SlideShare a Scribd company logo
1 of 21
Download to read offline
Important Cisco Show Commands
If you are a networking professional that is operating and supporting Cisco devices and
networks, then learning some important “show commands” is essential.
There are a few different categories of commands on Cisco devices. There are commands
that configure the device to perform a certain function and also there are commands that
extract information from the device and the whole network in general.
Cisco “show commands” belong to the second category above. They are crucial when
troubleshooting problems in the network or for displaying useful and critical information
from the router or switch.
In this article I have created the following Cisco Show Commands Cheat Sheet with brief
description of the most important and most useful commands you will need as a Cisco
Network Professional (both for IOS Routers and Switches).
Important Show Commands for Cisco Routers
Note that most of the commands below work both for Routers and Switches as well. Also,
all of the commands below must be run from the “Privileged EXEC” mode which is denoted
with a pound sign (#) such as:
Router#
Switch#
To get into “Privileged EXEC” mode, connect to the device (e.g via console, SSH, Telnet) and
use the enable command:
Router> enable
Router#
Command: show running-config
Description:
This command will output all of the current configuration that is running in RAM memory of
the device to the user’s terminal one page at a time.
Pressing the enter key displays one line at a time and pressing the space bar displays one
whole page at a time.
To see the whole output at once use the command terminal length 0 before entering the
show running-config command.
Any passwords or shared keys are usually encrypted and therefore not visible in the output,
however it is possible to show the plain text output of shared keys for RADIUS servers or
VPN connections in the running-configuration by using the command
more system:running-config.
Further Related Commands:
terminal length 0
more system:running-config
Command: show startup-configuration
Description:
This command is the same as the above show running-configuration command except this
will output the configuration that is stored in NVRAM.
It is this configuration that is loaded into memory when the device is first booted. When
changes are made to a device these changes are made to the running-configuration only
and need to be written to memory before the changes are permanently made to the
startup-configuration.
This can be useful if a mistake is made in the running-configuration and you need to revert,
you can either copy the startup-configuration back into running memory or you can pull the
power and reload the device which will load the old configuration.
Further Related Commands:
copy running-configuration startup-configuration
write mem or wr
copy startup-configuration running-configuration
Command: show version
Description:
This command shows a lot of useful outputs and will show different information depending
on the device, model etc. The first few lines show which version of IOS software the device
is running.
Cisco IOS XE Software, Version 16.09.05
Cisco IOS Software [Fuji], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M),
Version 16.9.5, RELEASE SOFTWARE (fc1)
The next part of the output shows how long the device has been online for and the reason
for the last reload. This can be useful to understand the reason for an unexpected reboot as
a power cut will show as power failure.
ASW_CORE_SWITCH_1 uptime is 2 weeks, 22 hours, 49 minutes
Uptime for this control processor is 2 weeks, 22 hours, 51 minutes
System returned to ROM by Power Failure or Unknown at 18:56:54 BST Fri Jul 10 2020
System restarted at 16:59:45 UTC Tue Dec 15 2020
System image file is "flash:packages.conf"
Last reload reason: Power Failure or Unknown
The next section shows the licence packages that are installed and in use. You can also see if
Smart licensing is in use or if traditional right to use licensing is installed.
Technology Package License Information:
------------------------------------------------------------------------------
Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------------------
lanbasek9 Smart License lanbasek9
None Subscription Smart License None
Smart Licensing Status: REGISTERED/AUTHORIZED
The next section details the amount of system memory the device has installed and the
amount of DRAM or physical memory. You can also see how many physical interfaces the
device has and of what type and also how many virtual interfaces are supported.
cisco WS-C3650-12X48UQ (MIPS) processor (revision F0) with 832395K/6147K bytes of
memory.
Processor board ID FDXX32BAXXF
20 Virtual Ethernet interfaces
36 Gigabit Ethernet interfaces
16 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
253984K bytes of Crash Files at crashinfo:.
3334464K bytes of Flash at flash:.
0K bytes of WebUI ODM Files at webui:.
The final section shows the physical mac address of the device, the model of the device and
importantly the system serial number. This is essential if you need the serial number to raise
a Cisco Support Case and the device is in a remote datacentre or in a heavily populated rack
where the underside of the device is not visible. The last part of this section is more
important for layer 3 switches as this will show you if the switch is a part of a stack, how
many switches make up the stack and what version of IOS each switch in the stack is
running.
Base Ethernet MAC Address : b4:f7:d7:e1:5d:00
Motherboard Assembly Number : 73-xxxx75-04
Motherboard Serial Number : FDO2XXXXXX
Model Revision Number : F0
Motherboard Revision Number : B0
Model Number : WS-C3650-12X48UQ
System Serial Number : FDO2XXXXX
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
* 1 52 WS-C3650-12X48UQ 16.9.5 CAT3K_CAA-UNIVERSALK9 INSTALL
Command: show ip route
Description:
The show ip route command displays the IPv4 routing table containing all of the routes
which are known by the router.
This output will display the gateway of last resort and any static routes that have been
manually configured or any dynamic routes learned from a routing protocol.
The letter in the left-hand column tells you how the route was learned by the routing table
and there is a key for each letter listed at the top.
For example, the letter D tells you that this particular route was learned by EIGRP which is a
dynamic routing protocol.
It is possible for the router to hold more than one Routing table, these are known as VRF’s
(virtual routing and forwarding).
You can display the routing table for each VRF by using the command show ip route vrf
followed by the VRF number.
If the routing table is particularly large you can just display the static routes or just the
routes learned by a particular protocol.
Further Related Commands:
show ip route vrf 1
show ip route static
show ip route eigrp
Command: show ipv6 route
Description:
This command shows a similar output to show ip route except the routes shown in this table
are for IP version 6.
Further Related Commands:
show ipv6 route summary
show ipv6 route static
show ipv6 route eigrp
Command: show interfaces
Description:
The output from this command shows statistics from every physical and logical interface
and can be quite long as there is a lot of information to be displayed.
GigabitEthernet1/0/6 is up, line protocol is up (connected)
The above line shows the interface is physically connected and is Administratively up. If
there is a cable plugged into the interface and it shows not connected the cable should be
replaced. Line protocol that shows disabled means the interface is in a shutdown state and
err-disabled shows a port security violation.
Hardware is Gigabit Ethernet, address is c4f7.d5e1.3d06 (bia c4f7.d5e1.3d06)
Description: SWITCH1
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
The above shows bandwidth of the interface and the txload / rxload shows how busy the
interface is; 255/255 would show an interface that is running at maximum and is congested.
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 1000Mb/s, media type is 10/100/1000BaseTX
If the above line shows half-duplex then this would signify a configuration problem with the
duplex settings at one or both ends of the link.
input flow-control is on, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0
Output drops are caused by QOS buffers overflowing and would suggest that the interface is
congested.
Queueing strategy: Class-based queueing
Output queue: 0/40 (size/max)
5 minute input rate 632000 bits/sec, 547 packets/sec
5 minute output rate 1057000 bits/sec, 782 packets/sec
Input and output rates will increase if traffic is passing over the interface.
785945926 packets input, 126175928146 bytes, 0 no buffer
Received 16514320 broadcasts (11199427 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 11199456 multicast, 0 pause input
0 input packets with dribble condition detected
1107697383 packets output, 224583269918 bytes, 0 underruns
0 output errors, 0 collisions, 2 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
Input errors, CRC errors should not increase if they do this would highlight a problem with
the cabling which should be replaced. Use the clear counters command then wait 5
minutes and show interfaces again. If the counter increases replace the cable.
Further Related Commands:
clear counters
Command: show interfaces gigabitEthernet 0/0
Description:
The output from this command is the same as show interfaces except it only shows the
statistics of the stated interface.
Further Related Commands:
show interfaces TenGigabitEthernet 0/0 summary
show interfaces FastEthernet 1/0/1 status
show interfaces gigabitEthernet 2/0/1 transceiver
Command: show ip interface brief
Description:
This command lists a condensed one line for each logical and physical interface. Each line
displays the interface, configured IP address, link status up/down and Administrative status
up/down. You can condense this further by just stating the output of one particular
interface or Vlan SVI.
Further Related Commands:
show ip interface brief vlan 10
show ip interface TenGigabitEthernet 0/0
Command: show ipv6 interface brief
Description:
This command is similar to above except this shows any interfaces that have IP version 6
addresses configured on them.
