. This is the default if the auth |
noauth | priv keyword choice is not specified.
priv (Optional)—Enables Data Encryption Standard (DES) packet encryption (also called
privacy).
community-string Password-like community string sent with the notification operation. Though you can set
this string by using the snmp-server host command, we recommend that you define this
string by using the snmp-server community global configuration command before using
the snmp-server host command.
Note
The @ symbol is used for delimiting the context information. Avoid using the @
symbol as part of the SNMP community string when configuring this command.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
732
snmp-server host
notification-type (Optional) Type of notification to be sent to the host. If no type is specified, all notifications
are sent. The notification type can be one or more of the these keywords:
• auth-framework—Sends SNMP CISCO-AUTH-FRAMEWORK-MIB traps.
• bridge—Sends SNMP Spanning Tree Protocol (STP) bridge MIB traps.
• bulkstat—Sends Data-Collection-MIB Collection notification traps.
• call-home—Sends SNMP CISCO-CALLHOME-MIB traps.
• cef—Sends SNMP CEF traps.
• config—Sends SNMP configuration traps.
• config-copy—Sends SNMP config-copy traps.
• config-ctid—Sends SNMP config-ctid traps.
• copy-config—Sends SNMP copy configuration traps.
• cpu—Sends CPU notification traps.
• cpu threshold—Sends CPU threshold notification traps.
• entity—Sends SNMP entity traps.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
733
snmp-server host
• envmon—Sends environmental monitor traps.
• errdisable—Sends SNMP errdisable notification traps.
• event-manager—Sends SNMP Embedded Event Manager traps.
• flash—Sends SNMP FLASH notifications.
• flowmon—Sends SNMP flowmon notification traps.
• ipmulticast—Sends SNMP IP multicast routing traps.
• ipsla—Sends SNMP IP SLA traps.
• license—Sends license traps.
• local-auth—Sends SNMP local auth traps.
• mac-notification—Sends SNMP MAC notification traps.
• pim—Sends SNMP Protocol-Independent Multicast (PIM) traps.
• power-ethernet—Sends SNMP power Ethernet traps.
• snmp—Sends SNMP-type traps.
• storm-control—Sends SNMP storm-control traps.
• stpx—Sends SNMP STP extended MIB traps.
• syslog—Sends SNMP syslog traps.
• transceiver—Sends SNMP transceiver traps.
• tty—Sends TCP connection traps.
• vlan-membership— Sends SNMP VLAN membership traps.
• vlancreate—Sends SNMP VLAN-created traps.
• vlandelete—Sends SNMP VLAN-deleted traps.
• vrfmib—Sends SNMP vrfmib traps.
• vtp—Sends SNMP VLAN Trunking Protocol (VTP) traps.
• wireless—Sends wireless traps.
Command Default
This command is disabled by default. No notifications are sent.
If you enter this command with no keywords, the default is to send all trap types to the host. No informs are
sent to this host.
If no version keyword is present, the default is Version 1.
If Version 3 is selected and no authentication keyword is entered, the default is the noauth (noAuthNoPriv)
security level.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
734
snmp-server host
Note
Command Modes
Command History
Usage Guidelines
Though visible in the command-line help strings, the fru-ctrl keyword is not supported.
Global configuration
Release
Modification
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
This command was introduced.
SNMP notifications can be sent as traps or inform requests. Traps are unreliable because the receiver does
not send acknowledgments when it receives traps. The sender cannot determine if the traps were received.
However, an SNMP entity that receives an inform request acknowledges the message with an SNMP response
PDU. If the sender never receives the response, the inform request can be sent again, so that informs are more
likely to reach their intended destinations.
However, informs consume more resources in the agent and in the network. Unlike a trap, which is discarded
as soon as it is sent, an inform request must be held in memory until a response is received or the request
times out. Traps are also sent only once, but an inform might be retried several times. The retries increase
traffic and contribute to a higher overhead on the network.
If you do not enter an snmp-server host command, no notifications are sent. To configure the switch to send
SNMP notifications, you must enter at least one snmp-server host command. If you enter the command with
no keywords, all trap types are enabled for the host. To enable multiple hosts, you must enter a separate
snmp-server host command for each host. You can specify multiple notification types in the command for
each host.
If a local user is not associated with a remote host, the switch does not send informs for the auth (authNoPriv)
and the priv (authPriv) authentication levels.
When multiple snmp-server host commands are given for the same host and kind of notification (trap or
inform), each succeeding command overwrites the previous command. Only the last snmp-server host
command is in effect. For example, if you enter an snmp-server host inform command for a host and then
enter another snmp-server host inform command for the same host, the second command replaces the first.
The snmp-server host command is used with the snmp-server enable traps global configuration command.
Use the snmp-server enable traps command to specify which SNMP notifications are sent globally. For a
host to receive most notifications, at least one snmp-server enable traps command and the snmp-server
host command for that host must be enabled. Some notification types cannot be controlled with the snmp-server
enable traps command. For example, some notification types are always enabled. Other notification types
are enabled by a different command.
The no snmp-server host command with no keywords disables traps, but not informs, to the host. To disable
informs, use the no snmp-server host informs command.
