- A through C
- D through F
- identity policy (policy-map) through ip rsvp pq-profile
- ip rsvp precedence through load protocol
- match access-group through mls ip pbr
- mls qos (global configuration mode) through mpls experimental
- N through P
- Q through R
- send qdm message through show atm bundle svc statistics
- show auto discovery qos through show ip rsvp hello client lsp detail
- show ip rsvp hello client lsp summary through show lane qos database
- show mls qos through wrr-queue threshold
- show auto discovery qos
- show auto qos
- show class-map
- show class-map type nat
- show class-map type port-filter
- show control-plane cef-exception counters
- show control-plane cef-exception features
- show control-plane counters
- show control-plane features
- show control-plane host counters
- show control-plane host features
- show control-plane host open-ports
- show control-plane transit counters
- show control-plane transit features
- show cops servers
- show crypto eng qos
- show frame-relay ip rtp header-compression
- show frame-relay ip tcp header-compression
- show interfaces fair-queue
- show interfaces random-detect
- show interfaces rate-limit
- show iphc-profile
- show ip nbar link-age
- show ip nbar pdlm
- show ip nbar port-map
- show ip nbar protocol-discovery
- show ip nbar protocol-id
- show ip nbar protocol-pack
- show ip nbar unclassified-port-stats
- show ip nbar version
- show ip rsvp
- show ip rsvp aggregation ip
- show ip rsvp aggregation ip endpoints
- show ip rsvp atm-peak-rate-limit
- show ip rsvp authentication
- show ip rsvp counters
- show ip rsvp counters state teardown
- show ip rsvp fast bw-protect
- show ip rsvp fast detail
- show ip rsvp fast-reroute
- show ip rsvp fast-reroute bw-protect
- show ip rsvp fast-reroute detail
- show ip rsvp hello
- show ip rsvp hello client lsp detail
show auto discovery qos
To display the data collected during the Auto-Discovery (data collection) phase of the AutoQoS for the Enterprise feature, use the show auto discovery qos command in privileged EXEC mode.
show auto discovery qos [interface [type number]]
Syntax Description
interface |
(Optional) Indicates that the configurations for a specific interface type will be displayed. |
type number |
(Optional) Specifies the interface type and number. |
Command Default
Displays the configurations created for all interface types.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.3(7)T |
This command was introduced. |
12.3(11)T |
Command output was modified to include suggested policy map information. |
Usage Guidelines
The suggested policy output (shown in the example below) lets you preview class maps and policy maps before you issue the auto qos command on an interface. You can then continue with the Auto-Discovery phase until more data is gathered or you can cut and paste the existing data and edit it as desired.
Examples
The following is sample output from the show auto discovery qos command. This example displays the data collected during the Auto-Discovery (data collection) phase using DSCP classification in trusted mode and includes suggested policy map information.
Router# show auto discovery qos
Serial2/1.1
AutoQoS Discovery enabled for trusted DSCP
Discovery up time: 2 hours, 42 minutes
AutoQoS Class information:
Class Voice:
Recommended Minimum Bandwidth: 118 Kbps/1% (PeakRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
46/ef 106/1 118/1 129510064
Class Interactive Video:
Recommended Minimum Bandwidth: 25 Kbps/<1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
34/af41 25/<1 28/<1 31084292
Class Signaling:
Recommended Minimum Bandwidth: 50 Kbps/<1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
24/cs3 50/<1 56/<1 61838040
Class Streaming Video:
Recommended Minimum Bandwidth: 79 Kbps/<1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
32/cs4 79/<1 88/<1 96451788
Class Transactional:
Recommended Minimum Bandwidth: 105 Kbps/1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
18/af21 105/1 117/1 127798678
Class Bulk:
Recommended Minimum Bandwidth: 132 Kbps/1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
10/af11 132/1 147/1 160953984
Class Scavenger:
Recommended Minimum Bandwidth: 24 Kbps (AverageRate)/0% (fixed)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
8/cs1 24/<1 27/<1 30141238
Class Management:
Recommended Minimum Bandwidth: 34 Kbps/<1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
16/cs2 34/<1 38/<1 41419740
Class Routing:
Recommended Minimum Bandwidth: 7 Kbps/<1% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
48/cs6 7/<1 7/<1 8634024
Class Best Effort:
Current Bandwidth Estimation: 820 Kbps/8% (AverageRate)
Detected DSCPs and data:
DSCP value AverageRate PeakRate Total
(kbps/%) (kbps/%) (bytes)
----------- ----------- -------- ------------
0/default 820/8 915/9 997576380
Suggested AutoQoS Policy based on a discovery uptime of 2 hours, 42 minutes:
!
class-map match-any AutoQoS-Voice-Trust
match ip dscp ef
!
class-map match-any AutoQoS-Inter-Video-Trust
match ip dscp af41
!
class-map match-any AutoQoS-Signaling-Trust
match ip dscp cs3
!
class-map match-any AutoQoS-Stream-Video-Trust
match ip dscp cs4
!
class-map match-any AutoQoS-Transactional-Trust
match ip dscp af21
match ip dscp af22
match ip dscp af23
!
class-map match-any AutoQoS-Bulk-Trust
match ip dscp af11
match ip dscp af12
match ip dscp af13
!
class-map match-any AutoQoS-Scavenger-Trust
match ip dscp cs1
!
class-map match-any AutoQoS-Management-Trust
match ip dscp cs2
!
class-map match-any AutoQoS-Routing-Trust
match ip dscp cs6
!
policy-map AutoQoS-Policy-S2/1.1Trust
class AutoQoS-Voice-Trust
priority percent 1
class AutoQoS-Inter-Video-Trust
bandwidth remaining percent 1
class AutoQoS-Signaling-Trust
bandwidth remaining percent 1
class AutoQoS-Stream-Video-Trust
bandwidth remaining percent 1
class AutoQoS-Transactional-Trust
bandwidth remaining percent 1
random-detect dscp-based
class AutoQoS-Bulk-Trust
bandwidth remaining percent 1
random-detect dscp-based
class AutoQoS-Scavenger-Trust
bandwidth remaining percent 1
class AutoQoS-Management-Trust
bandwidth remaining percent 1
class AutoQoS-Routing-Trust
bandwidth remaining percent 1
class class-default
fair-queue
Table 39 describes the significant fields shown in the display.
Related Commands
show auto qos
To display the interface configurations, policy maps, and class maps created by AutoQoS on a specific interface or all interfaces, use the show auto qos command in privileged EXEC mode.
show auto qos [interface [type slot/port]]
Syntax Description
Command Default
Configurations created for all interface types are displayed.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
The show auto qos interface command can be used with Frame Relay data-link connection identifiers (DLCIs) and ATM permanent virtual circuits (PVCs).
When the AutoQoS—VoIP or the AutoQos for the Enterprise features are enabled, configurations are generated for each interface or PVC. These configurations are then used to create the interface configurations, policy maps, class maps, and access control lists (ACLs) for use on the network. The show auto qos command can be used to verify the contents of the interface configurations, policy maps, class maps, and ACLs.
Catalyst 6500 Series Switches
AutoQoS is supported on the following modules:
•WS-X6548-RJ45
•WS-X6548-RJ21
•WS-X6148-GE_TX
•WS-X6548-GE-TX-CR
•WS-X6148-RJ45V
•WS-X6148-RJ21V
•WS-X6348-RJ45
•WS-X6348-RJ21
•WS-X6248-TEL
Examples
show auto qos interface Command: Configured for the AutoQoS—VoIP Feature
When the interface keyword is configured along with the corresponding type slot/port argument, the show auto qos interface type slot/port command displays the configurations created by the AutoQoS—VoIP feature on the specified interface.
In the following example, the serial subinterface 6/1.1 has been specified:
Router# show auto qos interface serial6/1.1
S6/1.1: DLCI 100 -
!
interface Serial6/1
frame-relay traffic-shaping
!
interface Serial6/1.1 point-to-point
frame-relay interface-dlci 100
class AutoQoS-VoIP-FR-Serial6/1-100
frame-relay ip rtp header-compression
!
map-class frame-relay AutoQoS-VoIP-FR-Serial6/1-100
frame-relay cir 512000
frame-relay bc 5120
frame-relay be 0
frame-relay mincir 512000
service-policy output AutoQoS-Policy-UnTrust
frame-relay fragment 640
When the interface keyword is configured but an interface type is not specified, the show auto qos interface command displays the configurations created by the AutoQoS—VoIP feature on all the interfaces or PVCs on which the AutoQoS—VoIP feature is enabled.
Router# show auto qos interface
Serial6/1.1: DLCI 100 -
!
interface Serial6/1
frame-relay traffic-shaping
!
interface Serial6/1.1 point-to-point
frame-relay interface-dlci 100
class AutoQoS-VoIP-FR-Serial6/1-100
frame-relay ip rtp header-compression
!
map-class frame-relay AutoQoS-VoIP-FR-Serial6/1-100
frame-relay cir 512000
frame-relay bc 5120
frame-relay be 0
frame-relay mincir 512000
service-policy output AutoQoS-Policy-UnTrust
frame-relay fragment 640
ATM2/0.1: PVC 1/100 -
!
interface ATM2/0.1 point-to-point
pvc 1/100
tx-ring-limit 3
encapsulation aal5mux ppp Virtual-Template200
!
interface Virtual-Template200
bandwidth 512
ip address 10.10.107.1 255.255.255.0
service-policy output AutoQoS-Policy-UnTrust
ppp multilink
ppp multilink fragment-delay 10
ppp multilink interleave
The following example displays all of the configurations created by the AutoQoS—VoIP feature:
Router# show auto qos
Serial6/1.1: DLCI 100 -
!
interface Serial6/1
frame-relay traffic-shaping
!
interface Serial6/1.1 point-to-point
frame-relay interface-dlci 100
class AutoQoS-VoIP-FR-Serial6/1-100
frame-relay ip rtp header-compression
!
map-class frame-relay AutoQoS-VoIP-FR-Serial6/1-100
frame-relay cir 512000
frame-relay bc 5120
frame-relay be 0
frame-relay mincir 512000
service-policy output AutoQoS-Policy-UnTrust
frame-relay fragment 640
Table 40 describes the significant fields shown in the display.
show auto qos interface Command: Configured for the AutoQoS for the Enterprise Feature
The following is sample output from the show auto qos command. This example displays the classes, class maps, and policy maps created on the basis of the data collected during the Auto-Discovery phase of the AutoQoS for the Enterprise feature.
Router# show auto qos
!
policy-map AutoQoS-Policy-Se2/1.1
class AutoQoS-Voice-Se2/1.1
priority percent 70
set dscp ef
class AutoQoS-Inter-Video-Se2/1.1
bandwidth remaining percent 10
set dscp af41
class AutoQoS-Stream-Video-Se2/1.1
bandwidth remaining percent 1
set dscp cs4
class AutoQoS-Transactional-Se2/1.1
bandwidth remaining percent 1
set dscp af21
class AutoQoS-Scavenger-Se2/1.1
bandwidth remaining percent 1
set dscp cs1
class class-default
fair-queue
!
policy-map AutoQoS-Policy-Se2/1.1-Parent
class class-default
shape average 1024000
service-policy AutoQoS-Policy-Se2/1.1
!
class-map match-any AutoQoS-Stream-Video-Se2/1.1
match protocol cuseeme
!
class-map match-any AutoQoS-Transactional-Se2/1.1
match protocol sqlnet
!
class-map match-any AutoQoS-Voice-Se2/1.1
match protocol rtp audio
!
class-map match-any AutoQoS-Inter-Video-Se2/1.1
match protocol rtp video
!
rmon event 33333 log trap AutoQoS description "AutoQoS SNMP traps for Voice Drops" owner AutoQoS
Serial2/1.1: DLCI 58 -
!
interface Serial2/1.1 point-to-point
frame-relay interface-dlci 58
class AutoQoS-FR-Serial2/1-58
!
map-class frame-relay AutoQoS-FR-Serial2/1-58
frame-relay cir 1024000
frame-relay bc 10240
frame-relay be 0
frame-relay mincir 1024000
service-policy output AutoQoS-Policy-Se2/1.1-Parent
Table 41 describes the significant fields shown in the display.
Related Commands
show class-map
To display class maps and their matching criteria, use the show class-map command in user EXEC or privileged EXEC mode.
Cisco 3660, 3845, 6500, 7400, and 7500 Series Routers
show class-map [type {stack | access-control}] [class-map-name]
Cisco 7600 and ASR 1000 Series Routers
show class-map [class-map-name]
Syntax Description
Command Default
All class maps are displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Usage Guidelines
You can use the show class-map command to display all class maps and their matching criteria. If you enter the optional class-map-name argument, the specified class map and its matching criteria will be displayed.
Examples
In the following example, three class maps are defined. Packets that match access list 103 belong to class c3, IP packets belong to class c2, and packets ingressing through Ethernet interface 1/0 belong to class c1. The output from the show class-map command shows the three defined class maps.
