cc/td/doc/product/atm/ls1010s/wa5/12
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

I Commands

I Commands


Note Commands that are identical to those documented in the Cisco IOS software documentation have been removed from this chapter. Refer to Appendix D, "Removed and Changed Commands," of this command reference for a list of removed commands.

incoming-port

To filter ATM signalling call failures based on the incoming interface of the call, use the incoming-port ATM signalling diagnostics configuration command. To return the incoming port to the default, use the no form of this command.

incoming-port atm card/subcard/port
no incoming-port atm card/subcard/port
Syntax Description

card/subcard/port

Specifies the card, subcard, and port number of the ATM interface. The card number is displayed using the show interface command.The subcard number can be either 0 or  1.

Default

0

Command Mode

ATM signalling diagnostics configuration

Usage Guidelines

The default 0 means the incoming interface is not considered during filtering.

Example

The following example configures ATM 0/1/1 so all previous records collected on the incoming port are purged.

Switch(cfg-atmsig-diag)# incoming-port atm0/1/1

interface

To configure an interface type and enter interface configuration mode, use the interface global configuration command.

interface type card/subcard/port
interface type number

To configure a subinterface, use the interface global configuration command.

interface type card/subcard/port .vpt#
interface type card/subcard/port .subinterface# multipoint | point-to-point
Syntax Description

type

Type of interface to be configured. Refer to Table 9-1 for a list of keywords.

number

Integer used to identify the interface.

card

Interface card number. The numbers are assigned at the factory at the time of installation or when added to a system, and can be displayed with the show interface command.

subcard

Backplane slot number. The value can be 0 or 1. The slots are numbered from left to right.

port

Port number of the interface.

.vpt#

Virtual path tunnel number for the subinterface on physical ATM ports.

.subinterface#

Subinterface number in the range 1 to 4294967293. The number that precedes the periods (.) must match the number where this subinterface belongs.

multipoint

Specifies a multipoint subinterface. This option only applies to the processor interface ATM  /0.

point-to-point

Specifies a point-to-point subinterface. The default is multipoint. This option only applies to the processor interface ATM 0.

Command Mode

Global configuration

Usage Guidelines

Multiple subinterfaces can be configured on a single processor interface.

The processor and Ethernet interfaces address is 0 in the ATM switch environment.

Multiple subinterfaces for VP tunneling can be configured on a single ATM interface (other than a processor interface). VP tunnels are useful when you want to run signalling, ILMI, and possibly PNNI routing between two switches that are not directly connected to each other. Prior to configuring the subinterface, a permanent virtual path must be configured on the ATM interface using the atm pvp command. Then the subinterface for the VP tunnel can be created, specifying the VPI used to define the PVP as the subinterface number.


Table 9-1: Interface Type Keywords
Keyword Interface Type

async

Auxiliary port line used as an asynchronous interface.

atm

ATM interface.

bvi

Bridge-group virtual interface.

cbr

CBR interface.

dialer

Dialer interface.

ethernet

Ethernet IEEE 802.3 interface.

group-async

Master asynchronous interface.

lex

Lex interface.

loopback

Software-only loopback interface that emulates an interface that is always running. It is a virtual interface supported on all platforms. The interface number is the number of the loopback interface you want to create or configure. There is no limit on the number of loopback interfaces you can create.

null

Null interface.

tunnel

Tunnel interface, used to declare a TSP tunnel interface. The tunnel interface number is in the range of 0 to 65535.

virtual-template

Virtual template interface.

virtual-tokenring

Virtual Token Ring interface.

vlan

Catalyst 5000 VLAN interface.

Examples

The following example begins configuration of the ATM interface on card 0, subcard 0, and port 1 using the interface global configuration command.

Switch(config)# interface atm 0/0/1
Switch(config-if)#

The following example creates a VP tunnel with VPI 50 on card 0, subcard 0, and port 1, and enters the subinterface configuration mode for the VP tunnel, using the interface global configuration command.

Switch(config)# interface atm 0/0/1
Switch(config-if)# atm pvp 50
Switch(config-if)# interface atm 0/0/1.50
Switch(config-subif)#

The following example begins configuration of the processor interface, using the interface global configuration command.