Examples
This example shows how to configure a unique SNMP community string named comaccess for traps and
prevent SNMP polling access with this string through access-list 10:
Switch(config)# snmp-server community comaccess ro 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
735
snmp-server host
Switch(config)# snmp-server host 172.20.2.160 comaccess
Switch(config)# access-list 10 deny any
This example shows how to send the SNMP traps to the host specified by the name myhost.cisco.com. The
community string is defined as comaccess:
Switch(config)# snmp-server enable traps
Switch(config)# snmp-server host myhost.cisco.com comaccess snmp
This example shows how to enable the switch to send all traps to the host myhost.cisco.com by using the
community string public:
Switch(config)# snmp-server enable traps
Switch(config)# snmp-server host myhost.cisco.com public
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands
Command
Description
snmp-server enable traps
Enables the switch to send SNMP notifications for various traps or
inform requests to the NMS.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
736
switchport mode access
switchport mode access
To sets the interface as a nontrunking nontagged single-VLAN Ethernet interface , use the switchport mode
access command in template configuration mode. Use the no form of this command to return to the default
setting.
switchport mode access
no switchport mode access
Syntax Description
switchport mode access
Sets the interface as a nontrunking nontagged single-VLAN Ethernet
interface.
Command Default
An access port can carry traffic in one VLAN only. By default, an access port carries traffic for VLAN1.
Command Modes
Template configuration
Command History
Examples
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to set a single-VLAN interface
Switch(config-template)# switchport mode access
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
737
switchport voice vlan
switchport voice vlan
To specify to forward all voice traffic through the specified VLAN, use the switchport voice vlan command
in template configuration mode. Use the no form of this command to return to the default setting.
switchport voice vlanvlan_id
no switchport voice vlan
Syntax Description
switchport voice vlanvlan_id
Command Default
You can specify a value from 1 to 4094.
Command Modes
Template configuration
Command History
Examples
Specifies to forward all voice traffic through the specified
VLAN.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
This example shows how to specify to forward all voice traffic through the specified VLAN.
Switch(config-template)# switchport voice vlan 20
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
738
PART
IX
Radio Resource Management
• Radio Resource Management Commands, page 741
Radio Resource Management Commands
• airtime-fairness dot11 mode (apgroup), page 744
• airtime-fairness dot11 optimization (apgroup), page 745
• airtime-fairness dot11 policy, page 746
• airtime-fairness policy (wlan), page 747
• ap dot11 rf-profile, page 748
• ap dot11 rrm, page 749
• ap dot11 rrm ccx, page 752
• ap dot11 rrm channel, page 753
• ap dot11 24ghz rrm channel cleanair-event rogue-contribution, page 755
• ap dot11 24ghz or 5ghz rrm channel dca add, page 756
• ap dot11 24ghz or 5ghz rrm channel dca remove, page 757
• ap dot11 5ghz rrm channel dca chan-width-11n, page 758
• ap dot11 rrm coverage, page 759
• ap dot11 rrm group-member, page 761
• ap dot11 rrm monitor, page 762
• ap dot11 rrm profile, page 764
• ap dot11 rrm tpc-threshold, page 765
• ap dot11 rrm txpower, page 766
• ap dot11 airtime-fairness mode, page 767
• ap dot11 airtime-fairness policy-name, page 768
• ap group, page 770
• ap name dot11 airtime-fairness mode, page 771
• ap name dot11 airtime-fairness optimization, page 772
• ap name no dot11 airtime-fairness wlan-name policy-name, page 773
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
741
• ap name dot11 airtime-fairness wlan-name policy, page 774
• band-select client, page 775
• band-select cycle, page 776
• band-select expire, page 777
• band-select probe-response, page 778
• channel, page 779
• channel foreign, page 780
• channel width, page 781
• coverage, page 782
• coverage exception, page 783
• coverage level, page 784
• clear wireless airtime-fairness statistics, page 785
• dot11n-only, page 786
• load-balancing, page 787
• high-density clients count, page 788
• high-density clients wlan, page 789
• high-density multicast data-rate, page 790
• high-density rx-sop threshold, page 791
• rate, page 792
• rate mcs, page 794
• trap threshold, page 795
• tx-power, page 796
• tx-power v1 threshold, page 797
• no ap dot11 airtime-fairness policy-name, page 798
• remote-lan, page 799
• rf-profile dot11 24ghz, page 800
• rf-profile dot11 5ghz, page 801
• show ap airtime-fairness ap-group, page 802
• show ap airtime-fairness (ap), page 803
• show ap airtime-fairness (per radio), page 804
• show ap airtime-fairness policy (all), page 805
• show ap airtime-fairness wlan, page 806
• show ap dot11 24ghz , page 807
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
742
• show ap dot11 5ghz, page 809
• show ap dot11 airtime-fairness (radio bands), page 811
• show ap dot11 24ghz rf-profile summary, page 812
• show ap dot11 5ghz rf-profile summary, page 813
• show ap name dot11 airtime-fairness summary, page 814
• show ap name dot11 airtime-fairness policy statistics, page 815
• show ap name dot11 airtime-fairness wlan name statistics, page 816
• show ap rf-profile summary, page 817
• show ap rf-profile name, page 818
• show wireless mobility controller ap, page 820
• shutdown, page 821
• wlan, page 822
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
743
airtime-fairness dot11 mode (apgroup)
airtime-fairness dot11 mode (apgroup)
To configure ATF for an AP group, use the airtime-fairness dot11 mode command in ap group submode.
