972
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Cisco ME 3400E Ethernet Access Switch Command Reference Cisco IOS Release 12.2(58)EX March 2012 Text Part Number: OL-26663-01

Cisco ME 3400E Ethernet Access Switch Command Reference · Contents v Cisco ME 3400E Ethernet Access Switch Command Reference OL-26663-01 diagnostic monitor 2-91 diagnostic schedule

  • Upload
    others

  • View
    42

  • Download
    0

Embed Size (px)

Citation preview

  • Cisco ME 3400E Ethernet Access Switch Command Reference Cisco IOS Release 12.2(58)EXMarch 2012

    Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706 USAhttp://www.cisco.comTel: 408 526-4000

    800 553-NETS (6387)Fax: 408 527-0883

    Text Part Number: OL-26663-01

    http://www.cisco.com

  • CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

    All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0711R)

    Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)

    Cisco ME 3400E Ethernet Access Switch Command Reference© 2012 Cisco Systems, Inc. All rights reserved.

    http://www.cisco.com/go/trademarks

  • OL-26663-01

    C O N T E N T S

    Preface xix

    Audience xix

    Purpose xix

    Conventions xx

    Filtering show Command Output xx

    Related Publications xx

    Obtaining Documentation and Submitting a Service Request xxi

    C H A P T E R 1 Using the Command-Line Interface 1-1

    CLI Command Modes 1-1User EXEC Mode 1-2Privileged EXEC Mode 1-3Global Configuration Mode 1-3Interface Configuration Mode 1-4VLAN Configuration Mode 1-4Line Configuration Mode 1-4

    C H A P T E R 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands 2-1

    aaa accounting dot1x 2-1

    aaa authentication dot1x 2-3

    action 2-5

    alarm-contact 2-7

    archive download-sw 2-9

    archive tar 2-12

    archive upload-sw 2-15

    arp access-list 2-17

    bandwidth 2-19

    boot buffersize 2-22

    boot config-file 2-23

    boot enable-break 2-24

    boot helper 2-25

    boot helper-config-file 2-26

    iiiCisco ME 3400E Ethernet Access Switch Command Reference

  • Contents

    boot manual 2-27

    boot private-config-file 2-28

    boot system 2-29

    channel-group 2-30

    channel-protocol 2-34

    class 2-36

    class-map 2-38

    clear ip arp inspection log 2-40

    clear ip arp inspection statistics 2-41

    clear ip dhcp snooping 2-42

    clear ipc 2-44

    clear ipv6 dhcp conflict 2-45

    clear l2protocol-tunnel counters 2-46

    clear lacp 2-47

    clear logging onboard 2-48

    clear mac address-table 2-49

    clear mac address-table move update 2-50

    clear pagp 2-51

    clear policer cpu uni-eni counters 2-52

    clear port-security 2-53

    clear rep counters 2-55

    clear spanning-tree counters 2-56

    clear spanning-tree detected-protocols 2-57

    clear vmps statistics 2-59

    conform-action 2-60

    copy logging onboard module 2-62

    cpu traffic qos cos 2-64

    cpu traffic qos dscp 2-68

    cpu traffic qos precedence 2-73

    cpu traffic qos qos-group 2-76

    define interface-range 2-78

    delete 2-80

    deny (ARP access-list configuration) 2-81

    deny (IPv6 access-list configuration) 2-83

    deny (MAC access-list configuration) 2-88

    ivCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    diagnostic monitor 2-91

    diagnostic schedule test 2-93

    diagnostic start test 2-95

    dot1x default 2-97

    dot1x host-mode 2-98

    dot1x initialize 2-100

    dot1x max-reauth-req 2-101

    dot1x max-req 2-103

    dot1x port-control 2-104

    dot1x re-authenticate 2-106

    dot1x reauthentication 2-107

    dot1x supplicant force-multicast 2-108

    dot1x system-auth-control 2-109

    dot1x test eapol-capable 2-110

    dot1x test timeout 2-111

    dot1x timeout 2-112

    dot1x violation-mode 2-114

    duplex 2-115

    errdisable detect cause 2-117

    errdisable recovery 2-119

    ethernet dot1ad 2-121

    ethernet evc 2-123

    ethernet lmi 2-124

    ethernet lmi ce-vlan map 2-126

    ethernet loopback (interface configuration) 2-128

    ethernet loopback (privileged EXEC) 2-131

    ethernet oam remote-failure 2-133

    ethernet uni 2-135

    ethernet uni id 2-137

    exceed-action 2-138

    flowcontrol 2-140

    hw-module module logging onboard 2-142

    interface port-channel 2-144

    interface range 2-146

    interface vlan 2-148

    vCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    ip access-group 2-150

    ip address 2-153

    ip arp inspection filter vlan 2-155

    ip arp inspection limit 2-157

    ip arp inspection log-buffer 2-159

    ip arp inspection trust 2-161

    ip arp inspection validate 2-162

    ip arp inspection vlan 2-164

    ip arp inspection vlan logging 2-165

    ip device tracking maximum 2-167

    ip dhcp snooping 2-168

    ip dhcp snooping binding 2-169

    ip dhcp snooping database 2-171

    ip dhcp snooping information option 2-173

    ip dhcp snooping information option allowed-untrusted 2-175

    ip dhcp snooping information option format remote-id 2-177

    ip dhcp snooping limit rate 2-178

    ip dhcp snooping trust 2-179

    ip dhcp snooping verify mac-address 2-180

    ip dhcp snooping vlan 2-181

    ip dhcp snooping vlan information option format-type circuit-id string 2-182

    ip igmp filter 2-184

    ip igmp max-groups 2-186

    ip igmp profile 2-188

    ip igmp snooping 2-190

    ip igmp snooping last-member-query-interval 2-192

    ip igmp snooping querier 2-194

    ip igmp snooping report-suppression 2-196

    ip igmp snooping tcn 2-198

    ip igmp snooping tcn flood 2-199

    ip igmp snooping vlan immediate-leave 2-200

    ip igmp snooping vlan mrouter 2-201

    ip igmp snooping vlan static 2-203

    ip sla responder twamp 2-205

    ip sla server twamp 2-207

    viCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    ip source binding 2-209

    ip ssh 2-211

    ip sticky-arp (global configuration) 2-213

    ip sticky-arp (interface configuration) 2-215

    ip verify source 2-217

    ipv6 access-list 2-219

    ipv6 address dhcp 2-221

    ipv6 dhcp client request vendor 2-222

    ipv6 dhcp ping packets 2-223

    ipv6 dhcp pool 2-224

    ipv6 dhcp server 2-227

    ipv6 mld snooping 2-229

    ipv6 mld snooping last-listener-query-count 2-231

    ipv6 mld snooping last-listener-query-interval 2-233

    ipv6 mld snooping listener-message-suppression 2-235

    ipv6 mld snooping robustness-variable 2-236

    ipv6 mld snooping tcn 2-238

    ipv6 mld snooping vlan 2-240

    ipv6 traffic-filter 2-242

    l2protocol-tunnel 2-244

    l2protocol-tunnel cos 2-247

    lacp port-priority 2-248

    lacp system-priority 2-250

    link state group 2-252

    link state track 2-254

    location (global configuration) 2-255

    location (interface configuration) 2-257

    logging event 2-259

    logging file 2-260

    mac access-group 2-262

    mac access-list extended 2-264

    mac address-table aging-time 2-266

    mac address-table learning vlan 2-267

    mac address-table move update 2-269

    mac address-table notification 2-271

    viiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    mac address-table static 2-273

