- mac access-group
- mac access-list extended
- mac-address-table aging-time
- mac-address-table dynamic
- mac-address-table learning
- mac-address-table limit
- mac-address-table notification change
- mac-address-table notification mac-move
- mac-address-table notification threshold
- mac-address-table secure
- mac-address-table static
- mac-address-table synchronize
- mac-address-table unicast-flood
- match (VLAN access-map)
- mls rp ip
- mls rp ip (global)
- mls rp ip (interface)
- mls rp ip multicast
- mls rp ip multicast management-interface
- mls rp ipx (global)
- mls rp ipx (interface)
- mls rp locate ipx
- mls rp management-interface
- mls rp nde-address
- mls rp vlan-id
- mls rp vtp-domain
- mls switching
- mls switching unicast
- mode dot1q-in-dot1q access-gateway
- monitor session
- monitor session (VLAN)
- mvrp global
- mvrp mac-learning
- mvrp registration
- mvrp timer
- mvrp vlan creation
- name (MST)
- pagp learn-method
- pagp port-priority
- pl atform port-channel local-significance
- port-channel load-defer
- port-c hannel port load-defer
- private-vlan
- private-vlan a ssociation
- private-vlan mapping
- private-vlan synchronize
- rep admin vlan
- rep block port
- rep lsl-age-timer
- rep lsl-retries
- rep preempt delay
- rep preempt segment
- rep segment
- rep stcn
- revision
mac access-group
To use a MAC access control list (ACL) to control the reception of incoming traffic on a Gigabit Ethernet interface, an 802.1Q VLAN subinterface, an 802.1Q-in-Q stacked VLAN subinterface, use the mac access-group command in interface or subinterface configuration mode. To remove a MAC ACL, use the no form of this command.
mac access-group access-list-number in
no mac access-group access-list-number in
Syntax Description
Number of a MAC ACL to apply to an interface or subinterface (as specified by a access-list (MAC) command). This is a decimal number from 700 to 799. |
|
Defaults
Command Modes
Interface configuration (config-if)
Subinterface configuration (config-subif)
Command History
|
|
---|---|
This command was introduced on the Cisco 12000 series Internet router. |
|
This command was integrated into Cisco IOS Release 12.2(33)SXH. |
Usage Guidelines
MAC ACLs are applied on incoming traffic on Gigabit Ethernet interfaces and VLAN subinterfaces. After a networking device receives a packet, the Cisco IOS software checks the source MAC address of the Gigabit Ethernet, 802.1Q VLAN, or 802.1Q-in-Q packet against the access list. If the MAC access list permits the address, the software continues to process the packet. If the access list denies the address, the software discards the packet and returns an Internet Control Message Protocol (ICMP) host unreachable message.
If the specified MAC ACL does not exist on the interface or subinterface, all packets are passed.
On Catalyst 6500 series switches, this command is supported on Layer 2 ports only.
Note The mac access-group command is supported on a VLAN subinterface only if a VLAN is already configured on the subinterface.
Examples
The following example applies MAC ACL 101 on incoming traffic received on Gigabit Ethernet interface 0:
Related Commands
|
|
---|---|
Configures an IP access list to be used for packets transmitted from the asynchronous host. |
|
mac access-list extended
To create an extended MAC access control list (ACL) and define its access control entries (ACEs), use the mac access-list extended command in global configuration mode. To remove MAC ACLs, use the no form of this command.
no mac access-list extended name
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
When you enter the ACL name, follow these naming conventions:
- Maximum of 31 characters and may include a–z, A–Z, 0–9, the dash character (-), the underscore character (_), and the period character (.)
- Must start with an alpha character and must be unique across all ACLs of all types
- Case sensitive
- Cannot be a number
- Must not be a keyword; keywords to avoid are all, default-action, map, help, and editbuffer
You can configure named ACLs that filter Internet Packet Exchange (IPX), DECnet, AppleTalk, Virtual Integrated Network Service (VINES), or Xerox Network Services (XNS) traffic based on MAC addresses (IPX filtering with a MAC ACL is supported only with a Policy Feature Card 3 [PFC3]).
In systems that are configured with PFC3, if you want to classify all IPX traffic by using a MAC-access list that matches on EtherType 0x8137, use the ipx-arpa or ipx-non-arpa protocol.
Once you enter the mac access-list extended name command, use the following subset to create or delete entries in a MAC ACL:
[ no ] { permit | deny } {{ src-mac mask | any } { dest-mac mask | any } [ protocol [ vlan vlan ] [ cos value ]]}
The vlan vlan and cos value keywords and arguments are supported in PFC3BXL or PFC3B mode with Release 12.2(17b)SXA and later releases.
The vlan vlan and cos value keywords and arguments are not supported on the MAC VLAN access control lists (VACLs).
For the Cisco 7600 series platform when ES20 or ES40 line cards are used, only the {permit | deny} {src-mac mask | any} {dest-mac mask | any} part of the command syntax applies. If an extended MAC Access Control List is created using the [protocol [vlan vlan] [cos value]] options, these options are ignored.
Table 1 describes the syntax of the mac access-list extended command.
Valid entries for the protocol argument are as follows:
- 0x0-0xFFFF —Arbitrary EtherType in hexadecimal
- aarp —EtherType: AppleTalk Address Resolution Protocol (ARP)
- amber —EtherType: DEC-Amber
- appletalk —EtherType: AppleTalk/EtherTalk
- bpdu-sap —BPDU SAP encapsulated packets
- bpdu-snap —BPDU SNAP encapsulated packets
- dec-spanning —EtherType: DEC-Spanning-Tree
- decnet-iv —EtherType: DECnet Phase IV
- diagnostic —EtherType: DEC-Diagnostic
- dsm —EtherType: DEC-DSM
- dtp —DTP packets
- etype-6000 —EtherType: 0x6000
- etype-8042 —EtherType: 0x8042
- ip —EtherType: 0x0800
- ipx-arpa —IPX Advanced Research Projects Agency (ARPA)
- ipx-non-arpa —IPX non-ARPA
- lacp — LACP encapsulated packets
- lat —EtherType: DEC-LAT
- lavc-sca —EtherType: DEC-LAVC-SCA
- mop-console —EtherType: DEC-MOP Remote Console
- mop-dump —EtherType: DEC-MOP Dump
- msdos —EtherType: DEC-MSDOS
- mumps —EtherType: DEC-MUMPS
- netbios —EtherType: DEC-NETBIOS
- pagp —PAGP encapsulated packets
- vines-echo —EtherType: VINES Echo
- vines-ip —EtherType: VINES IP
- vtp —VTP packets
- xns-idp —EtherType: XNS IDP
When you enter the src-mac mask or dest-mac mask value, note these guidelines and restrictions:
- Enter MAC addresses as three 4-byte values in dotted hexadecimal format; for example, 0030.9629.9f84.
- Enter MAC-address masks as three 4-byte values in dotted hexadecimal format. Use 1 bit as a wildcard. For example, to match an address exactly, use 0000.0000.0000 (can be entered as 0.0.0).
- For the optional protocol , you can enter either the EtherType or the keyword.
- Entries without a protocol match any protocol.
- Access lists entries are scanned in the order that you enter them. The first matching entry is used. To improve performance, place the most commonly used entries near the beginning of the access list.
- An implicit deny any any entry exists at the end of an access list unless you include an explicit permit any any entry at the end of the list.
- All new entries to an existing list are placed at the end of the list. You cannot add entries to the middle of a list.
Malformed, invalid, deliberately corrupt EtherType 0x800 IP frames are not recognized as IP traffic and are not filtered by IP ACLs.
An ACE created with the mac access-list extended command with the ip keyword filters malformed, invalid, deliberately corrupt EtherType 0x800 IP frames only; it does not filter any other IP traffic.
Examples
The following example shows how to create a MAC ACL named mac_layer that denies traffic from 0000.4700.0001, which is going to 0000.4700.0009, and permits all other traffic:
Related Commands
|
|
---|---|
|
|
mac-address-table aging-time
To configure the maximum aging time for entries in the Layer 2 table, use the mac - address - table aging - time command in global configuration mode. To reset maximum aging time to the default setting, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table aging-time seconds
no mac-address-table aging-time seconds
mac-address-table aging-time seconds [ routed-mac | vlan vlan-id ]
no mac-address-table aging-time seconds [ routed-mac | vlan vlan-id ]
mac-address-table aging-time seconds [ routed-mac | vlan vlan-id ]
no mac-address-table aging-time seconds [ routed-mac | vlan vlan-id ]
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The aging time entry will take the specified value. Valid entries are from 10 to 1000000 seconds.
This command cannot be disabled.
Catalyst Switches and Cisco 7600 Routers
If you do not enter a VLAN, the change is applied to all routed-port VLANs.
Enter 0 seconds to disable aging.
You can enter the routed-mac keyword to configure the MAC address aging time for traffic that has the routed MAC (RM) bit set.
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows how to configure aging time to 300 seconds:
Catalyst Switches and Cisco 7600 Routers
The following example shows how to configure the aging time:
The following example shows how to change the RM aging time to 500 seconds:
The following example shows how OOB affects modifying the aging-time:
The following example shows how to disable the aging time:
Related Commands
|
|
---|---|
mac-address-table dynamic
To add dynamic addresses to the MAC address table, use the mac - address - table dynamic command in global configuration mode. Dynamic addresses are automatically added to the address table and dropped from it when they are not in use. To remove dynamic entries from the MAC address table, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table dynamic hw - address interface { fa | gi } [ slot / port ] vlan vlan - id
no mac-address-table dynamic hw - address vlan vlan - id
mac-address-table dynamic hw - address interface [ atm slot / port ] [ vlan vlan - id ]
no mac-address-table dynamic hw - address [ vlan vlan - id ]
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
If the vlan - id argument is omitted and the no form of the command is used, the MAC address is removed from all VLANs.
Examples
The following example shows how to add a MAC address on port fa1/1 to VLAN 4:
Related Commands
|
|
---|---|
Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. |
|
mac-address-table learning
To enable MAC-address learning, use the mac-address-table learning command in global configuration mode. To disable learning, use the no form of this command.