Switch(config)# interface atm 0
Switch(config-if)#

The following example creates a point-to-point subinterface on the SAP port and enters the subinterface configuration mode, using the interface global configuration command.

Switch(config)# interface atm 0.1 point-to-point
Switch(config-subif)# 

The following example begins configuration of the Ethernet interface on the ATM switch, using the interface global configuration command.

Switch(config)# interface ethernet 0
Switch(config-if)# 

The following command begins configuration of a CBR interface using the interface global configuration command.

Switch(config)# interface cbr 1/1/1
Switch(config-if)# 

The following example illustrates using the interface tunnel command to declare a TSP tunnel interface with interface number 2100.

Switch(config)# interface tunnel 2100
Related Command

show interface

ip access-group


Note This command or some of its parameters might not function as expected.

ip accounting


Note This command or some of its parameters might not function as expected.

ip accounting-list


Note This command or some of its parameters might not function as expected.

ip accounting-threshold


Note This command or some of its parameters might not function as expected.

ip accounting-transits


Note This command or some of its parameters might not function as expected.

ip address

To set a primary or secondary IP address for an interface, use the ip address interface configuration command. To remove an IP address or disable IP processing, use the no form of this command.

ip address ip-address mask [secondary]
no ip address ip-address mask [secondary]
Syntax Description

ip-address

IP address.

mask

Mask for the associated IP subnet.

secondary

Specifies that the configured address is a secondary IP address. If this keyword is omitted, the configured address is the primary IP address.

Default

No IP address is defined for the interface.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0. An interface can have one primary IP address and multiple secondary IP addresses. Packets generated by the switch always use the primary IP address. Therefore, all switches on a segment should share the same primary network number.

Hosts can determine subnet masks using the ICMP Mask Request message. Switches respond to this request with an ICMP Mask Reply message.

You can disable IP processing on a particular interface by removing its IP address with the no  ip  address command. If the switch detects another host using one of its IP addresses, it prints an error message on the console.

The optional keyword secondary allows you to specify an unlimited number of secondary addresses. Secondary addresses are treated like primary addresses, except the system never generates datagrams other than routing updates with secondary source addresses. IP broadcasts and ARP requests are handled properly, as are interface routes in the IP routing table.

Secondary IP addresses can be used in a variety of situations. The following are the most common applications:


Note If any switch on a network segment uses a secondary address, all other switches on that same segment must also use a secondary address from the same network or subnet. Inconsistent use of secondary addresses on a network segment can very quickly cause routing loops.
Example

In the following example, 131.108.1.27 is the primary address and 192.31.7.17 and 192.31.8.17 are secondary addresses for main Ethernet 0 interface.

Switch(config)# main-ethernet 0
Switch(config-if)# ip address 131.108.1.27 255.255.255.0
Switch(config-if)# ip address 192.31.7.17 255.255.255.0 secondary
Switch(config-if)# ip address 192.31.8.17 255.255.255.0 secondary
Related Command

show interface

ip broadcast-address

To define a broadcast address for an interface, use the ip broadcast-address interface configuration command. To restore the default IP broadcast address, use the no form of this command.

ip broadcast-address [ip-address]
no
ip broadcast-address [ip-address]
Syntax Description

ip-address

IP broadcast address for a network.

Default

Default address is 255.255.255.255 (all ones).

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0.

Example

The following example specifies an IP broadcast address of 172.10.50.4.

Switch(config)# ip broadcast-address 172.10.50.4
Related Command

show interface

ip classless


Note This command or some of its parameters might not function as expected.

ip directed-broadcast

To enable the translation of directed broadcasts to physical broadcasts, use the ip directed-broadcast interface configuration command. To return the directed broadcast to the default, use the no form of this command.

ip directed-broadcast [access-list-number]
no
ip directed-broadcast [access-list-number]
Syntax Description

access-list-number

Number of the access list. If specified, a broadcast must pass the access list to be forwarded. If not specified, all broadcasts are forwarded.

