Download Print this page

Cisco AP775A - Nexus Converged Network Switch 5010 Command Reference Manual

Cisco nexus 5000 series command reference, release 4.1(3)n1(1) (ol-16599-01, august 2009)
Hide thumbs

Advertisement

S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m
Cisco Nexus 5000 Series Command
Reference
Release 4.1(3)N1(1)
August 2009
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-16599-01

Advertisement

loading

  Related Manuals for Cisco AP775A - Nexus Converged Network Switch 5010

  Summary of Contents for Cisco AP775A - Nexus Converged Network Switch 5010

  • Page 1 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference Release 4.1(3)N1(1)
  • Page 2 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE.
  • Page 3: Table Of Contents

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C O N T E N T S Preface Audience...
  • Page 4 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m 1-33 exec-timeout 1-34...
  • Page 5 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show cli alias 1-75 show cli history...
  • Page 6 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m stopbits 1-113 system cores...
  • Page 7 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m mac-address-table static 2-32 monitor session...
  • Page 8 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port-priority 2-86 spanning-tree vlan...
  • Page 9 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree interface 3-26 show spanning-tree mst...
  • Page 10 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match cos (class map type qos) match cos (class map type queuing) match dscp...
  • Page 11 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface policy deny 6-39 ip access-list...
  • Page 12 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show role 6-108 show role feature...
  • Page 13 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vlan policy deny 6-150 vrf policy deny...
  • Page 14 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ntp peer-status 7-41 show ntp peers...
  • Page 15 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m discover scsi-target 8-35 fabric profile...
  • Page 16 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fctimer distribute 8-78 fctrace...
  • Page 17 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rscn 8-122 rscn abort...
  • Page 18 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show fcdomain 9-12 show fcdroplatency...
  • Page 19 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show startup-config interface 10-4 show startup-config vpc...
  • Page 20 Contents S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference xviii OL-16599-01...
  • Page 21 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Preface This preface describes the audience, organization, and conventions of the Cisco Nexus 5000 Series Command Reference.
  • Page 22: Document Conventions

    Preface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Chapter Title Description...
  • Page 23: Obtaining Documentation And Submitting A Service Request

    Preface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and...
  • Page 24 Preface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference xxii OL-16599-01...
  • Page 25 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Basic System Commands This chapter describes the basic Cisco NX-OS system commands available on Cisco Nexus 5000 Series...
  • Page 26: Chapter 1 Basic System Command

    Chapter 1 Basic System Commands banner motd S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m banner motd To configure the message-of-the-day (MOTD) banner that displays when the user logs in to a Cisco Nexus 5000 Series switch, use the banner motd command.
  • Page 27: Boot

    Chapter 1 Basic System Commands boot S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m boot To configure the boot variable for the Cisco Nexus 5000 Series kickstart or system software image, use the boot command.
  • Page 28 Chapter 1 Basic System Commands boot S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to clear the kickstart boot variable: switch(config)# no boot kickstart Related Commands...
  • Page 29 Chapter 1 Basic System Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To change the current working directory in the device file system, use the cd command.
  • Page 30: Clear Cli History

    Chapter 1 Basic System Commands clear cli history S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear cli history To clear the command history, use the clear cli history command.
  • Page 31: Clear Cores

    Chapter 1 Basic System Commands clear cores S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear cores To clear the core files, use the clear cores command.
  • Page 32: Clear Debug-Logfile

    Chapter 1 Basic System Commands clear debug-logfile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear debug-logfile To clear the contents of the debug log file, use the clear debug-logfile command.
  • Page 33: Clear Install Failure-Reason

    Chapter 1 Basic System Commands clear install failure-reason S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear install failure-reason To clear the reason for software installation failures, use the clear install failure-reason command.
  • Page 34: Clear License

    Chapter 1 Basic System Commands clear license S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear license To uninstall a license, use the clear license command.
  • Page 35: Clear User

    Chapter 1 Basic System Commands clear user S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear user To log out a particular user, use the clear user command.
  • Page 36: Cli Var Name

    Chapter 1 Basic System Commands cli var name S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cli var name To define a command-line interface (CLI) variable for a terminal session, use the cli var name command.
  • Page 37 Chapter 1 Basic System Commands cli var name S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to reference the TIMESTAMP variable: switch# copy running-config >...
  • Page 38: Clock Set

    Chapter 1 Basic System Commands clock set S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clock set To manually set the clock on a Cisco Nexus 5000 Series switch, use the clock set command.
  • Page 39: Clock Summer-Time

    Chapter 1 Basic System Commands clock summer-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clock summer-time To configure the summer-time (daylight saving time) offset, use the clock summer-time command.
  • Page 40 Chapter 1 Basic System Commands clock summer-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to revert to the default offset for summer-time: switch(config)# no clock summer-time Related Commands...
  • Page 41: Clock Timezone

    Chapter 1 Basic System Commands clock timezone S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clock timezone To configure the time zone offset from Coordinated Universal Time (UTC), use the clock timezone command.
  • Page 42: Configure Session

    Chapter 1 Basic System Commands configure session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m configure session To create or modify a configuration session, use the configure session command.
  • Page 43: Configure Terminal

    Chapter 1 Basic System Commands configure terminal S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m configure terminal To enter configuration mode, use the configure terminal command.
  • Page 44: Copy

    Chapter 1 Basic System Commands copy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m copy To copy any file from a source to a destination, use the copy command.
  • Page 45 Chapter 1 Basic System Commands copy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 1-2 URL Prefix Keywords for Remote File Systems (continued) Keyword...
  • Page 46 Chapter 1 Basic System Commands copy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m You can enter on the command line all necessary source- and destination-URL information and the username to use, or you can enter the copy command and have the CLI prompt you for any missing information.
  • Page 47 Chapter 1 Basic System Commands copy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to copy a file to another file system: switch# copy file1 bootflash: This example shows how to copy a file to another supervisor module:...
  • Page 48: Copy Running-Config Startup-Config

    Chapter 1 Basic System Commands copy running-config startup-config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m copy running-config startup-config To save the running configuration to the startup configuration file so that all current configuration details are available after a reboot, use the copy running-config startup-config command.
  • Page 49: Databits

    Chapter 1 Basic System Commands databits S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m databits To configure the number of data bits in a character for the terminal port, use the databits command.
  • Page 50: Debug Logfile

    Chapter 1 Basic System Commands debug logfile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m debug logfile To direct the output of the debug commands to a specified file, use the debug logfile command.
  • Page 51: Debug Logging

    Chapter 1 Basic System Commands debug logging S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m debug logging To enable debug command output logging, use the debug logging command.
  • Page 52: Delete

    Chapter 1 Basic System Commands delete S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m delete To delete a file or directory, use the delete command.
  • Page 53 Chapter 1 Basic System Commands delete S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 54 Chapter 1 Basic System Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To display the contents of a directory, use the dir command.
  • Page 55 Chapter 1 Basic System Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 56: Echo

    Chapter 1 Basic System Commands echo S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m echo To display a text string on the terminal, use the echo command.
  • Page 57: End

    Chapter 1 Basic System Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To end the current configuration session and return to EXEC mode, use the end command in configuration mode.
  • Page 58: Exec-Timeout

    Chapter 1 Basic System Commands exec-timeout S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m exec-timeout To configure the inactive session timeout on the console port or the virtual terminal, use the exec-timeout command.
  • Page 59 Chapter 1 Basic System Commands exec-timeout S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 60: Exit (Exec)

    Chapter 1 Basic System Commands exit (EXEC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m exit (EXEC) To close an active terminal session by logging off the switch, use the exit command.
  • Page 61: Exit (Global)

    Chapter 1 Basic System Commands exit (global) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m exit (global) To exit any configuration mode to the next highest mode in the CLI mode hierarchy, use the exit command in any configuration mode.
  • Page 62: Feature Fcoe

    Chapter 1 Basic System Commands feature fcoe S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature fcoe To enable virtual and native Fibre Channel interfaces after installing the FC_FEATURES_PKG license, use the feature fcoe command.
  • Page 63: Feature Interface-Vlan

    Chapter 1 Basic System Commands feature interface-vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature interface-vlan To enable the creation of VLAN interfaces, use the feature interface-vlan command.
  • Page 64: Feature Lacp

    Chapter 1 Basic System Commands feature lacp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature lacp To enable Link Aggregation Control Protocol (LACP), which bundles a number of physical ports together to form a single logical channel, use the feature lacp command.
  • Page 65: Feature Private-Vlan

    Chapter 1 Basic System Commands feature private-vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature private-vlan To enable private VLANs, use the feature private-vlan command.
  • Page 66: Feature Tacacs

    Chapter 1 Basic System Commands feature tacacs+ S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature tacacs+ To enable TACACS+, use the feature tacacs+ command.
  • Page 67: Feature Udld

    Chapter 1 Basic System Commands feature udld S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature udld To enable the Cisco-proprietary Unidirectional Link Detection (UDLD) protocol), which allows ports that are connected through fiber optics or copper Ethernet cables to monitor the physical configuration...
  • Page 68: Find

    Chapter 1 Basic System Commands find S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m find To find filenames beginning with a character string, use the find command.
  • Page 69: Format

    Chapter 1 Basic System Commands format S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m format To format the bootflash device, which erases its contents and restores it to its factory-shipped state, use the format command.
  • Page 70: Gunzip

    Chapter 1 Basic System Commands gunzip S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m gunzip To uncompress a compressed file, use the gunzip command.
  • Page 71: Gzip

    Chapter 1 Basic System Commands gzip S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m gzip To compress a file, use the gzip command.
  • Page 72: Hostname

    Chapter 1 Basic System Commands hostname S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m hostname To configure the hostname for the switch, use the hostname command.
  • Page 73: Install All

    Chapter 1 Basic System Commands install all S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m install all To install the kickstart and system images on a Cisco Nexus 5000 Series switch, use the install all command.
  • Page 74 Chapter 1 Basic System Commands install all S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 1-5 URL Prefix Keywords for Remote File Systems Keyword...
  • Page 75 Chapter 1 Basic System Commands install all S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to install the Cisco NX-OS software from an SCP server: switch# install all kickstart scp://adminuser@10.10.1.1/nx-os_kick.bin system bootflash:scp://adminuser@10.10.1.1/nx-os_sys.bin...
  • Page 76: Install License

    Chapter 1 Basic System Commands install license S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m install license To install a license, use the install license command.
  • Page 77: Line Console

    Chapter 1 Basic System Commands line console S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m line console To specify the console port and enter console port configuration mode, use the line console command.
  • Page 78: Line Vty

    Chapter 1 Basic System Commands line vty S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m line vty To specify the virtual terminal and enter line configuration mode, use the line vty command.
  • Page 79: Modem In

    Chapter 1 Basic System Commands modem in S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m modem in To enable the modem connection on the console port, use the modem in command.
  • Page 80: Modem Init-String

    Chapter 1 Basic System Commands modem init-string S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m modem init-string To download the initialization string to a modem connected to the console port, use the modem init-string command.
  • Page 81 Chapter 1 Basic System Commands modem init-string S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to download the user-input initialization string to the modem connected to the console port: switch# configure terminal...
  • Page 82: Modem Set-String User-Input

    Chapter 1 Basic System Commands modem set-string user-input S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m modem set-string user-input To configure the user-input initialization string to download to a modem connected to the console port, use the modem set-string user-input command.
  • Page 83: Move

    Chapter 1 Basic System Commands move S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m move To move a file from one directory to another, use the move command.
  • Page 84 Chapter 1 Basic System Commands move S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 85: Parity

    Chapter 1 Basic System Commands parity S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m parity To configure the parity for the console port, use the parity command.
  • Page 86: Ping

    Chapter 1 Basic System Commands ping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ping To determine the network connectivity to another network device, use the ping command.
  • Page 87 Chapter 1 Basic System Commands ping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 88: Ping6

    Chapter 1 Basic System Commands ping6 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ping6 To determine the network connectivity to another device using IPv6 addressing, use the ping6 command.
  • Page 89 Chapter 1 Basic System Commands ping6 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 90: Reload

    Chapter 1 Basic System Commands reload S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m reload To reload the switch and all attached Fabric Extender chassis or a specific Fabric Extender, use the reload command.
  • Page 91: Rmdir

    Chapter 1 Basic System Commands rmdir S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rmdir To remove a directory, use the rmdir command.
  • Page 92: Run-Script

    Chapter 1 Basic System Commands run-script S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m run-script To run a command script file at the command-line interface (CLI), use the run-script command.
  • Page 93: Save

    Chapter 1 Basic System Commands save S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m save To save the current configuration session to a file, use the save command.
  • Page 94: Send

    Chapter 1 Basic System Commands send S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m send To send a message to the active user sessions, use the send command.
  • Page 95: Setup

    Chapter 1 Basic System Commands setup S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m setup To enter the basic device setup dialog, use the setup command.
  • Page 96: Session-Limit

    Chapter 1 Basic System Commands session-limit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m session-limit To configure the maximum number of the concurrent virtual terminal sessions on a device, use the session-limit command.
  • Page 97: Show Banner Motd

    Chapter 1 Basic System Commands show banner motd S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show banner motd To display the message-of-the-day (MOTD) banner, use the show banner motd command.
  • Page 98: Show Boot

    Chapter 1 Basic System Commands show boot S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show boot To display the boot variable configuration, use the show boot command.
  • Page 99: Show Cli Alias

    Chapter 1 Basic System Commands show cli alias S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show cli alias To display the command alias configuration, use the show cli alias command.
  • Page 100: Show Cli History

    Chapter 1 Basic System Commands show cli history S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show cli history To display the command history, use the show cli history command.
  • Page 101: Show Cli Variables

    Chapter 1 Basic System Commands show cli variables S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show cli variables To display the configuration of the CLI variables, use the show cli variables command.
  • Page 102: Show Clock

    Chapter 1 Basic System Commands show clock S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show clock To display the current date and time, use the show clock command.
  • Page 103: Show Copyright

    Chapter 1 Basic System Commands show copyright S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show copyright To display the Cisco NX-OS software copyright information, use the show copyright command.
  • Page 104: Show Debug Logfile

    Chapter 1 Basic System Commands show debug logfile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show debug logfile To display the contents of the debug logfile, use the show debug logfile command.
  • Page 105: Show Environment

    Chapter 1 Basic System Commands show environment S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show environment To display information about the hardware environment status, use the show environment command.
  • Page 106: Show File

    Chapter 1 Basic System Commands show file S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show file To display the contents of a file on the local memory, use the show file command.
  • Page 107: Show Hardware Internal