    mac address-table static drop 2-274

    macro apply 2-276

    macro description 2-278

    macro global 2-279

    macro global description 2-281

    macro name 2-282

    match (access-map configuration) 2-284

    match access-group 2-286

    match cos 2-287

    match dot1ad dei 2-289

    match ip dscp 2-291

    match ip precedence 2-293

    match qos-group 2-295

    match vlan 2-297

    mdix auto 2-300

    media-type 2-302

    monitor session 2-304

    mvr (global configuration) 2-308

    mvr (interface configuration) 2-311

    no authentication logging verbose 2-314

    no dot1x logging verbose 2-315

    no mab logging verbose 2-316

    oam protocol cfm svlan 2-317

    pagp learn-method 2-318

    pagp port-priority 2-320

    permit (ARP access-list configuration) 2-322

    permit (IPv6 access-list configuration) 2-324

    permit (MAC access-list configuration) 2-329

    police 2-332

    policer aggregate (global configuration) 2-337

    police aggregate (policy-map class configuration) 2-342

    policer cpu uni 2-344

    policy-map 2-346

    port-channel load-balance 2-349

    viiiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    port-type 2-351

    power-supply dual 2-353

    priority 2-355

    private-vlan 2-358

    private-vlan mapping 2-361

    queue-limit 2-363

    remote-span 2-367

    renew ip dhcp snooping database 2-369

    rep admin vlan 2-370

    rep block port 2-371

    rep lsl-age-timer 2-375

    rep preempt delay 2-377

    rep preempt segment 2-379

    rep segment 2-380

    rep stcn 2-383

    reserved-only 2-384

    rmon collection stats 2-385

    sdm prefer 2-386

    service instance 2-389

    service password-recovery 2-391

    service-policy (interface configuration) 2-393

    service-policy (policy-map class configuration) 2-395

    set cos 2-397

    set dot1ad dei 2-399

    set dscp 2-401

    set precedence 2-403

    set qos-group 2-405

    setup 2-407

    shape average 2-410

    show access-lists 2-412

    show archive status 2-415

    show arp access-list 2-416

    show boot 2-417

    show cable-diagnostics tdr 2-419

    show class-map 2-421

    ixCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    show controllers cpu-interface 2-422

    show controllers ethernet-controller 2-424

    show controllers tcam 2-431

    show controllers utilization 2-433

    show cpu traffic qos 2-435

    show diagnostic 2-437

    show dot1q-tunnel 2-441

    show dot1x 2-442

    show env 2-445

    show errdisable detect 2-447

    show errdisable flap-values 2-449

    show errdisable recovery 2-451

    show etherchannel 2-453

    show ethernet loopback 2-456

    show ethernet service evc 2-458

    show ethernet service instance 2-459

    show ethernet service interface 2-461

    show flowcontrol 2-463

    show idprom 2-465

    show interfaces 2-467

    show interfaces counters 2-475

    show interfaces rep 2-477

    show interfaces transceivers 2-479

    show inventory 2-482

    show ip arp inspection 2-483

    show ip dhcp snooping 2-487

    show ip dhcp snooping binding 2-488

    show ip dhcp snooping database 2-490

    show ip dhcp snooping statistics 2-492

    show ip igmp profile 2-495

    show ip igmp snooping 2-496

    show ip igmp snooping groups 2-498

    show ip igmp snooping mrouter 2-500

    show ip igmp snooping querier 2-501

    show ip sla standards 2-503

    xCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    show ip sla twamp connection 2-504

    show ip sla twamp session 2-506

    show ip source binding 2-507

    show ip verify source 2-508

    show ipc 2-510

    show ipv6 access-list 2-514

    show ipv6 dhcp conflict 2-516

    show ipv6 route updated 2-517

    show l2protocol-tunnel 2-519

    show lacp 2-521

    show link state group 2-525

    show location 2-527

    show logging onboard 2-530

    show mac access-group 2-534

    show mac address-table 2-535

    show mac address-table address 2-537

    show mac address-table aging-time 2-538

    show mac address-table count 2-540

    show mac address-table dynamic 2-542

    show mac address-table interface 2-544

    show mac address-table learning 2-546

    show mac address-table move update 2-547

    show mac address-table notification 2-548

    show mac address-table static 2-550

    show mac address-table vlan 2-552

    show monitor 2-554

    show mvr 2-556

    show mvr interface 2-558

    show mvr members 2-560

    show pagp 2-562

    show parser macro 2-564

    show policer aggregate 2-566

    show policer cpu uni-eni 2-567

    show policy-map 2-570

    show port-security 2-575

    xiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    show port-type 2-578

    show rep topology 2-580

    show sdm prefer 2-583

    show spanning-tree 2-585

    show storm-control 2-591

    show system mtu 2-593

    show table-map 2-594

    show udld 2-595

    show version 2-598

    show vlan 2-600

    show vlan access-map 2-605

    show vlan filter 2-606

    show vlan mapping 2-607

    show vmps 2-609

    shutdown 2-611

    shutdown vlan 2-612

    snmp mib rep trap-rate 2-613

    snmp-server enable traps 2-614

    snmp-server host 2-618

    snmp trap mac-notification change 2-622

    spanning-tree 2-624

    spanning-tree bpdufilter 2-626

    spanning-tree bpduguard 2-628

    spanning-tree cost 2-630

    spanning-tree etherchannel guard misconfig 2-632

    spanning-tree extend system-id 2-634

    spanning-tree guard 2-636

    spanning-tree link-type 2-638

    spanning-tree loopguard default 2-640

    spanning-tree mode 2-642

    spanning-tree mst configuration 2-644

    spanning-tree mst cost 2-646

    spanning-tree mst forward-time 2-648

    spanning-tree mst hello-time 2-649

    spanning-tree mst max-age 2-651

    xiiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    spanning-tree mst max-hops 2-653

    spanning-tree mst port-priority 2-655

    spanning-tree mst pre-standard 2-657

    spanning-tree mst priority 2-658

    spanning-tree mst root 2-660

    spanning-tree port-priority 2-662

    spanning-tree portfast (global configuration) 2-664

    spanning-tree portfast (interface configuration) 2-667

    spanning-tree vlan 2-669

    speed 2-672

    storm-control 2-674

    switchport 2-677

    switchport access vlan 2-679

    switchport backup interface 2-681

    switchport block 2-685

    switchport host 2-687

    switchport mode 2-688

    switchport mode private-vlan 2-691

    switchport port-security 2-694

    switchport port-security aging 2-698

    switchport private-vlan 2-700

    switchport protected 2-702

    switchport trunk 2-704

    switchport vlan mapping 2-706

    system env temperature threshold yellow 2-709

    system mtu 2-710

    table-map 2-713

    test cable-diagnostics tdr 2-715

    traceroute mac 2-717

    traceroute mac ip 2-720

    udld 2-722

    udld port 2-724

    udld reset 2-726

    uni count 2-727

    uni-vlan 2-729

    xiiiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    violate-action 2-731

    vlan 2-733

    vlan access-map 2-736

    vlan dot1q tag native 2-738

    vlan filter 2-740

    vmps reconfirm (privileged EXEC) 2-742

    vmps reconfirm (global configuration) 2-743

    vmps retry 2-744

    vmps server 2-745

    vrf upgrade-cli multi-af-mode 2-747

    A P P E N D I X A Cisco ME 3400E Ethernet Access SwitchBoot Loader Commands A-1

    arp A-2

    boot A-3

    cat A-5

    copy A-6

    delete A-7

    dir A-8

    flash_init A-10

    format A-11

    fsck A-12

    help A-13

    memory A-14

    mgmt_clr A-15

    mgmt_init A-16

    mgmt_show A-17

    mkdir A-18

    more A-19

    rename A-20

    reset A-21

    rmdir A-22

    set A-23

    type A-26

    unset A-27

    version A-29

    xivCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    A P P E N D I X B Cisco ME 3400E Ethernet Access SwitchDebug Commands B-1

    debug backup B-2

    debug dot1x B-3

    debug etherchannel B-4

    debug ethernet service B-5

    debug interface B-7

    debug ip dhcp snooping B-8

    debug ip igmp filter B-9

    debug ip igmp max-groups B-10

    debug ip igmp snooping B-11

    debug ip sla error twamp connection B-12

    debug ip sla error twamp control reflector B-14

    debug ip sla error twamp control server B-16

    debug ip sla error twamp session B-18

    debug ip sla trace twamp connection B-20

    debug ip sla trace twamp control reflector B-22

    debug ip sla trace twamp control server B-24

    debug ip sla trace twamp session B-26

    debug ip verify source packet B-28

    debug lacp B-29

    debug mac-notification B-30

    debug matm B-31

    debug matm move update B-32

    debug monitor B-33

    debug mvrdbg B-34

    debug nvram B-35

    debug pagp B-36

    debug platform acl B-37

    debug platform backup interface B-38

    debug platform cfm B-39

    debug platform cpu-queues B-40

    debug platform dot1ad B-42

    debug platform dot1x B-43

    debug platform etherchannel B-44

    debug platform forw-tcam B-45

    xvCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    debug platform ip arp inspection B-46