Further Related Commands:
show ipv6 interface brief vlan 10
Command: show cdp neighbors
Description:
By default, the Cisco Discovery Protocol (CDP) is enabled on all Cisco devices but for security
this protocol is sometimes manually disabled.
The command cdp run will re-enable this protocol.
Show cdp neighbors displays summary details about any directly connected cisco devices
such as the device Hostname, which interface on the local switch its connected to, what the
device is (Router/switch/phone…. ), the device model and finally which interface on the
remote device this router is connected to.
The command show cdp neighbors detail supplies further information such as the remote
devices IP address, which is useful for remotely connecting to the device and the version of
IOS that the device is running.
Further Related Commands:
show cdp neighbors detail
Command: show clock
Description:
This command simply shows the current time configured on the device in hours, minutes
and seconds. It also shows the current time zone and date in the format – Wed Feb 11 2020
Further Related Commands:
show clock detail
Command: show ntp status
Description:
Network Time Protocol is used to automatically synchronize the devices internal clock with
an NTP server.
The NTP server can be another device such as the core switch or there are public NTP
servers on the internet that can be used for time synchronization.
The show ntp status command shows whether NTP is configured and synchronised and
shows the stratum level.
The stratum level shows how far away this device is from the reference clock and therefore
how accurate the time is. A stratum level of 2 would be considered as a directly connected
peer and the maximum stratum level is 16.
Further Related Commands:
show ntp associations
show ntp information
Command: show Flash:
Description:
This command will list all of the files which are stored in NVRAM and how much space in
bytes is left in flash memory for additional files to be added.
This is the location where files such as the router IOS firmware can be found. There can be
more than one flash file system on a Router, these can be listed using the command show
file systems.
Further Related Commands:
show file systems
show flash1:
show usb0:
Command: show history
Description:
The show history command lists all the previous commands that have been entered in the
terminal window during the session. When the terminal session is closed the history is
removed.
Command: show logging
Description:
The show logging command lists the log messages that have been stored in the devices log
file. The amount of information that is collected here depends on the logging level and the
size of the configuration buffer that has been configured on the device. The logging levels
are as follows:
• 0 —emergency: System unusable
• 1 —alert: Immediate action needed
• 2 —critical: Critical condition—default level
• 3 —error: Error condition
• 4 —warning: Warning condition
• 5 —notification: Normal but significant condition
• 6 —informational: Informational message only
• 7 —debugging: Appears during debugging only
A configured logging level of 5 would log all conditions with the number of 5 or lower so
informational or debugging messages would not be logged. If the logs are large you can
search for a specific date by adding the pipe | symbol and the include keyword as shown
below.
Further Related Commands:
show logging | include Dec 24
show logging | begin Dec 24
Command: show protocols
Description:
This command lists all the interfaces and whether the line protocol is up or down. It also
shows which protocol is in use on the device such as IP. The command show ip protocols is
useful for showing which IP routing protocols are active on the router such as RIP, EIGRP or
OSPF.
Further Related Commands:
show ip protocols
Command: show users
Description:
This command shows which users are currently logged into the device and whether they are
logged in remotely through a VTY line or directly connected through the console port.
Further Related Commands:
show users all
Command: show access-lists
Description:
The show access-lists command displays all Access Lists that have been configured on the
device. It shows Standard IPv4 access lists first, followed by Extended IPv4 access lists and
ending with IPv6 access lists.
The output from specific access lists can be displayed by adding the access list name or
number at the end of the show access-list command as shown below.
Further Related Commands:
show access-list SNMP_ACL
show access-list 10
Command: show ip dhcp binding
Description:
This command is applicable to switches or routers which are acting as DHCP servers for the
network segment.
When an IP address is leased by the device this leased address is placed into a DHCP
bindings table which shows the mac address of the device that is tied to the leased IP
address.
The DHCP bindings table also shows when the lease is due to expire. A specific address
binding can be displayed by adding the required ip address to the end of the show ip dhcp
bindings command.
If a device on the network has been manually configured with an IP address in the same
subnet as the DHCP pool this can cause an address conflict.
The command show ip dhcp conflict will show any conflicting IP addresses and show ip arp
will show which mac addresses have been given the duplicate address.
The show ip dhcp snooping command shows which interfaces are trusted or untrusted for
communication to the DHCP server if dhcp snooping has been enabled on the switch or
router.
Further Related Commands:
show ip dhcp binding 10.0.0.10
show ip dhcp conflict
show ip dhcp snooping
show ip arp
show ip arp | include 10.0.0.10
Command: show ip dhcp pool
Description:
This command displays all of the different configured pools of IP address ranges that have
been allocated for lease by the device for DHCP purposes.
The statistics from each pool show how much of the pool has been utilized, the total
number of available addresses in the pool, how many IP addresses have been leased, the
next address that will be leased from the pool and finally the start and end IP addresses of
the subnet range that is used in the DHCP pool.
Command: show ip eigrp neighbors
Description:
This command displays all router adjacencies that have been dynamically discovered by the
Enhanced Interior Gateway Routing Protocol (EIGRP).
The output table shows the IP address of the connected neighbouring Router, which
interface on the local router the advertisements were received on and the time left on the
hold timer of each neighbour.
Command: show ip ospf neighbor
Description:
The output table displayed by this command shows neighbour Router adjacencies that have
been discovered by the Open Shortest Path First protocol (OSPF).
The table shows the ID of the neighbour which is usually a logical loopback address that is
configured on each router.
The priority of the Router, with the highest priority being assigned to the Designated Router
(DR).
The state of the relationship which should be Full, any other state would suggest that the
connection between these neighbours has been disrupted and the process for forming
adjacencies has been restarted.
Next to this is the Router designation of DR, BDR (backup designated router) or DROTHER
for all non-designated routers.
The next column shows the Dead Time which is how long the Router will wait to receive a
keep alive before declaring the connection is down.
The next column is the Address field which shows the IP address of the interface to which
this neighbor is directly connected and finally the interface field shows the interface on the
local router where the neighbour adjacency has been formed.
The command show ip ospf interface gi 1/0/1 is useful for troubleshooting mismatches
between the hello, dead and wait timers.
Further Related Commands:
show ip ospf interface gi 1/0/1
Command: show ip nat translations
Description:
When a router is used to translate private IP address ranges to public IP addresses the
command show ip nat translations is used to show which IP addresses are currently being
translated by the router.
Router# show ip nat translations
Pro Inside global Inside local Outside local Outside global
tcp 192.168.1.1:514 192.168.2.3:53 88.66.5.240:256. 88.66.5.240:256
tcp 192.168.1.1:513 192.168.2.2:53 88.66.5.240:256. 88.66.5.240:256
tcp 192.168.1.1:512 192.168.2.4:53 88.66.5.240:256. 88.66.5.240:256
Total number of translations: 3
The above table shows that there are 3 private IP addresses that are currently being
translated to the Public Internet routable IP address of 88.66.5.240.
Further Related Commands:
show ip nat statistics
Command: show standby
Description:
This command is used to show the status of the Hot Standby Router Protocol (HSRP) where
one Router is active and passing traffic and another is on standby ready to take over the
forwarding of traffic should the active router fail. Below is the output from the show
standby command.
R1#show standby
Link connecting the active Router to the standby Router for Standby group 1.
Ethernet0/0 - Group 1
Active state means HSRP is ready to fail over should the primary router fail.
State is Active
2 state changes mean there have been two fail overs
2 state changes, last state change 00:01:37
The IP address that is shared between the two Routers. This is the gateway address that
should be configured on the End Hosts.
Virtual IP address is 10.1.1.100
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Keep alives are sent every 3 seconds, if no hello packets are received in 10 seconds a state
change occurs and the standby router takes over and becomes active.
Hello time 3 sec, hold time 10 sec
Next hello sent in 1.680 secs
With pre-emption enabled should the primary router come back up HSRP will detect this
and there will be another state change making the primary router active again.
Preemption enabled
The current router you are connected to is the Active router
Active router is local
The IP address of the Standby router
Standby router is 10.1.1.2, priority 100 (expires in 10.320 sec)
The configured Priority of the router, the highest priority makes the router the Active
router.
Priority 200 (configured 200)
Group name is "hsrp-Et0/0-1" (default)
Often traffic is load balanced over both the primary and secondary routers by creating a