[ default ] mac-address-table learning { vlan vlan-id | interface interface slot / port } [ module num ]
no mac-address-table learning { vlan vlan-id | interface interface slot / port } [ module num ]
Syntax Description
Specifies the VLAN to apply the per-VLAN learning of all MAC addresses; valid values are from 1 to 4094. |
|
Specifies per-interface based learning of all MAC addresses. |
|
Defaults
If you configure a VLAN on a port in a module, all the supervisor engines and Distributed Forwarding Cards (DFCs) in the Catalyst 6500 series switch are enabled to learn all the MAC addresses on the specified VLAN.
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Supervisor Engine 720. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
You can use the module num keyword and argument to specify supervisor engines or DFCs only.
You can use the vlan vlan-id keyword and argument on switch-port VLANs only. You cannot use the vlan vlan-id keyword and argument to configure learning on routed interfaces.
You can use the interface interface slot / port keyword and arguments on routed interfaces, supervisor engines, and DFCs only. You cannot use the interface interface slot / port keyword and arguments to configure learning on switch-port interfaces or non-DFC modules.
Examples
This example shows how to enable MAC-address learning on a switch-port interface on all modules:
This example shows how to enable MAC-address learning on a switch-port interface on a specified module:
This example shows how to disable MAC-address learning on a specified switch-port interface for all modules:
This example shows how to enable MAC-address learning on a routed interface on all modules:
This example shows how to enable MAC-address learning on a routed interface for a specific module:
This example shows how to disable MAC-address learning for all modules on a specific routed interface:
Related Commands
|
|
---|---|
mac-address-table limit
To enable the MAC limiting functionality and set the limit to be imposed, use the mac-address-table limit command in global configuration mode. To disable MAC limiting, use the no form of this command.
mac-address-table limit [ action { warning | limit | shutdown }] [ notification { syslog | trap | both }] [ interface type mod / port ] [ maximum num ] [ vlan vlan ] [ maximum num ] [ action { warning | limit | shutdown }] [ flood ]
no mac-address-table limit [ action { warning | limit | shutdown }] [ notification { syslog | trap | both }] [ interface type mod / port ] [ maximum num ] [ vlan vlan ] [ maximum num ] [ action { warning | limit | shutdown }] [ flood ]
Syntax Description
Defaults
Command Modes
Command History
Usage Guidelines
MAC limiting can be enabled on either a per-interface basis (that is, by specifying an interface) or on a per-VLAN basis (that is, by specifying a VLAN). However, MAC limiting must first be enabled for the router (a higher level) in global configuration mode (config).
General Points About MAC Limiting
Note the following points about enabling MAC limiting:
- The maximum number of MAC entries is determined on a per-VLAN and per-EARL basis.
- If you do not specify a maximum number, an action, or a notification, the default settings are used.
- If you enable per-VLAN MAC limiting, MAC limiting is enabled on the specified VLAN only.
- The flood keyword is supported on VLAN interfaces only.
- The flood action occurs only if the limit action is configured and is violated.
- The flood keyword disables the constant unknown unicast flooding, but allows a few seconds of flooding in between for its own sensing.
- In the shutdown state, the VLAN remains in the blocked state until you reenable it through the command syntax.
Syntax for Enabling per-VLAN MAC Limiting
The following is sample syntax that can be used to enable per-VLAN MAC limiting. Both commands must be used to properly enable per-VLAN MAC limiting.
Note This command enables the MAC limiting functionality for the router.
mac-address-table limit [ vlan vlan ] [ maximum num ] [ action { warning | limit | shutdown }] [ flood ]
Note This command sets the specific limit and any optional actions to be imposed at the VLAN level.
Syntax for Enabling Per-Interface MAC Limiting
The following is sample syntax that can be used to enable per-interface MAC limiting. Both commands must be used to properly enable per-interface MAC limiting.
Note This command enables the MAC limiting functionality for the router.
mac-address-table limit [ interface type mod / port ] [ maximum num ] [ action { warning | limit | shutdown }] [ flood ]
Note This command sets the specific limit and any optional actions to be imposed at the interface level.
Examples
This example shows how to enable per-VLAN MAC limiting. The first instance of the mac-address-table limit command enables MAC limiting. The second instance of the command sets the limit and any optional actions to be imposed at the VLAN level.
This example shows how to enable per-interface MAC limiting. The first instance of the mac-address-table limit command enables MAC limiting. The second instance of the command sets the limit and any optional actions to be imposed at the interface level.
Related Commands
|
|
---|---|
mac-address-table notification change
To send a notification of the dynamic changes to the MAC address table, use the mac-address-table notification change command in global configuration mode. To return to the default settings, use the no form of this command.
mac-address-table notification change [ history size | interval seconds ]
no mac-address-table notification change
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Examples
This example shows how to configure the Simple Network Management Protocol (SNMP) notification of dynamic additions to the MAC address table of addresses:
Related Commands
|
|
---|---|
Enables the SNMP trap notification on a LAN port when MAC addresses are added to or removed from the address table. |
mac-address-table notification mac-move
To enable MAC-move notification, use the mac-address-table notification mac-move command in global configuration mode. To disable MAC-move notification, use the no form of this command.
mac-address-table notification mac-move [ counter [ syslog ]]
no mac-address-table notification mac-move [ counter [ syslog ]]
Syntax Description
(Optional) Specifies the syslogging facility when the MAC-move notification detects the first instance of the MAC move. |
Command Default
Command Modes
Command History
Usage Guidelines
MAC-move notification generates a syslog message whenever a MAC address or host moves between different switch ports.
MAC-move notification does not generate a notification when a new MAC address is added to the content-addressable memory (CAM) or when a MAC address is removed from the CAM.
MAC-move notification is supported on switch ports only.
The MAC-move counter notification generates a syslog message when the number of MAC moves in a VLAN exceeds the maximum limit. The maximum limit is 1000 MAC moves.
The MAC-move counter syslog notification counts the number of times a MAC has moved within a VLAN and the number of these instances that have occurred in the system.
Examples
This example shows how to enable MAC-move notification:
This example shows how to disable MAC-move notification:
This example shows how to enable MAC-move counter syslog notification:
This example shows how to disable MAC-move counter notification:
Related Commands
|
|
---|---|
mac-address-table notification threshold
To enable content-addressable memory (CAM) table usage monitoring notification, use the mac-address-table notification threshold command in global configuration mode. To disable CAM table usage monitoring notification, use the no form of this command.
mac-address-table notification threshold limit percentage interval seconds
no mac-address-table notification threshold
Syntax Description
Specifies the percentage of the CAM utilization; valid values are from 1 to 100 percent. |
|
Specifies the time in seconds between notifications; valid values are greater than or equal to 120 seconds. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Supervisor Engine 720. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
When you enable CAM table usage monitoring, the number of valid entries in the CAM table are counted and if the percentage of the CAM utilization is higher or equal to the specified threshold, a message is displayed.
Examples
This example shows how to enable CAM table usage monitoring notification and use the default settings:
This example shows how to enable CAM table usage monitoring notification and set the threshold and interval:
This example shows how to disable CAM table usage monitoring notification:
Related Commands
|
|
---|---|
mac-address-table secure
To add secure addresses to the MAC address table, use the mac - address - table secure command in global configuration mode. To remove secure entries from the MAC address table, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table secure hw - address interface { fa | gi } slot / port vlan vlan - id
no mac-address-table secure hw - address vlan vlan - id
mac-address-table secure hw - address interface [ atm slot / port ] [ vlan vlan - id ]
no mac-address-table secure hw - address [ vlan vlan - id ]
Cisco 860 Series Integrated Services Routers (ISRs) and Cisco 880 Series ISRs
mac-address-table secure [H.H.H | maximum maximum addresses ]
no mac-address-table secure [H.H.H | maximum maximum addresses ]
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
Cisco 860 Series ISRs, Cisco 880 Series ISRs, Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Secure addresses can be assigned to only one port at a time. Therefore, if a secure address table entry for the specified MAC address and VLAN already exists on another port, it is removed from that port and assigned to the specified one.
If the maximum number is more than the MAC addresses statically specified by using the H.H.H keyword, the switch learns the MAC address automatically up to the specified maximum. If the maximum number is less than the number of MAC addresses already specified statically, then an error message displays.
Secure addresses can be assigned to only one port at a time. Therefore, if a secure address table entry for the specified MAC address and VLAN already exists on another port, it is removed from that port and assigned to the specified one.
Dynamic-access ports cannot be configured with secure addresses.
Examples
Cisco 860 Series ISRs, Cisco 880 Series ISRs
The following example shows how to allow ten devices on Fast Ethernet port 2:
Router(config)#
mac-address-table secure maximum 10 ?
Router(config)#
mac-address-table secure maximum 10 f ?
Router(config)#
mac-address-table secure maximum 10 f 2
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows how to add a secure MAC address to VLAN 6 of port fa1/1:
Router(config)# mac-address-table secure 00c0.00a0.03fa fa1/1 vlan 6
The following example shows how to add a secure MAC address to VLAN 6 of port fa1/1:
The following example shows how to add a secure MAC address to ATM port 2/1:
Related Commands
|
|
---|---|
Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. |
|
mac-address-table static
To add static entries to the MAC address table or to disable Internet Group Multicast Protocol (IGMP) snooping for a particular static multicast MAC address, use the mac-address-table static command in global configuration mode. To remove entries profiled by the combination of specified entry information, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table static mac - address vlan vlan - id interface type slot / port
no mac-address-table static mac - address vlan vlan - id interface type slot / port
mac-address-table static mac - address vlan vlan - id { interface int | drop [ disable-snooping ]}
[ dlci dlci | pvc vpi / vci ] [ auto-learn | disable-snooping ] [ protocol { ip | ipx | assigned } ]
no mac-address-table static mac - address vlan vlan - id { interface int | drop [ disable-snooping ]}
[ dlci dlci | pvc vpi / vci ] [ auto-learn | disable-snooping ] [ protocol { ip | ipx | assigned } ]
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The output interface specified cannot be a switched virtual interface (SVI).