Use the no form of the command to disable ATF for a AP group.
airtime-fairness dot11 {24ghz| 5ghz} mode {enforce-policy| monitor}
no airtime-fairness dot11 {24ghz| 5ghz} mode {enforce-policy| monitor}
Syntax Description
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
enforce-policy
Configure airtime-fairness in enforce-policy mode
monitor
Configure airtime-fairness in monitor mode
Command Default
None
Command Modes
config apgroup
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure ATF for an AP group.
Switch#configure terminal
Switchconfig# ap group testap
Switchconfig-apgroup# airtime-fairness dot11 24ghz mode monitor
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
744
airtime-fairness dot11 optimization (apgroup)
airtime-fairness dot11 optimization (apgroup)
To configure ATF optimization for an AP group, use the airtime-fairness dot11 optimization command.
Use the no form of the command to disable ATF for a AP group
airtime-fairness dot11 {24ghz| 5ghz} optimization
no airtime-fairness dot11 {24ghz| 5ghz} optimization
Syntax Description
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
Command Default
None
Command Modes
config apgroup
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure ATF optimization for an AP group.
Switch#configure terminal
Switchconfig# ap group testap
Switchconfig-apgroup# airtime-fairness dot11 24ghz optimization
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
745
airtime-fairness dot11 policy
airtime-fairness dot11 policy
To override a globally applied policy on a WLAN AP group, use the airtime-fairness dot11 policy command.
Use the no form of the command to disable applied policy override.
airtime-fairness dot11 {24ghz| 5ghz}policy policy-name
no airtime-fairness dot11 {24ghz| 5ghz}policy policy-name
Syntax Description
24ghz
Configures 2.4 GHz airtime-fairness policy
5ghz
Configures 5 GHz airtime-fairness policy
policy-name
name of the airtime-fairness policy to assign
Command Default
None
Command Modes
config wlan apgroup
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to override applied policy on a WLAN AP group.
Switchconfig#ap group testapgroup
Switch(config-apgroup)# wlan testwlan
Switch(config-wlan-apgroup)# airtime-fairness dot11 24ghz policy testpolicy
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
746
airtime-fairness policy (wlan)
airtime-fairness policy (wlan)
To configure the ATF policy for a WLAN, use the airtime-fairness policy command.
airtime-fairness policy policy-name
Syntax Description
policy-name
Command Default
None
Command Modes
config wlan
Command History
Enter the policy name
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure the ATF policy for a WLAN.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#wlan wlan-name
Switch(config-wlan)#airtime-fairness policy policy-name
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
747
ap dot11 rf-profile
ap dot11 rf-profile
To configure an RF-Profile for a selected band, use the ap dot11 rf-profile command. To delete an RF-Profile,
use the no form of this command.
ap dot11 {24GHz | 5GHz} rf-profile profile name
Syntax Description
24ghz
Displays the 2.4-GHz band
5ghz
Displays the 5-GHz band
profile name
Name of the RF profile
Command Default
None
Command Modes
Global configuration (config)
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure an RF profile for a selected band.
Switch#ap dot11 24GHz rf-profile doctest
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
748
ap dot11 rrm
ap dot11 rrm
To configure basic and advanced radio resource management settings for 802.11 devices, use the ap dot11
rrm command.
ap dot11 {24ghz| 5ghz} rrm {ccx location-measurement sec| channel {cleanair-event| dca| device| foreign|
load| noise| outdoor-ap-dca}| coverage {data fail-percentage pct| data packet-count count| data
rssi-threshold threshold}| exception global percentage| level global number| voice {fail-percentage
percentage| packet-count number| rssi-threshold threshold}}
Syntax Description
ccx
Configures Advanced (RRM)
802.11 CCX options.
location-measurement
Specifies 802.11 CCX Client
Location Measurements in seconds.
The range is between 10 and 32400
seconds.
channel
Configure advanced
802.11-channel assignment
parameters.
cleanair-event
Configures cleanair event-driven
RRM parameters.
dca
Configures 802.11-dynamic
channel assignment algorithm
parameters.
device
Configures persistent non-WiFi
device avoidance in the
802.11-channel assignment.
foreign
Enables foreign AP
802.11-interference avoidance in
the channel assignment.
load
Enables Cisco AP 802.11-load
avoidance in the channel
assignment.
noise
Enables non-802.11-noise
avoidance in the channel
assignment.
outdoor-ap-dca
Configures 802.11 DCA list option
for outdoor AP.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
749
ap dot11 rrm
coverage
Configures 802.11 coverage
Hole-Detection.
data fail-percentage pct
Configures 802.11 coverage
failure-rate threshold for uplink
data packets. The range is between
1 and 100
data packet-count count
Configures 802.11 coverage
minimum-failure-count threshold
for uplinkdata packets.
data rssi-threshold threshold
Configures 802.11
minimum-receive-coverage level
for voice packets.
exception global percentage
Configures 802.11 Cisco APs
coverage-exception level. The
range is between 0 and 100 percent.
level global number
Configures 802.11 Cisco AP
client-minimum-exception level
between 1 and 75 clients.
voice
Configures 802.11 coverage
Hole-Detection for voice packets.
fail-percentage percentage
Configures 802.11 coverage failure
rate threshold for uplink voice
packets.
packet-count number
Configures 802.11 coverage
minimum-uplink-failure count
threshold for voice packets.
rssi-threshold threshold
Configures 802.11 minimum
receive coverage level for voice
packets.
