cc/td/doc/product/atm/ls1010s/wa4/12_0_2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

I Commands for the LightStream  1010 ATM Switch

I Commands for the LightStream  1010 ATM Switch

incoming-port

To filter ATM signalling call failures based on the incoming interface of the call, use the incoming-port signalling diagnostic configuration command. To return the incoming port to the default, use the no form of this command.

incoming-port atm card/subcard/port
no incoming-port atm card/subcard/port
Syntax Description

card/subcard/port

Specifies the card, subcard, and port number of the ATM interface. The card number is displayed using the show interface command.The subcard number can be either 0 or  1.

Default

0

Command Mode

Diagnostics configuration

Usage Guidelines

The default 0 means the incoming interface is not considered during filtering.

Example

The following example configures ATM 0/1/1 so all previous records collected on the incoming port are purged.

Switch(cfg-atmsig-diag)# incoming-port atm0/1/1

interface

To configure an interface type and enter interface configuration mode, use the interface global configuration command.

interface type card/subcard/port
interface type number

To configure a subinterface, use the interface global configuration command.

interface type card/subcard/port .vpt#
interface type card/subcard/port .subinterface# multipoint | point-to-point
Syntax Description

type

Type of interface to be configured. Refer to Table 9-1 for a list of keywords.

number

Integer used to identify the interface.

card

Interface card number. The numbers are assigned at the factory at the time of installation or when added to a system, and can be displayed with the show interface command.

subcard

Backplane slot number. The value can be 0 or 1. The slots are numbered from left to right.

port

Port number of the interface.

.vpt#

Virtual path tunnel number for the subinterface on physical ATM ports.

.subinterface#

Subinterface number in the range 1 to 4294967293. The number that precedes the periods (.) must match the number where this subinterface belongs.

multipoint

Specifies a multipoint subinterface. This option only applies to the ASP interface ATM  2/0/0.

point-to-point

Specifies a point-to-point subinterface. The default is multipoint. This option only applies to the ASP interface ATM 2/0/0.

Command Mode

Global configuration

Usage Guidelines

Multiple subinterfaces can be configured on a single ASP interface.

The ASP and Ethernet interfaces address is 2/0/0 in the LightStream 1010 ATM switch environment and 13/0/0 in the Catalyst 5500 switch environment.

Multiple subinterfaces for VP tunneling can be configured on a single ATM interface (other than an ASP interface). VP tunnels are useful when you want to run signalling, ILMI, and possibly PNNI routing between two switches that are not directly connected to each other. Prior to configuring the subinterface, a permanent virtual path must be configured on the ATM interface using the atm pvp command. Then the subinterface for the VP tunnel can be created, specifying the VPI used to define the PVP as the subinterface number.


Table 9-1: Interface Type Keywords
Keyword Interface Type

async

Auxiliary port line used as an asynchronous interface.

atm

ATM interface.

bvi

Bridge-group virtual interface.

cbr

CBR interface.

dialer

Dialer interface.

ethernet

Ethernet IEEE 802.3 interface.

group-async

Master asynchronous interface.

lex

Lex interface.

loopback

Software-only loopback interface that emulates an interface that is always running. It is a virtual interface supported on all platforms. The interface number is the number of the loopback interface you want to create or configure. There is no limit on the number of loopback interfaces you can create.

null

Null interface.

tunnel

Tunnel interface, used to declare a TSP tunnel interface. The tunnel interface number is in the range of 0 to 65535.

virtual-template

Virtual template interface.

virtual-tokenring

Virtual Token Ring interface.

vlan

Catalyst 5000 VLAN interface.

Examples

The following example begins configuration of the ATM interface on card 0, subcard 0, and port 1 using the interface global configuration command.

Switch(config)# interface atm 0/0/1
Switch(config-if)#
 

The following example creates a VP tunnel with VPI 50 on card 0, subcard 0, and port 1, and enters the subinterface configuration mode for the VP tunnel, using the interface global configuration command.

Switch(config)# interface atm 0/0/1
Switch(config-if)# atm pvp 50
Switch(config-if)# interface atm 0/0/1.50
Switch(config-subif)#
 

The following example begins configuration of the ASP interface, using the interface global configuration command.

Switch(config)# interface atm 2/0/0
Switch(config-if)#
 

The following example creates a point-to-point subinterface on the SAP port and enters the subinterface configuration mode, using the interface global configuration command.

Switch(config)# interface atm 2/0/0.1 point-to-point
Switch(config-subif)# 
 

The following example begins configuration of the Ethernet interface on the LightStream 1010 switch, using the interface global configuration command.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# 
 

The following command begins configuration of a CBR interface using the interface global configuration command.

Switch(config)# interface cbr 1/1/1
Switch(config-if)# 
 

The following example illustrates using the interface tunnel command to declare a TSP tunnel interface with interface number 2100.