Default

Enabled with no list specified.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0. This feature is enabled only for those protocols configured using the ip forward-protocol global configuration command. An access list might be specified to control which broadcasts are forwarded. When an access list is specified, only those IP packets permitted by the access list are eligible to be translated from directed broadcasts to physical broadcasts.

Example

The following example enables forwarding of IP directed broadcasts on main Ethernet 0 interface.

Switch(config)# main-ethernet 0
Switch(config-if)# ip directed-broadcast
Related Command

ip forward-protocol

ip domain-lookup nsap


Note This command or some of its parameters might not function as expected.

ip forward-protocol


Note This command or some of its parameters might not function as expected.

ip gdp


Note This command or some of its parameters might not function as expected.

ip helper-address


Note This command or some of its parameters might not function as expected.

ip mtu

To set the MTU size of IP packets sent on an interface, use the ip mtu interface configuration command. To restore the default MTU size, use the no form of this command.

ip mtu bytes
no ip mtu
Syntax Description

bytes

MTU in bytes.

Default

Minimum is 128 bytes; maximum depends on the interface medium.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0. If an IP packet exceeds the MTU set for the interface of the switch, the switch fragments the packet.

All devices on a physical medium must have the same protocol MTU in order to operate.


Note Changing the MTU value (with the mtu interface configuration command) can affect the IP MTU value. If the current IP MTU value is the same as the MTU value and you change the MTU value, the IP MTU value is modified automatically to match the new MTU. However, the reverse is not true; changing the IP MTU value has no effect on the value for the mtu command.
Example

The following example sets the maximum IP packet size for the first interface to 300 bytes.

Switch(config)# main-ethernet 0
Switch(config-if)# ip mtu 300
Related Command

mtu

ip proxy-arp

To enable proxy ARP on an interface, use the ip proxy-arp interface configuration command. To disable proxy ARP on the interface, use the no form of this command.

ip proxy-arp
no ip proxy-arp

Syntax Description

This command has no arguments or keywords.

Default

Enabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0.

Example

The following example enables proxy ARP on Ethernet interface 0.

Switch(config)# main-ethernet 0
Switch(config-if)# ip proxy-arp

ip rarp-server

Use the ip rarp-server interface configuration command to allow the switch to act as a RARP server. To return the RARP server to the default, use the no form of this command.

ip rarp-server ip-address
no ip rarp-server ip-address
Syntax Description

ip-address

IP address that is to be provided in the source protocol address field of the RARP response packet. Normally, this is set to whatever address you configure as the primary address for the interface.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0. This feature makes diskless booting of clients possible between network subnets where the client and server are on separate subnets.

RARP server support can be configured on a per-interface basis so the switch does not interfere with RARP traffic on subnets that do not need RARP assistance from the switch.

The switch answers incoming RARP requests only if both of the following two conditions are met:

Use the show ip arp EXEC command to display the contents of the IP ARP cache.

Sun Microsystems, Inc. makes use of RARP-based and UDP-based network services to facilitate network-based booting of SunOS on their workstations. By bridging RARP packets and using both the ip helper-address interface configuration command and the ip forward-protocol global configuration command, the switch should be able to perform the necessary packet switching to enable booting of Sun workstations across subnets. However, some Sun workstations assume that the sender of the RARP response, in this case the switch, is the host that the client can contact to TFTP-load the bootstrap image. This causes the workstations to fail to boot.

By using the ip rarp-server feature, the switch can be configured to answer these RARP requests, and the client machine should be able to reach its server by having its TFTP requests forwarded through the switch that acts as the RARP server.

ip redirects


Note This command or some of its parameters might not function as expected.

ip route-cache


Note This command or some of its parameters might not function as expected.

ip route

To establish static routes, use the ip route global configuration command. To remove static routes, use the no form of this command.

ip route destination-prefix destination-prefix-mask [interface-type card/subcard/port]
forward-addr [metric | permanent | tag tag-value]
no ip route destination-prefix destination-prefix-mask [interface-type card/subcard/port]
forward-addr [metric | permanent | tag tag-value]
Syntax Description

destination-prefix

IP address of the target network or subnet.

destination-prefix-mask

Address mask for the destination address.

interface-type

Interface type, specified as atm, atm-p, cbr, ethernet, or null.

card/subcard/port

Identifier of the interface specified by interface-type.

forward-addr

Forwarding router's IP address.

metric

Distance metric for this route, in the range of 1 to 255.

permanent

Specifies this route as a permanent route.

tag-value

Sets the tag value for this route, in the range of 1 to 4294967295.

