[no] ip spd queue {min-threshold | max-threshold} <n> show banff-reset (XID/CatOS, Catalyst 5000 series with
(IOS) NFFC)
[no] spd enable (IOS) show caller (IOS)
aaa accounting delay-start (IOS) show chunk [summary] (IOS)
aaa authorization console (IOS (>= 12.1(10.6))) show controller switch (Cat 2900XL/3500XL, IOS)
aaa pod server [port <port number>] [auth-type {any | show epc … (IOS)
all | session-key}] server-key <string> (IOS (>=
11.3(7)AA))
ais-enable (IOS) show epc acl lookup {in|out} … (IOS (Cat 2948G-L3, 4908G-
L3, 8540))
arap logging debug-extensions (IOS) show epc acl tcam2acl interface <interface> {in|out} (IOS
(Cat 2948G-L3, 4908G-L3, 8540))
bgp common-administration (IOS) show epc ip-address interface <interface> all-entries (IOS
(Cat 2948G-L3))
bgp maxas-limit <1 – 2000> (IOS) show epc patricia <ingress-interface> ipucast detail (IOS)
bgp redistribute-internal (IOS) show epc patricia <interface> mac (IOS (Cat 2948G-L3,
4908G-L3))
bridge-group <bridge-num> subscriber-loop-control (IOS) show idb (IOS)
clear ip eigrp [<as>] events (IOS) show inband (XID/CatOS)
clear ip eigrp [<as>] logging (IOS) show interface cable <x>/0 privacy statistic (IOS)
clock source free-running|line primary (IOS) show interfaces [<interface-name>] stats (IOS)
csim (IOS) show interfaces [<interface-name>] switching (IOS)
debug buffer (IOS) show ip cef [<network> [<netmask>]] internal (IOS)
debug crypto isakmp detail (IOS) show ip eigrp events [<as-num>] [<start-num>] [<end-
num>] (IOS)
debug crypto isakmp packet (IOS) show ip eigrp sia-event (IOS)
debug dialer detailed (IOS) show ip eigrp timers [<as-num>] (IOS)
debug dialer holdq (IOS) show ip ospf bad-checksum (IOS)
debug ip ospf monitor (IOS) show ip ospf delete-list (IOS)
debug ip packet [detail] [<access-list>] dump (IOS) show ip ospf events (IOS)
debug isdn q931 l3 (IOS) show ip ospf maxage-list (IOS)
debug mica {tx|rx} <slot>/<port> (IOS) show ip ospf statistic (IOS)
debug modem csm (IOS) show ip route hash (IOS)
debug oir (IOS) show ip route profile (IOS)
debug parser mode (IOS) show ip spd (IOS)
debug sanity (IOS) show isdn memory detail (IOS)
dialer disable-multiencaps (IOS) show isdn service [<dsl> | <interface-name>] detail (IOS)
dialer mult-map-same-name (IOS) show isdn status detail (IOS)
eigrp event-log-site <n> (IOS) show isis private (IOS)
eigrp event-logging (IOS) show isis timers (IOS)
eigrp kill-everyone (IOS) show isis tree (IOS)
eigrp log-event-type [dual] [xmit] [transport] (IOS) show list [none] (IOS)
enable engineer (XDI/CatOS) show mbuf (XID/CatOS)
frame-relay fecn-create (IOS) show memory big (IOS)
gdb {kernel | pid <pid-num> | {examine | debug} <pid- show mls nfde (XID/CatOS)
num>} (IOS)
h323 h245 tunnel defer (IOS) show mls status (Cat 6000 Native IOS)
if-console <slot-num> [console|debug] (7000/7500 show mmc np5400 [config| flows |get |indications |ports
Series, IOS) |queue |registers |stat |send] […] (IOS (Cat 2948G-L3,
4908G-L3))
ip cache-ager <secs-between-runs> <fraction-low- show mpls interfaces internal all (IOS)
memory> <fraction> (IOS (>=10.3(8) and >=11.0(3)))
ip cache-invalidate-delay <minimum-delay> <maximum- show msfc (IOS (Cat 6k hybrid))
delay> <quit-interval> (IOS (>=10.3(8) and >=11.0(3)))
ip ospf interface-retry <retries> (IOS) show msfc (CatOS (Cat 6k hybrid))
ip route profile (IOS) show msfc nvram (IOS (Cat 6k hybrid))
ipc-console <slot-num> <cpu> (Catalyst 6000/6500 show parser modes (IOS)
Series, IOS)
ipx sap-interval {<n>|passive} (IOS (>=11.2)) show parser unresolved (IOS)
ipx server-split-horizon-on-server-paths (IOS) show polaris fibmgr usage (CatOS (Cat 6k hybrid))
ipx update interval {rip | sap} passive (IOS show region (IOS)
(>=11.3(1.3)))
isdn incoming progress [validate|accept] (IOS (>= show region address <address> (IOS)
12.1(3.3)T))
modem-mgmt csm debug rbs (IOS) show slip (IOS)
mpls traffic-eng multicast-intact (IOS) show snmp chassis (IOS)
multilink queuing bypass-fifo (IOS) show snmp community (IOS)
neighbor <ip-address> don’t-capability-negotiate (IOS) show snmp host (IOS)
no logging snmp-authfail (IOS) show snmp location (IOS)
no ppp microcode (IOS) show snmp mib (IOS)
no snmp-server sparse-tables (IOS) show snmp newcom (IOS)
ppp dnis <number> [<number> …] (IOS) show snmp notify (IOS)
ppp ipcp accept-address (IOS) show sum (IOS)
ppp ipcp dns|wins {accept | a.b.c.d [e.f.g.h] [accept]} show sum (IOS)
(IOS)
ppp ipcp ignore-map (IOS) show tcam … (Cat 6000 Native IOS)
ppp ipcp unique-address (IOS) snmp-server priority {low | normal | high} (IOS)
ppp max-configure <num> (IOS) spd headroom <n> (IOS)
priv () tcam priority high|low|medium (Cat 6000 Native IOS)
ps -c (XDI/CatOS) test aaa group radius <username> <password> (IOS)
radius send service-type call-check (IOS (>= 12.1(4)T)) test aim eeprom slot <n> (IOS)
radius-server authorization default Framed-Protocol ppp test crash (IOS)
(IOS)
radius-server authorization permit missing Service-Type test mbus power <slot> on|off (GSR IOS)
(IOS)
radius-server unique-ident (IOS) test ppp echotimeout <interface-name> (IOS)
service download-fl (GSR IOS) test transmit (IOS)
service internal (IOS) tracy_close <module> <port> (XID/CatOS with WS-X6608-
T1 or WS-X6608-E1)
service log backtrace (IOS) tracy_start <module> <port> (XID/CatOS with WS-X6608-
T1 or WS-X6608-E1)
service unsupported-transceiver (IOS) traffic-shape fecn-create (IOS)
service-policy classify-per-feature (IOS) ttcp (Cisco 7200/7500, IOS)
set trace <category> <level> (XID/CatOS) tx-queue-limit (IOS)
set trace monitor {enable|disable} (XID/CatOS) virtual-template <template-num> pre-clone <num> (IOS)
show acl stats (XID/CatOS) vpdn ip udp ignore checksum (IOS)
show alignment (IOS) vpdn {l2f|l2tp} session table-size <size> (IOS)
Command Name Configuration Platform /
Mode Software
[no] ip spd queue {min-threshold | max-threshold} <n> config IOS
Sets lower and upper ip process-level queue thresholds for SPD. With SSE
based SPD, lower precedence packets are randomly dropped when the queue size
hits min-threshold. The drop probability increases linearly with the queue
size until max-threshold is reached, at which point all lower precedence
packets are dropped. For regular SPD, lower precedence packets are dropped
when the queue size reaches min-threshold. Defaults are 50 and 75,
respectively. These values were not based on real life experience and may
need some tuning.
Reference: Cisco ISP Esssentials
[no] spd enable config IOS
Enable or disable the selective packet discard (SPD) feature. Command
is called “ip spd enable” in 11.1CC.
Reference: Cisco ISP Esssentials, CSCdk31898
aaa accounting delay-start config IOS
If you want to see IP addresses in the AAA start records, then you will want
“aaa accounting delay-start” which is hidden but universally used.
Reference:
aaa authorization console config IOS (>= 12.1(10.6))
This hidden commands enables authorization for the console port.
Otherwise authorization on the console ports always succeeds.
Aaron Leonard submitted CSCdp33836 and CSCdp33841 to get this
command documented.
Reference: Dennis Peng <dpeng@cisco.com>,
<20010510092606.I19846@sj-cse-320.cisco.com> and
Aaron Leonard <aaron@cisco.com>,
<20010510094014.K19846@sj-cse-320.cisco.com> on cisco-nas,
as well as CSCdi82030
aaa pod server [port <port number>] [auth-type {any | all | session- config IOS (>= 11.3(7)AA)
key}] server-key <string>
Syntax Description
port <port number>(Optional) The network access server port to use for POD requests. If noport is specified, port
1700 is used.
auth-type(Optional) The type of authorization required for disconnecting sessions.
o anySession that matches all of the attributes sent in the POD packet isdisconnected. The POD packet may contain
one or more of four key attributes(user-name, framed-IP-address, session-ID, and session-key).
o allOnly a session that matches all four key attributes is disconnected. Allis the default.
o session-keySession with a matching session-key attribute is disconnected. All otherattributes are ignored.
<string>The secret text string that is shared between the network access serverand the client workstation. This
secret string must be the same onboth systems.
This command is now documented as of 12.2(8)T.
Reference:
ais-enable config-if IOS
IOS version 12.0(7.1) includes a hidden command to enable generation of AIS
alarm on tx line when LOS is detected on rx line. This is a kludge to
workaround other vendor’s ATM switches (Newbridge) that don’t generate
F4/F5 OAM AIS cells when F3 RDI is received. This command is only supported
on the PA-A3 port adapter. The hidden interface command “ais-enable” will
enable AIS alarm assertion when an LOS alarm occurs.
Reference: CSCdm37634
arap logging debug-extensions config IOS
This DDTS adds a hidden command, “arap logging debug-extensions”
which effectively negates the changes from CSCdi57713. Messages
that re-appear:Modem CD dropped unexpectedly. User exceeded timelimit ARAP connection was terminated. v42_input
running (may be low memory) v42_output running (may be low memory) Force Quit pak v42bisflush C Carrier dropped
during startup
Reference: CSCdi68276, CSCdi57713
bgp common-administration config-router IOS
bgp
Reference:
bgp maxas-limit <1 – 2000> config-router IOS
bgp
This command should be used in router configuration mode; by default
there is no limit. If the number of ASes in the AS_PATH exceeds the
limit, the UPDATE will be stored in the BGP table, but not used in
the bestpath selection or propagated.