Command Default
Disabled
Command Modes
Interface configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
750
ap dot11 rrm
Usage Guidelines
This command applies for both 802.11a and 802.11b bands. But the appropriate commands must be chosen
for configuring the parameter.
Examples
This example shows how to configure various RRM settings.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm ?
ccx
Configure Advanced(RRM) 802.11a CCX options
channel
Configure advanced 802.11a channel assignment parameters
coverage
802.11a Coverage Hole Detection
group-member
Configure members in 802.11a static RF group
group-mode
802.11a RF group selection mode
logging
802.11a event logging
monitor
802.11a statistics monitoring
ndp-type
Neighbor discovery type Protected/Transparent
profile
802.11a performance profile
tpc-threshold Configures the Tx Power Control Threshold used by RRM for auto
power assignment
txpower
Configures the 802.11a Tx Power Level
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
751
ap dot11 rrm ccx
ap dot11 rrm ccx
To configure radio resource management CCX options for 2.4 GHz and 5GHz devices, use the ap dot11
rrm ccx command.
ap dot11 {24ghz| 5ghz} rrm ccx location-measurement interval
Syntax Description
location-measurement interval
Command Default
None.
Command Modes
Interface configuration.
Command History
Specifies the CCX client-location measurement interval value. The
range is between 10 and 32400 seconds.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to set CCX location-measurement interval for a 5-GHz device.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm ccx location-measurement 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
752
ap dot11 rrm channel
ap dot11 rrm channel
To enable radio resource management channel for 2.4 GHz and 5GHz devices, use the ap dot11 rrm channel
command. To disable the radio resource mangement for 2.4 GHz and 5 GHz devices, use the no form of the
command.
ap dot11 {24ghz| 5ghz} rrm channel {cleanair-event| dca| device| foreign| load| noise}
no ap dot11 {24ghz| 5ghz} rrm channel {cleanair-event| dca| device| foreign| load| noise}
Syntax Description
cleanair-event
Specifies the cleanair event-driven RRM parameters
dca
Specifies the 802.11 dynamic channel assignment algorithm parameters
device
Specifies the persistent non-WiFi device avoidance in the 802.11-channel
assignment.
foreign
Enables foreign AP 802.11-interference avoidance in the channel assignment.
load
Enables Cisco AP 802.11-load avoidance in the channel assignment.
noise
Enables non-802.11-noise avoidance in the channel assignment.
Command Default
None.
Command Modes
Interface configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows all the parameters available for Channel.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 24ghz rrm channel ?
cleanair-event Configure cleanair event-driven RRM parameters
dca
Config 802.11b dynamic channel assignment algorithm
parameters
device
Configure persistent non-WiFi device avoidance in the 802.11b
channel assignment
foreign
Configure foreign AP 802.11b interference avoidance in the
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
753
ap dot11 rrm channel
load
noise
channel assignment
Configure Cisco AP 802.11b load avoidance in the channel
assignment
Configure 802.11b noise avoidance in the channel assignment
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
754
ap dot11 24ghz rrm channel cleanair-event rogue-contribution
ap dot11 24ghz rrm channel cleanair-event rogue-contribution
To configure cleanair event driven Radio Resource Management (RRM) rogue contribution parameters, use
the ap dot11 24ghz rrm channel cleanair-event rogue-contribution command.
ap dot11 24ghz rrm channel cleanair-event rogue-contribution duty-cycle threshold-value
Syntax Description
Command Default
Command History
duty-cycle
Sets event-driven RRM rogue contribution duty cycle.
threshold-value
Custom ED-RRM rogue contribution duty cycle threshold value. Valid
value ranges from 1 -99 percent.
The rogue contribution duty cycle is not set.
Release
Modification
16.1
This command was introduced.
Usage Guidelines
This command sets event-driven RRM rogue contribution duty cycle.
Examples
This example shows how to configure cleanair event driven RRM rogue contribution parameters:
Cisco Controller(config)# ap dot11 24ghz rrm channel cleanair-event rogue-contribution
duty-cycle 1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
755
ap dot11 24ghz or 5ghz rrm channel dca add
ap dot11 24ghz or 5ghz rrm channel dca add
To add non-default radio resource management DCA channels to the DCA channel list for 2.4 GHz or 5 GHz
devices, use the ap dot11 {24ghz | 5ghz } rrm channel dca add command. To remove a default channel
from the DCA list, use the no form of the command. The DCA channel list contains standard channels matching
your country of operation. For example, a regulatory default channel list contains channels 1, 6, and 11.
ap dot11 [24ghz| 5ghz] rrm channel dca add number
no ap dot11 [24ghz| 5ghz] rrm channel dca add number
Syntax Description
number
Command Default
None.
Command Modes
Global configuration
Command History
DCA channel number.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to add a non-default radio resource management DCA channel to the DCA list for
a 2.4 GHz device, using the ap dot11 24ghz rrm channel dca add 10 command:
Switch(config)# ap dot11 24ghz rrm channel dca add 10
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
756
ap dot11 24ghz or 5ghz rrm channel dca remove
ap dot11 24ghz or 5ghz rrm channel dca remove
To remove a default radio resource management DCA channels from the DCA channel list for 2.4 GHz or 5
GHz devices, use the ap dot11 {24ghz | 5ghz} rrm channel dca remove number command. To add a default
DCA channel back to the DCA channel list, use the no form of the command.
ap dot11 [24ghz| 5ghz] rrm channel dca remove number
no ap dot11 [24ghz| 5ghz] rrm channel dca remove number
Syntax Description
number
Command Default
None.