second standby group 2 and giving opposite priorities than were given to group 1. This will
make the standby router in group 1 the active router in group 2 and vice versa.
Further Related Commands:
show standby brief
Command: show tech-support
Description:
The show tech-support output is usually requested by Cisco Technical Assistance Center
(TAC) when troubleshooting an issue with the device.
The output is very long and should be output to a file where possible as copying and pasting
from the screen can be difficult due to the amount of output. This can be done through the
settings of the terminal program used to connect to the Router. The show tech-support
command will display the output from many different Cisco show commands to gather the
current configuration, version and model details and show the overall health of the Router.
Command: show processes
Description:
The show processes command lists all of the services that are currently performing tasks
using the Router’s CPU.
The output provides information such as the Process ID, the priority of the process, how
long the service has been running for, how many times the process has been run and the
name of the process.
The output also shows the CPU utilization for the intervals of 5 seconds, one minute and 5
minutes. This output can be seen in more detail by running the command show processes
cpu history which displays the CPU history as a graph.
The history is also shown over the longer intervals of 60 seconds, 60 minutes and 72 hours.
These outputs can be useful for troubleshooting intermittent performance problems as it
will show any periods where the CPU has reached 100%.
Further Related Commands:
show processes cpu history
Important Show Commands for Cisco Switches
Command: show mac address-table
Description:
This command lists all of the mac addresses that have been learned by the switch. It lists the
Vlan associated to each mac address and the interface from which the mac address was
learned.
Multiple Mac addresses learned from the same interface would indicate that the interface is
a trunk interface that is most likely connected to another switch.
You can find a where a specific device is located by searching the mac address table with the
last few digits of the devices mac address or you can find what mac address is on a specific
interface.
Further Related Commands:
show mac address-table | include b34a
show mac address-table interface gi 1/0/1
show mac address-table vlan 10
Command: show spanning tree summary
Description:
The output from this command will show you information on the spanning tree protocol
that is running on the switch.
The output seen may be slightly different depending on the version of spanning tree
protocol that is running on the switch.
The output shown below is from a switch running Rapid Per Vlan Spanning Tree (RPVST).
The output shows which version of spanning tree is running and whether options such as
BPDU Guard have been globally enabled on the switch.
The table shows the number of interfaces that are in a forwarding or blocking state for each
vlan. For information on which ports are in a blocking state for each vlan use the command
show spanning-tree detail.
Switch is in rapid-pvst mode
Root bridge for: none
EtherChannel misconfig guard is enabled
Extended system ID is enabled
Portfast Default is disabled
PortFast BPDU Guard Default is enabled
Portfast BPDU Filter Default is disabled
Loopguard Default is enabled
UplinkFast is disabled
BackboneFast is disabled
Configured Pathcost method used is short
Name Blocking Listening Learning Forwarding STP Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0010 0 0 0 23 23
VLAN0020 0 0 0 24 24
VLAN0030 0 0 0 23 23
VLAN0031 0 0 0 23 23
VLAN0040 0 0 0 23 23
VLAN0041 0 0 0 23 23
VLAN0050 0 0 0 24 24
VLAN0052 0 0 0 23 23
Name Blocking Listening Learning Forwarding STP Active
---------------------- -------- --------- -------- ---------- ----------
VLAN0053 0 0 0 23 23
VLAN0054 0 0 0 23 23
VLAN0062 0 0 0 24 24
VLAN0063 0 0 0 23 23
VLAN0065 0 0 0 26 26
VLAN0066 0 0 0 25 25
VLAN0069 0 0 0 24 24
VLAN0070 0 0 0 23 23
VLAN0073 0 0 0 1 1
VLAN0074 0 0 0 1 1
VLAN0100 0 0 0 23 23
VLAN0317 0 0 0 23 23
---------------------- -------- --------- -------- ---------- ----------
20 vlans 0 0 0 425 425
Further Related Commands:
show spanning tree detail
show spanning-tree root
show spanning-tree blockedports
Command: show etherchannel
Description:
The output from this command shows information on each link aggregation Channel-Group
configured on the switch.
The output from this command will show how many interfaces have been bundled to form
the Etherchannel and what Etherchannel protocol is being used in each channel group such
as LACP or PaGP.
To troubleshoot Etherchannels use the command show etherchannel summary as this
output details which interfaces have been bundled into a port-channel and will show any
links within the Etherchannel that are in a suspended state.
Further Related Commands:
show etherchannel summary
show etherchannel detail
Command: show vlan
Description:
This command shows the vlan database and all the Vlans that have been configured on the
switch.
The output table shows the Vlan number, the Vlan name, whether the Vlan is active and
which interfaces are configured as an Access port in a particular Vlan.
It is important to remember that a Vlan will not become active until at least one interface is
in an up and connected state in that Vlan.
Further Related Commands:
show vlan summary
show vlan brief
Command: show vtp status
Description:
This command shows the status of the Vlan Trunking Protocol which is a method that
switches use to sync their Vlan databases. The output from this command shows the
following details:
VTP Version – 1 or 2
Configuration revision – A higher revision will take priority over a lower revision.
Maximum supported Vlans – 1005
VTP Operating Mode – Client, Server or Transparent.
VTP Domain – All switches configured with the same domain name will sync databases.
VTP Pruning Mode – Enabled or disabled
VTP V2 Mode – Enabled or disabled
VTP Traps generation – Enabled or disabled
By default, all devices are configured with VTP server mode enabled. In server mode the
Switch will advertise any changes that are made to its Vlan database to all other switches
that are configured with the same VTP domain.
A Switch configured with VTP Client mode will listen for VTP server advertisements and
make changes to its Vlan Database based on the received Advertisement. You cannot make
changes to any Vlan such as adding or deleting Vlans on a switch that is configured as a VTP
client.
A Switch configured with VTP mode Transparent does not participate in VTP and as such will
not make changes to its Vlan database if it receives VTP advertisements, but it will forward
these advertisements to other connected switches.
Command: show port-security
Description:
This command will display a table showing all the interfaces that have been configured to
use port security.
The table shows how many Mac Addresses are allowed on an interface before a violation
occurs and what action will be taken in the event of a security violation.
The actions that can be taken are shutdown the interface, restrict the interface by dropping
traffic from the offending Mac address and restrict the interface by dropping traffic but also
send an SNMP trap to advise that a violation has taken place.
Command: show monitor session all
Description:
This command shows which interfaces have been placed into monitor (SPAN) mode for the
purpose of replicating packets from another interface or group of interfaces.
A computer running packet capturing software such as Wireshark can be connected to the
monitor port and capture the traffic that has been replicated for analysis.
Further Related Commands:
show monitor session remote
show monitor session local
Command: show interfaces status
Description:
This command is useful for quickly displaying the current status of all the interfaces on the
switch. The output shows one line for each interface and displays the following information:
Interface number – Gi1/0/1, Te2/0/1, Po1 etc
Description – description configured on the interface
Status – connected / not connected / disabled / err-disabled
Vlan – Vlan number or Trunk
Duplex – full / half / auto
Speed – current speed configured on the interface
Type – Capabilities of the interface, copper or fibre.
Further Related Commands:
show interface status err-disabled
show interface status inactive
show interface status vlan
Command: show interfaces switchport
Description:
The show interfaces switchport displays a lot of information about every physical interface
on a switch. The size of the output will depend on how many physical interfaces the switch
has.
Name: Gi1/0/33
Switchport: Enabled –The Interface is a switching interface or a routed port
Administrative Mode: static access – The port type is access, trunk or disabled
Operational Mode: static access – The port is up or down
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off – Interface will not automatically negotiate as a trunk
Access Mode VLAN: 50 (VLAN_OFFICE) – What Vlan the interface is in
Trunking Native Mode VLAN: 1 (default) – native Vlan if configured as a Trunk port.
Administrative Native VLAN tagging: disabled
Voice VLAN: none – What vlan has been configured for Cisco IP Phone, if any.
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings: none
Operational private-vlan: none – If the interface is a part of a private Vlan
Trunking VLANs Enabled: ALL – Which vlans are allowed if configured as a Trunk port
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
Capture VLANs Allowed: ALL
Protected: false – is port security enabled on the switchport
Command: show interfaces trunk
Description:
The show interfaces trunk command lists all interfaces that are configured as a Trunk port
and which Native vlan has been set for each Trunk.
The command also lists which Vlans are allowed to travel over the trunk. This command is
useful for trouble shooting trunking problems such as Native Vlan mismatches or for
troubleshooting when certain traffic is not reaching the other side of the Trunk connection
which could be caused by a Vlan being missed off of the allowed Vlan list for the Trunk.
More Cisco Configuration Guides Below
https://www.networkstraining.com/