Entering the no form of this command does not remove system MAC addresses.
When you remove a MAC address, entering the interface type slot/port argument is optional. For unicast entries, the entry is removed automatically. For multicast entries, if you do not specify an interface, the entire entry is removed. You can specify the selected ports to be removed by specifying the interface.
The output interface specified cannot be an SVI.
As a good practice, configure static MAC addresses on Layer 2 EtherChannels only and not on Layer 2 physical member ports of an EtherChannel. This practice does not apply to Layer 3 EtherChannels and its members.
Use the no form of this command to do the following:
- Remove entries that are profiled by the combination of specified entry information.
- Re-enable IGMP snooping for the specified address.
The dlci dlci keyword and argument are valid only if Frame Relay encapsulation has been enabled on the specified interface.
The pvc vpi / vci keyword and arguments are supported on ATM interfaces only. When specifying the pvc vpi / vci , y ou must specify both a VPI and a VCI, separated by a slash.
When you install a static MAC address, it is associated with a port. If the same MAC address is seen on a different port, the entry is updated with the new port if you enter the auto-learn keyword.
The output interface specified must be a Layer 2 IDB and not an SVI.
The ipx keyword is not supported.
You can enter up to 15 interfaces per command entered, but you can enter more interfaces by repeating the command.
If you do not enter a protocol type, an entry is automatically created for each of the protocol types.
Entering the no form of this command does not remove system MAC addresses.
When you remove a MAC address, entering interface int is optional. For unicast entries, the entry is removed automatically. For multicast entries, if you do not specify an interface, the entire entry is removed. You can specify the selected ports to be removed by specifying the interface.
The mac-address-table static mac-address vlan vlan-id interface int disable-snooping command disables snooping on the specified static MAC address/VLAN pair only. To re-enable snooping, first you must delete the MAC address using the no form of the command, and then you must reinstall the MAC address using the mac-address-table static mac-address vlan vlan-id interface int command, without entering the disable-snooping keyword.
The mac-address-table static mac-address vlan vlan-id drop command cannot be applied to a multicast MAC address.
Note Both the unicast MAC addresses and the multicast MAC addresses allow only one WAN interface.
Specifying a MAC Address for DLCI or PVC Circuits
To support multipoint bridging and other features, the behavior of the following command has changed for ATM and Frame Relay interfaces in Cisco IOS Release 12.2(18)SXE and later releases. In previous releases, you needed to specify a VLAN ID and an interface only.
In Cisco IOS Release 12.2(18)SXE, you must also specify the dlci option for Frame Relay interfaces, or the pvc option for ATM interfaces, such as in the following example:
Note If you omit the dlci option for Frame Relay interfaces, the MAC address is mapped to the first DLCI circuit that is configured for the specified VLAN on that interface. Similarly, if you omit the pvc option for ATM interfaces, the MAC address is mapped to the first PVC that is configured for the specified VLAN on that interface. To ensure that the MAC address is configured correctly, we recommend always using the dlci and pvc keywords on the appropriate interfaces.
Examples
The following example shows how to add static entries to the MAC address table:
The following example shows how to configure a static MAC address with IGMP snooping disabled for a specified address:
Router(config)#
mac-address-table static 0050.3e8d.6400 vlan 100 interface fastethernet5/7 disable-snooping
The following example shows how to add static entries to the MAC address table for an ATM PVC circuit and for a Frame Relay DLCI circuit:
Related Commands
|
|
---|---|
Displays MAC address table information for a specific MAC address. |
mac-address-table synchronize
To synchronize the Layer 2 MAC address table entries across the Policy Feature Card (PFC) and all the Distributed Forwarding Cards (DFCs), use the mac-address-table synchronize command in global configuration mode. To disable MAC address table synchronization or reset the activity timer, use the no form of this command.
mac-address-table synchronize [ activity-time seconds ]
no mac-address-table synchronize [ activity-time seconds ]
Syntax Description
(Optional) Specifies the activity timer interval: valid values are 160, 320, and 640 seconds. |
Defaults
Command Modes
Command History
|
|
---|---|
The default for this command was changed to enabled for the WS-X6708-10GE. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
|
Usage Guidelines
We recommend that you configure the activity time so that at least two activity times exist within the regular Layer 2 aging time (or within the aging time used for VLANs in distributed EtherChannels if this feature is used only for distributed EtherChannels). If at least two activity times do not exist within the aging time, then an error message is displayed.
Examples
This example shows how to specify the activity timer interval :
This example shows how to specify the activity timer interval when Out-of-Band (OOB) synchronization is enabled:
This example shows how to display the timer interval:
This example shows how to display the timer interval when OOB synchronization is enabled:
Related Commandsand global aging time will be changed automatically if required
|
|
---|---|
mac-address-table unicast-flood
To en able unicast-flood protection, use the mac-address-table unicast-flood command in global configuration mode. To disable unicast-flood protection, use the no form of this command.
mac-address-table unicast-flood limit kfps vlan vlan-id { filter minutes | alert | shutdown }
no mac-address-table unicast-flood limit kfps vlan vlan
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command on the Supervisor Engine 2 was extended to Release 12.2(17d)SXB. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
This command is supported on Cisco 7600 series routers that are configured with a Supervisor Engine 2 only.
We recommend that you configure unicast-flood protection as follows:
The shutdown keyword is supported on nontrunk ports only.
If you specify alert and unknown unicast floods exceeding the threshold are detected, a system message is displayed and no further action is taken.
If you specify shutdown and unknown unicast floods exceeding the threshold are detected, a system message is displayed. Once the system message is displayed, the port goes to err-disable mode.
Examples
This example shows how to set the flood rate limit to 3000 floods per second (fps) and display a system message when the rate limit has been exceeded:
Router(config)#
mac-address-table unicast-flood limit 3 vlan 125 alert
Router(config)#
Related Commands
|
|
---|---|
match (VLAN access-map)
To specify the match clause by selecting one or more IP, Internetwork Packet Exchange (IPX), or MAC access control lists (ACLs) for a VLAN access-map sequence for traffic filtering, use the match command in VLAN access-map configuration mode. To remove the match clause, use the no form of this command.
match { ip address { acl-number | acl-name } | ipx address { acl-number | acl-name } | mac address acl-name }
no match { ip address { acl-number | acl-name } | ipx address { acl-number | acl-name } | mac address acl-name }
Syntax Description
Defaults
Command Modes
VLAN access-map configuration (config-access-map)
Command History
|
|
---|---|
This command was introduced on the Cisco 7600 series routers. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The match ipx address and match mac address commands are not supported for VLAN ACLs (VACLs) on WAN interfaces.
IPX ACLs that are used in VACLs can specify only the IPX protocol type, the source network, the destination network, and the destination host address.
The MAC sequence is not effective for IP or IPX packets. IP packets and IPX packets should be access controlled by IP and IPX match clauses.
You cannot configure VACLs on secondary VLANs. The secondary VLAN inherits all features that are configured on the primary VLAN.
The following commands appear in the command-line interface (CLI) help but are not supported by the quality of service (QoS) as implemented on the policy feature card (PFC):
Examples
The following example defines a match clause for a VLAN access map:
Related Commands
mls rp ip
To enable the Multilayer Switching Protocol (MLSP) and multilayer switching (MLS), use the mls rp ip command in global configuration mode. To disable MLS, use the no form of this command.
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
Use this command to enable MLS, either globally or on a specific interface. MLSP is the protocol that runs between the switches and routers.
Examples
The following example enables MLS:
Related Commands
mls rp ip (global)
To enable external systems to establish IP shortcuts to the Multilayer Switching Feature Card (MSFC), use the mls rp ip command in global configuration mode. To remove a prior entry, use the no form of this command.
mls rp ip [ input-acl | route-map ]
Syntax Description
Defaults
Command Modes
Command History
Examples
This example shows how to allow the external systems to establish IP shortcuts with IP-input access lists:
Router(config)#
mls rp ip input-acl
Router(config)#
Related Commands
|
|
---|---|
mls rp ip (interface)
To enable the external systems to enable Multilayer Switching (MLS) IP on a specified interface, use the mls rp ip command in interface configuration mode. To disable MLS IP, use the no form of this command.
Syntax Description
Defaults
Command Modes
Interface configuration (config-if)
Command History
Examples
This example shows how to enable the external systems to enable MLS IP on an interface:
Router(config-if)#
mls rp ip
Router(config-if)
Related Commands
|
|
---|---|
Enables external systems to establish IP shortcuts to the MSFC. |
|
mls rp ip multicast
To enable IP multicast multilayer switching (MLS) (hardware switching) on an external or internal router in conjunction with Layer 3 switching hardware for the Catalyst 5000 switch, use the mls rp ip multicast command in interface configuration mode. To disable IP multicast MLS on the interface or VLAN, use the no form of this command.
Syntax Description
Command Default
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
This command is available only on specific router platforms connected to a Catalyst 5000 switch. Use this command to reduce multicast load on the router. The switch performs the multicast packet replication and forwarding.
IP multicast MLS is enabled by default on an interface after IP multicast routing and Protocol Independent Multicast (PIM) are enabled.
Examples
The following example shows how to disable IP multicast MLS:
Related Commands
|
|
---|---|
Assigns a different interface (other than the default) to act as the management interface for MLSP. |
|
Displays hardware-switched multicast flow information about IP multicast MLS. |
mls rp ip multicast management-interface
To assign a different interface (other than the default) to act as the management interface for Multilayer Switching (MLS), use the mls rp ip multicast management-interface command in interface configuration mode. To restore the default interface as the management interface, use the no form of this command.
mls rp ip multicast management-interface
no mls rp ip multicast management-interface
Syntax Description
Command Default
When IP multicast MLS is enabled, the subinterface (or VLAN interface) that has the lowest VLAN ID and is active (in the “up” state) is automatically selected as the management interface.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
When you enable IP multicast MLS, the subinterface (or VLAN interface) that has the lowest VLAN ID and is active (in the “up” state) is automatically selected as the management interface. The one-hop protocol Multilayer Switching Protocol (MLSP) is used between a router and a switch to pass messages about hardware-switched flows. MLSP packets are sent and received on the management interface. Typically, the interface in VLAN 1 is chosen (if that interface exists). Only one management interface is allowed on a single trunk link.
