To enable Dynamic Host Configuration Protocol (DHCP) accounting, use the accountingcommand in DHCP pool configuration mode. To disable DHCP accounting for the specified server group, use the no form of this command.
accountingserver-group-name
noaccountingserver-group-name
Syntax Description
server-group-name
Name of a server group to apply DHCP accounting.
The server group can have one or more members. The server group is defined in the configuration of the aaagroupserver and aaaaccounting commands.
Command Default
DHCP accounting is not enabled by default.
Command Modes
DHCP pool configuration (dhcp-config)
Command History
Release
Modification
12.2(15)T
This command was introduced.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
15.0(1)S
This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
The accountingcommand is used to enable the DHCP accounting feature by sending secure DHCP START accounting messages when IP addresses are assigned to DHCP clients, and secure DHCP STOP accounting messages when DHCP leases are terminated. A DHCP lease is terminated when the client explicitly releases the lease, when the session times out, and when the DHCP bindings are cleared from the DHCP database. DHCP accounting is configured on a per-client or per-lease basis. Separate DHCP accounting processes can be configured on a per-pool basis.
The accountingcommand can be used only to network pools in which bindings are created automatically and destroyed upon lease termination (or when the client sends a DHCP RELEASE message). DHCP bindings are also destroyed when theclearipdhcpbinding or noservicedhcp command is issued. These commands should be used with caution if an address pool is configured with DHCP accounting.
Authentication, authorization, and accounting (AAA) and RADIUS must be configured before this command can be used to enable DHCP accounting. A server group must be defined with the aaagroupserver command. START and STOP message generation is configured with the aaaaccountingcommand. The aaaaccountingcommand can be configured to enable the DHCP accounting to send both START and STOP messages or STOP messages only.
Examples
The following example shows how to configure DHCP accounting start and stop messages to be sent if RADIUS-GROUP1 is configured as a start-stop group. Stop messages will be sent only if RADIUS-GROUP1 is configured as a stop-only group.
Router(config)# ip dhcp pool pool1
Router(dhcp-config)# accounting group1
Related Commands
Command
Description
aaaaccounting
Enables AAA accounting of requested services for billing or security purposes when you use RADIUS or TACACS+.
aaagroupserver
Groups different server hosts into distinct lists and distinct methods.
aaanew-model
Enables the AAA access control model.
aaasession-id
Specifies whether the same session ID will be used for each AAA accounting service type within a call or whether a different session ID will be assigned to each accounting service type.
cleararp-cache
Deletes all dynamic entries from the ARP cache.
clearipdhcpbinding
Deletes an automatic address binding from the Cisco IOS DHCP server database.
ipdhcppool
Configures a DHCP address pool on a Cisco IOS DHCP server and enters DHCP pool configuration mode.
ipradiussource-interface
Forces RADIUS to use the IP address of a specified interface for all outgoing RADIUS packets.
radius-serverhost
Specifies a RADIUS server host.
radius-serverretransmit
Specifies the number of times that Cisco IOS will look for RADIUS server hosts.
servicedhcp
Enables the Cisco IOS DHCP server and relay agent features.
showipdhcpbinding
Displays address bindings on the Cisco IOS DHCP server.
showipdhcpserverstatistics
Displays Cisco IOS DHCP server statistics.
updatearp
Secures the MAC address of the authorized client interface to the DHCP binding.
address client-id
To reserve an IP address for a Dynamic Host Configuration Protocol (DHCP) client identified by a client identifier, use the
addressclient-id command in DHCP pool configuration mode. To remove the reserved address, use the
no form of this command.
addressip-addressclient-idstring [ascii]
noaddressip-address
Syntax Description
ip-address
IP address reserved for the client.
string
A unique ASCII string or hexadecimal string.
ascii
(Optional) Specifies that the client ID is in ASCII string form.
Command Default
IP addresses are not reserved.
Command Modes
DCHP pool configuration (dhcp-config)
Command History
Release
Modification
12.2(46)SE
This command was introduced.
12.2(33)SXI4
This command was integrated into Cisco IOS Release 12.2(33)SXI4.
Usage Guidelines
The
addressclient-id command can be used to create reserved addresses in pools for any DHCP client identified by the client identifier option in the DHCP packet. You can also reserve an IP address for a DHCP client that is configured to use the port-based address allocation feature. For port-based address allocation, the
string argument must be the short name of the interface (port) and the
ascii keyword must be specified.
Examples
In the following example, a subscriber ID will be automatically generated based on the short name of the interface (port) specified by the
addressclient-idcommand. The DHCP server will ignore any client identifier fields in the DHCP messages and use this subscriber ID as the client identifier. The DHCP client is preassigned IP address 10.1.1.7.
Router(config)# ip dhcp use subscriber-id client-id
Router(config)# ip dhcp subscriber-id interface-name
Router(config)# ip dhcp excluded-address 10.1.1.1 10.1.1.3
Router(config)# ip dhcp pool dhcppool
Router(dhcp-config)# network 10.1.1.0 255.255.255.0
Router(dhcp-config)# address 10.1.1.7 client-id ethernet 1/0 ascii
Related Commands
Command
Description
addresshardwareaddress
Reserves an IP address for a client identified by hardware address.
address hardware-address
To reserve an IP address for a client identified by hardware address, use the addresshardware-address command in DHCP pool configuration mode. To remove the reserved address, use the no form of this command.
(Optional) Address Resolution Protocol (ARP) hardware specified in an online database at http://www.iana.org/assignments/arp-parameters. The range is from 0 to 255.
Command Default
IP addresses are not reserved.
Command Modes
DHCP pool configuration (dhcp-config)
Command History
Release
Modification
12.2(46)SE
This command was introduced.
12.2(33)SXI4
This command was integrated into Cisco IOS Release 12.2(33)SXI4.
Usage Guidelines
This command is used to reserve an IP address for clients identified by the hardware address included in the fixed-size header of the Dynamic Host Configuration Protocol (DHCP) message.
Examples
In the following example, an IP address is reserved for a client that is identified by its hardware address:
Router(config)# ip dhcp pool dhcppool
Router(dhcp-config)# address 10.10.10.3 hardware-address b708.1388.f166
Related Commands
Command
Description
addressclient-id
Reserves an IP address for a DHCP client identified by the client identifier.
address range
To set an address range for a Dynamic Host Configuration Protocol (DHCP) class in a DHCP server address pool, use the addressrangecommand in DHCP pool class configuration mode. To remove the address range, use the no form of this command.
addressrangestart-ipend-ip
noaddressrangestart-ipend-ip
Syntax Description
start-ip
Starting IP address that defines the range of addresses in the address pool.
end-ip
Ending IP address that defines the range of addresses in the address pool.
Command Default
No DHCP address range is set.
Command Modes
DHCP pool class configuration (config-dhcp-pool-class)
Command History
Release
Modification
12.2(13)ZH
This command was introduced.
12.3(4)T
This command was integrated into Cisco IOS Release 12.3(4)T.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
15.0(1)S
This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
If theaddressrange command is not configured for a DHCP class in a DHCP server address pool, the default value is the entire subnet of the address pool.