More Related Content

What's hot

Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet3Anetwork com
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)DH Da Lat
 
Example for configuring local attack defense
Example for configuring local attack defenseExample for configuring local attack defense
Example for configuring local attack defenseHuanetwork
 
IDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6A
IDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6AIDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6A
IDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6ABeeteco
 
10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOsNhóc Nhóc
 
Ciso 4 ospf
Ciso 4 ospfCiso 4 ospf
Ciso 4 ospfmyciokas
 
Juniper Trouble Shooting
Juniper Trouble ShootingJuniper Trouble Shooting
Juniper Trouble ShootingMike(Haobin) Zheng
 
Day 5.3 routercomponents
Day 5.3 routercomponentsDay 5.3 routercomponents
Day 5.3 routercomponentsCYBERINTELLIGENTS
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOSanilinvns
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionIPMAX s.r.l.
 
Command reference (nNEtetwork management)
Command reference (nNEtetwork management)Command reference (nNEtetwork management)
Command reference (nNEtetwork management)prachandra
 
Ciso ospf
Ciso ospfCiso ospf
Ciso ospfmyciokas
 
How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchIT Tech
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotiklouisraj
 
How to recover the password for cisco 2900 integrated services router
How to recover the password for cisco 2900 integrated services routerHow to recover the password for cisco 2900 integrated services router
How to recover the password for cisco 2900 integrated services router3Anetwork com
 
Password Recovery
Password RecoveryPassword Recovery
Password RecoveryKishore Kumar
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A RouterNghiep Lam
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4VISHNU N
 

What's hot (20)

Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
 
Example for configuring local attack defense
Example for configuring local attack defenseExample for configuring local attack defense
Example for configuring local attack defense
 
IDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6A
IDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6AIDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6A
IDEC thay thế PLC dòng FC4A, FC5A bằng dòng PLC mới FC6A
 
1
11
1
 
10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs10 Command Line quan trọng để giao tiếp với Cisco IOs
10 Command Line quan trọng để giao tiếp với Cisco IOs
 
Ciso 4 ospf
Ciso 4 ospfCiso 4 ospf
Ciso 4 ospf
 
Juniper Trouble Shooting
Juniper Trouble ShootingJuniper Trouble Shooting
Juniper Trouble Shooting
 
Day 5.3 routercomponents
Day 5.3 routercomponentsDay 5.3 routercomponents
Day 5.3 routercomponents
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOS
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
 
Command reference (nNEtetwork management)
Command reference (nNEtetwork management)Command reference (nNEtetwork management)
Command reference (nNEtetwork management)
 
Ciso ospf
Ciso ospfCiso ospf
Ciso ospf
 
How to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switchHow to create and delete vlan on cisco catalyst switch
How to create and delete vlan on cisco catalyst switch
 