Reference: CSCdr54230, CSCdu00679
bgp redistribute-internal config-router IOS
bgp
Normally redistributing BGP into another protocol only redistributes EBGP
routes. Using this command will also redistribute IBGP routes. Hidden
in IOS versions prior to 12.1.
Reference:
bridge-group <bridge-num> subscriber-loop-control config-if IOS
Bridge between two machines on the same subinterface.
Reference:
clear ip eigrp [<as>] events privileged exec IOS
Clear IP EIGRP event logs.
Reference:
clear ip eigrp [<as>] logging privileged exec IOS
Stop IP EIGRP event logging.
Reference:
clock source free-running|line primary config-controller IOS
Generate or sample clock rate from the line.
Reference:
csim exec IOS
With the command csim you can emulate a voice call. It’s like sombody calls
the specified number. Usefull, if you don’t have physically access to the
telephone:Sucessfull call:wg1r1#csim start 089150 csim: called number = 089150, loop count = 1 ping count = 0 csim
err csimDisconnected recvd DISC cid(21) csim: loop = 1, failed = 1 csim: call attempted = 1, setup failed = 1, tone
failed = 0Call to an undefined number:
wg1r1#csim start 089151 csim: called number = 089151, loop count = 1 ping count = 0 csim err:csim_do_test Error
peer not found
Reference:
debug buffer privileged exec IOS
Debug buffer management.
Reference: Phrack, Volume 0xa, Issue 0x38
debug crypto isakmp detail privileged exec IOS
Crypto ISAKMP internals debugging.Example output during ISAKMP SA establishment:6w3d: ISAKMP cookie gen for src
62.245.147.66 dst 195.244.119.2 6w3d: ISAKMP cookie B5FCAD89 B2BD7BFF 6w3d: ISAKMP: find_me a=(src
62.245.147.66 dst 195.244.119.2 state 0, init 1) b=(src 0.0.0.0 dst 0.0.0.0 state 0, init 0) 6w3d: my_cookie a
B5FCAD89 9BEC22F8 6w3d: my_cookie b B5FCAD89 B2BD7BFF 6w3d: his_cookie a DB28B716 6D61AE4F 6w3d:
his_cookie b 00000000 00000000 6w3d: ISAKMP: compare a=(src 62.245.147.66 dst 195.244.119.2 state 0, init 1)
b=(src 62.245.147.66 dst 195.244.119.2 state 0, init 1) 6w3d: my_cookie a B5FCAD89 9BEC22F8 6w3d: my_cookie b
B5FCAD89 9BEC22F8 6w3d: his_cookie a DB28B716 6D61AE4F 6w3d: his_cookie b DB28B716 6D61AE4F 6w3d:
ISAKMP cookie gen for src 195.244.119.2 dst 62.245.147.66 6w3d: ISAKMP cookie 10FA17FE 2C76366D 6w3d:
ISAKMP: find_me a=(src 62.245.147.66 dst 195.244.119.2 state 0, init 1) b=(src 0.0.0.0 dst 0.0.0.0 state 0, init 0)
6w3d: my_cookie a B5FCAD89 9BEC22F8 6w3d: my_cookie b 10FA17FE 2C76366D 6w3d: his_cookie a DB28B716
6D61AE4F 6w3d: his_cookie b 00000000 00000000 6w3d: ISAKMP: compare a=(src 62.245.147.66 dst 195.244.119.2
state 0, init 1) b=(src 62.245.147.66 dst 195.244.119.2 state 0, init 1) 6w3d: my_cookie a B5FCAD89 9BEC22F8 6w3d:
my_cookie b B5FCAD89 9BEC22F8 6w3d: his_cookie a DB28B716 6D61AE4F 6w3d: his_cookie b DB28B716 6D61AE4F
Reference:
debug crypto isakmp packet privileged exec IOS
Crypto ISAKMP packet debugging.Example output during ISAKMP SA establishment:6w3d: -Traceback= 80A36FE0
80A3A5C0 80A3D41C 809F0880 809F8A34 809F301C 809F33DC 809F5228 801710CC 6w3d: -Traceback= 80A36FE0
80A3A5C0 80A3D41C 809F8494 809F87C0 809F8C20 809F301C 809F33DC 809F5228 801710CC 6w3d: ISAKMP: Main
Mode packet contents (flags 0, len 72): 6w3d: SA payload 6w3d: PROPOSAL 6w3d: TRANSFORM 6w3d: ISAKMP (0:1):
sending packet to 195.244.119.2 (I) MM_NO_STATE 6w3d: ISAKMP (0:1): received packet from 195.244.119.2 (I)
MM_NO_STATE 6w3d: ISAKMP: Main Mode packet contents (flags 0, len 72): 6w3d: SA payload 6w3d: PROPOSAL
6w3d: TRANSFORM 6w3d: -Traceback= 80A36FE0 80A3A5C0 80A3D41C 809FF460 80A00E0C 80A01070 809FBEBC
809F99B8 809F468C 809F51C8 801710CC 6w3d: ISAKMP: Main Mode packet contents (flags 0, len 204): 6w3d: KE
payload 6w3d: NONCE payload 6w3d: VENDOR payload 6w3d: ISAKMP (0:1): sending packet to 195.244.119.2 (I)
MM_SA_SETUP 6w3d: ISAKMP (0:1): received packet from 195.244.119.2 (I) MM_SA_SETUP 6w3d: ISAKMP: Main
Mode packet contents (flags 0, len 184): 6w3d: KE payload 6w3d: NONCE payload 6w3d: ISAKMP: Main Mode packet
contents (flags 1, len 64): 6w3d: ID payload 6w3d: HASH payload 6w3d: ISAKMP (0:1): sending packet to
195.244.119.2 (I) MM_KEY_EXCH 6w3d: ISAKMP (0:1): received packet from 195.244.119.2 (I) MM_KEY_EXCH 6w3d:
ISAKMP: Main Mode packet contents (flags 1, len 68): 6w3d: ID payload 6w3d: HASH payload 6w3d: ISAKMP: Quick
Mode packet contents (flags 1, len 168): 6w3d: HASH payload 6w3d: SA payload 6w3d: PROPOSAL 6w3d: TRANSFORM
6w3d: NONCE payload 6w3d: ID payload 6w3d: ID payload 6w3d: ISAKMP (0:1): sending packet to 195.244.119.2 (I)
QM_IDLE 6w3d: ISAKMP (0:1): received packet from 195.244.119.2 (I) QM_IDLE 6w3d: ISAKMP: Quick Mode packet
contents (flags 1, len 172): 6w3d: HASH payload 6w3d: SA payload 6w3d: PROPOSAL 6w3d: TRANSFORM 6w3d:
NONCE payload 6w3d: ID payload 6w3d: ID payload 6w3d: ISAKMP: Quick Mode packet contents (flags 1, len 52):
6w3d: HASH payload 6w3d: ISAKMP (0:1): sending packet to 195.244.119.2 (I) QM_IDLE
Reference:
debug dialer detailed privileged exec IOS
Enable some additional debugging for the DDR subsystem.
Reference:
debug dialer holdq privileged exec IOS
Activate debugging output for dialer hold queue events.Jan 13 14:56:03.240: Se0/1:15 DDR: Creating holdq 626B1B9C
Jan 13 14:56:03.240: DDR: Assigning holdq 626B1B9C to 627923F8 Jan 13 14:56:09.208: DDR: Assigning holdq
626B1B9C to 61B667F4 Jan 13 14:56:09.208: DDR: freeing dialer holdq 626B1B9C (Ref ptr 61B667F4) Jan 13
14:56:09.208: DDR: Dialing failed, 0 packets unqueued and discarded Jan 13 14:56:09.208: : 2 packets unqueued and
discarded
Reference:
debug ip ospf monitor privileged exec IOS
OSPF SPF monitoring debugging. Hmm, seems to show synchronization
between OSPF routing process and routing table. Furthermore it
shows LSA changes and so can be used to debug why a link marked
as OSPF demand circuit is brought up for example.
Reference:
debug ip packet [detail] [<access-list>] dump privileged exec IOS
Dumps packets contents for process switched packets.
Reference:
debug isdn q931 l3 privileged exec IOS
This command will show additional information on ISDN Layer 3, i.e.
the corresponding call reference number in all ISDN messages.
Reference: Project DOTU
debug mica {tx|rx} <slot>/<port> privileged exec IOS
Dump data from a MICA digital modem. Probably only supported
on the Cisco Access Server series (e.g. AS5300).
Reference:
debug modem csm privileged exec IOS
Modem Management Call Switching Module debugging.
Reference:
debug oir privileged exec IOS
Activate OIR debugging.ctalkb#debug oir Online Insertion and Removal debugging is on 2w3d: OIR: Process woke,
‘Event’, stall=2, usec=0xB6835B36 -Traceback= 6040967C 603B6D2C 603B6D18 2w3d: OIR: Shutdown pulled
interface for Serial5/0 -Traceback= 600E30C4 60409204 604096C8 603B6D2C 603B6D18 2w3d: %OIR-6-REMCARD:
Card removed from slot 5, interfaces disabled -Traceback= 60409748 603B6D2C 603B6D18 2w3d: OIR: Remove
hwidbs for slot 5 -Traceback= 60409368 60409750 603B6D2C 603B6D18 2w3d: OIR: Process woke, ‘Event(max not
running)’, stall=3, usec=0xD0115C9E -Traceback= 6040967C 603B6D2C 603B6D18 2w3d: OIR: Process woke,
‘Timer(max running)’, stall=3, usec=0xDDBB56D6 -Traceback= 6040967C 603B6D2C 603B6D18 2w3d: OIR: (Re)Init
card 5, retry_count=3 -Traceback= 60409894 603B6D2C 603B6D18 2w3d: %OIR-6-INSCARD: Card inserted in slot 5,
interfaces administratively shut down -Traceback= 604098BC 603B6D2C 603B6D18
Reference: Phrack, Volume 0xa, Issue 0x38
debug parser mode privileged exec IOS
Aug 7 21:58:44.207 MEST: Look up of parser mode ‘route-map’ succeeded Aug 7 21:58:45.923 MEST: Look up of
parser mode ‘configure’ succeeded
Reference: Phrack, Volume 0xa, Issue 0x38
debug sanity privileged exec IOS
With this command every buffer that is used in the system is sanity-checked
when it is allocated and when it is freed. This can sometimes be used to
pinpoint memory corruption problems when analyzing a core dump which was
generated with this debug option in effect.