Router# show class-map
Class Map c3
Match access-group 103
Class Map c2
Match protocol ip
Class Map c1
Match input-interface Ethernet1/0
In the following example, a class map called c1 has been defined, and the Frame Relay DLCI number of 500 has been specified as a match criterion:
Router# show class-map
class map match-all c1
match fr-dlci 500
The following example shows how to display class-map information for all class maps:
Router# show class-map
Class Map match-any class-default (id 0)
Match any
Class Map match-any class-simple (id 2)
Match any
Class Map match-all ipp5 (id 1)
Match ip precedence 5
Class Map match-all agg-2 (id 3)
The following example shows how to display class-map information for a specific class map:
Router# show class-map ipp5
Class Map match-all ipp5 (id 1)
Match ip precedence 5
The following is sample output from the show class-map type access-control command for an encrpted FPM filter:
Router# show class-map type access-control accesscontrol1
Class Map type access-control match-all accesscontrol1 (id 4)
Match encrypted FPM filter
filter-hash : FC50BED10521002B8A170F29AF059C53
filter-version: 0.0_DummyVersion_20090101_1830
filter-id : cisco-sa-20090101-dummy_ddts_001
Match start TCP payload-start offset 0 size 10 regex "abc.*def"
Match field TCP source-port eq 1234
Table 42 describes the significant fields shown in the display.
|
|
---|---|
Class Map |
Class of traffic being displayed. Output is displayed for each configured class map in the policy. The choice for implementing class matches (for example, match-all or match-any) can also appear next to the traffic class. |
Match |
Match criteria specified for the class map. Criteria include the Frame Relay DLCI number, Layer 3 packet length, IP precedence, IP differentiated services code point (DSCP) value, Multiprotocol Label Switching (MPLS) experimental value, access groups, and quality of service (QoS) groups. |
1 A number in parentheses may appear next to the class-map name and match criteria information. The number is for Cisco internal use only and can be disregarded. |
Related Commands
show class-map type nat
To display network address translation (NAT) class maps and their matching criteria, use the show class-map type nat command in privileged EXEC mode.
show class-map type nat [class-map-name]
Syntax Description
class-map-name |
(Optional) Name of the NAT class map. The name can be a maximum of 40 alphanumeric characters. |
Command Default
Information for all NAT class maps is displayed.
Command Modes
Privileged EXEC (#)
Command History
|
|
---|---|
12.4(11)T |
This command was introduced. |
Usage Guidelines
The show class-map type nat command displays all NAT class maps and their matching criteria. To display a particular NAT class map and its matching criteria, specify the class-map name.
Examples
The following is sample output from the show class-map type nat command that disaplays all the class maps:
Router# show class-map type nat
Class Map match-all ipnat-class-acl-we (id 5)
Match access-group 0
Table 43 describes the significant fields shown in the display.
Related Commands
show class-map type port-filter
To display class maps for port filters and their matching criteria, use the show class-map type port-filter command in privileged EXEC mode.
show class-map type port-filter [class-map-name]
Syntax Description
class-map-name |
(Optional) Name of the port-filter class map. The name can be a maximum of 40 alphanumeric characters. |
Command Default
If no argument is specified, information for all port-filter class maps is displayed.
Command Modes
Privileged EXEC (#)
Command History
|
|
---|---|
12.4(11)T |
This command was introduced. |
Usage Guidelines
Use the show class-map type port-filter command to display TCP/UDP port policing of control plane packets. The show class-map type port-filter command displays all port-filter class maps and their matching criteria. To display class maps for a particular port-filter class map, specify the class map name.
Examples
The following is sample output from the show class-map type port-filter command that displays all the class maps:
Router# show class-map type port-filter
Class Map type port-filter match-all pf-policy (id 9)
Match port tcp 45 56
Class Map type port-filter match-any cl1 (id 4)
Match none
Class Map type port-filter match-all pf-class (id 8)
Match not port udp 123
Match closed-ports
The following is sample output from the show class-map type port-filter command that displays the class map pf-class:
Router# show class-map type port-filter pf-class
Class Map type port-filter match-all pf-class (id 8)
Match not port udp 123
Match closed-ports
Table 44 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
class-map |
Creates a class map to be used for matching packets to a specified class. |
show control-plane cef-exception counters
To display the control-plane packet counters for the control-plane cef-exception subinterface, use the show control-plane cef-exception counters command in privileged EXEC mode.
show control-plane cef-exception counters
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane cef-exception counters command displays the following packet counts for features configured on the control-plane cef-exception subinterface:
•Total number of packets that were processed by the cef-exception subinterface
•Total of packets that were dropped
•Total number of errors
Examples
The following is sample output from the show control-plane cef-exception counters command:
Router# show control-plane cef-exception counters
Control plane cef-exception path counters:
Feature Packets Processed/Dropped/Errors
Control Plane Policing 63456/9273/0
Table 45 describes the significant fields shown in the display.
Related Commands
show control-plane cef-exception features
To display the control-plane features for control-plane cef-exception subinterface, use the show control-plane cef-exception features command in privileged EXEC mode.
show control-plane cef-exception features
Syntax Descriptionshow control-plane cef-exception features
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane cef-exception features command displays the following aggregate feature configurations for the control-plane cef-exception subinterface:
•Number of features configured for the control-plane cef-exception subinterface.
•Name of the feature
•Date and time the feature was activated
Examples
The following is sample output from the show control-plane cef-exception features command:
Router# show control-plane cef-exception features
Total 1 features configure
Control plane cef-exception path features:
Control Plane Policing activated Nov 09 2005 12:40
Table 46 describes the significant fields shown in the display.
Related Commands
show control-plane counters
To display the control-plane counters for all control-plane interfaces, use the show control-plane counters command in privileged EXEC mode.
show control-plane counters
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane counters command displays the following aggregate packet counts for all control-plane interfaces and subinterface:
•Total number of packets that were processed by control-plane aggregate host, transit, and cef-exception subinterfaces
•Total number of packets that were dropped
•Total number of errors
Examples
The following is sample output from the show control-plane counters command:
Router# show control-plane counters
Feature Path Packets Processed/Dropped/Errors
aggregate 43271/6759/0
host 24536/4238/0
transit 11972/2476/0
cef-exception path 6345/0/0
Table 47 describes the significant fields shown in the display.
Related Commands
show control-plane features
To display the configured control-plane features, use the show control-plane features command in privileged EXEC mode.
show control-plane features
Syntax Description
This command has no arguments or keywords
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane features command displays control-plane features enabled on the control-plane aggregate sub-interfaces. Information includes the following:
•Number of features configured for the control plane
•Name of the feature
•Date and time the feature was activated
Examples
The following is sample output from the show control-plane features command:
Router# show control-plane features
Total 1 features configured
Control plane host path features:
TCP/UDP Portfilter activated Nov 09 2005 12:40
Table 48 describes the significant fields shown in the display.
Related Commands
show control-plane host counters
To display the control-plane packet counters for the control-plane host subinterface, use the show control-plane host counters command in privileged EXEC mode.
show control-plane host counters
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane host counters command displays the following packet counts for the control-plane host subinterface:
•Total number of packets that were processed by features configured on the host subinterface
•Total number of packets that were dropped
•Total number of errors
Examples
The following is sample output from the show control-plane host counters command:
Router# show control-plane host counters
Control plane host path counters:
Feature Packets Processed/Dropped/Errors
TCP/UDP portfilter 46/46/0
Table 49 describes the significant fields shown in the display.
Related Commands
show control-plane host features
To display the configured control-plane features for the control-plane host sub-interface, use the show control-plane host features command in privileged EXEC mode.
show control-plane host features
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane host features command displays the features configured for the control-plane host subinterface. Information includes the following:
•Number of features configured for the control plane
•Name of the feature
•Date and time the feature was activated
Examples
The following is sample output from the show control-plane host features command:
Router# show control-plane host features
Control plane host path features:
TCP/UDP Portfilter activated Nov 09 2005 12:40
Table 50 describes the significant fields shown in the display.
|
|
---|---|
Feature Name |
Name of the configured features. |
activated |
Date and time the feature was activated. |
Related Commands
show control-plane host open-ports
To display a list of open TCP/UDP ports that are registered with the port-filter database, use the show control-plane host open-ports command in privileged EXEC mode.
show control-plane host open-ports
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane host open-ports command displays a list of open TCP/UDP ports that are registered with the port-filter database.
Examples
The following is sample output from the show control-plane host open-ports command.
Router# show control-plane host open-ports
Active internet connections (servers and established)
Port Local Address Foreign Address Service State
tcp *:23 *:0 Telnet LISTEN
tcp *:53 *:0 DNS Server LISTEN
tcp *:80 *:0 HTTP CORE LISTEN
tcp *:1720 *:0 H.225 LISTEN
tcp *:5060 *:0 SIP LISTEN
tcp *:23 192.0.2.18:58714 Telnet ESTABLISHED
udp *:53 *:0 DNS Server LISTEN
udp *:67 *:0 DHCPD Receive LISTEN
udp *:52824 *:0 IP SNMP LISTEN
udp *:161 *:0 IP SNMP LISTEN
udp *:162 *:0 IP SNMP LISTEN
udp *:5060 *:0 SIP LISTEN
udp *:2517 *:0 CCH323_CT LISTEN
Table 51 describes the significant fields shown in the display.
Related Commands
show control-plane transit counters
To display the control-plane packet counters for the control-plane transit sub-interface, use the show control-plane transit counters command in privileged EXEC mode.
show control-plane transit counters
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane transit counters command displays the following packet counts for the control-plane transit subinterface:
•Total number of packets that were processed by the transit subinterface
•Total number of packets that were dropped
•Total number of errors
Examples
The following is sample output from the show control-plane transit counters command.
Router# show control-plane transit counters
Control plane transit path counters:
Feature Packets Processed/Dropped/Errors
Control Plane Policing 63456/2391/0
Table 52 describes the significant fields shown in the display.
Related Commands
show control-plane transit features
To display the configured control-plane features for the control-plane transit subinterface, use the show control-plane transit features command in privileged EXEC mode.
show control-plane transit features
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
|
|
---|---|
12.4(4)T |
This command was introduced. |
Usage Guidelines
The show control-plane transit features command displays the control-plane features configured for the control-plane transit subinterface. Information includes the following:
•Number of features configured for the control plane
•Name of the feature
•Date and time the feature was activated
Examples
The following is sample output from the show control-plane transit features command:
Router# show control-plane transit features
Control plane transit path features:
Control Plane Policing activated Nov 09 2005 12:40
Table 53 describes the significant fields shown in the display.
Related Commands
show cops servers
To display the IP address and connection status of the policy servers for which the router is configured, use the show cops servers command in EXEC mode.
show cops servers
Syntax Description
This command has no keywords or arguments.
Command Modes
EXEC
Command History
Usage Guidelines
You can also use the show cops server command to display information about the Common Open Policy Service (COPS) client on the router.
Examples
In the following example, information is displayed about the current policy server and client. When Client Type appears followed by an integer, 1 stands for Resource Reservation Protocol (RSVP) and 2 stands for Differentiated Services Provisioning. (0 indicates keepalive.)
Router# show cops servers
COPS SERVER: Address: 10.0.0.1. Port: 3288. State: 0. Keepalive: 120 sec
Number of clients: 1. Number of sessions: 1.
COPS CLIENT: Client type: 1. State: 0.
Related Commands
|
|
---|---|
show ip rsvp policy cops |
Displays policy server address(es), ACL IDs, and current state of the router-server connection. |
show crypto eng qos
To monitor and maintain low latency queueing (LLQ) for IPSec encryption engines, use the show crypto eng qos command in privileged EXEC mode.
show crypto eng qos
Syntax Description
This command has no keywords or arguments.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use the show crypto eng qos command to determine if QoS is enabled on LLQ for IPSec encryption engines.
Examples
The following example shows how to determine if LLQ for IPSec encryption engines is enabled:
Router# show crypto eng qos
crypto engine name: Multi-ISA Using VAM2
crypto engine type: hardware
slot: 5
queuing: enabled
visible bandwidth: 30000 kbps
llq size: 0
default queue size/max: 0/64
interface table size: 32
FastEthernet0/0 (3), iftype 1, ctable size 16, input filter:ip
precedence 5
class voice (1/3), match ip precedence 5
bandwidth 500 kbps, max token 100000
IN match pkt/byte 0/0, police drop 0
OUT match pkt/byte 0/0, police drop 0
class default, match pkt/byte 0/0, qdrop 0
crypto engine bandwidth:total 30000 kbps, allocated 500 kbps
The field descriptions in the above display are self-explanatory.
show frame-relay ip rtp header-compression
To display Frame Relay Real-Time Transport Protocol (RTP) header compression statistics, use the show frame-relay ip rtp header-compression command in user EXEC or privileged EXEC mode.
show frame-relay ip rtp header-compression [interface type number] [dlci]
Syntax Description
Command Default
RTP header compression statistics are displayed for all DLCIs on interfaces that have RTP header compression configured.
Command Modes
User EXEC
Privileged EXEC
Command History
Examples
The following is sample output from the show frame-relay ip rtp header-compression command:
Router# show frame-relay ip rtp header-compression
DLCI 21 Link/Destination info: ip 10.1.4.1
Interface Serial3/0 DLCI 21 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 20 Link/Destination info: ip 10.1.1.1
Interface Serial3/1 DLCI 20 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 21 Link/Destination info: ip 10.1.2.1
Interface Serial3/1 DLCI 21 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 22 Link/Destination info: ip 10.1.3.1
Interface Serial3/1 DLCI 22 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
The following is sample output from the show frame-relay ip rtp header-compression command when ECRTP is enabled:
Router# show frame-relay ip rtp header-compression
DLCI 16 Link/Destination info: ip 10.0.0.1
Interface Serial4/1 DLCI 16 (compression on, IETF, ECRTP)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 16 rx slots, 16 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 16 free contexts
In the following example, the show frame-relay ip rtp header-compression command displays information about DLCI 21:
Router# show frame-relay ip rtp header-compression 21
DLCI 21 Link/Destination info: ip 10.1.4.1
Interface Serial3/0 DLCI 21 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 21 Link/Destination info: ip 10.1.2.1
Interface Serial3/1 DLCI 21 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
In the following example, the show frame-relay ip rtp header-compression command displays information for all DLCIs on serial interface 3/1:
Router# show frame-relay ip rtp header-compression interface serial3/1
DLCI 20 Link/Destination info: ip 10.1.1.1
Interface Serial3/1 DLCI 20 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 21 Link/Destination info: ip 10.1.2.1
Interface Serial3/1 DLCI 21 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 22 Link/Destination info: ip 10.1.3.1
Interface Serial3/1 DLCI 22 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
In the following example, the show frame-relay ip rtp header-compression command displays information only for DLCI 21 on serial interface 3/1:
Router# show frame-relay ip rtp header-compression interface serial3/1 21
DLCI 21 Link/Destination info: ip 10.1.2.1
Interface Serial3/1 DLCI 21 (compression on, Cisco)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
The following sample output from the show frame-relay ip rtp header-compression command shows statistics for a PVC bundle called MP-3-static:
Router# show frame-relay ip rtp header-compression interface Serial1/4
vc-bundle MP-3-static Link/Destination info:ip 10.1.1.1
Interface Serial1/4:
Rcvd: 14 total, 13 compressed, 0 errors
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 15 total, 14 compressed,
474 bytes saved, 119 bytes sent
4.98 efficiency improvement factor
Connect:256 rx slots, 256 tx slots,
1 long searches, 1 misses 0 collisions, 0 negative cache hits
93% hit ratio, five minute miss rate 0 misses/sec, 0 max
Table 54 describes the significant fields shown in the displays.