Switch(config)# interface tunnel 2100
Related Command

show interface

ip access-group


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip accounting


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip accounting-list


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip accounting-threshold


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip accounting-transits


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip address

To set a primary or secondary IP address for an interface, use the ip address interface configuration command. To remove an IP address or disable IP processing, use the no form of this command.

ip address ip-address mask [secondary]
no ip address ip-address mask [secondary]
Syntax Description

ip-address

IP address.

mask

Mask for the associated IP subnet.

secondary

Specifies that the configured address is a secondary IP address. If this keyword is omitted, the configured address is the primary IP address.

Default

No IP address is defined for the interface.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or the 13/0/0 in the Catalyst 5500). An interface can have one primary IP address and multiple secondary IP addresses. Packets generated by the switch always use the primary IP address. Therefore, all switches on a segment should share the same primary network number.

Hosts can determine subnet masks using the ICMP Mask Request message. Switches respond to this request with an ICMP Mask Reply message.

You can disable IP processing on a particular interface by removing its IP address with the no  ip  address command. If the switch detects another host using one of its IP addresses, it prints an error message on the console.

The optional keyword secondary allows you to specify an unlimited number of secondary addresses. Secondary addresses are treated like primary addresses, except the system never generates datagrams other than routing updates with secondary source addresses. IP broadcasts and ARP requests are handled properly, as are interface routes in the IP routing table.

Secondary IP addresses can be used in a variety of situations. The following are the most common applications:


Note If any switch on a network segment uses a secondary address, all other switches on that same segment must also use a secondary address from the same network or subnet. Inconsistent use of secondary addresses on a network segment can very quickly cause routing loops.
Example

In the following example, 131.108.1.27 is the primary address and 192.31.7.17 and 192.31.8.17 are secondary addresses for Ethernet interface 2/0/0.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip address 131.108.1.27 255.255.255.0
Switch(config-if)# ip address 192.31.7.17 255.255.255.0 secondary
Switch(config-if)# ip address 192.31.8.17 255.255.255.0 secondary
Related Command

show interface

ip broadcast-address

To define a broadcast address for an interface, use the ip broadcast-address interface configuration command. To restore the default IP broadcast address, use the no form of this command.

ip broadcast-address [ip-address]
no
ip broadcast-address [ip-address]
Syntax Description

ip-address

IP broadcast address for a network.

Default

Default address is 255.255.255.255 (all ones).

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500).

Example

The following example specifies an IP broadcast address of 172.10.50.4.

Switch(config)# ip broadcast-address 172.10.50.4
Related Command

show interface

ip classless


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip default-gateway

To define a default gateway, use the ip default-gateway global configuration command. To return the default gateway to the default, use the no form of this command.

ip default-gateway ip-address
no ip default-gateway ip-address
Syntax Description

ip-address

IP address of the gateway.

Default

Disabled

Command Mode

Global configuration

Usage Guidelines

The switch sends any packets that need the assistance of a gateway to the address you specify. If another gateway has a better route to the requested host, the default gateway sends an ICMP redirect message to the switch. The ICMP redirect message indicates which gateway the switch uses.

Example

The following example defines the gateway on IP address 192.31.7.18 as the default gateway.

Switch(config)# ip default-gateway 192.31.7.18
Related Command

show ip redirects

ip directed-broadcast

To enable the translation of directed broadcasts to physical broadcasts, use the ip directed-broadcast interface configuration command. To return the directed broadcast to the default, use the no form of this command.

ip directed-broadcast [access-list-number]
no
ip directed-broadcast [access-list-number]
Syntax Description

access-list-number

Number of the access list. If specified, a broadcast must pass the access list to be forwarded. If not specified, all broadcasts are forwarded.

Default

Enabled with no list specified.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500). This feature is enabled only for those protocols configured using the ip forward-protocol global configuration command. An access list might be specified to control which broadcasts are forwarded. When an access list is specified, only those IP packets permitted by the access list are eligible to be translated from directed broadcasts to physical broadcasts.

Example

The following example enables forwarding of IP directed broadcasts on Ethernet interface 2/0/0.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip directed-broadcast
Related Command

ip forward-protocol

ip domain-list

To define a list of default domain names to complete unqualified host names, use the ip domain-list global configuration command. To delete a name from a list, use the no form of this command.

ip domain-list name
no ip domain-list name
Syntax Description

name

Domain name. Do not include the initial period that separates an unqualified name from the domain name.

Default

No domain names are defined.

Command Mode

Global configuration

Usage Guidelines

If there is no domain list, the domain name that you specified with the ip domain-name global configuration command is used. If there is a domain list, the default domain name is not used. The ip domain-list command is similar to the ip domain-name command, except that with ip domain-list you can define a list of domains, each to be tried in turn.

Examples

The following example adds several domain names to a list.

Switch(config)# ip domain-list martinez.com
Switch(config)# ip domain-list stanford.edu

The following example adds a name to and then deletes a name from the list.