Nat mikrotik
Nat mikrotikNat mikrotik
Nat mikrotik
 
How to recover the password for cisco 2900 integrated services router
How to recover the password for cisco 2900 integrated services routerHow to recover the password for cisco 2900 integrated services router
How to recover the password for cisco 2900 integrated services router
 
Password Recovery
Password RecoveryPassword Recovery
Password Recovery
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
 
CCNA ppt Day 4
CCNA ppt Day 4CCNA ppt Day 4
CCNA ppt Day 4
 

Similar to Important cisco-chow-commands

CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMHamesKellor
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxgalerussel59292
 
Detailed explanation of Basic router configuration
Detailed explanation of Basic router configurationDetailed explanation of Basic router configuration
Detailed explanation of Basic router configurationsamreenghauri786
 
CCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptxCCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptxSanathKumarV3
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorialIT Tech
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...abdenour boussioud
 
Cisco data center support
Cisco data center supportCisco data center support
Cisco data center supportKrunal Shah
 
Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8Kaan Aslandağ
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of RouterKishore Kumar
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of RouterKishore Kumar
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guidejww330015
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guideShathees Rao
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configurationIT Tech
 
Cisco labs practical6
Cisco labs practical6Cisco labs practical6
Cisco labs practical6Tai Lam
 
(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...
(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...
(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...Lary Onyeka
 
04 module operating & configuring ios
04  module operating & configuring ios04  module operating & configuring ios
04 module operating & configuring iosAsif
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environmentscooby_doo
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2Jorgito Leal
 

Similar to Important cisco-chow-commands (20)

CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAMCMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
CMIT 350 FINAL EXAM CCNA CERTIFICATION PRACTICE EXAM
 
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docxAll contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
All contents are Copyright © 1992–2012 Cisco Systems, Inc. A.docx
 
Detailed explanation of Basic router configuration
Detailed explanation of Basic router configurationDetailed explanation of Basic router configuration
Detailed explanation of Basic router configuration
 
CCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptxCCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptx
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
 
Cisco data center support
Cisco data center supportCisco data center support
Cisco data center support
 
Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8Configuration Firewalld On CentOS 8
Configuration Firewalld On CentOS 8
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of Router
 
Initial Configuration of Router
Initial Configuration of RouterInitial Configuration of Router
Initial Configuration of Router
 
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference GuideAruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
 
lab1
lab1lab1
lab1
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configuration
 
Cisco labs practical6
Cisco labs practical6Cisco labs practical6
Cisco labs practical6
 
(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...
(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...
(2) documents e books_cisco_networking_books_training_materials_cnap_-_ont_v5...
 
04 module operating & configuring ios
04  module operating & configuring ios04  module operating & configuring ios
04 module operating & configuring ios
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
 
Exam viewer2
Exam viewer2Exam viewer2
Exam viewer2
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vĂĄzquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Important cisco-chow-commands