Related Commands
show frame-relay ip tcp header-compression
To display Frame Relay Transmission Control Protocol (TCP)/IP header compression statistics, use the show frame-relay ip tcp header-compression command in user EXEC or privileged EXEC mode.
show frame-relay ip tcp header-compression [interface type number] [dlci]
Syntax Description
Command Modes
User EXEC
Privileged EXEC
Command History
Examples
The following is sample output from the show frame-relay ip tcp header-compression command:
Router# show frame-relay ip tcp header-compression
DLCI 200 Link/Destination info: ip 10.108.177.200
Interface Serial0:
Rcvd: 40 total, 36 compressed, 0 errors
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed
0 bytes saved, 0 bytes sent
Connect: 16 rx slots, 16 tx slots, 0 long searches, 0 misses, 0% hit ratio
Five minute miss rate 0 misses/sec, 0 max misses/sec
The following sample output from the show frame-relay ip tcp header-compression command shows statistics for a PVC bundle called "MP-3-static":
Router# show frame-relay ip tcp header-compression interface Serial1/4
vc-bundle MP-3-static Link/Destination info:ip 10.1.1.1
Interface Serial1/4:
Rcvd: 14 total, 13 compressed, 0 errors
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 15 total, 14 compressed,
474 bytes saved, 119 bytes sent
4.98 efficiency improvement factor
Connect:256 rx slots, 256 tx slots,
1 long searches, 1 misses 0 collisions, 0 negative cache hits
93% hit ratio, five minute miss rate 0 misses/sec, 0 max
In the following example, the show frame-relay ip tcp header-compression command displays information about DLCI 21:
Router# show frame-relay ip tcp header-compression 21
DLCI 21 Link/Destination info: ip 10.1.2.1
Interface POS2/0 DLCI 21 (compression on, VJ)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
DLCI 21 Link/Destination info: ip 10.1.4.1
Interface Serial3/0 DLCI 21 (compression on, VJ)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
The following is sample output from the show frame-relay ip tcp header-compression command for a specific DLCI on a specific interface:
Router# show frame-relay ip tcp header-compression pos2/0 21
DLCI 21 Link/Destination info: ip 10.1.2.1
Interface POS2/0 DLCI 21 (compression on, VJ)
Rcvd: 0 total, 0 compressed, 0 errors, 0 status msgs
0 dropped, 0 buffer copies, 0 buffer failures
Sent: 0 total, 0 compressed, 0 status msgs, 0 not predicted
0 bytes saved, 0 bytes sent
Connect: 256 rx slots, 256 tx slots,
0 misses, 0 collisions, 0 negative cache hits, 256 free contexts
Table 55 describes the fields shown in the display.
show interfaces fair-queue
Note Effective with Cisco IOS XE Release 2.6, Cisco IOS Release 15.0(1)S, and Cisco IOS Release 15.1(3)T, the show interfaces fair-queue command is hidden. Although this command is still available in Cisco IOS software, the CLI interactive Help does not display it if you attempt to view it by entering a question mark at the command line.
This command will be completely removed in a future release, which means that you will need to use the appropriate replacement command (or sequence of commands). For more information (including a list of replacement commands), see the Legacy QoS Command Deprecation feature document in the Cisco IOS XE Quality of Service Solutions Configuration Guide or the Legacy QoS Command Deprecation feature document in the Cisco IOS Quality of Service Solutions Configuration Guide.
Note Effective with Cisco IOS XE Release 3.2S, the show interfaces fair-queue command is replaced by a modular QoS CLI (MQC) command (or sequence of MQC commands). For the appropriate replacement command (or sequence of commands), see the Legacy QoS Command Deprecation feature document in the Cisco IOS XE Quality of Service Solutions Configuration Guide.
To display information and statistics about weighted fair queueing (WFQ) for a Versatile Interface Processor (VIP)-based interface, use the show interfaces fair-queue command in EXEC mode.
show interfaces [type number] fair-queue
Syntax Description
type |
(Optional) The type of the interface. |
number |
(Optional) The number of the interface. |
Command Modes
EXEC
Command History
Examples
The following is sample output from the show interfaces fair-queue command for VIP-distributed WFQ (DWFQ):
Router# show interfaces fair-queue
Hssi0/0/0 queue size 0
packets output 1417079, drops 2
WFQ: aggregate queue limit 54, individual queue limit 27
max available buffers 54
Class 0: weight 10 limit 27 qsize 0 packets output 1150 drops 0
Class 1: weight 20 limit 27 qsize 0 packets output 0 drops 0
Class 2: weight 30 limit 27 qsize 0 packets output 775482 drops 1
Class 3: weight 40 limit 27 qsize 0 packets output 0 drops 0
Table 56 ddescribes the significant fields shown in the display.
Related Commands
|
|
---|---|
show interfaces |
Displays statistics for all interfaces configured on the router or access server. |
show interfaces random-detect
Note Effective with Cisco IOS XE Release 2.6, Cisco IOS Release 15.0(1)S, and Cisco IOS Release 15.1(3)T, the show interfaces random-detect command is hidden. Although this command is still available in Cisco IOS software, the CLI interactive Help does not display it if you attempt to view it by entering a question mark at the command line.
This command will be completely removed in a future release, which means that you will need to use the appropriate replacement command (or sequence of commands). For more information (including a list of replacement commands), see the Legacy QoS Command Deprecation feature document in the Cisco IOS XE Quality of Service Solutions Configuration Guide or the Legacy QoS Command Deprecation feature document in the Cisco IOS Quality of Service Solutions Configuration Guide.
Note Effective with Cisco IOS XE Release 3.2S, the show interfaces random-detect command is replaced by a modular QoS CLI (MQC) command (or sequence of MQC commands). For the appropriate replacement command (or sequence of commands), see the Legacy QoS Command Deprecation feature document in the Cisco IOS XE Quality of Service Solutions Configuration Guide.
To display information about Weighted Random Early Detection (WRED) for a Versatile Interface Processor (VIP)-based interface, use the show interfaces random-detect command in EXEC mode.
show interfaces [type number] random-detect
Syntax Description
type |
(Optional) The type of the interface. |
number |
(Optional) The number of the interface. |
Command Modes
EXEC
Command History
Examples
The following is sample output from the show interfaces random-detect command for VIP-distributed WRED (DWRED):
Router# show interfaces random-detect
FastEthernet1/0/0 queue size 0
packets output 29692, drops 0
WRED: queue average 0
weight 1/512
Precedence 0: 109 min threshold, 218 max threshold, 1/10 mark weight
1 packets output, drops: 0 random, 0 threshold
Precedence 1: 122 min threshold, 218 max threshold, 1/10 mark weight
(no traffic)
Precedence 2: 135 min threshold, 218 max threshold, 1/10 mark weight
14845 packets output, drops: 0 random, 0 threshold
Precedence 3: 148 min threshold, 218 max threshold, 1/10 mark weight
(no traffic)
Precedence 4: 161 min threshold, 218 max threshold, 1/10 mark weight
(no traffic)
Precedence 5: 174 min threshold, 218 max threshold, 1/10 mark weight
(no traffic)
Precedence 6: 187 min threshold, 218 max threshold, 1/10 mark weight
14846 packets output, drops: 0 random, 0 threshold
Precedence 7: 200 min threshold, 218 max threshold, 1/10 mark weight
(no traffic)
Table 57 describes the significant fields shown in the display.
Related Commands
show interfaces rate-limit
To display information about committed access rate (CAR) for an interface, use the show interfaces rate-limit command in EXEC mode.
show interfaces [type number] rate-limit
Syntax Description
type |
(Optional) The type of the interface. |
number |
(Optional) The number of the interface. |
Command Modes
EXEC
Command History
Examples
The following is sample output from the show interfaces rate-limit command:
Router# show interfaces fddi2/1/0 rate-limit
Fddi2/1/0
Input
matches: access-group rate-limit 100
params: 800000000 bps, 64000 limit, 80000 extended limit
conformed 0 packets, 0 bytes; action: set-prec-continue 1
exceeded 0 packets, 0 bytes; action: set-prec-continue 0
last packet: 4737508ms ago, current burst: 0 bytes
last cleared 01:05:47 ago, conformed 0 bps, exceeded 0 bps
matches: access-group 101
params: 80000000 bps, 56000 limit, 72000 extended limit
conformed 0 packets, 0 bytes; action: set-prec-transmit 5
exceeded 0 packets, 0 bytes; action: set-prec-transmit 0
last packet: 4738036ms ago, current burst: 0 bytes
last cleared 01:02:05 ago, conformed 0 bps, exceeded 0 bps
matches: all traffic
params: 50000000 bps, 48000 limit, 64000 extended limit
conformed 0 packets, 0 bytes; action: set-prec-transmit 5
exceeded 0 packets, 0 bytes; action: set-prec-transmit 0
last packet: 4738036ms ago, current burst: 0 bytes
last cleared 01:00:22 ago, conformed 0 bps, exceeded 0 bps
Output
matches: all traffic
params: 80000000 bps, 64000 limit, 80000 extended limit
conformed 0 packets, 0 bytes; action: transmit
exceeded 0 packets, 0 bytes; action: drop
last packet: 4809528ms ago, current burst: 0 bytes
last cleared 00:59:42 ago, conformed 0 bps, exceeded 0 bps
Table 58 describes the significant fields shown in the display.
Related Commands
show iphc-profile
To display configuration information for one or more IP Header Compression (IPHC) profiles, use the show iphc-profile command in user EXEC or privileged EXEC mode.
show iphc-profile [profile-name]
Syntax Description
profile-name |
(Optional) Name of an IPHC profile to display. |
Command Default
If you do not specify an IPHC profile name, all IPHC profiles are displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
---|---|
12.4(9)T |
This command was introduced. |
12.4(24)T |
This command was modified. The output was enhanced to display recoverable loss when EcRTP is configured. |
Usage Guidelines
Information Included in Display
The display includes information such as the profile type, the type of header compression enabled, the number of contexts, the refresh period (for Real-Time Transport [RTP] header compression), whether feedback messages are disabled, and the interfaces to which the IPHC profile is attached.
For More Information About IPHC Profiles
An IPHC profile is used to enable and configure header compression on your network. For more information about using IPHC profiles to configure header compression, see the "Header Compression" module and the "Configuring Header Compression Using IPHC Profiles" module of the Cisco IOS Quality of Service Solutions Configuration Guide.
Examples
The following is sample output from the show iphc-profile command. In the output, information about two IPHC profiles, profile19 and profile20, is displayed.
Router# show iphc-profile
IPHC Profile "profile19"
Type: IETF
Compressing: NON-TCP (RTP)
Contexts : NON-TCP fixed at 0
Refresh : NON-TCP every 5 seconds or 256 packets
EcRTP : recoverable loss enabled 1
Controlled interfaces: (0)
Reference Count: (1)
IPHC Profile "profile20"
Type: IETF
Compressing: NON-TCP (RTP)
Contexts : NON-TCP fixed at 0
Refresh : NON-TCP every 5 seconds or 256 packets
EcRTP : recoverable loss enabled 4 (dynamic)
Controlled interfaces: (0)
Reference Count: (0)
Table 59 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
iphc-profile |
Creates an IPHC profile. |
show ip nbar link-age
To display the protocol linkage by network-based application recognition (NBAR), use the show ip nbar link-age command in privileged EXEC mode.
show ip nbar link-age [protocol-name]
Syntax Description
protocol-name |
(Optional) Displays the linkage for only the specified protocol name. |
Command Modes
Privileged EXEC (#)
Command History
|
|
---|---|
12.4(20)T |
This command was introduced. |
Cisco IOS XE |
This command was implemented on Cisco ASR 1000 series routers. |
Usage Guidelines
The show ip nbar link-age command displays the linkage of all the NBAR protocols. The protocol-name argument can be used to limit the display for a specific protocol.
Examples
The following is sample output from the show ip nbar link-age command:
Router# show ip nbar link-age
System Link Age: 30 seconds
No. Protocol Link Age (seconds)
1 skype 120
2 bittorrent 120
3 winmx 120
The following is sample output from the show ip nbar link-age command for a specific protocol:
Router# show ip nbar link-age eigrp
System Link Age: 30 seconds
Protocol Link Age (seconds)
eigrp 120
Table 60 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
ip nbar resources protocol |
Sets the expiration time for NBAR flow-link tables on a protocol basis. |
show ip nbar pdlm
To display the Packet Description Language Module (PDLM) in use by network-based application recognition (NBAR), use the show ip nbar pdlm command in privileged EXEC mode.
show ip nbar pdlm
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Usage Guidelines
This command is used to display a list of all the PDLMs that have been loaded into NBAR using the ip nbar pdlm command.
Examples
In this example of the show ip nbar pdlm command, the citrix.pdlm PDLM has been loaded from Flash memory:
Router# show ip nbar pdlm
The following PDLMs have been loaded:
flash://citrix.pdlm
Related Commands
|
|
ip nbar pdlm |
Extends or enhances the list of protocols recognized by NBAR through a Cisco-provided PDLM. |
show ip nbar port-map
To display the current protocol-to-port mappings in use by network-based application recognition (NBAR), use the show ip nbar port-map command in privileged EXEC mode.
show ip nbar port-map [protocol-name [protocol-type]]
Syntax Description
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
The show ip nbar port-map command displays port assignments for NBAR protocols.
