![]() |
Cisco IOS IP Addressing Services Command Reference
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
ip nat source through iterate-ip-addrs
![]() |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Contents
ip nat source through iterate-ip-addrs ip nat sourceTo enable Network Address Translation (NAT) on a virtual interface without inside or outside specification, use the ip nat source command in global configuration mode. Dynamic NATip nat source {list {access-list-number | access-list-name} interface type number | pool name} [overload | vrf name]
Static NATip nat source static {esp local-ip interface type number | local-ip global-ip} [extendable | no-alias | no-payload | vrf name]
no ip nat source static {esp local-ip interface type number | local-ip global-ip} [extendable | no-alias | no-payload | vrf name]
Network Static NATip nat source static network local-network global-network mask [extendable | no-alias | no-payload | vrf name]
no ip nat source static network local-network global-network mask [extendable | no-alias | no-payload | vrf name]
Syntax Description
ip nat stateful idTo designate the members of a translation group, use the ip nat stateful id command in global configuration mode. To disable the members of a translation group or reset default values, use the no form of this command. Syntax Description
Usage GuidelinesThis command has two forms: HSRP stateful NAT and manual stateful NAT. The form that uses the keyword redundancy establishes the HSRP redundancy method. When HSRP mode is set, the primary and backup NAT routers are elected according to the HSRP standby state. To enable stateful NAT manually, configure the primary router and backup router. In HSRP mode, the default TCP can be changed to UDP by using the optional protocol udp keywords with the redundancy keyword. To disable the queuing during asymmetric routing in HSRP mode, use the optional as-queuing disable keywords with the redundancy keyword. ExamplesThe following example shows how to configure SNAT with HSRP: ! standby delay minimum 30 reload 60 standby 1 ip 10.1.1.1 standby 1 name SNATHSRP standby 1 preempt delay minimum 60 reload 60 sync 60 ! ip nat Stateful id 1 redundancy SNATHSRP mapping-id 10 as-queuing disable protocol udp ip nat pool SNATPOOL1 10.1.1.1 10.1.1.9 prefix-length 24 ip nat inside source route-map rm-101 pool SNATPOOL1 mapping-id 10 overload ip classless ip route 10.1.1.0 255.255.255.0 Null0 no ip http server ip pim bidir-enable The following example shows how to manually configure SNAT: ip nat stateful id 1 primary 10.88.194.17 peer 10.88.194.18 mapping-id 10 ip nat stateful id 2 backup 10.88.194.18 peer 10.88.194.17 mapping-id 10 Related Commands
ip nat translation (timeout)To change the amount of time after which Network Address Translation (NAT) translations time out, use the ip nat translation command inglobal configuration mode. To disable the timeout, use the no form of this command.
ip
nat
translation
{arp-ping-timeout | dns-timeout | finrst-timeout | icmp-timeout | port-timeout {tcp port-number | udp port-number} | pptp-timeout | routemap-entry-timeout | syn-timeout | tcp-timeout | timeout | udp-timeout}
{seconds | never}
no
ip
nat
translation
{arp-ping-timeout | dns-timeout | finrst-timeout | icmp-timeout | port-timeout {tcp port-number | udp port-number} | pptp-timeout | routemap-entry-timeout | syn-timeout | tcp-timeout | timeout | udp-timeout}
Syntax Description
Command Defaulttimeout : 86,400 seconds (24 hours)udp-timeout: 300 seconds (5 minutes)dns-timeout: 60 seconds (1 minute)tcp-timeout: 86,400 seconds (24 hours)finrst-timeout:60 seconds (1 minute)icmp-timeout: 60 seconds (1 minute)pptp-timeout: 86,400 seconds (24 hours)syn-timeout: 60 seconds (1 minute) Command History
Usage GuidelinesWhen port translation is configured, each entry contains more context about the traffic that is using it, which gives you finer control over translation entry timeouts. Non-DNS UDP translations time out after 5 minutes, and DNS times out in 1 minute. TCP translations time out in 24 hours, unless an rapid spanning-tree (RST) or FIN bit is seen on the stream, in which case they will time out in 1 minute. ExamplesThe following example shows how to configure the router to cause UDP port translation entries to time out after 10 minutes (600 seconds): Router# configure terminal Router(config)# ip nat translation udp-timeout 600 Related Commands
ip nat translation max-entriesTo limit the size of a Network Address Translation (NAT) table to a specified maximum, use the ip nat translation max-entries command in global configuration mode. To remove a specified limit, use the no form of this command.
ip
nat
translation
max-entries
[all-host | all-vrf | host ip-address | list {listname | listnumber} | vrf name]
number
no
ip
nat
translation
max-entries
[all-host | all-vrf | host ip-address | list {listname | listnumber} | vrf name]
number
Syntax Description
Usage GuidelinesBefore you configure a NAT rate limit, you must first classify the current NAT usage and determine the sources of requests for NAT translations. If a specific host, an access control list, or a VRF instance is generating an unexpectedly high number of NAT requests, it may be the source of a virus or worm attack. Once you have identified the source of excess NAT requests, you can set a NAT rate limit that constrains a specific host, access control list, or VRF instance, or you can set a general limit for the maximum number of NAT requests allowed regardless of their source. ExamplesThe following example shows how to limit the maximum number of allowed NAT entries to 300: ip nat translation max-entries 300 ExamplesThe following example shows how to limit each VRF instance to 200 NAT entries: ip nat translation max-entries all-vrf 200 The following example shows how to limit the VRF instance named vrf1 to 150 NAT entries: ip nat translation max-entries vrf vrf1 150 The following example shows how to limit the VRF instance named vrf2 to 225 NAT entries, but limit all other VRF instances to 100 NAT entries each: ip nat translation max-entries all-vrf 100 ip nat translation max-entries vrf vrf2 225 ExamplesThe following example shows how to limit the access control list named vrf3 to 100 NAT entries: ip nat translation max-entries list vrf3 100 ExamplesThe following example shows how to limit the host at IP address 10.0.0.1 to 300 NAT entries: ip nat translation max-entries host 10.0.0.1 300 Related Commands
ip netmask-formatTo specify the format in which netmasks are displayed in show command output, use the ip netmask-formatcommand inline configuration mode. To restore the default display format, use the no form of this command.
ip
netmask-format
{bit-count | decimal | hexadecimal}
no
ip
netmask-format
{bit-count | decimal | hexadecimal}
Syntax Description
Command History
Usage GuidelinesIP uses a 32-bit mask that indicates which address bits belong to the network and subnetwork fields, and which bits belong to the host field. This is called a netmask. By default, show commands display an IP address and then its netmask in dotted decimal notation. For example, a subnet would be displayed as 10.108.11.0 255.255.255.0. However, you can specify that the display of the network mask appear in hexadecimal format or bit count format instead. The hexadecimal format is commonly used on UNIX systems. The previous example would be displayed as 10.108.11.0 0XFFFFFF00. The bitcount format for displaying network masks is to append a slash (/) and the total number of bits in the netmask to the address itself. The previous example would be displayed as 10.108.11.0/24. ip nhrp authenticationTo configure the authentication string for an interface using the Next Hop Resolution Protocol ( NHRP), use the ip nhrp authenticationcommand ininterface configuration mode. To remove the authentication string, use the no form of this command. Command DefaultNo authentication string is configured; the Cisco IOS software adds no authentication option to NHRP packets it generates. Command History
ip nhrp groupTo configure a Next Hop Resolution Protocol (NHRP) group on a spoke, use the ip nhrp groupcommand in interface configuration mode. To remove an NHRP group, use the no form of this command. Usage GuidelinesAfter you create an NHRP group on a spoke, you use the ip nhrp map groupcommand to map the group to a QoS policy map. ExamplesThe following example shows how to create two NHRP groups named small and large. Router> enable Router# configure terminal Router(config)# interface Tunnel 0 Router(config-if)# ip nhrp group small Router(config-if)# ip nhrp group large Related Commands
ip nhrp holdtimeTo change the number of seconds that Next Hop Resolution Protocol (NHRP) nonbroadcast multiaccess (NBMA) addresses are advertised as valid in authoritative NHRP responses, use the ip nhrp holdtimecommand ininterface configuration mode. To restore the default value, use the no form of this command. Command History
Usage GuidelinesThe ip nhrp holdtime command affects authoritative responses only. The advertised holding time is the length of time the Cisco IOS software tells other routers to keep information that it is providing in authoritative NHRP responses. The cached IP-to-NBMA address mapping entries are discarded after the holding time expires. The NHRP cache can contain static and dynamic entries. The static entries never expire. Dynamic entries expire regardless of whether they are authoritative or nonauthoritative. ip nhrp interestTo control which IP packets can trigger sending a Next Hop Resolution Protocol ( NHRP) request packet, use the ip nhrp interestcommand ininterface configuration mode. To restore the default value, use the no form of this command. Command History
Usage GuidelinesUse this command with the access-list command to control which IP packets trigger NHRP requests. The ip nhrp interest command controls which packets cause NHRP address resolution to take place; the ip nhrp use command controls how readily the system attempts such address resolution. ExamplesIn the following example, any TCP traffic can cause NHRP requests to be sent, but no other IP packets will cause NHRP requests: ip nhrp interest 101 access-list 101 permit tcp any any ip nhrp mapTo statically configure the IP-to-nonbroadcast multiaccess (NBMA) address mapping of IP destinations connected to an NBMA network, use the ip nhrp mapinterface configuration command. To remove the static entry from Next Hop Resolution Protocol (NHRP) cache, use the no form of this command. Syntax Description
Command History
Usage GuidelinesYou will probably need to configure at least one static mapping in order to reach the next-hop server. Repeat this command to statically configure multiple IP-to-NBMA address mappings. ExamplesIn the following example, this station in a multipoint tunnel network is statically configured to be served by two next-hop servers 10.0.0.1 and 10.0.1.3. The NBMA address for 10.0.0.1 is statically configured to be 192.0.0.1 and the NBMA address for 10.0.1.3 is 192.2.7.8. interface tunnel 0 ip nhrp nhs 10.0.0.1 ip nhrp nhs 10.0.1.3 ip nhrp map 10.0.0.1 192.0.0.1 ip nhrp map 10.0.1.3 192.2.7.8 ip nhrp map groupTo associate a Next Hop Resolution Protocol (NHRP) group to a QoS policy map, use the ip nhrp map groupcommand in interface configuration mode. To remove an association, use the no form of this command.
ip
nhrp
map
group
group-name
service-policy
output
qos-policy-map-name
no
ip
nhrp
map
group
group-name
service-policy
output
qos-policy-map-name
ExamplesThe following example shows how to map two NHRP groups named small and large to two QoS policy maps named qos-small and qos-large respectively. Router> enable Router# configure terminal Router(config)# interface Tunnel 0 Router(config-if)# ip nhrp map group small service-policy output qos-small Router(config-if)# ip nhrp map group large service-policy output qos-large Related Commands
ip nhrp map multicastTo configure nonbroadcast multiaccess (NBMA) addresses used as destinations for broadcast or multicast packets to be sent over a tunnel network, use the ip nhrp map multicastcommand in interface configuration mode. To remove the destinations, use the no form of this command. Command DefaultNo NBMA addresses are configured as destinations for broadcast or multicast packets. Command History
Usage GuidelinesThis command applies only to tunnel interfaces. The command is useful for supporting broadcasts over a tunnel network when the underlying network does not support IP multicast. If the underlying network does support IP multicast, you should use the tunnel destination command to configure a multicast destination for transmission of tunnel broadcasts or multicasts. When multiple NBMA addresses are configured, the system replicates the broadcast packet for each address. ExamplesIn the following example, if a packet is sent to 10.255.255.255, it is replicated to destinations 10.0.0.1 and 10.0.0.2. Addresses 10.0.0.1 and 10.0.0.2 are the IP addresses of two other routers that are part of the tunnel network, but those addresses are their addresses in the underlying network, not the tunnel network. They would have tunnel addresses that are in network 10.0.0.0. interface tunnel 0 ip address 10.0.0.3 255.0.0.0 ip nhrp map multicast 10.0.0.1 ip nhrp map multicast 10.0.0.2 ip nhrp map multicast dynamicTo allow Next Hop Resolution Protocol (NHRP) to automatically add routers to the multicast NHRP mappings, use the ip nhrp map multicast dynamiccommand in interface configuration mode. To disable this functionality or to clear dynamic entries, use the no form of this command. Command History
Usage GuidelinesUse this command when spoke routers need to initiate multipoint generic routing encapsulation (GRE) and IPSecurity (IPSec) tunnels and register their unicast NHRP mappings. This command is needed to enable dynamic routing protocols to work over the Multipoint GRE and IPSec tunnels because IGP routing protocols use multicast packets. This command prevents the Hub router from needing a separate configuration line for a multicast mapping for each spoke router. You can clear all dynamic entries in the multicast table by using the no form of this command. ExamplesThe following example shows how to enable the ip nhrp map multicast dynamiccommand on the hub router: crypto ipsec profile vpnprof set transform-set trans2 ! interface Tunnel0 bandwith 1000 ip address 10.0.0.1 255.255.255.0 ip mtu 1436 ip nhrp authentication test ip nhrp map multicast dynamic ip nhrp network-id 100000 ip nhrp holdtime 600 no ip split-horizon eigrp 1 delay 1000 tunnel source Ethernet0 tunnel mode gre multipoint tunnel key 100000 tunnel protection ipsec profile vpnprof ! interface Ethernet0 ip address 10.17.0.1 255.255.255.0 ip nhrp max-sendTo change the maximum frequency at which Next Hop Resolution Protocol (NHRP) packets can be sent, use the ip nhrp max-sendinterface configuration command. To restore this frequency to the default value, use the no form of this command. Command History
Usage GuidelinesThe software maintains a per-interface quota of NHRP packets that can be sent. NHRP traffic, whether locally generated or forwarded, cannot be sent at a rate that exceeds this quota. The quota is replenished at the rate specified by the secondsargument.
Number of spokes / registration timeout * Max-send-interval 500 spokes with 100 second Registration timeout Max send value = 500/100*10 = 50
spoke-spoke tunnels/NHRP holdtime * Max-send-interval This would cover spoke-spoke tunnel creation and the refreshing of spoke-spoke tunnels that are used for longer periods of time. 2000 spoke-spoke tunnels with 250 second hold timeout Max send value = 2000/250*10 = 80 Then add these together and multiply this by 1.5 - 2.0 to give a buffer. Max send = (50 + 80) * 2 = 260
400 messages in 10 seconds In this case it could peak at approximately 200 messages in the first second of the 10 second interval, but still keep to a 40 messages per second average over the 10 second interval. 4000 messages in 100 seconds In this case it could peak at approximately 2000 messages in the first second of the 100 second interval, but it would still be held to 40 messages per second average over the 100 second interval. In the second case it could handle a higher peak rate, but risk a longer period of time when no messages can be sent if it used up its quota for the interval. By default, the maximum rate at which the software sends NHRP packets is five packets per 10 seconds. The software maintains a per-interface quota of NHRP packets (whether generated locally or forwarded) that can be sent. ip nhrp network-idTo enable the Next Hop Resolution Protocol ( NHRP) on an interface, use the ip nhrp network-idcommand ininterface configuration mode. To disable NHRP on the interface, use the no form of this command. Command History
ip nhrp nhsTo specify the address of one or more Next Hop Resolution Protocol (NHRP) servers, use the ip nhrp nhscommand ininterface configuration mode. To remove the address, use the no form of this command. Cisco IOS Release 12.2(33)SRA, 12.2SX, and Later Releases
ip
nhrp
nhs
nhs-address
[net-address [netmask] ]
no
ip
nhrp
nhs
nhs-address
[net-address [netmask] ]
Cisco IOS Release 15.1(2)T and Later Releases
ip
nhrp
nhs
{nhs-address [nbma {nbma-address | FQDN-string} ] [multicast] [priority value] [cluster value] | cluster value max-connections value | dynamic nbma {nbma-address | FQDN-string} [multicast] [priority value] [cluster value] | fallback seconds}
no
ip
nhrp
nhs
{nhs-address [nbma {nbma-address | FQDN-string} ] [multicast] [priority value] [cluster value] | cluster value max-connections value | dynamic nbma {nbma-address | FQDN-string} [multicast] [priority value] [cluster value] | fallback seconds}
Syntax Description
Command DefaultNo next-hop servers are explicitly configured, so normal network layer routing decisions are used to forward NHRP traffic. Command History
Usage GuidelinesUse the ip nhrp nhs command to specify the address of a next hop server and the networks it serves. Normally, NHRP consults the network layer forwarding table to determine how to forward NHRP packets. When next hop servers are configured, these next hop addresses override the forwarding path that would otherwise be used for NHRP traffic. For any next hop server that is configured, you can specify multiple networks by repeating this command with the same nhs-addressargument, but with different IP network addresses. ExamplesThe following example shows how to register a hub to a spoke using NBMA and FQDN: Router# configure terminal Router(config)# interface tunnel 1 Router(config-if)# ip nhrp nhs 192.0.2.1 nbma examplehub.example1.com The following example shows how to configure the desired max-connections value: Router# configure terminal Router(config)# interface tunnel 1 Router(config-if)# ip nhrp nhs cluster 5 max-connections 100 The following example shows how to configure the NHS fallback time: Router# configure terminal Router(config)# interface tunnel 1 Router(config-if)# ip nhrp nhs fallback 25 The following example shows how to configure NHS priority and group values: Router# configure terminal Router(config)# interface tunnel 1 Router(config-if)# ip nhrp nhs 192.0.2.1 priority 1 cluster 2 ip nhrp recordTo reenable the use of forward record and reverse record options in Next Hop Resolution Protocol (NHRP) request and reply packets, use the ip nhrp recordinterface configuration command. To suppress the use of such options, use the no form of this command. Command DefaultForward record and reverse record options are used in NHRP request and reply packets. Command History
Usage GuidelinesForward record and reverse record options provide loop detection and are enabled by default. Using the no form of this command disables this method of loop detection. For another method of loop detection, see the ip nhrp respondercommand. ip nhrp redirectTo enable Next Hop Resolution Protocol (NHRP) redirect, use the ip nhrp redirectcommand in interface configuration mode. To remove the NHRP redirect, use the no form of this command. Usage GuidelinesThe NHRP redirect message is an indication that the current path to the destination is not optimal. The receiver of the message should find a better path to the destination. This command generates an NHRP redirect traffic indication message if the incoming and outgoing interface is part of the same DMVPN network. The NHRP shortcut switching feature depends on receiving the NHRP redirect message. NHRP shortcut switching does not trigger an NHRP resolution request on its own. It triggers an NHRP resolution request only after receiving an NHRP redirect message. Most of the traffic would follow a spoke-hub-spoke path. NHRP redirect is generally required to be configured on all the DMVPN nodes in the event the traffic follows a spoke-spoke-hub-spoke path, which is unlikely the case. Do not configure this command if the DMVPN network is configured for full-mesh. In a full-mesh configuration the spokes are populated with a full routing table with next-hop being the other spokes. ExamplesThe following example shows how to enable NHRP redirects on the interface: Router> enable Router# configure terminal Router(config)# interface Tunnel0 Router(config)# interface Tunnel0 Router(config-if)# ip address 192.2.0.11 255.255.255.0 Router(config-if)# ip nhrp authentication test Router(config-if)# ip nhrp map multicast 192.2.0.2 Router(config-if)# ip nhrp map 192.2.0.2 192.2.0.13 Router(config-if)# ip nhrp network-id 100000 Router(config-if)# ip nhrp nhs 192.2.0.11 Router(config-if)# ip nhrp shortcut Router(config-if)# ip nhrp redirect Router(config-if)# tunnel source Serial1/0 Router(config-if)# tunnel mode gre multipoint Router(config-if)# tunnel key 100000 Router(config-if)# tunnel protection ipsec profile vpnprof ip nhrp registrationTo enable the client to not set the unique flag in the Next Hop Resolution Protocol (NHRP) request and reply packets, use the ip nhrp registrationcommand in interface configuration mode. To reenable this functionality, use the no form of this command.
ip
nhrp
registration
[timeout seconds | no-unique]
no
ip
nhrp
registration
[timeout seconds | no-unique]
Syntax DescriptionCommand History
Usage GuidelinesIf the unique flag is set in the NHRP registration request packet, a next-hop server (NHS) must reject any registration attempts for the same private address using a different nonbroadcast multiaccess (NBMA) address. If a client receives a new IP address, for example via DHCP, and tries to register before the cache entry on the NHS times out, the NHS must reject it. By configuring the ip nhrp registration command and no-unique keyword, the unique flag is not set, and the NHS can override the old registration information. This command and keyword combination is useful in an environment where client IP addresses can change frequently such as a dial environment. ExamplesThe following example configures the client to not set the unique flag in the NHRP registration packet: interface FastEthernet 0/0 ip nhrp registration no-unique The following example shows that the registration timeout is set to 120 seconds, and the delay is set to 5 seconds: interface FastEthernet 0/0 ip nhrp registration 120 ip nhrp responderTo designate the primary IP address the Next Hop Server that an interface will use in Next Hop Resolution Protocol (NHRP) reply packets when the NHRP requestor uses the Responder Address option, use the ip nhrp respondercommand ininterface configuration mode. To remove the designation, use the no form of this command.
ip
nhrp
responder
interface-type
interface-number
no
ip
nhrp
responder
[interface-type]
[interface-number]
Command DefaultThe next-hop server uses the IP address of the interface where the NHRP request was received. Command History
Usage GuidelinesIf an NHRP requestor wants to know which next-hop server generates an NHRP reply packet, it can request that information through the Responder Address option. The next-hop server that generates the NHRP reply packet then complies by inserting its own IP address in the Responder Address option of the NHRP reply. The next-hop server uses the primary IP address of the specified interface. If an NHRP reply packet being forwarded by a next-hop server contains the IP address of that next-hop server, the next-hop server generates an Error Indication of type âNHRP Loop Detectedâ and discards the reply packet. ip nhrp server-onlyTo configure the interface to operate in Next Hop Resolution Protocol (NHRP) server-only mode, use the ip nhrp server-onlycommand ininterface configuration mode. To disable this feature, use the no form of this command. Command History
ip nhrp shortcutTo enable Next Hop Resolution Protocol (NHRP) shortcut switching, use the ip nhrp shortcutcommand in interface configuration mode. To remove shortcut switching from NHRP, use the no form of this command. Usage GuidelinesDo not configure this command if the DMVPN network is configured for full-mesh. In a full-mesh configuration the spokes are populated with a full routing table with next-hop being the other spokes. ExamplesThe following example shows how to configure an NHRP shortcut on an interface: Router> enable Router# configure terminal Router(config)# interface Tunnel0 Router(config-if)# ip address 192.2.0.11 255.255.255.0 Router(config-if)# ip nhrp authentication test Router(config-if)# ip nhrp map multicast 192.2.0.2 Router(config-if)# ip nhrp map 192.2.0.2 192.2.0.13 Router(config-if)# ip nhrp network-id 100000 Router(config-if)# ip nhrp nhs 192.2.0.11 Router(config-if)# ip nhrp shortcut Router(config-if)# ip nhrp redirect Router(config-if)# tunnel source Serial1/0 Router(config-if)# tunnel mode gre multipoint Router(config-if)# tunnel key 100000 Router(config-if)# tunnel protection ipsec profile vpnprof ip nhrp trigger-svcTo configure when the Next Hop Resolution Protocol ( NHRP) will set up and tear down a switched virtual circuit (SVC) based on aggregate traffic rates, use the ip nhrp trigger-svccommand ininterface configuration mode. To restore the default thresholds, use the no form of this command. Syntax Description
Command History
Usage GuidelinesThe two thresholds are measured during a sampling interval of 30 seconds, by default. To change that interval, use the load-interval seconds argument of the ip cef traffic-statistics command. ExamplesIn the following example, the triggering and teardown thresholds are set to 100 kbps and 5 kbps, respectively: ip nhrp trigger-svc 100 5 Related Commands
ip nhrp useTo configure the software so that Next Hop Resolution Protocol (NHRP) is deferred until the system has attempted to send data traffic to a particular destination multiple times, use the ip nhrp usecommandininterface configuration mode. To restore the default value, use the no form of this command. Command Defaultusage-count : 1. The first time a data packet is sent to a destination for which the system determines NHRP can be used, an NHRP request is sent. Command History
Usage GuidelinesWhen the software attempts to send a data packet to a destination for which it has determined that NHRP address resolution can be used, an NHRP request for that destination is normally sent immediately. Configuring the usage-countargument causes the system to wait until that many data packets have been sent to a particular destination before it attempts NHRP. The usage-count argument for a particular destination is measured over 1-minute intervals (the NHRP cache expiration interval). The usage count applies per destination. So if the usage-count argument is configured to be 3, and four data packets are sent toward 10.0.0.1 and one packet toward 10.0.0.2, then an NHRP request is generated for 10.0.0.1 only. If the system continues to need to forward data packets to a particular destination, but no NHRP response has been received, retransmission of NHRP requests is performed. This retransmission occurs only if data traffic continues to be sent to a destination. The ip nhrp interest command controls which packets cause NHRP address resolution to take place; the ip nhrp use command controls how readily the system attempts such address resolution. ExamplesIn the following example, if in the first minute five packets are sent to the first destination and five packets are sent to a second destination, then a single NHRP request is generated for the second destination. If in the second minute the same traffic is generated and no NHRP responses have been received, then the system resends its request for the second destination. ip nhrp use 5 ip optionsTo drop or ignore IP options packets that are sent to the router, use the ip optionscommand in global configuration mode. To disable this functionality and allow all IP options packets to be sent to the router, use the no form of this command. Command History
Usage GuidelinesThe ip options command allows you to filter IP options packets, mitigating the effects of IP options on the router, and on downstream routers and hosts. Drop and ignore modes are mutually exclusive; that is, if the drop mode is configured and you configure the ignore mode, the ignore mode overrides the drop mode. Cisco 10720 Internet Router The ip options ignore command is not supported. Only drop mode (the ip options drop command) is supported. Cisco 10000 Series Router This command is only available on the PRE3. The PRE2 does not support this command. The ip options ignore command is not supported. The router supports only the ip options drop command. ip proxy-arpTo enable proxy Address Resolution Protocol (ARP) on an interface, use the ip proxy-arp command in interface configuration mode. To disable proxy ARP on the interface, use the noform of this command. Command History
ip routeTo establish static routes, use the ip route command in global configuration mode. Toremove static routes, use the noform of this command.
ip
route
[vrf vrf-name]
prefix
mask
{ip-address | interface-type interface-number [ip-address] }
[dhcp]
[distance]
[name next-hop-name]
[permanent | track number]
[tag tag]
no
ip
route
[vrf vrf-name]
prefix
mask
{ip-address | interface-type interface-number [ip-address] }
[dhcp]
[distance]
[name next-hop-name]
[permanent | track number]
[tag tag]
Syntax DescriptionCommand History
Usage GuidelinesThe establishment of a static route is appropriate when the Cisco IOS software cannot dynamically build a route to the destination. When you specify a DHCP server to assign a static route, the interface type and number and administrative distance may be configured also. If you specify an administrative distance, you are flagging a static route that can be overridden by dynamic information. For example, routes derived with Enhanced Interior Gateway Routing Protocol (EIGRP) have a default administrative distance of 100. To have a static route that would be overridden by an EIGRP dynamic route, specify an administrative distance greater than 100. Static routes have a default administrative distance of 1. Static routes that point to an interface on a connected router will be advertised by way of Routing Information Protocol (RIP) and EIGRP regardless of whether redistribute static commands are specified for those routing protocols. This situation occurs because static routes that point to an interface are considered in the routing table to be connected and hence lose their static nature. Also, the target of the static route should be included in the network(DHCP) command. If this condition is not met, no dynamic routing protocol will advertise the route unless a redistribute staticcommand is specified for these protocols. With the following configuration: rtr1 (serial 172.16.188.1/30)--------------> rtr2(Fast Ethernet 172.31.1.1/30) ------> router [rip | eigrp] network 172.16.188.0 network 172.31.0.0
ip route 172.16.188.252 255.255.255.252 FastEthernet 0/0 RIP and EIGRP do not redistribute the route with the following ip routecommand because of the split horizon algorithm: ip route 172.16.188.252 255.255.255.252 serial 2/1
ip route 172.16.188.252 255.255.255.252 FastEthernet 0/0 ip route 172.16.188.252 255.255.255.252 serial 2/1 With the Open Shortest Path First (OSPF) protocol, static routes that point to an interface are not advertised unless a redistribute staticcommand is specified. Adding a static route to an Ethernet or other broadcast interface (for example, ip route 0.0.0.0 0.0.0.0 Ethernet 1/2) will cause the route to be inserted into the routing table only when the interface is up. This configuration is not generally recommended. When the next hop of a static route points to an interface, the router considers each of the hosts within the range of the route to be directly connected through that interface, and therefore it will send Address Resolution Protocol (ARP) requests to any destination addresses that route through the static route. A logical outgoing interface, for example, a tunnel, needs to be configured for a static route. If this outgoing interface is deleted from the configuration, the static route is removed from the configuration and hence does not show up in the routing table. To have the static route inserted into the routing table again, configure the outgoing interface once again and add the static route to this interface. The practical implication of configuring the ip route 0.0.0.0 0.0.0.0 ethernet 1/2 command is that the router will consider all of the destinations that the router does not know how to reach through some other route as directly connected to Ethernet interface 1/2. So the router will send an ARP request for each host for which it receives packets on this network segment. This configuration can cause high processor utilization and a large ARP cache (along with memory allocation failures). Configuring a default route or other static route that directs the router to forward packets for a large range of destinations to a connected broadcast network segment can cause your router to reload. Specifying a numerical next hop that is on a directly connected interface will prevent the router from using proxy ARP. However, if the interface with the next hop goes down and the numerical next hop can be reached through a recursive route, you may specify both the next hop and interface (for example, ip route 0.0.0.0 0.0.0.0 ethernet 1/2 10.1.2.3) with a static route to prevent routes from passing through an unintended interface.
The name next-hop-name keyword and argument combination allows you to associate static routes with names in your running configuration. If you have several static routes, you can specify names that describe the purpose of each static route in order to more easily identify each one. The track number keyword and argument combination specifies that the static route will be installed only if the state of the configured track object is up. Recursive Static Routing In a recursive static route, only the next hop is specified. The output interface is derived from the next hop. For the following recursive static route example, all destinations with the IP address prefix address prefix 192.168.1.1/32 are reachable via the host with address 10.0.0.2: ip route 192.168.1.1 255.255.255.255 10.0.0.2 A recursive static route is valid (that is, it is a candidate for insertion in the IPv4 routing table) only when the specified next hop resolves, either directly or indirectly, to a valid IPv4 output interface, provided the route does not self-recurse, and the recursion depth does not exceed the maximum IPv4 forwarding recursion depth. The following example defines a valid recursive IPv4 static route: interface serial 2/0 ip address 10.0.0.1 255.255.255.252 exit ip route 192.168.1.1 255.255.255.255 10.0.0.2 The following example defines an invalid recursive IPv4 static route. This static route will not be inserted into the IPv4 routing table because it is self-recursive. The next hop of the static route, 192.168.1.0/30, resolves via the first static route 192.168.1.0/24, which is itself a recursive route (that is, it only specifies a next hop). The next hop of the first route, 192.168.1.0/24, resolves via the directly connected route via the serial interface 2/0. Therefore, the first static route would be used to resolve its own next hop. interface serial 2/0 ip address 10.0.0.1 255.255.255.252 exit ip route 192.168.1.0 255.255.255.0 10.0.0.2 ip route 192.168.1.0 255.255.255.252 192.168.1.100 It is not normally useful to manually configure a self-recursive static route, although it is not prohibited. However, a recursive static route that has been inserted in the IPv4 routing table may become self-recursive as a result of some transient change in the network learned through a dynamic routing protocol. If this situation occurs, the fact that the static route has become self-recursive will be detected and the static route will be removed from the IPv4 routing table, although not from the configuration. A subsequent network change may cause the static route to no longer be self-recursive, in which case it will be re-inserted in the IPv4 routing table.
ExamplesThe following example shows how to choose an administrative distance of 110. In this case, packets for network 10.0.0.0 will be routed to a router at 172.31.3.4 if dynamic information with an administrative distance less than 110 is not available. ip route 10.0.0.0 255.0.0.0 172.31.3.4 110
The following example shows how to route packets for network 172.31.0.0 to a router at 172.31.6.6: ip route 172.31.0.0 255.255.0.0 172.31.6.6 The following example shows how to route packets for network 192.168.1.0 directly to the next hop at 10.1.2.3. If the interface goes down, this route is removed from the routing table and will not be restored unless the interface comes back up. ip route 192.168.1.0 255.255.255.0 Ethernet 0 10.1.2.3 The following example shows how to install the static route only if the state of track object 123 is up: ip route 0.0.0.0 0.0.0.0 Ethernet 0/1 10.1.1.242 track 123 The following example shows that using the dhcp keyword in a configuration of Ethernet interfaces 1 and 2 enables the interfaces to obtain the next-hop router IP addresses dynamically from a DHCP server: ip route 10.165.200.225 255.255.255.255 ethernet1 dhcp ip route 10.165.200.226 255.255.255.255 ethernet2 dhcp 20 The following example shows that using the name next-hop-name keyword and argument combination for each static route in the configuration helps you remember the purpose for each static route. ip route 172.0.0.0 255.0.0.0 10.0.0.1 name Seattle2Detroit The name for the static route will be displayed when the show running-configuration command is entered: Router# show running-config | include ip route ip route 172.0.0.0 255.0.0.0 10.0.0.1 name Seattle2Detroit ip route vrfTo establish static routes for a Virtual Private Network (VPN) routing and forwarding (VRF) instance, use the ip route vrfcommand in global configuration mode. To disable static routes, use the no form of this command.
ip
route
vrf
vrf-name
prefix
mask
[next-hop-address]
[interface interface-number]
[global]
[distance]
[permanent]
[tag tag]
no
ip
route
vrf
vrf-name
prefix
mask
[next-hop-address]
[interface interface-number]
[global]
[distance]
[permanent]
[tag tag]
Syntax Description
Command History
Usage GuidelinesUse a static route when the Cisco IOS software cannot dynamically build a route to the destination. If you specify an administrative distance when you set up a route, you are flagging a static route that can be overridden by dynamic information. For example, Interior Gateway Routing Protocol (IGRP)-derived routes have a default administrative distance of 100. To set a static route to be overridden by an IGRP dynamic route, specify an administrative distance greater than 100. Static routes each have a default administrative distance of 1. Static routes that point to an interface are advertised through the Routing Information Protocol (RIP), IGRP, and other dynamic routing protocols, regardless of whether the routes are redistributed into those routing protocols. That is, static routes configured by specifying an interface lose their static nature when installed into the routing table. However, if you define a static route to an interface not defined in a network command, no dynamic routing protocols advertise the route unless a redistribute static command is specified for these protocols. Supported Static Route Configurations When you configure static routes in a Multiprotocol Label Switching (MPLS) or MPLS VPN environment, note that some variations of the ip route and ip route vrf commands are not supported. These variations of the commands are not supported in Cisco IOS releases that support the Tag Forwarding Information Base (TFIB), specifically Cisco IOS releases 12.x T, 12.x M, and 12.0S. The TFIB cannot resolve prefixes when the recursive route over which the prefixes travel disappears and then reappears. However, the command variations are supported in Cisco IOS releases that support the MPLS Forwarding Infrastructure (MFI), specifically Cisco IOS release 12.2(25)S and later releases. Use the following guidelines when configuring static routes. Supported Static Routes in an MPLS Environment The following ip route command is supported when you configure static routes in an MPLS environment: ip route destination-prefix mask interface next-hop-address The following ip route commands are supported when you configure static routes in an MPLS environment and configure load sharing with static nonrecursive routes and a specific outbound interface: ip route destination-prefix mask interface1 next-hop1 ip route destination-prefix mask interface2 next-hop2 Unsupported Static Routes in an MPLS Environment That Uses the TFIB The following ip route command is not supported when you configure static routes in an MPLS environment: ip route destination-prefix mask next-hop-address The following ip route command is not supported when you configure static routes in an MPLS environment and enable load sharing where the next hop can be reached through two paths: ip route destination-prefix mask next-hop-address The following ip route command is not supported when you configure static routes in an MPLS environment and enable load sharing where the destination can be reached through two next hops: ip route destination-prefix mask next-hop1 ip route destination-prefix mask next-hop2 Use the interface and next-hop arguments when specifying static routes. Supported Static Routes in an MPLS VPN Environment The following ip route vrfcommands are supported when you configure static routes in an MPLS VPN environment, and the next hop and interface are in the same VRF:
The following ip route vrfcommands are supported when you configure static routes in an MPLS VPN environment, and the next hop is in the global table in the MPLS cloud in the global routing table. For example, these commands are supported when the next hop is pointing to the Internet gateway.
The following ip routecommands are supported when you configure static routes in an MPLS VPN environment and enable load sharing with static nonrecursive routes and a specific outbound interface: ip route destination-prefix mask interface1 next-hop1 ip route destination-prefix mask interface2 next-hop2 Unsupported Static Routes in an MPLS VPN Environment That Uses the TFIB The following ip route command is not supported when you configure static routes in an MPLS VPN environment, the next hop is in the global table in the MPLS cloud within the core, and you enable load sharing where the next hop can be reached through two paths: ip route vrf destination-prefix mask next-hop-address global The following ip route commands are not supported when you configure static routes in an MPLS VPN environment, the next hop is in the global table in the MPLS cloud within the core, and you enable load sharing where the destination can be reached through two next hops: ip route vrf destination-prefix mask next-hop1 global ip route vrf destination-prefix mask next-hop2 global The following ip route vrf commands are not supported when you configure static routes in an MPLS VPN environment, and the next hop and interface are in the same VRF: ip route vrf vrf-name destination-prefix mask next-hop1 ip route vrf vrf-name destination-prefix mask next-hop2 Supported Static Routes in an MPLS VPN Environment Where the Next Hop Resides in the Global Table on the CE Router The following ip route vrfcommand is supported when you configure static routes in an MPLS VPN environment, and the next hop is in the global table on the customer equipment (CE) side. For example, the following command is supported when the destination prefix is the CE routerâs loopback address, as in external BGP (EBGP) multihop cases. ip route vrf vrf-name destination-prefix mask interface next-hop-address The following ip route commands are supported when you configure static routes in an MPLS VPN environment, the next hop is in the global table on the CE side, and you enable load sharing with static nonrecursive routes and a specific outbound interfaces: ip route destination-prefix mask interface1 nexthop1 ip route destination-prefix mask interface2 nexthop2 ip routingTo enable IP routing, use the ip routing command in global configuration mode. To disable IP routing, use the noform of this command. Command History
Usage GuidelinesTo bridge IP, the no ip routing command must be configured to disable IP routing. However, you need not specify no ip routing in conjunction with concurrent routing and bridging to bridge IP. The ip routing command is disabled on the Cisco VG200 voice over IP gateway. Disabling IP routing is not allowed if you are running Cisco IOS Release 12.2SX on a Catalyst 6000 platform. The workaround is to not assign an IP address to the SVI. ip source bindingTo add a static IP source binding entry, use the ip source binding command. Use the no form of this command to delete a static IP source binding entry Syntax Description
Usage GuidelinesYou can use this command to add a static IP source binding entry only. The no format deletes the corresponding IP source binding entry. It requires the exact match of all required parameter in order for the deletion to be successful. Note that each static IP binding entry is keyed by a MAC address and a VLAN number. If the command contains the existing MAC address and VLAN number, the existing binding entry is updated with the new parameters instead of creating a separate binding entry. ExamplesThis example shows how to add a static IP source binding entry:
Router(config)#
ip source binding 000C.0203.0405 vlan 100 172.16.30.2 interface gigabitethernet5/3
This example shows how to delete a static IP source binding entry:
Router(config)#
no ip source binding 000C.0203.0405 vlan 100 172.16.30.2 interface gigabitethernet5/3
ip source-routeTo allow the Cisco IOS software to handle IP datagrams with source routing header options, use the ip source-route command in global configuration mode. To have the software discard any IP datagram containing a source-route option, use the no form of this command. Command History
ExamplesThe following example enables the handling of IP datagrams with source routing header options: ip source-route Related Commands
ip sticky-arp (global configuration)To enable sticky ARP, use the ip sticky-arp command in global configuration mode. To disable sticky ARP, use the no form of this command. Command History
Usage GuidelinesIn releases prior to Release 12.2(18)SXF, sticky ARP was supported on PVLAN interfaces only. You can enter the ip sticky-arp (interface configuration)command to disable sticky ARP on a specific interface. ARP entries that are learned on Layer 3 interfaces are sticky ARP entries. We recommend that you display and verify ARP entries on the Layer 3 interface using the show arp command. For security reasons, sticky ARP entries on the Layer 3 interface do not age out. Connecting new equipment with the same IP address generates a message and the ARP entry is not created. Because the ARP entries on the Layer 3 interface do not age out, you must manually remove ARP entries on the Layer 3 interface if a MAC address changes. Unlike static entries, sticky-ARP entries are not stored and restored when you enter the reboot and restart commands. ip sticky-arp (interface configuration)To enable sticky ARP on an interface, use the ip sticky-arp command in interface configuration mode. To disable sticky ARP on an interface, use the no form of this command. Usage GuidelinesYou can enter this command on any Layer 3 interface. You can enter the ip sticky-arp ignore command to overwrite the PVLAN sticky-ARP global configuration on a specific interface. ExamplesThis example shows how to enable sticky ARP on an interface:
Router(config-if) ip sticky-arp
This example shows how to remove the previously configured command on an interface:
Router(config-if) no ip sticky-arp
This example shows how to disable sticky ARP on an interface: Router(config-if) ip sticky-arp ignore ip subnet-zeroTo enable the use of subnet 0 for interface addresses and routing updates, use the ip subnet-zero command in global configuration mode. To restore the default, use the no form of this command. Command History
ip unnumberedTo enable IP processing on an interface without assigning an explicit IP address to the interface, use the ip unnumbered command in interface configuration mode or subinterface configuration mode.To disable the IP processing on the interface, use the noform of this command. Syntax Description
Command History
Usage GuidelinesWhen an unnumbered interface generates a packet (for example, for a routing update), it uses the address of the specified interface as the source address of the IP packet. It also uses the address of the specified interface in determining which routing processes are sending updates over the unnumbered interface. Restrictions are as follows:
The interface you specify by the typeand ânumberarguments must be enabled (listed as âupâ in the show interfacescommand display). If you are configuring Intermediate System-to-Intermediate System (IS-IS) across a serial line, you should configure the serial interfaces as unnumbered. This configuration allows you to comply with RFC 1195, which states that IP addresses are not required on each interface.
ExamplesIn the following example, the first serial interface is given the address of Ethernet 0: interface ethernet 0 ip address 10.108.6.6 255.255.255.0 ! interface serial 0 ip unnumbered ethernet 0 In the following example, Ethernet VLAN subinterface 3/0.2 is configured as an IP unnumbered subinterface: interface ethernet 3/0.2 encapsulation dot1q 200 ip unnumbered ethernet 3/1 In the following example, Fast Ethernet subinterfaces in the range from 5/1.1 to 5/1.4 are configured as IP unnumbered subinterfaces: interface range fastethernet5/1.1 - fastethernet5/1.4 ip unnumbered ethernet 3/1 ip verify source vlan dhcp-snoopingTo enable Layer 2 IP source guard, use the ip verify source vlan dhcp-snooping command in the service instance mode. Use the no form of this command to disable Layer 2 IP source guard.
ip
verify
source
vlan
dhcp-snooping
[port-security]
no
ip
verify
source
vlan
dhcp-snooping
[port-security]
Usage GuidelinesThe ip verify source vlan dhcp-snooping command enables VLANs only on the configured service instance (EVC) and looks for DHCP snooping matches only for the configured bridge domain VLAN. ExamplesThis example shows how to enable Layer 2 IP source guard on an interface: Router# enable Router# configure terminal Router(config)# interface GigabitEthernet7/1 Router(config-if)# no ip address Router(config-if)# service instance 71 ethernet Router(config-if-srv)# encapsulation dot1q 71 Router(config-if-srv)# rewrite ingress tag pop 1 symmetric Router(config-if-srv)# ip verify source vlan dhcp-snooping Router(config-if-srv)# bridge-domain 10 iterate-ip-addrsTo display the interface descriptor blocks (IDBs) that are visited by the IP iterators, use the iterate-ip-addrs command in privileged EXEC mode. ExamplesThe following is sample output of the iterate-ip-addrs secondary command: Router# iterate-ip-addrs 10.0.0.1 255.0.0.0 secondary target = 10.0.0.1, mask = 255.0.0.0, sec = TRUE interface primary address tableid -------------------- ------------------ ---------- FOR_SWIDBS_WITH_IPADDR(idb, tbl, target, sec, cref) visits ExecTime=0 microsec FOR_SWIDBS_ON_IPSUBNET(idb, tbl, target & mask, mask, sec, cref) visits Gi6/2 10.4.9.87/24 0x00000000 ExecTime=1 microsec FOR_SWIDBS_WITH_IPNETADDR(idb, tbl, target, mask, sec, cref) visits ExecTime=1 microsec FOR_SWIDBS_WHOSE_SUBNET_HAS_IPADDR(idb, tbl, target, sec, cref) visits ExecTime=1 microsec FOR_NUMBERED_SWIDBS(idb, tbl, cref) visits Gi6/2 10.4.9.87/24 0x00000000 EO0/0 192.0.2.51/8 0x00000FFF Gi1/1 10.1.1.1/24 0x00000000 Vl1 192.0.2.1/24 0x00000000 ExecTime=2 microsec interface address tableid -------------------- ------------------ ---------- FOR_ENTRIES_ON_IPSUBNET(addr, tbl, target & mask, mask, cref) visits Gi6/2 10.4.9.87/24 0x00000000 ExecTime=2 microsec FOR_NUMBERED_ENTRIES(addr, tbl, cref) visits Gi6/2 10.4.9.87/24 0x00000000 EO0/0 192.0.2.51/8 0x00000FFF Gi1/1 10.1.1.1/24 0x00000000 Vl1 192.0.2.1/24 0x00000000 ExecTime=2 microsec FOR_ALL_IPADDR_ENTRIES(addr, tbl, cref) visits Gi6/2 10.4.9.87/24 0x00000000 EO0/0 192.0.2.51/8 0x00000FFF Gi1/1 10.1.1.1/24 0x00000000 Vl1 192.0.2.1/24 0x00000000 ExecTime=2 microsec FOR_ALL_IPADDR_ENTRIES_WITH_IPADDR(addr, tbl, target, cref) visits ExecTime=1 microsec FOR_TYPED_IPADDR_ENTRIES(addr, tbl, cref) visits ALIAS ExecTime=1 microsec FOR_TYPED_IPADDR_ENTRIES(addr, tbl, cref) visits INTERFACE Gi6/2 10.4.9.87/24 0x00000000 EO0/0 192.0.2.51/8 0x00000FFF Gi1/1 10.1.1.1/24 0x00000000 Vl1 192.0.2.1/24 0x00000000 ExecTime=1 microsec FOR_TYPED_IPADDR_ENTRIES(addr, tbl, cref) visits ALL Gi6/2 10.4.9.87/24 0x00000000 EO0/0 192.0.2.51/8 0x00000FFF Gi1/1 10.1.1.1/24 0x00000000 Vl1 192.0.2.1/24 0x00000000 ExecTime=2 microsec Summary Macro No. 0 ExecTime=0 microsec Macro No. 1 ExecTime=1 microsec Macro No. 2 ExecTime=1 microsec Macro No. 3 ExecTime=1 microsec Macro No. 4 ExecTime=2 microsec Macro No. 5 ExecTime=2 microsec Macro No. 6 ExecTime=2 microsec Macro No. 7 ExecTime=2 microsec Macro No. 8 ExecTime=1 microsec Macro No. 9 ExecTime=1 microsec Macro No. 10 ExecTime=1 microsec Macro No. 11 ExecTime=2 microsec Router# iterate-ip-addrs 10.0.0.1 255.0.0.0 secondary time-only target = 10.0.0.1, mask = 255.0.0.0, sec = TRUE interface primary address tableid -------------------- ------------------ ---------- FOR_SWIDBS_WITH_IPADDR(idb, tbl, target, sec, cref) visits ExecTime=1 microsec FOR_SWIDBS_ON_IPSUBNET(idb, tbl, target & mask, mask, sec, cref) visits ExecTime=2 microsec FOR_SWIDBS_WITH_IPNETADDR(idb, tbl, target, mask, sec, cref) visits ExecTime=1 microsec FOR_SWIDBS_WHOSE_SUBNET_HAS_IPADDR(idb, tbl, target, sec, cref) visits ExecTime=1 microsec FOR_NUMBERED_SWIDBS(idb, tbl, cref) visits ExecTime=2 microsec interface address tableid -------------------- ------------------ ---------- FOR_ENTRIES_ON_IPSUBNET(addr, tbl, target & mask, mask, cref) visits ExecTime=1 microsec FOR_NUMBERED_ENTRIES(addr, tbl, cref) visits ExecTime=2 microsec FOR_ALL_IPADDR_ENTRIES(addr, tbl, cref) visits ExecTime=2 microsec FOR_ALL_IPADDR_ENTRIES_WITH_IPADDR(addr, tbl, target, cref) visits ExecTime=0 microsec FOR_TYPED_IPADDR_ENTRIES(addr, tbl, cref) visits ALIAS ExecTime=1 microsec FOR_TYPED_IPADDR_ENTRIES(addr, tbl, cref) visits INTERFACE ExecTime=1 microsec FOR_TYPED_IPADDR_ENTRIES(addr, tbl, cref) visits ALL ExecTime=2 microsec Summary Macro No. 0 ExecTime=1 microsec Macro No. 1 ExecTime=2 microsec Macro No. 2 ExecTime=1 microsec Macro No. 3 ExecTime=1 microsec Macro No. 4 ExecTime=2 microsec Macro No. 5 ExecTime=1 microsec Macro No. 6 ExecTime=2 microsec Macro No. 7 ExecTime=2 microsec Macro No. 8 ExecTime=0 microsec Macro No. 9 ExecTime=1 microsec Macro No. 10 ExecTime=1 microsec Macro No. 11 ExecTime=2 microsec |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||