In most cases, we recommend that the management interface be determined by default. However, you can optionally use this command to specify a different router interface or subinterface as the management interface. We recommend using a subinterface with minimal data traffic so that multicast MLSP packets can be sent and received more quickly.
If the user-configured management interface goes down, the router uses the default interface (the active interface with the lowest VLAN ID) until the user-configured interface comes up again.
Examples
The following example shows how to configure the Fast Ethernet interface as the management interface:
Related Commands
|
|
---|---|
Enables IP multicast MLS (hardware switching) on an external or internal router in conjunction with Layer 3 switching hardware for the Catalyst 5000 switch. |
mls rp ipx (global)
To enable the router as a multilayer switching (MLS) IPX Route Processor (RP), or to allow the external systems to enable MLS IPX to a Multilayer Switch Feature Card (MSFC), use the mls rp ipx command in global configuration mode. To disable MLS IPX on the router or MSFC, use the no form of this command.
Syntax Description
(Optional for Cisco 7600 series only) Enables MLS IPX and overrides ACLs. |
Command Default
Command Modes
Command History
|
|
---|---|
This command was integrated into Cisco IOS 12.2(17d)SXB and introduced on the Supervisor Engine 2. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
Multilayer Switching Protocol (MLSP) is the protocol that runs between the MLS switching engine and the MLS RP.
This command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 720.
Examples
The following example enables MLS IPX on the MLS RP:
This example shows how to allow the external systems to enable MLS IPX to the MSFC and override ACLs:
Router(config)#
mls rp ipx input-acl
Router(config)#
Related Commands
mls rp ipx (interface)
To enable multilayer switching (MLS) Internetwork Packet Exchange (IPX) on a router interface, use the mls rp ipx command in interface configuration mode. To disable MLS IPX on a router interface, use the no form of this command.
Syntax Description
Command Default
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was integrated into Cisco IOS 12.2(17d)SXB and introduced on the Supervisor Engine 2. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
Multilayer Switching Protocol (MLSP) is the protocol that runs between the MLS Switching Engine and the MLS RP.
This command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 720.
Examples
The following example shows how to enable MLS IPX on a router interface:
Related Commands
mls rp locate ipx
To display information about all switches currently shortcutting for the specified Internetwork Packet Exchange (IPX) flows, use the mls rp locate ipx command in privileged EXEC mode.
mls rp locate ipx destination-network . destination-node [ source-network ]
Syntax Description
Command Modes
Command History
Examples
The following example shows how to display the switch that is shortcutting routed flows to the specified IPX flow:
Related Commands
mls rp management-interface
To specify an interface as the management interface, use the mls rp management-interface command in interface configuration mode. To remove an interface as the management interface, use the no form of this command.
no mls rp management-interface
Syntax Description
Command Default
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
Multilayer Switching Protocol (MLSP) packets are sent and received through the management interface.
Select only one IPX multilayer switching (MLS) interface connected to the switch. If you fail to select this interface, no connection between the MLS route processor (RP) and the MLS switching engine occurs, and any routing updates or changes to access lists are not reflected on the switch.
Examples
The following example shows how to select a management interface:
Related Commands
mls rp nde-address
To specify a NetFlow Data Export (NDE) address, use the mls rp nde-address command in global configuration mode. To remove the NDE address, use the no form of this command.
no mls rp nde-address [ ip-addr]
Syntax Description
Command Default
Command Modes
Command History
Usage Guidelines
Use this command on a route processor (RP) to specify the NDE address for a router. If you do not specify an NDE IP address for the multilayer switching (MLS) RP, the MLS RP automatically selects one of its interface’s IP addresses and uses that IP address as its NDE IP address and its MLS IP address.
Use the following syntax to specify an IP subnet address:
- ip-subnet-addr —Short subnet address format. The trailing decimal number 00 in an IP address YY.YY.YY.00 specifies the boundary for an IP-subnet address. For example, 172.22.36.00 indicates a 24-bit subnet address (subnet mask 172.22.36.00/255.255.255.0), and 172.24.00.00 indicates a 16-bit subnet address (subnet mask 172.24.00.00/255.255.0.0). However, this format can identify only a subnet address of 8, 16, or 24 bits.
- ip-addr/subnet-mask —Long subnet address format. For example, 172.22.252.00/255.255.252.00 indicates a 22-bit subnet address. This format can specify a subnet address of any bit number. To provide more flexibility, the ip-addr is a full host address, such as 172.22.253.1/255.255.252.00.
- ip-addr/maskbits —Simplified long subnet address format. The mask bits specify the number of bits of the network masks. For example, 172.22.252.00/22 indicates a 22-bit subnet address. The ip-addr is a full host address, such as 192.168.253.1/22, which has the same subnet address as the ip-subnet-addr.
Examples
The following example shows how to set the NDE address to 172.25.2.1:
Related Commands
|
|
---|---|
Designates an interface as the management interface for MLSP packets. |
|
Selects the router interface to be Layer 3 switched and then adds that interface to a VTP domain. |
|
mls rp vlan-id
To assign a VLAN identification number to an interface, use the mls rp vlan-id command in interface configuration mode. To remove a VLAN identification number, use the no form of this command.
no mls rp vlan-id vlanid-number
Syntax Description
Command Default
Command Modes
Interface configuration (config-if)
Command History
Examples
The following example shows how to assign the VLAN identification number to an interface:
Related Commands
|
|
---|---|
mls rp vtp-domain
To assign a multilayer switching (MLS) interface to a specific Virtual Trunking Protocol (VTP) domain on the MLS Route Processor (RP), use the mls rp vtp-domain command in interface configuration mode. To remove a VTP domain, use the no form of this command.
no mls rp vtp-domain domain-name
Syntax Description
The name of the VTP domain assigned to an MLS interface and its related switches. |
Command Default
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
The assigned IPX MLS interface must be either an Ethernet interface or a Fast Ethernet interface—both without subinterfaces.
Examples
The following example shows how to assign the MLS interface to the VTP domain named engineering:
Related Commands
mls switching
To enable the hardware switching, use the mls switching command in global configuration mode. To disable hardware switching, use the no form of this command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Supervisor Engine 720. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
This command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 2.
Examples
This example shows how to enable the hardware switching:
Router(config
)# mls switching
Router(config)#
This example shows how to disable the hardware switching:
Router(config
)# no mls switching
Router(config)#
Related Commands
|
|
---|---|
Enables the hardware switching of the unicast traffic for an interface. |
mls switching unicast
To enable the hardware switching of the unicast traffic for an interface, use the mls switching unicast command in interface configuration mode. To disable the hardware switching of the unicast traffic for an interface, use the no form of this command.
Syntax Description
Defaults
Hardware switching of the unicast traffic for an interface is not enabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
Support for this command was introduced on the Supervisor Engine 720. |
|
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
This command is not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 2.
Examples
This example shows how to enable the hardware switching for an interface:
Router(config-if
)# mls switching unicast
Router(config-if)#
This example shows how to disable the hardware switching for an interface:
Router(config-if
)# no mls switching unicast
Router(config-if)#
Related Commands
|
|
---|---|
mode dot1q-in-dot1q access-gateway
To enable a Gigabit Ethernet WAN interface to act as a gateway for 802.1Q in 802.1Q (Q-in-Q) VLAN translation, use the mode dot1q-in-dot1q access-gateway command. To disable the Q-in-Q VLAN translation on the interface, use the no form of this command.
mode dot1q-in-dot1q access-gateway
no mode dot1q-in-dot1q access-gateway
Syntax Description
Defaults
A Gigabit Ethernet WAN interface does not act as a gateway for 802.1Q in 802.1Q (Q-in-Q) VLAN translation.
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
This command is supported on the Gigabit Ethernet (GE) WAN interfaces on Cisco 7600 series routers that are configured with an Optical Services Module (OSM)-2+4GE-WAN+ OSM module only.
OSMs are not supported on Cisco 7600 series routers that are configured with a Supervisor Engine 32.
802.1Q provides a trunking option that tags packets with two VLAN tags to allow multiple VLANs to be trunked together across an intermediate network. This use of a double-tagged tunnel is also referred to as Q-in-Q tunneling.
The mode dot1q-in-dot1q access-gateway command enhances Q-in-Q tunneling by tagging packets with two VLAN tags to allow multiple VLANs to be trunked together across an intermediate network. This use of double-tagged tunnels performs the following functions:
- Switches packets that are tagged with two 802.1Q VLAN tags to a destination service based on the combination of VLAN tags.
- Supports traffic shaping based on the VLAN tags.
- Copies the 802.1P prioritization bits (P bits) from the inner (customer) VLAN tag to the outer (service provider) VLAN tag.
In Cisco IOS Release 12.2(18)SXE and later releases, you can also combine multiple GE-WAN interfaces into a virtual port-channel interface to enable Q-in-Q link bundling. Combining the interfaces not only simplifies the configuration, but allows the GE-WAN OSM to load balance the provider edge (PE) VLANs among the physical interfaces that are members of the bundle. Also, if one interface member of the link bundle goes down, its PE VLANs are automatically reallocated to the other members of the bundle.
Note You must remove all IP addresses that have been configured on the interface before using the mode dot1q-in-dot1q access-gateway command.
After configuring the mode dot1q-in-dot1q access-gateway command, use the bridge-domain (subinterface configuration) command to configure the VLAN mapping to be used on each subinterface.
Note Port-channel interface counters (as shown by the show counters interface port-channel and show interface port-channel counters commands) are not supported for channel groups that are using GE-WAN interfaces for Q-in-Q link bundling. The show interface port-channel {number | number.subif} command (without the counters keyword) is supported, however.
Tip The mls qos trust command has no effect on a GE-WAN interface or port-channel group that has been configured with the mode dot1q-in-dot1q access-gateway command. These interfaces and port channels always trust the VLAN class of service (CoS) bits in this configuration.