You can use the show ip nbar port-map command to display the current protocol-to-port mappings in use by NBAR. When you use the ip nbar port-map command, the show ip nbar port-map command displays the ports you have assigned to the protocol. If you do not use the ip nbar port-map command to configure any protocol, the show ip nbar port-map command displays the default ports. Use the protocol-name argument to limit the display to a specific protocol. You can either use the UDP or the TCP protocol-type argument type.
Examples
The following is sample output from the show ip nbar port-map command:
Router# show ip nbar port-map
port-map cuseeme udp 7648 7649 24032
port-map cuseeme tcp 7648 7649
port-map dhcp udp 67 68
port-map dhcp tcp 67 68
Table 61 describes the significant fields shown in the display.
Related Commands
|
|
ip nbar port-map |
Configures NBAR to search for a protocol or protocol name using a port number other than the well-known port number. |
show ip nbar protocol-discovery
To display the statistics gathered by the Network-Based Application Recognition (NBAR) Protocol Discovery feature, use the show ip nbar protocol-discovery command in privileged EXEC mode.
show ip nbar protocol-discovery [interface type number] [stats {byte-count | bit-rate | packet-count | max-bit-rate}] [protocol protocol-name] [top-n number]
Syntax Description
Command Default
Statistics for all interfaces on which the NBAR Protocol Discovery feature is enabled are displayed.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
Use the show ip nbar protocol-discovery command to display statistics gathered by the NBAR Protocol Discovery feature. This command, by default, displays statistics for all interfaces on which protocol discovery is currently enabled. The default output of this command includes, in the following order, input bit rate (in bits per second), input byte count, input packet count, and protocol name.
Protocol discovery can be used to monitor both input and output traffic and may be applied with or without a service policy enabled. NBAR protocol discovery gathers statistics for packets switched to output interfaces. These statistics are not necessarily for packets that exited the router on the output interfaces, because packets may have been dropped after switching for various reasons, including policing at the output interface, access lists, or queue drops.
Layer 2/3 Etherchannel Support
With Cisco IOS Release 12.2(18)ZYA, intended for use on the Cisco 6500 series switch that is equipped with a Supervisor 32/programmable intelligent services accelerator (PISA), the show ip nbar protocol-discovery command is supported on both Layer 2 and Layer 3 Etherchannels.
Examples
The following example displays output from the show ip nbar protocol-discovery command for the five most active protocols on an Ethernet interface:
Router# show ip nbar protocol-discovery top-n 5
Ethernet2/0
Input Output
----- ------
Protocol Packet Count Packet Count
Byte Count Byte Count
30sec Bit Rate (bps) 30sec Bit Rate (bps)
30sec Max Bit Rate (bps) 30sec Max Bit Rate (bps)
--------------------------- ------------------------ ------------------------
rtp 3272685 3272685
242050604 242050604
768000 768000
2002000 2002000
gnutella 513574 513574
118779716 118779716
383000 383000
987000 987000
ftp 482183 482183
37606237 37606237
121000 121000
312000 312000
http 144709 144709
32351383 32351383
105000 105000
269000 269000
netbios 96606 96606
10627650 10627650
36000 36000
88000 88000
unknown 1724428 1724428
534038683 534038683
2754000 2754000
4405000 4405000
Total 6298724 6298724
989303872 989303872
4213000 4213000
8177000 8177000
Table 62 describes the significant fields shown in the display.
Related Commands
|
|
ip nbar protocol-discovery |
Configures NBAR to discover traffic for all protocols known to NBAR on a particular interface. |
show ip nbar protocol-id
To display information about Network-Based Application Recognition (NBAR) protocol IDs, use the show ip nbar protocol-id command in privileged EXEC mode.
show ip nbar protocol-id [protocol-name]
Syntax Description
protocol-name |
(Optional) Name of the protocol. |
Command Default
If the optional argument is not specified, NBAR protocol IDs for all protocols are displayed.
Command Modes
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip nbar protocol-id command:
Router# show ip nbar protocol-id
Protocol Name id type
----------------------------------------------
ftp 2 Standard
http 3 Standard
egp 8 L3 IANA
gre 47 L3 IANA
icmp 1 L3 IANA
eigrp 88 L3 IANA
ipinip 4 L3 IANA
ipsec 9 Standard
ospf 89 L3 IANA
bgp 179 L4 IANA
cuseeme 12 Standard
dhcp 13 Standard
finger 79 L4 IANA
gopher 70 L4 IANA
secure-http 16 Standard
imap 17 Standard
secure-imap 18 Standard
irc 194 L4 IANA
secure-irc 994 L4 IANA
kerberos 21 Standard
l2tp 1701 L4 IANA
ldap 389 L4 IANA
secure-ldap 636 L4 IANA
sqlserver 1433 L4 IANA
netbios 26 Standard
nfs 2049 L4 IANA
nntp 28 Standard
secure-nntp 563 L4 IANA
notes 1352 L4 IANA
ntp 123 L4 IANA
pcanywhere 32 Standard
pop3 110 L4 IANA
secure-pop3 995 L4 IANA
pptp 1723 L4 IANA
rip 520 L4 IANA
rsvp 37 Standard
snmp 38 Standard
socks 39 Standard
ssh 22 L4 IANA
syslog 41 Standard
telnet 23 L4 IANA
secure-telnet 992 L4 IANA
secure-ftp 990 L4 IANA
xwindows 45 Standard
printer 515 L4 IANA
novadigm 47 Standard
tftp 48 Standard
exchange 49 Standard
vdolive 50 Standard
sqlnet 51 Standard
rcmd 52 Standard
netshow 53 Standard
sunrpc 54 Standard
streamwork 55 Standard
citrix 56 Standard
fasttrack 57 Standard
gnutella 58 Standard
kazaa2 59 Standard
rtsp 60 Standard
rtp 61 Standard
mgcp 62 Standard
skinny 63 Standard
h323 64 Standard
sip 65 Standard
rtcp 66 Standard
winmx 68 Standard
bittorrent 69 Standard
directconnect 70 Standard
smtp 71 Standard
dns 72 Standard
hl7 73 Standard
fix 74 Standard
msn-messenger 75 Standard
dicom 76 Standard
yahoo-messenger 77 Standard
mapi 78 Standard
aol-messenger 79 Standard
cifs 80 Standard
cisco-phone 81 Standard
youtube 82 Standard
skype 83 Standard
sap 84 Standard
blizwow 85 Standard
whois++ 63 L4 IANA
klogin 543 L4 IANA
kshell 544 L4 IANA
ora-srv 1525 L4 IANA
sqlexec 9088 L4 IANA
clearcase 371 L4 IANA
appleqtc 458 L4 IANA
rcp 469 L4 IANA
isakmp 500 L4 IANA
ibm-db2 523 L4 IANA
lockd 4045 L4 IANA
npp 92 L4 IANA
microsoftds 98 Standard
doom 666 L4 IANA
vnc 100 Standard
echo 7 L4 IANA
systat 11 L4 IANA
daytime 13 L4 IANA
chargen 19 L4 IANA
time 37 L4 IANA
isi-gl 55 L4 IANA
rtelnet 107 L4 IANA
server-ipx 213 L4 IANA
xdmcp 177 L4 IANA
nicname 43 L4 IANA
corba-iiop 111 Standard
tacacs 112 Standard
telepresence-media 113 Standard
telepresence-control 114 Standard
edonkey 243 Custom
custom-10 244 Custom
custom-09 245 Custom
custom-08 246 Custom
custom-07 247 Custom
custom-06 248 Custom
custom-05 249 Custom
custom-04 250 Custom
custom-03 251 Custom
custom-02 252 Custom
custom-01 253 Custom
mftp 349 L4 IANA
matip-type-a 350 L4 IANA
matip-type-b 351 L4 IANA
dtag-ste-sb 352 L4 IANA
ndsauth 353 L4 IANA
datex-asn 355 L4 IANA
cloanto-net-1 356 L4 IANA
bhevent 357 L4 IANA
shrinkwrap 358 L4 IANA
nsrmp 359 L4 IANA
scoi2odialog 360 L4 IANA
semantix 361 L4 IANA
srssend 362 L4 IANA
rsvp_tunnel 363 L4 IANA
aurora-cmgr 364 L4 IANA
dtk 365 L4 IANA
odmr 366 L4 IANA
mortgageware 367 L4 IANA
qbikgdp 368 L4 IANA
rpc2portmap 369 L4 IANA
codaauth2 370 L4 IANA
ulistproc 372 L4 IANA
legent-1 373 L4 IANA
legent-2 374 L4 IANA
hassle 375 L4 IANA
tnETOS 377 L4 IANA
is99c 379 L4 IANA
is99s 380 L4 IANA
hp-collector 381 L4 IANA
hp-managed-node 382 L4 IANA
hp-alarm-mgr 383 L4 IANA
arns 384 L4 IANA
ibm-app 385 L4 IANA
asa 386 L4 IANA
aurp 387 L4 IANA
unidata-ldm 388 L4 IANA
fatserv 347 L4 IANA
uis 390 L4 IANA
synotics-relay 391 L4 IANA
synotics-broker 392 L4 IANA
meta5 393 L4 IANA
embl-ndt 394 L4 IANA
netware-ip 396 L4 IANA
mptn 397 L4 IANA
kryptolan 398 L4 IANA
iso-tsap-c2 399 L4 IANA
ups 401 L4 IANA
genie 402 L4 IANA
decap 403 L4 IANA
nced 404 L4 IANA
ncld 405 L4 IANA
imsp 406 L4 IANA
timbuktu 407 L4 IANA
prm-sm 408 L4 IANA
prm-nm 409 L4 IANA
decladebug 410 L4 IANA
rmt 411 L4 IANA
synoptics-trap 412 L4 IANA
smsp 413 L4 IANA
infoseek 414 L4 IANA
bnet 415 L4 IANA
onmux 417 L4 IANA
hyper-g 418 L4 IANA
ariel1 419 L4 IANA
ariel2 421 L4 IANA
ariel3 422 L4 IANA
opc-job-start 423 L4 IANA
opc-job-track 424 L4 IANA
smartsdp 426 L4 IANA
svrloc 427 L4 IANA
ocs_cmu 428 L4 IANA
ocs_amu 429 L4 IANA
utmpsd 430 L4 IANA
utmpcd 431 L4 IANA
iasd 432 L4 IANA
nnsp 433 L4 IANA
mobileip-agent 434 L4 IANA
mobilip-mn 435 L4 IANA
dna-cml 436 L4 IANA
comscm 437 L4 IANA
dsfgw 438 L4 IANA
dasp 439 L4 IANA
sgcp 440 L4 IANA
decvms-sysmgt 441 L4 IANA
cvc_hostd 442 L4 IANA
snpp 444 L4 IANA
ddm-rdb 446 L4 IANA
ddm-dfm 447 L4 IANA
ddm-ssl 448 L4 IANA
as-servermap 449 L4 IANA
tserver 450 L4 IANA
sfs-smp-net 451 L4 IANA
sfs-config 452 L4 IANA
creativeserver 453 L4 IANA
contentserver 3365 L4 IANA
creativepartnr 455 L4 IANA
scohelp 457 L4 IANA
skronk 460 L4 IANA
datasurfsrv 461 L4 IANA
datasurfsrvsec 462 L4 IANA
alpes 463 L4 IANA
kpasswd 464 L4 IANA
digital-vrc 466 L4 IANA
mylex-mapd 467 L4 IANA
photuris 468 L4 IANA
scx-proxy 470 L4 IANA
mondex 471 L4 IANA
ljk-login 472 L4 IANA
hybrid-pop 473 L4 IANA
tn-tl-fd1 476 L4 IANA
ss7ns 477 L4 IANA
spsc 478 L4 IANA
iafserver 479 L4 IANA
iafdbase 480 L4 IANA
bgs-nsi 482 L4 IANA
ulpnet 483 L4 IANA
integra-sme 484 L4 IANA
powerburst 485 L4 IANA
avian 486 L4 IANA
saft 487 L4 IANA
gss-http 488 L4 IANA
nest-protocol 489 L4 IANA
micom-pfs 490 L4 IANA
go-login 491 L4 IANA
ticf-1 492 L4 IANA
ticf-2 493 L4 IANA
pov-ray 494 L4 IANA
intecourier 495 L4 IANA
pim-rp-disc 496 L4 IANA
dantz 497 L4 IANA
siam 498 L4 IANA
iso-ill 499 L4 IANA
stmf 501 L4 IANA
asa-appl-proto 502 L4 IANA
intrinsa 503 L4 IANA
mailbox-lm 505 L4 IANA
ohimsrv 506 L4 IANA
crs 507 L4 IANA
xvttp 508 L4 IANA
snare 509 L4 IANA
fcp 510 L4 IANA
passgo 511 L4 IANA
exec 512 L4 IANA
shell 430 Standard
videotex 516 L4 IANA
talk 517 L4 IANA
ntalk 518 L4 IANA
utime 519 L4 IANA
ripng 521 L4 IANA
ulp 522 L4 IANA
pdap 344 L4 IANA
ncp 524 L4 IANA
timed 525 L4 IANA
tempo 526 L4 IANA
stx 527 L4 IANA
custix 528 L4 IANA
irc-serv 529 L4 IANA
courier 530 L4 IANA
conference 531 L4 IANA
netnews 532 L4 IANA
netwall 533 L4 IANA
iiop 535 L4 IANA
opalis-rdv 536 L4 IANA
nmsp 537 L4 IANA
gdomap 538 L4 IANA
apertus-ldp 539 L4 IANA
uucp 540 L4 IANA
uucp-rlogin 541 L4 IANA
commerce 542 L4 IANA
appleqtcsrvr 545 L4 IANA
dhcpv6-client 546 L4 IANA
dhcpv6-server 547 L4 IANA
idfp 549 L4 IANA
new-rwho 550 L4 IANA
cybercash 551 L4 IANA
pirp 553 L4 IANA
remotefs 556 L4 IANA
openvms-sysipc 557 L4 IANA
sdnskmp 558 L4 IANA
teedtap 559 L4 IANA
rmonitor 560 L4 IANA
monitor 561 L4 IANA
chshell 562 L4 IANA
9pfs 564 L4 IANA
whoami 565 L4 IANA
streettalk 566 L4 IANA
banyan-rpc 567 L4 IANA
ms-shuttle 568 L4 IANA
ms-rome 569 L4 IANA
meter 570 L4 IANA
sonar 572 L4 IANA
banyan-vip 573 L4 IANA
ftp-agent 574 L4 IANA
vemmi 575 L4 IANA
ipcd 576 L4 IANA
vnas 577 L4 IANA
ipdd 578 L4 IANA
decbsrv 579 L4 IANA
sntp-heartbeat 580 L4 IANA
bdp 581 L4 IANA
scc-security 582 L4 IANA
philips-vc 583 L4 IANA
keyserver 584 L4 IANA
password-chg 586 L4 IANA
submission 587 L4 IANA
tns-cml 590 L4 IANA
http-alt 8008 L4 IANA
eudora-set 592 L4 IANA
http-rpc-epmap 593 L4 IANA
tpip 594 L4 IANA
cab-protocol 595 L4 IANA
smsd 596 L4 IANA
ptcnameservice 597 L4 IANA
sco-websrvrmg3 598 L4 IANA
acp 599 L4 IANA
ipcserver 600 L4 IANA
urm 606 L4 IANA
nqs 607 L4 IANA
sift-uft 608 L4 IANA
npmp-trap 609 L4 IANA
npmp-local 610 L4 IANA
npmp-gui 611 L4 IANA
hmmp-ind 612 L4 IANA
hmmp-op 613 L4 IANA
sshell 614 L4 IANA
sco-inetmgr 615 L4 IANA
sco-sysmgr 616 L4 IANA
sco-dtmgr 617 L4 IANA
dei-icda 618 L4 IANA
sco-websrvrmgr 620 L4 IANA
escp-ip 621 L4 IANA
collaborator 622 L4 IANA
cryptoadmin 624 L4 IANA
dec_dlm 625 L4 IANA
passgo-tivoli 627 L4 IANA
qmqp 628 L4 IANA
3com-amp3 629 L4 IANA
rda 630 L4 IANA
ipp 631 L4 IANA
bmpp 632 L4 IANA
servstat 633 L4 IANA
ginad 634 L4 IANA
rlzdbase 635 L4 IANA
lanserver 637 L4 IANA
mcns-sec 638 L4 IANA
msdp 639 L4 IANA
entrust-sps 640 L4 IANA
repcmd 641 L4 IANA
esro-emsdp 642 L4 IANA
sanity 643 L4 IANA
dwr 644 L4 IANA
ldp 646 L4 IANA
dhcp-failover 647 L4 IANA
rrp 648 L4 IANA
aminet 2639 L4 IANA
obex 650 L4 IANA
ieee-mms 651 L4 IANA
hello-port 652 L4 IANA
repscmd 653 L4 IANA
aodv 654 L4 IANA
tinc 655 L4 IANA
spmp 656 L4 IANA
rmc 657 L4 IANA
tenfold 658 L4 IANA
mac-srvr-admin 660 L4 IANA
hap 661 L4 IANA
pftp 662 L4 IANA
purenoise 663 L4 IANA
sun-dr 665 L4 IANA
disclose 667 L4 IANA
mecomm 668 L4 IANA
meregister 669 L4 IANA
vacdsm-sws 670 L4 IANA
vacdsm-app 671 L4 IANA
vpps-qua 672 L4 IANA
cimplex 673 L4 IANA
acap 674 L4 IANA
dctp 675 L4 IANA
vpps-via 676 L4 IANA
vpp 677 L4 IANA
ggf-ncp 678 L4 IANA
mrm 679 L4 IANA
entrust-aaas 680 L4 IANA
entrust-aams 681 L4 IANA
mdc-portmapper 685 L4 IANA
hcp-wismar 686 L4 IANA
asipregistry 687 L4 IANA
realm-rusd 688 L4 IANA
nmap 689 L4 IANA
vatp 690 L4 IANA
msexch-routing 691 L4 IANA
hyperwave-isp 692 L4 IANA
connendp 693 L4 IANA
ha-cluster 694 L4 IANA
ieee-mms-ssl 695 L4 IANA
rushd 696 L4 IANA
uuidgen 697 L4 IANA
olsr 698 L4 IANA
accessnetwork 699 L4 IANA
elcsd 704 L4 IANA
agentx 705 L4 IANA
silc 706 L4 IANA
borland-dsj 707 L4 IANA
entrust-kmsh 709 L4 IANA
entrust-ash 710 L4 IANA
cisco-tdp 711 L4 IANA
netviewdm1 729 L4 IANA
netviewdm2 730 L4 IANA
netviewdm3 731 L4 IANA
netgw 741 L4 IANA
netrcs 742 L4 IANA
flexlm 744 L4 IANA
fujitsu-dev 747 L4 IANA
ris-cm 748 L4 IANA
pump 751 L4 IANA
qrh 752 L4 IANA
rrh 753 L4 IANA
tell 754 L4 IANA
nlogin 758 L4 IANA
con 759 L4 IANA
ns 760 L4 IANA
rxe 761 L4 IANA
quotad 762 L4 IANA
cycleserv 763 L4 IANA
omserv 764 L4 IANA
webster 765 L4 IANA
phonebook 767 L4 IANA
vid 769 L4 IANA
cadlock 770 L4 IANA
rtip 771 L4 IANA
cycleserv2 772 L4 IANA
submit 643 Standard
entomb 775 L4 IANA
multiling-http 777 L4 IANA
wpgs 780 L4 IANA
device 801 L4 IANA
itm-mcell-s 828 L4 IANA
pkix-3-ca-ra 829 L4 IANA
dhcp-failover2 847 L4 IANA
rsync 873 L4 IANA
iclcnet-locate 886 L4 IANA
iclcnet_svinfo 887 L4 IANA
accessbuilder 888 L4 IANA
omginitialrefs 900 L4 IANA
smpnameres 901 L4 IANA
xact-backup 911 L4 IANA
ftps-data 989 L4 IANA
nas 991 L4 IANA
vsinet 996 L4 IANA
maitrd 997 L4 IANA
applix 999 L4 IANA
surf 1010 L4 IANA
rmiactivation 1098 L4 IANA
rmiregistry 1099 L4 IANA
ms-sql-m 1434 L4 IANA
ms-olap 2393 L4 IANA
msft-gc 3268 L4 IANA
msft-gc-ssl 3269 L4 IANA
tlisrv 1527 L4 IANA
coauthor 1529 L4 IANA
rdb-dbs-disp 1571 L4 IANA
oraclenames 1575 L4 IANA
oraclenet8cman 1630 L4 IANA
net8-cman 1830 L4 IANA
micromuse-lm 1534 L4 IANA
orbix-locator 3075 L4 IANA
orbix-config 3076 L4 IANA
orbix-loc-ssl 3077 L4 IANA
shockwave 1626 L4 IANA
sitaraserver 2629 L4 IANA
sitaramgmt 2630 L4 IANA
sitaradir 2631 L4 IANA
mysql 3306 L4 IANA
net-assistant 3283 L4 IANA
msnp 1863 L4 IANA
groove 2492 L4 IANA
directplay 2234 L4 IANA
directplay8 6073 L4 IANA
kali 2213 L4 IANA
worldfusion 2595 L4 IANA
directv-web 3334 L4 IANA
directv-soft 3335 L4 IANA
directv-tick 3336 L4 IANA
directv-catlg 3337 L4 IANA
wap-push 2948 L4 IANA
wap-pushsecure 2949 L4 IANA
wap-push-http 4035 L4 IANA
wap-push-https 4036 L4 IANA
wap-wsp 9200 L4 IANA
wap-wsp-wtp 9201 L4 IANA
wap-wsp-s 9202 L4 IANA
wap-wsp-wtp-s 9203 L4 IANA
wap-vcard 9204 L4 IANA
wap-vcal 9205 L4 IANA
wap-vcard-s 9206 L4 IANA
wap-vcal-s 9207 L4 IANA
ibprotocol 6714 L4 IANA
gtp-user 2152 L4 IANA
xdtp 3088 L4 IANA
parsec-game 6582 L4 IANA
hopopt 0 L3 IANA
ggp 3 L3 IANA
st 5 L3 IANA
cbt 7 L3 IANA
zserv 346 L4 IANA
igrp 9 L3 IANA
bbnrccmon 10 L3 IANA
pawserv 345 L4 IANA
texar 333 L4 IANA
rtsps 322 L4 IANA
pip 1321 L4 IANA
ptp-general 320 L4 IANA
nat-stun 3478 L4 IANA
compressnet 2 L4 IANA
rje 5 L4 IANA
discard 9 L4 IANA
qotd 17 L4 IANA
msp 18 L4 IANA
ftp-data 20 L4 IANA
nsw-fe 27 L4 IANA
msg-icp 29 L4 IANA
csi-sgwp 348 L4 IANA
msg-auth 31 L4 IANA
dsp 33 L4 IANA
rap 38 L4 IANA
rlp 39 L4 IANA
graphics 41 L4 IANA
name 42 L4 IANA
profile 136 L4 IANA
mpm-flags 44 L4 IANA
mpm 45 L4 IANA
mpm-snd 46 L4 IANA
ni-ftp 47 L4 IANA
auditd 48 L4 IANA
emfis-data 140 L4 IANA
re-mail-ck 50 L4 IANA
la-maint 51 L4 IANA
xns-time 52 L4 IANA
emfis-cntl 141 L4 IANA
xns-ch 54 L4 IANA
bl-idm 142 L4 IANA
xns-auth 56 L4 IANA
xns-mail 58 L4 IANA
ni-mail 61 L4 IANA
acas 62 L4 IANA
covia 64 L4 IANA
sql*net 66 L4 IANA
bootps 67 L4 IANA
bootpc 68 L4 IANA
uaac 145 L4 IANA
iso-tp0 146 L4 IANA
netrjs-1 71 L4 IANA
netrjs-2 72 L4 IANA
netrjs-3 73 L4 IANA
netrjs-4 74 L4 IANA
deos 76 L4 IANA
iso-ip 147 L4 IANA
xfer 82 L4 IANA
mit-ml-dev 83 L4 IANA
ctf 84 L4 IANA
mfcobol 86 L4 IANA
jargon 148 L4 IANA
su-mit-tg 89 L4 IANA
dnsix 90 L4 IANA
mit-dov 91 L4 IANA
aed-512 149 L4 IANA
dcp 93 L4 IANA
objcall 94 L4 IANA
supdup 95 L4 IANA
dixie 96 L4 IANA
swift-rvf 97 L4 IANA
tacnews 98 L4 IANA
metagram 99 L4 IANA
hostname 101 L4 IANA
iso-tsap 102 L4 IANA
acr-nema 104 L4 IANA
csnet-ns 105 L4 IANA
3com-tsmux 106 L4 IANA
sql-net 150 L4 IANA
snagas 108 L4 IANA
pop2 109 L4 IANA
hems 151 L4 IANA
mcidas 112 L4 IANA
auth 113 L4 IANA
sftp 115 L4 IANA
ansanotify 116 L4 IANA
uucp-path 117 L4 IANA
sqlserv 118 L4 IANA
cfdptkt 120 L4 IANA
erpc 121 L4 IANA
smakynet 122 L4 IANA
bftp 152 L4 IANA
ansatrader 124 L4 IANA
locus-map 125 L4 IANA
nxedit 126 L4 IANA
locus-con 127 L4 IANA
gss-xlicen 128 L4 IANA
pwdgen 129 L4 IANA
cisco-fna 130 L4 IANA
sgmp 153 L4 IANA
netsc-prod 154 L4 IANA
netsc-dev 155 L4 IANA
knet-cmp 157 L4 IANA
pcmail-srv 158 L4 IANA
nss-routing 159 L4 IANA
sgmp-traps 160 L4 IANA
cmip-man 163 L4 IANA
cmip-agent 164 L4 IANA
xns-courier 165 L4 IANA
s-net 166 L4 IANA
namp 167 L4 IANA
rsvd 168 L4 IANA
send 169 L4 IANA
print-srv 170 L4 IANA
multiplex 171 L4 IANA
xyplex-mux 173 L4 IANA
mailq 174 L4 IANA
vmnet 175 L4 IANA
genrad-mux 176 L4 IANA
nextstep 178 L4 IANA
ris 180 L4 IANA
unify 181 L4 IANA
audit 182 L4 IANA
ocbinder 183 L4 IANA
ocserver 184 L4 IANA
remote-kis 185 L4 IANA
kis 186 L4 IANA
mumps 188 L4 IANA
qft 189 L4 IANA
gacp 190 L4 IANA
prospero 191 L4 IANA
osu-nms 192 L4 IANA
srmp 193 L4 IANA
dn6-nlm-aud 195 L4 IANA
dls 197 L4 IANA
dls-mon 198 L4 IANA
smux 199 L4 IANA
src 200 L4 IANA
at-rtmp 201 L4 IANA
at-nbp 202 L4 IANA
at-3 203 L4 IANA
at-echo 204 L4 IANA
at-5 205 L4 IANA
at-zis 206 L4 IANA
at-7 207 L4 IANA
at-8 208 L4 IANA
qmtp 209 L4 IANA
z39.50 210 L4 IANA
914c/g 211 L4 IANA
anet 212 L4 IANA
vmpwscs 214 L4 IANA
softpc 215 L4 IANA
CAIlic 216 L4 IANA
dbase 217 L4 IANA
mpp 218 L4 IANA
uarps 219 L4 IANA
fln-spx 221 L4 IANA
rsh-spx 222 L4 IANA
cdc 223 L4 IANA
masqdialer 224 L4 IANA
sur-meas 243 L4 IANA
inbusiness 244 L4 IANA
dsp3270 246 L4 IANA
subntbcst_tftp 247 L4 IANA
bhfhs 248 L4 IANA
set 257 L4 IANA
esro-gen 259 L4 IANA
openport 260 L4 IANA
nsiiops 261 L4 IANA
arcisdms 262 L4 IANA
hdap 263 L4 IANA
bgmp 264 L4 IANA
x-bone-ctl 265 L4 IANA
sst 266 L4 IANA
td-service 267 L4 IANA
td-replica 268 L4 IANA
http-mgmt 280 L4 IANA
personal-link 281 L4 IANA
cableport-ax 282 L4 IANA
rescap 283 L4 IANA
corerjd 284 L4 IANA
k-block 287 L4 IANA
novastorbakcup 308 L4 IANA
bhmds 310 L4 IANA
asip-webadmin 311 L4 IANA
vslmp 312 L4 IANA
magenta-logic 313 L4 IANA
opalis-robot 314 L4 IANA
dpsi 315 L4 IANA
decauth 316 L4 IANA
zannet 317 L4 IANA
pkix-timestamp 318 L4 IANA
ptp-event 319 L4 IANA
cisco-tna 131 L4 IANA
cisco-sys 132 L4 IANA
statsrv 133 L4 IANA
ingres-net 134 L4 IANA
Konspire2b 6085 L4 IANA
Total protocols: 721
Table 63 describes the significant fields shown in the display.