Switch(config)# ip domain-list sunya.edu
Switch(config)# no ip domain-list stanford.edu
Related Command

ip domain-name

ip domain-lookup

To enable the IP DNS-based host name-to-address translation, use the ip domain-lookup global configuration command. To disable the DNS, use the no form of this command.

ip domain-lookup [nsap]
no ip domain-lookup [nsap]
Syntax Description

nsap

Enables IP DNS queries for CLNS NSAP addresses.

Default

Enabled

Command Mode

Global configuration

Example

The following example enables the IP DNS-based host name-to-address translation.

Switch(config)# ip domain-lookup
Related Commands

ip domain-name
ip name-server

ip domain-lookup nsap


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip domain-name

To define a default domain name that the switch uses to complete unqualified host names (names without a dotted-decimal domain name), use the ip domain-name global configuration command. To disable use of the DNS, use the no form of this command.

ip domain-name name
no ip domain-name
Syntax Description

name

Default domain name used to complete unqualified host names. Do not include the initial period that separates an unqualified name from the domain name.

Default

Enabled

Command Mode

Global configuration

Usage Guidelines

Any IP host name that does not contain a domain name (that is, any name without a dot), has the dot and cisco.com appended to it before being added to the host table.

Example

The following example defines cisco.com as the default domain name.

Switch(config)# ip domain-name cisco.com
Related Commands

ip domain-lookup
ip forward-protocol
ip name-server

ip forward-protocol


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip gdp


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip helper-address


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip host

To define a static host name-to-address mapping in the host cache, use the ip host global configuration command. To remove the name-to-address mapping, use the no form of this command.

ip host name [tcp-port-number] address1 [address2...address8]
no ip host name address
Syntax Description

name

Name of the host. The first character can be either a letter or a number, but if you use a number, the operations you can perform are limited.

tcp-port-number

TCP port number to connect to when using the defined host name in conjunction with an EXEC connect or Telnet command. The default is Telnet (port  23).

address1

Associated IP address.

address2...address8

Additional associated IP address. You can bind up to eight addresses to a host name.

Default

Disabled

Command Mode

Global configuration

Usage Guidelines

The first character can be either a letter or a number, but if you use a number, the operations you can perform (such as ping) are limited.

Example

The following example defines two static mappings.

Switch(config)# ip host croff 192.31.7.18
Switch(config)# ip host bisso-gw 10.2.0.2 192.31.7.33

ip host-routing

To configure your switch to use host routing methods to forward IP packets to the destination, use the ip host-routing global configuration command. To return the host routing to the default, use the no form of this command.

ip host-routing
no ip host-routing

Syntax Description

This command has no arguments or keywords.

Command Mode

Global configuration

Usage Guidelines

This command configures the switch to use host routing methods to send packets to devices and networks.

Example

The following example uses the ip host-routing command to configure the switch to use host routing methods to forward packets and devices.

Switch(config)# ip host-routing 	

ip mask-reply

To have the switch to respond to ICMP mask requests by sending ICMP Mask Reply messages, use the ip mask-reply interface configuration command. To disable this function, use the no form of this command.

ip mask-reply
no ip mask-reply

Syntax Description

This command has no arguments or keywords.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500).

Example

The following example enables the sending of ICMP Mask Reply messages on Ethernet interface  2/0/0.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip address 131.108.1.0 255.255.255.0
Switch(config-if)# ip mask-reply

ip mtu

To set the MTU size of IP packets sent on an interface, use the ip mtu interface configuration command. To restore the default MTU size, use the no form of this command.

ip mtu bytes
no ip mtu
Syntax Description

bytes

MTU in bytes.

Default

Minimum is 128 bytes; maximum depends on the interface medium.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500). If an IP packet exceeds the MTU set for the switch's interface, the switch fragments the packet.

All devices on a physical medium must have the same protocol MTU in order to operate.


Note Changing the MTU value (with the mtu interface configuration command) can affect the IP MTU value. If the current IP MTU value is the same as the MTU value and you change the MTU value, the IP MTU value is modified automatically to match the new MTU. However, the reverse is not true; changing the IP MTU value has no effect on the value for the mtu command.
Example

The following example sets the maximum IP packet size for the first interface to 300 bytes.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip mtu 300
Related Command

mtu

ip name-server

To specify the address of one or more name servers to use for name and address resolution, use the ip name-server global configuration command. To remove the addresses specified, use the no form of this command.

ip name-server server-address1 [[server-address2]... server-address6]
no ip name-server
server-address1 [[server-address2]... server-address6]
Syntax Description

server-address1

IP addresses of name server.

server-address2...server-address6

IP addresses of additional name servers (a maximum of six name servers).

Default

No name server addresses are specified.

Command Mode

Global configuration

Examples

The following example specifies host 131.108.1.111 as the primary name server and host 131.108.1.2 as the secondary server.