    Chapter 1 Basic System Commands show hardware internal S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show hardware internal To display information about the physical device hardware, use the show hardware internal command.
  • Page 108: Show Hostname

    Chapter 1 Basic System Commands show hostname S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show hostname To display the hostname for the switch, use the show hostname command.
  • Page 109: Show Incompatibility System

    Chapter 1 Basic System Commands show incompatibility system S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show incompatibility system To display the configuration incompatibilities between the running system image and an earlier system image prior to downgrading the Cisco NX-OS software, use the show incompatibility system...
  • Page 110: Show Install All

    Chapter 1 Basic System Commands show install all S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show install all To display information related to the operation of the install all command, use the show install all command.
  • Page 111: Show Inventory

    Chapter 1 Basic System Commands show inventory S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show inventory To display the physical inventory information for the switch hardware, use the show inventory command.
  • Page 112: Show License

    Chapter 1 Basic System Commands show license S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show license To display license information, use the show license command.
  • Page 113: Show License Host-Id

    Chapter 1 Basic System Commands show license host-id S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show license host-id To display the serial number (host ID) of the switch chassis to use for licensing, use the show license host-id command.
  • Page 114: Show License Usage

    Chapter 1 Basic System Commands show license usage S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show license usage To display license usage information, use the show license usage command.
  • Page 115 Chapter 1 Basic System Commands show license usage S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 1-6 show license usage Columns (continued) Column...
  • Page 116: Show Line

    Chapter 1 Basic System Commands show line S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show line To display terminal port configuration information, use the show line command.
  • Page 117: Show Module

    Chapter 1 Basic System Commands show module S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show module To display module information, use the show module command.
  • Page 118: Show Processes

    Chapter 1 Basic System Commands show processes S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show processes To display the process information for the switch, use the show processes command.
  • Page 119: Show Processes Cpu

    Chapter 1 Basic System Commands show processes cpu S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show processes cpu To display the CPU utilization information for processes on the device, use the show processes cpu command.
  • Page 120: Show Processes Log

    Chapter 1 Basic System Commands show processes log S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show processes log To display the contents of the process log, use the show processes log command.
  • Page 121: Show Processes Memory

    Chapter 1 Basic System Commands show processes memory S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show processes memory To display the memory allocation information for processes, use the show processes memory command.
  • Page 122: Show Running-Config

    Chapter 1 Basic System Commands show running-config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config To display the running configuration, use the show running-config command.
  • Page 123: Show Running-Config Diff

    Chapter 1 Basic System Commands show running-config diff S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config diff To display the differences between the running configuration and the startup configuration, use the show running-config diff command.
  • Page 124 Chapter 1 Basic System Commands show running-config diff S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 125: Show Sprom

    Chapter 1 Basic System Commands show sprom S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show sprom To display the contents of the serial PROM (SPROM) on the switch, use the show sprom command.
  • Page 126 Chapter 1 Basic System Commands show sprom S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 127: Show Startup-Config

    Chapter 1 Basic System Commands show startup-config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show startup-config To display the startup configuration, use the show startup-config command.
  • Page 128: Show Switchname

    Chapter 1 Basic System Commands show switchname S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show switchname To display the hostname for the device, use the show switchname command.
  • Page 129: Show System Cores

    Chapter 1 Basic System Commands show system cores S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show system cores To display the core filename, use the show system cores command.
  • Page 130: Show System Reset-Reason

    Chapter 1 Basic System Commands show system reset-reason S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show system reset-reason To display the reset history for the switch, use the show system reset-reason command.
  • Page 131: Show System Uptime

    Chapter 1 Basic System Commands show system uptime S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show system uptime To display the amount of time since the last system restart, use the show system uptime command.
  • Page 132: Show Tech-Support

    Chapter 1 Basic System Commands show tech-support S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show tech-support To display information for Cisco technical support, use the show tech-support command.
  • Page 133: Show Terminal

    Chapter 1 Basic System Commands show terminal S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show terminal To display information about the terminal configuration for a session, use the show terminal command.
  • Page 134: Show Version

    Chapter 1 Basic System Commands show version S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show version To display information about the software version, use the show version command.
  • Page 135: Sleep

    Chapter 1 Basic System Commands sleep S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m sleep To cause the command-line interface (CLI) to pause before displaying the prompt, use the sleep command.
  • Page 136: Speed

    Chapter 1 Basic System Commands speed S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m speed To configure the transmit and receive speed for the console port, use the speed command.
  • Page 137: Stopbits

    Chapter 1 Basic System Commands stopbits S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m stopbits To configure the stop bits for the console port, use the stopbits command.
  • Page 138: System Cores

    Chapter 1 Basic System Commands system cores S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m system cores To configure the destination for the system core, use the system cores command.
  • Page 139: System Startup-Config Unlock

    Chapter 1 Basic System Commands system startup-config unlock S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m system startup-config unlock To unlock the startup configuration file, use the system startup-config unlock command.
  • Page 140: Switchname

    Chapter 1 Basic System Commands switchname S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchname To configure the hostname for the device, use the switchname command.
  • Page 141: Tail

    Chapter 1 Basic System Commands tail S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m tail To display the last lines of a file, use the tail command.
  • Page 142: Terminal Length

    Chapter 1 Basic System Commands terminal length S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m terminal length To set the number of lines of output to display on the terminal screen for the current session before pausing, use the terminal length command.
  • Page 143: Terminal Session-Timeout

    Chapter 1 Basic System Commands terminal session-timeout S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m terminal session-timeout To set the terminal inactivity timeout for the current session, use the terminal session-timeout command.
  • Page 144: Terminal Terminal-Type

    Chapter 1 Basic System Commands terminal terminal-type S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m terminal terminal-type To set the terminal type for the current session, use the terminal terminal-type command.
  • Page 145: Terminal Width

    Chapter 1 Basic System Commands terminal width S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m terminal width To set the number of character columns on the terminal screen for the current line for a session, use the terminal width command.
  • Page 146: Traceroute

    Chapter 1 Basic System Commands traceroute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m traceroute To discover the routes that packets take when traveling to an IP address, use the traceroute command.
  • Page 147: Traceroute6

    Chapter 1 Basic System Commands traceroute6 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m traceroute6 To discover the routes that packets take when traveling to an IPv6 address, use the traceroute6 command.
  • Page 148: Update License

    Chapter 1 Basic System Commands update license S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m update license To update an existing license, use the update license command.
  • Page 149: Write Erase

    Chapter 1 Basic System Commands write erase S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m write erase To erase configurations in persistent memory areas, use the write erase command.
  • Page 150 Chapter 1 Basic System Commands write erase S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 1-126 OL-16599-01...
  • Page 151: Chapter 2 Ethernet Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Ethernet Commands This chapter describes the Cisco NX-OS Ethernet commands available on Cisco Nexus 5000 Series...
  • Page 152: Bandwidth (Interface)

    Chapter 2 Ethernet Commands bandwidth (interface) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m bandwidth (interface) To set the inherited and received bandwidth values for an interface, use the bandwidth command.
  • Page 153 Chapter 2 Ethernet Commands bandwidth (interface) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 154: Cdp

    Chapter 2 Ethernet Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To enable the Cisco Discovery Protocol (CDP) and configure CDP attributes, use the cdp command.
  • Page 155 Chapter 2 Ethernet Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to disable CDP on all Ethernet interfaces: switch# configure terminal switch(config)# no cdp enable...
  • Page 156: Cdp Enable

    Chapter 2 Ethernet Commands cdp enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cdp enable To enable the Cisco Discovery Protocol (CDP) on an Ethernet interface, use the cdp enable command.
  • Page 157: Channel-Group (Ethernet)

    Chapter 2 Ethernet Commands channel-group (Ethernet) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m channel-group (Ethernet) To assign and configure a physical interface to a EtherChannel, use the channel-group command.
  • Page 158 Chapter 2 Ethernet Commands channel-group (Ethernet) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Usage Guidelines Use this command to create a channel group that includes the interface that you are working on and to add or remove specific interfaces from the channel group.
  • Page 159 Chapter 2 Ethernet Commands channel-group (Ethernet) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Rate mode •...
  • Page 160: Clear Mac Access-List Counters

    Chapter 2 Ethernet Commands clear mac access-list counters S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear mac access-list counters To clear statistical information from the access list, use the clear mac access-list counters command.
  • Page 161: Clear Mac Dynamic

    Chapter 2 Ethernet Commands clear mac dynamic S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear mac dynamic To clear dynamic entries from the forwarding table, use the clear mac dynamic command.
  • Page 162: Clear Mac-Address-Table Dynamic

    Chapter 2 Ethernet Commands clear mac-address-table dynamic S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear mac-address-table dynamic To clear the dynamic address entries from the MAC address table, use the clear mac-address-table dynamic command.
  • Page 163 Chapter 2 Ethernet Commands clear mac-address-table dynamic S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 164: Clear Spanning-Tree Counters

    Chapter 2 Ethernet Commands clear spanning-tree counters S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear spanning-tree counters To clear the counters for the Spanning Tree Protocol (STP), use the clear spanning-tree counters command.
  • Page 165: Clear Spanning-Tree Detected-Protocol

    Chapter 2 Ethernet Commands clear spanning-tree detected-protocol S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear spanning-tree detected-protocol To restart the protocol migration, use the clear spanning-tree detected-protocol command.
  • Page 166: Delay (Interface)

    Chapter 2 Ethernet Commands delay (interface) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m delay (interface) To set a delay value for an interface, use the delay command.
  • Page 167: Description (Interface)

    Chapter 2 Ethernet Commands description (interface) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m description (interface) To add a description to an interface configuration, use the description command.
  • Page 168: Instance Vlan

    Chapter 2 Ethernet Commands instance vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m instance vlan To map a VLAN or a set of VLANs to a Multiple Spanning Tree instance (MSTI), use the instance vlan command.
  • Page 169 Chapter 2 Ethernet Commands instance vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 170: Interface Ethernet

    Chapter 2 Ethernet Commands interface ethernet S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface ethernet To enter interface configuration mode for an Ethernet IEEE 802.3 interface, use the interface ethernet command.
  • Page 171: Interface Port-Channel

    Chapter 2 Ethernet Commands interface port-channel S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface port-channel To create an EtherChannel interface and enter interface configuration mode, use the interface port-channel command.
  • Page 172 Chapter 2 Ethernet Commands interface port-channel S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description show lacp...
  • Page 173: Ip Igmp Snooping (Exec)

    Chapter 2 Ethernet Commands ip igmp snooping (EXEC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ip igmp snooping (EXEC) To enable Internet Group Management Protocol (IGMP), use the ip igmp snooping command.
  • Page 174: Ip Igmp Snooping (Vlan)

    Chapter 2 Ethernet Commands ip igmp snooping (VLAN) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ip igmp snooping (VLAN) To configure Internet Group Management Protocol (IGMP) on a VLAN, use the ip igmp snooping command.
  • Page 175 Chapter 2 Ethernet Commands ip igmp snooping (VLAN) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Keyword and Argument Description report-suppression...
  • Page 176: Lacp Port-Priority

    Chapter 2 Ethernet Commands lacp port-priority S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m lacp port-priority To set the priority for the physical interfaces for the Link Aggregation Control Protocol (LACP), use the lacp port-priority command.
  • Page 177: Lacp System-Priority

    Chapter 2 Ethernet Commands lacp system-priority S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m lacp system-priority To set the system priority of the switch for the Link Aggregation Control Protocol (LACP), use the lacp system-priority command.
  • Page 178: Link Debounce

    Chapter 2 Ethernet Commands link debounce S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m link debounce To enable the debounce timer on an interface, use the link debounce command.
  • Page 179: Mac-Address-Table Aging-Time

    Chapter 2 Ethernet Commands mac-address-table aging-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m mac-address-table aging-time To configure the aging time for entries in the MAC address table, use the mac-address-table aging-time command.
  • Page 180 Chapter 2 Ethernet Commands mac-address-table aging-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to change the length of time an entry remains in the MAC address table to 500 seconds for the entire switch:...
  • Page 181: Mac-Address-Table Notification

    Chapter 2 Ethernet Commands mac-address-table notification S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m mac-address-table notification To configure log message notification of MAC address table events, use the mac-address-table notification command.
  • Page 182: Mac-Address-Table Static

    Chapter 2 Ethernet Commands mac-address-table static S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m mac-address-table static To configure a static entry for the MAC address table, use the mac-address-table static command.
  • Page 183 Chapter 2 Ethernet Commands mac-address-table static S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 184: Monitor Session

    Chapter 2 Ethernet Commands monitor session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m monitor session Create a new SPAN session configuration or add to an existing session configuration with the monitor session command.
  • Page 185: Name (Vlan Configuration)

    Chapter 2 Ethernet Commands name (VLAN configuration) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m name (VLAN configuration) To set the name for a VLAN, use the name command.
  • Page 186: Name (Mst Configuration)

    Chapter 2 Ethernet Commands name (MST configuration) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m name (MST configuration) To set the name of a Multiple Spanning Tree (MST) region, use the name command.
  • Page 187: Port-Channel Load-Balance Ethernet

    Chapter 2 Ethernet Commands port-channel load-balance ethernet S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-channel load-balance ethernet To set the load-balancing method among the interfaces in the channel-group bundle, use the port-channel load-balance ethernet command.
  • Page 188 Chapter 2 Ethernet Commands port-channel load-balance ethernet S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 189: Private-Vlan

    Chapter 2 Ethernet Commands private-vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m private-vlan To configure private VLANs, use the private-vlan command.
  • Page 190 Chapter 2 Ethernet Commands private-vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m A community VLAN is defined as the VLAN that carries the traffic among community ports and from community ports to the promiscuous ports on the corresponding primary VLAN.
  • Page 191: Private-Vlan Association

    Chapter 2 Ethernet Commands private-vlan association S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m private-vlan association To configure the association between a primary VLAN and a secondary VLAN on a private VLAN, use the private-vlan association command.
  • Page 192 Chapter 2 Ethernet Commands private-vlan association S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Isolated and community VLANs can only be associated with one primary VLAN.
  • Page 193: Private-Vlan Synchronize

    Chapter 2 Ethernet Commands private-vlan synchronize S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m private-vlan synchronize To map the secondary VLANs to the same MST instance as the primary VLAN, use the private-vlan synchronize command.
  • Page 194: Revision

    Chapter 2 Ethernet Commands revision S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m revision To set the revision number for the Multiple Spanning Tree (MST) region configuration, use the revision command.
  • Page 195: Shutdown (Vlan Configuration)