  • 1. Important Cisco Show Commands If you are a networking professional that is operating and supporting Cisco devices and networks, then learning some important “show commands” is essential. There are a few different categories of commands on Cisco devices. There are commands that configure the device to perform a certain function and also there are commands that extract information from the device and the whole network in general. Cisco “show commands” belong to the second category above. They are crucial when troubleshooting problems in the network or for displaying useful and critical information from the router or switch. In this article I have created the following Cisco Show Commands Cheat Sheet with brief description of the most important and most useful commands you will need as a Cisco Network Professional (both for IOS Routers and Switches). Important Show Commands for Cisco Routers Note that most of the commands below work both for Routers and Switches as well. Also, all of the commands below must be run from the “Privileged EXEC” mode which is denoted with a pound sign (#) such as: Router# Switch# To get into “Privileged EXEC” mode, connect to the device (e.g via console, SSH, Telnet) and use the enable command: Router> enable Router# Command: show running-config Description: This command will output all of the current configuration that is running in RAM memory of the device to the user’s terminal one page at a time. Pressing the enter key displays one line at a time and pressing the space bar displays one whole page at a time. To see the whole output at once use the command terminal length 0 before entering the show running-config command.
  • 2. Any passwords or shared keys are usually encrypted and therefore not visible in the output, however it is possible to show the plain text output of shared keys for RADIUS servers or VPN connections in the running-configuration by using the command more system:running-config. Further Related Commands: terminal length 0 more system:running-config Command: show startup-configuration Description: This command is the same as the above show running-configuration command except this will output the configuration that is stored in NVRAM. It is this configuration that is loaded into memory when the device is first booted. When changes are made to a device these changes are made to the running-configuration only and need to be written to memory before the changes are permanently made to the startup-configuration. This can be useful if a mistake is made in the running-configuration and you need to revert, you can either copy the startup-configuration back into running memory or you can pull the power and reload the device which will load the old configuration. Further Related Commands: copy running-configuration startup-configuration write mem or wr copy startup-configuration running-configuration Command: show version Description: This command shows a lot of useful outputs and will show different information depending on the device, model etc. The first few lines show which version of IOS software the device is running. Cisco IOS XE Software, Version 16.09.05 Cisco IOS Software [Fuji], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 16.9.5, RELEASE SOFTWARE (fc1) The next part of the output shows how long the device has been online for and the reason for the last reload. This can be useful to understand the reason for an unexpected reboot as a power cut will show as power failure.
  • 3. ASW_CORE_SWITCH_1 uptime is 2 weeks, 22 hours, 49 minutes Uptime for this control processor is 2 weeks, 22 hours, 51 minutes System returned to ROM by Power Failure or Unknown at 18:56:54 BST Fri Jul 10 2020 System restarted at 16:59:45 UTC Tue Dec 15 2020 System image file is "flash:packages.conf" Last reload reason: Power Failure or Unknown The next section shows the licence packages that are installed and in use. You can also see if Smart licensing is in use or if traditional right to use licensing is installed. Technology Package License Information: ------------------------------------------------------------------------------ Technology-package Technology-package Current Type Next reboot ------------------------------------------------------------------------------ lanbasek9 Smart License lanbasek9 None Subscription Smart License None Smart Licensing Status: REGISTERED/AUTHORIZED The next section details the amount of system memory the device has installed and the amount of DRAM or physical memory. You can also see how many physical interfaces the device has and of what type and also how many virtual interfaces are supported. cisco WS-C3650-12X48UQ (MIPS) processor (revision F0) with 832395K/6147K bytes of memory. Processor board ID FDXX32BAXXF 20 Virtual Ethernet interfaces 36 Gigabit Ethernet interfaces 16 Ten Gigabit Ethernet interfaces 2048K bytes of non-volatile configuration memory. 4194304K bytes of physical memory. 253984K bytes of Crash Files at crashinfo:. 3334464K bytes of Flash at flash:. 0K bytes of WebUI ODM Files at webui:. The final section shows the physical mac address of the device, the model of the device and importantly the system serial number. This is essential if you need the serial number to raise a Cisco Support Case and the device is in a remote datacentre or in a heavily populated rack where the underside of the device is not visible. The last part of this section is more important for layer 3 switches as this will show you if the switch is a part of a stack, how many switches make up the stack and what version of IOS each switch in the stack is running. Base Ethernet MAC Address : b4:f7:d7:e1:5d:00 Motherboard Assembly Number : 73-xxxx75-04
  • 4. Motherboard Serial Number : FDO2XXXXXX Model Revision Number : F0 Motherboard Revision Number : B0 Model Number : WS-C3650-12X48UQ System Serial Number : FDO2XXXXX Switch Ports Model SW Version SW Image Mode ------ ----- ----- ---------- ---------- ---- * 1 52 WS-C3650-12X48UQ 16.9.5 CAT3K_CAA-UNIVERSALK9 INSTALL Command: show ip route Description: The show ip route command displays the IPv4 routing table containing all of the routes which are known by the router. This output will display the gateway of last resort and any static routes that have been manually configured or any dynamic routes learned from a routing protocol. The letter in the left-hand column tells you how the route was learned by the routing table and there is a key for each letter listed at the top. For example, the letter D tells you that this particular route was learned by EIGRP which is a dynamic routing protocol. It is possible for the router to hold more than one Routing table, these are known as VRF’s (virtual routing and forwarding). You can display the routing table for each VRF by using the command show ip route vrf followed by the VRF number. If the routing table is particularly large you can just display the static routes or just the routes learned by a particular protocol. Further Related Commands: show ip route vrf 1 show ip route static show ip route eigrp
  • 5. Command: show ipv6 route Description: This command shows a similar output to show ip route except the routes shown in this table are for IP version 6. Further Related Commands: show ipv6 route summary show ipv6 route static show ipv6 route eigrp Command: show interfaces Description: The output from this command shows statistics from every physical and logical interface and can be quite long as there is a lot of information to be displayed. GigabitEthernet1/0/6 is up, line protocol is up (connected) The above line shows the interface is physically connected and is Administratively up. If there is a cable plugged into the interface and it shows not connected the cable should be replaced. Line protocol that shows disabled means the interface is in a shutdown state and err-disabled shows a port security violation. Hardware is Gigabit Ethernet, address is c4f7.d5e1.3d06 (bia c4f7.d5e1.3d06) Description: SWITCH1 MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 The above shows bandwidth of the interface and the txload / rxload shows how busy the interface is; 255/255 would show an interface that is running at maximum and is congested. Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 1000Mb/s, media type is 10/100/1000BaseTX If the above line shows half-duplex then this would signify a configuration problem with the duplex settings at one or both ends of the link. input flow-control is on, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:00, output 00:00:00, output hang never Last clearing of "show interface" counters never
  • 6. Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0 Output drops are caused by QOS buffers overflowing and would suggest that the interface is congested. Queueing strategy: Class-based queueing Output queue: 0/40 (size/max) 5 minute input rate 632000 bits/sec, 547 packets/sec 5 minute output rate 1057000 bits/sec, 782 packets/sec Input and output rates will increase if traffic is passing over the interface. 785945926 packets input, 126175928146 bytes, 0 no buffer Received 16514320 broadcasts (11199427 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 11199456 multicast, 0 pause input 0 input packets with dribble condition detected 1107697383 packets output, 224583269918 bytes, 0 underruns 0 output errors, 0 collisions, 2 interface resets 0 unknown protocol drops 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 pause output 0 output buffer failures, 0 output buffers swapped out Input errors, CRC errors should not increase if they do this would highlight a problem with the cabling which should be replaced. Use the clear counters command then wait 5 minutes and show interfaces again. If the counter increases replace the cable. Further Related Commands: clear counters
  • 7. Command: show interfaces gigabitEthernet 0/0 Description: The output from this command is the same as show interfaces except it only shows the statistics of the stated interface. Further Related Commands: show interfaces TenGigabitEthernet 0/0 summary show interfaces FastEthernet 1/0/1 status show interfaces gigabitEthernet 2/0/1 transceiver Command: show ip interface brief Description: This command lists a condensed one line for each logical and physical interface. Each line displays the interface, configured IP address, link status up/down and Administrative status up/down. You can condense this further by just stating the output of one particular interface or Vlan SVI. Further Related Commands: show ip interface brief vlan 10 show ip interface TenGigabitEthernet 0/0 Command: show ipv6 interface brief Description: This command is similar to above except this shows any interfaces that have IP version 6 addresses configured on them. Further Related Commands: show ipv6 interface brief vlan 10 Command: show cdp neighbors Description: By default, the Cisco Discovery Protocol (CDP) is enabled on all Cisco devices but for security this protocol is sometimes manually disabled. The command cdp run will re-enable this protocol. Show cdp neighbors displays summary details about any directly connected cisco devices such as the device Hostname, which interface on the local switch its connected to, what the