Examples
The following example shows how to set the available address range for class 1 from 10.0.20.1 through 10.0.20.100:
Router(config)# ip dhcp pool pool1
Router(dhcp-config)# network 10.0.20.0 255.255.255.0
Router(dhcp-config)# class class1
Router(config-dhcp-pool-class)# address range 10.0.20.1 10.0.20.100
Related Commands
Command
Description
ipdhcpclass
Defines a DHCP class and enters DHCP class configuration mode.
application redundancy
To enter redundancy application configuration mode, use the applicationredundancy command in redundancy configuration mode.
applicationredundancy
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Redundancy configuration (config-red)
Command History
Release
Modification
Cisco IOS XE Release 3.1S
This command was introduced.
Examples
The following example shows how to enter redundancy application configuration mode:
Enters redundancy application group configuration mode.
arp (global)
To add a permanent entry in the Address Resolution Protocol (ARP) cache, use the arp command in global configuration mode. To remove an entry from the ARP cache, use the no form of this command.
IP address in four-part dotted decimal format corresponding to the local data-link address.
vrfvrf-name
Virtual routing and forwarding (VRF) instance. The vrf-name argument is the name of the VRF table.
access-list
Specifies the named access-list.
name
Access-list name.
clear
Clears ARP command parameter.
retry
Specifies the number of retries.
count
Retry attempts. The range is from 1 to 50.
hardware-address
Local data-link address (a 48-bit address).
encap-type
Encapsulation description. The keywords are as follows:
arpa--For Ethernet interfaces.
sap--For Hewlett Packard interfaces.
smds--For Switched Multimegabit Data Service (SMDS) interfaces.
snap--For FDDI and Token Ring interfaces.
srp-a--Switch Route Processor, side A (SRP-A) interfaces.
srp-b--Switch Route Processor, side B (SRP-B) interfaces.
interface-type
(Optional) Interface type. For more information, use the question mark (?) online help. The keywords are as follows:
ethernet--IEEE 802.3 interface.
loopback--Loopback interface.
null--No interface.
serial--Serial interface.
alias
Responds to ARP requests for the IP address.
Command Default
No entries are permanently installed in the ARP cache.
Command Modes
Global configuration (config)
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.1
This command was integrated into Cisco IOS XE Release 2.1.
12.2(33)SXI
This command was modified in a release earlier than Cisco IOS Release 12.2(33)SXI. The clear and retry keywords were added. Thecount argument was added.
Usage Guidelines
The Cisco IOS software uses ARP cache entries to translate 32-bit IP addresses into 48-bit hardware addresses.
Because most hosts support dynamic resolution, you generally need not specify static ARP cache entries.
To remove all nonstatic entries from the ARP cache, use the cleararp-cacheprivileged EXEC command.
Examples
The following is an example of a static ARP entry for a typical Ethernet host:
arp 10.31.7.19 0800.0900.1834 arpa
Related Commands
Command
Description
cleararp-cache
Deletes all dynamic entries from the ARP cache.
arp (interface)
To support a type of encapsulation for a specific network, such as Ethernet, Fiber Distributed Data Interface (FDDI), Frame Relay, and Token Ring, so that the 48-bit Media Access Control (MAC) address can be matched to a corresponding 32-bit IP address for address resolution, use the arp command in interface configuration mode. To disable an encapsulation type, use the no form of this command.
arp
{arpa | frame-relay | snap}
noarp
{arpa | frame-relay | snap}
Syntax Description
arpa
Standard Ethernet-style Address Resolution Protocol (ARP) (
RFC 826).
frame-relay
Enables ARP over a Frame Relay encapsulated interface.
snap
ARP packets conforming to
RFC 1042.
Command Default
Standard Ethernet-style ARP
Command Modes
Interface configuration
Command History
Release
Modification
10.0
This command was introduced.
12.2(13)T
The probe keyword was removed because the HP Probe feature is no longer available in Cisco IOS software.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
12.0(33)S
Support for IPv6 was added. This command was implemented on the Cisco 12000 series routers.
Usage Guidelines
Unlike most commands that have multiple arguments, the arp command has arguments that are not mutually exclusive. Each command enables or disables a specific type of encapsulation.
Given a network protocol address (IP address), the arpframe-relay command determines the corresponding hardware address, which would be a data-link connection identifier (DLCI) for Frame Relay.
The showinterfaces command displays the type of encapsulation being used on a particular interface. To remove all nonstatic entries from the ARP cache, use the cleararp-cache command.
Examples
The following example enables Frame Relay services:
interface ethernet 0
arp frame-relay
Related Commands
Command
Description
cleararp-cache
Deletes all dynamic entries from the ARP cache.
showinterfaces
Displays statistics for all interfaces configured on the router or access server.
arp access-list
To configure an Address Resolution Protocol access control list (ARP ACL) for ARP inspection and QoS filtering and enter the ARP ACL configuration submode, use the
arpaccess-list command in global configuration mode. To remove the ARP ACL, use the
no form of this command.
arpaccess-listname
noarpaccess-listname
Syntax Description
name
Name of the access list.
Command Default
This command has no default settings.
Command Modes
Global configuration
Command History
Release
Modification
12.2(18)SXD
Support for this command was introduced on the Supervisor Engine 720.
12.2(18)SXE
This command was changed to support DAI on the Supervisor Engine 720. See the âUsage Guidelinesâ section for the syntax description.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Usage Guidelines
Once you are in the ARP ACL configuration submode, you can add
permit or
deny clauses to permit or deny QoS to the flows. The following syntax is available in the ARP QoS ACL configuration submode for QoS filtering; all other configurations will be rejected at the time of the policy-map attachment to the interfaces:
{permit | deny}
ip
{any | hostsender-ip [sender-ip-mask] }
macany
no
{permit | deny}
ip
{any | hostsender-ip [sender-ip-mask] }
macany
permit
Specifies to apply QoS to the flows.
deny
Skips the QoS action that is configured for traffic matching this ACE.
ip
Specifies the IP ARP packets.
any
Specifies any IP ARP packets.
host
sender-ip
Specifies the IP address of the host sender.
sender-ip-mask
(Optional) Subnet mask of the host sender.
macany
Specifies MAC-layer ARP traffic.
no
Deletes an ACE from an ARP ACL.
Once you are in the ARP ACL configuration submode, the following configuration commands are available for ARP inspection:
default--Sets a command to its defaults. You can use the
deny and
permitkeywords and arguments to configure the default settings.
deny--Specifies the packets to reject.
exit--Exits the ACL configuration mode.
no--Negates a command or set its defaults.
permit-- Specifies the packets to forward.
You can enter the
permit or
deny keywords to configure the permit or deny clauses to forward or drop ARP packets based on some matching criteria. The syntax for the
permit and
deny keywords are as follows:
{permit | deny}
ip
{any | hostsender-ip [sender-ipsender-ip-mask] }
mac
{any | hostsender-mac [sender-mac-mask] }
[log]
If you enter the
ip keyword without the
request or
response keywords, the configuration applies to both requests and responses.
Once you define an ARP ACL, you can apply it to VLANs using the
iparpinspectionfilter command for ARP inspection.