Reference:
dialer disable-multiencaps config-if IOS
Revert to premultiencapsulation on the dialer profile.
Reference: CSCdp95164
dialer mult-map-same-name config-if IOS
If distinct dialer maps to different destinations share the same remote
name, traffic will fail to pass on the 2nd and subsequent sessions. This
ability is implemented 1n 12.0T as a hidden command. dialer
mult-map-same-name allows 2 users to dial in to the dialer with the same ppp
user_name. It’s behaviour with other dialer features is currently
unpredictable and should be used with caution.
Reference: CSCdk28459 – allow multi users w/ same name
eigrp event-log-site <n> config-router IOS
eigrp
Set size of event log. Setting it to zero deletes event log buffers.
Default log buffer size is 500 events.
Reference:
eigrp event-logging config-router IOS
eigrp
Controls logging of EIGRP events.
Reference:
eigrp kill-everyone config-router IOS
eigrp
Kill all adjacencies on an SIA or a neighbor down event.
Reference:
eigrp log-event-type [dual] [xmit] [transport] config-router IOS
eigrp
Configure the set of EIGRP event types to log.
Reference:
enable engineer exec XDI/CatOS
Catalyst 5000 series with Supervisor Engine I:You will be prompted for a password. It has the following format:
VTY
VTY
HW
FW
SW
That is, the VTY password followed by the VTY password again, followed by
the hardware version, followed by the software version(no spaces, do not
type the dots in the versions).
Catalyst 5000 series with Supervisor-Engine II and III and Catalyst 6000
series with Supervisor I and II:
Format for the password is:
VTY
HW
FW
SW
VTY
That is, the VTY password followed by the VTY password again, followed by
the hardware version, followed by the software version (no spaces, do not
type the dots in the versions).
Reference:
frame-relay fecn-create config-map-class IOS
This hidden command enables setting the FECN bit in
all outgoing packets that have been delayed due to traffic
shaping.
Reference:
gdb {kernel | pid <pid-num> | {examine | debug} <pid-num>} privileged exec IOS
Seems to activate some internal debugger. Maybe for access via remote gdb.
Probably only useful with a symbol table and an IOS image compiled for
debugging.
Reference: Phrack, Volume 0xa, Issue 0x38; Project DOTU
h323 h245 tunnel defer voice service IOS
voip
Reference:
if-console <slot-num> [console|debug] privileged exec 7000/7500 Series,
IOS
Open connection to the VIP console. Lots of useful commands there,
especially showing memory and cpu usage.
Reference:
ip cache-ager <secs-between-runs> <fraction-low-memory> config IOS (>=10.3(8) and
<fraction> >=11.0(3))
It’s hidden, and you have to configure “service internal” in order
to bring it into existence.
<secs-between-runs> is 0-2147483 number of seconds between agerruns, default = 60 seconds. If the period
between ager invalidation runs isset to 0, the ager process is disabled entirely.
<fraction-low-memory> is 2-50 1/<fraction-low-memory> ofcache to age per run (low memory), default = 4.
<fraction> is 3-100 1/<fraction> of cache to age per run(normal), default = 20.
Configures the ager of the fast switching cache. Aaron Leonard
<Aaron@cisco.com> recommended “20 3 3” on cisco-nas in the
light of recent CodeRed attacks, i.e. make the ager more aggressive
to prevent excessive cache growth.
Reference: <01K7Y45PW1PA9KWFH9@Cisco.COM> and http://www.cisco.com/warp/public/63/ts_codred_worm.shtml
ip cache-invalidate-delay <minimum-delay> <maximum-delay> <quit- config IOS (>=10.3(8) and
interval> >=11.0(3))
Requires “service internal”.
<minimum-delay> is 0-300 seconds.
<maximum-delay> is 1-300 seconds.
<quiet-interval> is 1-600 seconds.
Use “no ip cache-invalidate-delay” to disable the delay altogether. See
this posting from cisco-nas:
Date: Fri, 28 Apr 2000 10:07:03 -0700 (PDT) From: Aaron Leonard <Aaron@cisco.com> Subject: Re: CN: telnet DoS
(CSCdm70743) To: Cisco-NAS@datasys.net Message-id: <01JORKP9PBPIA2AL39@Cisco.COM> References:
<01JOHR9QY432A2AAVQ@Cisco.COM> Reply-To: Cisco-NAS@datasys.net It’s hidden, and you have to configure
“service internal” in order to bring it into existence. I.e. as5300-1(config)#service internal as5300-1(config)#no ip
cache-invalidate-delay It’s generally recommended for systems running 12.0T/12.1 code if they have lots of interfaces
(>300) and are not doing CEF.
Reference: <01JORKP9PBPIA2AL39@Cisco.COM> and http://www.cisco.com/warp/public/63/ts_codred_worm.shtml
ip ospf interface-retry <retries> config-if IOS
From Cisco DE (slightly edited):The motivation for this command is a timing problem where OSPF fails to
determine the state of an interface. The solution was for OSPF to poll the
interface for a while to verify its state. The hidden command allows us to
lengthen the polling period on routers that have a large number of
interfaces. The polls occur every 10 seconds and the command controls the
number of polls that will be done. With a setting of 0 retries there will be
no extra polling.Default number of retries is 10.
Reference:
ip route profile config IOS
As disclosed by Aaron Leonard from Cisco on cisco-nas:Date: Thu, 11 Sep 2003 09:34:53 -0700 (PDT) From: Aaron
Leonard <Aaron@cisco.com> Subject: Re: [cisco-nas] IP Route Profile In-reply-to: “Your message dated Wed, 10 Sep
2003 22:21:02 -0500” <10e701c37813$bad83870$5370cd41@dellbert> To: “Beprojects.com” <info@beprojects.com>
Cc: cisco-nas@puck.nether.net […] “ip route profile” was implemented way back in late ’96 by CSCdi76662. However
we have historically refrained from documenting this (CSCdk01634, CSCdz19775) as this has been declared to be a
hidden command that “should not be used by customers”. However, in fact this is NOT a hidden command … so I’ve just
now gone ahead and reopened CSCdz19775. Introduction The Route Table Profiling feature was developed to assist
network engineers in monitoring routing table fluctuations, which may be the result of route flapping, network failure, or
network service restoration. This feature was added in CSCdi76662 to the 11.1CC train of Cisco IOS. The Route Table
Profiling feature is an undocumented and unsupported feature. There is no MIB support provided. Configuration The
Route Table Profiling feature is enabled globally. The command is “ip route profile” in global configuration mode. This
feature can be disabled with the command “no ip route profile” in global configuration mode. Routing table change
statistics can be viewed with the “show ip route profile” command in exec mode.
Reference: CSCdi76662
ipc-console <slot-num> <cpu> privileged exec Catalyst 6000/6500
Series, IOS
Open connection to the FlexWAN console. FlexWANs contain two
CPUs so you can connect to either CPU 0 or CPU 1.
Reference:
ipx sap-interval {<n>|passive} config-if IOS (>=11.2)
Set the IPX SAP advertising interval to n or to passive mode.
Reference:
ipx server-split-horizon-on-server-paths config IOS
This global configuratiom command specifies that split horizon SAP
occurs on server paths.This command is documented in DDTS CSCdm12190. From the release note:By default, split
horizon blocks information about periodic SAPs from being
advertised by a router to the same interface on which the best route to that
SAP is learned. But in the case where the SAP may be learned from
interfaces other than (or in addition to) the interface on which the best
route to that SAP is learned, enabling “ipx
server-split-horizon-on-server-paths” will reduce unnecessary periodic SAP
updates as that SAP will not be advertised to the interface(s) where it was
learned from; this will also prevent potential “SAP loop” in the network.
Reference: CSCdm12190
ipx update interval {rip | sap} passive config IOS (>=11.3(1.3))
The undocumented passive keyword specifies to listen but not send
normal periodic SAP or RIP updates nor flash update caused by changes.
Queries will still be replied to. The update interval is set to the same
interval as changes-only.See also “ipx sap-interval”.
Reference: CSCdj59918
isdn incoming progress [validate|accept] config-if IOS (>= 12.1(3.3)T)
Controls whether IOS sends an INVALID information element message when it
receives an invalid PROGRESS IE.
Reference: CSCdt12611
modem-mgmt csm debug rbs privileged exec IOS
Debug RBS trunks. Only available if “service internal” configured.
Equivalent to “debug cas” on later IOS versions (>= 12.0(7)T).
Reference:
mpls traffic-eng multicast-intact config-router IOS
Use hop-by-hop routing instead of MPLS TE tunnels to transport
multicast traffic. See CSCdm63234 for details.
Reference: CSCdm63234
multilink queuing bypass-fifo config-if IOS
Reference:
neighbor <ip-address> don’t-capability-negotiate config-router IOS
bgp
Turns off CAPABILITY parameters in BGP Open message.
Reference:
no logging snmp-authfail config IOS
Turn off the %SNMP-3-AUTHFAIL message.See CSCdv04268 for availability information.
Reference: CSCdv04268
no ppp microcode config-if IOS
On a cisco 805, “ip tcp header-compression” configured on the serial async
interface and on the dialer interface linked to it, results in VERY long
response time for TCP sessions. Workaround: Remove “ip tcp
header-compression” or enable the hidden command “no ppp microcode” on the
serial interface or configure IP directly on the serial interface (no dialer
interface).
Reference: CSCdp32980
no snmp-server sparse-tables config IOS
Fully populate all SNMP tables even if an object id
is not applicable in a specific case.
Reference:
ppp dnis <number> [<number> …] config-if IOS
Skip authentication entirely for PPP per DNIS.
Reference: CSCdk45054
ppp ipcp accept-address config-if IOS
It is possible to revert to the previous operation using the hidden
interface command ppp ipcp accept-address. When enabled the peer IP
address will be accepted but is still subject to AAA verification,
it will have precedence over any local address pool however.
Reference: CSCdj04128
ppp ipcp dns|wins {accept | a.b.c.d [e.f.g.h] [accept]} config-if IOS
Reference: CSCdm62097, CSCdk01128
ppp ipcp ignore-map config-if IOS
Don’t assign same IP address to peers with the same name. Instead
get a fresh address.