Default

No ip route is specified.

Command Mode

Global configuration

Usage Guidelines

This command does not apply to the processor interface main ATM 0.

Examples

In the following example, an administrative distance of 110 was chosen. In this case, packets for network 10.0.0.0 are routed to the switch at 131.108.3.4 if dynamic information with an administrative distance less than 110 is not available.

Switch(config)# ip route 10.0.0.0 255.0.0.0 131.108.3.4 110

In the following example, packets for network 131.108.0.0 are routed to the switch at 131.108.6.6.

Switch(config)# ip route 131.108.0.0 255.255.0.0 131.108.6.6

ip security add

To add a basic security option to all outgoing packets, use the ip security add interface configuration command. To disable the adding of a basic security option to all outgoing packets, use the no form of this command.

ip security add
no ip security add

Syntax Description

This command has no arguments or keywords.

Default

Disabled when the security level of the interface is "Unclassified Genser" (or unconfigured). Otherwise, the default is enabled.

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0. If an outgoing packet does not have a security option present, this interface configuration command adds one as the first IP option. The security label added to the option field is the label that was computed for this packet when it first entered the switch. Because this action is performed after all the security tests have been passed, this label is either the same as or is in the range of the interface.

Example

The following example adds a basic security option to each packet leaving main Ethernet interface 0.

Switch(config)# main-ethernet 0
Switch(config-if)# ip security add
Related Command

ip security dedicated

ip security aeso

To attach AESOs to an interface, use the ip security aeso interface configuration command. To disable AESOs on an interface, use the no form of this command.

ip security aeso source compartment-bits
no ip security aeso source compartment-bits
Syntax Description

source

ESO source. This can be an integer from 0 through 255.

compartment-bits

Compartment bits in hexadecimal.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0. Compartment bits are specified only if this AESO is to be inserted in a packet. On every incoming packet at this level on this interface, these AESOs should be present.

Beyond being recognized, no further processing of AESO information is performed. AESO contents are not checked and are assumed to be valid if the source is listed in the configurable AESO table.

Configuring any per-interface extended IPSO information automatically enables ip security extended-allowed (disabled by default).

Example

In the following example, the extended security option source is defined as 5, and the compartment bits are set to 5.

Switch(config)# main-ethernet 0
Switch(config-if)# ip security aeso 5 5 
Related Commands

ip security eso-info
ip security eso-max

ip security dedicated

To set the level of classification and authority on the interface, use the ip security dedicated interface configuration command. To reset the interface to the default classification and authorities, use the no form of this command.

ip security dedicated level authority [authority...]
no ip security dedicated level authority [authority...]
Syntax Description

level

Degree of sensitivity of information. The level keywords are listed in Table 9-2.

authority

Organization that defines the set of security levels that is used in a network. The authority keywords are listed in Table 9-3.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0.

All traffic entering the system on this interface must have a security option that exactly matches this label. Any traffic leaving via this interface has this label attached.

The following definitions apply to the descriptions of the IPSO in this section:


Table 9-2: IPSO Level Keywords and Bit Patterns
Level Keyword Bit Pattern

Reserved4

0000 0001

TopSecret

0011 1101

Secret

0101 1010

Confidential

1001 0110

Reserved3

0110 0110

Reserved2

1100 1100

Unclassified

1010 1011

Reserved1

1111 0001


Table 9-3: IPSO Authority Keywords and Bit Patterns
Authority Keyword Bit Pattern

Genser

1000 0000

Siop-Esi

0100 0000

DIA

0010 0000

NSA

0001 0000

DOE

0000 1000

Example

The following example sets a confidential level with Genser authority.