Incoming ARP packets are compared against the ARP access list, and packets are permitted only if the access list permits them. If access lists deny packets because of explicit denies, they are dropped. If packets get denied because of the implicit deny, they are matched against the list of DHCP bindings, unless the access list is static or the packets are not compared against the bindings.
When a ARP access list is applied to a VLAN for dynamic ARP inspection, the ARP packets containing only IP-to-Ethernet MAC bindings are compared against the ACLs. All other type of packets are bridged in the incoming VLAN without any validation.
ACL entries are scanned in the order that you enter them. The first matching entry is used. To improve performance, place the most commonly used entries near the beginning of the ACL.
An implicit
denyipanymacany entry exists at the end of an ACL unless you include an explicit
permitipanymacany entry at the end of the list.
All new entries to an existing list are placed at the end of the list. You cannot add entries to the middle of a list.
Examples
This example shows how to create a new ARP ACL or enter the submode of an existing ARP ACL:
This example shows how to create an ARP ACL named arp_filtering that denies QoS but permits MAC-layer ARP traffic:
Router(config)# arp access-list arp_filtering
Router(config-arp-nacl)# permit ip host 10.1.1.1 mac any
Router(config-arp-nacl)# deny ip any mac any
Router(config-arp-nacl)#
Related Commands
Command
Description
show arp
Displays information about the ARP table.
arp authorized
To disable dynamic Address Resolution Protocol (ARP) learning on an interface, use the arpauthorized command in interface configuration mode. To reenable dynamic ARP learning, use the no form of this command.
arpauthorized
noarpauthorized
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values
Command Modes
Interface configuration
Command History
Release
Modification
12.3(4)T
This command was introduced.
Usage Guidelines
The arpauthorized command disables dynamic ARP learning on an interface. This command enhances security in public wireless LANs (PWLANs) by limiting the leasing of IP addresses to mobile users and authorized users. The mapping of IP address to MAC address for an interface can be installed only by the authorized subsystem. Unauthorized clients cannot respond to ARP requests.
If both static and authorized ARP are installing the same ARP entry, the static configuration overrides the authorized ARP entry. To install a static ARP entry use the arp (global) command. A nondynamic ARP entry can only be removed by using the same method by which it was installed.
The arpauthorized command can only be specified on Ethernet interfaces and for Dynamic Host Configuration Protocol (DHCP) networks.
Examples
The following example disables dynamic ARP learning on interface Ethernet 0:
interface Ethernet0
ip address 10.0.0.1 255.255.255.0
arp authorized
Related Commands
Command
Description
arp(global)
Adds a permanent entry in the ARP cache.
updatearp
Secures dynamic ARP entries in the ARP table to their corresponding DHCP bindings.
arp log threshold entries
To enable an Address Resolution Protocol (ARP) trap so that the ARP log is triggered when a specific number of dynamically learned entries is reached on the router interface, use the arplogthresholdentries command in interface configuration mode. To disable the ARP trap for the interface, use the no form of this command.
arplogthresholdentriesentry-count
noarplogthresholdentries
Syntax Description
entry-count
Triggers the ARP log service when the number of dynamically learned entries on the interface reaches this threshold. The range is from 1 to 2147483647.
Command Default
ARP trap is disabled for the interface.
Command Modes
Interface configuration
Command History
Release
Modification
12.4(11)T
This command was introduced.
12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(31)SB2.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
Usage Guidelines
This command enables an ARP trap for the router interface. When the number of dynamically learned entries on the interface exceeds the preconfigured amount, an ARP event message is written to system message logging (syslog) output.
A high number of learned entries on the interface might indicate anomalies such as an attempt to breach security through an ARP attack on the router. The threshold at which to configure the ARP log service trigger should be determined heuristically, based on the expected number of nodes the router will serve and the number of hosts on the interface.
To display information about the setting configured by the arplogthresholdentries command, use the showrunning-config command. If an ARP trap is enabled for a given interface, the information for that interface command includes the arplogthresholdentries command, followed by the threshold value.
To display the syslog history statistics and buffer contents, use the showlogging command.
Examples
The following example shows how to enable an ARP trap so that the ARP log is triggered when 50 dynamically learned entries is reached on the Ethernet interface at slot 2, port 1:
The following sample output from the showlogging command shows that the ARP trap entry was triggered when 50 dynamic ARP entries was reached on the Ethernet interface at slot 2, port 1:
Router# show logging
Syslog logging: enabled (0 messages dropped, 39 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
Console logging: disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level debugging, 309 messages logged, xml disabled,
filtering disabled
Exception Logging: size (8192 bytes)
Count and timestamp logging messages: disabled
Persistent logging: disabled
No active filter modules.
Trap logging: level informational, 312 message lines logged
Log Buffer (65536 bytes):
Jan 27 18:27:32.000: %SYS-6-CLOCKUPDATE: System clock has been updated from 10:27:31 PST Fri Jan 27 2006 to 10:27:32 PST Fri Jan 27 2006, configured from console by console.
Jan 27 18:27:32.431: %SYS-5-CONFIG_I: Configured from console by console
Jan 27 18:27:34.051: %ARP-4-TRAPENTRY: 50 dynamic ARP entries on Ethernet2/1 installed in the ARP table
Related Commands
Command
Description
interface
Selects an interface to configure and enters interface configuration mode.
showlogging
Displays the contents of logging buffers.
showrunning-config
Displays the contents of the currently running configuration file of your routing device.
arp packet-priority enable
To enable Address Resolution Protocol (ARP) packet priority on an interface, use the arppacket-priorityenablecommand in interface configuration mode. To disable ARP packet priority, use the no form of this command.
arppacket-priorityenable
noarppacket-priorityenable
Syntax Description
This command has no arguments or keywords.
Command Default
By default, ARP packet priority is not enabled.
Command Modes
Interface configuration (config-if)
Command History
Release
Modification
15.1(3)T
This command was introduced.
15.1(1)S
This command was integrated into Cisco IOS Release 15.1(1)S.
Usage Guidelines
Use the arppacket-priorityenable command when a network congestion causes ARP packets to drop. Enabling ARP packet priority significantly reduces the number of ARP packet drops.
Before you configure the arppacket-priorityenable command, you must configure an IP address for the interface and ensure that the interface is enabled. If the interface is disabled, use the noshutdown command to enable the interface.
Examples
The following example shows how to enable packet priority on a Fast Ethernet interface:
Router(config)# interface FastEthernet0/1
Router(config-if)# no shutdown
Router(config-if)# ip address198.51.100.253 255.255.255.0
Router(config-if)# arp packet-priority enable
Related Commands
Command
Description
interface
Configures an interface and enters interface configuration mode.
ipaddress
Sets a primary or secondary IP address for an interface.
shutdown(interface)
Disables an interface.
arp probe interval
To control the the p
robing of authorized peers, use the arpprobeintervalcommand in interface configuration mode. To disable the probe, use the noform of this command.
arpprobeintervalsecondscountcount-number
noarpprobe
Syntax Description
seconds
Interval in seconds after which the next probe will be sent to see if the peer is still present. The range is from 1 to 10.
countcount-number
Number of probe retries. If no response, the peer has logged off. The range is from 1 to 60.
Command Default
Disabled
Command Modes
Interface configuration
Command History
Release
Modification
12.3(8)XX
This command was introduced.