    Chapter 2 Ethernet Commands shutdown (VLAN configuration) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m shutdown (VLAN configuration) To shut down the local traffic on a VLAN, use the shutdown command.
  • Page 196 Chapter 2 Ethernet Commands shutdown (VLAN configuration) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 197: Spanning-Tree Bpdufilter

    Chapter 2 Ethernet Commands spanning-tree bpdufilter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree bpdufilter To enable BPDU Filtering on the interface, use the spanning-tree bpdufilter command.
  • Page 198 Chapter 2 Ethernet Commands spanning-tree bpdufilter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 2-48 OL-16599-01...
  • Page 199: Spanning-Tree Bpduguard

    Chapter 2 Ethernet Commands spanning-tree bpduguard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree bpduguard To enable BPDU Guard on an interface, use the spanning-tree bpduguard command.
  • Page 200 Chapter 2 Ethernet Commands spanning-tree bpduguard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to enable BPDU Guard on this interface: switch(config-if)# spanning-tree bpduguard enable...
  • Page 201: Spanning-Tree Cost

    Chapter 2 Ethernet Commands spanning-tree cost S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree cost To set the path cost of the interface for Spanning Tree Protocol (STP) calculations, use the spanning-tree cost command.
  • Page 202 Chapter 2 Ethernet Commands spanning-tree cost S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The EtherChannel bundle is considered a single port.
  • Page 203: Spanning-Tree Guard

    Chapter 2 Ethernet Commands spanning-tree guard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree guard To enable or disable Loop Guard or Root Guard, use the spanning-tree guard command.
  • Page 204: Spanning-Tree Link-Type

    Chapter 2 Ethernet Commands spanning-tree link-type S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree link-type To configure a link type for a port, use the spanning-tree link-type command.
  • Page 205: Spanning-Tree Loopguard Default

    Chapter 2 Ethernet Commands spanning-tree loopguard default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree loopguard default To enable Loop Guard as a default on all spanning tree normal and network ports, use the spanning-tree loopguard default command.
  • Page 206: Spanning-Tree Mode

    Chapter 2 Ethernet Commands spanning-tree mode S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mode To switch between Rapid per VLAN Spanning Tree Plus (Rapid PVST+) and Multiple Spanning Tree (MST) Spanning Tree Protocol (STP) modes, use the spanning-tree mode command.
  • Page 207: Spanning-Tree Mst Configuration

    Chapter 2 Ethernet Commands spanning-tree mst configuration S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst configuration To enter the Multiple Spanning Tree (MST) configuration mode, use the spanning-tree mst configuration command.
  • Page 208 Chapter 2 Ethernet Commands spanning-tree mst configuration S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m In the unlikely event that two administrators commit a new configuration at exactly the same time, this warning message is displayed: % MST CFG:Configuration change lost because of concurrent access...
  • Page 209: Spanning-Tree Mst Cost

    Chapter 2 Ethernet Commands spanning-tree mst cost S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst cost To set the path-cost parameter for any Multiple Spanning Tree (MST) instance (including the common and internal spanning tree [CIST] with instance ID 0) use the spanning-tree mst cost command.
  • Page 210 Chapter 2 Ethernet Commands spanning-tree mst cost S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 211: Spanning-Tree Mst Forward-Time

    Chapter 2 Ethernet Commands spanning-tree mst forward-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst forward-time To set the forward-delay timer for all the instances on the switch, use the spanning-tree mst forward-time command.
  • Page 212: Spanning-Tree Mst Hello-Time

    Chapter 2 Ethernet Commands spanning-tree mst hello-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst hello-time To set the hello-time delay timer for all the instances on the switch, use the spanning-tree mst hello-time command.
  • Page 213: Spanning-Tree Mst Max-Age

    Chapter 2 Ethernet Commands spanning-tree mst max-age S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst max-age To set the max-age timer for all the instances on the switch, use the spanning-tree mst max-age command.
  • Page 214: Spanning-Tree Mst Max-Hops

    Chapter 2 Ethernet Commands spanning-tree mst max-hops S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst max-hops To specify the number of possible hops in the region before a bridge protocol data unit (BPDU) is discarded, use the spanning-tree mst max-hops command.
  • Page 215: Spanning-Tree Mst Port-Priority

    Chapter 2 Ethernet Commands spanning-tree mst port-priority S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst port-priority To set the port-priority parameters for any Multiple Spanning Tree (MST) instance, including the common and internal spanning tree (CIST) with instance ID 0, use the spanning-tree mst port-priority command.
  • Page 216: Spanning-Tree Mst Priority

    Chapter 2 Ethernet Commands spanning-tree mst priority S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst priority To set the bridge priority, use the spanning-tree mst priority command.
  • Page 217: Spanning-Tree Mst Root

    Chapter 2 Ethernet Commands spanning-tree mst root S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst root To designate the primary and secondary root and set the timer value for an instance, use the spanning-tree mst root command.
  • Page 218 Chapter 2 Ethernet Commands spanning-tree mst root S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 219: Spanning-Tree Mst Simulate Pvst

    Chapter 2 Ethernet Commands spanning-tree mst simulate pvst S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst simulate pvst To reenable specific interfaces to automatically interoperate between Multiple Spanning Tree (MST) and Rapid per VLAN Spanning Tree (Rapid PVST+), use the spanning-tree mst simulate pvst command.
  • Page 220 Chapter 2 Ethernet Commands spanning-tree mst simulate pvst S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to prevent specified ports from automatically interoperating with a connected device running Rapid PVST+:...
  • Page 221: Spanning-Tree Mst Simulate Pvst Global

    Chapter 2 Ethernet Commands spanning-tree mst simulate pvst global S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree mst simulate pvst global To prevent the Multiple Spanning Tree (MST) switch from automatically interoperating with a connecting device running Rapid per VLAN Spanning Tree (Rapid PVST+), use the no spanning-tree...
  • Page 222 Chapter 2 Ethernet Commands spanning-tree mst simulate pvst global S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to prevent all ports on the switch from automatically interoperating with a connected device running Rapid PVST+:...
  • Page 223: Spanning-Tree Pathcost Method

    Chapter 2 Ethernet Commands spanning-tree pathcost method S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree pathcost method To set the default path-cost calculation method, use the spanning-tree pathcost method command.
  • Page 224: Spanning-Tree Port Type Edge

    Chapter 2 Ethernet Commands spanning-tree port type edge S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port type edge To configure an interface connected to a host as an edge port, which automatically transitions the port to the spanning tree forwarding state without passing through the blocking or learning states, use the...
  • Page 225 Chapter 2 Ethernet Commands spanning-tree port type edge S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m When you use this command without the trunk keyword, the system returns an additional message similar to the following: %Portfast has been configured on Ethernet1/40 but will only...
  • Page 226: Spanning-Tree Port Type Edge Bpdufilter Default

    Chapter 2 Ethernet Commands spanning-tree port type edge bpdufilter default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port type edge bpdufilter default To enable BPDU Filtering by default on all spanning tree edge ports, use the spanning-tree port type edge bpdufilter default command.
  • Page 227 Chapter 2 Ethernet Commands spanning-tree port type edge bpdufilter default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to enable BPDU Filtering globally on all spanning tree edge operational ports by default:...
  • Page 228: Spanning-Tree Port Type Edge Bpduguard Default

    Chapter 2 Ethernet Commands spanning-tree port type edge bpduguard default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port type edge bpduguard default To enable BPDU Guard by default on all spanning tree edge ports, use the spanning-tree port type edge bpduguard default command.
  • Page 229 Chapter 2 Ethernet Commands spanning-tree port type edge bpduguard default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 230: Spanning-Tree Port Type Edge Default

    Chapter 2 Ethernet Commands spanning-tree port type edge default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port type edge default To configure all access ports that are connected to hosts as edge ports by default, use the spanning-tree port type edge default command.
  • Page 231 Chapter 2 Ethernet Commands spanning-tree port type edge default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 232: Spanning-Tree Port Type Network

    Chapter 2 Ethernet Commands spanning-tree port type network S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port type network To configure the interface that connects to a switch as a network spanning tree port, regardless of the global configuration, use the spanning-tree port type network command.
  • Page 233 Chapter 2 Ethernet Commands spanning-tree port type network S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to configure an interface connected to a switch or bridge as a spanning tree network port:...
  • Page 234: Spanning-Tree Port Type Network Default

    Chapter 2 Ethernet Commands spanning-tree port type network default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port type network default To configure all ports as spanning tree network ports by default, use the spanning-tree port type network default command.
  • Page 235 Chapter 2 Ethernet Commands spanning-tree port type network default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 236: Spanning-Tree Port-Priority

    Chapter 2 Ethernet Commands spanning-tree port-priority S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree port-priority To set an interface priority when two bridges compete for position as the root bridge, use the spanning-tree port-priority command.
  • Page 237: Spanning-Tree Vlan

    Chapter 2 Ethernet Commands spanning-tree vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m spanning-tree vlan To configure Spanning Tree Protocol (STP) parameters on a per-VLAN basis, use the spanning-tree vlan command.
  • Page 238 Chapter 2 Ethernet Commands spanning-tree vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Usage Guidelines When disabling spanning tree on a VLAN using the no spanning-tree vlan vlan-id command, ensure Caution...
  • Page 239: Speed (Ethernet)

    Chapter 2 Ethernet Commands speed (Ethernet) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m speed (Ethernet) To configure the transmit and receive speed for an Ethernet interface, use the speed command.
  • Page 240: State

    Chapter 2 Ethernet Commands state S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m state To set the operational state for a VLAN, use the state command.
  • Page 241: Svi Enable

    Chapter 2 Ethernet Commands svi enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m svi enable To enable the creation of VLAN interfaces, use the svi enable command.
  • Page 242: Switchport Access Vlan

    Chapter 2 Ethernet Commands switchport access vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport access vlan To set the access VLAN when the interface is in access mode, use the switchport access vlan command.
  • Page 243: Switchport Block

    Chapter 2 Ethernet Commands switchport block S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport block To prevent the unknown multicast or unicast packets from being forwarded, use the switchport block interface configuration command.
  • Page 244: Switchport Mode Private-Vlan Host

    Chapter 2 Ethernet Commands switchport mode private-vlan host S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport mode private-vlan host To set the interface type to be a host port for a private VLAN, use the switchport mode private-vlan host command.
  • Page 245: Switchport Mode Private-Vlan Promiscuous

    Chapter 2 Ethernet Commands switchport mode private-vlan promiscuous S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport mode private-vlan promiscuous To set the interface type to be a promiscuous port for a private VLAN, use the switchport mode private-vlan promiscuous command.
  • Page 246: Switchport Private-Vlan Host-Association

    Chapter 2 Ethernet Commands switchport private-vlan host-association S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport private-vlan host-association To define a private VLAN association for an isolated or community port, use the switchport private-vlan host-association command.
  • Page 247 Chapter 2 Ethernet Commands switchport private-vlan host-association S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 248: Switchport Private-Vlan Mapping

    Chapter 2 Ethernet Commands switchport private-vlan mapping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport private-vlan mapping To define the private VLAN association for a promiscuous port, use the switchport private-vlan mapping command.
  • Page 249 Chapter 2 Ethernet Commands switchport private-vlan mapping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to remove the all private VLAN association from the port: switch(config-if)# no switchport private-vlan mapping Related Commands...
  • Page 250: Udld (Configuration Mode)

    Chapter 2 Ethernet Commands udld (configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m udld (configuration mode) To configure the Unidirectional Link Detection (UDLD) protocol on the switch, use the udld command.
  • Page 251 Chapter 2 Ethernet Commands udld (configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to reset all ports that were shutdown by UDLD: switch# configure terminal switch(config)# udld reset...
  • Page 252: Udld (Ethernet)

    Chapter 2 Ethernet Commands udld (Ethernet) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m udld (Ethernet) To enable and configure the Unidirectional Link Detection (UDLD) protocol on an Ethernet interface, use the udld command.
  • Page 253: Vlan (Exec Mode)

    Chapter 2 Ethernet Commands vlan (EXEC mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vlan (EXEC mode) To add a VLAN or to enter the VLAN configuration mode, use the vlan command.
  • Page 254 Chapter 2 Ethernet Commands vlan (EXEC mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to add a range of new VLANs and enter VLAN configuration mode: switch(config)# vlan 2,5,10-12,20,25,4000 switch(config-vlan)#...
  • Page 255: Vrf Context

    Chapter 2 Ethernet Commands vrf context S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vrf context To create a virtual routing and forwarding instance (VRF) and enter VRF configuration mode, use the vrf context command.
  • Page 256 Chapter 2 Ethernet Commands vrf context S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 257: Chapter 3 Ethernet Show Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Ethernet Show Commands This chapter describes the Cisco NX-OS Ethernet show commands available on Cisco Nexus 5000 Series...
  • Page 258: Show Interface Mac-Address

    Chapter 3 Ethernet Show Commands show interface mac-address S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface mac-address To display the information about the MAC address, use the show interface mac-address command.
  • Page 259: Show Interface Private-Vlan Mapping

    Chapter 3 Ethernet Show Commands show interface private-vlan mapping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface private-vlan mapping To display information about private VLAN mapping for primary VLAN interfaces, use the show interface private-vlan mapping command.
  • Page 260: Show Interface Switchport

    Chapter 3 Ethernet Show Commands show interface switchport S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface switchport To display information about all the switch port interfaces, use the show interface switchport command.
  • Page 261: Show Interface Vlan

    Chapter 3 Ethernet Show Commands show interface vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface vlan To display brief descriptive information about specified VLANs, use the show interface vlan command.
  • Page 262 Chapter 3 Ethernet Show Commands show interface vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to display the status of the VLAN: switch# show interface vlan 5 status Related Commands...
  • Page 263: Show Ip Igmp Snooping

    Chapter 3 Ethernet Show Commands show ip igmp snooping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ip igmp snooping To display the Internet Group Management Protocol (IGMP) snooping configuration of the switch, use the show ip igmp snooping command.
  • Page 264: Show Lacp

    Chapter 3 Ethernet Show Commands show lacp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show lacp To display Link Aggregation Control Protocol (LACP) information, use the show lacp command.
  • Page 265: Show Mac-Address-Table Aging-Time

    Chapter 3 Ethernet Show Commands show mac-address-table aging-time S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show mac-address-table aging-time To display information about the time-out values for the MAC address table, use the show mac-address-table aging-time command.
  • Page 266: Show Mac-Address-Table Count

    Chapter 3 Ethernet Show Commands show mac-address-table count S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show mac-address-table count To display the number of entries currently in the MAC address table, use the show mac-address-table count command.
  • Page 267: Show Mac-Address-Table Notification