Switch(config)# ip name-server 131.108.1.111 131.108.1.2
 

This command is reflected in the configuration file as follows:

ip name-server 131.108.1.111
ip name-server 131.108.1.2
Related Commands

ip domain-lookup
ip domain-name

ip netmask-format

To specify the format in which netmasks are displayed in show command output, use the ip  netmask-format line configuration command. To restore the default display format, use the no form of this command.

ip netmask-format {bitcount | decimal | hexadecimal}
no ip netmask-format [bitcount | decimal | hexadecimal]
Syntax Description

bitcount

Addresses are followed by a slash and the total number of bits in the netmask. For example, 131.108.11.0/24 indicates that the netmask is 24 bits.

decimal

Network masks are displayed in dotted decimal notation (for example, 255.255.255.0).

hexadecimal

Network masks are displayed in hexadecimal format, as indicated by the leading 0X (for example, 0XFFFFFF00).

Default

Netmasks are displayed in dotted decimal format.

Command Mode

Line configuration

Usage Guidelines

IP uses a 32-bit mask that indicates which address bits belong to the network and subnetwork fields and which bits belong to the host field. This is called a netmask. By default, show commands display an IP address and then its netmask in dotted decimal notation. For example, a subnet is displayed as 131.108.11.0 255.255.255.0.

However, you can specify that the display of the network mask appear in hexadecimal format or bit count format instead. The hexadecimal format is commonly used on UNIX systems. The above example is displayed as 131.108.11.0 0XFFFFFF00.

The bitcount format for displaying network masks is to append a slash (/) and the total number of bits in the netmask to the address itself. The above example is displayed as 131.108.11.0/24.

Example

The following example configures network masks for the specified line to be displayed in bitcount notation in the output of show commands.

Switch(config)# line vty 0 4
Switch(config-line)# ip netmask-format bitcount

ip proxy-arp

To enable proxy ARP on an interface, use the ip proxy-arp interface configuration command. To disable proxy ARP on the interface, use the no form of this command.

ip proxy-arp
no ip proxy-arp

Syntax Description

This command has no arguments or keywords.

Default

Enabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500).

Example

The following example enables proxy ARP on Ethernet interface 2/0/0.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip proxy-arp

ip rarp-server

Use the ip rarp-server interface configuration command to allow the switch to act as a RARP server. To return the RARP server to the default, use the no form of this command.

ip rarp-server ip-address
no ip rarp-server ip-address
Syntax Description

ip-address

IP address that is to be provided in the source protocol address field of the RARP response packet. Normally, this is set to whatever address you configure as the primary address for the interface.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500). This feature makes diskless booting of clients possible between network subnets where the client and server are on separate subnets.

RARP server support can be configured on a per-interface basis so the switch does not interfere with RARP traffic on subnets that do not need RARP assistance from the switch.

The switch answers incoming RARP requests only if both of the following two conditions are met:

Use the show ip arp EXEC command to display the contents of the IP ARP cache.

Sun Microsystems, Inc. makes use of RARP-based and UDP-based network services to facilitate network-based booting of SunOS on their workstations. By bridging RARP packets and using both the ip helper-address interface configuration command and the ip forward-protocol global configuration command, the switch should be able to perform the necessary packet switching to enable booting of Sun workstations across subnets. However, some Sun workstations assume that the sender of the RARP response, in this case the switch, is the host that the client can contact to TFTP-load the bootstrap image. This causes the workstations to fail to boot.

By using the ip rarp-server feature, the switch can be configured to answer these RARP requests, and the client machine should be able to reach its server by having its TFTP requests forwarded through the switch that acts as the RARP server.

In the case of RARP responses to Sun workstations attempting to diskless boot, the IP address specified in the ip rarp-server interface configuration command should be the IP address of the TFTP server. In addition to configuring RARP service, the switch must also be configured to forward UDP-based Sun portmapper requests to completely support diskless booting of Sun workstations. This can be accomplished using configuration commands of the following form:

Switch(config)# ip forward-protocol udp 111
Switch(config)# interface atm3/1/0
Switch(config-if)# ip helper-address target-address
 

RFC 903 documents the RARP.

Examples

The following partial example configures the switch to act as a RARP server. The switch is configured to use the primary address of the specified interface in its RARP responses.

Switch(config)# arp 128.105.2.5 0800.2002.ff5b arpa
Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip address 128.105.3.100 255.255.255.0
Switch(config-if)# ip rarp-server 128.105.3.100
 

In the following example, the switch is configured to act as a RARP server, with TFTP and portmapper requests forwarded to the Sun server.