    debug platform ip dhcp B-47

    debug platform ip igmp snooping B-48

    debug platform ip multicast B-50

    debug platform ip source-guard B-52

    debug platform ip unicast B-53

    debug platform ipc B-55

    debug platform led B-56

    debug platform matm B-57

    debug platform messaging application B-58

    debug platform phy B-59

    debug platform pm B-61

    debug platform policer cpu uni-eni B-63

    debug platform port-asic B-64

    debug platform port-security B-65

    debug platform qos-acl-tcam B-66

    debug platform qos-manager B-67

    debug platform remote-commands B-68

    debug platform rep B-69

    debug platform resource-manager B-70

    debug platform snmp B-71

    debug platform span B-72

    debug platform supervisor-asic B-73

    debug platform sw-bridge B-74

    debug platform tcam B-75

    debug platform udld B-77

    debug platform vlan B-78

    debug pm B-79

    debug port-security B-81

    debug rep B-82

    debug qos-manager B-83

    debug spanning-tree B-84

    debug spanning-tree bpdu B-86

    debug spanning-tree bpdu-opt B-87

    debug spanning-tree mstp B-88

    xviCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    debug spanning-tree switch B-90

    debug sw-vlan B-92

    debug sw-vlan ifs B-93

    debug sw-vlan notification B-94

    debug udld B-96

    debug vqpc B-98

    A P P E N D I X C Cisco ME 3400E Ethernet Access SwitchShow Platform Commands C-1

    show platform acl C-2

    show platform backup interface C-3

    show platform cfm C-4

    show platform configuration C-5

    show platform dl C-6

    show platform etherchannel C-7

    show platform forward C-8

    show platform frontend-controller C-10

    show platform ip igmp snooping C-11

    show platform ip multicast C-12

    show platform ip unicast C-13

    show platform ipc trace C-14

    show platform ipv6 unicast C-15

    show platform l2pt dm C-17

    show platform layer4op C-18

    show platform mac-address-table C-19

    show platform messaging C-20

    show platform monitor C-21

    show platform mvr table C-22

    show platform pm C-23

    show platform policer cpu C-24

    show platform port-asic C-28

    show platform port-security C-32

    show platform qos C-33

    show platform resource-manager C-36

    show platform snmp counters C-38

    show platform spanning-tree synchronization C-39

    xviiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Contents

    show platform status C-40

    show platform stp-instance C-41

    show platform tcam C-42

    show platform vlan C-44

    show platform vlan mapping C-45

    A P P E N D I X D Acknowledgments for Open-Source Software D-1

    I N D E X

    xviiiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Preface

    AudienceThis guide is for the networking professional using the Cisco IOS command-line interface (CLI) to manage the Cisco Metro Ethernet (ME) 3400E Series Ethernet Access switch, hereafter referred to as the switch. Before using this guide, you should have experience working with the Cisco IOS commands and the switch software features. You should also have experience working with the concepts and terminology of Ethernet and local area networking.

    Purpose The switch ships with one of these software images installed:

    • The metro access image includes additional features such as IEEE 802.1Q tunneling, Layer 2 protocol tunneling, dynamic ARP inspection, and IP source guard.

    • The metro IP access image adds Layer 3 functionality such as IP routing support for Routing Information Protocol (RIP), Open Shortest Path First (OSPF) Protocol, Border Gateway Protocol (BGP), and Enhanced Interior Gateway Routing Protocol (EIGRP), multiple VPN routing/forwarding on customer edge (multi-VRF-CE) devices, and IP multicast routing.

    This guide provides the information you need about the Layer 2 and Layer 3 commands that have been created or changed for use with the Cisco ME 3400EEthernet Access switch. For information about the standard Cisco IOS Release 12.2 commands, see the Cisco IOS documentation set available from the Cisco.com home page by selecting Service and Support > Technical Documents. On the Cisco Product Documentation home page, select Release 12.2 from the Cisco IOS Software drop-down list.

    This guide does not provide procedures for configuring your switch. For detailed configuration procedures, see the software configuration guide for this release.

    This guide does not describe system messages you might encounter. For more information, see the system message guide for this release.

    For the latest documentation updates, see the release notes for this release.

    xixCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Preface

    ConventionsThis publication uses these conventions to convey instructions and information:

    Command descriptions use these conventions:

    • Commands and keywords are in boldface text.

    • Arguments for which you supply values are in italic.

    • Square brackets ([ ]) means optional elements.

    • Braces ( ) group required choices, and vertical bars ( | ) separate the alternative elements.

    • Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional element.

    Interactive examples use these conventions:

    • Terminal sessions and system displays are in screen font.

    • Information you enter is in boldface screen font.

    • Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).

    Notes, cautions, and warnings use these conventions and symbols:

    Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in this manual.

    Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

    Filtering show Command Output The show commands have optional output modifiers to filter the command output.

    • | begin—Display begins with the line that matches the expression.

    • | exclude—Display excludes with the line that matches the expression.

    • | include—Display includes with the line that matches the expression.

    • expression—Expression in the output to use as a reference point.

    Expressions are case sensitive. If you enter | exclude output, the lines that contain output are not displayed, but the lines that contain Output are displayed.

    Related PublicationsThese documents provide complete information about the switch and are available from this Cisco.com site:

    http://www.cisco.com/en/US/products/ps9637/tsd_products_support_series_home.html

    xxCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

    http://www.cisco.com/en/US/products/ps9637/tsd_products_support_series_home.html

  • Preface

    Note Before installing, configuring, or upgrading the switch, see these documents:

    • For initial configuration information, see the “Configuring the Switch with the CLI-Based Setup Program” appendix in the hardware installation guide.

    • For upgrading information, see the “Downloading Software” section in the release notes.

    • Release Notes for the Cisco ME 3400E Ethernet Access Switch

    • Cisco ME 3400E Ethernet Access Switch Software Configuration Guide

    • Cisco ME 3400E Ethernet Access Switch Command Reference

    • Cisco ME 3400E, ME 3400, and ME 2400 Switch System Message Guide

    • Cisco ME 3400E Ethernet Access Switch Hardware Installation Guide

    • Cisco ME 3400E Switch Getting Started Guide

    • Regulatory Compliance and Safety Information for the Cisco ME 3400E Ethernet Access Switch

    • Cisco Small Form-Factor Pluggable Modules Installation Notes

    • Cisco CWDM GBIC and CWDM SFP Installation Note

    • These compatibility matrix documents are available from this Cisco.com site:

    http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html

    – Cisco Gigabit Ethernet Transceiver Modules Compatibility Matrix

    – Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix

    – Cisco Small Form-Factor Pluggable Modules Compatibility Matrix

    – Compatibility Matrix for 1000BASE-T Small Form-Factor Pluggable Modules

    Obtaining Documentation and Submitting a Service RequestFor information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

    http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

    Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.

    xxiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

    http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.htmlhttp://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html

  • Preface

    xxiiCisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Cisco ME OL-26663-01

    C H A P T E R 1

    Using the Command-Line Interface

    The Cisco Metro Ethernet (ME) 3400E Series Ethernet Access switch is supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure software features.

    For a complete description command descriptions, see these sections:

    • For the configuration and monitoring commands that support these features, see Chapter 2, “Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands.”

    • For information on the boot loader commands, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    • For information on the debug commands, see Appendix B, “Cisco ME 3400E Ethernet Access Switch Debug Commands.”

    • For information on the show platform commands, see Appendix C, “Cisco ME 3400E Ethernet Access Switch Show Platform Commands.”

    • For more information on Cisco IOS Release 12.2, see the Cisco IOS Release 12.2 Command Summary.

    For task-oriented configuration steps, see the software configuration guide for this release.

    In this document, unless otherwise specified, IP refers to IP version 4 (IPv4).

    CLI Command ModesThis section describes the CLI command mode structure. Command modes support specific Cisco IOS commands. For example, the interface interface-id command only works when entered in global configuration mode.

    These are the main command modes for the switch:

    • User EXEC

    • Privileged EXEC

    • Global configuration

    • Interface configuration

    • VLAN configuration

    • Line configuration

    1-13400E Ethernet Access Switch Command Reference

  • Chapter 1 Using the Command-Line InterfaceCLI Command Modes

    Table 1-1 lists the main command modes, how to access each mode, the prompt you see in that mode, and how to exit that mode. The prompts listed use the default name Switch.