Related Commands
show ip nbar protocol-pack
To display protocol pack information, use the show ip nbar protocol-pack command in user EXEC or privileged EXEC mode.
show ip nbar protocol-pack {protocol-pack | active} [detail]
Syntax Description
protocol-pack |
Protocol pack file path and name. |
active |
Displays active protocol pack information. |
detail |
(Optional) Displays detailed protocol pack information. |
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
---|---|
Cisco IOS XE Release 3.3S |
This command was introduced. |
Usage Guidelines
The protocol pack is a single compressed file that contains multiple Protocol Description Language (PDL) files and a manifest file. Before the protocol pack was introduced, PDLs had to be loaded separately. Now a set of required protocols can be loaded, which helps network-based application recognition (NBAR) to recognize additional protocols for classification on your network.
Examples
The following sample output from the show ip nbar protocol-pack command shows information about the active protocol pack:
Router# show ip nbar protocol-pack active
ACTIVE protocol pack:
Name: Default Protocol Pack
Version: 1.0
Publisher: Cisco Systems Inc.
The following sample output from the show ip nbar protocol-pack command shows detailed information about the active protocol pack:
Router# show ip nbar protocol-pack active detail
ACTIVE protocol pack:
Name: Default Protocol Pack
Version: 1.0
Publisher: Cisco Systems Inc.
Protocols:
base Mv: 4
ftp Mv: 5
http Mv: 18
static Mv: 6
socks Mv: 2
nntp Mv: 2
tftp Mv: 2
exchange Mv: 3
vdolive Mv: 1
sqlnet Mv: 2
netshow Mv: 3
sunrpc Mv: 3
streamwork Mv: 2
citrix Mv: 11
fasttrack Mv: 3
gnutella Mv: 7
kazaa2 Mv: 11
Table 64 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
default ip nbar protocol-pack |
Loads the base version of the protocol pack and removes all other loaded protocol packs. |
ip nbar protocol-pack |
Loads a protocol pack. |
show ip nbar unclassified-port-stats
To display the network-based application recognition (NBAR) port statistics for unclassified packets, use the show ip nbar unclassified-port-stats command in privileged EXEC mode.
show ip nbar unclassified-port-stats [top-talkers | ip [protocol-number [number-protocols] | top top-talkers] | [tcp | udp] [port-number [number-ports] | top top-talkers | bottom bottom-talkers]]
Syntax Description
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
By default, NBAR unclassified mechanisms are not enabled. Use the debug ip nbar unclassified-port-stats command to enable the router to begin tracking the ports on which packets arrive. Then use the show ip nbar unclassified-port-stats command to verify the collected information.
Examples
The following is sample output from show ip nbar unclassified-port-stats command.
Note The output displays the port number, the protocol and the number of packets. For example, in 80/tcp:48, 80 represents the port number; tcp, the protocol, and 48, the number of packets.
Router# show ip nbar unclassified-port-stats
-tcp-
80/tcp:48
1443/tcp:3
1423/tcp:2
1424/tcp:2
1425/tcp:2
-udp-
1985/udp:158
1029/udp:13
496/udp:4
1445/udp:3
1449/udp:2
Table 65 describes the significant fields shown in the display.
Related Commands
show ip nbar version
To display information about the version of the network-based application recognition (NBAR) software in your Cisco IOS release or the version of an NBAR Packet Description Language Module (PDLM) on your Cisco IOS router, use the show ip nbar version command in privileged EXEC mode.
show ip nbar version [PDLM-name]
Syntax Description
PDLM-name |
(Optional) Specifies the name of a specific PDLM whose information will be displayed. |
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The show ip nbar version command treats all protocols that were added to NBAR after the initial NBAR release as PDLMs, including protocols that were added into the Cisco IOS software without a user having to download a PDLM from Cisco.com. PDLMs downloaded from Cisco.com and incorporated into NBAR by the user also appear when the show ip nbar version command is entered.
When using NBAR, various elements within NBAR are assigned versioning numbers. These versioning numbers become significant when you want to download a PDLM. PDLMs, which are also versioned, can be downloaded only to NBAR on a particular Cisco IOS release if the PDLM versioning numbers are compatible with the NBAR version numbers in the Cisco IOS software.
The following NBAR-related version information is available:
•NBAR Software Version—Version of NBAR software running on the current version of Cisco IOS software.
•Resident Module Version—Version of the NBAR-supported PDLM protocol.
The following version number is kept by the PDLM:
•NBAR Software Version—Minimum version of the NBAR software that is required to load this PDLM.
The show ip nbar version command provides version information for PDLMs already loaded onto the Cisco IOS software.
Examples
The following is sample output from the show ip nbar version command:
Router# show ip nbar version
NBAR software version: 3
1 base Mv: 2
2 ftp Mv: 2
3 http Mv: 7, Nv: 3; slot1:http_vers.pdlm
4 static-port Mv: 6
5 tftp Mv: 1
6 exchange Mv: 1
7 vdolive Mv: 1
8 sqlnet Mv: 1
9 rcmd Mv: 1
10 netshow Mv: 1
11 sunrpc Mv: 2
12 streamwork Mv: 1
13 citrix Mv: 5
14 fasttrack Mv: 2
15 gnutella Mv: 1
16 kazaa Mv: 6, Nv: 3; slot1:kazaa2_vers.pdlm
17 custom-protocols Mv: 1
18 rtsp Mv: 1
19 rtp Mv: 2
20 mgcp Mv: 1
21 skinny Mv: 1
22 h323 Mv: 1
23 sip Mv: 1
24 rtcp Mv: 1
Table 66 describes the significant fields shown in the display.
For the same network setup, the following example shows the output if a specific protocol with a PDLM is specified in the show ip nbar version CLI:
Router# show ip nbar version http
http Mv: 7, Nv: 3; slot1:http_vers.pdlm
Related Commands
|
|
ip nbar pdlm |
Downloads a PDLM onto a router to add support for additional protocols in NBAR. |
show ip rsvp
To display information about the Resource Reservation Protocol (RSVP), use the show ip rsvp command in user EXEC or privileged EXEC mode.
show ip rsvp
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip rsvp command:
Router# show ip rsvp
RSVP: enabled (on 1 interface(s))
RSVP QoS signalling enabled
MPLS/TE signalling enabled
Signalling:
Refresh interval (msec): 30000
Refresh misses: 4
Rate Limiting: enabled
Burst: 8
Limit: 37
Maxsize: 2000
Period (msec): 20
Max rate (msgs/sec): 400
Refresh Reduction: disabled
ACK delay (msec): 250
Initial retransmit delay (msec): 1000
Local epoch: 0xCE969B
Message IDs: in use 0, total allocated 0, total freed 0
Neighbors: 0
Raw IP encap: 0 UDP encap: 0 Raw IP, UDP encap: 0
RFC 3175 Aggregation: Enabled
Level: 1
Default QoS service: Controlled-Load
Router ID: 10.22.22.22
Number of signaled aggregate reservations: 0
Number of signaled E2E reservation: 0
Number of configured map commands: 0
Number of configured reservation commands: 0
Hello:
RSVP Hello for Fast-Reroute/Reroute: Disabled
Statistics: Disabled
BFD for Fast-Reroute/Reroute: Disabled
RSVP Hello for Graceful Restart: Disabled
Graceful Restart: Disabled
Refresh interval: 10000 msecs
Refresh misses: 4
DSCP: 0x30
Advertised restart time: 5 msecs
Advertised recovery time: 0 msecs
Maximum wait for recovery: 3600000 msecs
Fast-Reroute:
PSBs w/ Local protection desired
Yes: 0
No: 0
Fast Local Repair: enabled
Max repair rate (paths/sec): 400
Max processed (paths/run): 1000
Local policy:
COPS:
Generic policy settings:
Default policy: Accept all
Preemption: Disabled
Table 67 describes the significant fields shown in the display.
Related Commands
show ip rsvp aggregation ip
To display Resource Reservation Protocol (RSVP) summary aggregation information, use the show ip rsvp aggregation ip command in user EXEC or privileged EXEC mode.
show ip rsvp aggregation ip [endpoints [detail] [dscp value] [remote ip-address] [role {aggregator | deaggregator}] | interface [if-name] | map [dscp value] | reservation [dscp value [aggregator ip-address]]
Syntax Description
Command Default
If you enter the show ip rsvp aggregation ip command without an optional keyword, the command displays summary information for all aggregate reservations.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
---|---|
12.2(33)SRC |
This command was introduced. |
Cisco IOS XE Release 2.6 |
This command was integrated into Cisco IOS XE Release 2.6. |
Usage Guidelines
Use the show ip rsvp aggregation ip command to display summary information for aggregation, including the number of aggregate, map, and reservation configurations.
Examples
show ip rsvp aggregation ip command Example
The following is sample output from the show ip rsvp aggregation ip command:
Router# show ip rsvp aggregation ip
RFC 3175 Aggregation: Enabled
Level: 1
Default QoS service: Controlled-Load
Number of signaled aggregate reservations: 2
Number of signaled E2E reservations: 8
Number of configured map commands: 4
Number of configured reservation commands: 1
Table 68 describes the significant fields shown in the display.
show ip rsvp aggregation ip interface Examples
The following is sample output from the show ip rsvp aggregation ip interface command:
Router# show ip rsvp aggregation ip interface
Interface Name Role
-------------------- --------
Ethernet0/0 interior
Serial2/0 exterior
Serial3/0 exterior
Table 69 describes the significant fields shown in the display.
The following is sample output from the show ip rsvp aggregation ip interface command with a specified interface:
Router# show ip rsvp aggregation ip interface Ethernet0/0
Interface Name Role
-------------------- --------
Ethernet0/0 interior
Related Commands
|
|
---|---|
ip rsvp aggregation ip |
Enables RSVP aggregation on a router. |
show ip rsvp aggregation ip endpoints
To display Resource Reservation Protocol (RSVP) information about aggregator and deaggregator routers, use the show ip rsvp aggregation ip endpoints command in user EXEC or privileged EXEC mode.
show ip rsvp aggregation ip endpoints [detail] [dscp value] [remote ip-address] [role {aggregator | deaggregator}]
Syntax Description
Command Default
If you enter the show ip rsvp aggregation ip endpoints command without an optional keyword, the command displays information for all aggregate reservations.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
---|---|
12.2(33)SRC |
This command was introduced. |
Cisco IOS XE Release 2.6 |
This command was integrated into Cisco IOS XE Release 2.6. |
Usage Guidelines
Use the show ip rsvp aggregation ip endpoints command to display any of the following output at aggregator and deaggregator routers:
•All aggregate reservations.
•All aggregate reservations for which a node is the aggregator.
•All aggregate reservations for which a node is the deaggregator.
•All aggregate reservations for which the remote node is identified with an IP address.
•All aggregate reservations for a given DSCP.
•Any combination of the preceding options; for example, all aggregates with a given DSCP for which a node is an aggregator and the remote node as specified in the IP address.
•Any of the preceding options with detailed information.
Examples
The following is sample output from the show ip rsvp aggregation ip endpoints detail command:
Router# show ip rsvp aggregation ip endpoints detail
Role DSCP Aggregator Deaggregator State Rate Used QBM PoolID
----- ---- --------------- --------------- ------ ------- ------- ----------
Agg 46 10.3.3.3 10.4.4.4 ESTABL 100K 100K 0x00000003
Aggregate Reservation for the following E2E Flows (PSBs):
To From Pro DPort Sport Prev Hop I/F BPS
10.4.4.4 10.1.1.1 UDP 1 1 10.23.20.3 Et1/0 100K
Aggregate Reservation for the following E2E Flows (RSBs):
To From Pro DPort Sport Next Hop I/F Fi Serv BPS
10.4.4.4 10.1.1.1 UDP 1 1 10.4.4.4 Se2/0 FF RATE 100K
Aggregate Reservation for the following E2E Flows (Reqs):
To From Pro DPort Sport Next Hop I/F Fi Serv BPS
10.4.4.4 10.1.1.1 UDP 1 1 10.23.20.3 Et1/0 FF RATE 100K
Table 68 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
ip rsvp aggregation ip |
Enables RSVP aggregation on a router. |
show ip rsvp atm-peak-rate-limit
To display the current peak rate limit set for an interface or for all interfaces, if any, use the show ip rsvp atm-peak-rate-limit command in EXEC mode.
show ip rsvp atm-peak-rate-limit [interface-type interface-number]
Syntax Description
interface-type interface-number |
(Optional) Interface type and interface number. |
Command Modes
EXEC
Command History
|
|
---|---|
12.0(3)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
Usage Guidelines
The show ip rsvp atm-peak-rate-limit command displays the configured peak rate using the following notations for brevity:
•Kilobytes is shown as K bytes; for example, 1200 kilobytes is displayed as 1200K bytes.