12.3(14)T
This command was integrated into Cisco IOS Release 12.3(14)T.
Usage Guidelines
Once you configure the arpprobeinterval command, probing continues until you disable it using the no form of the command on all interfaces.
Examples
The following example shows a 2 second interval with a probe of the peer occurring 5 times:
interface ethernet 0
arp probe interval 2 count 5
Related Commands
Command
Description
arp(interface)
Controls the interface-specific handling of IP address resolution.
cleararp-cache
Deletes all dynamic entries from the ARP cache.
showinterfaces
Displays statistics for all interfaces configured on the router or access server.
arp timeout
To configure how long a dynamically learned IP address and its corresponding Media Control Access (MAC) address remain in the Address Resolution Protocol (ARP) cache, use the arptimeoutcommand ininterface configuration mode. To restore the default value, use the no form of this command.
arptimeoutseconds
noarptimeoutseconds
Syntax Description
seconds
Time (in seconds) that an entry remains in the ARP cache.
A value of zero means that entries are never cleared from the cache.
Command Default
14400 seconds (4 hours)
Command Modes
Interface configuration
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command is ignored when issued on interfaces that do not use ARP. The showinterfaces EXEC command displays the ARP timeout value. The value follows the âEntry Timeout:â heading, as seen in the following example from the showinterfaces command:
ARP type: ARPA, PROBE, Entry Timeout: 14400 sec
Examples
The following example sets the ARP timeout to 12000 seconds to allow entries to time out more quickly than the default:
interface ethernet 0
arp timeout 12000
Related Commands
Command
Description
showinterfaces
Displays statistics for all interfaces configured on the router or access server.
authentication
To configure clear text authentication and MD5 authentication under a redundancy group protocol, use the
authenticationcommand in redundancy application protocol configuration mode. To disable the authentication settings in the redundancy group, use the
no form of this command.
Uses MD5 key authentication. The
key argument can be up to 64 characters in length (at least 16 characters is recommended). Specifying 7 means the key will be encrypted.
0
(Optional) Specifies that the text following immediately is not encrypted.
7
(Optional) Specifies that the text is encrypted using a Cisco-defined encryption algorithm.
Enters redundancy application group configuration mode.
name
Configures the redundancy group with a name.
preempt
Enables preemption on the redundancy group.
protocol
Defines a protocol instance in a redundancy group.
timershellotime
Configures timers for hellotime and holdtime messages for a redundancy group.
authorization method (DHCP)
To specify a method list to be used for address allocation using RADIUS for Dynamic Host Control Protocol (DHCP), use the authorizationmethodcommand in DHCP pool configuration mode. To disable the authorization method list, use the no form of this command.
authorizationmethodmethod-list-name
noauthorizationmethodmethod-list-name
Syntax Description
method-list-name
An authorization method list of the network type to be used for this DHCP pool.
Command Default
The authorization network default method list is used for authorization.
Command Modes
DHCP pool configuration (config-dhcp)
Command History
Release
Modification
12.2(31)ZV1
This command was modified for the DHCP server RADIUS proxy feature on the Cisco 10000 series router and integrated into Cisco IOS Release 12.2(31)ZV1.
Cisco IOS XE Release 2.4
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Routers.
12.2(33)XNE
This command was integrated into Cisco IOS Release 12.2(33)XNE.
15.0(1)S
This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
The method list must be defined during initial authentication setup.
Examples
The following example shows how to set an authorization method of auth1 to download DHCP information from DHCP or a RADIUS server for DHCP clients when pool_common is used:
Router(config)# aaa authorization network auth1 group radius
Router(config)# ip dhcp pool pool_common
Router(config-dhcp)# authorization method auth1
Related Commands
Command
Description
authorizationlist
Specifies the AAA authorization list.
authorizationusername(dhcp)
Specifies the parameters that RADIUS sends to a DHCP server when downloading information for a DHCP client.
authorizationshared-password
Specifies the password that RADIUS sends to a DHCP or RADIUS server when downloading configuration information for a DHCP client.
authorization shared-password
To specify the password that RADIUS sends to a Dynamic Host Control Protocol (DHCP) or RADIUS server when downloading configuration information for a DHCP client, use the authorizationshared-password command in DHCP pool configuration mode. To remove the password used for downloading DHCP client configuration, use the no form of this command.
authorizationshared-passwordpassword
noauthorizationshared-passwordpassword
Syntax Description
password
The password configured in the RADIUS user profile.
Command Default
No password is sent in the RADIUS requests.
Command Modes
DHCP pool configuration (config-dhcp)
Command History
Release
Modification
12.2(31)ZV1
This command was modified for the DHCP server RADIUS proxy feature on the Cisco 10000 series router and integrated into Cisco IOS Release 12.2(31)ZV1.
Cisco IOS XE Release 2.4
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Routers.
12.2(33)XNE
This command was integrated into Cisco IOS Release 12.2(33)XNE.
15.0(1)S
This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
This command is used to enter the password that matches the password configured in a RADIUS user profile, at a RADIUS server, for the username matching the string.
Examples
The following example shows how to set the password to cisco:
Router(config)# ip dhcp pool pool_common
Router(config-dhcp)# authorization method auth1
Router(config-dhcp)# authorization shared-password cisco
Related Commands
Command
Description
authorizationlist
Specifies the AAA authorization list.
authorizationmethod(dhcp)
Specifies the method list to be used for address allocation information.
authorizationusername(dhcp)
Specifies the parameters that RADIUS sends to a DHCP server when downloading information for a DHCP client.
authorization username (DHCP)
To specify the parameters that RADIUS sends to a Dynamic Host Control Protocol (DHCP) server when downloading configuration information for a DHCP client, use the authorizationusername command in DHCP pool configuration mode. To disable the parameters, use the no form of this command.
authorizationusernamestring
noauthorizationusernamestring
Syntax Description
string
A string that RADIUS sends to the DHCP server when downloading an IP address and other configuration information for a clientâs DHCP responses.
The string must contain the following formatting characters to insert information associated with the DHCP client:
%%--Transmits the percent sign (%) character in the string sent to the RADIUS server
%c--Ethernet address of the DHCP client (chaddr field) in ASCII format
%C--Ethernet address of the DHCP client in hexadecimal format
%g--Gateway address of the DHCP relay agent (giaddr field)
%i--Inner VLAN ID from the DHCP relay information (option 82) in ASCII format
%I--Inner VLAN ID from the DHCP relay information in hexadecimal format
%o--Outer VLAN ID from the DHCP relay information (option 82) in ASCII format
%O--Outer VLAN ID from the DHCP relay information (option 82) in hexadecimal format
%p--Port number from the DHCP relay information (option 82) in ASCII format
%P--Port number from the DHCP relay information (option 82) in hexadecimal format
%u--Circuit ID from the DHCP relay information in ASCII format
%U--Circuit ID from the DHCP relay information in hexadecimal format
%r--Remote ID from the DHCP relay information in ASCII format
%R--Remote ID from the DHCP relay information in hexadecimal format
Note
The percent (%) is a marker to insert the DHCP client information associated with the specified character. The % is not sent to the RADIUS server unless you specify the %% character.
Command Default
No parameters are specified.