    Chapter 3 Ethernet Show Commands show mac-address-table notification S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show mac-address-table notification To display notifications about the MAC address table, use the show mac-address-table notification command.
  • Page 268: Show Mac-Address-Table

    Chapter 3 Ethernet Show Commands show mac-address-table S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show mac-address-table To display the information about the MAC address table, use the show mac-address-table command.
  • Page 269 Chapter 3 Ethernet Show Commands show mac-address-table S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to display the information about the MAC address table for a specific interface: switch# show mac address-table interface ethernet 1/3 This example shows how to display the static entries in the MAC address table:...
  • Page 270: Show Monitor Session

    Chapter 3 Ethernet Show Commands show monitor session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show monitor session To display information about the SPAN sessions, use the show monitor session command.
  • Page 271: Show Running-Config

    Chapter 3 Ethernet Show Commands show running-config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config To display the contents of the currently running configuration file, use the show running-config command.
  • Page 272: Show Running-Config Spanning-Tree

    Chapter 3 Ethernet Show Commands show running-config spanning-tree S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config spanning-tree To display the running configuration for the Spanning Tree Protocol (STP), use the show running-config spanning-tree command.
  • Page 273: Show Running-Config Vlan

    Chapter 3 Ethernet Show Commands show running-config vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config vlan To display the running configuration for a specified VLAN, use the show running-config vlan command.
  • Page 274: Show Spanning-Tree

    Chapter 3 Ethernet Show Commands show spanning-tree S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree To display information about the Spanning Tree Protocol (STP), use the show spanning-tree command.
  • Page 275 Chapter 3 Ethernet Show Commands show spanning-tree S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 3-1 describes the fields that are displayed in the output of show spanning-tree commands.
  • Page 276 Chapter 3 Ethernet Show Commands show spanning-tree S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description show spanning-tree...
  • Page 277: Show Spanning-Tree Active

    Chapter 3 Ethernet Show Commands show spanning-tree active S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree active To display STP information on STP-active interfaces only, use the show spanning-tree active command.
  • Page 278: Show Spanning-Tree Bridge

    Chapter 3 Ethernet Show Commands show spanning-tree bridge S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree bridge To display status and configuration of the local bridge, use the show spanning-tree bridge command.
  • Page 279 Chapter 3 Ethernet Show Commands show spanning-tree bridge S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description show spanning-tree...
  • Page 280: Show Spanning-Tree Brief

    Chapter 3 Ethernet Show Commands show spanning-tree brief S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree brief To display a brief summary of the STP status and configuration on the switch, use the show spanning-tree brief command.
  • Page 281: Show Spanning-Tree Detail

    Chapter 3 Ethernet Show Commands show spanning-tree detail S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree detail To display detailed information on the STP status and configuration on the switch, use the show spanning-tree detail command.
  • Page 282: Show Spanning-Tree Interface

    Chapter 3 Ethernet Show Commands show spanning-tree interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree interface To display information on the STP interface status and configuration of specified interfaces, use the show spanning-tree interface command.
  • Page 283 Chapter 3 Ethernet Show Commands show spanning-tree interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to display STP information on a specified interface: switch(config)# show spanning-tree interface ethernet 1/3...
  • Page 284: Show Spanning-Tree Mst

    Chapter 3 Ethernet Show Commands show spanning-tree mst S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree mst To display information on MST status and configuration, use the show spanning-tree mst command.
  • Page 285 Chapter 3 Ethernet Show Commands show spanning-tree mst S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to display STP information about specified MST interfaces: switch)# show spanning-tree mst interface ethernet 8/2 This example shows how to display information about the MST configuration:...
  • Page 286: Show Spanning-Tree Root

    Chapter 3 Ethernet Show Commands show spanning-tree root S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree root To display the status and configuration of the root bridge, use the show spanning-tree root command.
  • Page 287 Chapter 3 Ethernet Show Commands show spanning-tree root S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description show spanning-tree...
  • Page 288: Show Spanning-Tree Summary

    Chapter 3 Ethernet Show Commands show spanning-tree summary S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree summary To display summary STP information on the switch, use the show spanning-tree summary command.
  • Page 289: Show Spanning-Tree Vlan

    Chapter 3 Ethernet Show Commands show spanning-tree vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show spanning-tree vlan To display STP information for specified VLANs, use the show spanning-tree vlan command.
  • Page 290 Chapter 3 Ethernet Show Commands show spanning-tree vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m inconsistentports ((Optional) Displays the ports that are in an inconsistent STP state for specified VLANs.
  • Page 291 Chapter 3 Ethernet Show Commands show spanning-tree vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description show spanning-tree...
  • Page 292: Show Startup-Config

    Chapter 3 Ethernet Show Commands show startup-config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show startup-config To display the contents of the currently running configuration file, use the show startup-config command.
  • Page 293: Show Vlan

    Chapter 3 Ethernet Show Commands show vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show vlan To display VLAN information, use the show vlan command.
  • Page 294 Chapter 3 Ethernet Show Commands show vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to display information for all VLANs on the switch: switch# show vlan...
  • Page 295: Show Vlan Id

    Chapter 3 Ethernet Show Commands show vlan id S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show vlan id To display information and statistics for an individual VLAN or a range of VLANs, use the show vlan id command.
  • Page 296: Show Vlan Private-Vlan

    Chapter 3 Ethernet Show Commands show vlan private-vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show vlan private-vlan To display private VLAN information, use the show vlan private-vlan command.
  • Page 297: Chapter 4 Fabric Extender Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Fabric Extender Commands This chapter describes the Cisco NX-OS commands used to manage a Cisco Nexus 2000 Series Fabric...
  • Page 298: Attach Fex

    Chapter 4 Fabric Extender Commands attach fex S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m attach fex To access the CLI of a connected Fabric Extender to run diagnostic commands, use the attach fex command.
  • Page 299: Beacon

    Chapter 4 Fabric Extender Commands beacon S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m beacon To turn on the locator beacon LED of a Fabric Extender, use the beacon command.
  • Page 300: Description (Fex)

    Chapter 4 Fabric Extender Commands description (fex) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m description (fex) To specify a description for a Fabric Extender, use the description command.
  • Page 301: Fex

    Chapter 4 Fabric Extender Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To create a Fabric Extender and enter Fabric Extender configuration mode, use the fex command.
  • Page 302: Fex Associate

    Chapter 4 Fabric Extender Commands fex associate S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fex associate To associate a Fabric Extender to a fabric interface, use the fex associate command.
  • Page 303: Fex Pinning Redistribute

    Chapter 4 Fabric Extender Commands fex pinning redistribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fex pinning redistribute To redistribute the host interfaces on a Fabric Extender, use the fex pinning redistribute command.
  • Page 304: Logging Fex

    Chapter 4 Fabric Extender Commands logging fex S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging fex To set the logging alert level for Fabric Extender events, use the logging fex command.
  • Page 305: Pinning Max-Links

    Chapter 4 Fabric Extender Commands pinning max-links S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m pinning max-links To specify the number of statically pinned uplinks, use the pinning max-links command.
  • Page 306 Chapter 4 Fabric Extender Commands pinning max-links S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 307: Serial

    Chapter 4 Fabric Extender Commands serial S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m serial To assign a serial number to a Fabric Extender, use the serial command.
  • Page 308 Chapter 4 Fabric Extender Commands serial S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 309: Show Diagnostic Result Fex

    Chapter 4 Fabric Extender Commands show diagnostic result fex S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show diagnostic result fex To display the results from the diagnostic tests for a Fabric Extender chassis, use the show diagnostic result fex command.
  • Page 310: Show Environment Fex

    Chapter 4 Fabric Extender Commands show environment fex S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show environment fex To display the environmental sensor status, use the show environment fex command.
  • Page 311: Show Fex

    Chapter 4 Fabric Extender Commands show fex S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show fex To display information about a specific Fabric Extender or all attached chassis, use the show fex command.
  • Page 312: Show Fex Transceiver

    Chapter 4 Fabric Extender Commands show fex transceiver S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show fex transceiver To display information about the transceiver connecting a Fabric Extender to the Cisco Nexus 5000 Series switch, use the show fex transceiver command.
  • Page 313: Show Fex Version

    Chapter 4 Fabric Extender Commands show fex version S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show fex version To display the version information about a Fabric Extender, use the show fex version command.
  • Page 314: Show Interface Fex-Fabric

    Chapter 4 Fabric Extender Commands show interface fex-fabric S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface fex-fabric To display all Fabric Extender fabric interfaces, use the show interface fex-fabric command.
  • Page 315: Show Interface Fex-Intf

    Chapter 4 Fabric Extender Commands show interface fex-intf S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface fex-intf To display the host interfaces pinned to a fabric interface, use the show interface fex-intf command.
  • Page 316: Show Interface Transceiver Fex-Fabric

    Chapter 4 Fabric Extender Commands show interface transceiver fex-fabric S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface transceiver fex-fabric To display information about all transceivers connected to fabric interfaces, use the show interface transceiver fex-fabric command.
  • Page 317: Switchport Mode Fex-Fabric

    Chapter 4 Fabric Extender Commands switchport mode fex-fabric S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport mode fex-fabric To set the interface type to be an uplink port for a Fabric Extender, use the switchport mode fex-fabric command.
  • Page 318 Chapter 4 Fabric Extender Commands switchport mode fex-fabric S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 4-22 OL-16599-01...
  • Page 319: Chapter 5 Quality Of Service Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Quality of Service Commands This chapter describes the Cisco NX-OS quality of service commands available on Cisco Nexus 5000...
  • Page 320: Class-Map

    Chapter 5 Quality of Service Commands class-map S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m class-map To create or modify a class map and enter the class-map configuration mode, use the class-map command.
  • Page 321: Flowcontrol

    Chapter 5 Quality of Service Commands flowcontrol S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m flowcontrol To enable IEEE 802.3x link-level flow control for the selected interface, use the flow-control command.
  • Page 322: Match Cos (Class Map Type Qos)

    Chapter 5 Quality of Service Commands match cos (class map type qos) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match cos (class map type qos) To define the class of traffic using the Class of Service (CoS) value in a type qos class map, use the match cos command.
  • Page 323: Match Access-Group

    Chapter 5 Quality of Service Commands match access-group S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match access-group To identify a specified access control list (ACL) group as a match criteria for a class map, use the match access-group command in the class map configuration mode.
  • Page 324: Match Class-Map

    Chapter 5 Quality of Service Commands match class-map S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match class-map To match on the match commands in a specified class map, use the match class-map command in the class map configuration mode.
  • Page 325: Match Cos (Class Map Type Qos)

    Chapter 5 Quality of Service Commands match cos (class map type qos) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match cos (class map type qos) To define the class of traffic using the Class of Service (CoS) value in a type qos class map, use the match cos command.
  • Page 326: Match Cos (Class Map Type Queuing)

    Chapter 5 Quality of Service Commands match cos (class map type queuing) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match cos (class map type queuing) To define the class of traffic in a type queuing class map, use the match cos command.
  • Page 327: Match Dscp

    Chapter 5 Quality of Service Commands match dscp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match dscp To identify specific Differentiated Services code point (DSCP) values as a match criteria, use the match dscp command.
  • Page 328 Chapter 5 Quality of Service Commands match dscp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 1 Standard DSCP Values (continued) List of DSCP Values...
  • Page 329: Match Ip Rtp

    Chapter 5 Quality of Service Commands match ip rtp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match ip rtp To configure a class map to use the Real-Time Protocol (RTP) port as a match criteria, use the match ip rtp command.
  • Page 330: Match Precedence

    Chapter 5 Quality of Service Commands match precedence S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match precedence To configure a class map to use the precedence value in the Type of Service (TOS) byte field of the IP header as a match criteria, use the match precedence command.
  • Page 331 Chapter 5 Quality of Service Commands match precedence S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This command does not require a license.
  • Page 332: Match Protocol

    Chapter 5 Quality of Service Commands match protocol S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match protocol To configure a class map to use a specific protocol as a match criterion, use the match protocol command.
  • Page 333 Chapter 5 Quality of Service Commands match protocol S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To specify more than one protocol, enter the command more than once with the desired protocol value each time.
  • Page 334: Policy-Map Type Qos

    Chapter 5 Quality of Service Commands policy-map type qos S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m policy-map type qos To create or modify a policy map and enter the policy map type qos configuration mode, use the policy-map type qos command.
  • Page 335: Priority-Flow-Control

    Chapter 5 Quality of Service Commands priority-flow-control S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m priority-flow-control To set the (priority-flow-control) PFC mode for the selected interface, use the priority-flow-control command.
  • Page 336: Service-Policy

    Chapter 5 Quality of Service Commands service-policy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m service-policy To attach a policy map to an interface, VLAN, or tunnel, use the service-policy command.
  • Page 337 Chapter 5 Quality of Service Commands service-policy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This command does not require a license.
  • Page 338: Show Class-Map Type Qos

    Chapter 5 Quality of Service Commands show class-map type qos S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show class-map type qos To display type qos class maps, use the show class-map type qos command.
  • Page 339: Show Class-Map Type Queuing

    Chapter 5 Quality of Service Commands show class-map type queuing S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show class-map type queuing To display type queuing class maps, use the show class-map type queuing command.
  • Page 340: Show Policy-Map

    Chapter 5 Quality of Service Commands show policy-map S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show policy-map To display policy maps and statistics, use the show policy-map command.
  • Page 341: Show Policy-Map Interface

    Chapter 5 Quality of Service Commands show policy-map interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show policy-map interface To display policy maps and statistics for the interfaces, use the show policy-map interface command.
  • Page 342: Show Policy-Map Interface Brief

    Chapter 5 Quality of Service Commands show policy-map interface brief S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show policy-map interface brief To display policy maps applied to interfaces in a brief format, use the show policy-map interface brief command.
  • Page 343: Show Interface Priority-Flow-Control

    Chapter 5 Quality of Service Commands show interface priority-flow-control S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show interface priority-flow-control To display the priority flow control details for a specified interface, use the show interface priority-flow-control command.
  • Page 344: Show Policy-Map Interface

    Chapter 5 Quality of Service Commands show policy-map interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show policy-map interface To display the system policy configured on the system and per class statistics, use the show policy-map interface command.
  • Page 345: System Jumbomtu

    Chapter 5 Quality of Service Commands system jumbomtu S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m system jumbomtu To define the upper bound of any MTU in the system, use the system jumbomtu command.
  • Page 346: System Qos

    Chapter 5 Quality of Service Commands system qos S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m system qos To configure system policy, use the system qos command.
  • Page 347: Untagged Cos