    User EXEC Mode After you access the device, you are automatically in user EXEC command mode. The EXEC commands available at the user level are a subset of those available at the privileged level. In general, use the user EXEC commands to temporarily change terminal settings, perform basic tests, and list system information.

    The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.

    Switch> ?

    Table 1-1 Command Modes Summary

    Command Mode Access Method Prompt Exit or Access Next Mode

    User EXEC This is the first level of access.

    (For the switch) Change terminal settings, perform basic tasks, and list system information.

    Switch> Enter the logout command.

    To enter privileged EXEC mode, enter the enable command.

    Privileged EXEC From user EXEC mode, enter the enable command.

    Switch# To exit to user EXEC mode, enter the disable command.

    To enter global configuration mode, enter the configure command.

    Global configuration

    From privileged EXEC mode, enter the configure command.

    Switch(config)# To exit to privileged EXEC mode, enter the exit or end command, or press Ctrl-Z.

    To enter interface configuration mode, enter the interface configuration command.

    Interface configuration

    From global configuration mode, specify an interface by entering the interface command followed by an interface identification.

    Switch(config-if)# To exit to privileged EXEC mode, enter the end command, or press Ctrl-Z.

    To exit to global configuration mode, enter the exit command.

    VLAN configuration

    In global configuration mode, enter the vlan vlan-id command.

    Switch(config-vlan)# To exit to global configuration mode, enter the exit command.

    To return to privileged EXEC mode, enter the end command, or press Ctrl-Z.

    Line configuration From global configuration mode, specify a line by entering the line command.

    Switch(config-line)# To exit to global configuration mode, enter the exit command.

    To return to privileged EXEC mode, enter the end command, or press Ctrl-Z.

    1-2Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 1 Using the Command-Line InterfaceCLI Command Modes

    Privileged EXEC ModeBecause many of the privileged commands configure operating parameters, privileged access should be password-protected to prevent unauthorized use. The privileged command set includes those commands contained in user EXEC mode, as well as the configure privileged EXEC command through which you access the remaining command modes.

    If your system administrator has set a password, you are prompted to enter it before being granted access to privileged EXEC mode. The password does not appear on the screen and is case sensitive.

    The privileged EXEC mode prompt is the device name followed by the pound sign (#).

    Switch#

    Enter the enable command to access privileged EXEC mode:

    Switch> enable Switch#

    The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.

    Switch# ?

    To return to user EXEC mode, enter the disable privileged EXEC command.

    Global Configuration ModeGlobal configuration commands apply to features that affect the device as a whole. Use the configure privileged EXEC command to enter global configuration mode. The default is to enter commands from the management console.

    When you enter the configure command, a message prompts you for the source of the configuration commands:

    Switch# configure Configuring from terminal, memory, or network [terminal]?

    You can specify either the terminal or nonvolatile RAM (NVRAM) as the source of configuration commands.

    This example shows you how to access global configuration mode:

    Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z.

    The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.

    Switch(config)# ?

    To exit global configuration command mode and to return to privileged EXEC mode, enter the end or exit command, or press Ctrl-Z.

    1-3Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 1 Using the Command-Line InterfaceCLI Command Modes

    Interface Configuration ModeInterface configuration commands modify the operation of the interface. Interface configuration commands always follow a global configuration command, which defines the interface type.

    Use the interface interface-id command to access interface configuration mode. The new prompt means interface configuration mode.

    Switch(config-if)#

    The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.

    Switch(config-if)# ?

    To exit interface configuration mode and to return to global configuration mode, enter the exit command. To exit interface configuration mode and to return to privileged EXEC mode, enter the end command, or press Ctrl-Z.

    VLAN Configuration ModeUse this mode to configure normal-range VLANs (VLAN IDs 1 to 1005) or extended-range VLANs (VLAN IDs 1006 to 4094). The VLAN configuration is saved in the running configuration file, and you can save it to the switch startup configuration file by using the copy running-config startup-config privileged EXEC command. The configurations of VLAN IDs 1 to 1005 are saved in the VLAN database. The extended-range VLAN configurations are not saved in the VLAN database.

    Enter the vlan vlan-id global configuration command to access VLAN configuration mode:

    Switch(config)# vlan 2000Switch(config-vlan)#

    To display a comprehensive list of available commands, enter a question mark (?) at the prompt.

    Switch(config-vlan)# ?

    For extended-range VLANs, many characteristics are not configurable and must remain at the default setting.

    To return to global configuration mode, enter exit; to return to privileged EXEC mode, enter end. All the commands except shutdown take effect when you exit config-vlan mode.

    Line Configuration ModeLine configuration commands modify the operation of a terminal line. Line configuration commands always follow a line command, which defines a line number. Use these commands to change terminal parameter settings line-by-line or for a range of lines.

    Use the line vty line_number [ending_line_number] command to enter line configuration mode. The new prompt means line configuration mode. The following example shows how to enter line configuration mode for virtual terminal line 7:

    Switch(config)# line vty 0 7

    The supported commands can vary depending on the version of software in use. To display a comprehensive list of commands, enter a question mark (?) at the prompt.

    Switch(config-line)# ?

    1-4Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 1 Using the Command-Line InterfaceCLI Command Modes

    To exit line configuration mode and to return to global configuration mode, use the exit command. To exit line configuration mode and to return to privileged EXEC mode, enter the end command, or press Ctrl-Z.

    1-5Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 1 Using the Command-Line InterfaceCLI Command Modes

    1-6Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Cisco ME OL-26663-01

    C H A P T E R 2

    Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands

    aaa accounting dot1xUse the aaa accounting dot1x global configuration command to enable authentication, authorization, and accounting (AAA) accounting and to create method lists defining specific accounting methods on a per-line or per-interface basis for IEEE 802.1x sessions. Use the no form of this command to disable IEEE 802.1x accounting.

    aaa accounting dot1x {name | default} start-stop {broadcast group {name | radius | tacacs+} [group {name | radius | tacacs+}... ] | group {name | radius | tacacs+} [group {name | radius | tacacs+} ... ]}

    no aaa accounting dot1x {name | default}

    Syntax Description name Name of a server group. This is optional when you enter it after the broadcast group and group keywords.

    default Use the accounting methods that follow as the default list for accounting services.

    start-stop Send a start accounting notice at the beginning of a process and a stop accounting notice at the end of a process. The start accounting record is sent in the background. The requested-user process begins regardless of whether or not the start accounting notice was received by the accounting server.

    broadcast Enable accounting records to be sent to multiple AAA servers and send accounting records to the first server in each group. If the first server is unavailable, the switch uses the list of backup servers to identify the first server.

    group Specify the server group to be used for accounting services. These are valid server group names:

    • name—Name of a server group.

    • radius—List of all RADIUS hosts.

    • tacacs+—List of all TACACS+ hosts.

    The group keyword is optional when you enter it after the broadcast group and group keywords. You can enter more than optional group keyword.

    2-13400E Ethernet Access Switch Command Reference

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsaaa accounting dot1x

    Defaults AAA accounting is disabled.

    Command Modes Global configuration

    Command History

    Usage Guidelines This command requires access to a RADIUS server.

    Note We recommend that you enter the dot1x reauthentication interface configuration command before configuring IEEE 802.1x RADIUS accounting on an interface.

    Examples This example shows how to configure IEEE 802.1x accounting:

    Switch(config)# aaa accounting dot1xSwitch(config)# aaa accounting dot1x default start-stop group radiusSwitch(config)#

    Note The RADIUS authentication server must be properly configured to accept and log update or watchdog packets from the AAA client.

    Related Commands

    radius (Optional) Enable RADIUS authorization.

    tacacs+ (Optional) Enable TACACS+ accounting.

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    aaa authentication dot1x

    Specifies one or more AAA methods for use on interfaces running IEEE 802.1x.

    aaa-new-model Enables the AAA access control model. For syntax information, see the Cisco IOS Security Command Reference, Release 12.2> Authentication, Authorization, and Accounting > Authentication Commands.

    dot1x reauthentication Enables or disables periodic re-authentication.

    dot1x timeout reauth period

    Sets the number of seconds between re-authentication attempts.

    2-2Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsaaa authentication dot1x

    aaa authentication dot1xUse the aaa authentication dot1x global configuration command to specify the authentication, authorization, and accounting (AAA) method to use on ports complying with IEEE 802.1x. Use the no form of this command to disable authentication.

    aaa authentication dot1x {default} method1

    no aaa authentication dot1x {default}

    Syntax Description

    Note Though other keywords are visible in the command-line help strings, only the default and group radius keywords are supported.