! Allow the switch to forward broadcast portmapper requests
Switch(config)# ip forward-protocol udp 111
! Provide the switch with the IP address of the diskless sun
Switch(config)# arp 128.105.2.5 0800.2002.ff5b arpa
Switch(config)# interface ethernet 2/0/0
! Configure the switch to act as a RARP server, using the Sun Server's IP
! address in the RARP response packet.
Switch(config-if)# ip rarp-server 128.105.3.100
! Portmapper broadcasts from this interface are sent to the Sun Server.
Switch(config-if)# ip helper-address 128.105.3.100
Related Commands

ip forward-protocol
ip helper-address

ip rcmd domain-lookup

Use the ip rcmd domain-lookup global configuration command to enable DNS security for rcp and rsh. To bypass DNS security for rcp and rsh, use the no form of this command.

ip rcmd domain-lookup
no ip rcmd domain-lookup

Syntax Description

This command has no arguments or keywords.

Default

Enabled

Command Mode

Global configuration

Usage Guidelines

If you do not want to use DNS for rcmd queries, but DNS has been enabled with the ip domain-lookup command, use the no ip rcmd domain-lookup command.

This command turns off DNS lookups for rsh and rcp only. The no ip domain-lookup command takes precedence over the ip rcmd domain-lookup command. If ip domain-lookup is disabled with the no ip domain-lookup command, DNS is bypassed for rcp and rsh, even if ip rcmd domain-lookup is enabled.

Example

In the following example, DNS security is enabled for rcp and rsh.

Switch(config)# ip rcmd domain-lookup
Related Command

ip domain-lookup

ip rcmd rcp-enable

To configure the switch to allow remote users to copy files to and from the switch, use the ip rcmd rcp-enable global configuration command. To disable a switch that is enabled for rcp, use the no form of this command.

ip rcmd rcp-enable
no ip rcmd rcp-enable

Syntax Description

This command has no arguments or keywords.

Default

To ensure security, the switch is not enabled for rcp by default.

Command Mode

Global configuration

Usage Guidelines

To allow a remote user to execute rcp commands on the switch, you must also create an entry for the remote user in the local switch's authentication database.

The no ip rcmd rcp-enable command does not prohibit a local user from using rcp to copy system images and configuration files to and from the switch.

To protect against unwanted users copying the system image or configuration files without consent, the switch is not enabled for rcp by default.

Example

The following example shows how to enable the switch for rcp.

Switch(config)# rcp-enable
Related Command

ip rcmd remote-host

ip rcmd remote-host

To allow remote users to execute commands on the switch using rsh or rcp, use the ip rcmd remote-host global configuration command to create an entry for the remote user in a local authentication database. To remove an entry for a remote user from the local authentication database, use the no form of this command.

ip rcmd remote-host local-username {ip-address | host} remote-username [enable [level]]
no ip rcmd remote-host local-username {ip-address | host} remote-username [enable]
Syntax Description

local-username

Name of the user on the local switch. You can specify the switch host name as the username. This name must be communicated to the network administrator or the user on the remote system. To be allowed to remotely execute commands on the switch, the remote user must specify this value correctly.

ip-address

IP address of the remote host from which the local switch accepts remotely executed commands. Either the IP address or the host name is required.

host

Name of the remote host from which the local switch accepts remotely executed commands. Either the host name or the IP address is required.

remote-username

Name of the user on the remote host from which the switch accepts remotely executed commands.

enable level

Enables the remote user to execute privileged EXEC commands using rsh at the specified level (1 to 15). This keyword does not apply to rcp.

Command Mode

Global configuration

Usage Guidelines

A TCP connection to a switch is established using an IP address. Using the host name is valid only when you are initiating an rcp or rsh command from a local switch. The host name is converted to an IP address using DNS or host-name aliasing.

To allow a remote user to execute rcp or rsh commands on a local switch, you must create an entry for the remote user in the local switch's authentication database. You must also enable the switch to act as an rsh or rcp server.

To enable the switch to act as an rsh server, issue the ip rcmd rsh-enable command. To enable the switch to act as an rcp server, issue the ip rcmd rcp-enable command.The switch cannot act as a server for either of these protocols unless you explicitly enable the capacity.

A local authentication database, which is similar in concept and use to a UNIX .rhosts file, is used to enforce security on the switch through access control. Each entry that you configure in the authentication database identifies the local user, the remote host, and the remote user. To permit a remote user of rsh to run commands in privileged EXEC mode, specify the enable keyword.

An entry that you configure in the switch authentication database differs from an entry in a UNIX .rhost file. Because the .rhosts file on a UNIX system resides in the home directory of a local user account, an entry in a UNIX .rhosts file need not include the local username; the local username is determined from the user account. To provide equivalent support on a configured switch, specify the local username, the remote host, and remote username in each authentication database entry that you configure.

For a remote user to be able to run commands on the switch in its capacity as a server, the local username, host address or name, and remote username sent with the remote client request must match values configured in an entry in the local authentication file.

A remote client host should be registered with DNS. The switch software uses DNS to authenticate the remote host's name and address. Because DNS can return several valid IP addresses for a host name, the switch software checks the address of the requesting client against all of the IP addresses for the named host returned by DNS. If the address sent by the requester is considered invalid (that is, it does not match any address listed with DNS for the host name) the switch software rejects the remote-command execution request.