Command Modes
DHCP pool configuration (config-dhcp)
Command History
Release
Modification
12.2(31)ZV1
This command was modified for the DHCP server RADIUS proxy feature on the Cisco 10000 series router and integrated into Cisco IOS Release 12.2(31)ZV1.
Cisco IOS XE Release 2.4
This command was implemented on the Cisco ASR 1000 Series Aggregation Services Routers.
12.2(33)XNE
This command was integrated into Cisco IOS Release 12.2(33)XNE.
15.0(1)S
This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
When a DHCP server sends an access request to the authentication, authorization, and accounting (AAA) server, the % and character specified in the username are format characters that is replaced by one of the following values based on the characters specified:
Hardware address
Inner VLAN ID
Outer VLAN ID
Port number
Circuit ID
Remote ID
The % and character specified in the authorizationusername command configure the DHCP server to send the username in ASCII format or the hexadecimal format based on the case (uppercase or lowercase) of the character used.
For example, if you specify %C with the authorizationusername command and the hardware address of the client is aabb.ccdd.eeff, then the DHCP server sends the username as âdhcp-AABBCCDDEEFFâ in ASCII format. If you specify %c with the authorizationusername command, then the DHCP server sends the username as â646863702daabbccddeeffâ in hexadecimal format. The server sends 11 bytes of data when the format is hexadecimal and 19 bytes when the format is ASCII.
Examples
The following example shows how to configure RADIUS to send the Ethernet address of the DHCP client (chaddr field) to the DHCP server when downloading configuration information for a DHCP client:
Router(config)# ip dhcp pool pool_common
Router(config-dhcp)# authorization method auth1
Router(config-dhcp)# authorization shared-password cisco
Router(config-dhcp)# authorization username %c-user1
Related Commands
Command
Description
authorizationlist
Specifies the AAA authorization list.
authorizationmethod(dhcp)
Specifies the method list to be used for address allocation information.
authorizationshared-password
Specifies the password that RADIUS sends to a DHCP or RADIUS server when downloading configuration information for a DHCP client.
bootfile
To specify the name of the default boot image for a Dynamic Host Configuration Protocol (DHCP) client, use the bootfile command in DHCP pool configuration mode. To delete the boot image name, use the no form of this command.
bootfilefilename
nobootfile
Syntax Description
filename
Specifies the name of the file that is used as a boot image.
Command Default
No default behavior or values.
Command Modes
DHCP pool configuration
Command History
Release
Modification
12.0(1)T
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example specifies xllboot as the name of the boot file:
bootfile xllboot
Related Commands
Command
Description
ipdhcppool
Configures a DHCP address pool on a Cisco IOS DHCP Server and enters DHCP pool configuration mode.
next-server
Configures the next server in the boot process of a DHCP client.
class (DHCP)
To associate a class with a Dynamic Host Configuration Protocol (DHCP) address pool and enter DHCP pool class configuration mode, use the class command in DHCP pool configuration mode. To remove the class association, use the no form of this command.
classclass-name
noclassclass-name
Syntax Description
class-name
Name of the DHCP class.
Command Default
No class is associated with the DHCP address pool.
Command Modes
DHCP pool configuration (dhcp-config)
Command History
Release
Modification
12.2(13)ZH
This command was introduced.
12.3(4)T
This command was integrated into Cisco IOS Release 12.3(4)T.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(28)SB.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
15.0(1)S
This command was integrated into Cisco IOS Release 15.0(1)S.
Usage Guidelines
You must first define the class using theipdhcpclass command available in global configuration command. If a nonexistent class is named by the class command, the class will be automatically created. Each class in the DHCP pool will be examined for a match in the order configured.
Examples
The following example shows how to associate DHCP class 1 and class 2 with a DHCP pool named pool1:
Router(config)# ip dhcp pool pool1
Router(dhcp-config)# network 10.0.20.0 255.255.255.0
Router(dhcp-config)# class class1
Router(config-dhcp-pool-class)# address range 10.0.20.1 10.0.20.100
Router(config-dhcp-pool-class)# exit
Router(dhcp-config)# class class2
Router(config-dhcp-pool-class)# address range 10.0.20.101 10.0.20.200
Related Commands
Command
Description
ipdhcpclass
Defines a DHCP class and enters DHCP class configuration mode.
clear arp interface
To clear the entire Address Resolution Protocol (ARP) cache on an interface, use the cleararpinterface command in privileged or user EXEC mode.
cleararpinterfacetypenumber
Syntax Description
type
Interface type.
number
Interface number.
Command Default
No default behavior or values.
Command Modes
Privileged or User EXEC
Command History
Release
Modification
12.0(22)S
This command was introduced.
12.2(15)T
This command was integrated into Cisco IOS Release 12.2(15)T.
12.2(18)S
This command was integrated into Cisco IOS Release 12.2(18)S.
12.2(27)SBC
This command was integrated into Cisco IOS Release 12.2(27)SBC.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
Use the cleararpinterface command to clean up ARP entries associated with an interface.
Examples
The following example clears the ARP cache from Ethernet interface 0:
Router# clear arp interface ethernet 0
clear arp-cache
To refresh dynamically created entries from the Address Resolution Protocol (ARP) cache, use the cleararp-cache command in privileged EXEC mode.
(Optional) Refreshes only the ARP table entries associated with this interface.
vrfvrf-name
(Optional) Refreshes only the ARP table entries for the specified Virtual Private Network (VPN) routing and forwarding (VRF) instance and the IP address specified by the ip-address argument.
ip-address
(Optional) Refreshes only the ARP table entries for the specified IP address.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.0(22)S
This command was introduced.
12.2(15)T
This command was integrated into Cisco IOS Release 12.2(15)T.
12.2(27)SBC
This command was integrated into Cisco IOS Release 12.2(27)SBC.
12.4(11)T
The interface keyword and the type and number arguments were made optional to support refreshing of entries for a single router interface.
The vrf keyword, the vrf-name argument, and the ip-address argument were added to support refreshing of entries of a specified address and an optionally specified VRF.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command updates the dynamically learned IP address and MAC address mapping information in the ARP table to ensure the validity of those entries. If the refresh operation encounters any stale entries (dynamic ARP entries that have expired but have not yet been aged out by an internal, timer-driven process), those entries are aged out of the ARP table immediately as opposed to at the next refresh interval.
Note
By default, dynamically learned ARP entries remain in the ARP table for four minutes.
The cleararp-cache command can be entered multiple times to refresh dynamically created entries from the ARP cache using different selection criteria.
Use this command without any arguments or keywords to refresh all ARP cache entries for all enabled interfaces.
To refresh ARP cache entries for a specific interface, use this command with the interface keyword and type and number arguments.
Tip
The valid interface types and numbers can vary according to the router and the interfaces on the router. To list all the interfaces configured on a particular router, use the showinterfaces command with the summary keyword. Use the appropriate interface specification, typed exactly as it is displayed under the Interface column of the showinterfaces command output, to replace the type and number arguments in the cleararp-cacheinterface command.
To refresh ARP cache entries from the global VRF and for a specific host, use this command with the ip-address argument.
To refresh ARP cache entries from a named VRF and for a specific host, use this command with the vrf keyword and the vrf-name and ip-address arguments.