    Chapter 5 Quality of Service Commands untagged cos S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m untagged cos Ethernet frames received with no CoS value are given a CoS value of 0.
  • Page 348 Chapter 5 Quality of Service Commands untagged cos S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 5-30 OL-16599-01...
  • Page 349: Chapter 6 Security Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Security Commands This chapter describes the Cisco NX-OS security commands available on Cisco Nexus 5000 Series...
  • Page 350: Aaa Accounting Default

    Chapter 6 Security Commands aaa accounting default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m aaa accounting default To configure authentication, authorization, and accounting (AAA) methods for accounting, use the aaa accounting default command.
  • Page 351: Aaa Authentication Login Console

    Chapter 6 Security Commands aaa authentication login console S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m aaa authentication login console To configure AAA authentication methods for console logins, use the aaa authentication login console command.
  • Page 352 Chapter 6 Security Commands aaa authentication login console S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 353: Aaa Authentication Login Default

    Chapter 6 Security Commands aaa authentication login default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m aaa authentication login default To configure the default AAA authentication methods, use the aaa authentication login default command.
  • Page 354 Chapter 6 Security Commands aaa authentication login default S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 355: Aaa Authentication Login Error-Enable

    Chapter 6 Security Commands aaa authentication login error-enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m aaa authentication login error-enable To configure that the AAA authentication failure message displays on the console, use the aaa authentication login error-enable command.
  • Page 356: Aaa Authentication Login Mschap Enable

    Chapter 6 Security Commands aaa authentication login mschap enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m aaa authentication login mschap enable To enable Microsoft Challenge Handshake Authentication Protocol (MSCHAP) authentication at login, use the aaa authentication login mschap enable command.
  • Page 357: Aaa Group Server Radius

    Chapter 6 Security Commands aaa group server radius S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m aaa group server radius To create a RADIUS server group and enter RADIUS server group configuration mode, use the aaa group server radius command.
  • Page 358: Action

    Chapter 6 Security Commands action S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m action To specify what the switch does when a packet matches a permit command in a VLAN access control list (VACL), use the action command.
  • Page 359: Clear Access-List Counters

    Chapter 6 Security Commands clear access-list counters S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear access-list counters To clear the counters for all IPv4 access control lists (ACLs) or a single IPv4 ACL, use the clear access-list counters command.
  • Page 360: Clear Accounting Log

    Chapter 6 Security Commands clear accounting log S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear accounting log To clear the accounting log, use the clear accounting log command.
  • Page 361: Deadtime

    Chapter 6 Security Commands deadtime S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m deadtime To configure the dead-time interval for a RADIUS or TACACS+ server group, use the deadtime command.
  • Page 362 Chapter 6 Security Commands deadtime S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description show radius-server...
  • Page 363: Deny (Ipv4)

    Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m deny (IPv4) To create an IPv4 ACL rule that denies traffic matching its conditions, use the deny command.
  • Page 364 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Syntax Description sequence-number (Optional) Sequence number of the deny command, which causes the switch...
  • Page 365 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m dscp dscp (Optional) Specifies that the rule matches only those packets with the specified 6-bit differentiated services value in the DSCP field of the IP...
  • Page 366 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m precedence precedence (Optional) Specifies that the rule matches only packets that have an IP Precedence field with the value specified by the precedence argument.
  • Page 367 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m operator port [port] (Optional;...
  • Page 368 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m If you do not specify a sequence number, the switch assigns the rule a sequence number that is 10 greater than the last rule in the ACL.
  • Page 369 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example shows how to specify the source argument with the host keyword and the 192.168.67.132 IPv4 address: switch(config-acl)# deny icmp host 192.168.67.132 any...
  • Page 370 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-unreachable—Port unreachable •...
  • Page 371 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m lpd—Printer service (515) nntp—Network News Transport Protocol (119) pim-auto-rp—PIM Auto-RP (496)
  • Page 372 Chapter 6 Security Commands deny (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m syslog—System Logger (514) tacacs—TAC Access Control System (49) talk—Talk (517)
  • Page 373: Deny (Ipv6)

    Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m deny (IPv6) To create an IPv6 ACL rule that denies traffic matching its conditions, use the deny command.
  • Page 374 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Syntax Description sequence-number (Optional) Sequence number of the deny command, which causes the device...
  • Page 375 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m dscp dscp (Optional) Specifies that the rule matches only packets with the specified 6-bit differentiated services value in the DSCP field of the IPv6 header.
  • Page 376 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m (Optional) Specifies that the device generates an informational logging message about each packet that matches the rule.
  • Page 377 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m established (TCP only;...
  • Page 378 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m IPv6-address/prefix-len The following example shows how to specify the source argument with the IPv6 address and VLSM for the 2001:0db8:85a3:: network:...
  • Page 379 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m renum-result—Router renumbering result •...
  • Page 380 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m talk—Talk (517) telnet—Telnet (23) time—Time (37)
  • Page 381 Chapter 6 Security Commands deny (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to configure an IPv6 ACL named acl-lab13-ipv6 with rules denying all TCP and UDP traffic from the 2001:0db8:85a3:: and 2001:0db8:69f2:: networks to the...
  • Page 382: Deny (Mac)

    Chapter 6 Security Commands deny (MAC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m deny (MAC) To create a Media Access Control (MAC) access control list (ACL)+ rule that denies traffic matching its conditions, use the deny command.
  • Page 383 Chapter 6 Security Commands deny (MAC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command History Release Modification...
  • Page 384 Chapter 6 Security Commands deny (MAC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to configure a MAC ACL named mac-ip-filter with rules that permit any non-IPv4 traffic between two groups of MAC addresses:...
  • Page 385: Description (User Role)

    Chapter 6 Security Commands description (user role) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m description (user role) To configure a description for a user role, use the description command.
  • Page 386: Feature

    Chapter 6 Security Commands feature S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m feature To configure a feature in a user role feature group, use the feature command.
  • Page 387: Interface Policy Deny

    Chapter 6 Security Commands interface policy deny S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface policy deny To enter interface policy configuration mode for a user role, use the interface policy deny command.
  • Page 388: Ip Access-List

    Chapter 6 Security Commands ip access-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ip access-list To create an IPv4 access control list (ACL) or to enter IP access list configuration mode for a specific ACL, use the ip access-list command.
  • Page 389 Chapter 6 Security Commands ip access-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 390: Ip Port Access-Group

    Chapter 6 Security Commands ip port access-group S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ip port access-group To apply an IPv4 access control list (ACL) to an interface as a port ACL, use the ip port access-group command.
  • Page 391 Chapter 6 Security Commands ip port access-group S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to remove an IPv4 ACL named ip-acl-01 from Ethernet interface 1/2: switch(config)# interface ethernet 1/2 switch(config-if)# no ip port access-group ip-acl-01 in...
  • Page 392: Ipv6 Access-List

    Chapter 6 Security Commands ipv6 access-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ipv6 access-list To create an IPv6 access control list (ACL) or to enter IP access list configuration mode for a specific ACL, use the ipv6 access-list command.
  • Page 393: Ipv6 Port Traffic-Filter

    Chapter 6 Security Commands ipv6 port traffic-filter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ipv6 port traffic-filter To apply an IPv6 access control list (ACL) to an interface as a port ACL, use the ipv6 port traffic-filter command.
  • Page 394 Chapter 6 Security Commands ipv6 port traffic-filter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to apply an IPv6 ACL named ipv6-acl to Ethernet interface 1/3: switch# configure terminal...
  • Page 395: Mac Access-List

    Chapter 6 Security Commands mac access-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m mac access-list To create a Media Access Control (MAC) access control list (ACL) or to enter MAC access list configuration mode for a specific ACL, use the mac access-list command.
  • Page 396 Chapter 6 Security Commands mac access-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description permit (MAC)
  • Page 397: Mac Port Access-Group

    Chapter 6 Security Commands mac port access-group S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m mac port access-group To apply a MAC access control list (ACL) to an interface, use the mac port access-group command.
  • Page 398 Chapter 6 Security Commands mac port access-group S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to remove a MAC ACL named mac-acl-01 from Ethernet interface 1/2: switch(config)# interface ethernet 1/2 switch(config-if)# no mac port access-group mac-acl-01...
  • Page 399: Match

    Chapter 6 Security Commands match S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m match To specify an access control list (ACL) for traffic filtering in a VLAN access map, use the match command.
  • Page 400 Chapter 6 Security Commands match S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 6-52 OL-16599-01...
  • Page 401: Permit (Ipv4)

    Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m permit (IPv4) To create an IPv4 access control list (ACL) rule that permits traffic matching its conditions, use the permit command.
  • Page 402 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Syntax Description sequence-number (Optional) Sequence number of the permit command, which causes the...
  • Page 403 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m dscp dscp (Optional) Specifies that the rule matches only those packets with the specified 6-bit differentiated services value in the DSCP field of the IP...
  • Page 404 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m precedence precedence (Optional) Specifies that the rule matches only packets that have an IP Precedence field with the value specified by the precedence argument.
  • Page 405 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m operator port [port] (Optional;...
  • Page 406 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m If you do not specify a sequence number, the device assigns to the rule a sequence number that is 10 greater than the last rule in the ACL.
  • Page 407 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example shows how to specify the source argument with the host keyword and the 192.168.67.132 IPv4 address: switch(config-acl)# permit icmp host 192.168.67.132 any...
  • Page 408 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-unreachable—Port unreachable •...
  • Page 409 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m lpd—Printer service (515) nntp—Network News Transport Protocol (119) pim-auto-rp—PIM Auto-RP (496)
  • Page 410 Chapter 6 Security Commands permit (IPv4) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m syslog—System Logger (514) tacacs—TAC Access Control System (49) talk—Talk (517)
  • Page 411: Permit (Ipv6)

    Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m permit (IPv6) To create an IPv6 ACL rule that permits traffic matching its conditions, use the permit command.
  • Page 412 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Syntax Description sequence-number (Optional) Sequence number of the permit command, which causes the...
  • Page 413 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m dscp dscp (Optional) Specifies that the rule matches only packets with the specified 6-bit differentiated services value in the DSCP field of the IPv6 header.
  • Page 414 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m (Optional) Specifies that the device generates an informational logging message about each packet that matches the rule.
  • Page 415 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m established (TCP only;...
  • Page 416 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m IPv6-address/prefix-len The following example shows how to specify the source argument with the IPv6 address and VLSM for the 2001:0db8:85a3:: network:...
  • Page 417 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m renum-result—Router renumbering result •...
  • Page 418 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m talk—Talk (517) telnet—Telnet (23) time—Time (37)
  • Page 419 Chapter 6 Security Commands permit (IPv6) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to configure an IPv6 ACL named acl-lab13-ipv6 with rules permitting all TCP and UDP traffic from the 2001:0db8:85a3:: and 2001:0db8:69f2:: networks to the...
  • Page 420: Permit (Mac)

    Chapter 6 Security Commands permit (MAC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m permit (MAC) To create a MAC ACL rule that permits traffic matching its conditions, use the permit command.
  • Page 421 Chapter 6 Security Commands permit (MAC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command History Release Modification...
  • Page 422 Chapter 6 Security Commands permit (MAC) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to configure a MAC ACL named mac-ip-filter with a rule that permits all IPv4 traffic between two groups of MAC addresses:...
  • Page 423: Permit Interface

    Chapter 6 Security Commands permit interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m permit interface To add interfaces for a user role interface policy, use the permit interface command.
  • Page 424 Chapter 6 Security Commands permit interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Description role name...
  • Page 425: Permit Vlan

    Chapter 6 Security Commands permit vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m permit vlan To add VLANs for a user role VLAN policy, use the permit vlan command.
  • Page 426 Chapter 6 Security Commands permit vlan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 427: Permit Vrf

    Chapter 6 Security Commands permit vrf S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m permit vrf To add virtual routing and forwarding instances (VRFs) for a user role VRF policy, use the permit vrf command.
  • Page 428: Radius-Server Deadtime

    Chapter 6 Security Commands radius-server deadtime S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m radius-server deadtime To configure the dead-time interval for all RADIUS servers on a Cisco Nexus 5000 Series switch, use the radius-server deadtime command.
  • Page 429: Radius-Server Directed-Request

    Chapter 6 Security Commands radius-server directed-request S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m radius-server directed-request To allow users to send authentication requests to a specific RADIUS server when logging in, use the radius-server directed request command.
  • Page 430: Radius-Server Host

    Chapter 6 Security Commands radius-server host S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m radius-server host To configure RADIUS server parameters, use the radius-server host command.
  • Page 431 Chapter 6 Security Commands radius-server host S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m username name Specifies a username in the test packets.
  • Page 432: Radius-Server Key

    Chapter 6 Security Commands radius-server key S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m radius-server key To configure a RADIUS shared secret key, use the radius-server key command.
  • Page 433: Radius-Server Retransmit

    Chapter 6 Security Commands radius-server retransmit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m radius-server retransmit To specify the number of times that the switch should try a request with a RADIUS server, use the radius-server retransmit command.
  • Page 434: Radius-Server Timeout

    Chapter 6 Security Commands radius-server timeout S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m radius-server timeout To specify the time between retransmissions to the RADIUS servers, use the radius-server timeout command.
  • Page 435: Remark

    Chapter 6 Security Commands remark S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m remark To enter a comment into an IPv4 or MAC access control list (ACL), use the remark command.
  • Page 436 Chapter 6 Security Commands remark S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 437: Resequence

    Chapter 6 Security Commands resequence S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m resequence To reassign sequence numbers to all rules in an access control list (ACL) or a time range, use the resequence command.
  • Page 438 Chapter 6 Security Commands resequence S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to resequence an IPv4 ACL named ip-acl-01 with a starting sequence number of 100 and an increment of 10, using the show ip access-lists command to verify sequence numbering...
  • Page 439: Role Feature-Group Name

    Chapter 6 Security Commands role feature-group name S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m role feature-group name To create or specify a user role feature group and enter user role feature group configuration mode, use the role feature-group name command.
  • Page 440: Role Name

    Chapter 6 Security Commands role name S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m role name To create or specify a user role and enter user role configuration mode, use the role name command.
  • Page 441: Rule

    Chapter 6 Security Commands rule S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rule To configure rules for a user role, use the rule command.
  • Page 442 Chapter 6 Security Commands rule S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to remove rule from a user role: switch(config)# role MyRole switch(config-role)# no rule 10...
  • Page 443: Server

    Chapter 6 Security Commands server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m server To add a server to a RADIUS or TACACS+ server group, use the server command.
  • Page 444 Chapter 6 Security Commands server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to add a server to a TACACS+ server group: switch(config)# feature tacacs+ switch(config)# aaa group server tacacs+ TacServer...
  • Page 445: Show Aaa Accounting