    Defaults No authentication is performed.

    Command Modes Global configuration

    Command History

    Usage Guidelines The method argument identifies the method that the authentication algorithm tries in the given sequence to validate the password provided by the client. The only method that is truly IEEE 802.1x-compliant is the group radius method, in which the client data is validated against a RADIUS authentication server.

    If you specify group radius, you must configure the RADIUS server by entering the radius-server host global configuration command.

    Use the show running-config privileged EXEC command to display the configured lists of authentication methods.

    Examples This example shows how to enable AAA and how to create an IEEE 802.1x-compliant authentication list. This authentication first tries to contact a RADIUS server. If this action returns an error, the user is not allowed access to the network.

    Switch(config)# aaa new-modelSwitch(config)# aaa authentication dot1x default group radius

    You can verify your settings by entering the show running-config privileged EXEC command.

    default Use the listed authentication method that follows this argument as the default method when a user logs in.

    method1 Enter the group radius keywords to use the list of all RADIUS servers for authentication.

    Release Modification

    12.2(44)EY This command was introduced.

    2-3Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsaaa authentication dot1x

    Related Commands Command Description

    aaa new-model Enables the AAA access control model. For syntax information, see the Cisco IOS Security Command Reference, Release 12.2 > Authentication, Authorization, and Accounting > Authentication Commands.

    show running-config Displays the operating configuration. For syntax information, use this link to the Cisco IOS Release 12.2 Command Reference listing page: http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_reference_list.html Select the Cisco IOS Commands Master List, Release 12.2 to navigate to the command.

    2-4Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

    http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_reference_list.htmlhttp://www.cisco.com/en/US/products/sw/iosswrel/ps1835/prod_command_reference_list.html

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsaction

    actionUse the action access-map configuration command to set the action for the VLAN access map entry. Use the no form of this command to set the action to the default value, which is to forward.

    action {drop | forward}

    no action

    Syntax Description

    Defaults The default action is to forward packets.

    Command Modes Access-map configuration

    Command History

    Usage Guidelines You enter access-map configuration mode by using the vlan access-map global configuration command.

    If the action is drop, you should define the access map, including configuring any access control list (ACL) names in match clauses, before applying the map to a VLAN, or all packets could be dropped.

    In access-map configuration mode, use the match access-map configuration command to define the match conditions for a VLAN map. Use the action command to set the action that occurs when a packet matches the conditions.

    The drop and forward parameters are not used in the no form of the command.

    Examples This example shows how to identify and apply a VLAN access map vmap4 to VLANs 5 and 6 that causes the VLAN to forward an IP packet if the packet matches the conditions defined in access list al2:

    Switch(config)# vlan access-map vmap4Switch(config-access-map)# match ip address al2Switch(config-access-map)# action forwardSwitch(config-access-map)# exitSwitch(config)# vlan filter vmap4 vlan-list 5-6

    You can verify your settings by entering the show vlan access-map privileged EXEC command.

    drop Drop the packet when the specified conditions are matched.

    forward Forward the packet when the specified conditions are matched.

    Release Modification

    12.2(44)EY This command was introduced.

    2-5Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsaction

    Related Commands Command Description

    access-list {deny | permit} Configures a standard numbered ACL. For syntax information, select Cisco IOS IP Command Reference, Volume 1 of 3:Addressing and Services, Release 12.2 > IP Services Commands.

    ip access-list Creates a named access list. For syntax information, select Cisco IOS IP Command Reference, Volume 1 of 3:Addressing and Services, Release 12.2 > IP Services Commands.

    mac access-list extended Creates a named MAC address access list.

    match (access-map configuration)

    Defines the match conditions for a VLAN map.

    show vlan access-map Displays the VLAN access maps created on the switch.

    vlan access-map Creates a VLAN access map.

    2-6Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsalarm-contact

    alarm-contact Use the alarm-contact global configuration command to configure triggers and severity levels for external alarms. Use the no form of this command to remove the configuration.

    alarm-contact {contact-number {description string | severity {critical | major | minor} | trigger {closed | open}} | all {severity {critical | major | minor} | trigger {closed | open}}

    no alarm-contact {contact-number {description | severity | trigger} | all {severity | trigger}

    Defaults No alarms are configured.

    Command Modes Global configuration

    Command History

    Usage Guidelines The no alarm-contact contact-number description sets the description to an empty string.

    The no alarm-contact {contact-number | all} severity sets the alarm-contact severity to minor.

    The no alarm-contact {contact-number | all} trigger sets the external alarm-contact trigger to closed.

    contact-number Configure a specific alarm contact number. The range is 1 to 4.

    description string

    Add a description for the alarm contact number. The description string can be up to 80 alphanumeric characters in length and is included in the system message generated when the alarm is triggered.

    all Configure all alarm contacts.

    severity Set the severity level that is set when the alarm is triggered. The severity is included in the alarm notification. Entering no alarm-contact severity sets the severity to minor.

    critical Set severity level as critical.

    major Set severity level as major.

    minor Set severity level as minor.

    trigger Set the state that triggers the alarm, whether the connected circuit is open or closed. Entering no alarm-contact trigger sets the trigger to closed.

    closed Specify that the alarm is triggered when the contact is closed.

    open Specify that the alarm is triggered when the contact is open.

    Release Modification

    12.2(44)EY This command was introduced.

    2-7Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsalarm-contact

    Examples This example shows how to configure alarm contact number 1 to report a critical alarm when the contact is open.

    Switch(config)# alarm-contact 1 description main_lab_doorSwitch(config)# alarm-contact 1 severity critical Switch(config)# alarm-contact 1 trigger openDec 4 10:34:09.049: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_ASSERT: Alarm asserted: main_lab_door

    You can verify your settings by entering the show env alarm-contact or the show running-config privileged EXEC command.

    Switch# show env alarm-contactALARM CONTACT 1 Status: asserted Description: main_lab_door Severity: critical Trigger: open

    This example shows how to configure clear alarm contact number 1 and the show command outputs.

    Switch(config)# no alarm-contact 1 descriptionDec 4 10:39:33.621: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_CLEAR: Alarm cleared: main_lab_door Dec 4 10:39:33.621: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_ASSERT: Alarm asserted: external alarm contact 1

    Switch(config)# no alarm-contact 1 severityDec 4 10:39:46.774: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_CLEAR: Alarm cleared: external alarm contact 1 Dec 4 10:39:46.774: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_ASSERT: Alarm asserted: external alarm contact 1

    Switch(config)# no alarm-contact 1 trigger openDec 4 10:39:56.547: %PLATFORM_ENV-1-EXTERNAL_ALARM_CONTACT_CLEAR: Alarm cleared: external alarm contact 1

    Switch(config)# endSwitch# show env alarm-contactALARM CONTACT 1 Status: not asserted Description: external alarm contact 1 Severity: minor Trigger: closedSwitch# show hard ledSWITCH: 1SYSTEM: GREENMGMT: GREENALARM 1: BLACKALARM 2: BLACKALARM 3: BLACKALARM 4: BLACK

    Related Commands Command Description

    show env alarm-contact Displays the alarm setting and status for the switch.

    2-8Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive download-sw

    archive download-swUse the archive download-sw privileged EXEC command to download a new image from a TFTP server to the switch and to overwrite or keep the existing image.

    archive download-sw {/force-reload | /imageonly | /leave-old-sw | /no-set-boot | /no-version-check | /overwrite | /reload | /safe} source-url

    Syntax Description /force-reload Unconditionally force a system reload after successfully downloading the software image.

    /imageonly Download only the software image but not the HTML files associated with the embedded device manager. The HTML files for the existing version are deleted only if the existing version is being overwritten or removed.

    /leave-old-sw Keep the old software version after a successful download.

    /no-set-boot Do not alter the setting of the BOOT environment variable to point to the new software image after it is successfully downloaded.

    /no-version-check Download the software image without checking to prevent installing an incompatible image.

    /overwrite Overwrite the software image in flash memory with the downloaded one.

    /reload Reload the system after successfully downloading the image unless the configuration has been changed and not been saved.