Note that if no DNS servers are configured for the switch, then the switch cannot authenticate the host in this manner. In this case, the switch software sends a broadcast request to attempt to gain access to DNS services on another server. If DNS services are not available, you must use the no ip domain-lookup command to disable the switch's attempt to gain access to a DNS server by sending a broadcast request.

If DNS services are not available and, therefore, you bypass the DNS security check, the switch software accepts the request to remotely execute a command only if all three values sent with the request match exactly the values configured for an entry in the local authentication file.

Example

The following example allows the remote user netadmin3 on a remote host with the IP address 131.108.101.101 to run commands on switch1 using the rsh protocol. For rsh, user netadmin3 is allowed to execute commands in privileged EXEC mode.

Switch(config)# ip rcmd remote-host switch131.108.101.101 netadmin3 enable
Related Commands

ip rcmd rcp-enable
ip rcmd rsh-enable
no ip domain-lookup

ip rcmd remote-username

To configure the remote username to be used when requesting a remote copy using rcp, use the ip rcmd remote-username global configuration command. To remove the remote username from the configuration, use the no form of this command.

ip rcmd remote-username username
no ip rcmd remote-username username
Caution
The remote username must be associated with an account on the destination server.
Syntax Description

username

Name of the remote user on the server. This name is used for rcp copy requests. All files and images to be copied are searched for or written relative to the directory of the remote user's account if the server has a directory structure as do UNIX systems, for example.

Default

If you do not issue this command, the switch software sends the remote username associated with the current TTY process, if that name is valid, for rcp copy commands. For example, if the user is connected to the switch through Telnet and the user was authenticated through the username command, the switch software sends that username as the remote username.

Command Mode

Global configuration

Usage Guidelines

The rcp protocol requires that a client send the remote username on an rcp request to the server. Use this command to specify the remote username to be sent to the server for an rcp copy request. If the server has a directory structure, as do UNIX systems, all files and images to be copied are searched for or written relative to the directory of the remote user's account.

If the username for the current TTY process is not valid, the switch software sends the host name as the remote username. For rcp boot commands, the switch software sends the switch host name by  default.


Note TTYs are commonly used in Cisco communication servers. The concept of TTY originated with UNIX. For UNIX systems, each physical device is represented in the file system. Terminals are called TTY devices, which stands for teletype, the original UNIX terminal.
Example

The following example shows how to use this command.

Switch# configure terminal
Switch(config)# ip rcmd remote-username netadmin1
Switch(config)# ^Z
Related Commands

boot network
boot system
copy flash
copy rcp
copy running-config
copy startup-config

ip rcmd rsh-enable

To configure the switch to allow remote users to execute commands on the switch using rsh, use the ip rcmd rsh-enable global configuration command. To return to the default, use the no form of this command.

ip rcmd rsh-enable
no ip rcmd rsh-enable

Syntax Description

This command has no arguments or keywords.

Default

To ensure security, the switch is not enabled.

Command Mode

Global configuration

Usage Guidelines

Use this command to enable the switch to receive rsh requests from remote users. In addition to using this command, to allow a remote user to execute rsh commands on the switch, you must also create an entry for the remote user in the local switch's authentication database.

The no ip rcmd rsh-enable command does not prohibit a local user of the switch from executing a command on other switches and UNIX hosts on the network by using rsh.

Example

The following example shows how to enable the switch as an rsh server.

Switch(config)# ip rcmd rsh-enable

ip redirects


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip route-cache


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip route

To establish static routes, use the ip route global configuration command. To remove static routes, use the no form of this command.

ip route destination-prefix destination-prefix-mask [interface-type card/subcard/port]
forward-addr [metric | permanent | tag tag-value]
no ip route destination-prefix destination-prefix-mask [interface-type card/subcard/port]
forward-addr [metric | permanent | tag tag-value]
Syntax Description

destination-prefix

IP address of the target network or subnet.

destination-prefix-mask

Address mask for the destination address.

interface-type

Interface type, specified as atm, atm-p, cbr, ethernet, or null.

card/subcard/port

Identifier of the interface specified by interface-type.

forward-addr

Forwarding router's IP address.

metric

Distance metric for this route, in the range of 1 to 255.

permanent

Specifies this route as a permanent route.

tag-value

Sets the tag value for this route, in the range of 1 to 4294967295.

Default

None

Command Mode

Global configuration

Usage Guidelines

This command does not apply to the ASP interface, ATM 2/0/0.

Examples

In the following example, an administrative distance of 110 was chosen. In this case, packets for network 10.0.0.0 are routed to the switch at 131.108.3.4 if dynamic information with an administrative distance less than 110 is not available.

Switch(config)# ip route 10.0.0.0 255.0.0.0 131.108.3.4 110

In the following example, packets for network 131.108.0.0 are routed to the switch at 131.108.6.6.

Switch(config)# ip route 131.108.0.0 255.255.0.0 131.108.6.6

ip security add

To add a basic security option to all outgoing packets, use the ip security add interface configuration command. To disable the adding of a basic security option to all outgoing packets, use the no form of this command.

ip security add
no ip security add

Syntax Description

This command has no arguments or keywords.

Default

Disabled when the security level of the interface is "Unclassified Genser" (or unconfigured). Otherwise, the default is enabled.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500). If an outgoing packet does not have a security option present, this interface configuration command adds one as the first IP option. The security label added to the option field is the label that was computed for this packet when it first entered the switch. Because this action is performed after all the security tests have been passed, this label is either the same as or is in the range of the interface.

Example

The following example adds a basic security option to each packet leaving Ethernet interface 2/0/0.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip security add
Related Command

ip security dedicated

ip security aeso

To attach AESOs to an interface, use the ip security aeso interface configuration command. To disable AESOs on an interface, use the no form of this command.

ip security aeso source compartment-bits
no ip security aeso source compartment-bits
Syntax Description

source

ESO source. This can be an integer from 0 through 255.

compartment-bits

Compartment bits in hexadecimal.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500). Compartment bits are specified only if this AESO is to be inserted in a packet. On every incoming packet at this level on this interface, these AESOs should be present.

Beyond being recognized, no further processing of AESO information is performed. AESO contents are not checked and are assumed to be valid if the source is listed in the configurable AESO table.

Configuring any per-interface extended IPSO information automatically enables ip security extended-allowed (disabled by default).

Example

In the following example, the extended security option source is defined as 5, and the compartment bits are set to 5.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip security aeso 5 5 
Related Commands

ip security eso-info
ip security eso-max

ip security dedicated

To set the level of classification and authority on the interface, use the ip security dedicated interface configuration command. To reset the interface to the default classification and authorities, use the no form of this command.

ip security dedicated level authority [authority...]
no ip security dedicated level authority [authority...]
Syntax Description

level

Degree of sensitivity of information. The level keywords are listed in Table 9-2.

authority

Organization that defines the set of security levels that is used in a network. The authority keywords are listed in Table 9-3.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500).

All traffic entering the system on this interface must have a security option that exactly matches this label. Any traffic leaving via this interface has this label attached.

The following definitions apply to the descriptions of the IPSO in this section:


Table 9-2: IPSO Level Keywords and Bit Patterns
Level Keyword Bit Pattern

Reserved4

0000 0001

TopSecret

0011 1101

Secret

0101 1010

Confidential

1001 0110

Reserved3

0110 0110

Reserved2

1100 1100

Unclassified

1010 1011

Reserved1

1111 0001


Table 9-3: IPSO Authority Keywords and Bit Patterns
Authority Keyword Bit Pattern

Genser

1000 0000

Siop-Esi

0100 0000

DIA

0010 0000

NSA

0001 0000

DOE

0000 1000

Example

The following example sets a confidential level with Genser authority.

Switch(config)# ip security dedicated confidential Genser
Related Command

ip security add

ip security eso-max

To specify the maximum sensitivity level for an interface, use the ip security eso-max interface configuration command. To return to the default, use the no form of this command.

ip security eso-max source compartment-bits
no ip security eso-max source compartment-bits
Syntax Description

source

ESO source. This is an integer from 1 through 255.

compartment-bits

Compartment bits in hexadecimal.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the ASP card: Ethernet 2/0/0 or ATM 2/0/0 (or 13/0/0 in the Catalyst 5500).

This command is used to specify the minimum sensitivity level for a particular interface. Before the per interface compartment information for a particular NLESO source can be configured, the ip security eso-info global configuration command must be used to specify the default information.

On every incoming packet on the interface, these extended security options should be resent at the minimum level and should match the configured compartment bits. Every outgoing packet must have these ESOs.

On every packet transmitted or received on this interface, any NLESO sources present in the IP header should be bounded by the minimum sensitivity level and bounded by the maximum sensitivity level configured for the interface.

When transmitting locally generated traffic out this interface or adding security information (with the ip security add command), the maximum compartment bit information can be used to construct the NLESO sources placed in the IP header.

A maximum of 16 NLESO sources can be configured per interface. Due to IP header length restrictions, a maximum of 9 of these NLESO sources appear in the IP header of a packet.

Example

In the following example, the specified ESO source is 240, and the compartment bits are specified as 500.

Switch(config)# interface ethernet 2/0/0
Switch(config-if)# ip security eso-max 240 500
Related Command

ip security eso-info

ip security eso-info

To configure system-wide defaults for extended IPSO information, use the ip security eso-info global configuration command. To return to the default settings, use the no form of this command.

ip security eso-info source compartment-size default-bit
no ip security eso-info source compartment-size default-bit
Syntax Description

source

Hexadecimal or decimal value representing the extended IPSO source. This is an integer from 0 through 255.

compartment-size

Maximum number of bytes of compartment information allowed for a particular extended IPSO source. This is an integer from 1 through 16.

default-bit

Default bit value for any unsent compartment bits.