Reference: CSCdm18764 – don’t assign peer IP addr from map
ppp ipcp unique-address config-if IOS
Assigns a unique IP address even if the same user (identified by the username)
has multiple links open. Standard behaviour is to assigned the same IP
address. See “dialer mult-map-same-name”, too.
Reference:
ppp max-configure <num> config-if IOS
Maximum number if configure requests to send.
Reference:
priv ROMMON
Enable private commands in the ROMMON. Sometimes a password is required.
Reference:
ps -c privileged exec XDI/CatOS
Show process listing and CPU usage.
Reference:
radius send service-type call-check config IOS (>= 12.1(4)T)
From: Dennis Peng <dpeng@cisco.com> To: “scott.list” <scott.list@mlec.net> Cc: cisco-nas@external.cisco.com
Message-ID: <20010331195613.D28415@sj-cse-320.cisco.com> I assume you have preauthentication already
configured? By default, we send Service-Type = Outbound-User. In 12.1(4)T and later, you can configure the (hidden)
command “radius send service-type call-check” to change the value from Outbound-User to Call-Check. I submitted
CSCdt85947 to get the command unhidden and documented. Here is the release-note I attached: The command “radius
send service-type call-check” is hidden. This command is available in 12.1(4)T and later and is used to change the value
of the Service-Type RADIUS attribute the access server sends when doing pre-authentication. The default is to send
Outbound-User (5). With this command configured, we will send Call-Check (10). This is useful in a multi-vendor
environment as well as when migrating an existing RADIUS database for use withe Cisco access server.
Reference: CSCdt85947
radius-server authorization default Framed-Protocol ppp config IOS
This hidden command assumes that the RADIUS Framed-Protocol attribute is PPP
when no Framed-Protocol attribute is present in a RADIUS server reply packet.
Reference: Dennis Peng <dpeng@cisco.com>, <20020404165144.GE5919@sj-cse-320.cisco.com> on cisco-nas
radius-server authorization permit missing Service-Type config IOS
This hidden command seems to allow RADIUS server replies in which the
Service-Type attribute is missing.
Reference: Dennis Peng <dpeng@cisco.com>, <20020404165144.GE5919@sj-cse-320.cisco.com> on cisco-nas
radius-server unique-ident config IOS
Directly from the DDTS release note:The hidden command “radius-server unique-ident” can be used to try to
ensure that RADIUS session IDs are unique across IOS boots. It will have
the side effect of automatically writing the IOS configuration to NVRAM some
time after booting.When the router parses the command “radius-server unique-ident” it sets the
unique-ident variable to (n+1) and all accouting records have a prefix of
(n+1). When you look at the configuration or write the configuration to
NVRAM, it is also shows “radius-server unique-ident”.
If the box is reloaded, upon booting the router will parse “radius-server
unique-ident” and then set the unique-ident variable to (n+2) and all
accounting records have a prefix of (n+2). When you look at the
configuration or write the configuration to NVRAM, is will show
“radius-server unique-ident”.
Reference: CSCdu77149
service download-fl config GSR IOS
Force the GRP to download its own version of the Fabric Downloader to the
line card before attempting to start Cisco IOS.
Reference: http://www.cisco.com/warp/public/63/17.html
service internal config IOS
Activate some Cisco commands normally used for internal testing.
Reference:
service log backtrace config IOS
Supply a backtrace with every messaged logged. Probably to find
out where a certain message is generated.
Reference: Phrack, Volume 0xa, Issue 0x38
service unsupported-transceiver config IOS
Enables the use of third-party SFP or GBIC modules on Cisco switches but note the warning
below.Example output:Switch(config)#service unsupported-transceiver Warning: When Cisco determines that a fault or
defect can be traced to the use of third-party transceivers installed by a customer or reseller, then, at Cisco’s discretion,
Cisco may withhold support under warranty or a Cisco support program. In the course of providing support for a Cisco
networking product Cisco may require that the end user install Cisco transceivers if Cisco determines that removing
third-party parts will assist Cisco in diagnosing the cause of a support issue.
Reference: Saku Ytti on cisco-nsp
service-policy classify-per-feature config IOS
From CSCds43683:Packets should be treated consistently on all platforms for a given
configuration. This fix addresses the consistency issue when QoS Mod CLI is
configured via the “service-policy” command on the 7500 vs the other IOS
platforms.After this fix, each packet will be matched for a matching class under the
policy-map until a match is found. Matching terminates at the first matching
class and all features configured under the class act on the packet. In the
current IOS releases, matching happens across all classes under a policy
until the first matching class is found for every configured QoS feature.
To maintain backward compatibility a hidden knob called “service-policy
classify-per-feature” knob is introduced. When configured, the behaviour
reverts to the current existing behaviour. By way of this fix, the default
behaviour will be common for all platforms. This fix is going to affect 7200
and other non-distributed platforms only.
Reference: CSCds43683
set trace <category> <level> privileged exec XID/CatOS
Enable tracing of the specified subsystem.Possible category names (most certainly depending on CatOS version):acct,
acl, all, bdd, cdp, config, dhcp, diag, dns, dot1x, drip, dtp,
dupflash, dupnvram, dynvlan, earl, envmon, eobc, epld, essr, evmgr,
fabric, fcp, fddi, fib, filesys, fpoe, garp, gvrp, hamgr, http,
inband, ipc, kerberos, l3age, l3sup, lane, ld, llc, ltl, mbuf, mcast,
mdg, memdbg, mls, mlsm, modport, ntp, nvsync, oob, pagp, protfilt,
pruning, privatevlan, qde, qos, radius, redundancy, rsfc, rsvp, rtios,
rtipc, rticc, runtimecfg, scp, security, slp, snmp, span, spantree,
ssh, syncmgr, synfig, syslog, tacacs, test, tftp, tftpd, udld, verb,
vlanmgr, vmps, vtp.
<level> = 0..15, 0 to disable, default is 1
<level> = 0..255 for inband only
A level of 6 is normally a good start.
Warning: Can produce losts of output depending on your configuration and the
level chosen.
Reference: Contributed by Francois Baligant <francois.baligant@be.wanadoo.com>
set trace monitor {enable|disable} privileged exec XID/CatOS
Reference: Contributed by Francois Baligant <francois.baligant@be.wanadoo.com>
show acl stats privileged exec XID/CatOS
Comment by Francois on this command:Displays various statistics about the ACL subsystem and associated hardware
components. There are some interesting counters like compilation errors and
also usage counters for various tables (different masks, subnets, etc).
Useful when you can’t commit your ACL with a TCAM error message.ACL: local stats table Messaging —————————
——————————- rxScpMsg: 0 rxScpMsgAbort: 0 rxAclMsg: 1257 rxAclMsgAbort: 0 aclMsgUnknownType: 0
outOfSequence: 0 appIdMisUse: 0 intfConfError: 0 msgSendFailed: 1 appIdDifferAfterSwover:0 ignoreRaclOverride: 1
draco-id: 65535-ffffffff-ffffffff draco-id: 33-ffffffff-ffffffff Resources ———————————————————- ACL malloc
fail: 0 noLou: 0 noMask: 0 noCapmap: 0 tcamFull: 0 compilerErr: 18 noLabel: 0 louExpandGt: 0 louExpandLt: 0
louExpandNeq: 0 louExpandRange: 0 freeListRebuild: 0 Acl engine stats ———————————————————-
perseusL3Parity: 0 perseusSequenceErr: 0 perseusLabelOverflow: 0 perseusCamLookupErr: 0 perseusDbusErr: 0
perseusCpuParityErr: 0 perseusIPChecksumErr: 1 perseusShortPacketErr: 0 perseusCpuTmout: 0 **lookup fifo
undeflow:0 Hardware resource usage for ACL Tcam: label:3.73%, lou:20.31%, mask:11.86%, value:4.4% Acl manager
stats ———————————————————- aclRestarted: F Sec vacl restore done: T Lda vacl restore done: T Qos acl
restore done: T Feature intf count: 0 HA stats ———————————————————- activeHaCopyFail: 0 Gsync_count:
1 Sleep on gsync Gsync done Wakeup on gsync 14:58:43 14:58:45 14:58:45 00:00:00 00:00:00 00:00:00 00:00:00
00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 000:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00
00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00 00:00:00
Reference: Contributed by Francois Baligant <francois.baligant@be.wanadoo.com>
show alignment privileged exec IOS
Displays statistics about spurious memory accesses and aligment
errors. Also includes stack tracebacks.
Reference:
show banff-reset privileged exec XID/CatOS, Catalyst
5000 series with
NFFC
There is a quiet recall on some Catalyst 5000 series switches that have the
EARL 1 chip NFFC and a data rate that exceeds 80MBS across the backplane
because of a defect that causes the ECB to reset continuously. Usually users
will report a network slowdown.This command will display the number of times the ECBs have reset since last
power on, a number of 1 for each ECB is normal. Numbers in the hundreds or
thousands mean you need to call Cisco for replacement boards.
Reference: From Heinz Ulm’s web site
show caller exec IOS
Show a lot of information about calls in a NAS environment. Lots of subcommands here.
Reference:
show chunk [summary] privileged exec IOS
There is the traditional malloc/free memory management in place on the
cisco. there is also chunk allocation. the main benefit of chunk
allocation over its predecessor is that memory overhead is only paid by the
large chunk (which is then carved up into smaller pieces) instead of by each
individual malloced block.
Reference: Phrack, Volume 0xa, Issue 0x38
show controller switch exec Cat 2900XL/3500XL,
IOS
The show controller switch command provides indicative information regarding
the total switch utilization. An example is presented below:Switch#sh controller switch Switch registers: Device Type :
0x00040273 Congestion Threshold : 0x00000E95 Peak Total Allocation : 0x0000001A Total Allocation : 0x00000000
Peak Total Bandwidth : 0x00000020 Total Bandwidth : 0x00000000 Total Bandwidth Limit : 0x000003DE Lower
Bandwidth Limit : 0x000003DE Switch Mode : 0x00040000 Switch#The Total Bandwidth Limit varies between different
2900XL and 3500XL models.
When the Total Bandwidth reaches the Total Bandwidth Limit value, the switch
has reached its full bandwidth capacity and begins to drop packets. The Peak
Total Bandwidth is the highest value attained by the Total Bandwidth since
the last time the show controller switch command was executed. Note, the
values for the above parameters are in hexadecimal.The Congestion Threshold value is used as conservative value for
the maximum
global buffer utilization. When the buffer utilization noted by Total
Allocation reaches this value, the switch may drop frames. The Peak Total
Allocation value shows the highest value attained by the Total Allocation
since the last time the show controller switch command was executed. It is
possible for the Peak Total Allocation and/or the Total Allocation to be
greater than Congestion Threshold. If the Total Allocation reaches or is
over the Congestion Threshold amount, the switch is experiencing
considerable network activity near its full capacity.