To display ARP table entries, use the showarp command.
This command does not affect permanent entries in the ARP cache, and it does not affect the ARP HA statistics:
To remove static ARP entries from the ARP cache, use the no form of the arp command.
To remove alias ARP entries from the ARP cache, use the no form of the arp command with the alias keyword.
To reset the ARP HA status and statistics, use the cleararp-cachecountersha command.
Examples
The following example shows how to refresh all dynamically learned ARP cache entries for all enabled interfaces:
Router# clear arp-cache
The following example shows how to refresh dynamically learned ARP cache entries for the Ethernet interface at slot 1, port 2:
Router# clear arp-cache interface ethernet 1/2
The following example shows how to refresh dynamically learned ARP cache entries for the host at 192.0.2.140:
Router# clear arp-cache 192.0.2.140
The following example shows how to refresh dynamically learned ARP cache entries from the VRF named vpn3 and for the host at 192.0.2.151:
Router# clear arp-cache vrf vpn3 192.0.2.151
Related Commands
Command
Description
arp(global)
Configures a permanent entry in the ARP cache.
arptimeout
Configures how long a dynamically learned IP address and its corresponding MAC address remain in the ARP cache.
cleararp-cachecountersha
Resets the ARP HA statistics.
showarp
Displays ARP table entries.
showinterfaces
Displays statistics for all interfaces configured on the router or access server.
clear arp-cache counters ha
To reset the Address Resolution Protocol (ARP) high availability (HA) statistics, use the cleararp-cachecountersha command in privileged EXEC mode.
cleararp-cachecountersha
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.4(11)T
This command was introduced.
12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(31)SB2.
12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SRB.
Usage Guidelines
Use the cleararp-cachecountersha command to reset all ARP high availability statistics for all enabled interfaces.
To display the ARP HA status and statistics, use the showarpha command.
Note
The cleararp-cachecountersha command and the showarpha command are available only on HA-capable platforms (that is, Cisco networking devices that support dual Route Processors [RPs]).
Examples
The following example shows how to reset the ARP HA statistics:
Router# clear arp-cache counters ha
Related Commands
Command
Description
cleararp-cache
Refreshes dynamically learned entries in the ARP cache.
showarpha
Displays the ARP HA status and statistics.
clear host
To delete hostname-to-address mapping entries from one or more hostname caches, use the clearhost command in privileged EXEC mode.
(Optional) The view-name argument specifies the name of the Domain Name System (DNS) view whose hostname cache is to be cleared. Default is the default DNS view associated with the specified or global Virtual Private Network (VPN) routing and forwarding (VRF) instance.
vrfvrf-name
(Optional) The vrf-name argument specifies the name of the VRF associated with the DNS view whose hostname cache is to be cleared. Default is the global VRF (that is, the VRF whose name is a NULL string) with the specified or default DNS view.
all
(Optional) Specifies that hostname-to-address mappings are to be deleted from the hostname cache of every configured DNS view.
hostname
Name of the host for which hostname-to-address mappings are to be deleted from the specified hostname cache.
*
Specifies that all the hostname-to-address mappings are to be deleted from the specified hostname cache.
Command Default
No hostname-to-address mapping entries are deleted from any hostname cache.
Command Modes
Privileged EXEC
Command History
Release
Modification
10.0
This command was introduced.
12.4(4)T
The vrf keyword, vrf-name argument, and all keyword were added.
12.4(9)T
The view keyword and view-name argument were added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
This command clears the specified hostname cache entries in running memory, but it does not remove the entries from NVRAM.
Entries can be removed from the hostname caches for a DNS view name, from the hostname caches for a VRF, or from all configured hostname caches. To remove entries from hostname caches for a particular DNS view name, use the view keyword and view-name argument. To remove entries from the hostname caches for a particular VRF, use the vrf keyword and vrf-name argument. To remove entries from all configured hostname caches, use the all keyword.
To remove entries that provide mapping information for a single hostname, use the hostname argument. To remove all entries, use the * keyword.
To display the cached list of hostnames and addresses specific to a particular DNS view or for all configured DNS views, use the showhosts command.
To define static hostname-to-address mappings in the DNS hostname cache for a DNS view, use the iphost command.
Examples
The following example shows how to clear all entries from the hostname cache for the default view in the global address space:
Router# clear host all *
The following example shows how to clear entries for the hostname www.example.com from the hostname cache for the default view associated with the VPN named vpn101:
Router# clear host vrf vpn101 www.example.com
The following example shows how to clear all entries from the hostname cache for the view named user2 in the global address space:
Router# clear host view user2 *
Related Commands
Command
Description
iphost
Defines static hostname-to-address mappings in the DNS hostname cache for a DNS view.
showhosts
Displays the default domain name, the style of name lookup service, a list of name server hosts, and the cached list of hostnames and addresses specific to a particular DNS view or for all configured DNS views.
clear ip arp inspection log
To clear the status of the log buffer, use the
cleariparpinspectionlogcommand in privileged EXEC mode.
cleariparpinspectionlog
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.2(18)SXE
Support for this command was introduced on the Supervisor Engine 720.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples
This example shows how to clear the contents of the log buffer:
Router#
clear ip arp inspection log
Related Commands
Command
Description
arpaccess-list
Configures an ARP ACL for ARP inspection and QoS filtering and enter the ARP ACL configuration submode.
showiparpinspectionlog
Displays the status of the log buffer.
clear ip arp inspection statistics
To clear the dynamic ARP inspection statistics, use the
cleariparpinspectionstatisticscommand in privileged EXEC mode.
cleariparpinspectionstatistics
[vlanvlan-range]
Syntax Description
vlanvlan-range
(Optional) Specifies the VLAN range.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.2(18)SXE
Support for this command was introduced on the Supervisor Engine 720.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples
This example shows how to clear the DAI statistics from VLAN 1:
Router# clear ip arp inspection statistics vlan 1
Related Commands
Command
Description
arpaccess-list
Configures an ARP ACL for ARP inspection and QoS filtering and enter the ARP ACL configuration submode.
cleariparpinspectionlog
Clears the status of the log buffer.
showiparpinspectionlog
Displays the status of the log buffer.
clear ip dhcp binding
To delete an automatic address binding from the Dynamic Host Configuration Protocol (DHCP) server database, use the clearipdhcpbinding command in privileged EXEC mode.
(Optional) Clears virtual routing and forwarding (VRF) information from the DHCP database.
vrf-name
(Optional) The VRF name.
*
Clears all automatic bindings.
address
The address of the binding you want to clear.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.0(1)T
This command was introduced.
12.2(8)T
The pool keyword and name argument were added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.6
This command was modified. The vrf keyword and vrf-name argument were added.
Usage Guidelines
Typically, the address denotes the IP address of the client. If the asterisk (*) character is used as the address parameter, DHCP clears all automatic bindings.
Use the noipdhcpbinding command in global configuration mode to delete a manual binding.
Note the following behavior for the clearipdhcpbindingcommand:
If you do not specify the poolname option and an IP address is specified, it is assumed that the IP address is an address in the global address space and will look among all the nonvirtual VRF DHCP pools for the specified binding.