Command Modes
Global configuration.
Command History
Specifies the radio resource management DCA channel.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to remove default radio resource management DCA channel from the DCA list for
a 2.4 GHz device, using the ap dot11 24ghz rrm channel dca remove command:
Switch(config)#ap dot11 24ghz rrm channel dca remove 11
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
757
ap dot11 5ghz rrm channel dca chan-width-11n
ap dot11 5ghz rrm channel dca chan-width-11n
To configure DCA channel width for all 802.11n radios in the 5-GHz band, enter the ap dot11 5ghz rrm
channel dca chan-width-11n width command. To disable DCA channel width for all 802.11n radios in the
5-GHz band, use the no form of the command.
ap dot11 5ghzrrm channel dca chan-width-11n {20|40}
noap dot11 5ghzrrm channel dca chan-width-11n {20|40}
Syntax Description
chan-width-11n
Specifies DCA channel width for all 802.11n radios in the 5-GHz band.
20
Sets the channel width for 802.11n radios to 20 MHz.
40
Sets the channel width for 802.11n radios to 40 MHz.
Command Default
The default channel width is 20.
Command Modes
Global configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to set the channel width for the 802.11n radios to 40 MHz, using the ap dot11 5ghz
rrm channel dca chan-width-11n command:
Switch(config)#ap dot11 5ghz rrm channel dca chan-width-11n 40
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
758
ap dot11 rrm coverage
ap dot11 rrm coverage
To enable 802.11 coverage hole detection, use the ap dot11 rrm coverage command.
ap dot11 {24ghz| 5ghz} rrm coverage [data {fail-percentage percentage| packet-count count| rssi-threshold
threshold}| exceptional global value| level global value| voice {fail-percentage percentage| packet-count
packet-count| rssi-threshold threshold}]
Syntax Description
data
Specifies 802.11 coverage hole-detection data packets.
fail-percentage percentage
Specifies 802.11 coverage failure-rate threshold for uplink data packets.
The range is between 1 and 100
packet-count count
Specifies 802.11 coverage minimum-failure-count threshold for uplink
data packets.
rssi-threshold threshold
Specifies 802.11 minimum-receive-coverage level for voice packets.
exceptional global value
Specifies 802.11 Cisco APs coverage-exception level. The range is
between 0 and 100 percent.
level global value
Specifies 802.11 Cisco AP client-minimum-exception level between
1 and 75 clients.
voice
Specifies 802.11 coverage Hole-Detection for voice packets.
fail-percentage percentage
Specifies 802.11 coverage failure rate threshold for uplink voice
packets.
packet-count packet-count
Specifies 802.11 coverage minimum-uplink-failure count threshold
for voice packets.
rssi-threshold threshold
Specifies 802.11 minimum receive coverage level for voice packets.
Command Default
None.
Command Modes
Interface configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
759
ap dot11 rrm coverage
Usage Guidelines
If you enable coverage hole-detection, the switch automatically determines, based on data that is received
from the access points, whether any access points have clients that are potentially located in areas with poor
coverage.
If both the number and percentage of failed packets exceed the values that you entered in the ap dot11 {24ghz
| 5ghz} rrm coverage packet-count and ap dot11 {24ghz | 5ghz} rrm coverage fail-percentage commands
for a 5-second period, the client is considered to be in a pre-alarm condition. The switch uses this information
to distinguish between real and false coverage holes and excludes clients with poor roaming logic. A coverage
hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the
ap dot11 {24ghz | 5ghz} rrm coverage level-global and ap dot11 {24ghz | 5ghz} rrm coverage
exceptional-global commands over a 90-second period. The switch determines whether the coverage hole
can be corrected and, if appropriate, mitigate the coverage hole by increasing the transmit power level for that
specific access point.
Examples
This example shows how to set the RSSI-threshold for data in 5-GHz band.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm coverage data rssi-threshold -80
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
760
ap dot11 rrm group-member
ap dot11 rrm group-member
To configure members in 802.11 static RF group, use the ap dot11 rrm group-member command. To
remove the member, use the no form of the command.
ap dot11 {24ghz| 5ghz} rrm group-member controller-name controller-ip
no ap dot11 {24ghz| 5ghz} rrm group-member controller-name controller-ip
Syntax Description
controller-name
Specifies the name of the controller to be added.
controller-ip
Specifies the IP address of the controller to be added.
Command Default
None.