The global buffer utilization may be adversely effected by several
configuration issues, described below:
1.Speed mismatch between an ingress and egress port; for example, several
100 megabit clients transferring files to a server connected to the
switch at 10 megabits, half-duplex.
2.Multiple input ports feeding a single output port.
3.Duplex mismatch on multiple ports.
4.Numerous ports that are experiencing collisions and/or output errors due
to half-duplex configuration or over-subscription of a slow link.
Reference: http://www.cisco.com/warp/customer/473/19.html
show epc … privileged exec IOS
From a Catalyst 2048G-L3 (also applies to the Catalyst 4908G-L3 and
probably in parts to the Catalyst 8500 series):gepard#show epc ? E-PAM show comands: IF-entry IF Entry in IF-Table
VC-entry VC Entry in VC-Table VLAN-entry VLAN Entry in VLAN-Table aal5 aal5 statistics acl ACL FPGA related debug
commands adm Show contents of ADM in IOS age-timer Aging Timer atm-debug-status ATM debug statistics
atmup_ipmcast Show Multicast VC leg to external VC mapping caller-stats Caller Stats at a merge-point caller-tags
Caller Tags cam Show contents of E-PAM CAM card Show information managed by CARD coredb show coredb counters
Counters of all epif-ports discards discard statistics exvc-entry External VC Entry in VC-Table fe-channel FE-Channel
Membership Information fpga Access ACL FPGA resources freecam Free space in CAM ifmapping Interface mapping to
CAM IF number ip-address Show adjacency entries in line cards ip-prefix Show IP prefix entries (compare to CEF
output) ipmcast Show IP Multicast table in E-PAM CAM ipx-node Show IPX node entry in E-PAM CAM ipx-prefix Show
IPX prefix in E-PAM CAM jaguar-fpga-epld Access ACL2 EPLD Addresses with WID=2 lec-ipx Show LEC Local IPX
Information lsipc Show LSIPC information mac Show MAC address in E-PAM macfilter Show MAC filter address database
mailbox Read the mailbox value mem Show contents of packet memory in E-PAM patricia Show Patricia tree in E-PAM
CAM port-qos Show current port qos configuration queuing queueing statistics register print contents of EPIF register ri-
register Show last reported contents of EPIF RI register sm Show 1483 Local static map information spd selective
packet drop statistics status Status of all epif-ports switching VC switching statistics tcam TCAM related commands
ucode uCode images on all epif-ports udp-flood Show LS UDP-flooding informationSome of these commands are
documented as part of the Catalyst 8540
documentation but are also useful on the Catalyst 2948G-L3 which seems to
be based (at least partly) on the same hardware platform as the Catalyst 8540.See:
http://www.cisco.com/univercd/cc/td/doc/product/atm/c8540/12_1/11_ey/trouble/l3_net.htm
Reference:
show epc acl lookup {in|out} … privileged exec IOS (Cat 2948G-L3,
4908G-L3, 8540)
Displays whether the ACL would permit or deny a specific IP packet on a particular
interface.
Reference: http://www.cisco.com/univercd/cc/td/doc/product/l3sw/8540/12_1/lhouse/sw_confg/8500acl.htm
show epc acl tcam2acl interface <interface> {in|out} privileged exec IOS (Cat 2948G-L3,
4908G-L3, 8540)
Displays the ACL entries programmed in the TCAM for a particular interface.
Reference: http://www.cisco.com/univercd/cc/td/doc/product/l3sw/8540/12_1/lhouse/sw_confg/8500acl.htm
show epc ip-address interface <interface> all-entries privileged exec IOS (Cat 2948G-L3)
Shows the IP adjacencies installed in the CAM hardware:gepard#show epc ip-address interface FastEthernet 1 all-
entries IPaddr: 192.168.60.116 MACaddr: 0090.27b7.24d7 FastEthernet14(17) IPaddr: 192.168.60.117 MACaddr:
0090.27d1.d47a FastEthernet15(18) IPaddr: 192.168.60.112 MACaddr: 00d0.b720.6fc9 FastEthernet10(13) IPaddr:
192.168.60.113 MACaddr: 00d0.b720.750f FastEthernet11(14) IPaddr: 192.168.60.114 MACaddr: 00d0.b720.7357
FastEthernet12(15) IPaddr: 192.168.60.115 MACaddr: 00d0.b720.755e FastEthernet13(16) IPaddr: 192.168.60.125
MACaddr: 0050.0457.edbf FastEthernet19(22) IPaddr: 10.232.4.202 MACaddr: 0009.b7b4.0700 Port-channel1.2(60)
IPaddr: 192.168.60.120 MACaddr: 0090.27c3.f042 FastEthernet5(8) IPaddr: 192.168.60.100 MACaddr:
0002.b3ac.5470 GigabitEthernet50(53) IPaddr: 192.168.60.101 MACaddr: 0002.b3ac.5470 GigabitEthernet50(53)
IPaddr: 192.168.60.102 MACaddr: 0090.27d1.88bf FastEthernet4(7) IPaddr: 192.168.60.103 MACaddr:
0090.27d1.88bf FastEthernet4(7) IPaddr: 192.168.60.99 MACaddr: 6080.0f3c.0000 IPaddr: 192.168.60.110 MACaddr:
0090.27dd.f9a6 FastEthernet8(11) IPaddr: 192.168.60.111 MACaddr: 00d0.b708.adb3 FastEthernet9(12) IPaddr:
192.168.61.21 MACaddr: 0800.20ee.4ead FastEthernet46(49) IPaddr: 192.168.60.20 MACaddr: 0030.6e11.0157
FastEthernet37(40) IPaddr: 192.168.60.21 MACaddr: 0030.6e11.139f FastEthernet38(41) IPaddr: 192.168.60.22
MACaddr: 0002.b3ac.5454 GigabitEthernet49(52) IPaddr: 192.168.61.22 MACaddr: 0800.20ec.6709
FastEthernet46(49) IPaddr: 192.168.60.23 MACaddr: 0002.b3ac.53f5 FastEthernet43(46) IPaddr: 192.168.60.30
MACaddr: 00e0.18c2.baf9 FastEthernet21(24) IPaddr: 192.168.60.25 MACaddr: 0030.6e12.099a FastEthernet39(42)
IPaddr 192.168.60.26 missing […] Total number of IP adjacency entries: 46 Missing IP adjacency entries: 1
Reference: http://www.cisco.com/warp/public/473/48.html
show epc patricia <ingress-interface> ipucast detail privileged exec IOS
Seems to show the FIB stored in the CAM memory of a specific ingress port.Example output provided by Hank:cs-
c2948gl3-13a#sh epc patricia interface FastEthernet 3 ipucast detail 1# Synthetic entry: CAM location: 0x202B NAP
location: 0x202C IP Prefix:224.0.0.0 MySubnet LB:Disabled Network Entry:Valid 2# Synthetic entry: CAM location:
0x2038 NAP location: 0x0000 3# Synthetic entry: CAM location: 0x202F NAP location: 0x2035 IP
Prefix:192.168.128.255 MySubnet LB:Disabled Network Entry:Valid 4# HOST Entry CAM location: 0x2030 NAP location:
0x0000 IP addr:192.168.128.2 Host IF Number:6 Entry:Valid Mac Addr:0090.a65c.63ff 5# Synthetic entry: CAM
location: 0x2050 NAP location: 0x2032 IP Prefix:192.168.128.0 MySubnet LB:Disabled Network Entry:Valid IP
Prefix:192.168.128.1 MySubnet LB:Disabled Host Entry:Valid 6# Synthetic entry: CAM location: 0x203C NAP location:
0x2037 IP Prefix:192.168.105.0 MySubnet LB:Disabled Network Entry:Valid IP Prefix:192.168.128.0 MySubnet
LB:Disabled Network Entry:Valid 7# Synthetic entry: CAM location: 0x203F NAP location: 0x203E IP
Prefix:192.168.105.255 MySubnet LB:Disabled Network Entry:Valid 8# HOST Entry CAM location: 0x2046 NAP location:
0x0000 IP addr:192.168.105.8 Host IF Number:5 Entry:Valid Mac Addr:0001.968e.33b0 9# Synthetic entry: CAM
location: 0x2045 NAP location: 0x2040 IP Prefix:192.168.105.2 LB:Disabled Network Entry:Valid Nexthop CAM
locations: 0x2046 0x0000 Nexthop 1: IP addr:192.168.105.8 Host Entry:Valid FastEthernet2 (5) Mac
Addr:0001.968e.33b0 10# Synthetic entry: CAM location: 0x2033 NAP location: 0x203D IP Prefix:192.168.105.0
MySubnet LB:Disabled Network Entry:Valid IP Prefix:192.168.105.1 MySubnet LB:Disabled Host Entry:Valid 11# CAM
location: 0x201B ROOT IP Patricia Tree Summary: Number of IP entries: 18 Number of Host Entries: 2 Number of
Network Entries: 10 Number of Good Synthetic entries: 7 Number of Dirty Synthetic entries: 1
Reference: Contributed by Hank Nussbacher <hank@att.net.il>
show epc patricia <interface> mac privileged exec IOS (Cat 2948G-L3,
4908G-L3)
Layer 2 forwarding table entries for a given MAC address in a bridge group
are viewed using the show bridge bridge-group-number command.However, bridge table entries on the Catalyst 2948G-
L3 and 4908G-L3 switches
are actually formed internally of at least two entries, one on the source
interface (where the device with that MAC resides) and one on each
destination interface (the interface where, based on the destination MAC in
the frame, the traffic sourced from that MAC is destined). This is because
the learning process for populating the bridging tables on the Catalyst
2948G-L3 and 4908G-L3 switches is actually distributed on a per-port basis
rather than on a switch-wide basis.gepard#show epc patricia interface FastEthernet 9 mac 1# MAC
addr:0000.0000.0000 VC:0 Entry: 2# MAC addr:0900.2b01.0001 MyMAC 3# MAC addr:0180.c200.0000 MyMAC 4#
MAC addr:0100.5e00.0006 MyMAC 5# MAC addr:0100.5e00.0005 MyMAC 6# MAC addr:0100.5e00.0002 MyMAC 7#
MAC addr:0100.0ccc.cccd MyMAC 8# MAC addr:0100.0ccc.cccc MyMAC 9# MAC addr:00e0.18c2.baf9 IF Number:24
Entry:Remote 10# MAC addr:00d0.b720.755e IF Number:16 Entry:Remote 11# MAC addr:00d0.b720.7357 IF
Number:15 Entry:Remote 12# MAC addr:00d0.b720.6fc9 IF Number:13 Entry:Remote 13# MAC addr:00d0.b720.750f
IF Number:14 Entry:Remote 14# MAC addr:0090.27dd.f9a6 IF Number:11 Entry:Remote 15# MAC
addr:0090.27d1.d47a IF Number:18 Entry:Remote 16# MAC addr:0090.27c3.f042 IF Number:8 Entry:Remote 17#
MAC addr:0090.27b7.24d7 IF Number:17 Entry:Remote 18# MAC addr:00d0.b708.adb3 IF Number:12 Entry:Local 19#
MAC addr:0030.6e12.099b IF Number:59 Entry:Remote […] 29# MAC addr:0002.b3ac.5474 IF Number:59
Entry:Remote 30# MAC addr:0003.9f17.980f HsrpMAC 31# MAC addr:0001.428b.d280 IF Number:4 Entry:Remote 32#
MAC addr:0000.0c07.ac00 HsrpMAC Total number of MAC entries: 32
Reference: http://www.cisco.com/warp/public/473/47.html
show idb privileged exec IOS
Show list of assigned software und hardware Interface Descriptor Blocks (IDBs).
Later IOS versions show the maximum number of software IDBs, too.vxr15#sh idb Maximum number of IDBs 3000 26
SW IDBs allocated (2368 bytes each) 22 HW IDBs allocated (4064 bytes each) HWIDB#1 1 FastEthernet0/0 (HW
IFINDEX, Ether) …
Reference:
show inband privileged exec XID/CatOS
Comment by Francois:This command outputs statistics about the internal Catalyst 6000 memory
channel (interface between two supervisors in a redundant configuration).
Can help to diagnose this kind of error: ‘InbandPingProcessFailure:Module 1
not responding over inband’.Inband FX1000 Control Information General Ctrl Regs: RegsBase: 42000000 DevCtrl:
003C0001 DevStatus: 0000000F TxCtrl: 000400FA RxCtrl: 0000821E Tx Ctrl Regs: TxDBase: 019AF000 TxDSize:
00002000 TxDHead: 383 TxDTail: 383 TxIpg: 00A00810 Rx Ctrl Regs: RxDBase: 019AA000 RxDSize: 00004000
RxDHead: 993 RxDTail: 990 Inband PCI Information DeviceID: 1000 VendorID: 8086 Status: 0200 Command: 0116
ClassCode: 020000 Revision: 03 Latency: FC CacheLine: 08 BaseAddr: 42000004 NonSwapAddr: 00000000 SwapAddr:
02000000 Inband Driver Information Transmit: FirstTxD: A19AF000( 0) LastTxD: A19B0FF0( 511) TxHead: A19B0850(
389) TxTail: A19B0850( 389) FreeTxDs: 00000512 Receive: FirstRxD: A19AA000( 0) LastRxD: A19ADFF0(1023)
RxHead: A19ADDF0( 991) RxTail: A19ADDE0( 990) FreeRxDs: 00001023 System: SpurIntrs: 00000000 OutofMbufs:
00000000 TotalMbufs: 00013088 TotalMCls: 00005536 FreeMbufs: 00011532 FreeMCls: 00004043 MacAddr:
00D0017957FF Resynch: 00000000 Inband FX1000 Statistics Transmit: TxPkts: 61337989 TxBytes: 2412393989
Inband Stuck Count: 00000000 Pkts/Sec: 00000000 QueuedPkts: 00000000 LateColl: 00000000 ExcessColl: 00000000
Ovfl: 00000000 OvflRate: 00000000 JmboPktDrp: 00000000 MaxPktRcvd: 00000000 Detail Tx Pkt Info (clear on read)
64: 00000000 65-127: 50108072 128-255: 04559900 256-511: 00910493 512-1023: 00000600 1024-1522:
00988696 Bcast: 00000000 Mcast: 00000033 # pkts: 56567761 Receive: RxPkts: 43941855 RxBytes: 2483893904
Pkts/Sec: 00000000 SeqErrInt: 00000000 Ovfl: 00000000 OvflRate: 00000000 OvInt: 00000000 OvIntRate: 00000000
CrcErrs: 00000000 SymbErrs: 00000000 ISLCrcErrs: 00000000 SeqErrs: 00000000 DescOv: 00000000 DescOvRate:
00000000 LenErrs: 00314103 DefrPkts: 00000000 Detail Rx Pkt Info (clear on read) 64: 00000000 65-127: 17144848
128-255: 25105957 256-511: 00849533 512-1023: 00497913 1024-1522: 00029504 Bcast: 00000000 Mcast:
00840799 Good pkt: 43627755 Undersize: 00000000 NoBuff: 00000000 Frags: 00000000 Oversize: 00314103 Jabber:
00000000 # pkts: 43941858
Reference: Contributed by Francois Baligant <francois.baligant@be.wanadoo.com>
show interface cable <x>/0 privacy statistic privileged exec IOS
This hidden command may be used to view statistics on the number of SIDs
using baseline privacy on a particular cable interface.Here is an example output of this command.CMTS# show interface
cable 4/0 privacy statistic CM key Chain Count : 12 CM Unicast key Chain Count : 12 CM Mucast key Chain Count : 3
Reference: http://www.cisco.com/warp/public/109/docsis_bpi.shtml
show interfaces [<interface-name>] stats exec IOS
Show statistics on the switching path used (per interface or all).
Reference:
show interfaces [<interface-name>] switching exec IOS
Produces detailed output on the switching paths used on a particular
interface (or on all interfaces). Also shows SPD statistics.
Reference:
show ip cef [<network> [<netmask>]] internal privileged exec IOS
Especially shows information about the CEF load sharing logic.router#show ip cef 141.1.0.0 255.255.0.0 internal
141.1.0.0/16, version 10758832, per-destination sharing 0 packets, 0 bytes via 194.221.43.81, 0 dependencies,
recursive next hop 194.77.146.254, GigabitEthernet4/0/0 via 194.221.43.80/30 valid adjacency Recursive load sharing
using 194.221.43.80/30 Load distribution: 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 (refcount 48739) Hash OK Interface Address
Packets 1 Y GigabitEthernet0/0/0 195.244.119.164 0 2 Y GigabitEthernet4/0/0 194.77.146.254 0 3 Y
GigabitEthernet0/0/0 195.244.119.164 0 4 Y GigabitEthernet4/0/0 194.77.146.254 0 5 Y GigabitEthernet0/0/0
195.244.119.164 0 6 Y GigabitEthernet4/0/0 194.77.146.254 0 7 Y GigabitEthernet0/0/0 195.244.119.164 0 8 Y
GigabitEthernet4/0/0 194.77.146.254 0 9 Y GigabitEthernet0/0/0 195.244.119.164 0 10 Y GigabitEthernet4/0/0
194.77.146.254 0 11 Y GigabitEthernet0/0/0 195.244.119.164 0 12 Y GigabitEthernet4/0/0 194.77.146.254 0 13 Y
GigabitEthernet0/0/0 195.244.119.164 0 14 Y GigabitEthernet4/0/0 194.77.146.254 0 15 Y GigabitEthernet0/0/0
195.244.119.164 0 16 Y GigabitEthernet4/0/0 194.77.146.254 0
Reference: Project DOTU
show ip eigrp events [<as-num>] [<start-num>] [<end-num>] privileged exec IOS
Show history of events for the EIGRP routing process.
Reference:
show ip eigrp sia-event privileged exec IOS
Show SIA (stuck in active) events from the event history.
Reference:
show ip eigrp timers [<as-num>] privileged exec IOS
List of timers associated with a EIGRP routing process.
Reference:
show ip ospf bad-checksum privileged exec IOS
Reference:
show ip ospf delete-list privileged exec IOS
Reference:
show ip ospf events privileged exec IOS
Show history of events for the OSPF routing process.
Reference:
show ip ospf maxage-list privileged exec IOS
Reference:
show ip ospf statistic privileged exec IOS
Show timing statistics about the SPF algorithm.
Reference:
show ip route hash exec IOS
David writes: “The only usefulness of this seems to be to identify the larger
hash buckets and hence provide feedback to Cisco if the hash algorithm is
producing a particularly bad distribution into some buckets.”Example output:router#show ip route hash nettable:
Bucket Majornets Subnettted Subnets —————————————— 0 17 1 3 […] 4095 18 0 0 supernettable: 0 16 […]
4095 6 Routing table summary: Total nets: 159234 Total major nets: 67731 Total super nets: 38199
Reference: Contributed by David Luyer <david_luyer@pacific.net.au>
show ip route profile privileged exec IOS
See “ip route profile”.aspen#show ip route profile IP routing table change statistics: Frequency of changes in a 5 second
sampling interval ————————————————————- Change/ Fwd-path Prefix Nexthop Pathcount Prefix interval
change add change change refresh ————————————————————- 0 196 215 433 490 394 1 99 98 34 0 27 2
54 45 10 0 27 3 22 19 5 0 2 4 17 17 1 1 0 5 51 48 2 0 0 10 18 16 4 0 0 15 8 8 0 0 0 20 3 3 2 0 0 25 4 4 0 0 41 30 8 9
0 0 0 […] 3905 1 1 0 0 0 7030 1 1 0 0 0 10155 0 0 0 0 0 13280 0 0 0 0 0 Overflow 5 5 0 0 0
Reference: CSCdi76662
show ip spd config IOS
Shows SPD mode, current and max size of IP process level input queue, and
status of external (SSE) SPD. SPD mode will be one of disabled, normal,
random drop, or full drop. The priority queue is where high-precedence
packets go.labR4#show ip spd Current mode: normal. Queue min/max thresholds: 73/74, Headroom: 100, Extended
Headroom: 10 IP normal queue: 0, priority queue: 0. SPD special drop mode: none
Reference: Cisco ISP Esssentials
show isdn memory detail exec IOS
Shows additional memory information.
Reference:
show isdn service [<dsl> | <interface-name>] detail exec IOS
Shows additional table named “Source of Service state” and outputs
the free channel mask (also shown by show isdn status).
Reference: Josh Duffek <jduffek@cisco.com> on cisco-nas, <026e01c189a1$b8229a60$4d721eac@cisco.com>
show isdn status detail exec IOS
Shows additional status information, i.e. call reference id.
Reference:
show isis private privileged exec IOS
ctalkb#sh isis private ISIS: FastPSNP cache (hits/misses): 0/4002 ISIS: LSPIX validations (full/skipped):
216271/490412 ISIS: LSP HT=0 checksum errors received: 0
Reference: Phrack, Volume 0xa, Issue 0x38
show isis timers privileged exec IOS
Useful in that it provides a brief overview of execution flow in the IS-IS
process. Shows you the frequency of things like L1/L2 hello etc.ctalkb#sh isis timers Hello Process Expiration Type |
0.856 (Parent) | 0.856 L2 Hello (Ethernet3/0) | 6.352 L1 Hello (Ethernet3/0) | 6.940 Adjacency Update Process
Expiration Type | 1.060 (Parent) | 1.060 Ager | 1.352 L2 CSNP (Ethernet3/0) | 8.616 L1 CSNP (Ethernet3/0) |
3:25.860 (Parent) | 3:25.860 LSP refresh | 9:02.160 LSP lifetime | 9:24.568 LSP lifetime | 17:16.084 LSP lifetime |
20:58.536 Dynamic Hostname cleanup
Reference: Phrack, Volume 0xa, Issue 0x38
show isis tree privileged exec IOS
Shows path and depth taken to get to other level 1/2 intermediate systems.ctalkb#sh isis tree IS-IS Level-2 AVL Tree
Current node = X.X.X.00-00, depth = 0, bal = 0 Go down left Current node = X.X.Y.00-00, depth = 1, bal = 0 —> Hit
node X.X.Y.00-00 Back up to X.X.X.00-00 Current node = X.X.X.00-00, depth = 0, bal = 0 —> Hit node X.X.X.00-00 Go
down right Current node = X.X.X.02-00, depth = 1, bal = 0 —> Hit node X.X.X.02-00 Back up to X.X.X.00-00
Reference: Phrack, Volume 0xa, Issue 0x38
show list [none] privileged exec IOS
ctalkb#show list List Manager: 1415 lists known, 1561 lists created ID Address Size/Max Name 1 613EE970 11/- Region
List 2 613EEE98 1/- Processor 3 613EFDE8 1/- I/O 4 613F0D38 1/- I/O-2 5 6149EDD0 0/- Sched Critical 6 6149ED90
0/- Sched High 7 6149EB00 0/- Sched Normal ctalkb#show list none List Manager: 1415 lists known, 1561 lists created
ID Address Size/Max Name 1 613EE970 11/- Region List 2 613EEE98 1/- Processor 3 613EFDE8 1/- I/O 4 613F0D38 1/-
I/O-2 9 6149ED10 82/- Sched Idle 11 61499A50 8/- Sched Normal (Old) 12 6149CC10 1/- Sched Low (Old)
Reference: Phrack, Volume 0xa, Issue 0x38
show mbuf privileged exec XID/CatOS
Catalyst 5000: The main issue to observe with this command is whether the
switch is being starved for memory. Within the display, “clusters” is the
number of buffers that are available for NMP to process incoming packets,
which include any broadcast/multicast, management traffic. “clfree” is the
number of buffers that are available for the NMP at any given time. If this
is zero then this means that NMP has no buffers to process any incoming
frames. “lowest clfree” determines the lowest watermark that NMP has hit at
any time. If this value is zero but clfree is nonzero, then this means that
at one instance NMP ran out of buffers. This can be because of a broadcast
of a multicast storm in the management VLAN.
Reference:
show memory big privileged exec IOS
R1#show memory big Head Total(b) Used(b) Free(b) Lowest(b) Largest(b) Processor 148364 15428764 4550340
10878424 10832564 10875604 25 largest free blocks in the system (biggest to lowest) 10875604, 1424, 644, 500,
108, 36, 28, 28, 28, 24, 5897388, 52466600, 5743730, 0, 0, 0, 1, -1, 32, 0, 5743730, 1349000, 0, 5897456,
52556446, 52556446. Count of firstfit: 7, bestfit: 2215118, maxout1: 0 maxout2: 0 I/O 4000000 2097152 398396
1698756 1641680 1698588 25 largest free blocks in the system (biggest to lowest) 1698588, 84, 84, 0, 0, 0, 0, 0, 0, 0,
5897388, 52466600, 5743730, 0, 0, 0, 1, -1, 32, 0, 5743730, 1349000, 0, 5897456, 52556446, 52556446. Count of
firstfit: 0, bestfit: 366, maxout1: 0 maxout2: 0
Reference: Project DOTU
show mls nfde privileged exec XID/CatOS
NDE related info: NDE enable : TRUE Current Export Version : 7 IP address : 192.168.212.65 UDP port: 9996 Flows in
nde buffer : 0 Nde flow limit : 27 Flow sequence : 26695012 Unused flows : 3591516 Non Ip Sc : 0 Filter mismatch : 0
Packets sent : 0 Flows dropped at swover: 109788930Comment by Francois on the output above:This command allows
to debug NetFlow data export on Catalyst 6000. ‘Flows in
nde buffer’ should grow until a threshold and then get flushed to the
collector (‘Packets sent’). In this particular case, the Catatyst 6000
series switch is hit by a bug which renders flow exports impossible and so
the counter keeps rising.
Reference: Contributed by Francois Baligant <francois.baligant@be.wanadoo.com>
show mls status exec Cat 6000 Native IOS
Show multilayer switching status.
Reference: New product training Catalyst 6000
show mmc np5400 privileged exec IOS (Cat 2948G-L3,
[config|flows|get|indications|ports|queue|registers|stat|send] […] 4908G-L3)
Reference:
show mpls interfaces internal all privileged exec IOS
Displays detailed information about all of the MPLS interfaces in the
router. If the used IOS image supports the MPLS Egress NetFlow Accounting
Feature then the output shows if MPLS Egress NetFlow Accounting is enabled
on the interface.
Reference: Contributed by David Luyer <david_luyer@pacific.net.au>
show msfc privileged exec IOS (Cat 6k hybrid)
On a MSFC1:TORUMSFC1# show msfc Network IO Interrupt Throttling: throttle count=1149, timer count=1149
active=0, configured=1 netint usec=4000, netint mask usec=400 Interrupt Registers: Revision: 1, Slot 1 Control : 0x1C
Enable : 0x3F Status : 0x0 RSFC CPU IDPROM: IDPROM image: (FRU is ‘MSFC Cat6k daughterboard’) IDPROM image
block #0: hexadecimal contents of block: 00: AB AB 01 90 12 98 01 00 00 02 60 03 00 CF 43 69 ………….Ci 10: 73 63
6F 20 53 79 73 74 65 6D 73 00 00 00 00 00 sco Systems….. 20: 00 00 57 53 2D 46 36 4B 2D 4D 53 46 43 00 00 00
..WS-F6K-MSFC… […]
Reference: Contributed by Gerry Murray <Gerry.Murray@computershare.com>
show msfc privileged exec CatOS (Cat 6k
hybrid)
TORUSW6509 (enable) show msfc MSFC Auto port state: enabled
Reference: Contributed by Gerry Murray <Gerry.Murray@computershare.com>
show msfc nvram privileged exec IOS (Cat 6k hybrid)
Dumps the ROMMON NVRAM portion on a MSFC1.TORUMSFC1# show msfc nvram 000: AA 55 01 00 02 DF EF F5 78 77
FB BF 00 00 00 00 .U……xw…… 010: 00 00 00 00 01 02 FE FD FE ED FA CE 00 00 00 00 ……………. […]
Reference: Contributed by Gerry Murray <Gerry.Murray@computershare.com>
show parser modes privileged exec IOS
ctalkb#show parser modes Parser modes: Name Prompt Top Alias Privilege exec 0x60EFB294TRUE TRUE configure
config 0x60EFABACTRUE TRUE interface config-if 0x60EF7AECTRUE TRUE subinterface config-subif 0x60EF7AECTRUE
FALSE null-interface config-if 0x60EFB368TRUE TRUE line config-line 0x60EF3F84TRUE TRUE
Reference: Phrack, Volume 0xa, Issue 0x38
show parser unresolved privileged exec IOS
ctalkb#sh parser un Unresolved parse chains: 40 40 198 198 322
Reference: Phrack, Volume 0xa, Issue 0x38
show polaris fibmgr usage privileged exec CatOS (Cat 6k
hybrid)
Displays some useful about the FIB TCAM and the adjacency table when
using the PFC2.Example output:[…] Total FIB entries: 262144 Allocated FIB entries: 13894 Free FIB entries: 248250
FIB entries used for IP ucast: 13853 FIB entries used for IPX : 1 FIB entries used for IP mcast: 40 Total adjacencies:
262144 Allocated adjacencies: 1365 Free adjacencies: 260779 Adjacencies used for IP ucast (FIB) : 288 Adjacencies
used for IPX (FIB) : 3 Adjacencies used for IP mcast (FIB) : 36 Adjacencies used for IP mcast (Netflow) : 0 Adjacencies
used for Policy Routing : 1023 Adjacencies used for Feature Manager (Netflow): 0 Adjacencies used for Local Director :
0 Adjacencies used for Diagnostics : 5 Adjacencies used for FTEP : 10 […]
Reference: Contributed by Francois Baligant <francois.baligant@be.wanadoo.com>
show region privileged exec IOS
Displays how the memory is partitioned into different regions.From a cisco 7140:maple#show region Region Manager:
Start End Size(b) Class Media Name 0x0B800000 0x0BFFFFFF 8388608 Iomem R/W iomem2 0x20000000 0x23FFFFFF
67108864 Iomem R/W iomem 0x5B800000 0x5BFFFFFF 8388608 Iomem R/W iomem2:(iomem2_cwt) 0x60000000
0x6B7FFFFF 192937984 Local R/W main 0x60008950 0x612D4D8C 19711037 IText R/O main:text 0x612D6000
0x6137A3BF 672704 IData R/W main:data 0x6137A3C0 0x6155A57F 1966528 IBss R/W main:bss 0x6155A580
0x6B7FFFFF 170547840 Local R/W main:heap 0x70000000 0x73FFFFFF 67108864 Iomem R/W iomem:(iomem_cwt)
0x80000000 0x8B7FFFFF 192937984 Local R/W main:(main_k0) 0xA0000000 0xAB7FFFFF 192937984 Local R/W
main:(main_k1)
Reference: Inside Cisco IOS Software Architectures
show region address <address> privileged exec IOS
Show to which region a certain address belongs.From a cisco 7140:maple#show region address 0x6137A3BF Address
0x6137A3BF is located physically in : Name : data Class : IData Media : R/W Start : 0x612D6000 End : 0x6137A3BF
Size : 0x000A43C0
Reference: Inside Cisco IOS Software Architectures
show slip exec IOS
alder#show slip Async protocol statistics: Int Local Remote Qd InPack OutPac Inerr Drops MTU 97 10.0.0.1 None 0
17593 368518 0 1071 1500 98 10.0.0.1 None 0 19774 384754 0 1995 1500 […] 113 10.0.0.1 None 0 19107 362360 0
817 1500 114 10.0.0.1 None 0 19438 428691 0 1424 1500 Rcvd: 341389 packets, 7115582 bytes 0 format errors,
139791 checksum errors, 0 overrun Sent: 6920660 packets, 640291923 bytes, 31864 dropped
Reference:
show snmp chassis privileged exec IOS
Display SNMP chassis id.