If you do not specify the poolname option and the * option is specified, it is assumed that all automatic or on-demand bindings in all VRF and non-VRF pools are to be deleted.
If you specify both the poolname option and the * option, all automatic or on-demand bindings in the specified pool only will be cleared.
If you specify the poolname option and an IP address, the specified binding will be deleted from the specified pool.
Examples
The following example shows how to delete the address binding 10.12.1.99 from a DHCP server database:
Router# clear ip dhcp binding 10.12.1.99
The following example shows how to delete all bindings from all pools:
Router# clear ip dhcp binding *
The following example shows how to delete all bindings from the address pool named pool1:
Router# clear ip dhcp pool pool1 binding *
The following example shows how to delete address binding 10.13.2.99 from the address pool named pool2:
Router# clear ip dhcp pool pool2 binding 10.13.2.99
The following example shows how to delete VRF vrf1 from the DHCP database:
Router# clear ip dhcp binding vrf vrf1 10.13.2.99
Related Commands
Command
Description
showipdhcpbinding
Displays address bindings on the Cisco IOS DHCP server.
clear ip dhcp conflict
To clear an address conflict from the Dynamic Host Configuration Protocol (DHCP) server database, use the
clearipdhcpconflict command in privileged EXEC mode.
(Optional) Clears DHCP virtual routing and forwarding (VRF) conflicts.
vrf-name
(Optional) The VRF name.
*
Clears all address conflicts.
address
The IP address of the host that contains the conflicting address you want to clear.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.0(1)T
This command was introduced.
12.2(8)T
The
pool keyword and
name argument were added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.6
This command was modified. The
vrf keyword and
vrf-name argument were added.
Usage Guidelines
The server detects conflicts using a ping session. The client detects conflicts using gratuitous Address Resolution Protocol (ARP). If the asterisk (*) character is used as the address parameter, DHCP clears all conflicts.
Note the following behavior for the
clearipdhcpconflict command:
If you do not specify the
poolname option and an IP address is specified, it is assumed that the IP address is an address in the global address space and will look among all the nonvirtual VRF DHCP pools for the specified conflict.
If you do not specify the
poolname option and the
* option is specified, it is assumed that all automatic/ or on-demand conflicts in all VRF and non-VRF pools are to be deleted.
If you specify both the
poolname option and the
* option, all automatic or on-demand conflicts in the specified pool only will be cleared.
If you specify the
poolname option and an IP address, the specified conflict will be deleted from the specified pool.
Examples
The following example shows how to delete an address conflict of 10.12.1.99 from the DHCP server database:
Router# clear ip dhcp conflict 10.12.1.99
The following example shows how to delete all address conflicts from all pools:
Router# clear ip dhcp conflict *
The following example shows how to delete all address conflicts from the address pool named pool1:
Router# clear ip dhcp pool pool1conflict *
The following example shows how to delete address conflict 10.13.2.99 from the address pool named pool2:
Router# clear ip dhcp pool pool2 conflict 10.13.2.99
The following example shows how to delete VRF vrf1 from the DHCP database:
Router# clear ip dhcp conflict vrf vrf1 10.13.2.99
Related Commands
Command
Description
showipdhcpconflict
Displays address conflicts found by a Cisco IOS DHCP server when addresses are offered to the client.
clear ip dhcp limit lease
To clear lease limit violation entries, use the clearipdhcplimitleasecommand in privileged EXEC mode.
clearipdhcplimitlease
[typenumber]
Syntax Description
type
(Optional) Interface type. For more information, use the question mark (?) online help function.
number
(Optional) Interface or subinterface number. For more information about the numbering system for your networking device, use the question mark (?) online help function.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.2(33)SRC
This command was introduced.
Usage Guidelines
The showipdhcplimitlease command displays the number of lease limit violations. You can control the number of subscribers at the global level by using the ipdhcplimitleaseperinterface command and at the interface level by using the ipdhcplimitleasecommand.
Examples
In the following example, the number of lease violations is displayed and then cleared:
Router# show ip dhcp limit lease
Interface Count
Serial0/0.1 5
Serial1 3
Router# clear ip dhcp limit lease
Router# show ip dhcp limit lease
Related Commands
Command
Description
ipdhcplimitlease
Limits the number of leases offered to DHCP clients per interface.
ipdhcplimitleaseperinterface
Limits the number of DHCP leases offered to DHCP clients behind an ATM RBE unnumbered or serial unnumbered interface.
showipdhcplimitlease
Displays the number of times the lease limit threshold has been violated on an interface.
clear ip dhcp server statistics
To reset all Dynamic Host Configuration Protocol (DHCP) server counters, use the clearipdhcpserverstatistics command in privileged EXEC mode.
clearipdhcpserverstatistics
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.0(1)T
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Usage Guidelines
The showipdhcpserverstatistics command displays DHCP counters. All counters are cumulative. The counters will be initialized, or set to zero, with the clearipdhcpserverstatistics command.
Examples
The following example resets all DHCP counters to zero:
Router# clear ip dhcp server statistics
Related Commands
Command
Description
showipdhcpserverstatistics
Displays Cisco IOS DHCP server statistics.
clear ip dhcp snooping binding
To clear the DHCP-snooping binding-entry table without disabling DHCP snooping, use the
clearipdhcpsnoopingbinding command in privileged EXEC mode.
clearipdhcpsnoopingbinding
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.2(14)SX
Support for this command was introduced on the Supervisor Engine 720.
12.2(17d)SXB
Support for this command on the Supervisor Engine 2 was extended to Release 12.2(17d)SXB.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples
This example shows how to clear the DHCP-snooping binding-entry table:
Router# clear ip dhcp snooping binding
clear ip dhcp snooping database statistics
To clear the DHCP binding database statistics, use the clearipdhcpsnoopingdatabasestatisticscommand in privileged EXEC mode.
clearipdhcpsnoopingdatabasestatistics
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC (#)
Command History
Release
Modification
12.2(14)SX
Support for this command was introduced on the Supervisor Engine 720.
12.2(17d)SXB
Support for this command on the Supervisor Engine 2 was extended to Release 12.2(17d)SXB.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples
The following example shows how to clear the statistics from the DHCP binding database:
Router# clear ip dhcp snooping database statistics
clear ip dhcp snooping statistics
To clear the DHCP snooping statistics, use the
clearipdhcpsnoopingstatistics command in privileged EXEC mode.
clearipdhcpsnoopingstatistics
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.2(14)SX
Support for this command was introduced on the Supervisor Engine 720.
12.2(17d)SXB
Support for this command on the Supervisor Engine 2 was extended to Release 12.2(17d)SXB.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
Examples
This example shows how to clear the DHCP snooping statistics:
Router# clear ip dhcp snooping statistics
clear ip dhcp subnet
To clear all currently leased subnets in the Dynamic Host Configuration Protocol (DHCP) pool, use the clearipdhcpsubnetcommand in privileged EXEC configuration mode.
clearipdhcp
[poolname]
subnet
{* | address}
Syntax Description
poolname
(Optional) Name of the DHCP pool.
*
Clears all leased subnets.
address
Clears a subnet containing the specified IP address.
Command Modes
Privileged EXEC
Command History
Release
Modification
12.2(8)T
This command was introduced.