Default

Disabled

Command mode

Global configuration

Usage Guidelines

This command configures ESO information, including AESO. Transmitted compartment information is padded to the size specified by the compartment-size argument.

Example

In the following example, system-wide defaults for the source, compartment size, and default bit value are set.

Switch(config)# ip security eso-info 100 5 1 1

ip source-route

To allow the switch to handle IP datagrams with source routing header options, use the ip source-route global configuration command. To have the switch discard any IP datagram containing a source-route option, use the no form of this command.

ip source-route
no ip source-route

Syntax Description

This command has no arguments or keywords.

Default

Enabled

Command Mode

Global configuration

Example

The following example enables the handling of IP datagrams with source routing header options.

Switch(config)# ip source-route
Related Commands

ping (privileged)
ping (user)

ip subnet-zero

To enable the use of subnet zero for interface addresses and routing updates, use the ip subnet-zero global configuration command. To restore the default, use the no form of this command.

ip subnet-zero
no ip subnet-zero

Syntax Description

This command has no arguments or keywords.

Default

Disabled

Command Mode

Global configuration

Usage Guidelines

The ip subnet-zero command provides the ability to configure subnet-zero subnets.

Subnetting with a subnet address of zero is discouraged because of the confusion inherent in having a network and a subnet with indistinguishable addresses.

Example

In the following example, subnet zero is enabled for the switch.

Switch(config)# ip subnet-zero

ip tcp chunk-size

To alter the TCP maximum read size for Telnet or rlogin, use the ip tcp chunk-size global configuration command. To restore the default value, use the no form of this command.

ip tcp chunk-size characters
no ip tcp chunk-size

Syntax Description

characters

Maximum number of characters that Telnet or rlogin can read in one read instruction.

Default

0, which Telnet and rlogin interpret as the largest possible 32-bit positive number.

Command Mode

Global configuration

Usage Guidelines

Do not use this command unless you understand why you need to change the default value.

Example

The following example sets the maximum TCP read size to 64000 bytes.

Switch(config)# ip tcp chunk-size 64000

ip tcp path-mtu-discovery


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip tcp queuemax

To alter the maximum TCP outgoing queue per connection, use the ip tcp queuemax global configuration command. To restore the default value, use the no form of this command.

ip tcp queuemax packets
no ip tcp queuemax

Syntax Description

packets

Outgoing queue size of TCP packets.

Default

The default value is 5 segments if the connection has a TTY associated with it. If there is no TTY associated with it, the default value is 20 segments.

Command Mode

Global configuration

Usage Guidelines

Changing the default value only changes the queue that has a TTY associated with the connection.

Example

The following example sets the maximum TCP outgoing queue to 10 packets.

Switch(config)# ip tcp queuemax 10

ip tcp synwait-time

To set a period of time the switch waits while attempting to establish a TCP connection before it times out, use the ip tcp synwait-time global configuration command. To restore the default time, use the no form of this command.

ip tcp synwait-time seconds
no ip tcp synwait-time
seconds
Syntax Description

seconds

Time in seconds the switch waits while attempting to establish a TCP connection. It can be an integer from 5 to 300  seconds. The default is 30 seconds.

Default

30 seconds

Command Mode

Global configuration

Usage Guidelines

If your network contains PSTN DDR, it is possible that the call setup time exceeds 30 seconds. This amount of time is not sufficient in networks that have dial-up asynchronous connections because it affects your ability to Telnet over the interface (from the switch) if the interface must be brought up. If you have this type of network, you might want to set this value to the UNIX value of 75.

Because this is a host parameter, it does not pertain to traffic going through the switch, just for traffic originating at the switch. Because UNIX has a fixed 75-second timeout, hosts are unlikely to see this problem.

Example

The following example configures the switch to continue attempting to establish a TCP connection for 180 seconds.

Switch(config)# ip tcp synwait-time 180

ip tcp window-size

To alter the TCP window size, use the ip tcp window-size global configuration command. To restore the default value, use the no form of this command.

ip tcp window-size bytes
no ip tcp window-size

Syntax Description

bytes

Window size in bytes. The maximum value is 65535 bytes.

Default

2144 bytes

Command Mode

Global configuration

Usage Guidelines

Do not use this command unless you understand why you need to change the default value.

If your TCP window size is set to 1000 bytes, for example, you could have 1 packet of 1000 bytes or 2 packets of 500 bytes, and so on.

However, there is also a limit on the number of packets allowed in the window. There can be a maximum of 5 packets if the connection has TTY; otherwise there can be 20 packets.

Example

The following example sets the TCP window size to 1000 bytes.

Switch(config)# ip tcp window-size 1000

ip unnumbered


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

ip unreachables


Note This command or some of its parameters might not function as expected in the LightStream  1010 ATM switch environment.

hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Feb 5 16:06:00 PST 1999
Copyright 1989-1999©Cisco Systems Inc.