Command Modes
Interface configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to add a controller in the 5-GHz automatic-RF group
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm group-member ABC 10.1.1.1
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
761
ap dot11 rrm monitor
ap dot11 rrm monitor
To monitor the 802.11-band statistics, use the ap dot11 rrm monitor command. To disable, use the no form
of the command.
ap dot11 {24ghz| 5ghz} rrm monitor {channel-list| {all| country| dca}| coverage| load| noise| signal}
no ap dot11 {24ghz| 5ghz} rrm monitor {channel-list| coverage| load| noise| signal}
Syntax Description
channel-list
Sets the 802.11 noise/interference/rogue monitoring channel-list.
all
Specifies to monitor all the channels.
country
Specifies to monitor channels used in configured country code
dca
Specifies to monitor channels used by dynamic channel assignment.
coverage
Specifies 802.11 coverage measurement interval. The range is between 60 and
3600 in seconds
load
Specifies 802.11 load measurement interval. The range is between 60 and 3600
in seconds
noise
Specifies 802.11 noise measurement interval (channel scan interval). The range
is between 60 and 3600 in seconds
signal
Specifies 802.11 signal measurement interval (neighbor packet frequency). The
range is between 60 and 3600 in seconds
Command Default
None.
Command Modes
Interface Configuration
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to enable monitoring all the 5-GHz band channels.
Switch#configure terminal
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
762
ap dot11 rrm monitor
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm monitor channel-list all
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
763
ap dot11 rrm profile
ap dot11 rrm profile
To configure Cisco lightweight access point profile settings on supported 802.11 networks, use the ap dot11
rrm profile command.
ap dot11 {24ghz| 5ghz} rrm profile {customize| foreign value| noise value| throughput value| utilization
value}
Syntax Description
customize
Enables performance profiles.
foreign value
Specifies the 802.11 foreign 802.11 interference threshold value. The range
is between 0 and 100 percent.
noise value
Specifies the 802.11 foreign noise threshold value. The range is between
-127 and 0 dBm
throughput value
Specifies the 802.11a Cisco AP throughput threshold value. The range is
between 1000 and 10000000 bytes per second
utilization value
Specifies the 802.11a RF utilization threshold value. The range is between
0 and 100 percent
Command Default
Disabled.
Command Modes
Interface configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to set the threshold value for the noise parameter.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm profile noise -50
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
764
ap dot11 rrm tpc-threshold
ap dot11 rrm tpc-threshold
To configure the tx-power control threshold used by RRM for auto power assignment, use the ap dot11 rrm
tpc-threshold command. To disable, use the no form of the command.
ap dot11 {24ghz| 5ghz} rrm tpc-threshold value
no ap dot11 {24ghz| 5ghz} rrm tpc-threshold
Syntax Description
value
Command Default
None.
Command Modes
Interface configuration.
Command History
Specifies the power value. The range is between -80 and -50.
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Usage Guidelines
None.
Examples
This example shows how to configure the tx-power control threshold used by RRM for auto power assignment.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm tpc-threshold -60
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
765
ap dot11 rrm txpower
ap dot11 rrm txpower
To configure the 802.11 tx-power level, use the ap dot11 rrm txpower command. To disable the 802.11
tx-power level, use the no form of the command.
ap dot11 {24ghz| 5ghz} rrm txpower {auto| max powerLevel| min powerLevel| once| power-level}
noap dot11 {24ghz| 5ghz} rrm txpower {auto| max powerLevel| min powerLevel| once| power-level}
Syntax Description
auto
Enables auto-RF.
max powerLevel
Configures maximum auto-RF tx power. The range is between -10 to
-30.
min powerLevel
Configures minimum auto-RF tx power. The range is between -10 to
-30.
once
Enables one-time auto-RF.
Command Default
None.
Command Modes
Interface configuration.
Command History
Release
Modification
Cisco IOS XE 3.3SE
This command was introduced.
Cisco IOS XE 3.3SE
The no form of the command is introduced.
Usage Guidelines
None.
Examples
This example shows how to enables auto-RF once.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 5ghz rrm txpower once
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
766
ap dot11 airtime-fairness mode
ap dot11 airtime-fairness mode
To enable AirTime-Fairness in Enforce policy or Monitor mode, use the ap dot11 airtime-fairness mode
command. To disable Enforce policy or Monitor mode in AirTime Fairness, use the no form of the command.
ap dot11 {24ghz| 5ghz}airtime-fairness mode {enforce-policy| monitor}
no ap dot11 {24ghz| 5ghz}airtime-fairness mode {enforce-policy| monitor}
Syntax Description
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
enforce-policy
Configure airtime-fairness in enforce-policy mode
monitor
Configure airtime-fairness in monitor mode
Command Default
None
Command Modes
Global Configuration
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows all the parameters available for AirTime Fairness mode.
Switch#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#ap dot11 24ghz airtime-fairness mode ?
enforce-policy Configure airtime-fairness in enforce-policy mode
monitor
Configure airtime-fairness in monitor mode
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
767
ap dot11 airtime-fairness policy-name
ap dot11 airtime-fairness policy-name
To create a new Air Time Fairness (ATF) policy, use the ap dot11 airtime-fairness policy-name command.
ap dot11 airtime-fairness policy-name policy-name policy-id
Syntax Description
policy-name
Enter the ATF policy name.
policy-id
Enter ATF policy ID to create new policy.
Command Default
None
Command Modes
Global Configuration
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
All ATF policies require a policy weight value. To add the policy weight use the policy weight command in
config-airtime-fairness policy mode. If no policy weight is added, default value of 10 is applied. For more
information about adding policy weight, see policy-weight, on page 769.
Examples
This example shows .
Switch#ap dot11 airtime-fairness policy-name testpolicy 12
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
768
ap dot11 airtime-fairness policy-name
policy-weight
To apply policy weight to an Air Time Fairness (ATF) policy, use the policy-weight command.
policy-weight policy-weight
Syntax Description
policy-weight
Policy weight for ATF policy. The range is from 5 to 100. Default is 10.