    Chapter 6 Security Commands show aaa accounting S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show aaa accounting To display AAA accounting configuration, use the show aaa accounting command.
  • Page 446: Show Aaa Authentication

    Chapter 6 Security Commands show aaa authentication S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show aaa authentication To display AAA authentication configuration information, use the show aaa authentication command.
  • Page 447: Show Aaa Groups

    Chapter 6 Security Commands show aaa groups S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show aaa groups To display AAA server group configuration, use the show aaa groups command.
  • Page 448: Show Access-Lists

    Chapter 6 Security Commands show access-lists S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show access-lists To display all IPv4 and MAC access control lists (ACLs) or a specific ACL, use the show access-lists command.
  • Page 449: Show Accounting Log

    Chapter 6 Security Commands show accounting log S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show accounting log To display the accounting log contents, use the show accounting log command.
  • Page 450: Show Ip Access-Lists

    Chapter 6 Security Commands show ip access-lists S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ip access-lists To display all IPv4 ACLs or a specific IPv4 ACL, use the show ip access-lists command.
  • Page 451: Show Ipv6 Access-Lists

    Chapter 6 Security Commands show ipv6 access-lists S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ipv6 access-lists To display all IPv6 ACLs or a specific IPv6 ACL, use the show ipv6 access-lists command.
  • Page 452 Chapter 6 Security Commands show ipv6 access-lists S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 453: Show Mac Access-Lists

    Chapter 6 Security Commands show mac access-lists S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show mac access-lists To display all Media Access Control (MAC) access control lists (ACLs) or a specific MAC ACL, use the show mac access-lists command.
  • Page 454: Show Radius-Server

    Chapter 6 Security Commands show radius-server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show radius-server To display RADIUS server information, use the show radius-server command.
  • Page 455 Chapter 6 Security Commands show radius-server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to display information for a specified RADIUS server group: switch# show radius-server groups RadServer This example shows how to display sorted information for all RADIUS servers:...
  • Page 456: Show Role

    Chapter 6 Security Commands show role S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show role To display the user role configuration, use the show role command.
  • Page 457: Show Role Feature

    Chapter 6 Security Commands show role feature S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show role feature To display the user role features, use the show role feature command.
  • Page 458: Show Role Feature-Group

    Chapter 6 Security Commands show role feature-group S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show role feature-group To display the user role feature groups, use the show role feature-group command.
  • Page 459: Show Running-Config Aaa

    Chapter 6 Security Commands show running-config aaa S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config aaa To display authentication, authorization, and accounting (AAA) configuration information in the running configuration, use the show running-config aaa command.
  • Page 460: Show Running-Config Radius

    Chapter 6 Security Commands show running-config radius S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config radius To display RADIUS server information in the running configuration, use the show running-config radius command.
  • Page 461: Show Running-Config Security

    Chapter 6 Security Commands show running-config security S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show running-config security To display user account, SSH server, and Telnet server information in the running configuration, use the show running-config security command.
  • Page 462: Show Ssh Key

    Chapter 6 Security Commands show ssh key S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ssh key To display the Secure Shell (SSH) server key, use the show ssh key command.
  • Page 463: Show Ssh Server

    Chapter 6 Security Commands show ssh server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ssh server To display the Secure Shell (SSH) server status, use the show ssh server command.
  • Page 464: Show Startup-Config Aaa

    Chapter 6 Security Commands show startup-config aaa S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show startup-config aaa To display authentication, authorization, and accounting (AAA) configuration information in the startup configuration, use the show startup-config aaa command.
  • Page 465: Show Startup-Config Radius

    Chapter 6 Security Commands show startup-config radius S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show startup-config radius To display RADIUS configuration information in the startup configuration, use the show startup-config radius command.
  • Page 466: Show Startup-Config Security

    Chapter 6 Security Commands show startup-config security S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show startup-config security To display user account, SSH server, and Telnet server configuration information in the startup configuration, use the show startup-config security command.
  • Page 467: Show Tacacs-Server

    Chapter 6 Security Commands show tacacs-server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show tacacs-server To display TACACS+ server information, use the show tacacs-server command.
  • Page 468 Chapter 6 Security Commands show tacacs-server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to display information for TACACS+ server groups: switch# show tacacs-server groups This example shows how to display information for a specified TACACS+ server group:...
  • Page 469: Show Telnet Server

    Chapter 6 Security Commands show telnet server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show telnet server To display the Telnet server status, use the show telnet server command.
  • Page 470: Show User-Account

    Chapter 6 Security Commands show user-account S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show user-account To display information about the user accounts on the switch, use the show user-account command.
  • Page 471: Show Users

    Chapter 6 Security Commands show users S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show users To display the users currently logged on the switch, use the show users command.
  • Page 472: Show Vlan Access-List

    Chapter 6 Security Commands show vlan access-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show vlan access-list To display the contents of the IPv4 ACL or MAC ACL associated with a specific VLAN access map, use the show vlan access-list command.
  • Page 473: Show Vlan Access-Map

    Chapter 6 Security Commands show vlan access-map S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show vlan access-map To display all VLAN access maps or a VLAN access map, use the show vlan access-map command.
  • Page 474: Show Vlan Filter

    Chapter 6 Security Commands show vlan filter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show vlan filter To display information about instances of the vlan filter command, including the VLAN access map and the VLAN IDs affected by the command, use the show vlan filter command.
  • Page 475: Ssh

    Chapter 6 Security Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To create a Secure Shell (SSH) session using IPv4, use the ssh command.
  • Page 476: Ssh6

    Chapter 6 Security Commands ssh6 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ssh6 To create a Secure Shell (SSH) session using IPv6, use the ssh6 command.
  • Page 477: Ssh Key

    Chapter 6 Security Commands ssh key S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ssh key To create a Secure Shell (SSH) server key, use the ssh key command.
  • Page 478 Chapter 6 Security Commands ssh key S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to remove the DSA SSH server key: switch(config)# no ssh server enable switch(config)# no ssh key dsa...
  • Page 479: Ssh Server Enable

    Chapter 6 Security Commands ssh server enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ssh server enable To enable the Secure Shell (SSH) server, use the ssh server enable command.
  • Page 480: Storm-Control Level

    Chapter 6 Security Commands storm-control level S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m storm-control level To set the suppression level for traffic storm control, use the storm-control level command.
  • Page 481 Chapter 6 Security Commands storm-control level S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to disable the suppression mode for multicast traffic: switch(config-if)# no storm-control multicast level Related Commands...
  • Page 482: Tacacs-Server Deadtime

    Chapter 6 Security Commands tacacs-server deadtime S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m tacacs-server deadtime To set a periodic time interval where a nonreachable (nonresponsive) TACACS+ server is monitored for responsiveness, use the tacacs-server deadtime command.
  • Page 483: Tacacs-Server Directed-Request

    Chapter 6 Security Commands tacacs-server directed-request S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m tacacs-server directed-request To allow users to send authentication requests to a specific TACACS+ server when logging in, use the radius-server directed request command.
  • Page 484: Tacacs-Server Host

    Chapter 6 Security Commands tacacs-server host S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m tacacs-server host To configure TACACS+ server host parameters, use the tacacs-server host command.
  • Page 485 Chapter 6 Security Commands tacacs-server host S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command Modes Configuration mode Command History...
  • Page 486: Tacacs-Server Key

    Chapter 6 Security Commands tacacs-server key S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m tacacs-server key To configure a global TACACS+ shared secret key, use the tacacs-server key command.
  • Page 487: Tacacs-Server Timeout

    Chapter 6 Security Commands tacacs-server timeout S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m tacacs-server timeout To specify the time between retransmissions to the TACACS+ servers, use the tacacs-server timeout command.
  • Page 488: Telnet

    Chapter 6 Security Commands telnet S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m telnet To create a Telnet session using IPv4 on a Cisco Nexus 5000 Series switch, use the telnet command.
  • Page 489: Telnet Server Enable

    Chapter 6 Security Commands telnet server enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m telnet server enable To enable the Telnet server, use the telnet server enable command.
  • Page 490: Telnet6

    Chapter 6 Security Commands telnet6 S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m telnet6 To create a Telnet session using IPv6 on the NX-OS device, use the telnet6 command.
  • Page 491: Use-Vrf

    Chapter 6 Security Commands use-vrf S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m use-vrf To specify a virtual routing and forwarding instance (VRF) instance for a RADIUS or TACACS+ server group, use the use-vrf command.
  • Page 492 Chapter 6 Security Commands use-vrf S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 493: Username

    Chapter 6 Security Commands username S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m username To create and configure a user account, use the username command.
  • Page 494 Chapter 6 Security Commands username S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples This example shows how to create a user account with a password: switch(config)# username user1 password Ci5co321...
  • Page 495: Vlan Access-Map

    Chapter 6 Security Commands vlan access-map S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vlan access-map To create a new VLAN access map or to configure an existing VLAN access map, use the vlan access-map command.
  • Page 496: Vlan Filter

    Chapter 6 Security Commands vlan filter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vlan filter To apply a VLAN access map to one or more VLANs, use the vlan filter command.
  • Page 497 Chapter 6 Security Commands vlan filter S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 498: Vlan Policy Deny

    Chapter 6 Security Commands vlan policy deny S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vlan policy deny To enter VLAN policy configuration mode for a user role, use the vlan policy deny command.
  • Page 499: Vrf Policy Deny

    Chapter 6 Security Commands vrf policy deny S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vrf policy deny To enter virtual forwarding and routing instance (VRF) policy configuration mode for a user role, use the vrf policy deny command.
  • Page 500 Chapter 6 Security Commands vrf policy deny S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 6-152 OL-16599-01...
  • Page 501: Chapter 7 System Management Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R System Management Commands This chapter describes the system management commands available on Cisco Nexus 5000 Series...
  • Page 502: Clear Logging Nvram

    Chapter 7 System Management Commands clear logging nvram S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear logging nvram Use the clear logging nvram command to clear the NVRAM logs.
  • Page 503: Clear Logging Onboard

    Chapter 7 System Management Commands clear logging onboard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear logging onboard To clear the OBFL entries in the persistent log, use the clear logging onboard command.
  • Page 504: Clear Logging Session

    Chapter 7 System Management Commands clear logging session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear logging session Use the clear logging session command to clear the current logging session.
  • Page 505: Clear Ntp Session

    Chapter 7 System Management Commands clear ntp session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear ntp session To clear the Network Time Protocol (NTP) session, use the clear ntp session command.
  • Page 506: Clear Ntp Statistics

    Chapter 7 System Management Commands clear ntp statistics S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear ntp statistics To clear the Network Time Protocol (NTP) session, use the clear ntp session command.
  • Page 507: Logging Console

    Chapter 7 System Management Commands logging console S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging console Use the logging console command to enable logging messages to the console session.
  • Page 508: Logging Event

    Chapter 7 System Management Commands logging event S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging event Use the logging event command to log interface events.
  • Page 509: Logging Event Port

    Chapter 7 System Management Commands logging event port S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging event port Use the logging event port command to log events on an interface.
  • Page 510: Logging Level

    Chapter 7 System Management Commands logging level S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging level Use the logging level command to enable logging messages from the defined facility that have the specified severity level or higher.
  • Page 511 Chapter 7 System Management Commands logging level S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 512: Logging Logfile

    Chapter 7 System Management Commands logging logfile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging logfile Use the logging logfile command to configure the name of the log file used to store system messages and the minimum severity level to log.
  • Page 513 Chapter 7 System Management Commands logging logfile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 514: Logging Module

    Chapter 7 System Management Commands logging module S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging module Use the logging module command to enable module log messages.
  • Page 515: Logging Monitor

    Chapter 7 System Management Commands logging monitor S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging monitor Use the logging monitor command to enable the device to log messages to the monitor (terminal line).
  • Page 516: Logging Server

    Chapter 7 System Management Commands logging server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging server Use the logging server command to configure a remote syslog server at the specified host name or IPv4/IPv6 address.
  • Page 517 Chapter 7 System Management Commands logging server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to configure a remote syslog server at a specified host name, with severity level 5 or higher: switch(config)# logging server syslogA 5...
  • Page 518: Logging Timestamp

    Chapter 7 System Management Commands logging timestamp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging timestamp Use the logging timestamp command to set the logging timestamp units.
  • Page 519: Ntp

    Chapter 7 System Management Commands S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m To configure the NTP peers and servers for the switch, use the ntp command.
  • Page 520: Ntp Abort

    Chapter 7 System Management Commands ntp abort S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ntp abort To discard the Network Time Protocol (NTP) Cisco Fabric Services (CFS) distribution session in progress, use the ntp abort command.
  • Page 521: Ntp Commit

    Chapter 7 System Management Commands ntp commit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ntp commit To apply the pending configuration pertaining to the Network Time Protocol (NTP) Cisco Fabric Services (CFS) distribution session in progress in the fabric, use the ntp commit command.
  • Page 522: Ntp Distribute

    Chapter 7 System Management Commands ntp distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ntp distribute To enable Cisco Fabric Services (CFS) distribution for Network Time Protocol (NTP), use the ntp distribute command.
  • Page 523: Ntp Sync-Retry

    Chapter 7 System Management Commands ntp sync-retry S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m ntp sync-retry To retry synchronization with the configured NTP servers, use the ntp sync-retry command.
  • Page 524: Show Logging Console

    Chapter 7 System Management Commands show logging console S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging console Use the show logging console command to display the console logging configuration.
  • Page 525: Show Logging Info

    Chapter 7 System Management Commands show logging info S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging info Use the show logging info command to display the logging configuration.
  • Page 526: Show Logging Last

    Chapter 7 System Management Commands show logging last S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging last Use the show logging last command to display the last number of lines of the logfile.
  • Page 527: Show Logging Level

    Chapter 7 System Management Commands show logging level S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging level Use the show logging level command to display the facility logging severity level configuration.
  • Page 528: Show Logging Logfile

    Chapter 7 System Management Commands show logging logfile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging logfile Use the show logging logfile command to display the messages in the log file that were timestamped within the span entered.
  • Page 529: Show Logging Module

    Chapter 7 System Management Commands show logging module S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging module Use the show logging module command to display the module logging configuration.
  • Page 530: Show Logging Monitor

    Chapter 7 System Management Commands show logging monitor S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging monitor Use the show logging monitor command to display the monitor logging configuration.
  • Page 531: Show Logging Nvram

    Chapter 7 System Management Commands show logging nvram S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging nvram Use the show logging nvram command to display the messages in the NVRAM log.
  • Page 532: Show Logging Onboard

    Chapter 7 System Management Commands show logging onboard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging onboard To display the onboard logging information based on the error type, use the show logging onboard command.
  • Page 533 Chapter 7 System Management Commands show logging onboard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m bootflash: •...
  • Page 534 Chapter 7 System Management Commands show logging onboard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m -E—(Optional) Quits at the end of the file.
  • Page 535 Chapter 7 System Management Commands show logging onboard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m This example shows how to display the OBFL logging device information: switch# show logging onboard device-version ----------------------------...
  • Page 536 Chapter 7 System Management Commands show logging onboard S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The show logging onboard stack-trace command displays the following information: Time in seconds •...
  • Page 537: Show Logging Server

    Chapter 7 System Management Commands show logging server S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging server Use the show logging server command to display the syslog server configuration.
  • Page 538: Show Logging Session Status

    Chapter 7 System Management Commands show logging session status S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging session status Use the show logging session status command to display the logging session status.
  • Page 539: Show Logging Status

    Chapter 7 System Management Commands show logging status S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging status Use the show logging status command to display the logging status.
  • Page 540: Show Logging Timestamp

    Chapter 7 System Management Commands show logging timestamp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show logging timestamp Use the show logging timestamp command to display the logging timestamp configuration.
  • Page 541: Show Ntp Peer-Status

    Chapter 7 System Management Commands show ntp peer-status S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ntp peer-status To do display the status of the Network Time Protocol peers, use the show ntp peer-status command.
  • Page 542: Show Ntp Peers

    Chapter 7 System Management Commands show ntp peers S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ntp peers To display information about Network Time Protocol (NTP) peers, use the show ntp peers command.
  • Page 543: Show Ntp Statistics

    Chapter 7 System Management Commands show ntp statistics S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ntp statistics To display Network Time Protocol (NTP) statistics, use the show ntp statistics command.
  • Page 544: Show Ntp Timestamp-Status

    Chapter 7 System Management Commands show ntp timestamp-status S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m show ntp timestamp-status To display the Network Time Protocol timestamp information, use the show ntp timestamp-status command.
  • Page 545: System Message Logging Facilities

    Chapter 7 System Management Commands System Message Logging Facilities S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m System Message Logging Facilities Table 7-3 lists the facilities that you can use in system message logging configuration.
  • Page 546 Chapter 7 System Management Commands System Message Logging Facilities S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 7-3 System Message Logging Facilities (continued) Facility...
  • Page 547 Chapter 7 System Management Commands System Message Logging Facilities S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Table 7-3 System Message Logging Facilities (continued) Facility...
  • Page 548 Chapter 7 System Management Commands System Message Logging Facilities S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Cisco Nexus 5000 Series Command Reference 7-48 OL-16599-01...
  • Page 549: Chapter 8 Fibre Channel Commands

    S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m C H A P T E R Fibre Channel Commands This chapter describes the Cisco NX-OS Fibre Channel and virtual Fibre Channel commands available...
  • Page 550: Cfs Distribute

    Chapter 8 Fibre Channel Commands cfs distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs distribute To enable or disable Cisco Fabric Services (CFS) distribution on the switch, use the cfs distribute command.
  • Page 551: Cfs Ipv4 Distribute

    Chapter 8 Fibre Channel Commands cfs ipv4 distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs ipv4 distribute To enable Cisco Fabric Services (CFS) distribution over IPv4 for applications that want to use this feature, use the cfs ipv4 command.
  • Page 552 Chapter 8 Fibre Channel Commands cfs ipv4 distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 553: Cfs Ipv4 Mcast-Address

    Chapter 8 Fibre Channel Commands cfs ipv4 mcast-address S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs ipv4 mcast-address To configure an IPv4 multicast address for Cisco Fabric Services (CFS) distribution over IPv4, use the cfs ipv4 mcast-address command.
  • Page 554 Chapter 8 Fibre Channel Commands cfs ipv4 mcast-address S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 555: Cfs Ipv6 Distribute

    Chapter 8 Fibre Channel Commands cfs ipv6 distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs ipv6 distribute To enable Cisco Fabric Services (CFS) distribution over IPv6 for applications using CFS, use the cfs ipv6 distribute command.
  • Page 556 Chapter 8 Fibre Channel Commands cfs ipv6 distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 557: Cfs Ipv6 Mcast-Address

    Chapter 8 Fibre Channel Commands cfs ipv6 mcast-address S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs ipv6 mcast-address To configure an IPv6 multicast address for Cisco Fabric Services (CFS) distribution over IPv6, use the cfs ipv6 mcast-address command.
  • Page 558 Chapter 8 Fibre Channel Commands cfs ipv6 mcast-address S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 559: Cfs Region

    Chapter 8 Fibre Channel Commands cfs region S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs region To create a region that restricts the scope of application distribution to the selected switches, use the cfs region command.
  • Page 560: Cfs Staggered-Merge

    Chapter 8 Fibre Channel Commands cfs staggered-merge S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m cfs staggered-merge CFS can merge the data from multiple VSANs.
  • Page 561: Clear Device-Alias

    Chapter 8 Fibre Channel Commands clear device-alias S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear device-alias To clear device alias information, use the clear device-alias command.
  • Page 562: Clear Fcdomain

    Chapter 8 Fibre Channel Commands clear fcdomain S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fcdomain To clear the entire list of configured hosts, use the clear fcdomain command.
  • Page 563: Clear Fcflow Stats

    Chapter 8 Fibre Channel Commands clear fcflow stats S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fcflow stats To clear Fibre Channel flow statistics, use the clear fcflow stats command.
  • Page 564: Clear Fcns Statistics

    Chapter 8 Fibre Channel Commands clear fcns statistics S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fcns statistics To clear the name server statistics, use the clear fcns statistics command.
  • Page 565: Clear Fcsm Log

    Chapter 8 Fibre Channel Commands clear fcsm log S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fcsm log To clear the FCSM log, use the clear fcsm log command.
  • Page 566: Clear Fcs Statistics

    Chapter 8 Fibre Channel Commands clear fcs statistics S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fcs statistics To clear the fabric configuration server statistics, use the clear fcs statistics command.
  • Page 567: Clear Fctimer Session

    Chapter 8 Fibre Channel Commands clear fctimer session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fctimer session To clear fctimer Cisco Fabric Services (CFS) session configuration and locks, use the clear fctimer session command.
  • Page 568: Clear Fspf Counters

    Chapter 8 Fibre Channel Commands clear fspf counters S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear fspf counters To clear the Fabric Shortest Path First (FSPF) statistics, use the clear fspf counters command.
  • Page 569: Clear Port-Security

    Chapter 8 Fibre Channel Commands clear port-security S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear port-security To clear the port security information on the switch, use the clear port-security command.
  • Page 570: Clear Rlir

    Chapter 8 Fibre Channel Commands clear rlir S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear rlir To clear Registered Link Incident Report (RLIR) information, use the clear rlir command.
  • Page 571: Clear Rscn Session

    Chapter 8 Fibre Channel Commands clear rscn session S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear rscn session To clear a Registered State Change Notification (RSCN) session for a specified VSAN, use the clear rscn session command.
  • Page 572: Clear Rscn Statistics

    Chapter 8 Fibre Channel Commands clear rscn statistics S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear rscn statistics To clear the registered state change notification statistics for a specified VSAN, use the clear rscn statistics command.
  • Page 573: Clear Zone

    Chapter 8 Fibre Channel Commands clear zone S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m clear zone To clear all configured information in the zone server for a specified VSAN, use the clear zone command.
  • Page 574: Device-Alias Abort

    Chapter 8 Fibre Channel Commands device-alias abort S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias abort To discard a Distributed Device Alias Services (device alias) Cisco Fabric Services (CFS) distribution session in progress, use the device-alias abort command.
  • Page 575: Device-Alias Commit

    Chapter 8 Fibre Channel Commands device-alias commit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias commit To apply the pending configuration pertaining to the Distributed Device Alias Services (device alias) Cisco Fabric Services (CFS) distribution session in progress in the fabric, use the device-alias commit...
  • Page 576: Device-Alias Database

    Chapter 8 Fibre Channel Commands device-alias database S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias database To initiate a Distributed Device Alias Services (device alias) session and configure the device alias database, use the device-alias database command.
  • Page 577: Device-Alias Distribute

    Chapter 8 Fibre Channel Commands device-alias distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias distribute To enable Cisco Fabric Services (CFS) distribution for Distributed Device Alias Services (device alias), use the device-alias distribute command.
  • Page 578: Device-Alias Import Fcalias

    Chapter 8 Fibre Channel Commands device-alias import fcalias S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias import fcalias To import device alias database information from another VSAN, use the device-alias import fcalias command.
  • Page 579: Device-Alias Mode

    Chapter 8 Fibre Channel Commands device-alias mode S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias mode To configure device alias enhanced mode, use the device-alias mode command.
  • Page 580: Device-Alias Name

    Chapter 8 Fibre Channel Commands device-alias name S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias name To configure device names in the device alias database, use the device-alias name command.
  • Page 581: Device-Alias Rename

    Chapter 8 Fibre Channel Commands device-alias rename S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m device-alias rename To configure device names in the device alias database, use the device-alias rename command.
  • Page 582: Discover Custom-List

    Chapter 8 Fibre Channel Commands discover custom-list S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m discover custom-list To selectively initiate discovery for specified domain IDs in a VSAN, use the discover custom-list command.
  • Page 583: Discover Scsi-Target

    Chapter 8 Fibre Channel Commands discover scsi-target S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m discover scsi-target To discover SCSI targets on local storage to the switch or remote storage across the fabric, use the discover scsi-target command.
  • Page 584 Chapter 8 Fibre Channel Commands discover scsi-target S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example shows how to discover SCSI targets for the specified VSAN (1) and FCID (0x9c03d6): switch# discover scsi-target vsan 1 fcid 0x9c03d6 os aix...
  • Page 585: Fabric Profile

    Chapter 8 Fibre Channel Commands fabric profile S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fabric profile To utilize a preset QoS setting, use the fabric profile command.
  • Page 586: Fabric-Binding Activate

    Chapter 8 Fibre Channel Commands fabric-binding activate S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fabric-binding activate To activate fabric binding in a VSAN, use the fabric-binding activate command.
  • Page 587: Fabric-Binding Database Copy

    Chapter 8 Fibre Channel Commands fabric-binding database copy S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fabric-binding database copy To copy from the active fabric binding database to the configuration fabric binding database, use the fabric-binding database copy command.
  • Page 588: Fabric-Binding Database Diff

    Chapter 8 Fibre Channel Commands fabric-binding database diff S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fabric-binding database diff To view the differences between the active database and the configuration database in a VSAN, use the fabric-binding database diff command.
  • Page 589: Fabric-Binding Database Vsan

    Chapter 8 Fibre Channel Commands fabric-binding database vsan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fabric-binding database vsan To configure a user-specified fabric binding list in a VSAN, use the fabric-binding database vsan command.
  • Page 590 Chapter 8 Fibre Channel Commands fabric-binding database vsan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 591: Fabric-Binding Enable

    Chapter 8 Fibre Channel Commands fabric-binding enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fabric-binding enable To enable fabric binding in a VSAN, use the fabric-binding enable command.
  • Page 592: Fcalias Clone

    Chapter 8 Fibre Channel Commands fcalias clone S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcalias clone To clone a Fibre Channel alias, use the fcalias clone command.
  • Page 593: Fcalias Name

    Chapter 8 Fibre Channel Commands fcalias name S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcalias name To configure a Fibre Channel alias, use the fcalias name command.
  • Page 594: Fcalias Rename

    Chapter 8 Fibre Channel Commands fcalias rename S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcalias rename To rename a Fibre Channel alias (fcalias), use the fcalias rename command.
  • Page 595: Fcdomain

    Chapter 8 Fibre Channel Commands fcdomain S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcdomain To configure the Fibre Channel domain feature, use the fcdomain command.
  • Page 596 Chapter 8 Fibre Channel Commands fcdomain S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Usage Guidelines You can use this command to select the principal switch, configure domain ID distribution, reconfigure the fabric, and allocate FC IDs.
  • Page 597: Fcdomain Abort Vsan

    Chapter 8 Fibre Channel Commands fcdomain abort vsan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcdomain abort vsan To flush cached data without committing and release the lock, use the fcdomain abort vsan command.
  • Page 598: Fcdomain Commit Vsan

    Chapter 8 Fibre Channel Commands fcdomain commit vsan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcdomain commit vsan To commit cached data and release the lock, use the fcdomain commit vsan command.
  • Page 599: Fcdomain Distribute

    Chapter 8 Fibre Channel Commands fcdomain distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcdomain distribute To enable fabric distribution using Cisco Fabric Services (CFS), use the fcdomain distribute command.
  • Page 600: Fcdomain Rcf-Reject

    Chapter 8 Fibre Channel Commands fcdomain rcf-reject S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcdomain rcf-reject To enable the RCF reject flag for a Fibre Channel interface, use the fcdomain option.
  • Page 601: Fcdroplatency

    Chapter 8 Fibre Channel Commands fcdroplatency S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcdroplatency To configure the network and switch Fibre Channel drop latency time, use the fcdroplatency command.
  • Page 602: Fcflow Stats

    Chapter 8 Fibre Channel Commands fcflow stats S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcflow stats To configure fcflow statistics, use the fcflow stats command.
  • Page 603 Chapter 8 Fibre Channel Commands fcflow stats S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 604: Fcid-Allocation

    Chapter 8 Fibre Channel Commands fcid-allocation S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcid-allocation Use the fcid-allocation command to manually add a FCID to the default area company ID list.
  • Page 605: Fcinterop Fcid-Allocation

    Chapter 8 Fibre Channel Commands fcinterop fcid-allocation S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcinterop fcid-allocation To allocate FCIDs on the switch, use the fcinterop fcid-allocation command.
  • Page 606: Fcns No-Auto-Poll

    Chapter 8 Fibre Channel Commands fcns no-auto-poll S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcns no-auto-poll To enable or disable automatic polling in the name server database, use the fcns no-auto-poll command.
  • Page 607: Fcns Proxy-Port

    Chapter 8 Fibre Channel Commands fcns proxy-port S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcns proxy-port To register a name server proxy, use the fcns proxy-port command.
  • Page 608: Fcns Reject-Duplicate-Pwwn Vsan

    Chapter 8 Fibre Channel Commands fcns reject-duplicate-pwwn vsan S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcns reject-duplicate-pwwn vsan To reject duplicate Fibre Channel name server (FCNS) proxies on a VSAN, use the fcns reject-duplicate-pwwn vsan command.
  • Page 609: Fcping

    Chapter 8 Fibre Channel Commands fcping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcping To ping an N port, use the fcping command.
  • Page 610 Chapter 8 Fibre Channel Commands fcping S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example shows the setting of the timeout value.
  • Page 611: Fcroute

    Chapter 8 Fibre Channel Commands fcroute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcroute To configure Fibre Channel routes and to activate policy routing, use the fcroute command.
  • Page 612 Chapter 8 Fibre Channel Commands fcroute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example specifies the Fibre Channel interface, the route for the domain of the next hop switch, and the cost of the route for VSAN 1: switch(config)# fcroute 0x031211 interface fc1/1 domain 3 metric 1 vsan 1...
  • Page 613: Fcs Plat-Check-Global

    Chapter 8 Fibre Channel Commands fcs plat-check-global S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcs plat-check-global To enable FCS platform and node-name checking fabric wide, use the fcs plat-check-global command.
  • Page 614: Fcs Register

    Chapter 8 Fibre Channel Commands fcs register S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcs register To register FCS attributes, use the fcs register command.
  • Page 615: Fcs Virtual-Device-Add

    Chapter 8 Fibre Channel Commands fcs virtual-device-add S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcs virtual-device-add To include a virtual device in a query about zone information from an FCS, use the fcs virtual-device-add command.
  • Page 616: Fcsp

    Chapter 8 Fibre Channel Commands fcsp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcsp To configure an Fibre Channel Security Protocol (FC-SP) authentication mode for a specific interface in a FC-SP-enabled switch, use the fcsp command.
  • Page 617 Chapter 8 Fibre Channel Commands fcsp S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 618: Fcsp Dhchap

    Chapter 8 Fibre Channel Commands fcsp dhchap S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcsp dhchap To configure DHCHAP options in a switch, use the fcsp dhchap command.
  • Page 619 Chapter 8 Fibre Channel Commands fcsp dhchap S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example configures the use of only the SHA-1 hash algorithm: switch(config)# fcsp dhchap hash sha1 The following example configures the use of only the MD-5 hash algorithm:...
  • Page 620: Fcsp Enable

    Chapter 8 Fibre Channel Commands fcsp enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcsp enable To enable the Fibre Channel Security Protocol (FC-SP) in a switch, use the fcsp enable command.
  • Page 621: Fcsp Reauthenticate

    Chapter 8 Fibre Channel Commands fcsp reauthenticate S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcsp reauthenticate To reauthenticate a Fibre Channel or virtual Fibre Channel interface, use the fcsp reauthenticate command.
  • Page 622: Fcsp Timeout

    Chapter 8 Fibre Channel Commands fcsp timeout S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fcsp timeout To configure the timeout value for FC-SP message, use the fcsp timeout command.
  • Page 623: Fctimer

    Chapter 8 Fibre Channel Commands fctimer S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fctimer To change the default Fibre Channel timers, use the fctimer command.
  • Page 624: Fctimer Abort

    Chapter 8 Fibre Channel Commands fctimer abort S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fctimer abort To discard a Fibre Channel timer (fctimer) Cisco Fabric Services (CFS) distribution session in progress, use the fctimer abort command.
  • Page 625: Fctimer Commit

    Chapter 8 Fibre Channel Commands fctimer commit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fctimer commit To apply the pending configuration pertaining to the Fibre Channel timer (fctimer) Cisco Fabric Services (CFS) distribution session in progress in the fabric, use the fctimer commit command.
  • Page 626: Fctimer Distribute

    Chapter 8 Fibre Channel Commands fctimer distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fctimer distribute To enable Cisco Fabric Services (CFS) distribution for Fibre Channel timer (fctimer), use the fctimer distribute command.
  • Page 627: Fctrace

    Chapter 8 Fibre Channel Commands fctrace S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fctrace To trace the route to an N port, use the fctrace command.
  • Page 628: Fdmi Suppress-Updates

    Chapter 8 Fibre Channel Commands fdmi suppress-updates S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fdmi suppress-updates To suppress FDMI updates, use the fdmi suppress-updates command.
  • Page 629: Fspf Config

    Chapter 8 Fibre Channel Commands fspf config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf config To configure an FSPF feature for an entire VSAN, use the fspf config command.
  • Page 630 Chapter 8 Fibre Channel Commands fspf config S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command History Release Modification...
  • Page 631: Fspf Cost

    Chapter 8 Fibre Channel Commands fspf cost S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf cost To configure FSPF link cost for an FCIP interface, use the fspf cost command.
  • Page 632: Fspf Dead-Interval

    Chapter 8 Fibre Channel Commands fspf dead-interval S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf dead-interval To set the maximum interval for which a hello message must be received before the neighbor is considered lost, use the fspf dead-interval command.
  • Page 633: Fspf Enable

    Chapter 8 Fibre Channel Commands fspf enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf enable To enable FSPF for a VSAN, use the fspf enable command.
  • Page 634: Fspf Hello-Interval

    Chapter 8 Fibre Channel Commands fspf hello-interval S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf hello-interval To verify the health of the link, use the fspf hello-interval command.
  • Page 635: Fspf Passive

    Chapter 8 Fibre Channel Commands fspf passive S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf passive To disable the FSPF protocol for selected interfaces, use the fspf passive command.
  • Page 636: Fspf Retransmit-Interval

    Chapter 8 Fibre Channel Commands fspf retransmit-interval S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m fspf retransmit-interval To specify the time after which an unacknowledged link state update should be transmitted on the interface, use the fspf retransmit-interval command.
  • Page 637: In-Order-Guarantee

    Chapter 8 Fibre Channel Commands in-order-guarantee S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m in-order-guarantee To enable in-order delivery, use the in-order-guarantee command.
  • Page 638: Interface Fc

    Chapter 8 Fibre Channel Commands interface fc S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface fc To configure a Fibre Channel interface on a Cisco Nexus 5000 Series switch, use the interface fc command.
  • Page 639 Chapter 8 Fibre Channel Commands interface fc S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Command History Release Modification...
  • Page 640: Interface San-Port-Channel

    Chapter 8 Fibre Channel Commands interface san-port-channel S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface san-port-channel To configure a SAN port channel interface on a Cisco Nexus 5000 Series switch, use the interface san-port-channel command.
  • Page 641 Chapter 8 Fibre Channel Commands interface san-port-channel S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples The following example configures SAN port channel interface 3: switch(config)# interface san-port-channel 3...
  • Page 642: Interface Vfc

    Chapter 8 Fibre Channel Commands interface vfc S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m interface vfc To configure a virtual Fibre Channel interface on a Cisco Nexus 5000 Series switch, use the interface vfc command.
  • Page 643 Chapter 8 Fibre Channel Commands interface vfc S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 644: Logging Abort

    Chapter 8 Fibre Channel Commands logging abort S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging abort To discard the logging Cisco Fabric Services (CFS) distribution session in progress, use the logging abort command.
  • Page 645: Logging Commit

    Chapter 8 Fibre Channel Commands logging commit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging commit To apply the pending configuration pertaining to the logging Cisco Fabric Services (CFS) distribution session in progress in the fabric, use the logging commit command.
  • Page 646: Logging Distribute

    Chapter 8 Fibre Channel Commands logging distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m logging distribute To enable Cisco Fabric Services (CFS) distribution for logging, use the logging distribute command.
  • Page 647: Member (Fcalias Configuration Mode)

    Chapter 8 Fibre Channel Commands member (fcalias configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m member (fcalias configuration mode) To add a member name to a Fibre Channel alias on a VSAN, use the member command.
  • Page 648 Chapter 8 Fibre Channel Commands member (fcalias configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example shows how to delete the specified member: switch(config-fcalias)# no member interface fc3/1 Related Commands...
  • Page 649: Member (Zone Configuration Mode)

    Chapter 8 Fibre Channel Commands member (zone configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m member (zone configuration mode) To add a member name to a Fibre Channel zone, use the member command.
  • Page 650 Chapter 8 Fibre Channel Commands member (zone configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples The following example shows how to add a member to a zone called zs1 on VSAN 1: switch(config)# zone name zs1 vsan 1...
  • Page 651: Member (Zoneset Configuration Mode)

    Chapter 8 Fibre Channel Commands member (zoneset configuration mode) S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m member (zoneset configuration mode) To configure zone set members, use the member command in zone set configuration mode.
  • Page 652: Npiv Enable

    Chapter 8 Fibre Channel Commands npiv enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m npiv enable To enable N Port Identifier Virtualization (NPIV) for all VSANs on a switch, use the npiv enable command.
  • Page 653: Npv Auto-Load-Balance Disruptive

    Chapter 8 Fibre Channel Commands npv auto-load-balance disruptive S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m npv auto-load-balance disruptive To enable N Port Virtualization (NPV) disruptive load-balancing, use the npv auto-load-balance disruptive command.
  • Page 654: Npv Enable

    Chapter 8 Fibre Channel Commands npv enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m npv enable To enable N Port Virtualization (NPV) mode, use the npv enable command.
  • Page 655: Npv Traffic-Map

    Chapter 8 Fibre Channel Commands npv traffic-map S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m npv traffic-map To configure a N Port Virtualization (NPV) traffic map, use the npv traffic map command.
  • Page 656: Port-Security

    Chapter 8 Fibre Channel Commands port-security S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-security To configure port security features and reject intrusion attempts, use the port-security command.
  • Page 657 Chapter 8 Fibre Channel Commands port-security S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example deactivates the port security database for the specified VSAN, and automatically disables auto-learning: switch(config)# no port-security activate vsan 1...
  • Page 658: Port-Security Abort

    Chapter 8 Fibre Channel Commands port-security abort S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-security abort To discard the port security Cisco Fabric Services (CFS) distribution session in progress, use the port-security abort command.
  • Page 659: Port-Security Commit

    Chapter 8 Fibre Channel Commands port-security commit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-security commit To apply the pending configuration pertaining to the port security Cisco Fabric Services (CFS) distribution session in progress in the fabric, use the port-security commit command.
  • Page 660: Port-Security Database

    Chapter 8 Fibre Channel Commands port-security database S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-security database To copy the port security database or to view the difference within the port security database, use the port-security database command.
  • Page 661 Chapter 8 Fibre Channel Commands port-security database S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 662: Port-Security Distribute

    Chapter 8 Fibre Channel Commands port-security distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-security distribute To enable Cisco Fabric Services (CFS) distribution for port security, use the port-security distribute command.
  • Page 663: Port-Security Enable

    Chapter 8 Fibre Channel Commands port-security enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-security enable To enable port security, use the port-security enable command.
  • Page 664: Port-Track Enable

    Chapter 8 Fibre Channel Commands port-track enable S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-track enable To enable port tracking for indirect errors, use the port-track enable command.
  • Page 665: Port-Track Force-Shut

    Chapter 8 Fibre Channel Commands port-track force-shut S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-track force-shut To force a shutdown of a tracked port, use the port-track force-shut command.
  • Page 666: Port-Track Interface

    Chapter 8 Fibre Channel Commands port-track interface S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m port-track interface To enable port tracking for specific interfaces, use the port-track interface command.
  • Page 667: Purge Fcdomain Fcid

    Chapter 8 Fibre Channel Commands purge fcdomain fcid S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m purge fcdomain fcid To purge persistent FCIDs, use the purge fcdomain fcid command.
  • Page 668: Rlir Preferred-Cond Fcid

    Chapter 8 Fibre Channel Commands rlir preferred-cond fcid S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rlir preferred-cond fcid To specify a preferred host to receive Registered Link Incident Report (RLIR) frames, use the rlir preferred-cond fcid command.
  • Page 669 Chapter 8 Fibre Channel Commands rlir preferred-cond fcid S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Related Commands Command Description...
  • Page 670: Rscn

    Chapter 8 Fibre Channel Commands rscn S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rscn To configure a registered state change notification (RSCN), which is a Fibre Channel service that informs N ports about changes in the fabric, use the rscn command.
  • Page 671: Rscn Abort

    Chapter 8 Fibre Channel Commands rscn abort S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rscn abort To cancel a Registered State Change Notification (RSCN) configuration on a VSAN, use the rscn abort command.
  • Page 672: Rscn Commit

    Chapter 8 Fibre Channel Commands rscn commit S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rscn commit To apply a pending Registered State Change Notification (RSCN) configuration, use the rscn commit command.
  • Page 673: Rscn Distribute

    Chapter 8 Fibre Channel Commands rscn distribute S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rscn distribute To enable distribution of a Registered State Change Notification (RSCN) configuration, use the rscn distribute command.
  • Page 674: Rscn Event-Tov

    Chapter 8 Fibre Channel Commands rscn event-tov S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m rscn event-tov To configure an event timeout value for a Registered State Change Notification (RSCN) on a specified VSAN, use the rscn event-tov command.
  • Page 675: San-Port-Channel Persistent

    Chapter 8 Fibre Channel Commands san-port-channel persistent S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m san-port-channel persistent To convert an autocreated SAN port channel to a persistent SAN port channel, use the san-port-channel persistent command.
  • Page 676: Scsi-Target

    Chapter 8 Fibre Channel Commands scsi-target S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m scsi-target To configure SCSI target discovery, use the scsi-target command.
  • Page 677 Chapter 8 Fibre Channel Commands scsi-target S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m The following example removes SCSI target ns-polling discovery for VSAN 1: switch(config)# no scsi-target ns-poll vsan 1 The following example configures SCSI target on-demand discovery for VSAN 1:...
  • Page 678: Switchport

    Chapter 8 Fibre Channel Commands switchport S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport To configure a switch port parameter on a Fibre Channel or virtual Fibre Channel interface, use the switchport command.
  • Page 679 Chapter 8 Fibre Channel Commands switchport S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m vsan-id Specifies the VSAN ID.
  • Page 680 Chapter 8 Fibre Channel Commands switchport S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switch(config-if)# switchport trunk mode auto switch(config-if)# switchport trunk allowed vsan all switch(config-if)# switchport trunk allowed vsan 3...
  • Page 681: Switchport Ignore Bit-Errors

    Chapter 8 Fibre Channel Commands switchport ignore bit-errors S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m switchport ignore bit-errors To prevent the detection of bit error threshold events from disabling the interface on Fibre Channel interfaces, use the switchport ignore bit-errors command.
  • Page 682 Chapter 8 Fibre Channel Commands switchport ignore bit-errors S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m Examples The following example shows how to prevent the detection of bit error events from disabling the interface:...
  • Page 683: System Default Switchport

    Chapter 8 Fibre Channel Commands system default switchport S e n d c o m m e n t s t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m system default switchport To configure port attributes for Fibre Channel interfaces, use the system default switchport command.