    /safe Keep the current software image; do not delete it to make room for the new software image before the new image is downloaded. The current image is deleted after the download.

    source-url The source URL alias for a local or network file system. These options are supported:

    • The syntax for the local flash file system:flash:

    • The syntax for the FTP: ftp:[[//username[:password]@location]/directory]/image-name.tar

    • The syntax for an HTTP server:http://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar

    • The syntax for a secure HTTP server:https://[[username:password]@]{hostname | host-ip}[/directory]/image-name.tar

    • The syntax for the Remote Copy Protocol (RCP): rcp:[[//username@location]/directory]/image-name.tar

    • The syntax for the TFTP:tftp:[[//location]/directory]/image-name.tar

    The image-name.tar is the software image to download and install on the switch.

    2-9Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive download-sw

    Defaults The current software image is not overwritten with the downloaded image.

    Both the software image and HTML files are downloaded.

    The new image is downloaded to the flash: file system.

    The BOOT environment variable is changed to point to the new software image on the flash: file system.

    Image names are case sensitive; the image file is provided in tar format.

    Compatibility of the version on the image to be downloaded is checked.

    Command Modes Privileged EXEC

    Command History

    Usage Guidelines The /imageonly option removes the HTML files for the existing image if the existing image is being removed or replaced. Only the Cisco IOS image (without the HTML files) is downloaded.

    Using the /safe or /leave-old-sw option can cause the new image download to fail if there is insufficient flash memory. If leaving the software in place prevents the new image from fitting in flash memory due to space constraints, an error results.

    If you used the /leave-old-sw option and did not overwrite the old image when you downloaded the new one, you can remove the old image by using the delete privileged EXEC command. For more information, see the “delete” section on page 2-80.

    Note Use the /no-version-check option with care. This option allows an image to be downloaded without first confirming that it is not incompatible with the switch.

    Use the /overwrite option to overwrite the image on the flash device with the downloaded one.

    If you specify the command without the /overwrite option, the download algorithm verifies that the new image is not the same as the one on the switch flash device. If the images are the same, the download does not occur. If the images are different, the old image is deleted, and the new one is downloaded.

    After downloading a new image, enter the reload privileged EXEC command to begin using the new image, or specify the /reload or /force-reload option in the archive download-sw command.

    Examples This example shows how to download a new image from a TFTP server at 172.20.129.10 and overwrite the image on the switch:

    Switch# archive download-sw /overwrite tftp://172.20.129.10/test-image.tar

    This example shows how to download only the software image from a TFTP server at 172.20.129.10 to the switch:

    Switch# archive download-sw /imageonly tftp://172.20.129.10/test-image.tar

    This example shows how to keep the old software version after a successful download:

    Switch# archive download-sw /leave-old-sw tftp://172.20.129.10/test-image.tar

    Release Modification

    12.2(44)EY This command was introduced.

    2-10Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive download-sw

    Related Commands Command Description

    archive tar Creates a tar file, lists the files in a tar file, or extracts the files from a tar file.

    archive upload-sw Uploads an existing image on the switch to a server.

    delete Deletes a file or directory on the flash memory device.

    2-11Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive tar

    archive tarUse the archive tar privileged EXEC command to create a tar file, list files in a tar file, or extract the files from a tar file.

    archive tar {/create destination-url flash:/file-url} | {/table source-url} | {/xtract source-url flash:/file-url [dir/file...]}

    Syntax Description /create destination-url flash:/file-url

    Create a new tar file on the local or network file system.

    For destination-url, specify the destination URL alias for the local or network file system and the name of the tar file to create. These options are supported:

    • The syntax for the local flash filesystem:flash:

    • The syntax for the FTP: ftp:[[//username[:password]@location]/directory]/tar-filename.tar

    • The syntax for the Remote Copy Protocol (RCP) is: rcp:[[//username@location]/directory]/tar-filename.tar

    • The syntax for the TFTP: tftp:[[//location]/directory]/tar-filename.tar

    The tar-filename.tar is the tar file to be created.

    For flash:/file-url, specify the location on the local flash file system from which the new tar file is created.

    An optional list of files or directories within the source directory can be specified to write to the new tar file. If none are specified, all files and directories at this level are written to the newly created tar file.

    /table source-url Display the contents of an existing tar file to the screen.

    For source-url, specify the source URL alias for the local or network file system. These options are supported:

    • The syntax for the local flash file system:flash:

    • The syntax for the FTP:ftp:[[//username[:password]@location]/directory]/tar-filename.tar

    • The syntax for the RCP: rcp:[[//username@location]/directory]/tar-filename.tar

    • The syntax for the TFTP: tftp:[[//location]/directory]/tar-filename.tar

    The tar-filename.tar is the tar file to display.

    2-12Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive tar

    Defaults None

    Command Modes Privileged EXEC

    Command History

    Usage Guidelines Filenames and directory names are case sensitive.

    Image names are case sensitive.

    Examples This example shows how to create a tar file. The command writes the contents of the new-configs directory on the local flash device to a file named saved.tar on the TFTP server at 172.20.10.30:

    Switch# archive tar /create tftp:172.20.10.30/saved.tar flash:/new-configs

    This example shows how to display the contents of the file that is in flash memory. The contents of the tar file appear on the screen:

    Switch# archive tar /table flash:image_name-mz.122-release.tar info (219 bytes)image_name-mz.122-release/(directory)image_name-mz.122-release(610856 bytes)image_name-mz.122-release/info (219 bytes)info.ver (219 bytes)

    /xtract source-url flash:/file-url [dir/file...]

    Extract files from a tar file to the local file system.

    For source-url, specify the source URL alias for the local file system. These options are supported:

    • The syntax for the local flash file system:flash:

    • The syntax for the FTP: ftp:[[//username[:password]@location]/directory]/tar-filename.tar

    • The syntax for the RCP: rcp:[[//username@location]/directory]/tar-filename.tar

    • The syntax for the TFTP: tftp:[[//location]/directory]/tar-filename.tar

    The tar-filename.tar is the tar file from which to extract.

    For flash:/file-url [dir/file...], specify the location on the local flash file system into which the tar file is extracted. Use the dir/file... option to specify an optional list of files or directories within the tar file to be extracted. If none are specified, all files and directories are extracted.

    Release Modification

    12.2(44)EY This command was introduced.

    2-13Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive tar

    This example shows how to display only the html directory and its contents:

    Switch# archive tar /table flash:image_name-mz.122-release.tar image_name-mz.122-release/htmlimage_name-mz.122-release/html/ (directory)image_name-mz.122-release/html/const.htm (556 bytes)image_name-mz.122-release/html/xhome.htm (9373 bytes)image_name-mz.122-release/html/menu.css (1654 bytes)

    This example shows how to extract the contents of a tar file on the TFTP server at 172.20.10.30. This command extracts just the new-configs directory into the root directory on the local flash file system. The remaining files in the saved.tar file are ignored.

    Switch# archive tar /xtract tftp://172.20.10.30/saved.tar flash:/ new-configs

    Related Commands Command Description

    Command History Downloads a new image from a TFTP server to the switch.

    archive upload-sw Uploads an existing image on the switch to a server.

    2-14Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive upload-sw

    archive upload-swUse the archive upload-sw privileged EXEC command to upload an existing switch image to a server.

    archive upload-sw [/version version_string] destination-url

    Syntax Description

    Defaults Uploads the currently running image from the flash: file system.

    Command Modes Privileged EXEC

    Command History

    Usage Guidelines Use the upload feature only if the HTML files associated with the embedded device manager have been installed with the existing image.

    The files are uploaded in this sequence: the Cisco IOS image, the HTML files, and info. After these files are uploaded, the software creates the tar file.

    Image names are case sensitive.

    Examples This example shows how to upload the currently running image to a TFTP server at 172.20.140.2:

    Switch# archive upload-sw tftp://172.20.140.2/test-image.tar

    /version version_string (Optional) Specify the specific version string of the image to be uploaded.

    destination-url The destination URL alias for a local or network file system. These options are supported:

    • The syntax for the local flash file system:flash:

    • The syntax for the FTP: ftp:[[//username[:password]@location]/directory]/image-name.tar

    • The syntax for the Remote Copy Protocol (RCP): rcp:[[//username@location]/directory]/image-name.tar

    • The syntax for the TFTP:tftp:[[//location]/directory]/image-name.tar

    The image-name.tar is the name of software image to be stored on the server.

    Release Modification

    12.2(44)EY This command was introduced.

    2-15Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarchive upload-sw

    Related Commands Command Description

    Command History Downloads a new image to the switch.

    archive tar Creates a tar file, lists the files in a tar file, or extracts the files from a tar file.