Switch(config)# ip security dedicated confidential Genser
Related Command

ip security add

ip security eso-max

To specify the maximum sensitivity level for an interface, use the ip security eso-max interface configuration command. To return to the default, use the no form of this command.

ip security eso-max source compartment-bits
no ip security eso-max source compartment-bits
Syntax Description

source

ESO source. This is an integer from 1 through 255.

compartment-bits

Compartment bits in hexadecimal.

Default

Disabled

Command Mode

Interface configuration

Usage Guidelines

This command only applies to the interfaces on the processor card: main Ethernet 0 or main ATM 0.

This command is used to specify the minimum sensitivity level for a particular interface. Before the per interface compartment information for a particular NLESO source can be configured, the ip security eso-info global configuration command must be used to specify the default information.

On every incoming packet on the interface, these extended security options should be resent at the minimum level and should match the configured compartment bits. Every outgoing packet must have these ESOs.

On every packet transmitted or received on this interface, any NLESO sources present in the IP header should be bounded by the minimum sensitivity level and bounded by the maximum sensitivity level configured for the interface.

When transmitting locally generated traffic out this interface or adding security information (with the ip security add command), the maximum compartment bit information can be used to construct the NLESO sources placed in the IP header.

A maximum of 16 NLESO sources can be configured per interface. Due to IP header length restrictions, a maximum of 9 of these NLESO sources appear in the IP header of a packet.

Example

In the following example, the specified ESO source is 240, and the compartment bits are specified as 500.

Switch(config)# main-ethernet 0
Switch(config-if)# ip security eso-max 240 500
Related Command

ip security eso-info

ip tcp chunk-size

To alter the TCP maximum read size for Telnet or rlogin, use the ip tcp chunk-size global configuration command. To restore the default value, use the no form of this command.

ip tcp chunk-size characters
no ip tcp chunk-size

Syntax Description

characters

Maximum number of characters that Telnet or rlogin can read in one read instruction.

Default

0, which Telnet and rlogin interpret as the largest possible 32-bit positive number.

Command Mode

Global configuration

Usage Guidelines

Do not use this command unless you understand why you need to change the default value.

Example

The following example sets the maximum TCP read size to 64000 bytes.

Switch(config)# ip tcp chunk-size 64000

ip tcp path-mtu-discovery


Note This command or some of its parameters might not function as expected.

ip tcp queuemax

To alter the maximum TCP outgoing queue per connection, use the ip tcp queuemax global configuration command. To restore the default value, use the no form of this command.

ip tcp queuemax packets
no ip tcp queuemax

Syntax Description

packets

Outgoing queue size of TCP packets.

Default

The default value is 5 segments if the connection has a TTY associated with it. If there is no TTY associated with it, the default value is 20 segments.

Command Mode

Global configuration

Usage Guidelines

Changing the default value only changes the queue that has a TTY associated with the connection.

Example

The following example sets the maximum TCP outgoing queue to 10 packets.

Switch(config)# ip tcp queuemax 10

ip tcp synwait-time

To set a period of time the switch waits while attempting to establish a TCP connection before it times out, use the ip tcp synwait-time global configuration command. To restore the default time, use the no form of this command.

ip tcp synwait-time seconds
no ip tcp synwait-time
seconds
Syntax Description

seconds

Time in seconds the switch waits while attempting to establish a TCP connection. It can be an integer from 5 to 300  seconds. The default is 30 seconds.

Default

30 seconds

Command Mode

Global configuration

Usage Guidelines

If your network contains PSTN DDR, it is possible that the call setup time exceeds 30 seconds. This amount of time is not sufficient in networks that have dial-up asynchronous connections because it affects your ability to Telnet over the interface (from the switch) if the interface must be brought up. If you have this type of network, you might want to set this value to the UNIX value of 75.

Because this is a host parameter, it does not pertain to traffic going through the switch, just for traffic originating at the switch. Because UNIX has a fixed 75-second timeout, hosts are unlikely to see this problem.

Example

The following example configures the switch to continue attempting to establish a TCP connection for 180 seconds.

Switch(config)# ip tcp synwait-time 180

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.