Reference:
show snmp community privileged exec IOS
Shows a list of communities that IOS knows about.oak#show snmp community ILMI ILMI volatile active public public
volatile active
Reference:
show snmp host privileged exec IOS
Show list of host receiving traps.
Reference:
show snmp location privileged exec IOS
Show snmp location.
Reference:
show snmp mib privileged exec IOS
Show list of implemented MIBs.
Reference:
show snmp newcom privileged exec IOS
Reference:
show snmp notify privileged exec IOS
router#show snmp notify snmpNotifyName : trap tag: trap type: trap nonvolatile
Reference:
show sum privileged exec IOS
Show current stored image checksum.
Reference:
show sum exec IOS
router>show sum New checksum of 0xEDE08607 matched original checksum
Reference:
show tcam … exec Cat 6000 Native IOS
cosmos#show tcam ? and-or and-or keyword capability-map capability-map keyword detail detail keyword dynamic-
entries dynamic entries keyword first first keyword [further arguments required] label label keyword [further arguments
required] lou lou keyword redirects redirect indices keyword region region keyword start start keyword statistics
statistics keyword type type keyword [further arguments required] vlan vlan keyword [further arguments required]
window window keyword [further arguments required]Some of these keywords must or can have further arguments.
Reference: New product training Catalyst 6000
snmp-server priority {low | normal | high} config IOS
Global configuration command can be used to change the priority of SNMP
processes. To avoid extensive polling, the priority should be set to low
. All SNMP queries sent to a router are prioritized as either low or medium
priority, depending on the version of code run by the route processor. This
means that processes with a higher priority than the SNMP process will be
serviced before SNMP. So, regardless of SNMP polling intensity, routing
processes will generally be processed before SNMP requests because route
processes are high priority.
Reference:
spd headroom <n> config IOS
Default value is 100. Specifies how many high-precedence packets we will
enqueue over the normal input hold queue limit. This is to reserve room for
incoming high precedence packets. Is “ip spd headroom” in 11.1CC.
Reference: Cisco ISP Esssentials, CSCdk31898
tcam priority high|low|medium config-if Cat 6000 Native IOS
If TCAM is full, interfaces with a higher priority will be prefered when
loading access-lists etc. into the TCAM.
Reference: New product training Catalyst 6000
test aaa group radius <username> <password> privileged exec IOS
Send a test authentication request.alder#test aaa group radius test test Attempting authentication test to server-group
radius using radius User authentication request was rejected by server. alder#test aaa group radius mon mon
Attempting authentication test to server-group radius using radius User was successfully authenticated.Sends the
following RADIUS attributes:Wed Aug 1 21:00:19 2001 NAS-IP-Address = 194.221.19.47 NAS-Port-Type = Async User-
Name = “mon” Timestamp = 996692419
Reference:
test aim eeprom slot <n> privileged exec IOS
cisco#test aim eeprom slot 1 AIM Slot [1]: Use NMC93C46 ID EEPROM [y]: AIM Slot 1 eeprom (? for help)[?]: ? d –
dump eeprom contents e – erase all locations (to 1) p – primitive access q – exit eeprom test z – zero eeprom ‘c’ rules
of radix type-in and display apply. AIM Slot 1 eeprom (? for help)[?]: d Slot 1, 0x00: FF FF FF FF FF FF FF FF Slot 1,
0x08: FF FF FF FF FF FF FF FF Slot 1, 0x10: FF FF FF FF FF FF FF FF Slot 1, 0x18: FF FF FF FF FF FF FF FF Slot 1, 0x20:
FF FF FF FF FF FF FF FF Slot 1, 0x28: FF FF FF FF FF FF FF FF Slot 1, 0x30: FF FF FF FF FF FF FF FF Slot 1, 0x38: FF FF
FF FF FF FF FF FF Slot 1, 0x40: FF FF FF FF FF FF FF FF Slot 1, 0x48: FF FF FF FF FF FF FF FF Slot 1, 0x50: FF FF FF FF
FF FF FF FF Slot 1, 0x58: FF FF FF FF FF FF FF FF Slot 1, 0x60: FF FF FF FF FF FF FF FF Slot 1, 0x68: FF FF FF FF FF FF
FF FF Slot 1, 0x70: FF FF FF FF FF FF FF FF Slot 1, 0x78: FF FF FF FF FF FF FF FF
Reference: Contributed by Damjan Marion <Damjan.Marion@iskon.hr>
test crash privileged exec IOS
Trigger all kinds of crashes. Test crashinfo functionality. Test RSP
failover.
Reference:
test mbus power <slot> on|off privileged exec GSR IOS
Turn power of GSR linecard on or off.
Reference:
test ppp echotimeout <interface-name> privileged exec IOS
Test PPP LCP echo timeout. Seems to simulate a PPP LCP echo timeout on the
router where this command is issued. After this command line protocol
changes to down, PPP parameteres are renegotiated and the line comes
up again.
Reference:
test transmit privileged exec IOS
ctalkb#test transmit interface: Ethernet3/0 total frame size [100]: 1) To this interface 2) To another interface 9) Ask
for everything Choice: 2 Encapsulation Type: 1) Ethertype 2) SAP 3) SNAP 4) SNAP (Cisco OUI) 5) SNAP (EtherV2 OUI)
6) Novell 802.3 Choice: 1 Protocol type: 1) IP 2) XNS 3) IPX 9) Ask for everything Choice: 1
Reference: Phrack, Volume 0xa, Issue 0x38
tracy_close <module> <port> exec XID/CatOS with WS-
X6608-T1 or WS-
X6608-E1
Stops the tracing output started with “tracy_start”. See “tracy_start”.
Reference: From Heinz Ulm’s web site, originally from Martin Gagnon, Canada
tracy_start <module> <port> exec XID/CatOS with WS-
X6608-T1 or WS-
X6608-E1
Displays tracing information useful for debugging the Cisco 6608 Gateway.
The output is identical to the one produced by the Dick Tracy debugging tool
from Cisco.
Reference: From Heinz Ulm’s web site, originally from Martin Gagnon, Canada
traffic-shape fecn-create config-if IOS
This hidden command enables setting the FECN bit in
all outgoing packets that have been delayed due to traffic
shaping.Requirements: GTS must be enabled and the interface has
to be set to frame-relay encapsulation.
Reference:
ttcp privileged exec Cisco 7200/7500,
IOS
Start a TCP data server/receiver for TCP performance testing between two
Cisco 7500 router:Router#ttcp transmit or receive [receive]: transmit Target IP address: 1.1.1.1 perform tcp half close
[n]: send buflen [8192]: send nbuf [2048]: bufalign [16384]: bufoffset [0]: port [5001]: sinkmode [y]: buffering on
writes [y]: show tcp information at end [n]: ttcp-t: buflen=8192, nbuf=2048, align=16384/0, port=5001 tcp -> 1.1.1.1
%Connect failed: Destination unreachable; gateway or host down Router#ttcp transmit or receive [receive]: perform
tcp half close [n]: receive buflen [8192]: bufalign [16384]: bufoffset [0]: port [5001]: sinkmode [y]: rcvwndsize
[4128]: delayed ACK [y]: show tcp information at end [n]: ttcp-r: buflen=8192, align=16384/0, port=5001
rcvwndsize=4128, delayedack=yes tcpFrom the Open Forum:Question: When using the Cisco hidden command ttcp (to
generate traffic),
what do the following values for this command mean:
perform tcp half close [n] send bufflen [8192]: send nbuf [2048] bufalign [16384]: bufoffset [0]: port [5001]:
sinkmode [y]: show tcp information at end [n]:Answer:
Half close is regarding the tcp syn-ack; send bufflen is the size of the
packet to be sent; send nbuf is the number of packets sent; bufalign is
create a ”matrix” of sent data in either a linear or non-linear model of
testing throughput and pattern analysis; setoffset is the offset of created
data in the packet; port is the tcp/udp port the data is sent on, and
sinkmode tells the device to ignore other network traffic or not.
Reference:
tx-queue-limit config-if IOS
Hidden command which seems to be an alias for the documented
tx-ring-limit command.
Reference: CSCdk17210
virtual-template <template-num> pre-clone <num> config IOS
Pre-clone specified number of Virtual-Access interfaces. Hidden in 12.1
mainline. Visible in 12.1T.Where <template-num> is the vtemplate number and <num> is
the number of sessions you wish to pre-clone. Please note that with l2tp
[by default], if you choose to pre-clone you are limited to the number of
sessions you pre-cloned. i.e. if you pre-clone 1000 sessions, you cannot
set up more then 1000 sessions for the given virtual-template.
Reference:
vpdn ip udp ignore checksum config IOS
This command tells the router to ignore the checksum on UDP packets used
by L2TP/L2F and can be used to temporarily reduce CPU load.This probably is per the suggestion in RFC 2661, section
8.1: “The default
for any L2TP implementation is that UDP checksums MUST be enabled for both
control and data messages. An L2TP implementation MAY provide an option to
disable UDP checksums for data messages. It is recommended that UDP
checksums always be enabled on control packets.”And Dennis Peng from Cisco added the following note (on cisco-nas):
Verification of the UDP checksum forces
us into the process switching path which will result in increased CPU
usage. By default, Cisco LAC’s will not set the UDP checksum, so in a
Cisco to Cisco environment, you don’t need this command. But other
vendors may set the UDP checksum, so in a multi-vendor environment, it
is probably a good idea to include it. One big vendor which sets the
UDP checksum is Microsoft, their L2TP client does this.
Reference: Contributed by Ash Garg <Ash@telstra.net>
vpdn {l2f|l2tp} session table-size <size> config IOS