•1000 kilobytes is displayed as 1M bytes.
If no interface name is specified, configured peak rates for all Resource Reservation Protocol (RSVP)-enabled interfaces are displayed.
Examples
The following example depicts results of the show ip rsvp atm-peak-rate-limit command, presuming that the ATM subinterface 2/0/0.1 was configured with a reservation peak rate limit of 100 KB using the ip rsvp atm-peak-rate-limit command.
The following is sample output from the show ip rsvp atm-peak-rate-limit command using the interface-type interface-number arguments:
Router# show ip rsvp atm-peak-rate-limit atm2/0/0.1
RSVP: Peak rate limit for ATM2/0/0.1 is 100K bytes
The following samples show output from the show ip rsvp atm-peak-rate-limit command when no interface name is given:
Router# show ip rsvp atm-peak-rate-limit
Interface name Peak rate limit
Ethernet0/1/1 not set
ATM2/0/0 not set
ATM2/0/0.1 100K
Router# show ip rsvp atm-peak-rate-limit
Interface name Peak rate limit
Ethernet0/1 not set
ATM2/1/0 1M
ATM2/1/0.10 not set
ATM2/1/0.11 not set
ATM2/1/0.12 not set
Related Commands
|
|
---|---|
ip rsvp atm-peak-rate-limit |
Sets a limit on the peak cell rate of reservations for all newly created RSVP SVCs established on the current interface or any of its subinterfaces. |
show ip rsvp authentication
To display the security associations that Resource Reservation Protocol (RSVP) has established with other RSVP neighbors, use the show ip rsvp authentication command in user EXEC or privileged EXEC mode.
show ip rsvp authentication [detail] [from {ip-address | hostname}] [to {ip-address | hostname}]
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Usage Guidelines
Use the show ip rsvp authentication command to display the security associations that RSVP has established with other RSVP neighbors. You can display all security associations or specify an IP address or hostname of a particular RSVP neighbor, which restricts the size of the display.
The difference between the ip-address and hostname arguments is whether you specify the neighbor by its IP address or by its name.
Examples
The following is sample output from the show ip rsvp authentication command:
Router# show ip rsvp authentication
Codes: S - static, D - dynamic, N - neighbor, I -interface, C - chain
From To I/F Mode Key-Source Key-ID Code
192.168.102.1 192.168.104.3 Et2/2 Send RSVPKey 1 DNC
192.168.104.1 192.168.104.3 Et2/2 Send RSVPKey 1 DNC
192.168.104.1 192.168.104.3 AT1/0.1 Send RSVPKey 1 DNC
192.168.106.1 192.168.104.3 AT1/0.1 Send RSVPKey 1 DNC
192.168.106.1 192.168.106.2 AT1/0.1 Send RSVPKey 1 DNC
192.168.106.2 192.168.104.1 AT1/0.1 Receive RSVPKey 1 DNC
192.168.106.2 192.168.106.1 AT1/0.1 Receive RSVPKey 1 DNC
Table 71 describes the significant fields shown in the display.
The following is sample output from the show ip rsvp authentication detail command:
Router# show ip rsvp authentication detail
From: 192.168.102.1
To: 192.168.104.3
Neighbor: 192.168.102.2
Interface: Ethernet2/2
Mode: Send
Key ID: 1
Key ACL: R2 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: 01000411
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:17:08
Challenge: Supported
Window size: 1
Last seq # sent: 14167519095569779135
From: 192.168.104.1
To: 192.168.104.3
Neighbor: 192.168.102.2
Interface: Ethernet2/2
Mode: Send
Key ID: 1
Key ACL: R2 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: 0400040F
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:22:06
Challenge: Supported
Window size: 1
Last seq # sent: 14167520384059965440
From: 192.168.104.1
To: 192.168.104.3
Neighbor: 192.168.106.2
Interface: ATM1/0.1
Mode: Send
Key ID: 1
Key ACL: R3 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: 02000404
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:16:37
Challenge: Supported
Window size: 1
Last seq # sent: 14167518979605659648
From: 192.168.106.1
To: 192.168.104.3
Neighbor: 192.168.106.2
Interface: ATM1/0.1
Mode: Send
Key ID: 1
Key ACL: R3 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: 01000408
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:11:37
Challenge: Supported
Window size: 1
Last seq # sent: 14167517691115473376
From: 192.168.106.1
To: 192.168.106.2
Neighbor: 192.168.106.2
Interface: ATM1/0.1
Mode: Send
Key ID: 1
Key ACL: R3 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: 8D00040E
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:29:29
Challenge: Supported
Window size: 1
Last seq # sent: 14167808344437293057
From: 192.168.106.2
To: 192.168.104.1
Neighbor: 192.168.106.2
Interface: ATM1/0.1
Mode: Receive
Key ID: 1
Key ACL: R3 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: CD00040A
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:29:33
Challenge: Not configured
Window size: 1
Last seq # rcvd: 14167808280012783626
From: 192.168.106.2
To: 192.168.106.1
Neighbor: 192.168.106.2
Interface: ATM1/0.1
Mode: Receive
Key ID: 1
Key ACL: R3 (populated)
Key Source: RSVPKey (enabled)
Key Type: Dynamic per-neighbor chain
Handle: C0000412
Hash Type: MD5
Lifetime: 00:30:00
Expires: 00:29:33
Challenge: Not configured
Window size: 1
Last seq # rcvd: 14167808280012783619
Table 72 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
clear ip rsvp authentication |
Eliminates RSVP security associations before their lifetimes expire. |
show ip rsvp counters
To display the number of Resource Reservation Protocol (RSVP) messages that were sent and received on each interface, use the show ip rsvp counters command in user EXEC or privileged EXEC mode.
show ip rsvp counters [authentication] [interface type number | neighbor [vrf {* | vrf-name}] | state teardown | summary]
Syntax Description
Command Default
If you enter the show ip rsvp counters command without an optional keyword, the command displays the number of RSVP messages that were sent and received for each interface on which RSVP is configured.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
Summary Example
The following example shows the values for the number of RSVP messages of each type that were sent and received by the router over all interfaces, including the hello and message queues information:
Router# show ip rsvp counters summary
All Interfaces Recv Xmit Recv Xmit
Path 110 15 Resv 50 28
PathError 0 0 ResvError 0 0
PathTear 0 0 ResvTear 0 0
ResvConf 0 0 RTearConf 0 0
Ack 0 0 Srefresh 0 0
Hello 5555 5554 IntegrityChalle 0 0
IntegrityRespon 0 0 DSBM_WILLING 0 0
I_AM_DSBM 0 0
Unknown 0 0 Errors 0 0
Recv Msg Queues Current Max
RSVP 0 2
Hello (per-I/F) 0 1
Awaiting Authentication 0 0
Table 73 describes the significant fields shown in the display.
VRF Example
The following example shows the values for the number of RSVP messages for a specified neighbor with a VRF named myvrf:
Router# show ip rsvp counters neighbor vrf myvrf
VRF: myvrf
Neighbor: 10.10.15.13
Rate-Limiting:
Output queue overflow, number of dropped RSVP messages: 0
Refresh-Reduction:
Number of RSVP messages received out of order: 0
Number of retransmitted RSVP messages: 0
Table 74 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
clear ip rsvp counters |
Clears (sets to zero) all IP RSVP counters that are being maintained. |
show ip rsvp counters state teardown
To display counters for Resource Reservation Protocol (RSVP) events that caused a state to be torn down, use the show ip rsvp counters state teardown command in user EXEC or privileged EXEC mode.
show ip rsvp counters state teardown
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Usage Guidelines
Use the show ip rsvp counters state teardown command when a label-switched path (LSP) is down. If graceful restart triggered the state teardown, the numbers in the Path, Resv-In, and Resv-Out columns in the "Examples" section are greater than 0.
Examples
The following is sample output from the show ip rsvp counters state teardown command:
Router# show ip rsvp counters state teardown
States
Reason for Teardown State torn down
Path Resv-In Resv-Out
PathTear arrival 0 0 0
ResvTear arrival 0 0 0
Local application requested tear 0 0 0
Output or Input I/F went down 0 0 0
Missed refreshes 0 0 0
Preemption 0 0 0
Backup tunnel failed for FRR Active LSP 0 0 0
Reroutabilty changed for FRR Active LSP 0 0 0
Hello RR Client (HST) requested tear 0 0 0
Graceful Restart (GR) requested tear 0 0 0
Downstream neighbor SSO-restarting 0 0 0
Resource unavailable 0 0 0
Policy rejection 0 0 0
Policy server sync failed 0 0 0
Traffic control error 0 0 0
Error in received message 0 0 0
Non RSVP HOP upstream, TE LSP 0 0 0
Other 0 0 0
Table 75 describes the significant fields shown in the display.
Related Commands
|
|
clear ip rsvp counters |
Clears (sets to zero) the IP RSVP counters that are being maintained. |
show ip rsvp fast bw-protect
To display information about whether backup bandwidth protection is enabled and the status of backup tunnels that may be used to provide that protection, use the show ip rsvp fast bw-protect command in user EXEC or privileged EXEC mode.
show ip rsvp fast bw-protect [detail] [filter [destination ip-address | hostname] [dst-port port-number] [source ip-address | hostname] [src-port port-number]]
Syntax Description
Command Default
The backup bandwidth protection and backup tunnel status information is not displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip rsvp fast bw-protect command:
Router# show ip rsvp fast bw-protect
Primary Protect BW Backup
Tunnel I/F BPS:Type Tunnel:Label State BW-P Type
-------------- ------- -------- ---------- ----- ---- ----
PRAB-72-5_t500 PO2/0 500K:S Tu501:19 Ready ON Nhop
PRAB-72-5_t601 PO2/0 103K:S Tu501:20 Ready OFF Nhop
PRAB-72-5_t602 PO2/0 70K:S Tu501:21 Ready ON Nhop
PRAB-72-5_t603 PO2/0 99K:S Tu501:22 Ready ON Nhop
PRAB-72-5_t604 PO2/0 100K:S Tu501:23 Ready OFF Nhop
PRAB-72-5_t605 PO2/0 101K:S Tu501:24 Ready OFF Nhop
Table 76 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
tunnel mpls traffic-eng fast-reroute bw-protect |
Enables an MPLS TE tunnel to use an established backup tunnel in the event of a link or node failure. |
show ip rsvp fast detail
To display specific information for Resource Reservation Protocol (RSVP) categories, use the show ip rsvp fast detail command in user EXEC or privileged EXEC mode.
show ip rsvp fast detail [filter [destination ip-address | hostname] [dst-port port-number] [source ip-address | hostname] [src-port port-number]]
Syntax Description
Command Default
Specific information for RSVP categories is not displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip rsvp fast detail command:
Router# show ip rsvp fast detail
PATH:
Tun Dest: 10.0.0.7 Tun ID: 500 Ext Tun ID: 10.0.0.5
Tun Sender: 10.0.0.5 LSP ID: 8
Path refreshes:
sent: to NHOP 10.5.6.6 on POS2/0
Session Attr:
Setup Prio: 7, Holding Prio: 7
Flags: Local Prot desired, Label Recording, SE Style, Bandwidth Prot desired
Session Name: PRAB-72-5_t500
ERO: (incoming)
10.0.0.5 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.5.6 (Strict IPv4 Prefix, 8 bytes, /32)
10.6.7.7 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.0.7 (Strict IPv4 Prefix, 8 bytes, /32)
ERO: (outgoing)
10.5.6.6 (Strict IPv4 Prefix, 8 bytes, /32)
10.6.7.7 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.0.7 (Strict IPv4 Prefix, 8 bytes, /32)
Traffic params - Rate: 500K bits/sec, Max. burst: 1K bytes
Min Policed Unit: 0 bytes, Max Pkt Size 4294967295 bytes
Fast-Reroute Backup info:
Inbound FRR: Not active
Outbound FRR: Ready -- backup tunnel selected
Backup Tunnel: Tu501 (label 19)
Bkup Sender Template:
Tun Sender: 10.5.6.5 LSP ID: 8
Bkup FilerSpec:
Tun Sender: 10.5.6.5, LSP ID: 8
Path ID handle: 04000405.
Incoming policy: Accepted. Policy source(s): MPLS/TE
Status: Proxied
Output on POS2/0. Policy status: Forwarding. Handle: 02000406
Table 77 describes the significant fields shown in the display.
Related Commands
|
|
mpls traffic-eng fast-reroute backup-prot-preemption |
Changes the backup protection preemption algorithm to minimize the amount of bandwidth that is wasted. |
show ip rsvp fast-reroute
To display information about fast reroutable primary tunnels and their corresponding backup tunnels that provide protection, use the show ip rsvp fast-reroute command in user EXEC or privileged EXEC mode.
show ip rsvp fast-reroute [filter [session-type {session-type-number | all}]]
Syntax Description
Command Default
If no arguments are specified, the display information about all fast reroutable primary tunnels is displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output of fast reroutable primary tunnels and their corresponding backup tunnels that provide protection:
Router# show ip rsvp fast-reroute
Primary Protect BW Backup
Tunnel I/F BPS:Type Tunnel:Label State Level Type
------ ------- -------- ------------- ------ ----- ---
GSR1---R2---_t65336 PO1/0 0:G Tu1002:0 Ready any-unl Nhop
GSR1---R2---_t65338 PO4/0 0:G Tu1004:0 Ready any-unl Nhop
Table 78 describes the significant fields shown in the display.