    2-16Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarp access-list

    arp access-listUse the arp access-list global configuration command to define an Address Resolution Protocol (ARP) access control list (ACL) or to add clauses to the end of a previously defined list. Use the no form of this command to delete the specified ARP access list.

    arp access-list acl-name

    no arp access-list acl-name

    Syntax Description

    Defaults No ARP access lists are defined.

    Command Modes Global configuration

    Command History

    Usage Guidelines After entering the arp access-list command, you enter ARP access-list configuration mode, and these configuration commands are available:

    • default: returns a command to its default setting.

    • deny: specifies packets to reject. For more information, see the “deny (ARP access-list configuration)” section on page 2-81.

    • exit: exits ARP access-list configuration mode.

    • no: negates a command or returns to the default settings.

    • permit: specifies packets to forward. For more information, see the “permit (ARP access-list configuration)” section on page 2-322.

    Use the permit and deny access-list configuration commands to forward and to drop ARP packets based on the specified matching criteria.

    When the ARP ACL is defined, you can apply it to a VLAN by using the ip arp inspection filter vlan global configuration command. ARP packets containing only IP-to-MAC address bindings are compared to the ACL. All other types of packets are bridged in the ingress VLAN without validation. If the ACL permits a packet, the switch forwards it. If the ACL denies a packet because of an explicit deny statement, the switch drops the packet. If the ACL denies a packet because of an implicit deny statement, the switch compares the packet to the list of DHCP bindings (unless the ACL is static, which means that packets are not compared to the bindings).

    acl-name Name of the ACL.

    Release Modification

    12.2(44)EY This command was introduced.

    2-17Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsarp access-list

    Examples This example shows how to define an ARP access list and to permit both ARP requests and ARP responses from a host with an IP address of 1.1.1.1 and a MAC address of 0000.0000.abcd:

    Switch(config)# arp access-list static-hostsSwitch(config-arp-nacl)# permit ip host 1.1.1.1 mac host 00001.0000.abcdSwitch(config-arp-nacl)# end

    You can verify your settings by entering the show arp access-list privileged EXEC command.

    Related Commands Command Description

    deny (ARP access-list configuration)

    Denies an ARP packet based on matches compared against the DHCP bindings.

    ip arp inspection filter vlan

    Permits ARP requests and responses from a host configured with a static IP address.

    permit (ARP access-list configuration)

    Permits an ARP packet based on matches compared against the DHCP bindings.

    show arp access-list Displays detailed information about ARP access lists.

    2-18Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsbandwidth

    bandwidthUse the bandwidth policy-map class configuration command to configure class-based weighted fair queuing (CBWFQ) by setting the output bandwidth for a policy-map class. Use the no form of this command to remove the bandwidth setting for the class.

    bandwidth {rate | percent value | remaining percent value}

    no bandwidth [rate | percent value | remaining percent value]

    Syntax Description

    Defaults No bandwidth is defined.

    Command Modes Policy-map class configuration

    Command History

    Usage Guidelines You use the bandwidth policy-map class command to control output traffic. The bandwidth command specifies the bandwidth for traffic in that class. CBWFQ derives the weight for packets belonging to the class from the bandwidth allocated to the class and uses the weight to ensure that the queue for that class is serviced fairly. Bandwidth settings are not supported in input policy maps.

    When you configure bandwidth for a class of traffic as an absolute rate (kbps) or a percentage of bandwidth (percent value), it represents the minimum bandwidth guarantee or committed information rate (CIR) for that traffic class. This means that the traffic class gets at least the bandwidth specified in the command, but is not limited to that bandwidth. Any excess bandwidth on the port is allocated to each class in the same ratio as the configured CIR rates.

    When you enter the bandwidth remaining percent command, hard bandwidths are not guaranteed, and only relative bandwidths are assured. Class bandwidths are always proportional to the specified bandwidth percentages configured for the port.

    When you configure bandwidth in an output policy, you must specify the same units in each bandwidth configuration; that is, all absolute values (rates) or percentages.

    The total rate of the minimum bandwidth guarantees for each queue of the policy cannot exceed the total speed for the interface. If the percent keyword is used, the sum of the class bandwidth percentages cannot exceed 100 percent.

    rate Set the bandwidth rate for the class in kilobits per second (kbps). The range is from 64 to 1000000.

    percent value Set the bandwidth for the class as a percent of the total bandwidth. The range is from 1 to 100 percent.

    remaining percent value Set the bandwidth for the class as a percent of the remaining bandwidth. The range is from 1 to 100 percent.

    Release Modification

    12.2(44)EY This command was introduced.

    2-19Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsbandwidth

    Using the queue-limit command to modify the default queue limit is especially important on higher-speed interfaces so that they meet the minimum bandwidth guarantees required by the interface.

    You cannot use the bandwidth policy-map class configuration command to configure CBWFQ and the shape average command to configure class-based shaping for the same class in a policy map.

    You cannot configure bandwidth in a class that includes priority queuing (configured with the priority policy-map class configuration command).

    Examples This example shows how to set the precedence of output queues by setting bandwidth in kilobits per second. The classes outclass1, outclass2, and outclass3 get a minimum of 50000, 20000, and 10000 kbps. The class class-default at a minimum gets the remaining bandwidth.

    Switch(config)# policy-map out-policySwitch(config-pmap)# class outclass1Switch(config-pmap-c)# bandwidth 50000Switch(config-pmap-c)# exitSwitch(config-pmap)# class outclass2Switch(config-pmap-c)# bandwidth 20000Switch(config-pmap-c)# exitSwitch(config-pmap)# class outclass3Switch(config-pmap-c)# bandwidth 10000Switch(config-pmap-c)# exitSwitch(config-pmap)# exitSwitch(config)# interface fastethernet 0/1Switch(config-if)# service-policy output out-policySwitch(config-if)# exit

    This example shows how to set the precedence of output queues by allocating percentages of the total available bandwidth to each traffic class.The classes outclass1, outclass2, and outclass3 get a minimum of 50, 20, and 10 percent. The class class-default at a minimum gets 20 percent.

    Switch(config)# policy-map out-policySwitch(config-pmap)# class outclass1Switch(config-pmap-c)# bandwidth percent 50Switch(config-pmap-c)# exitSwitch(config-pmap)# class outclass2Switch(config-pmap-c)# bandwidth percent 20Switch(config-pmap-c)# exitSwitch(config-pmap)# class outclass3Switch(config-pmap-c)# bandwidth percent 10Switch(config-pmap-c)# exitSwitch(config-pmap)# exitSwitch(config)# interface fastethernet 0/1Switch(config-if)# service-policy output out-policySwitch(config-if)# exit

    2-20Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsbandwidth

    This example shows how to set outclass1 as a priority queue, with outclass2, and outclass3 getting 50 and 20 percent, respectively, of the bandwidth remaining after the priority queue is serviced. The class class-default gets the remaining 30 percent with no guarantees.

    Switch(config)# policy-map out-policySwitch(config-pmap)# class outclass1Switch(config-pmap-c)# prioritySwitch(config-pmap-c)# exitSwitch(config-pmap)# class outclass2Switch(config-pmap-c)# bandwidth remaining percent 50Switch(config-pmap-c)# exitSwitch(config-pmap)# class outclass3Switch(config-pmap-c)# bandwidth remaining percent 20Switch(config-pmap-c)# exitSwitch(config-pmap)# exitSwitch(config)# interface fastethernet 0/1Switch(config-if)# service-policy output out-policySwitch(config-if)# exit

    You can verify your settings by entering the show policy-map privileged EXEC command.

    Related Commands Command Description

    class Defines a traffic classification match criteria for the specified class-map name.

    policy-map Creates or modifies a policy map that can be attached to multiple ports to specify a service policy.

    show policy-map Displays quality of service (QoS) policy maps.

    2-21Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot buffersize

    boot buffersizeUse the boot buffersize global configuration command to configure the NVRAM size. Use the no form of this command to return to the default.

    boot buffersize size

    no boot buffersize

    Syntax Description

    Defaults The default NVRAM buffer size is 512 KB.

    Command Modes Global configuration

    Command History

    Usage Guidelines The default NVRAM buffer size is 512 KB. In some cases, the configuration file might be too large to save to NVRAM. You can configure the size of the NVRAM buffer to support larger configuration files.

    After you configure the NVRAM buffer size, reload the switch.