  • 8. device is (Router/switch/phone…. ), the device model and finally which interface on the remote device this router is connected to. The command show cdp neighbors detail supplies further information such as the remote devices IP address, which is useful for remotely connecting to the device and the version of IOS that the device is running. Further Related Commands: show cdp neighbors detail Command: show clock Description: This command simply shows the current time configured on the device in hours, minutes and seconds. It also shows the current time zone and date in the format – Wed Feb 11 2020 Further Related Commands: show clock detail Command: show ntp status Description: Network Time Protocol is used to automatically synchronize the devices internal clock with an NTP server. The NTP server can be another device such as the core switch or there are public NTP servers on the internet that can be used for time synchronization. The show ntp status command shows whether NTP is configured and synchronised and shows the stratum level. The stratum level shows how far away this device is from the reference clock and therefore how accurate the time is. A stratum level of 2 would be considered as a directly connected peer and the maximum stratum level is 16. Further Related Commands: show ntp associations show ntp information
  • 9. Command: show Flash: Description: This command will list all of the files which are stored in NVRAM and how much space in bytes is left in flash memory for additional files to be added. This is the location where files such as the router IOS firmware can be found. There can be more than one flash file system on a Router, these can be listed using the command show file systems. Further Related Commands: show file systems show flash1: show usb0: Command: show history Description: The show history command lists all the previous commands that have been entered in the terminal window during the session. When the terminal session is closed the history is removed. Command: show logging Description: The show logging command lists the log messages that have been stored in the devices log file. The amount of information that is collected here depends on the logging level and the size of the configuration buffer that has been configured on the device. The logging levels are as follows: • 0 —emergency: System unusable • 1 —alert: Immediate action needed • 2 —critical: Critical condition—default level • 3 —error: Error condition • 4 —warning: Warning condition • 5 —notification: Normal but significant condition • 6 —informational: Informational message only • 7 —debugging: Appears during debugging only A configured logging level of 5 would log all conditions with the number of 5 or lower so informational or debugging messages would not be logged. If the logs are large you can search for a specific date by adding the pipe | symbol and the include keyword as shown below.
  • 10. Further Related Commands: show logging | include Dec 24 show logging | begin Dec 24 Command: show protocols Description: This command lists all the interfaces and whether the line protocol is up or down. It also shows which protocol is in use on the device such as IP. The command show ip protocols is useful for showing which IP routing protocols are active on the router such as RIP, EIGRP or OSPF. Further Related Commands: show ip protocols Command: show users Description: This command shows which users are currently logged into the device and whether they are logged in remotely through a VTY line or directly connected through the console port. Further Related Commands: show users all Command: show access-lists Description: The show access-lists command displays all Access Lists that have been configured on the device. It shows Standard IPv4 access lists first, followed by Extended IPv4 access lists and ending with IPv6 access lists. The output from specific access lists can be displayed by adding the access list name or number at the end of the show access-list command as shown below. Further Related Commands: show access-list SNMP_ACL show access-list 10
  • 11. Command: show ip dhcp binding Description: This command is applicable to switches or routers which are acting as DHCP servers for the network segment. When an IP address is leased by the device this leased address is placed into a DHCP bindings table which shows the mac address of the device that is tied to the leased IP address. The DHCP bindings table also shows when the lease is due to expire. A specific address binding can be displayed by adding the required ip address to the end of the show ip dhcp bindings command. If a device on the network has been manually configured with an IP address in the same subnet as the DHCP pool this can cause an address conflict. The command show ip dhcp conflict will show any conflicting IP addresses and show ip arp will show which mac addresses have been given the duplicate address. The show ip dhcp snooping command shows which interfaces are trusted or untrusted for communication to the DHCP server if dhcp snooping has been enabled on the switch or router. Further Related Commands: show ip dhcp binding 10.0.0.10 show ip dhcp conflict show ip dhcp snooping show ip arp show ip arp | include 10.0.0.10 Command: show ip dhcp pool Description: This command displays all of the different configured pools of IP address ranges that have been allocated for lease by the device for DHCP purposes. The statistics from each pool show how much of the pool has been utilized, the total number of available addresses in the pool, how many IP addresses have been leased, the next address that will be leased from the pool and finally the start and end IP addresses of the subnet range that is used in the DHCP pool.
  • 12. Command: show ip eigrp neighbors Description: This command displays all router adjacencies that have been dynamically discovered by the Enhanced Interior Gateway Routing Protocol (EIGRP). The output table shows the IP address of the connected neighbouring Router, which interface on the local router the advertisements were received on and the time left on the hold timer of each neighbour. Command: show ip ospf neighbor Description: The output table displayed by this command shows neighbour Router adjacencies that have been discovered by the Open Shortest Path First protocol (OSPF). The table shows the ID of the neighbour which is usually a logical loopback address that is configured on each router. The priority of the Router, with the highest priority being assigned to the Designated Router (DR). The state of the relationship which should be Full, any other state would suggest that the connection between these neighbours has been disrupted and the process for forming adjacencies has been restarted. Next to this is the Router designation of DR, BDR (backup designated router) or DROTHER for all non-designated routers. The next column shows the Dead Time which is how long the Router will wait to receive a keep alive before declaring the connection is down. The next column is the Address field which shows the IP address of the interface to which this neighbor is directly connected and finally the interface field shows the interface on the local router where the neighbour adjacency has been formed. The command show ip ospf interface gi 1/0/1 is useful for troubleshooting mismatches between the hello, dead and wait timers. Further Related Commands: show ip ospf interface gi 1/0/1
  • 13. Command: show ip nat translations Description: When a router is used to translate private IP address ranges to public IP addresses the command show ip nat translations is used to show which IP addresses are currently being translated by the router. Router# show ip nat translations Pro Inside global Inside local Outside local Outside global tcp 192.168.1.1:514 192.168.2.3:53 88.66.5.240:256. 88.66.5.240:256 tcp 192.168.1.1:513 192.168.2.2:53 88.66.5.240:256. 88.66.5.240:256 tcp 192.168.1.1:512 192.168.2.4:53 88.66.5.240:256. 88.66.5.240:256 Total number of translations: 3 The above table shows that there are 3 private IP addresses that are currently being translated to the Public Internet routable IP address of 88.66.5.240. Further Related Commands: show ip nat statistics Command: show standby Description: This command is used to show the status of the Hot Standby Router Protocol (HSRP) where one Router is active and passing traffic and another is on standby ready to take over the forwarding of traffic should the active router fail. Below is the output from the show standby command. R1#show standby Link connecting the active Router to the standby Router for Standby group 1. Ethernet0/0 - Group 1 Active state means HSRP is ready to fail over should the primary router fail. State is Active 2 state changes mean there have been two fail overs 2 state changes, last state change 00:01:37 The IP address that is shared between the two Routers. This is the gateway address that should be configured on the End Hosts. Virtual IP address is 10.1.1.100 Active virtual MAC address is 0000.0c07.ac01 Local virtual MAC address is 0000.0c07.ac01 (v1 default)
  • 14. Keep alives are sent every 3 seconds, if no hello packets are received in 10 seconds a state change occurs and the standby router takes over and becomes active. Hello time 3 sec, hold time 10 sec Next hello sent in 1.680 secs With pre-emption enabled should the primary router come back up HSRP will detect this and there will be another state change making the primary router active again. Preemption enabled The current router you are connected to is the Active router Active router is local The IP address of the Standby router Standby router is 10.1.1.2, priority 100 (expires in 10.320 sec) The configured Priority of the router, the highest priority makes the router the Active router. Priority 200 (configured 200) Group name is "hsrp-Et0/0-1" (default) Often traffic is load balanced over both the primary and secondary routers by creating a second standby group 2 and giving opposite priorities than were given to group 1. This will make the standby router in group 1 the active router in group 2 and vice versa. Further Related Commands: show standby brief Command: show tech-support Description: The show tech-support output is usually requested by Cisco Technical Assistance Center (TAC) when troubleshooting an issue with the device. The output is very long and should be output to a file where possible as copying and pasting from the screen can be difficult due to the amount of output. This can be done through the settings of the terminal program used to connect to the Router. The show tech-support command will display the output from many different Cisco show commands to gather the current configuration, version and model details and show the overall health of the Router.