Command Default
None
Command Modes
config-airtime-fairness policy
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
If you do not apply a policy to the WLAN, then the default policy (with ID 0) with the policy weight of 10 is
applied automatically. For more information about ATF policy creation, see ap dot11 airtime-fairness
policy-name, on page 768.
Examples
This example shows how to apply policy weight to an ATF policy.
Switch#ap dot11 airtime-fairness policy-name testpolicy 12
Switch(config-airtime-fairness policy)# policy-weight 35
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
769
ap group
ap group
To configure an ap group, use the ap group command.
ap group group-name
Syntax Description
group-name
Command Default
None
Command Modes
Global configuration (config)
Command History
Name of the AP group.
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure an ap group.
Switchconfig# ap group docgroup
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
770
ap name dot11 airtime-fairness mode
ap name dot11 airtime-fairness mode
To enable Air Time-Fairness in Enforce policy or Monitor mode for a specific AP, use the ap namedot11
airtime-fairness mode command. Use no form of the command to disable Air Time-Fairness from either of
the two modes for a specific AP.
ap name ap-name dot11 {24ghz| 5ghz} airtime-fairness mode {enforce-policy| monitor}
ap name ap-name no dot11 {24ghz| 5ghz} airtime-fairness mode {enforce-policy| monitor}
Syntax Description
ap-name
Enter access point name
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
enforce-policy
Configure airtime-fairness in enforce-policy mode
monitor
Configure airtime-fairness in monitor mode
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to disable Air Time-Fairness from either enforce-policy or monitor mode for a
specific AP.
Switch# ap name testap no dot11 24ghz airtime-fairness mode
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
771
ap name dot11 airtime-fairness optimization
ap name dot11 airtime-fairness optimization
To enable ATF optimization for a specific AP, use the ap name dot11 airtime-fairness optimization
command. Use no to disable ATF optimization for a specific AP.
ap name ap-name dot11 {24ghz| 5ghz} airtime-fairness optimization
ap name ap-name no dot11 {24ghz| 5ghz} airtime-fairness optimization
Syntax Description
ap-name
Enter access point name
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
This example shows how to enable ATF optimization for a specific AP.
Switch#ap name doctestap dot11 24ghz airtime-fairness optimization
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
772
ap name no dot11 airtime-fairness wlan-name policy-name
ap name no dot11 airtime-fairness wlan-name policy-name
To disable the ATF policy override on WLAN specific to a WLAN, use the ap name no dot11 airtime-fairness
wlan-name command.
ap name ap-name no dot11 {24ghz| 5ghz}airtime-fairness wlan-name wlan-name
Syntax Description
ap-name
Enter access point name
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
wlan-name
Configure the airtime-fairness policy for this WLAN under Cisco AP
wlan-name
Enter the wlan profile name
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to disable ATF policy override on WLAN specific to a WLAN .
Switch#ap name testap no dot11 24ghz airtime-fairness wlan-name testwlan
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
773
ap name dot11 airtime-fairness wlan-name policy
ap name dot11 airtime-fairness wlan-name policy
To override the ATF policy on WLAN specific to one AP, use the ap name dot11 airtime-fairness wlan-name
policy-name command.
ap name ap-name dot11{24ghz| 5ghz} airtime-fairness wlan-name wlan-name policy-name policy-name
Syntax Description
ap-name
Access Point name
24ghz
Configures 802.11b parameters
5ghz
Configures 802.11a parameters
wlan-name
Configure the airtime-fairness policy for this wlan under Cisco
wlan-name
Enter the wlan profile name
policy-name
Configure airtime-fairness policy
policy-name
Enter the airtime-fairness profile name
Command Default
None
Command Modes
Privileged EXEC
Command History
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to override the ATF policy on WLAN specific to one AP.
Switch# ap name testap dot11 24ghz airtime-fairness wlan-name testwlan policy-name testpolicy
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
774
band-select client
band-select client
To configure the client threshold minimum dB for the selected band, use the band-select client command.
To reset the client threshold minimum dB for the selected band, use the no form of this command.
band-select client {mid-rssi | rssi } dBm value
Syntax Description
mid-rssi
Minimum dBm of a client RSSI start to respond to probe
rssi
Minimum dBm of a client RSSI to respond to probe
dBm value
Minimum dBm of a client RSSI to respond to probe. Valid range is between
–90 and –20 dBm.
Command Default
None
Command Modes
config-rf-profile
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
This command is enabled only for 2.4-GHz band.
Examples
This example shows how to set the client threshold to minimum dB for a selected band.
Switch(config-rf-profile)#band-select client rssi -50
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
775
band-select cycle
band-select cycle
To configure the band cycle parameters, use the band-select cycle command. To reset the threshold value,
use the no form of this command.
band-select cycle { count |threshold } value
Syntax Description
count
Sets the Band Select probe cycle count.
value
Maximum number of cycles not responding. The range is between 1 and 10.
threshold
Sets the time threshold for a new scanning cycle.
value
Set the threshold value in milliseconds. The valid is between 1and 1000.
Command Default
None
Command Modes
config-rf-profile
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure the probe cycle count in an RF profile for a selected band.