    Examples This example shows how to configure the NVRAM buffer size:

    Switch(config)# boot buffersize 524288Switch(config)# end

    Related Commands

    size The NVRAM buffer size in KB.

    The valid range is from 4096 to 1048576.

    Release Modification

    12.2(55)SE This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-22Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot config-file

    boot config-fileUse the boot config-file global configuration command to specify the filename that Cisco IOS uses to read and write a nonvolatile copy of the system configuration. Use the no form of this command to return to the default setting.

    boot config-file flash:/file-url

    no boot config-file

    Syntax Description

    Defaults The default configuration file is flash:config.text.

    Command Modes Global configuration

    Command History

    Usage Guidelines Filenames and directory names are case sensitive.

    This command changes the setting of the CONFIG_FILE environment variable. For more information, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    Related Commands

    flash:/file-url The path (directory) and name of the configuration file.

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-23Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot enable-break

    boot enable-breakUse the boot enable-break global configuration command to enable interrupting the automatic boot process. Use the no form of this command to return to the default setting.

    boot enable-break

    no boot enable-break

    Syntax Description This command has no arguments or keywords.

    Defaults Disabled. The automatic boot process cannot be interrupted by pressing the Break key on the console.

    Command Modes Global configuration

    Command History

    Usage Guidelines When you enter this command, you can interrupt the automatic boot process by pressing the break key on the console after the flash file system is initialized. The break key is different for each operating system:

    • On a SUN work station running UNIX, Ctrl-C is the break key.

    • On a PC running Windows 2000, Ctrl-Break is the break key.

    This command changes the setting of the ENABLE_BREAK environment variable. For more information, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    Related Commands

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-24Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot helper

    boot helperUse the boot helper global configuration command to dynamically load files during boot loader initialization to extend or patch the functionality of the boot loader. Use the no form of this command to return to the default.

    boot helper filesystem:/file-url ...

    no boot helper

    Syntax Description

    Defaults No helper files are loaded.

    Command Modes Global configuration

    Command History

    Usage Guidelines This variable is used only for internal development and testing.

    Filenames and directory names are case sensitive.

    This command changes the setting of the HELPER environment variable. For more information, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    Related Commands

    filesystem: Alias for a flash file system. Use flash: for the system board flash device.

    /file-url The path (directory) and a list of loadable files to dynamically load during loader initialization. Separate each image name with a semicolon.

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-25Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot helper-config-file

    boot helper-config-fileUse the boot helper-config-file global configuration command to specify the name of the configuration file to be used by the Cisco IOS helper image. If this is not set, the file specified by the CONFIG_FILE environment variable is used by all versions of Cisco IOS that are loaded. Use the no form of this command to return to the default setting.

    boot helper-config-file filesystem:/file-url

    no boot helper-config file

    Syntax Description

    Defaults No helper configuration file is specified.

    Command Modes Global configuration

    Command History

    Usage Guidelines This variable is used only for internal development and testing.

    Filenames and directory names are case sensitive.

    This command changes the setting of the HELPER_CONFIG_FILE environment variable. For more information, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    Related Commands

    filesystem: Alias for a flash file system. Use flash: for the system board flash device.

    /file-url The path (directory) and helper configuration file to load.

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-26Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot manual

    boot manualUse the boot manual global configuration command to enable manually booting the switch during the next boot cycle. Use the no form of this command to return to the default setting.

    boot manual

    no boot manual

    Syntax Description This command has no arguments or keywords.

    Defaults Manual booting is disabled.

    Command Modes Global configuration

    Command History

    Usage Guidelines The next time you reboot the system, the switch is in boot loader mode, which is shown by the switch: prompt. To boot the system, use the boot boot loader command, and specify the name of the bootable image.

    This command changes the setting of the MANUAL_BOOT environment variable. For more information, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    Related Commands

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-27Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot private-config-file

    boot private-config-fileUse the boot private-config-file global configuration command to specify the filename that Cisco IOS uses to read and write a nonvolatile copy of the private configuration. Use the no form of this command to return to the default setting.

    boot private-config-file filename

    no boot private-config-file

    Syntax Description

    Defaults The default configuration file is private-config.

    Command Modes Global configuration

    Command History

    Usage Guidelines Filenames are case sensitive.

    Examples This example shows how to specify the name of the private configuration file to be pconfig:

    Switch(config)# boot private-config-file pconfig

    Related Commands

    filename The name of the private configuration file.

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-28Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandsboot system

    boot systemUse the boot system global configuration command to specify the Cisco IOS image to load during the next boot cycle. Use the no form of this command to return to the default setting.

    boot system filesystem:/file-url ...

    no boot system

    Syntax Description

    Defaults The switch attempts to automatically boot the system by using information in the BOOT environment variable. If this variable is not set, the switch attempts to load and execute the first executable image it can by performing a recursive, depth-first search throughout the flash file system. In a depth-first search of a directory, each encountered subdirectory is completely searched before continuing the search in the original directory.

    Command Modes Global configuration

    Command History

    Usage Guidelines Filenames and directory names are case sensitive.

    If you are using the archive download-sw privileged EXEC command to maintain system images, you never need to use the boot system command. The boot system command is automatically manipulated to load the downloaded image.

    This command changes the setting of the BOOT environment variable. For more information, see Appendix A, “Cisco ME 3400E Ethernet Access Switch Boot Loader Commands.”

    Related Commands

    filesystem: Alias for a flash file system. Use flash: for the system board flash device.

    /file-url The path (directory) and name of a bootable image. Separate image names with a semicolon.

    Release Modification

    12.2(44)EY This command was introduced.

    Command Description

    show boot Displays the settings of the boot environment variables.

    2-29Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandschannel-group

    channel-groupUse the channel-group interface configuration command to assign an Ethernet port to an EtherChannel group. Use the no form of this command to remove an Ethernet port from an EtherChannel group.

    channel-group channel-group-number mode {active | {auto [non-silent] | desirable [non-silent] | on} | passive}

    no channel-group

    PAgP modes: channel-group channel-group-number mode {auto [non-silent] | {desirable [non-silent]}

    LACP modes: channel-group channel-group-number mode {active | passive}

    On mode: channel-group channel-group-number mode on

    Note Link Aggregation Control Protocol (LACP.) and Port Aggregation Protocol (PAgP) are available only on network node interfaces (NNIs) or enhanced network interfaces (ENIs). The active, auto, desirable, and passive keywords are not visible on user network interfaces (UNIs).

    Syntax Description channel-group-number Specify the channel group number. The range is 1 to 48.

    mode Specify the EtherChannel mode.

    active Unconditionally enable LACP

    Active mode places a port into a negotiating state in which the port initiates negotiations with other ports by sending LACP packets. A channel is formed with another port group in either the active or passive mode.

    auto Enable the PAgP only if a PAgP device is detected.

    Auto mode places a port into a passive negotiating state in which the port responds to PAgP packets it receives but does not start PAgP packet negotiation. A channel is formed only with another port group in desirable mode. When auto is enabled, silent operation is the default.

    desirable Unconditionally enable PAgP.

    Desirable mode places a port into an active negotiating state in which the port starts negotiations with other ports by sending PAgP packets. A channel is formed with another port group in either the desirable or auto mode. When desirable is enabled, silent operation is the default.

    non-silent (Optional) Use in PAgP mode with the auto or desirable keyword when traffic is expected from the other device.

    2-30Cisco ME 3400E Ethernet Access Switch Command Reference

    OL-26663-01

  • Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commandschannel-group

    Defaults No channel groups are assigned.

    No mode is configured.

    Command Modes Interface configuration

    Command History

    Usage Guidelines For Layer 2 EtherChannels, you do not have to create a port-channel interface first by using the interface port-channel global configuration command before assigning a physical port to a channel group. Instead, you can use the channel-group interface configuration command. It automatically creates the port-channel interface when the channel group gets its first physical port if the logical interface is not already created. If you create the port-channel interface first, the channel-group-number can be the same as the port-channel-number, or you can use a new number. If you use a new number, the channel-group command dynamically creates a new port channel.

    If the port is a UNI or an ENI, you must use the no shutdown interface configuration command to enable it before using the channel-group command. UNIs and ENIs are disabled by default. NNIs are enabled by default.

    You do not have to disable the IP address that is assigned to a physical port that is part of a channel group, but we strongly recommend that you do so.

    You create Layer 3 port ch