  • 15. Command: show processes Description: The show processes command lists all of the services that are currently performing tasks using the Router’s CPU. The output provides information such as the Process ID, the priority of the process, how long the service has been running for, how many times the process has been run and the name of the process. The output also shows the CPU utilization for the intervals of 5 seconds, one minute and 5 minutes. This output can be seen in more detail by running the command show processes cpu history which displays the CPU history as a graph. The history is also shown over the longer intervals of 60 seconds, 60 minutes and 72 hours. These outputs can be useful for troubleshooting intermittent performance problems as it will show any periods where the CPU has reached 100%. Further Related Commands: show processes cpu history Important Show Commands for Cisco Switches Command: show mac address-table Description: This command lists all of the mac addresses that have been learned by the switch. It lists the Vlan associated to each mac address and the interface from which the mac address was learned. Multiple Mac addresses learned from the same interface would indicate that the interface is a trunk interface that is most likely connected to another switch. You can find a where a specific device is located by searching the mac address table with the last few digits of the devices mac address or you can find what mac address is on a specific interface. Further Related Commands: show mac address-table | include b34a show mac address-table interface gi 1/0/1 show mac address-table vlan 10
  • 16. Command: show spanning tree summary Description: The output from this command will show you information on the spanning tree protocol that is running on the switch. The output seen may be slightly different depending on the version of spanning tree protocol that is running on the switch. The output shown below is from a switch running Rapid Per Vlan Spanning Tree (RPVST). The output shows which version of spanning tree is running and whether options such as BPDU Guard have been globally enabled on the switch. The table shows the number of interfaces that are in a forwarding or blocking state for each vlan. For information on which ports are in a blocking state for each vlan use the command show spanning-tree detail. Switch is in rapid-pvst mode Root bridge for: none EtherChannel misconfig guard is enabled Extended system ID is enabled Portfast Default is disabled PortFast BPDU Guard Default is enabled Portfast BPDU Filter Default is disabled Loopguard Default is enabled UplinkFast is disabled BackboneFast is disabled Configured Pathcost method used is short Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0010 0 0 0 23 23 VLAN0020 0 0 0 24 24 VLAN0030 0 0 0 23 23 VLAN0031 0 0 0 23 23 VLAN0040 0 0 0 23 23 VLAN0041 0 0 0 23 23
  • 17. VLAN0050 0 0 0 24 24 VLAN0052 0 0 0 23 23 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0053 0 0 0 23 23 VLAN0054 0 0 0 23 23 VLAN0062 0 0 0 24 24 VLAN0063 0 0 0 23 23 VLAN0065 0 0 0 26 26 VLAN0066 0 0 0 25 25 VLAN0069 0 0 0 24 24 VLAN0070 0 0 0 23 23 VLAN0073 0 0 0 1 1 VLAN0074 0 0 0 1 1 VLAN0100 0 0 0 23 23 VLAN0317 0 0 0 23 23 ---------------------- -------- --------- -------- ---------- ---------- 20 vlans 0 0 0 425 425 Further Related Commands: show spanning tree detail show spanning-tree root show spanning-tree blockedports Command: show etherchannel Description: The output from this command shows information on each link aggregation Channel-Group configured on the switch. The output from this command will show how many interfaces have been bundled to form the Etherchannel and what Etherchannel protocol is being used in each channel group such as LACP or PaGP. To troubleshoot Etherchannels use the command show etherchannel summary as this output details which interfaces have been bundled into a port-channel and will show any links within the Etherchannel that are in a suspended state.
  • 18. Further Related Commands: show etherchannel summary show etherchannel detail Command: show vlan Description: This command shows the vlan database and all the Vlans that have been configured on the switch. The output table shows the Vlan number, the Vlan name, whether the Vlan is active and which interfaces are configured as an Access port in a particular Vlan. It is important to remember that a Vlan will not become active until at least one interface is in an up and connected state in that Vlan. Further Related Commands: show vlan summary show vlan brief Command: show vtp status Description: This command shows the status of the Vlan Trunking Protocol which is a method that switches use to sync their Vlan databases. The output from this command shows the following details: VTP Version – 1 or 2 Configuration revision – A higher revision will take priority over a lower revision. Maximum supported Vlans – 1005 VTP Operating Mode – Client, Server or Transparent. VTP Domain – All switches configured with the same domain name will sync databases. VTP Pruning Mode – Enabled or disabled VTP V2 Mode – Enabled or disabled VTP Traps generation – Enabled or disabled By default, all devices are configured with VTP server mode enabled. In server mode the Switch will advertise any changes that are made to its Vlan database to all other switches that are configured with the same VTP domain. A Switch configured with VTP Client mode will listen for VTP server advertisements and make changes to its Vlan Database based on the received Advertisement. You cannot make changes to any Vlan such as adding or deleting Vlans on a switch that is configured as a VTP client.
  • 19. A Switch configured with VTP mode Transparent does not participate in VTP and as such will not make changes to its Vlan database if it receives VTP advertisements, but it will forward these advertisements to other connected switches. Command: show port-security Description: This command will display a table showing all the interfaces that have been configured to use port security. The table shows how many Mac Addresses are allowed on an interface before a violation occurs and what action will be taken in the event of a security violation. The actions that can be taken are shutdown the interface, restrict the interface by dropping traffic from the offending Mac address and restrict the interface by dropping traffic but also send an SNMP trap to advise that a violation has taken place. Command: show monitor session all Description: This command shows which interfaces have been placed into monitor (SPAN) mode for the purpose of replicating packets from another interface or group of interfaces. A computer running packet capturing software such as Wireshark can be connected to the monitor port and capture the traffic that has been replicated for analysis. Further Related Commands: show monitor session remote show monitor session local Command: show interfaces status Description: This command is useful for quickly displaying the current status of all the interfaces on the switch. The output shows one line for each interface and displays the following information: Interface number – Gi1/0/1, Te2/0/1, Po1 etc Description – description configured on the interface Status – connected / not connected / disabled / err-disabled Vlan – Vlan number or Trunk Duplex – full / half / auto Speed – current speed configured on the interface Type – Capabilities of the interface, copper or fibre.
  • 20. Further Related Commands: show interface status err-disabled show interface status inactive show interface status vlan Command: show interfaces switchport Description: The show interfaces switchport displays a lot of information about every physical interface on a switch. The size of the output will depend on how many physical interfaces the switch has. Name: Gi1/0/33 Switchport: Enabled –The Interface is a switching interface or a routed port Administrative Mode: static access – The port type is access, trunk or disabled Operational Mode: static access – The port is up or down Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: native Negotiation of Trunking: Off – Interface will not automatically negotiate as a trunk Access Mode VLAN: 50 (VLAN_OFFICE) – What Vlan the interface is in Trunking Native Mode VLAN: 1 (default) – native Vlan if configured as a Trunk port. Administrative Native VLAN tagging: disabled Voice VLAN: none – What vlan has been configured for Cisco IP Phone, if any. Administrative private-vlan host-association: none Administrative private-vlan mapping: none Administrative private-vlan trunk native VLAN: none Administrative private-vlan trunk Native VLAN tagging: enabled Administrative private-vlan trunk encapsulation: dot1q Administrative private-vlan trunk normal VLANs: none Administrative private-vlan trunk associations: none Administrative private-vlan trunk mappings: none Operational private-vlan: none – If the interface is a part of a private Vlan Trunking VLANs Enabled: ALL – Which vlans are allowed if configured as a Trunk port Pruning VLANs Enabled: 2-1001 Capture Mode Disabled Capture VLANs Allowed: ALL Protected: false – is port security enabled on the switchport
  • 21. Command: show interfaces trunk Description: The show interfaces trunk command lists all interfaces that are configured as a Trunk port and which Native vlan has been set for each Trunk. The command also lists which Vlans are allowed to travel over the trunk. This command is useful for trouble shooting trunking problems such as Native Vlan mismatches or for troubleshooting when certain traffic is not reaching the other side of the Trunk connection which could be caused by a Vlan being missed off of the allowed Vlan list for the Trunk. More Cisco Configuration Guides Below https://www.networkstraining.com/