Switch(config-rf-profile)#band-select cycle count 5
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
776
band-select expire
band-select expire
To configure the expiry time for the RF profile for the selected band, use the band-select expire command.
To reset the value, use the no form of this command.
band-select expire { dual-band | suppression } value
no band-select expire { dual-band | suppression }
Syntax Description
dual-band
Configures the RF Profile Band Select Expire Dual Band.
value
Setting the time to expire for pruning previously known dual-band clients. The
range is between 10 and 300.
suppression
Configures the RF Profile Band Select Expire Suppression.
value
Setting the time to expire for pruning previously known 802.11b/g clients. The
range is between 10 and 200.
Command Default
None
Command Modes
config-rf-profile
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure the time to expire for a dual-band of an RF profile in a selected band.
Switch(config-rf-profile)#band-select expire dual-band 15
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
777
band-select probe-response
band-select probe-response
To configure the probe responses to the clients for a selected band, use the band-select probe-response
command. To disable the probe-response, use the no form of this command.
band-select probe-response
Syntax Description
probe-response
Command Default
None
Command Modes
config-rf-profile
Command History
Probe responses to clients.
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to enable probe response to the clients.
Switch(config-rf-profile)#band-select probe-response
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
778
channel
channel
To configure a channel for the RF profile DCA channel list, use the channel command. To disable the
channel, use the no form of this command.
channel { add | remove } channel-number
Syntax Description
add
Adds channel to the RF Profile DCA channel list.
remove
Removes the channel from the RF Profile DCA channel list.
channel-number
Channel number.
Command Default
None
Command Modes
config-rf-profile
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to add a channel to the RF profile DCA channel list.
Switch(config-rf-profile)#channel add 3
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
779
channel foreign
channel foreign
To configure the RF Profile DCA foreign AP contribution, use the channel foreign command. To disable
the DCA Foreign AP Contribution, use the no form of this command.
channel foreign
Syntax Description
foreign
Command Default
None
Command Modes
config-rf-profile
Command History
Configures the RF Profile DCA foreign AP contribution.
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure the RF profile DCA foreign AP contribution.
Switch(config-rf-profile)#channel foreign
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
780
channel width
channel width
To configure the RF Profile DCA channel width, use the channel width command. To revert to default
value, use the no form of this command.
channel width {20 | 40 | 80 | best }
Syntax Description
20
Channel width in MHz
40
Channel width in MHz
80
Channel width in MHz
best
Channel width in MHz
Command Default
None
Command Modes
config-rf-profile
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
This command is enabled only on 5-GHz band.
Examples
This example shows how to configure the channel width to 40-MHz.
Switch(config-rf-profile)#channel width 40
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
781
coverage
coverage
To configure the voice and data coverage, use the coverage command. To reset the minimum RSSI value
use the no form of this command.
coverage {data | voice} rssi threshold value
Syntax Description
data
Configure Coverage Hole Detection for data packets.
voice
Configure Coverage Hole Detection for voice packets.
value
Minimum RSSI value for the packets received by the access point. The valid
rage is between –90 and –60 dBm.
Command Default
None
Command Modes
config-rf-profile
Command History
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure the coverage hole detection for data packets.
Switch(config-rf-profile)#coverage data rssi threshold –85
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
782
coverage exception
coverage exception
To configure the Cisco AP coverage exception level, use the coverage exception command. To reset the
exception-level percentage use the no form of this command.
coverage exception exception-level
Syntax Description
exception-level
Command Default
None
Command Modes
config-rf-profile
Command History
Cisco AP coverage exception level with valid range between 0 and 100 percent.
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to set the Cisco AP coverage exception level.
Switch(config-rf-profile)#coverage exception 70
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
783
coverage level
coverage level
To configure Cisco AP client minimum coverage level, use the coverage level command. To reset the
coverage client value use the no form of this command.
coverage level clients
Syntax Description
clients
Command Default
None
Command Modes
config-rf-profile
Command History
Minimum coverage level. Range is between 1 and 200 clients.
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to configure the Cisco AP client minimum level.
Switch(config-rf-profile)#coverage level 180
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
784
clear wireless airtime-fairness statistics
clear wireless airtime-fairness statistics
To clear the wireless airtime-fairness statistics, use the clear wireless airtime-fairness statistics command.
clear clear wireless airtime-fairness statistics
Syntax Description
Command Default
None
Command Modes
Privileged EXEC
Command History
Examples
Clears the airtime-fairness statistics
airtime-fairness
Release
Modification
Cisco IOS XE Denali 16.2.1
This command was introduced.
This example shows how to clear the wireless airtime-fairness statistics.
Switch#clear wireless airtime-fairness statistics
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
785
dot11n-only
dot11n-only
To enable 802.11n client only mode of the RF profile, use the dot11n-only command. To disable the 802.11n
client only mode use the no form of this command.
dot11n-only
Syntax Description
dot11n-only
Command Default
None
Command Modes
config-rf-profile
Command History
802.11n client only mode of the RF Profile.
Release
Modification
Cisco IOS XE Denali 16.3.1
This command was introduced.
Usage Guidelines
None
Examples
This example shows how to enable 802.11n client only mode of the RF Profile.
Switch(config-rf-profile)#dot11n-only
Consolidated Platform Command Reference, Cisco IOS XE 3.3SE (Catalyst 3650 Switches)
786
load