Examples
This example shows a typical configuration for the mode dot1q-in-dot1q access-gateway command:
This example shows the system message that appears when you try to configure the mode dot1q-in-dot1q access-gateway command without first removing the IP address configuration:
This example shows how to disable QinQ mapping on an interface by using the no form of the mode dot1q-in-dot1q access-gateway command. In addition, this command automatically removes all subinterfaces on the interface and all of the subinterface QinQ mappings (configured with the bridge-domain (subinterface configuration) command) and service policies.
This example shows a virtual port-channel interface that was created and assigned with two GE-WAN interfaces. The mode dot1q-in-dot1q access-gateway command is then enabled on the port-channel interface to allow it to act as a QinQ link bundle:
This example shows the error message that appears if you attempt to enable QinQ translation on a port-channel interface that contains one or more invalid interfaces:
Related Commands
monitor session
To start a new Switched Port Analyzer (SPAN) session or add interfaces for an existing SPAN session, use the monitor session command in global configuration mode. To remove one or more source interfaces or destination interfaces from the SPAN session or delete a SPAN session, use the no form of this command.
monitor session session source interface type slot / port [ , | - | rx | tx | both ]
no monitor session session source interface type slot / port [ , | - | rx | tx | both ]
monitor session session destination interface type slot / port [ , | - ]
no monitor session session destination interface type slot / port [ , | - ]
no monitor session { session | all | capture | local | range session-range | remote }
Syntax Description
Command Default
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
A trunking interface monitors all VLANs and all received and transmitted traffic.
Command Modes
Command History
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The port-channel number supports six EtherChannels and eight ports in each channel.
Only one SPAN destination for a SPAN session is supported. If you attempt to add another destination interface to a session that already has a destination interface configured, you will get an error. You must first remove a SPAN destination interface before changing the SPAN destination to a different interface.
The Supervisor Engine 720 local SPAN, RSPAN, and ERSPAN session limits are listed in Table 2 .
|
|
|
|
---|---|---|---|
The Supervisor Engine 720 local SPAN, RSPAN, and ERSPAN source and destination limits are listed in Table 3 .
Note ● Supervisor Engine 2 does not support RSPAN if you configure an egress SPAN source for a local SPAN session.
The Supervisor Engine 2 local SPAN and RSPAN session limits are listed in Table 4 .
|
|
|
|
---|---|---|---|
The Supervisor Engine 2 local SPAN and RSPAN source and destination limits are listed in Table 5 .
Session |
|
|
|
---|---|---|---|
Note ● Supervisor Engine 2 does not support RSPAN if you configure an egress SPAN source for a local SPAN session.
The show monitor command displays the SPAN service module session only if it is allocated in the system. It also displays a list of allowed modules and a list of active modules that can use the service module session.
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows how to add a destination VLAN to an existing SPAN session:
This example shows how to clear the configuration for all sessions:
This example shows how to clear the configuration for all remote sessions:
Related Commands
|
|
---|---|
Displays information about the ERSPAN, SPAN, and RSPAN sessions. |
monitor session (VLAN)
To start a new Encapulated RSPAN (ERSPAN), Switched Port Analyzer (SPAN), or remote SPAN (RSPAN) session; add interfaces or VLANs to an existing session; filter ERSPAN, SPAN, or RSPAN traffic to specific VLANs; use the monitor session command in global configuration mode. To remove one or more source or destination interfaces from the session, remove a source VLAN from the session, remove filtering, or delete a session, use the no form of this command.
Setting the Source Interface or VLAN
monitor session session source {{ interface type | vlan vlan-id } [, | - | rx | tx | both ] | remote vlan rspan-vlan-id }
no monitor session session source {{ interface type | vlan vlan-id } [, | - | rx | tx | both ] | remote vlan rspan-vlan-id }
Setting the Destination Interface or VLAN
monitor session session destination { interface type | vlan vlan-id | remote vlan vlan-id | analysis-module slot-number | data-port port-number }
no monitor session session destination { interface type | vlan vlan-id | remote vlan vlan-id | analysis-module slot-number | data-port port-number }
monitor session session filter vlan vlan-range
no monitor session session filter vlan vlan-range
no monitor session { session | all | capture | local | range session-range | remote }
Syntax Description
Command Default
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
A trunking interface monitors all VLANs and all received and transmitted traffic.
Command Modes
Command History
Usage Guidelines
Ciso 6500/6000 Catalyst Switches
The number of valid values for port-channel number depends on the software release. For Cisco IOS releases prior to software Release 12.1(3a)E3, valid values are from 1 to 256; for Cisco IOS Release 12.1(3a)E3, 12.1(3a)E4, and 12.1(4)E1, valid values are from 1 to 64. Cisco IOS Release 12.1(5c)EX and later support a maximum of 64 values ranging from 1 to 256.
Only one destination per SPAN session is supported. If you attempt to add another destination interface to a session that already has a destination interface configured, you get an error. You must first remove a SPAN destination interface before changing the SPAN destination to a different interface.
You can configure up to 64 SPAN destination interfaces, but have only one egress SPAN source interface and only up to 64 ingress source interfaces.
A SPAN session can monitor either VLANs or individual interfaces, but it cannot monitor both specific interfaces and specific VLANs. Configuring a SPAN session with a source interface and then trying to add a source VLAN to the same SPAN session causes an error. Configuring a SPAN session with a source VLAN and then trying to add a source interface to that session also causes an error. You must first clear any sources for a SPAN session before switching to another type of source.
If you enter the filter keyword on a monitored trunk interface, only traffic on the set of specified VLANs is monitored.
Port channel interfaces are displayed in the list of interface options if you have configured the interfaces. VLAN interfaces are not supported. However, you can span a particular VLAN by entering the monitor session session source vlan vlan - id command.
Use these formatting guidelines when configuring monitor sessions:
- interface and single-interface formats are type slot / port ; valid values for type are ethernet , fastethernet , gigabitethernet , or tengigabitethernet .
- An interface-list is a list of interfaces that are separated by commas. Insert a space before and after each comma as shown in this example:
single-interface, single-interface, single-interface
- An interface-range is a rang e of interfaces that are separated by dashes. Insert a space before and after each dash. To enter multiple ranges, separate each range with a comma as shown in the following example:
type slot / first-port, last-port
- A mixed-interface-list is a mixed list of interfaces. Insert a space before and after each dash and comma as shown in the following example:
single-interface, - interface-range,... in any order.
- A single-vlan is an ID number of a single VLAN; valid values are from 1 to 4094.
- A vlan-list is a list of VLAN IDs that are separated by commas. Here is an example:
single-vlan, single-vlan, single-vlan...
- A mixed-vlan-list is a mixed list of VLAN IDs. Insert a space before and after each dash. To enter multiple ranges, separate each VLAN ID with a comma as shown in the following example :
single-vlan , vlan-range ,... in any order
The analysis-module slot-number and the data-port port-number keywords and arguments are supported only on NAM.
The number of valid values for port-channel number are a maximum of 64 values ranging from 1 to 256.
You cannot share the destination interfaces among SPAN sessions. For example, a single destination interface can belong to one SPAN session only and cannot be configured as a destination interface in another SPAN session.
Note Be careful when configuring SPAN-type source ports that are associated to SPAN-type destination ports because you do not configure SPAN on high-traffic interfaces. If you configure SPAN on high-traffic interfaces, you may saturate fabric channels, replication engines, and interfaces. To configure SPAN-type source ports that are associated to SPAN-type destination ports, enter the monitor session session source {interface type | vlan vlan-id [rx | tx | both] | remote vlan rspan-vlan-id} command.
The Supervisor Engine 720 local SPAN, RSPAN, and ERSPAN session limits are listed in Table 6 .
|
|
|
|
---|---|---|---|
The Supervisor Engine 720 local SPAN, RSPAN, and ERSPAN source and destination limits are listed in Table 7 .
Note ● Supervisor Engine 2 does not support RSPAN if you configure an egress SPAN source for a local SPAN session.
The Supervisor Engine 2 local SPAN and RSPAN session limits are listed in Table 8 .
|
|
|
|
---|---|---|---|
The Supervisor Engine 2 local SPAN and RSPAN source and destination limits are listed in Table 9 .
|
|
|
|
---|---|---|---|
Note ● Supervisor Engine 2 does not support RSPAN if you configure an egress SPAN source for a local SPAN session.
A particular SPAN session can monitor either VLANs or individual interfaces; you cannot have a SPAN session that monitors both specific interfaces and specific VLANs. If you first configure a SPAN session with a source interface and then try to add a source VLAN to the same SPAN session, you will get an error. You will also get an error if you configure a SPAN session with a source VLAN and then try to add a source interface to that session. You must first clear any sources for a SPAN session before switching to another type of source.
If you enter the filter keyword on a monitored trunk interface, only traffic on the set of specified VLANs is monitored.
The port-channel interfaces are displayed in the list of interface options if you have configured the interfaces. The VLAN interfaces are not supported. However, you can span a particular VLAN by entering the monitor session session source vlan vlan-id command.
The show monitor command displays the SPAN service module session only if it is allocated in the system. It also displays a list of allowed modules and a list of active modules that can use the service module session.
Examples
Cisco 6500/6000 Catalyst Switches
The following example shows how to add a destination VLAN to an existing SPAN session:
The following example shows how to delete a destination VLAN from an existing SPAN session:
The following example shows how to limit SPAN traffic to specific VLANs:
This example shows how to configure multiple sources for a session:
This example shows how to configure an RSPAN destination in the final switch (RSPAN destination session):
This example shows how to clear the configuration for sessions 1 and 2:
This example shows how to clear the configuration for all sessions:
This example shows how to clear the configuration for all remote sessions:
Related Commands
|
|
---|---|
Displays information about the ERSPAN, SPAN, and RSPAN sessions. |
mvrp global
To enable Multiple VLAN Registration Protocol (MVRP) globally on a device and on a specified interface, use the mvrp global command in global configuration mode. To disable MRVP, use the no form of this command.
Syntax Description
Command Default
MVRP is administratively disabled.
MRVP is administratively enabled on each interface.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
MVRP is operational on an interface only if MVRP is administratively enabled both globally at the device level and at the interface level.
When MVRP is operational on an interface MVRP protocol data units (PDUs) are transmitted out the interface which must be a forwarding IEEE 802.1Q trunk. Other MVRP-related operations can then be enabled on the interface.
Examples
The following example configures global MVRP on the device and interfaces:
Related Commands
mvrp mac-learning
To enable automatic learning of dynamic MAC table entries, use the mvrp mac-learning command in global configuration mode. To disable automatic learning of dynamic MAC table entries, use the no form of this command.
Syntax Description
Enables automatic MAC learning on VLANs that are configured with Multiple VLAN Registration Protocol (MVRP). |
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
With this command you can allow or disallow MVRP to provision MAC learning on devices where MVRP is configured. Automatic MAC learning is disabled by default.
Examples
The following example enable automatic learning of dynamic MAC table entries:
Related Commands
|
|
---|---|
mvrp registration
To set the registrars in a Multiple Registration Protocol (MRP) Attribute Declaration (MAD) instance associated with an interface, use the mvrp registration command in global configuration mode. To disable the registrars, use the no form of this command.
mvrp registration { normal | fixed | forbidden }
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The mvrp registration command is operational only if MVRP is configured on an interface.
The no mvrp registration command sets the registrar state to the default (normal).
This command can be used to set the registrar in a MAD instance associated with an interface to one of the three states. This command is effective only if MVRP is operational on the interface.
Given that up to 4094 VLANs can be configured on a trunk port, there may be up to 4094 Advanced Services Module (ASM) and Route Switch Module (RSM) pairs in a MAD instance associated with that interface.
Examples
The following example sets a fixed, forbidden, and normal registrar on a MAD instance:
Related Commands
mvrp timer
To set period timers that are used in Multiple VLAN Registration Protocol (MVRP) on a given interface, use the mvrp timer command in interface configuration mode. To remove the timer value, use the no form of this command.
mvrp timer { join | leave | leave-all | periodic } [ centiseconds ]
Syntax Description
Command Default
Join timer value: 20 centiseconds
Leave timer value: 60 centiseconds
LeaveAll timer value: 10000 centiseconds
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
Usage Guidelines
The no mvrp timer command resets the timer value to the default value.
Examples
The following example sets the timer levels on an interface:
Related Commands
mvrp vlan creation
To enable dynamic VLAN creation on a device using Multiple VLAN Registration Protocol (MVRP), use the mvrp vlan creation command in global configuration mode. To disable dynamic VLAN creation for MVRP, use the no form of this command.
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
MVRP dynamic VLAN creation can be used only if Virtual Trunking Protocol (VTP) is in transparent mode.
Examples
The following example shows a command sequence enabling MVRP dynamic VLAN creation. Notice that the device recognizes that the VTP mode is incorrect and rejects the request for dynamic VLAN creation. Once the VTP mode is changed, MVRP dynamic VLAN creation is allowed.
Related Commands
|
|
---|---|
name (MST)
To set the name of a Multiple Spanning Tree (MST) region, use the name command in MST configuration submode. To return to the default name, use the no form of this command.
Syntax Description
Name to give the MST region. It can be any string with a maximum length of 32 characters. |
Defaults
Command Modes
MST configuration (config-mst)
Command History
Usage Guidelines
Two or more Cisco 7600 series routers with the same VLAN mapping and configuration version number are considered to be in different MST regions if the region names are different.
Examples
This example shows how to name a region:
Related Commands
|
|
---|---|
pagp learn-method
To learn the input interface of the incoming packets, use the pagp learn-method command in interface configuration mode. To return to the default settings, use the no form of this command.
pagp learn-method { aggregation-port | physical-port }
Syntax Description
Specifies how to learn the address on the physical port within the bundle. |
Defaults
Command Modes
Interface configuration (config-if)
Command History
Examples
This example shows how to set the learning method to learn the address on the physical port within the bundle:
Router(config-if)#
pagp learn-method physical-port
Router(config-if)#
This example shows how to set the learning method to learn the address on the port channel within the bundle:
Router(config-if)#
pagp learn-method aggregation-port
Router(config-if)#
Related Commands
|
|
---|---|
pagp port-priority
To select a port in hot standby mode, use the pagp port-priority command in interface configuration mode. To return to the default settings, use the no form of this command.
Syntax Description
Defaults
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
The higher the priority means the better the chances are that the port will be selected in the hot standby mode.
Examples
This example shows how to set the port priority:
Router(config-if)#
pagp port-priority 45
Router(config-if)#
Related Commands
|
|
---|---|
platform port-channel local-significance
To allow more than one port-channel subinterface to use the same dot1q VLAN configuration, use the platform port-channel local-significance command in global configuration mode. To disable multiple port-channel subinterfaces from using the same dot1q VLAN configuration, use the no form of this command.
platform port-channel number local-significance
no platform port-channe l number local-significance
Syntax Description
Port-channel number. The valid range for port-channel numbers is 1 to 512. |
Command Default
More than one port-channel subinterface cannot use the same dot1q VLAN configuration.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You must use this command before adding any subinterfaces. When you configure this command, the internal VLAN used by the port-channel subinterface is different from the dot1q VLAN configured on the subinterface.
Examples
This example shows how to select port-channels 18 and 19 to use the identical dot1q VLAN configuration:
Related Commands
|
|
---|---|
port-channel load-defer
To configure the port load share deferral interval for all port channels, use the port-channel load-defer command in global configuration mode. To reset the port defer interval to the default setting, use the no form of this command.
port-channel load-defer seconds
Syntax Description
Sets the time interval in seconds by which load sharing will be deferred on the switch. Valid range is from 1 to 1800 seconds. The default deferal interval is 120 seconds |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To reduce data loss following a stateful switchover (SSO), port load share deferral can be enabled by entering the port-channel port load-defer command on a port channel of a switch that is connected by a multichassis EtherChannel (MEC) to a virtual switching system (VSS). Port load share deferral temporarily prevents the switch from forwarding data traffic to MEC member ports on a failed chassis of the VSS while the VSS recovers from the SSO.
The load share deferral interval is determined by a single global timer configurable by the port-channel load-defer command. After an SSO switchover, a period of several seconds to several minutes can be required for the reinitialization of line cards and the reestablishment of forwarding tables, particularly multicast topologies.
The valid range of seconds is 1 to 1800 seconds; the default is 120 seconds.
Examples
This example shows how to set the global port deferral interval to 60 seconds:
Router(config)#
port-channel load-defer 60
Router(config)#
This example shows how to verify the configuration of the port deferral interval on a port channel:
Related Commands
|
|
---|---|
Creates a port channel virtual interface and enters interface configuration mode. |
|
Enables the port load share deferral feature on a port channel. |
|
port-channel port load-defer
To enable the temporary deferral of port load sharing during the connection or reconnection of a port channel, use the port-channel port load-defer command in interface configuration mode. To disable the deferral of port load sharing on a port channel, use the no form of this command.
no port-channel port load-defer
Syntax Description
Defaults
The port load share deferral feature is not enabled on a port channel.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
Usage Guidelines
To reduce data loss following a stateful switchover (SSO), a port load share deferral can be enabled on a port channel of a switch that is connected by a multichassis EtherChannel (MEC) to a virtual switching system (VSS). The load share deferral interval prevents the switch from forwarding data traffic to MEC member ports on a failed chassis of the VSS while the VSS recovers from the SSO.
When load share deferral is enabled on a port channel, the assignment of a member port’s load share is delayed for a period that is configurable globally by the port-channel load-defer command. During the deferral period, the load share of a deferred member port is set to 0. In this state, the deferred port is capable of receiving data and control traffic, and of sending control traffic, but the port is prevented from sending data traffic over the MEC to the VSS. Upon expiration of the global deferral timer, the deferred member port exits the deferral state and the port assumes its normal configured load share.
Load share deferral is applied only if at least one other member port of the port channel is currently active with a nonzero load share. If a port enabled for load share deferral is the first member bringing up the EtherChannel, the deferral feature does not apply and the port will forward traffic immediately.
The load share deferral interval is determined by a single global timer configurable from 1 to 1800 seconds by the port-channel load-defer command. The default interval is 120 seconds. After an SSO switchover, a period of several seconds to several minutes can be required for the reinitialization of line cards and the reestablishment of forwarding tables, particularly multicast topologies.
Examples
This example shows how to enable the load share deferral feature on port channel 50 of a switch that is an MEC peer to a VSS:
Router(config)#
interface port-channel 50
Router(config-if)#
port-channel port load-defer
This will enable the load share deferral feature on this port-channel.
The port-channel should connect to a Virtual Switch (VSS).
Do you wish to proceed? [yes/no]:
yes
Router(config-if)#
This example shows how to verify the state of the port deferral feature on a port channel:
Related Commands
|
|
---|---|
Creates a port channel virtual interface and enters interface configuration mode. |
|
Configures the global port load share deferral time interval for port channels. |
|
private-vlan
To configure private VLANs (PVLANs), use the private-vlan command in VLAN configuration mode. To remove the PVLAN configuration, use the no form of this command.
private-vlan { isolated | community | primary }
no private-vlan { isolated | community | primary }
Syntax Description
Command Default
Command Modes
VLAN configuration (config-vlan)
Command History
Usage Guidelines
You cannot configure PVLANs on a port-security port. If you enter the pvlan command on a port-security port, the following error message is displayed:
Within groups of 12 ports (1–12, 13–24, 25–36, and 37–48), if one of the ports is a trunk, a Switch Port Analyzer (SPAN) destination, or a promiscuous PVLAN port, then do not configure the ports as isolated or as community VLAN ports. If so, any isolated or community VLAN configuration for the other ports within the 12 ports is inactive. To reactivate the ports, remove the isolated or community VLAN port configuration and enter the shutdown and no shutdown commands.
Note In Release 12.2(17a)SX, this restriction applies to Ethernet 10 Mb, 10/100 Mb, and 100 Mb modules except WS-X6548-RJ-45 and WS-X6548-RJ-21. In releases earlier than Release 12.2(17a)SX, this restriction applies to Ethernet 10 Mb, 10/100 Mb, and 100 Mb modules.
You cannot configure VLAN 1 or VLANs 1001 to 1005 as PVLANs.
VLAN Trunking Protocol (VTP) does not propagate PVLAN configuration. Each protected or private port is associated with a PVLAN, that is not supported through VTP. Therefore, you must configure PVLANs on each device where you require PVLAN ports.
A promiscuous port is a private port that is assigned to a primary VLAN.
An isolated VLAN is a VLAN that is used by isolated ports to communicate with promiscuous ports. The traffic from an isolated VLAN is blocked on all other private ports in the same VLAN. This traffic can only be received by standard trunking ports and promiscuous ports that are assigned to the corresponding primary VLAN.
A primary VLAN is the VLAN that is used to carry the traffic from the routers to customer end stations on private ports.
A community VLAN is the VLAN that carries the traffic among community ports, and from community ports to the promiscuous ports on the corresponding primary VLAN.
You can specify only one isolated vlan-id in the vlan command, while multiple community VLANs are allowed. Isolated and community VLANs can only be associated with one VLAN. The associated VLAN list must not contain primary VLANs. You cannot configure a VLAN that is already associated to a primary VLAN as a primary VLAN.
The private-vlan commands do not take effect until you exit the VLAN configuration mode.
If you delete either the primary or secondary VLAN, the ports that are associated with the VLAN become inactive.
See the Cisco 7600 Series Router Cisco IOS Software Configuration Guide for additional configuration guidelines.
Examples
The following example shows how to configure VLAN 303 as a community LAN:
The following example shows how to configure VLAN 440 as an isolated VLAN:
The following example shows how to configure VLAN 233 as a primary LAN:
The following example shows how to remove a PVLAN relationship and delete the primary VLAN. The associated secondary VLANs are not deleted.
Related Commands
|
|
---|---|
private-vlan association
To create an association between private VLANs (PVLANs), use the private-vlan association command in VLAN configuration mode. To remove the association, use the no form of this command.
private-vlan association { private-vlan-list | add private-vlan-list | remove private-vlan-list }
Syntax Description
Command Default
Command Modes
VLAN configuration (config-vlan)
Command History
Usage Guidelines
You cannot configure PVLANs on a port-security port. If you enter the pvlan command on a port-security port, the following error message is displayed:
Within groups of 12 ports (1–12, 13–24, 25–36, and 37–48), if one of the ports is a trunk, a Switch Port Analyzer (SPAN) destination, or a promiscuous PVLAN port, then do not configure the ports as isolated or as community VLAN ports. If so, any isolated or community VLAN configuration for the other ports within the 12 ports is inactive. To reactivate the ports, remove the isolated or community VLAN port configuration and enter the shutdown and no shutdown commands.
Note In Release 12.2(17a)SX, this restriction applies to Ethernet 10 Mb, 10/100 Mb, and 100 Mb modules except WS-X6548-RJ-45 and WS-X6548-RJ-21. In releases earlier than Release 12.2(17a)SX, this restriction applies to Ethernet 10 Mb, 10/100 Mb, and 100 Mb modules.
VLAN 1 or VLANs ranging from 1002 to 1005 cannot be configured as PVLANs. Extended VLANs (VLAN IDs 1006 to 4094) can belong to PVLANs.
A PVLAN is a set of private ports that are characterized by using a common set of VLAN number pairs. Each pair is made up of at least two special unidirectional VLANs, and it is used by isolated ports, or by a community of ports to communicate with routers, or both.
VLAN Trunking Protocol (VTP) must be set to transparent mode to support PVLANs. After the PVLAN configuration, you must not change the VTP mode to client or server mode. VTP does not propagate PVLAN configuration. Each protected or private port is associated with a PVLAN, which is not supported through VTP. Therefore, you must configure PVLANs on each device where you require PVLAN ports.
A primary VLAN can contain one isolated VLAN and multiple community VLANs associated with it. An isolated or community VLAN can have only one primary VLAN associated with it.
Note The private-vlan association command does not take effect until you exit the VLAN configuration mode.
If you delete either the primary or secondary VLAN, the ports that are associated with the VLAN become inactive.
See the Cisco 7600 Series Router Cisco IOS Software Configuration Guide for additional configuration guidelines.
Examples
The following example shows how to create a PVLAN relationship between the primary VLAN 14, the isolated VLAN 19, and the community VLANs 20 and 21:
The following example shows how to remove an isolated VLAN 19 and community VLAN 20 from the PVLAN association:
Related Commands
|
|
---|---|
private-vlan mapping
To create a mapping between the primary and the secondary VLANs so that both VLANs share the same primary VLAN switched virtual interface (SVI), use the private-vlan mapping command in interface configuration mode. To remove all private VLAN (PVLAN) mappings from the SVI, use the no form of this command.
private-vlan mapping [ secondary-vlan-list | add secondary-vlan-list | remove secondary-vlan-list ]
Syntax Description
(Optional) VLAN IDs of the secondary VLANs to map to the primary VLAN. |
|
(Optional) Removes the mapping between the secondary VLAN and the primary VLAN. |
Defaults
Command Modes
Interface configuration (config-if)
Command History
Usage Guidelines
The private-vlan mapping command affects traffic that is switched in the software on the Multilayer Switching Feature Card (MSFC) or MSFC2. The private-vlan mapping command does not configure Layer 3 switching on the Policy Feature Card (PFC) or PFC2.
The secondary-vlan-list argument cannot contain spaces; it can contain multiple comma-separated items. Each item can be a single PVLAN ID or a hyphenated range of PVLAN IDs.
This command is valid in the interface configuration mode of the primary VLAN.
The SVI of the primary VLAN is created at Layer 3.
Traffic that is received on the secondary VLAN is routed by the SVI of the primary VLAN.
The SVIs of existing secondary VLANs do not function and are considered as down after you enter this command.
A secondary SVI can only be mapped to one primary SVI. If you configure the primary VLAN as a secondary VLAN, all the SVIs that are specified in this command are brought down.
If you configure a mapping between two VLANs that do not have a valid Layer 2 association, the mapping configuration does not take effect.
Examples
This example shows how to permit routing of secondary VLAN-ingress traffic from PVLANs 303 through 307, 309, and 440 and verify the configuration:
Router#
configure terminal
Router(config)#
interface vlan 202
Router(config-if)#
private-vlan mapping add 303-307,309,440
Router(config-if)#
end
Router#
show interfaces private-vlan mapping
Interface Secondary VLAN Type
--------- -------------- -----------------
vlan202 303 community
vlan202 304 community
vlan202 305 community
vlan202 306 community
vlan202 307 community
vlan202 309 community
vlan202 440 isolated
Router#
This example shows the displayed error message if the VLAN that you are adding is already mapped to the SVI of VLAN 19. You must delete the mapping from the SVI of VLAN 19 first.
Router(config)#
interface vlan 19
Router(config-if)#
private-vlan mapping 19 add 21
Router(config-if)#
This example shows how to remove all PVLAN mappings from the SVI of VLAN 19:
Router(config)#
interface vlan 19
Router(config-if)#
no private-vlan mapping
Related Commands
|
|
---|---|
Displays the information about the PVLAN mapping for VLAN SVIs. |
|
private-vlan synchronize
To map the secondary VLANs to the same instance as the primary VLAN, use the private-vlan synchronize command in MST configuration submode.
Syntax Description
Defaults
The secondary VLANs are not mapped to the same instance as the primary VLAN.
Command Modes
MST configuration (config-mst)
Command History
Usage Guidelines
If you do not map VLANs to the same instance as the associated primary VLAN when you exit the Multiple Spanning Tree (802.1s) (MST) configuration submode, a warning message displays and lists the secondary VLANs that are not mapped to the same instance as the associated primary VLAN. The private-vlan synchronize command automatically maps all secondary VLANs to the same instance as the associated primary VLANs.
Examples
This example assumes that a primary VLAN 2 and a secondary VLAN 3 are associated to VLAN 2, and that all VLANs are mapped to the Common and Internal Spanning Tree (CIST) instance 1. This example also shows the output if you try to change the mapping for the primary VLAN 2 only:
This example shows how to initialize private VLAN (PVLAN) synchronization:
Related Commands
|
|
---|---|
rep admin vlan
To configure a Resilient Ethernet Protocol (REP) administrative VLAN for REP to transmit hardware flood layer (HFL) messages, use the rep admin vlan command in global configuration mode. To return to the default configuration with VLAN 1 as the administrative VLAN, use the no form of this command.
Syntax Description
The VLAN ID range is from 1 to 4094. The default is VLAN 1; the range to configure is 2 to 4094. |
Defaults
Command Modes
Command History
|
|
---|---|
This command was implemented on the Cisco 7600 series router. |
|
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Router. |
Usage Guidelines
If the VLAN does not already exist, this command does not create the VLAN.
To avoid the delay introduced by relaying messages in software for link-failure or VLAN-blocking notification during load balancing, REP floods packets at the HFL to a regular multicast address. These messages are flooded to the whole network, not just the REP segment. Switches that do not belong to the segment treat them as data traffic. Configuring an administrative VLAN for the whole domain can control flooding of these messages.
If no REP administrative VLAN is configured, the default is VLAN 1.
There can be only one administrative VLAN on a switch and on a segment.
Examples
This example shows how to configure VLAN 100 as the REP administrative VLAN:
You can verify your settings by entering the show interfaces rep detail privileged EXEC command.
Related Commands
|
|
---|---|
Displays detailed REP configuration and status for all interfaces or the specified interface, including the administrative VLAN. |
rep block port
To configure Resilient Ethernet Protocol (REP) VLAN load balancing on the REP primary edge port, use the rep block port command in interface configuration mode. To return to the default configuration, use the no form of this command.
rep block port { id port-id | neighbor-offset | preferred } vlan { vlan-list | all }
no rep block port { id port-id | neighbor-offset | preferred }
Syntax Description
Defaults
The default behavior after you enter the rep preempt segment privileged EXEC command (for manual preemption) is to block all VLANs at the primary edge port. This behavior remains until you configure the rep block port command.
If the primary edge port cannot determine which port is to be the alternate port, the default action is no preemption and no VLAN load balancing.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was implemented on the Cisco 7600 series router. |
|
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Router. |
Usage Guidelines
You must enter this command on the REP primary edge port.
When you select an alternate port by entering an offset number, this number identifies the downstream neighbor port of an edge port. The primary edge port has an offset number of 1; positive numbers above 1 identify downstream neighbors of the primary edge port. Negative numbers identify the secondary edge port (offset number –1) and its downstream neighbors. You would never enter an offset value of 1 because that is the offset number of the primary edge port itself.
If you have configured a preempt delay time by entering the rep preempt delay seconds interface configuration command and a link failure and recovery occurs, VLAN load balancing begins after the configured preemption time period elapses without another link failure. The alternate port specified in the load-balancing configuration blocks the configured VLANs and unblocks all other segment ports. If the primary edge port cannot determine the alternate port for VLAN balancing, the default action is no preemption.
Each port in a segment has a unique port ID. The port ID format is similar to the one used by the spanning tree algorithm: a port number (unique on the bridge) associated to a MAC address (unique in the network). To determine the port ID of a port, enter the show interfaces interface-id rep detail privileged EXEC command.
Examples
This example shows how to configure REP VLAN load balancing on the Router B primary edge port (Gigabit Ethernet port 1/0/1) and to configure Gigabit Ethernet port 1/0/2 of Router A as the alternate port to block VLANs 1 to 100. The alternate port is identified by its port ID, shown in bold in the output of the show interfaces rep detail command for the Router A port.
This example shows how to configure VLAN load balancing by using a neighbor offset number and how to verify the configuration by entering the show interfaces rep detail privileged EXEC command:
Related Commands
rep lsl-age-timer
To configure the Resilient Ethernet Protocol (REP) link status layer (LSL) age-out timer value, use the rep lsl-age-timer command in interface configuration mode. To restore the default age-out timer value, use the no form of this command.
rep lsl-age-timer milliseconds
no rep lsl-age-timer milliseconds
Syntax Description
Defines the REP LSL age-out timer value in milliseconds (ms). Range is from 120 ms to 10000 ms in multiples of 40 ms. The default is 5 ms. |
Command Default
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was introduced on the Cisco 7600 series routers. |
Usage Guidelines
REP is a Cisco proprietary protocol that provides functionality to:
The rep lsl-age-timer command is used to configure the REP LSL age-out timer value.
Examples
The following example shows how to configure the REP LSL age-out timer value.
Related Commands
|
|
---|---|
Configures the number of retries before the REP link is disabled. |
rep lsl-retries
To configure the Resilient Ethernet Protocol (REP) link status layer (LSL) number of retries, use the rep lsl-retries command in interface configuration mode. To restore the default number of retries, use the no form of this command.
rep lsl-retries number-of-retries
no rep lsl-retries number-of-retries
Syntax Description
The number of LSL retries. The acceptable range is between 3 and 10 retries. The default number of retries is 5. |
Command Default
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was introduced on the Cisco 7600 series routers. |
Usage Guidelines
REP is a Cisco proprietary protocol that provides functionality to:
The rep lsl-retries command is used to configure the number of retries before the REP link is disabled.
Examples
This example shows how to configure REP link status layer number of retries.
Related Commands
|
|
---|---|
rep preempt delay
To configure a waiting period after a segment port failure and recovery before Resilient Ethernet Protocol (REP) VLAN load balancing is triggered, use the rep preempt delay command in interface configuration mode. To remove the configured delay, use the no form of this command.
Syntax Description
The number of seconds to delay REP preemption. The range is 15 to 300. |
Defaults
No preemption delay is set. If you do not enter the rep preempt delay command, the default is manual preemption with no delay.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was implemented on the Cisco 7600 series router. |
|
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Router. |
Usage Guidelines
You must enter this command on the REP primary edge port.
You must enter this command and configure a preempt time delay if you want VLAN load balancing to automatically trigger after a link failure and recovery.
If VLAN load-balancing is configured, after a segment port failure and recovery, the REP primary edge port starts a delay timer before VLAN load balancing occurs. Note that the timer restarts after each link failure. When the timer expires, the REP primary edge alerts the alternate port to perform VLAN load-balancing (configured by using the rep block port interface configuration command) and prepares the segment for the new topology. The configured VLAN list is blocked at the alternate port, and all other VLANs are blocked at the primary edge port.
Examples
This example shows how to configure a REP preemption time delay of 100 seconds on the primary edge port:
You can verify your settings by entering the show interfaces rep privileged EXEC command.
Related Commands
|
|
---|---|
Displays REP configuration and status for all interfaces or the specified interface. |
rep preempt segment
To manually start Resilient Ethernet Protocol (REP) VLAN load balancing on a segment, use the rep preempt segment command in privileged EXEC mode.
rep preempt segment segment-id
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
This command was implemented on the Cisco 7600 series router. |
|
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Router. |
Usage Guidelines
After you enter the rep preempt segment segment-id command, a confirmation message appears before the command is executed because preemption can cause network disruption.
Enter this command on the router on the segment that has the primary edge port.
If you do not configure VLAN load balancing, entering this command results in the default behavior—the primary edge port blocks all VLANs.
You configure VLAN load balancing by entering the rep block port { id port-id | neighbor-offset | preferred } vlan { vlan-list | all } interface configuration command on the REP primary edge port before you manually start preemption.
Examples
This example shows how to manually trigger REP preemption on segment 100 with the confirmation message:
Related Commands
|
|
---|---|
Displays REP configuration and status for all interfaces or the specified interface. |
rep segment
To enable Resilient Ethernet Protocol (REP) on the interface and to assign a segment ID to the interface, use the rep segment command in interface configuration mode. To disable REP on the interface, use the no form of this command.
rep segment segment-id [ edge [ no-neighbor ] [ primary ]] [ preferred ]
Syntax Description
Defaults
REP is disabled on the interface.
When REP is enabled on an interface, the default is for the port to be a regular segment port.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was implemented on the Cisco 7600 series router. |
|
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Router. |
|
Usage Guidelines
REP ports must be Layer 2 trunk ports. A non-Ethernet Services (ES) REP port can be either an IEEE 802.1Q trunk port or an ISL trunk port.
REP ports should not be configured as one of these port types:
You must configure two edge ports on each REP segment, a primary edge port and a port to act as a secondary edge port. If you configure two ports in a segment as the primary edge port (for example, ports on different switches) the configuration is allowed, but the REP selects one of them to serve as the segment primary edge port.
You can configure the non-rep switch facing ports as edge no- neighbor ports. These ports inherit the properties of edge ports, and overcome the limitation of not being able to converge quickly during a failure.
REP is supported on EtherChannels, but not on an individual port that belongs to an EtherChannel.
If you enable REP on two ports on a switch, the ports must both be either regular segment ports or edge ports. REP ports follow these rules:
- If only one port on a switch is configured in a segment, the port should be an edge port.
- If two ports on a switch belong to the same segment, both ports must be edge ports, or both ports must be regular segment ports.
- If two ports on a switch belong to the same segment and one is configured as an edge port and one as a regular segment port (a misconfiguration), the edge port is treated as a regular segment port.
If you configure two ports in a segment as the primary edge port (for example, ports on different switches) the REP selects one of them to serve as the segment primary edge port. Enter the show rep topology privileged EXEC command on a port in the segment to verify which port is the segment primary edge port.
REP interfaces come up in a blocked state and remain in a blocked state until notified that it is safe to unblock. You need to be aware of this to avoid sudden connection losses.
REP in Networks with Redundancy
You should configure REP only in networks with redundancy. Configuring REP in a network without redundancy causes loss of connectivity.
Examples
REP Enabled on a Nonedge Segment Port
This example shows how to enable REP on a regular (nonedge) segment port:
REP Enabled as Primary Edge Port
This example shows how to enable REP on a port and identify the port as the REP primary edge port:
This example shows how to enable REP on a port and identify the port as the REP secondary edge port:
Router(config-if)# rep segment 1 edge no-neighbor primary
Verify Settings with the show interfaces rep Command
You can verify your settings by entering the show interfaces rep privileged EXEC command. To verify which port in the segment is the primary edge port, enter the show rep topology privileged EXEC command.
Related Commands
rep stcn
To configure a Resilient Ethernet Protocol (REP) edge port to send REP segment topology change notifications (STCNs) to another interface, to other segments, or to Spanning Tree Protocol (STP) networks, use the rep stcn command in interface configuration mode. To disable the sending of STCNs to the interface, segment, or STP network, use the no form of this command.
rep stcn { interface interface-id | segment id-list | stp }
no rep stcn { interface | segment | stp }
Syntax Description
Defaults
Transmission of STCNs to other interfaces, segments, or STP networks is disabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
---|---|
This command was implemented on the Cisco 7600 series router. |
|
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Router. |
Usage Guidelines
Enter this command on a segment edge port.
You use this command to notify other portions of the Layer 2 network of topology changes that occur in the local REP segment. This removes obsolete entries in the Layer 2 forwarding table in other parts of the network, which allows faster network convergence.
Examples
This example shows how to configure a REP edge port to send STCNs to segments 25 to 50:
You can verify your settings by entering the show interfaces rep detail privileged EXEC command.
Related Commands
|
|
---|---|
Displays REP configuration and status for all interfaces or the specified interface. |
revision
To set the revision number for the Multiple Spanning Tree (802.1s) (MST) configuration, use the revision command in MST configuration submode. To return to the default settings, use the no form of this command.
Syntax Description
Revision number for the configuration; valid values are from 0 to 65535. |
Defaults
Command Modes
MST configuration (config-mst)
Command History
Usage Guidelines
Two Cisco 7600 series routers that have the same configuration but different revision numbers are considered to be part of two different regions.
Examples
This example shows how to set the revision number of the MST configuration:
Related Commands
|
|
---|---|