The following example shows fast reroutable primary tunnels and their corresponding backup tunnels. The information is organized by P2P LSPs and P2MP sub-LSPs. The following example shows that Tunnel 22 has six sub-LSPs, three that are protected on Ethernet interface 0/0, and three that are not protected on Ethernet interface 0/1:
Router# show ip rsvp fast-reroute
P2P Protect BW Backup
Protected LSP I/F BPS:Type Tunnel:Label State Level Type
------------- ------- -------- ------------- ------ ----- ------
R201_t1 Et0/1 500K:G Tu777:16 Ready any-lim Nhop
P2MP
Protected Sub-LSP Protect BW Backup
src_lspid[subid]->dst_tunid I/F BPS:Type Tunnel:Label State
--------------------------- ------- -------- ------------- ------
10.1.1.201_1[1]->10.1.1.203_22 Et0/0 500K:G Tu666:20 Ready
10.1.1.201_1[2]->10.1.1.206_22 Et0/0 500K:G Tu666:20 Ready
10.1.1.201_1[3]->10.1.1.213_22 Et0/0 500K:G Tu666:20 Ready
10.1.1.201_1[4]->10.1.1.214_22 Et0/1 500K:G None None
10.1.1.201_1[5]->10.1.1.216_22 Et0/1 500K:G None None
10.1.1.201_1[6]->10.1.1.217_22 Et0/1 500K:G None None
The following example displays information about fast reroutable primary tunnels and their corresponding backup tunnels for Cisco IOS Release 12.4(24)T and earlier releases. The output is organized by session type.
Rrouter# show ip rsvp fast-reroute filter session-type all
Session Type 1 (rsvp)
P2P Protect BW Backup
Protected LSP I/F BPS:Type Tunnel:Label State Level Type
------------- ------- -------- ------------- ------ ----- ------
Session Type 7 (te-p2p-lsp)
P2P Protect BW Backup
Protected LSP I/F BPS:Type Tunnel:Label State Level Type
------------- ------- -------- ------------- ------ ----- ------
R201_t1 Et0/1 500K:G Tu777:16 Ready any-lim Nhop
Session Type 13 (te-p2mp-lsp)
P2MP
Protected Sub-LSP Protect BW Backup
src_lspid[subid]->dst_tunid I/F BPS:Type Tunnel:Label State
--------------------------- ------- -------- ------------- ------
10.1.1.201_1[1]->10.1.1.203_22 Et0/0 500K:G Tu666:20 Ready
10.1.1.201_1[2]->10.1.1.206_22 Et0/0 500K:G Tu666:20 Ready
10.1.1.201_1[3]->10.1.1.213_22 Et0/0 500K:G Tu666:20 Ready
10.1.1.201_1[4]->10.1.1.214_22 Et0/1 500K:G None None
10.1.1.201_1[5]->10.1.1.216_22 Et0/1 500K:G None None
10.1.1.201_1[6]->10.1.1.217_22 Et0/1 500K:G None None
Table 79 describes the significant fields shown in the display.
The following example displays information about fast reroutable primary tunnels and their corresponding backup tunnels that provide protection for Cisco IOS Release 15.0(1)M and later releases.
Rrouter# show ip rsvp fast-reroute filter session-type all
Session Type 7 (te-p2p-lsp)
P2P Protect BW Backup
Protected LSP I/F BPS:Type Tunnel:Label State Level Type
------------- ------- -------- ------------- ------ ----- ------
p2mp-2_t12 Se3/0 500K:G Tu700:0 Ready any-unl Nhop
p2mp-2_t13 Se3/0 500K:G Tu700:0 Ready any-unl Nhop
Session Type 13 (te-p2mp-lsp)
P2MP
*Protected Sub-LSP Protect BW Backup
src_lspid[subid]->dst_tunid I/F BPS:Type Tunnel:Label State
--------------------------- ------- -------- ------------- ------
10.2.0.1_12[1]->10.1.0.1_1 Se5/0 1M:G None None
10.2.0.1_12[3]->10.2.3.3_1 Se3/0 1M:G Tu700:16 Ready
10.2.0.1_12[5]->10.3.0.1_1 Se3/0 1M:G Tu700:16 Ready
10.2.0.1_12[6]->10.3.4.3_1 Se3/0 1M:G Tu700:16 Ready
10.2.0.1_12[8]->10.2.5.3_1 Se6/0 1M:G Tu100:17 Ready
Related Commands
show ip rsvp fast-reroute bw-protect
To display information about whether backup bandwidth protection is enabled and the status of backup tunnels that may be used to provide that protection, use the show ip rsvp fast-reroute bw-protect command in user EXEC or privileged EXEC mode.
show ip rsvp fast-reroute bw-protect [detail] [filter [session-type {session-type-number | all}] [destination ip-address | hostname] [dst-port port-number] [source ip-address | hostname] [src-port port-number]]
Syntax Description
Command Default
The backup bandwidth protection and backup tunnel status information is not displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip rsvp fast-reroute bw-protect command:
Router# show ip rsvp fast-reroute bw-protect
Primary Protect BW Backup
Tunnel I/F BPS:Type Tunnel:Label State BW-P Type
-------------- ------- -------- ---------- ----- ---- ----
PRAB-72-5_t500 PO2/0 500K:S Tu501:19 Ready ON Nhop
PRAB-72-5_t601 PO2/0 103K:S Tu501:20 Ready OFF Nhop
PRAB-72-5_t602 PO2/0 70K:S Tu501:21 Ready ON Nhop
PRAB-72-5_t603 PO2/0 99K:S Tu501:22 Ready ON Nhop
PRAB-72-5_t604 PO2/0 100K:S Tu501:23 Ready OFF Nhop
PRAB-72-5_t605 PO2/0 101K:S Tu501:24 Ready OFF Nhop
Table 80 describes the significant fields shown in the display.
The following example shows fast reroutable primary tunnels and their corresponding backup tunnels that provide protection. The information is organized by point-to-point (P2P) labe switched paths (LSPs) and P2MP sub-LSPs. The following example shows that Tunnel 22 has six sub-LSPs, three that are protected on Ethernet interface 0/0, and three that are not protected on Ethernet interface 0/1:
Router# show ip rsvp fast-reroute bw-protect
P2P Protect BW Backup
Protected LSP I/F BPS:Type Tunnel:Label State BW-P Type
------------- ------- -------- ------------- ------ ----- ------
R201_t1 Et0/1 500K:G Tu777:16 Ready ON Nhop
P2MP
Protected Sub-LSP Protect BW Backup
src_lspid[subid]->dst_tunid I/F BPS:Type Tunnel:Label BW-P
--------------------------- ------- -------- ------------- ------
10.1.1.201_1[1]->10.1.1.203_22 Et0/0 500K:G Tu666:20 ON
10.1.1.201_1[2]->10.1.1.206_22 Et0/0 500K:G Tu666:20 ON
10.1.1.201_1[3]->10.1.1.213_22 Et0/0 500K:G Tu666:20 ON
10.1.1.201_1[4]->10.1.1.214_22 Et0/1 500K:G None None
10.1.1.201_1[5]->10.1.1.216_22 Et0/1 500K:G None None
10.1.1.201_1[6]->10.1.1.217_22 Et0/1 500K:G None None
Table 79 describes the significant fields shown in the display.
Related Commands
|
|
---|---|
tunnel mpls traffic-eng fast-reroute bw-protect |
Enables an MPLS TE tunnel to use an established backup tunnel in the event of a link or node failure. |
show ip rsvp fast-reroute detail
To display specific information for Resource Reservation Protocol (RSVP) categories, use the show ip rsvp fast-reroute detail command in user EXEC or privileged EXEC mode.
show ip rsvp fast-reroute detail [filter [session-type {session-type-number | all}] [destination ip-address | hostname] [dst-port port-number] [source ip-address | hostname] [src-port port-number]]
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip rsvp fast-reroute detail command:
Router# show ip rsvp fast-reroute detail
PATH:
Tun Dest: 10.0.0.7 Tun ID: 500 Ext Tun ID: 10.0.0.5
Tun Sender: 10.0.0.5 LSP ID: 8
Path refreshes:
sent: to NHOP 10.5.6.6 on POS2/0
Session Attr:
Setup Prio: 7, Holding Prio: 7
Flags: Local Prot desired, Label Recording, SE Style, Bandwidth Prot desired
Session Name: PRAB-72-5_t500
ERO: (incoming)
10.0.0.5 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.5.6 (Strict IPv4 Prefix, 8 bytes, /32)
10.6.7.7 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.0.7 (Strict IPv4 Prefix, 8 bytes, /32)
ERO: (outgoing)
10.5.6.6 (Strict IPv4 Prefix, 8 bytes, /32)
10.6.7.7 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.0.7 (Strict IPv4 Prefix, 8 bytes, /32)
Traffic params - Rate: 500K bits/sec, Max. burst: 1K bytes
Min Policed Unit: 0 bytes, Max Pkt Size 4294967295 bytes
Fast-Reroute Backup info:
Inbound FRR: Not active
Outbound FRR: Ready -- backup tunnel selected
Backup Tunnel: Tu501 (label 19)
Bkup Sender Template:
Tun Sender: 10.5.6.5 LSP ID: 8
Bkup FilerSpec:
Tun Sender: 10.5.6.5, LSP ID: 8
Path ID handle: 04000405.
Incoming policy: Accepted. Policy source(s): MPLS/TE
Status: Proxied
Output on POS2/0. Policy status: Forwarding. Handle: 02000406
Table 82 describes the significant fields shown in the display.
The following example shows P2MP data:
Router# show ip rsvp fast-reroute detail
PATH:
P2MP ID: 22 Tun ID: 22 Ext Tun ID: 10.1.1.201
Tun Sender: 10.1.1.201 LSP ID: 1 SubGroup Orig: 10.1.1.201
SubGroup ID: 2
S2L Destination : 10.1.1.206
Path refreshes:
sent: to NHOP 10.0.0.205 on Ethernet0/0
Session Attr:
Setup Prio: 7, Holding Prio: 7
Flags: (0xF) Local Prot desired, Label Recording, SE Style, Bandwidth Prot desired
Session Name: R201_t22
ERO: (incoming)
10.1.1.201 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.0.201 (Strict IPv4 Prefix, 8 bytes, /32)
10.0.0.205 (Strict IPv4 Prefix, 8 bytes, /32)
10.1.0.205 (Strict IPv4 Prefix, 8 bytes, /32)
10.1.0.206 (Strict IPv4 Prefix, 8 bytes, /32)
10.1.1.206 (Strict IPv4 Prefix, 8 bytes, /32)
ERO: (outgoing)
10.0.0.205 (Strict IPv4 Prefix, 8 bytes, /32)
10.1.0.205 (Strict IPv4 Prefix, 8 bytes, /32)
10.1.0.206 (Strict IPv4 Prefix, 8 bytes, /32)
1o.1.1.206 (Strict IPv4 Prefix, 8 bytes, /32)
Traffic params - Rate: 500K bits/sec, Max. burst: 1K bytes
Min Policed Unit: 1 bytes, Max Pkt Size 2147483647 bytes
Fast-Reroute Backup info:
Inbound FRR: Not active
Outbound FRR: Ready -- backup tunnel selected
Backup Tunnel: Tu666 (label 20)
Bkup Sender Template:
Tun Sender: 10.0.2.201 LSP ID: 1 SubGroup Orig: 10.1.1.201
SubGroup ID: 2
Bkup FilerSpec:
Tun Sender: 10.0.2.201, LSP ID: 1, SubGroup Orig: 10.1.1.201
SubGroup ID: 2
Path ID handle: 01000417.
Incoming policy: Accepted. Policy source(s): MPLS/TE
Status: Proxied
Table 83 describes the significant fields shown in the display.
Related Commands
|
|
mpls traffic-eng fast-reroute backup-prot-preemption |
Changes the backup protection preemption algorithm to minimize the amount of bandwidth that is wasted. |
show ip rsvp hello
To display hello status and statistics for Fast Reroute, reroute (hello state timer), and graceful restart, use the show ip rsvp hello command in user EXEC or privileged EXEC mode.
show ip rsvp hello
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show ip rsvp hello command:
Router# show ip rsvp hello
Hello:
RSVP Hello for Fast-Reroute/Reroute: Enabled
Statistics: Disabled
BFD for Fast-Reroute/Reroute: Enabled
RSVP Hello for Graceful Restart: Disabled
Table 84 describes the significant fields shown in the display. The fields describe the processes for which hello is enabled or disabled.
Related Commands
show ip rsvp hello client lsp detail
To display detailed information about Resource Reservation Protocol (RSVP) traffic engineering (TE) client hellos for label-switched paths (LSPs), use the show ip rsvp hello client lsp detail command in user EXEC or privileged EXEC mode.
show ip rsvp hello client lsp detail [filter [destination hostname]]
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
---|---|
12.0(33)S |
This command was introduced. |
12.2(33)SRC |
This command was integrated into Cisco IOS Release 12.2(33)SRC. |
Usage Guidelines
Use the show ip rsvp hello client lsp detail command to display information about the LSPs, including IP addresses and their types.
Examples
The following is sample output from the show ip rsvp hello client lsp detail command:
Router# show ip rsvp hello client lsp detail
Hello Client LSPs (all lsp tree)
Tun Dest: 10.0.1.1 Tun ID: 14 Ext Tun ID: 172.16.1.1
Tun Sender: 172.16.1.1 LSP ID: 31
Lsp flags: 0x32
Lsp GR DN nbr: 192.168.1.1
Lsp RR DN nbr: 10.0.0.3 HST
Table 85 describes the significant fields shown in the display.
Related Commands
|
|
show ip rsvp hello |
Displays hello status and statistics for fast reroute, reroute (hello state timer), and graceful restart. |