Usage Guidelines
A PPP session that is allocated an IP address from the released subnet will be reset.
Note the following behavior for the clearipdhcpsubnet command:
If you do not specify the poolname option and an IP address is specified, it is assumed that the IP address is an address in the global address space and will look among all the non-virtual routing and forwarding (VRF) DHCP pools for the specified subnet.
If you do not specify the poolname option and the * option is specified, it is assumed that all automatic or on-demand subnets in all VRF and non-VRF pools are to be deleted.
If you specify both the poolname option and the * option, all automatic or on-demand subnets in the specified pool only will be cleared.
If you specify the poolname option and an IP address, the subnet containing the specified IP address will be deleted from the specified pool.
Caution
Use this command with caution to prevent undesired termination of active PPP sessions.
Examples
The following example releases the subnet containing 10.0.0.2 from any non-VRF on-demand address pools:
Router# clear ip dhcp subnet 10.0.0.2
The following example clears all leased subnets from all pools:
Router# clear ip dhcp subnet *
The following example clears all leased subnets from the address pool named pool3:
Router# clear ip dhcp pool pool3 subnet *
The following example clears the address 10.0.0.2 from the address pool named pool2:
Router# clear ip dhcp pool pool2 subnet 10.0.0.2
Related Commands
Command
Description
showipdhcppool
Displays information about the DHCP address pools.
clear ip nat translation
To clear dynamic Network Address Translation ( NAT) translations from the translation table, use the
clearipnattranslationcommandinEXEC mode.
all dynamic entries, whether or not there are any child translations.
a single dynamic half-entry and any existing child translations, whether or not there are any child translations.
piggyback-internal
(Optional) Clears translations created off of piggyback data.
esp
(Optional) Clears Encapsulating Security Payload (ESP) entries from the translation table.
tcp
(Optional) Clears the TCP entries from the translation table.
udp
(Optional) Clears the User Datagram Protocol (UDP) entries from the translation table.
inside
(Optional) Clears the inside translations containing the specified
global-ip and
local-ip addresses. If used without the
forced keyword, clears only those entries that do not have child translations.
global-ip
(Optional) Global IP address.
global-port
(Optional) Global port.
local-ip
(Optional) Local IP address.
local-port
(Optional) Local port.
outside
(Optional) Clears the outside translations containing the specified
local-ip and
global-ip addresses. If used without the
forced keyword, clears only those entries that do not have child translations.
Command Modes
EXEC
Command History
Release
Modification
11.2
This command was introduced.
12.2(15)T
The
esp keyword was added.
12.2 (33) XND
The
forced keyword was extended to support the removal of a half entry regardless of whether it has any child translations.
12.4(2)T
The
piggyback-internal keyword was added.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
XE 2.4.2
The
forced keyword was extended to support the removal of a half entry regardless of whether it has any child translations.
Usage Guidelines
Use this command to clear entries from the translation table before they time out.
Examples
The following example shows the NAT entries before and after the User Datagram Protocol (UDP) entry is cleared:
Router> show ip nat translations
Pro Inside global Inside local Outside local Outside global
udp 10.69.233.209:1220 10.168.1.95:1220 10.69.2.132:53 10.69.2.132:53
tcp 10.69.233.208 10.168.1.94
tcp 10.69.233.209:11012 10.168.1.89:11012 10.69.1.220:23 10.69.1.220:23
tcp 10.69.233.209:1067 10.168.1.95:1067 10.69.1.161:23 10.69.1.161:23
Router# clear ip nat translation udp inside 10.69.233.209 1220 10.168.1.95 1220outside 10.69.2.132 53 10.69.2.132 53
Router# show ip nat translations
Pro Inside global Inside local Outside local Outside global
tcp 10.69.233.208 10.168.1.94
tcp 10.69.233.209:11012 10.168.1.89:11012 10.69.1.220:23 10.69.1.220:23
tcp 10.69.233.209:1067 10.168.1.95:1067 10.69.1.161:23 10.69.1.161:23
Router# clear ip nat translation inside 10.69.233.208 10.168.1.94 forced
Router# show ip nat translations
Pro Inside global Inside local Outside local Outside global
tcp 10.69.233.209:11012 10.168.1.89:11012 10.69.1.220:23 10.69.1.220:23
tcp 10.69.233.209:1067 10.168.1.95:1067 10.69.1.161:23 10.69.1.161:23
Related Commands
Command
Description
ipnat
Designates that traffic originating from or destined for the interface is subject to NAT.
ipnatinsidedestination
Enables NAT of the inside destination address.
ipnatinsidesource
Enables NAT of the inside source address.
ipnatoutsidesource
Enables NAT of the outside source address.
ipnatpool
Defines a pool of IP addresses for NAT.
ipnatservice
Changes the amount of time after which NAT translations time out.
showipnatstatistics
Displays NAT statistics.
showipnattranslations
Displays active NAT translations.
clear ip nhrp
To
clear all dynamic entries from the Next Hop Resolution Protocol (
NHRP) cache, use the clearipnhrpcommand in EXEC mode.
(Optional) Clears NHRP mapping entries for specified destination IP addresses.
dest_mask
(Optional) Name of the destination network mask.
counters
(Optional) Clears the NHRP counters.
interface
(Optional) Clears NHRP mapping entries for the specified interface.
if-name
(Optional) Interface name. Specifying this arguments removes the specified interface name that all entries learned via this interface from the Next Hop Resolution Protocol (
NHRP) cache.
if-number
(Optional) Interface number. Specifying this arguments removes the specified interface number that all entries learned via this interface from the Next Hop Resolution Protocol (
NHRP) cache.
vrf
(Optional) Deletes entries from the Next Hop Resolution Protocol (
NHRP) cache for the specified VRF.
vrf-name
(Optional) Name of the VRF address-family to which the command is applied.
shortcut
(Optional) Deletes shortcut entries from the Next Hop Resolution Protocol (
NHRP) cache.
Command Modes
User EXEC
Privileged EXEC
Command History
Release
Modification
11.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Cisco IOS XE Release 2.5
This command was modified. Support was added for the shortcutkeyword.
Usage Guidelines
This command does not clear any static (configured) IP-to-nonbroadcast multiaccess (NBMA) address mappings from the NHRP cache. The clearipnhrpshortcut command clears NHRP cache entries that have associated NHRP routes/nexthop-overrides in the RIB.
Examples
The following example clears all dynamic entries from the NHRP cache for the interface:
Router> clear ip nhrp
The following example shows how to clear NHRP cache entries that have associated NHRP routes/nexthop-overrides in the RIB:
Router> clear ip nhrp shortcut
Related Commands
Command
Description
showipnhrp
Displays the NHRP cache.
clear ip route
To delete routes from the IP routing table, use the cleariproute command in EXEC mode.
cleariproute
{network [mask] | *}
Syntax Description
network
Network or subnet address to remove.
mask
(Optional) Subnet address to remove.
*
Removes all routing table entries.
Command Default
All entries are removed.
Command Modes
EXEC
Command History
Release
Modification
10.0
This command was introduced.
12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SRA.
12.2SX
This command is supported in the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware.
Examples
The following example removes a route to network 10.5.0.0 from the IP routing table: