- Preface
- Command-Line Interface
- action to channel-group
- channel-protocol to class-map
- clear cable-diagnostics tdr to copy /noverify
- define interface-range to duplex
- eigrp event-log-size to mls exclude
- mls flow to pagp port
- platform ip features pisa to process-min-time percent
- rcv-queue to show bootvar
- show cable-diagnostics to show ip cache
- show ip cef to show mls asic
- show mls cef to show qm-sp
- show queueing to show vtp
- shutdown vlan to test cable-diagnostics
- tunnel udlr address-resolution to username
- verify to wrr-queue
- wrr-queue cos-trap to wrr-queue threshold
- Acronyms
- Acknowledgments for Open-Source Software
- platform ip features pisa
- platform ip features sequential
- platform ipv6 acl icmp optimize neighbor-discovery
- platform scp retry interval
- platform vfi dot1q-transparency
- police (policy map)
- police rate
- policy-map
- port access-map
- port-channel load-balance
- port-channel load-balance mpls
- port-channel min-links
- port-channel per-module load-balance
- power enable
- power inline
- power redundancy-mode
- priority-queue cos-map
- priority-queue queue-limit
- private-vlan
- private-vlan mapping
- private-vlan synchronize
- process-min-time percent
platform ip features pisa
To configure the Intelligent Traffic Redirect (ITR) feature, which filters traffic to the PISA, use the platform ip features pisa command in interface configuration mode.
platform ip features pisa access-group {ip-acl-name | ip-acl-number} {input | output} [reverse-only]
Syntax Description
Command Default
This command has no default settings
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZYA1 |
Support for this command was introduced. |
Usage Guidelines
If you do not configure the platform ip features pisa command, all traffic on interfaces where you configure a PISA-accelerated feature is sent to the PISA.
This command can be configured on Layer 2 and Layer 3 ports, Layer 2 and Layer 3 trunks, Layer 2 and Layer 3 port-channel interfaces, multi-VLAN access ports (MVAPs), Layer 3 subinterfaces, and SVIs only. You cannot enter this command on other types of interfaces. An error message is displayed if you try to configure it on other interface types.
When you enter this command on a Layer 3 interface, the software automatically attempts to map a reverse ACL (also known as a mirror ACL) to the opposite direction of the same interface if the packets need to be seen by the PISA bidirectionally.
If you enter this command on a Layer 2 interface, hardware limitations prevent the reverse ACL from being mapped in the egress direction. On Layer 2 interfaces, the LTL copy mechanism captures all the packets.
Actions required by PISA-accelerated features:
When a PISA-accelerated feature is configured on the interface, the ITR ACL does the following:
•input—The ITR ACL redirects ingress (modify-direction) traffic permitted by the ACL to the PISA for the action required by the PISA-accelerated feature. Not-permitted ingress traffic is processed by the PFC3.
If automatically applied by the ITR feature, the reverse ITR ACL redirects egress (inspect-direction) traffic permitted by the reverse ACL to the PISA to collect statistics, maintain state, or collect other types of information.
•input reverse-only—All ingress (modify-direction) traffic goes to the PISA for the action required by the PISA-accelerated feature. The ITR ACL redirects egress (inspect-direction) traffic permitted by the ACL to the PISA to collect statistics, maintain state, or collect other types of information. With the reverse-only keyword, configure the ITR ACL only for the egress (inspect-direction) traffic.
•output—The ITR ACL redirects egress (modify-direction) traffic permitted by the ACL to the PISA for the action required by the PISA-accelerated feature. Not-permitted egress traffic is processed by the PFC3.
If automatically applied by the ITR feature, the reverse ITR ACL redirects ingress (inspect-direction) traffic permitted by the reverse ACL to the PISA for the action required by the PISA-accelerated feature.
•output reverse-only—All egress (modify-direction) traffic goes to the PISA for the action required by the PISA-accelerated feature. The ITR ACL redirects ingress (inspect-direction) traffic permitted by the ACL to the PISA for the action required by the PISA-accelerated feature. With the reverse-only keyword, configure the ITR ACL only for the ingress (inspect-direction) traffic.
Configure the ITR ACL to not permit traffic to which you want to apply PFC QoS.
To avoid sending excess traffic to the PISA, ensure that non-PISA capture-based features, such as VACL capture, OAL, and traffic for the NAM and IDS service modules, are not enabled when ITR is configured.
Traffic being processed by NetFlow-based features (for example, NAT and WCCP) might not be sent to the PISA when ITR is configured.
Examples
This example shows how to redirect egress traffic to the PISA:
Router(config-if)# platform ip features pisa access-group pisa_egress_redirect out
Router(config-if)#
Related Commands
platform ip features sequential
To enable IP precedence-based or DSCP-based egress QoS filtering to use any IP precedence or DSCP policing or marking changes made by ingress PFC QoS, use the platform ip features sequential command. To return to the default settings, use the no form of this command.
platform ip features sequential [access-group {ip-acl-name | ip-acl-number}]
no platform ip features sequential [access-group {ip-acl-name | ip-acl-number}]
Syntax Description
Command Default
IP precedence-based or DSCP-based egress QoS filtering uses received IP precedence or DSCP values and does not use any IP precedence or DSCP changes made by ingress QoS as the result of policing or marking.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
The enhanced egress-QoS filtering enables the IP precedence-based or DSCP-based egress-QoS filtering to use any IP precedence or DSCP policing or marking changes made by ingress QoS.
The nonenhanced egress-QoS filtering behavior is the normal Catalyst 6500 series switch behavior when QoS is applied in the hardware.
The PFC3 provides egress PFC QoS only for Layer 3-switched and routed traffic on egress Layer 3 interfaces (either LAN ports configured as Layer 3 interfaces or VLAN interfaces).
You configure enhanced egress QoS filtering on ingress Layer 3 interfaces (either LAN ports configured as Layer 3 interfaces or VLAN interfaces).
To enable enhanced egress QoS filtering only for the traffic filtered by a specific standard, extended named, or extended numbered IP ACL, enter the IP ACL name or number.
If you do not enter an IP ACL name or number, enhanced egress QoS filtering is enabled for all IP ingress IP traffic on the interface.
Note•When you configure enhanced egress-QoS filtering, the PFC3 processes traffic to apply ingress PFC QoS. The PFC3 applies ingress-QoS filtering and Catalyst 6500 series switch hardware ingress QoS. The PFC3 incorrectly applies any egress-QoS filtering and Catalyst 6500 series switch hardware egress QoS that is configured on the ingress interface.
•If you configure enhanced egress-QoS filtering on an interface that uses Layer 2 features to match the IP precedence or DSCP as modified by ingress-QoS marking, the packets are redirected or dropped and prevented from being processed by egress QoS.
•If you enable enhanced egress-QoS filtering, the hardware acceleration of NetFlow-based features such as reflexive ACL, NAT, and TCP intercept are disabled.
To verify configuration, use the show running-config interface command.
Examples
This example shows how to enable enhanced egress-QoS filtering:
Router(config-if)# platform ip features sequential
Router(config-if)#
This example shows how to disable enhanced egress-QoS filtering:
Router(config-if)# no platform ip features sequential
Router(config-if)#
Related Commands
|
|
---|---|
show running-config interface |
Displays the contents of the currently running configuration file. |
platform ipv6 acl icmp optimize neighbor-discovery
To optimize TCAM support for IPv6 ACLs, use the platform ipv6 acl icmp optimize neighbor-discovery command. To disable optimization of TCAM support for IPv6 ACLs, use the no form of this command.
platform ipv6 acl icmp optimize neighbor-discovery
no platform ipv6 acl icmp optimize neighbor-discovery
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
Note Use this command under the direction of the Cisco TAC only.
When you enable optimization of the TCAM support for IPv6 ACLs, the global ICMPv6 neighbor-discovery ACL at the top of the TCAM is programmed to permit all ICMPv6 neighbor-discovery packets. Enabling optimization prevents the addition of ICMPv6 ACEs at the end of every IPv6 security ACL, reducing the number of TCAM resources being used. Enabling this command reprograms IPv6 ACLs on all interfaces.
Note The ICMPv6 neighbor-discovery ACL at the top of the TCAM takes precedence over security ACLs for ICMP neighbor-discovery packets that you have configured, but has no effect if you have a bridge/deny that overlaps with the global ICMP ACL.
Examples
This example shows how to optimize TCAM support for IPv6 ACLs:
Router(config)# platform ipv6 acl icmp optimize neighbor-discovery
Router(config)#
This example shows how to disable optimization of TCAM support for IPv6 ACLs:
Router(config)# no platform ipv6 acl icmp optimize neighbor-discovery
Router(config)#
platform scp retry interval
To enable SCP fast retry and set the fast-retry interval, use the platform scp retry interval command. To disable SCP fast retry, use the no form of this command.
platform scp retry interval timeout-value
no platform scp retry interval
Syntax Description
timeout-value |
Fast retry interval; valid values are from 200 to 2000 milliseconds. |
Command Default
2000 milliseconds
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
Note Use this command under the direction of the Cisco TAC only.
Examples
This example shows how to enable SCP fast retry and set the fast-retry interval:
Router(config)# platform scp retry interval 600
Router(config)#
platform vfi dot1q-transparency
To enable 802.1Q transparency mode, use the platform vfi dot1q-transparency command. To disable 802.1Q transparency, use the no form of this command.
platform vfi dot1q-transparency
no platform vfi dot1q-transparency
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
This command is supported on OSM modules only.
The 802.1Q transparency allows a service provider to modify the MPLS EXP bits for core-based QoS policies while leaving any VPLS customer 802.1p bits unchanged.
The dot1q Transparency for EoMPLS feature causes the VLAN-applied policy to affect only the IGP label (for core QoS) and leaves the VC label EXP bits equal to the 802.1p bits. On the egress PE, the 802.1p bits are still rewritten based on the received VC EXP bits, however, because the EXP bits now match the ingress 802.1p bits, a VPLS customer's 802.1p bits do not change.
Global configuration (config) applies to all virtual forwarding instance (VFI) and switched virtual interface (SVI) EoMPLS VCs configured on the Cisco 7600 series routers.
Interoperability requires applying the Dot1q Transparency for EoMPLS feature to all participating PE routers.
Examples
This example shows how to enable 802.1Q transparency:
Router (config)# platform vfi dot1q-transparency
Router (config)#
This example shows how to disable 802.1Q transparency:
Router (config)# no platform vfi dot1q-transparency
Router (config)#
police (policy map)
To create a per-interface policer and configure the policy-map class to use it, use the police command. To delete the per-interface policer from the policy-map class, use the no form of this command.
police {bits-per-second [normal-burst-bytes] [maximum-burst-bytes] [pir peak-rate-bps]} | [conform-action action] [exceed-action action] [violate-action action]
no police {bits-per-second [normal-burst-bytes] [extended-burst-bytes] [pir peak-rate-bps]} | [conform-action action] [exceed-action action] [violate-action action]
Syntax Description
Command Default
The defaults are as follows:
•maximum-burst-bytes is equal to normal-burst-bytes.
•conform-action is transmit.
•exceed-action is drop.
•violate-action is equal to the exceed-action.
•pir peak-rate-bps is equal to the normal-burst-bytes rate.
Command Modes
Policy-map subcommand
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
On the Supervisor Engine 32 PISA, the police command is supported in software.
Named aggregate policers and microflow policers are not supported on the Supervisor Engine 32 PISA.
The normal-burst-bytes argument sets the CIR token bucket size.
The maximum-burst-bytes argument sets the PIR token bucket size (not supported with the flow keyword). You must set the maximum-burst-bytes argument to be equal to the normal-burst-bytes setting.
The pir peak-rate-bps corresponds to the extended-burst-bytes.
The valid values for action are as follows:
•drop—Drops packets that do not exceed the bits-per-second rate.
•policed-dscp-transmit—Causes all the out-of-profile traffic to be marked down as specified in the markdown map.
•set-dscp-transmit {dscp-value | dscp-bit-pattern | default | ef}—Marks the matched traffic with a new DSCP value where the valid values are as follows:
–dscp-value—Specifies a DSCP value; valid values are from 0 to 63.
–dscp-bit-pattern—Specifies a DSCP bit pattern; valid values are listed in Table 2-28.
–default—Matches packets with default dscp (000000).
–ef—Matches packets with EF dscp (101110).
•set-mpls-exp-imposition-transmit new-mpls-exp—Rewrites the MPLS experimental bits on imposed label entries and transmits. The new-mpls-exp argument specifies the value used to set the MPLS EXP bits that are defined by the policy map; valid values for new-mpls-exp are from 0 to 7.
•set-mpls-exp-topmost-transmit—Rewrites the MPLS experimental bits on the topmost label entries and transmits. The new-mpls-exp argument specifies the value used to set the MPLS EXP bits that are defined by the policy map; valid values for new-mpls-exp are from 0 to 7.
•set-prec-transmit new-precedence—Marks the matched traffic with a new IP-precedence value and transmits; valid values for new-precedence are from 0 to 7.
•transmit—Transmits the packets that do not exceed the bits-per-second rate.
Examples
This example shows how to create a policy map named max-pol-ipp5 that uses the class map named ipp5, which is configured to trust received IP-precedence values and is configured with a maximum-capacity aggregate policer:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# policy-map max-pol-ipp5
Router(config-pmap)# class ipp5
Router(config-pmap-c)# trust ip-precedence
Router(config-pmap-c)# police 2000000000 2000000 conform-action set-prec-transmit 6
exceed-action policed-dscp-transmit
Router(config-pmap-c)#
Related Commands
police rate
To configure traffic policing for traffic that is destined for the control plane, use the police rate command. To remove traffic policing from the configuration, use the no form of this command.
police rate units pps [burst burst-in-packets packets] [peak-rate peak-rate-in-pps pps] [peak-burst peak-burst-in-packets packets]
police rate units bps [burst burst-in-bytes bytes] [peak-rate peak-rate-in-bps bps] [peak-burst peak-burst-in-bytes bytes]
police rate percent percentage [burst ms ms] [peak-rate percent percentage] [peak-burst ms ms]
no police rate units pps [burst burst-in-packets packets] [peak-rate peak-rate-in-pps pps] [peak-burst peak-burst-in-packets packets]
no police rate units bps [burst burst-in-bytes bytes] [peak-rate peak-rate-in-bps bps] [peak-burst peak-burst-in-bytes bytes]
no police rate percent percentage [burst ms ms] [peak-rate percent percentage] [peak-burst ms ms]
Syntax Description
Command Default
Disabled
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
The valid values for units are as follows:
•If the police rate is specified in pps, the valid values are from 1 to 2000000 pps.
•If the police rate is specified in bps, the valid values are from 8,000 to 10,000,000,000 bps.
pps is used to calculate the PIR peak-rate-in-pps.
Use the police rate command to limit traffic that is destined for the control plane on the basis of packets per second (pps), bytes per seconds (bps), or a percentage of interface bandwidth.
If the police rate command is entered, but the rate is not specified, traffic that is destined for the control plane will be policed on the basis of bps.
Examples
This example shows how to configure policing on a class to limit traffic to an average rate of 1500000 pps:
Router(config)# class-map telnet-class
Router(config-cmap)# match access-group 140
Router(config-cmap)# exit
Router(config)# policy-map control-plane-policy
Router(config-pmap)# class telnet-class
Router(config-pmap-c)# police rate 1500000 pps bc 500000 packets
Router(config-pmap-c)# exit
Related Commands
|
|
---|---|
Accesses QoS policy-map configuration mode to configure the QoS policy map. |
|
Displays information about the policy map. |
policy-map
To access QoS policy-map configuration mode to configure the QoS policy map, use the policy-map command. To delete a policy map, use the no form of this command.
policy-map policy-map-name
no policy-map policy-map-name
Syntax Description
policy-map-name |
Policy map name. See the "Usage Guidelines" section for descriptions of the policy-map subcommands. |
Command Default
The defaults are as follows:
•extended-burst-bytes is equal to burst-bytes.
•conform-action is transmit.
•exceed-action is drop.
•violate-action is equal to the exceed-action.
•pir peak-rate-bps is equal to the normal (cir) rate.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
In QoS policy-map configuration mode, these configuration commands are available:
•exit exits QoS class-map configuration mode.
•no removes a previously defined policy map.
•class class-map [name] accesses QoS class-map configuration mode to specify a previously created class map to be included in the policy map or to create a class map (see the class-map command for additional information).
•class {class-name | class-default} accesses the class configuration mode to specify the name of the class whose policy you want to create or change (see the class (policy-map) command for additional information).
•police [aggregate name] subcommand defines a microflow or aggregate policer (see the police (policy map) command for additional information) and provides the following syntaxes:
–police {aggregate name}
–police flow {bits-per-second [normal-burst-bytes] [maximum-burst-bytes] [pir peak-rate-bps]} | [conform-action action] [exceed-action action] [violate-action action]
–police flow mask {dest-only | full-flow | src-only} {bits-per-second [normal-burst-bytes] [maximum-burst-bytes]} [conform-action action] [exceed-action action]
•trust {cos | dscp | ip-precedence} sets the specified class trust values. Trust values that are set in this command supersede trust values that are set on specific interfaces.
Table 2-29 describes the class syntax.
|
|
---|---|
exit |
(Optional) Exits from QoS class action configuration mode. |
police |
(Optional) Specifies flow policing; see the police (policy map) command for additional information. |
trust state |
(Optional) Configures the policy map class trust state. Trust states are cos, dscp, and ip-precedence. |
cos |
(Optional) Sets the internal DSCP value from a received or interface CoS. |
dscp |
(Optional) Sets QoS to use the received DSCP value. |
ip-precedence |
(Optional) Sets the DSCP value from the received IP precedence. |
If you do not specify an exceed-action in the policy-map, it defaults to drop and the violate-action follows.
The PFC QoS does not support the bandwidth, priority, queue-limit, random-detect, or set keywords in policy-map classes.
Examples
This example shows how to create a policy map named max-pol-ipp5 that uses a previously configured class map named ipp5, how to configure trust-received IP-precedence values, and how to configure a maximum-capacity aggregate policer and a microflow policer:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# policy-map max-pol-ipp5
Router(config-pmap)# class ipp5
Router(config-pmap-c)# trust ip-precedence
Router(config-pmap-c)# police 2000000000 2000000 8000000 conform-action set-prec-transmit 6 exceed-action policed-dscp-transmit
Router(config-pmap-c)# police flow 10000000 10000 conform-action set-prec-transmit 6 exceed-action policed-dscp-transmit
Router(config-pmap-c)# end
Router#
Related Commands
port access-map
To create a port access map or enter port access-map command mode, use the port access-map command. To remove a mapping sequence or the entire map, use the no form of this command.
port access-map name [seq#]
no port access-map name [seq#]
Syntax Description
name |
Port access-map tag. |
seq# |
(Optional) Map sequence number; valid values are 0 to 65535. |
Command Default
This command has no default settings.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
If you enter the sequence number of an existing map sequence, you enter port access-map mode. If you do not specify a sequence number, a number is automatically assigned. You can enter one match clause and one action clause per map sequence.
If you enter the no port access-map name [seq#] command without entering a sequence number, the whole map is removed.
Once you enter port access-map mode, the following commands are available:
•action—Specifies the packet action clause; see the action command section.
•default—Sets a command to its defaults.
•end—Exits from configuration mode.
•exit—Exits from the port access-map configuration mode.
•match—Specifies the match clause; see the match command section.
•no—Negates a command or sets its defaults.
Examples
This example shows how to enter port access-map mode:
Router(config)# port access-map ted
Router(config-port-map)#
Related Commands
|
|
---|---|
Sets the packet action clause. |
|
Specifies the match clause by selecting one or more ACLs for a VLAN access-map sequence. |
port-channel load-balance
To set the load-distribution method among the ports in the bundle, use the port-channel load-balance command. To return to the default settings, use the no form of this command.
port-channel load-balance method
no port-channel load-balance
Syntax Description
method |
Load-distribution method; see the "Usage Guidelines" section for a list of valid values. |
Command Default
method is src-dst-ip.
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
Valid method values are as follows:
•dst-ip—Loads distribution on the destination IP address
•dst-mac—Loads distribution on the destination MAC address
•dst-port—Loads distribution on the destination port
•src-dst-ip—Loads distribution on the source XOR-destination IP address
•src-dst-mac—Loads distribution on the source XOR-destination MAC address
•src-dst-port—Loads distribution on the source XOR-destination port
•src-ip—Loads distribution on the source IP address
•src-mac—Loads distribution on the source MAC address
•src-port—Loads distribution on the source port
The port-channel per-module load-balance command allows you to enable or disable port-channel load-balancing on a per-module basis.
This example shows how to set the load-distribution method to dst-ip:
Router(config)#
port-channel load-balance dst-ip
Router(config)#
This example shows how to set the load-distribution method on a specific module:
Router(config)#
port-channel load-balance dst-ip module 2
Router(config)#
Related Commands
port-channel load-balance mpls
To set the load-distribution method among the ports in the bundle for MPLS packets, use the port-channel load-balance mpls command. To return to the default settings, use the no form of this command.
port-channel load-balance mpls {label | label-ip}
no port-channel load-balance mpls
Syntax Description
Command Default
label-ip
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
If you select label, these guidelines apply:
•With only one MPLS label, the last MPLS label is used.
•With two or more MPLS labels, the last two labels (up to the fifth label) are used.
If you select label-ip, these guidelines apply:
•With IPv4 and three or fewer labels, the source IP address XOR-destination IP address is used to distribute packets.
•With four or more labels, the last two labels (up to the fifth label) are used.
•With non-IPv4 packets, the distribution method is the same as the label method.
Examples
This example shows how to set the load-distribution method to label-ip:
Router(config)#
port-channel load-balance mpls label-ip
Router(config)#
Related Commands
|
|
---|---|
Creates a port-channel virtual interface and enters interface configuration mode. |
|
Displays the EtherChannel information for a channel. |
port-channel min-links
To specify that a minimum number of bundled ports in an EtherChannel is required before the channel can be active, use the port-channel min-links command. To return to the default settings, use the no form of this command.
port-channel min-links min-num
no port-channel min-links
Syntax Description
min-num |
Minimum number of bundled ports in a channel that is required before the channel can be active; valid values are from 2 to 8. |
Command Default
min-num is 1.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
This command is supported on LACP (802.3ad) ports only. More than one LACP secondary port channel can belong to the same channel group. This command is applied to all port channels in the same group.
If fewer links than the specified number are available, the port-channel interface does not become active.
Use the show running-config command to verify the configuration.
Examples
This example shows how to specify that a minimum number of bundled ports in an EtherChannel is required before the channel can be active:
Router(config-if)#
port-channel min-links 3
Router(config-if)#
Related Commands
|
|
---|---|
Displays the status and configuration of the module or Layer 2 VLAN. |
port-channel per-module load-balance
To enable load-distribution on a per-module basis, use the port-channel per-module load-balance command. To return to the default settings, use the no form of this command.
port-channel per-module load-balance
no port-channel per-module load-balance
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
The port-channel load-balance method module slot command is supported on DFC systems only.
The port-channel per-module load-balance command allows you to enable or disable port-channel load-balancing on a per-module basis. You can enter the port-channel load-balance method module slot command to specify the load-balancing method on a specific module after you have entered the port-channel per-module load-balance command.
Examples
This example shows how to enable load balancing on a per-module basis:
Router(config)#
port-channel per-module load-balance
Router(config)#
Related Commands
|
|
---|---|
Creates a port-channel virtual interface and enters interface configuration mode. |
|
port-channel load-balance module |
Enables load-distribution on a specific module. |
Displays the EtherChannel information for a channel. |
power enable
To turn on power for the modules, use the power enable command. To power down a module, use the no form of this command.
power enable {module slot}
no power enable {module slot}
Syntax Description
module slot |
Specifies a module slot number; see the "Usage Guidelines" section for valid values. |
Command Default
Enabled
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
When you enter the no power enable module slot command to power down a module, the module's configuration is not saved.
When you enter the no power enable module slot command to power down an empty slot, the configuration is saved.
The slot argument designates the module number. Valid values for slot depend on the chassis that is used. For example, if you have a 13-slot chassis, valid values for the module number are from 1 to 13.
Examples
This example shows how to turn on the power for a module that was previously powered down:
Router(config)#
power enable module 5
Router(config)#
This example shows how to power down a module:
Router(config)#
no power enable module 5
Router(config)#
Related Commands
|
|
---|---|
Displays information about the power status. |
power inline
To configure the administrative mode of the inline power on an interface, use the power inline command.
power inline {auto [max max-milliwatts]} | never | {static [max max-milliwatts]}
Syntax Description
Command Default
The defaults are as follows:
•auto.
•max-milli-watts is 15400 milliwatts.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
12.2(18)ZYA |
This command was changed to increase the max-milliwatts from 15400 to 16800. |
Usage Guidelines
When configuring inline power support with the power inline command, note the following information:
•To configure auto-detection of an inline-powered device and auto-allocation of port inline power, enter the auto keyword.
•To configure auto-detection of an inline-powered device but reserve a fixed inline power allocation, enter the static keyword.
•To specify the maximum power to allocate to a port, enter either the auto or static keyword followed by the max keyword and the power level in milliwatts.
•When the auto keyword is entered and CDP is enabled on the port, an inline-powered device that supports CDP can negotiate a different power level.
•To disable auto-detection of an inline-powered device, enter the never keyword.
Examples
This example shows how to set the inline power to the off mode on an interface:
Router(config-if)# interface fastethernet5/1
Router(config-if)# switchport
Router(config-if)# power inline never
This example shows how to allocate power from the system power pool to a port:
Router(config-if)# interface fastethernet5/1
Router(config-if)# switchport
Router(config-if)# power inline static max 15000
Related Commands
|
|
---|---|
Displays information about the power status. |
power redundancy-mode
To set the power-supply redundancy mode, use the power redundancy-mode command.
power redundancy-mode {combined | redundant}
Syntax Description
combined |
Specifies no redundancy (combine power-supply outputs). |
redundant |
Specifies redundancy (either power supply can operate the system). |
Command Default
redundant
Command Modes
Global configuration (config)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Examples
This example shows how to set the power supplies to the no-redundancy mode:
Router(config)#
power redundancy-mode combined
Router(config)#
This example shows how to set the power supplies to the redundancy mode:
Router(config)#
power redundancy-mode redundant
Router(config)#
Related Commands
|
|
---|---|
Displays information about the power status. |
priority-queue cos-map
To map CoS values to the receive and transmit strict-priority queues, use the priority-queue cos-map command. To return to the default mapping, use the no form of this command.
priority-queue cos-map queue-id cos1 [cos2 [cos3 [cos4 [cos5 [cos6 [cos7 [cos8]]]]]]]
Syntax Description
queue-id |
Queue number; the valid value is 1. |
cos1 |
CoS value; valid values are from 0 to 7. |
. . . cos8 |
(Optional) CoS values; valid values are from 0 to 7. |
Command Default
The default mapping is queue 1 is mapped to CoS 5 for the following receive and transmit strict-priority queues:
•1p1q4t receive queues
•1p1q0t receive queues
•1p1q8t receive queues
•1p2q2t transmit queues
•1p3q8t transmit queues
•1p7q8t transmit queues
•1p3q1t transmit queues
•1p2q1t transmit queues
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
When mapping CoS values to the strict-priority queues, note the following information:
•The queue number is always 1.
•You can enter up to 8 CoS values to map to the queue.
Examples
This example shows how to map CoS value 7 to the strict-priority queues on Gigabit Ethernet port 1/1:
Router(config-if)# priority-queue cos-map 1 7
Router(config-if)#
Related Commands
|
|
---|---|
Displays queueing information. |
priority-queue queue-limit
To se the priority-queue size on an interface, use the priority-queue queue-limit command.
priority-queue queue-limit weight
Syntax Description
weight |
Priority-queue size weight; valid values are from 1 and 100 percent. |
Command Default
The default settings are as follows:
•Global QoS is enabled—15
•Global QoS is disabled—0
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
See the Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for a list of modules that support this command.
Examples
This example shows how to allocate available buffer space to a priority queue:
Router(config-if)# priority-queue queue-limit 15
Router(config-if)#
Related Commands
|
|
---|---|
Displays queueing information. |
private-vlan
To configure PVLANs and the association between a PVLAN and a secondary VLAN, use the private-vlan command. To return to the default settings, use the no form of this command.
private-vlan {isolated | community | primary}
private-vlan association secondary-vlan-list | {add secondary-vlan-list} | {remove secondary-vlan-list}
no private-vlan {isolated | community | primary}
no private-vlan association
Syntax Description
Command Default
No PVLANs are configured.
Command Modes
config-VLAN submode
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
You cannot configure PVLANs on a port-security port.
If you enter a pvlan command on a port-security port, this error message is displayed:
Command rejected: Gix/y is Port Security enabled port.
Within groups of 12 ports (1-12, 13-24, 25-36, and 37-48), do not configure the ports as isolated or as community VLAN ports when one of the ports is a trunk, a SPAN destination, or a promiscuous private VLAN port. If one port is a trunk, a SPAN destination, or a promiscuous private VLAN port, any isolated or community VLAN configuration for the other ports within the 12 ports is inactive. To reactivate the ports, remove the isolated or community VLAN-port configuration and enter the shutdown and no shutdown commands.
Note This restriction applies to Ethernet 10-Mb, 10/100-Mb, and 100-Mb modules except WS-X6548-RJ-45 and WS-X6548-RJ-21.
You cannot configure VLAN 1 or VLANs 1001 to 1005 as PVLANs.
VTP does not support PVLANs. You must configure PVLANs on each device where you want PVLAN ports.
The secondary-vlan-list argument cannot contain spaces. It can contain multiple comma-separated items. Each item can be a single PVLAN ID or a hyphenated range of PVLAN IDs. The secondary-vlan-list parameter can contain multiple community VLAN IDs.
The secondary-vlan-list argument can contain only one isolated VLAN ID. A PVLAN is a set of private ports that are characterized by using a common set of VLAN number pairs. Each pair is made up of at least two special unidirectional VLANs and is used by isolated ports and/or by a community of ports to communicate with routers.
An isolated VLAN is a VLAN that is used by isolated ports to communicate with promiscuous ports. An isolated VLAN's traffic is blocked on all other private ports in the same VLAN. Its traffic can only be received by standard trunking ports and promiscuous ports that are assigned to the corresponding primary VLAN.
A promiscuous port is defined as a private port that is assigned to a primary VLAN.
A primary VLAN is defined as the VLAN that is used to convey the traffic from the routers to customer end stations on private ports.
A community VLAN is defined as the VLAN that carries the traffic among community ports and from community ports to the promiscuous ports on the corresponding primary VLAN.
You can specify only one isolated vlan-id, while multiple community VLANs are allowed. Isolated and community VLANs can only be associated with one VLAN. The associated VLAN list may not contain primary VLANs. Similarly, you cannot configure a VLAN that is already associated to a primary VLAN as a primary VLAN.
The private-vlan commands do not take effect until you exit the config-VLAN submode.
If you delete either the primary or secondary VLAN, the ports that are associated with the VLAN become inactive.
Refer to the Catalyst Supervisor Engine 32 PISA Cisco IOS Software Configuration Guide—Release 12.2ZY for additional configuration guidelines.
Examples
This example shows how to create a PVLAN relationship between the primary VLAN 14, the isolated VLAN 19, and the community VLANs 20 and 21:
Router(config) # vlan 19
Router(config-vlan) # private-vlan isolated
Router(config) # vlan 20
Router(config-vlan) # private-vlan community
Router(config-vlan) # private-vlan community
Router(config) # vlan 14
Router(config-vlan) # private-vlan primary
Router(config-vlan) # private-vlan association 19-21
This example shows how to remove an isolated VLAN and community VLAN 20 from the PVLAN association:
Router(config) # vlan 14
Router(config-vlan) # private-vlan association remove 18,20
Router(config-vlan) #
This example shows how to remove a PVLAN relationship and delete the primary VLAN. The associated secondary VLANs are not deleted.
Router(config-vlan) # no private-vlan 14
Router(config-vlan) #
Related Commands
|
|
---|---|
Displays VLAN information. |
|
Displays PVLAN information. |
private-vlan mapping
To create a mapping between the primary and the secondary VLANs so that both VLANs share the same primary VLAN SVI, use the private-vlan mapping command. To remove all PVLAN mappings from the SVI, use the no form of this command.
private-vlan mapping {[secondary-vlan-list | {add secondary-vlan-list} | {remove secondary-vlan-list}]}
no private-vlan mapping
Syntax Description
Command Default
No PVLAN SVI mapping is configured.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
The private-vlan mapping command affects traffic that is switched in the software on the PISA.
The secondary-vlan-list argument cannot contain spaces; it can contain multiple comma-separated items. Each item can be a single PVLAN ID or a hyphenated range of PVLAN IDs.
This command is valid in the interface configuration mode of the primary VLAN.
The SVI of the primary VLAN is created at Layer 3.
Traffic that is received on the secondary VLAN is routed by the SVI of the primary VLAN.
The SVIs of existing secondary VLANs do not function and are considered as down after you enter this command.
A secondary SVI can only be mapped to one primary SVI. If you configure the primary VLAN as a secondary VLAN, all the SVIs that are specified in this command are brought down.
If you configure a mapping between two VLANs that do not have a valid Layer 2 association, the mapping configuration does not take effect.
Examples
This example shows how to map the interface of VLAN 20 to the SVI of VLAN 18:
Router(config)#
interface vlan 18
Router(config-if)#
private-vlan mapping 18 20
Router(config-if)#
This example shows how to permit routing of secondary VLAN-ingress traffic from PVLANs 303 through 307, 309, and 440 and verify the configuration:
Router#
configure terminal
Router(config)#
interface vlan 202
Router(config-if)#
private-vlan mapping add 303-307,309,440
Router(config-if)#
end
Router#
show interfaces private-vlan mapping
Interface Secondary VLAN Type
--------- -------------- -----------------
vlan202 303 community
vlan202 304 community
vlan202 305 community
vlan202 306 community
vlan202 307 community
vlan202 309 community
vlan202 440 isolated
Router#
This example shows the displayed error message if the VLAN that you are adding is already mapped to the SVI of VLAN 18. You must delete the mapping from the SVI of VLAN 18 first.
Router(config)#
interface vlan 19
Router(config-if)#
private-vlan mapping 19 add 21
Command rejected: The interface for VLAN 21 is already mapped as s secondary.
Router(config-if)#
This example shows how to remove all PVLAN mappings from the SVI of VLAN 19:
Router(config)#
interface vlan 19
Router(config-if)#
no private-vlan mapping
Router(config-if)#
Related Commands
|
|
---|---|
Displays the information about the PVLAN mapping for VLAN SVIs. |
|
Displays VLAN information. |
|
Displays PVLAN information. |
private-vlan synchronize
To map the secondary VLANs to the same instance as the primary VLAN, use the private-vlan synchronize command.
private-vlan synchronize
Syntax Description
This command has no keywords or arguments.
Command Default
This command has no default settings.
Command Modes
MST configuration submode
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
If you do not map VLANs to the same instance as the associated primary VLAN when you exit the MST configuration submode, a warning message displays and lists the secondary VLANs that are not mapped to the same instance as the associated primary VLAN. The private-vlan synchronize command automatically maps all secondary VLANs to the same instance as the associated primary VLANs.
Examples
This example assumes that a primary VLAN 2 and a secondary VLAN 3 are associated to VLAN 2, and that all VLANs are mapped to the CIST instance 1. This example also shows the output if you try to change the mapping for the primary VLAN 2 only:
Router(config)# spanning-tree mst configuration
Router(config-mst)# instance 1 vlan 2
Router(config-mst)# exit
These secondary vlans are not mapped to the same instance as their primary:
-> 3
This example shows how to initialize PVLAN synchronization:
Router(config-mst)# private-vlan synchronize
Router(config-mst)#
Related Commands
|
|
---|---|
Verifies the MST configuration. |
|
Displays information about the MST protocol. |
process-min-time percent
To specify the minimum percentage of CPU process time OSPF takes before trying to release the CPU for other processes, use the process-min-time percent command. To return to the default settings, use the no form of this command.
process-min-time percent percent
no process-min-time
Syntax Description
percent |
Percentage of CPU process time to be used before trying to release the CPU for other processes; valid values are from 1 to 100. |
Command Default
percent is 25.
Command Modes
Router configuration
Command History
|
|
---|---|
12.2(18)ZY |
Support for this command was introduced. |
Usage Guidelines
Note Use this command under the direction of Cisco TAC only.
This command is supported by OSPFv2 and OSPFv3.
Use the process-min-time command to configure the minimum percentage of the process maximum time. Once the percentage has been exceeded, CPU control may be given to a higher priority process.
The process maximum time is set using the process-max-time command. Use the process-min-time command with the process-max-time command.
Examples
This example shows how to set the percentage of CPU process time to be used before releasing the CPU:
Router> configure terminal
Router(configure)# router ospf
Router(config-router)# process-min-time percent 35
Router(config-router)#
This example shows how to return to the default setting:
Router> configure terminal
Router(configure)# router rip
Router(config-router)# no process-min-time
Router(config-router)#
Related Commands
|
|
---|---|
process-max-time |
Configures the amount of time after which a process should voluntarily yield to another process. |